

IT Infrastructure Exam Questions
Course Introduction
IT Infrastructure explores the foundational technologies and systems that support the operations of modern organizations. The course covers the architecture, components, and management of hardware, software, networks, data centers, cloud services, and virtualization. Students learn best practices for implementing, securing, and maintaining reliable and scalable IT environments, with an emphasis on aligning infrastructure solutions with business objectives. Through case studies and practical exercises, participants gain hands-on experience in designing and optimizing infrastructure to meet evolving technological and organizational needs.
Recommended Textbook
Business Data Networks and Security 11th Edition by Raymond R. Panko
Available Study Resources on Quizplus
12 Chapters
1009 Verified Questions
1009 Flashcards
Source URL: https://quizplus.com/study-set/2197

Page 2

Chapter 1: Core Network Concepts and Terminology
Available Study Resources on Quizplus for this Chatper
68 Verified Questions
68 Flashcards
Source URL: https://quizplus.com/quiz/43742
Sample Questions
Q1) We call any device connected to the Internet a(n)________.
A) IP
B) client
C) router
D) host
Answer: D
Q2) Flooding a host with traffic so that it cannot serve its legitimate users is a ________ attack.
A) hacking
B) virus
C) malware
D) DoS
Answer: D
Q3) Internet communication that does not involve a human is referred to with the term
A) World Wide Web
B) impersonal
C) anonymous
D) IoT
Answer: D
To view all questions and flashcards with answers, click on the resource link above. Page 3

Chapter 2: Network Standards
Available Study Resources on Quizplus for this Chatper
112 Verified Questions
112 Flashcards
Source URL: https://quizplus.com/quiz/43743
Sample Questions
Q1) How many alternatives can you represent with a 10-bit field?
A) 256
B) 512
C) 1,024
D) none of the above
Answer: C
Q2) The UDP header has ________ fields.
A) 4
B) 8
C) 16
D) 32
Answer: A
Q3) Convert the binary number 100 to decimal.
A) It is in decimal.
B) 2
C) 4
D) 8
Answer: C
To view all questions and flashcards with answers, click on the resource link above. Page 4

Chapter 3: Network Management
Available Study Resources on Quizplus for this Chatper
66 Verified Questions
66 Flashcards
Source URL: https://quizplus.com/quiz/43744
Sample Questions
Q1) Which of the following reduces momentary traffic peaks by controlling how much traffic is allowed into the network?
A) overprovisioning
B) priority
C) QoS guarantees
D) none of the above
Answer: D
Q2) Using standard configurations ________.
A) saves money
B) gives management agility
C) both A and B
D) neither A nor B
Answer: A
Q3) Ping tells you ________.
A) that a host is reachable
B) latency in the connection to the host
C) both A and B
D) neither A nor B
Answer: C
To view all questions and flashcards with answers, click on the resource link above.
Page 5

Chapter 4: Network Security
Available Study Resources on Quizplus for this Chatper
106 Verified Questions
106 Flashcards
Source URL: https://quizplus.com/quiz/43745
Sample Questions
Q1) In general,what should an employer do whenever an employee leaves the firm?
A) Their accounts should be disabled instantly
B) They should be given no prior notice that they are being released
C) both A and B
D) neither A nor B
Q2) How did the Target attackers obtain the stolen information?
A) Directly from the POS terminals
B) From the vendor service server
C) From the POS software download server
D) none of the above.
Q3) Which of the following can spread very rapidly?
A) directly-propagating viruses
B) directly-propagating worms
C) both A and B
D) neither A nor B
Q4) Facial recognition is controversial because ________.
A) it can be fooled very easily
B) it can be used surreptitiously
C) both A and B
D) neither A nor B
To view all questions and flashcards with answers, click on the resource link above. Page 6

Chapter 5: Ethernet 8023switched Lans
Available Study Resources on Quizplus for this Chatper
91 Verified Questions
91 Flashcards
Source URL: https://quizplus.com/quiz/43746
Sample Questions
Q1) What is binary 1111 in hex?
A) 10
B) 13
C) 14
D) 15
Q2) Two switches that are 200 m apart at a speed of 20 Gbps should be connected using ________.
A) 10GBASE-SR
B) 100GBASE-SR
C) 10GBASE-SR with bonding
D) 100GBASE-SR with bonding
Q3) ________ links connect switches to other switches.
A) Trunk
B) Long
C) Access
D) Workgroup
Q4) All Ethernet switches are manageable.
A)True
B)False
To view all questions and flashcards with answers, click on the resource link above. Page 7

Chapter 6: Wireless Lans I
Available Study Resources on Quizplus for this Chatper
92 Verified Questions
92 Flashcards
Source URL: https://quizplus.com/quiz/43747
Sample Questions
Q1) The most serious problem with wireless transmission in WLANs is ________.
A) inverse square law attenuation
B) absorptive attenuation
C) shadow zones
D) multipath interference
Q2) Beamforming can allow an access point to ________.
A) focus power on individual clients
B) send signals to two different clients at the same time
C) both A and B
D) neither A nor B
Q3) The 2.4 GHz band supports ________ possible non-overlapping 20 MHz channel(s).
A) 1
B) 3
C) 7
D) 11
Q4) Which of the following is more efficient and faster?
A) CSMA/CA+ACK
B) RTS/CTS
C) Both are about equally efficient and fast.
Page 8
To view all questions and flashcards with answers, click on the resource link above.

Chapter 7: Wireless Lans II
Available Study Resources on Quizplus for this Chatper
73 Verified Questions
73 Flashcards
Source URL: https://quizplus.com/quiz/43748
Sample Questions
Q1) Which is the correct formula for decibels?
A) 10 * P2/P1
B) 10 * (P2/P1)²
C) Log10(P2/P1)
D) none of the above
Q2) 802.11i 802.1X initial authentication mode was created for ________.
A) corporations with multiple access points
B) residences with a single access point
C) residences with less than eight access points
D) corporations with less than eight access points
Q3) Which of the following is true of Bluetooth?
A) A master may have multiple slaves.
B) A slave may have multiple masters.
C) both A and B
D) neither A nor B
Q4) Nearly all public Wi-Fi hotspots encrypt your transmissions.
A)True
B)False
To view all questions and flashcards with answers, click on the resource link above. Page 9

Chapter 8: TCP/IP Internetworking I
Available Study Resources on Quizplus for this Chatper
86 Verified Questions
86 Flashcards
Source URL: https://quizplus.com/quiz/43749
Sample Questions
Q1) The total length of an IPv4 address is ________ bits.
A) 8
B) 16
C) 32
D) 64
Q2) An abrupt close uses a ________ segment.
A) FIN
B) RST
C) either A or B
D) neither A nor B
Q3) Which RFC standardizes how to write IPv6 addresses in canonical form?
A) RFC 791
B) RFC 2707
C) RFC 5952
D) RFC 7600
Q4) If you see an IPv4 address,what do you know for certain?
A) the total length
B) the length of the network part
C) both A and B
D) neither A nor B
To view all questions and flashcards with answers, click on the resource link above. Page 10

Chapter 9: TCP/IP Internetworking II
Available Study Resources on Quizplus for this Chatper
81 Verified Questions
81 Flashcards
Source URL: https://quizplus.com/quiz/43750
Sample Questions
Q1) Which protects more of the original IP packet?
A) transport mode
B) tunnel mode
C) Both provide the same protection to the IP packet.
Q2) ________ is an interior dynamic routing protocol.
A) OSPF
B) BGP
C) both A and B
D) neither A nor B
Q3) NAT enhances security by ________.
A) preventing sniffers from learning internal IP addresses
B) encryption
C) both A and B
D) neither A nor B
Q4) In remote access VPNs,IPsec has an ________ at the corporate site.
A) IPsec firewall
B) IPsec gateway
C) IPsec proxy server
D) IPsec endpoint
To view all questions and flashcards with answers, click on the resource link above. Page 11
Chapter 10: Carrier Wide Area Networks Wans
Available Study Resources on Quizplus for this Chatper
81 Verified Questions
81 Flashcards
Source URL: https://quizplus.com/quiz/43751
Sample Questions
Q1) Which of the following is a common use for carrier WANs?
A) to connect corporate sites
B) to connect a corporate site to the Internet
C) both A and B
D) neither A nor B
Q2) In ADSL,the residential customer needs a(n)________.
A) DSLAM
B) ADSL modem
C) both A and B
D) neither A nor B
Q3) WANs include ________.
A) single networks
B) the Internet
C) either A or B
D) neither A nor B
Q4) Traffic shaping reduces traffic by ________.
A) preventing certain undesirable traffic from entering the network
B) limiting the amount of certain undesirable traffic entering the network
C) both A and B
D) neither A nor B

Page 12
To view all questions and flashcards with answers, click on the resource link above.

Chapter 11: Networked Applications
Available Study Resources on Quizplus for this Chatper
84 Verified Questions
84 Flashcards
Source URL: https://quizplus.com/quiz/43752
Sample Questions
Q1) Which of the following allows you to read your e-mail easily on an Internet café's computer?
A) IMAP
B) HTTP
C) HTML
D) SMTP
Q2) In Tor,________ can read the content of the message delivered to the destination host.
A) no Tor router
B) all Tor routers
C) the first Tor router
D) the last Tor router
Q3) Creating a new VM is ________.
A) booting
B) startup
C) birthing
D) instantiation
Q4) In VoIP traffic,the data field in a signaling packet usually carries codec data.
A)True
B)False
To view all questions and flashcards with answers, click on the resource link above. Page 13

Chapter 12: Appendix: Managing the Security Process
Available Study Resources on Quizplus for this Chatper
69 Verified Questions
69 Flashcards
Source URL: https://quizplus.com/quiz/43741
Sample Questions
Q1) Which of the following specifies what should be done?
A) policies
B) implementation
C) both A and B
D) neither A nor B
Q2) CSIRT leaders should come from ________.
A) an outside crisis vendor
B) a business department
C) the security department
D) the IT department
Q3) Live rehearsals are important because they ________ compared to desktop rehearsals.
A) are relatively inexpensive
B) get into specific details
C) both A and B
D) neither A nor B
Q4) Servers in the Demilitarized Zone (DMZ)are rarely attacked by clients on the Internet.
A)True
B)False
To view all questions and flashcards with answers, click on the resource link above. Page 14