IT Infrastructure Exam Questions - 1009 Verified Questions

Page 1


IT Infrastructure Exam Questions

Course Introduction

IT Infrastructure explores the foundational technologies and systems that support the operations of modern organizations. The course covers the architecture, components, and management of hardware, software, networks, data centers, cloud services, and virtualization. Students learn best practices for implementing, securing, and maintaining reliable and scalable IT environments, with an emphasis on aligning infrastructure solutions with business objectives. Through case studies and practical exercises, participants gain hands-on experience in designing and optimizing infrastructure to meet evolving technological and organizational needs.

Recommended Textbook

Business Data Networks and Security 11th Edition by Raymond R. Panko

Available Study Resources on Quizplus

12 Chapters

1009 Verified Questions

1009 Flashcards

Source URL: https://quizplus.com/study-set/2197

Page 2

Chapter 1: Core Network Concepts and Terminology

Available Study Resources on Quizplus for this Chatper

68 Verified Questions

68 Flashcards

Source URL: https://quizplus.com/quiz/43742

Sample Questions

Q1) We call any device connected to the Internet a(n)________.

A) IP

B) client

C) router

D) host

Answer: D

Q2) Flooding a host with traffic so that it cannot serve its legitimate users is a ________ attack.

A) hacking

B) virus

C) malware

D) DoS

Answer: D

Q3) Internet communication that does not involve a human is referred to with the term

A) World Wide Web

B) impersonal

C) anonymous

D) IoT

Answer: D

To view all questions and flashcards with answers, click on the resource link above. Page 3

Chapter 2: Network Standards

Available Study Resources on Quizplus for this Chatper

112 Verified Questions

112 Flashcards

Source URL: https://quizplus.com/quiz/43743

Sample Questions

Q1) How many alternatives can you represent with a 10-bit field?

A) 256

B) 512

C) 1,024

D) none of the above

Answer: C

Q2) The UDP header has ________ fields.

A) 4

B) 8

C) 16

D) 32

Answer: A

Q3) Convert the binary number 100 to decimal.

A) It is in decimal.

B) 2

C) 4

D) 8

Answer: C

To view all questions and flashcards with answers, click on the resource link above. Page 4

Chapter 3: Network Management

Available Study Resources on Quizplus for this Chatper

66 Verified Questions

66 Flashcards

Source URL: https://quizplus.com/quiz/43744

Sample Questions

Q1) Which of the following reduces momentary traffic peaks by controlling how much traffic is allowed into the network?

A) overprovisioning

B) priority

C) QoS guarantees

D) none of the above

Answer: D

Q2) Using standard configurations ________.

A) saves money

B) gives management agility

C) both A and B

D) neither A nor B

Answer: A

Q3) Ping tells you ________.

A) that a host is reachable

B) latency in the connection to the host

C) both A and B

D) neither A nor B

Answer: C

To view all questions and flashcards with answers, click on the resource link above.

Page 5

Chapter 4: Network Security

Available Study Resources on Quizplus for this Chatper

106 Verified Questions

106 Flashcards

Source URL: https://quizplus.com/quiz/43745

Sample Questions

Q1) In general,what should an employer do whenever an employee leaves the firm?

A) Their accounts should be disabled instantly

B) They should be given no prior notice that they are being released

C) both A and B

D) neither A nor B

Q2) How did the Target attackers obtain the stolen information?

A) Directly from the POS terminals

B) From the vendor service server

C) From the POS software download server

D) none of the above.

Q3) Which of the following can spread very rapidly?

A) directly-propagating viruses

B) directly-propagating worms

C) both A and B

D) neither A nor B

Q4) Facial recognition is controversial because ________.

A) it can be fooled very easily

B) it can be used surreptitiously

C) both A and B

D) neither A nor B

To view all questions and flashcards with answers, click on the resource link above. Page 6

Chapter 5: Ethernet 8023switched Lans

Available Study Resources on Quizplus for this Chatper

91 Verified Questions

91 Flashcards

Source URL: https://quizplus.com/quiz/43746

Sample Questions

Q1) What is binary 1111 in hex?

A) 10

B) 13

C) 14

D) 15

Q2) Two switches that are 200 m apart at a speed of 20 Gbps should be connected using ________.

A) 10GBASE-SR

B) 100GBASE-SR

C) 10GBASE-SR with bonding

D) 100GBASE-SR with bonding

Q3) ________ links connect switches to other switches.

A) Trunk

B) Long

C) Access

D) Workgroup

Q4) All Ethernet switches are manageable.

A)True

B)False

To view all questions and flashcards with answers, click on the resource link above. Page 7

Chapter 6: Wireless Lans I

Available Study Resources on Quizplus for this Chatper

92 Verified Questions

92 Flashcards

Source URL: https://quizplus.com/quiz/43747

Sample Questions

Q1) The most serious problem with wireless transmission in WLANs is ________.

A) inverse square law attenuation

B) absorptive attenuation

C) shadow zones

D) multipath interference

Q2) Beamforming can allow an access point to ________.

A) focus power on individual clients

B) send signals to two different clients at the same time

C) both A and B

D) neither A nor B

Q3) The 2.4 GHz band supports ________ possible non-overlapping 20 MHz channel(s).

A) 1

B) 3

C) 7

D) 11

Q4) Which of the following is more efficient and faster?

A) CSMA/CA+ACK

B) RTS/CTS

C) Both are about equally efficient and fast.

Page 8

To view all questions and flashcards with answers, click on the resource link above.

Chapter 7: Wireless Lans II

Available Study Resources on Quizplus for this Chatper

73 Verified Questions

73 Flashcards

Source URL: https://quizplus.com/quiz/43748

Sample Questions

Q1) Which is the correct formula for decibels?

A) 10 * P2/P1

B) 10 * (P2/P1)²

C) Log10(P2/P1)

D) none of the above

Q2) 802.11i 802.1X initial authentication mode was created for ________.

A) corporations with multiple access points

B) residences with a single access point

C) residences with less than eight access points

D) corporations with less than eight access points

Q3) Which of the following is true of Bluetooth?

A) A master may have multiple slaves.

B) A slave may have multiple masters.

C) both A and B

D) neither A nor B

Q4) Nearly all public Wi-Fi hotspots encrypt your transmissions.

A)True

B)False

To view all questions and flashcards with answers, click on the resource link above. Page 9

Chapter 8: TCP/IP Internetworking I

Available Study Resources on Quizplus for this Chatper

86 Verified Questions

86 Flashcards

Source URL: https://quizplus.com/quiz/43749

Sample Questions

Q1) The total length of an IPv4 address is ________ bits.

A) 8

B) 16

C) 32

D) 64

Q2) An abrupt close uses a ________ segment.

A) FIN

B) RST

C) either A or B

D) neither A nor B

Q3) Which RFC standardizes how to write IPv6 addresses in canonical form?

A) RFC 791

B) RFC 2707

C) RFC 5952

D) RFC 7600

Q4) If you see an IPv4 address,what do you know for certain?

A) the total length

B) the length of the network part

C) both A and B

D) neither A nor B

To view all questions and flashcards with answers, click on the resource link above. Page 10

Chapter 9: TCP/IP Internetworking II

Available Study Resources on Quizplus for this Chatper

81 Verified Questions

81 Flashcards

Source URL: https://quizplus.com/quiz/43750

Sample Questions

Q1) Which protects more of the original IP packet?

A) transport mode

B) tunnel mode

C) Both provide the same protection to the IP packet.

Q2) ________ is an interior dynamic routing protocol.

A) OSPF

B) BGP

C) both A and B

D) neither A nor B

Q3) NAT enhances security by ________.

A) preventing sniffers from learning internal IP addresses

B) encryption

C) both A and B

D) neither A nor B

Q4) In remote access VPNs,IPsec has an ________ at the corporate site.

A) IPsec firewall

B) IPsec gateway

C) IPsec proxy server

D) IPsec endpoint

To view all questions and flashcards with answers, click on the resource link above. Page 11

Chapter 10: Carrier Wide Area Networks Wans

Available Study Resources on Quizplus for this Chatper

81 Verified Questions

81 Flashcards

Source URL: https://quizplus.com/quiz/43751

Sample Questions

Q1) Which of the following is a common use for carrier WANs?

A) to connect corporate sites

B) to connect a corporate site to the Internet

C) both A and B

D) neither A nor B

Q2) In ADSL,the residential customer needs a(n)________.

A) DSLAM

B) ADSL modem

C) both A and B

D) neither A nor B

Q3) WANs include ________.

A) single networks

B) the Internet

C) either A or B

D) neither A nor B

Q4) Traffic shaping reduces traffic by ________.

A) preventing certain undesirable traffic from entering the network

B) limiting the amount of certain undesirable traffic entering the network

C) both A and B

D) neither A nor B

Page 12

To view all questions and flashcards with answers, click on the resource link above.

Chapter 11: Networked Applications

Available Study Resources on Quizplus for this Chatper

84 Verified Questions

84 Flashcards

Source URL: https://quizplus.com/quiz/43752

Sample Questions

Q1) Which of the following allows you to read your e-mail easily on an Internet café's computer?

A) IMAP

B) HTTP

C) HTML

D) SMTP

Q2) In Tor,________ can read the content of the message delivered to the destination host.

A) no Tor router

B) all Tor routers

C) the first Tor router

D) the last Tor router

Q3) Creating a new VM is ________.

A) booting

B) startup

C) birthing

D) instantiation

Q4) In VoIP traffic,the data field in a signaling packet usually carries codec data.

A)True

B)False

To view all questions and flashcards with answers, click on the resource link above. Page 13

Chapter 12: Appendix: Managing the Security Process

Available Study Resources on Quizplus for this Chatper

69 Verified Questions

69 Flashcards

Source URL: https://quizplus.com/quiz/43741

Sample Questions

Q1) Which of the following specifies what should be done?

A) policies

B) implementation

C) both A and B

D) neither A nor B

Q2) CSIRT leaders should come from ________.

A) an outside crisis vendor

B) a business department

C) the security department

D) the IT department

Q3) Live rehearsals are important because they ________ compared to desktop rehearsals.

A) are relatively inexpensive

B) get into specific details

C) both A and B

D) neither A nor B

Q4) Servers in the Demilitarized Zone (DMZ)are rarely attacked by clients on the Internet.

A)True

B)False

To view all questions and flashcards with answers, click on the resource link above. Page 14

Turn static files into dynamic content formats.

Create a flipbook