Applied Networking Practice Questions - 600 Verified Questions

Page 1


Applied Networking Practice Questions

Course Introduction

Applied Networking explores the foundational principles and practical skills needed to design, configure, and maintain modern computer networks. The course covers essential topics such as network topologies, protocols, and standards, as well as switching, routing, wireless networking, and network security. Through hands-on labs and real-world scenarios, students gain experience with network devices and diagnostic tools, enabling them to troubleshoot common networking issues effectively. Emphasis is placed on applying networking concepts to solve problems in both local area networks (LANs) and wide area networks (WANs), preparing students for industry certifications and professional roles in IT networking.

Recommended Textbook

Network+ Guide to Networks 8th Edition Jill West

Available Study Resources on Quizplus

12 Chapters

600 Verified Questions

600 Flashcards

Source URL: https://quizplus.com/study-set/183 Page 2

Chapter 1: Introduction to Networking

Available Study Resources on Quizplus for this Chatper

50 Verified Questions

50 Flashcards

Source URL: https://quizplus.com/quiz/2566

Sample Questions

Q1) The Transport layer header addresses a receiving application by a number called a MAC address.

A)True

B)False

Answer: False

Q2) What layer of the OSI model describes how data between applications is synced and recovered if messages don't arrive intact at the receiving application?

A) Application Layer

B) Presentation Layer

C) Session Layer

D) Transport Layer

Answer: C

Q3) The Windows Remote Desktop application utilizes what protocol to provide secure, encrypted transmissions?

A) File Transfer Protocol (FTP)

B) Secure Sockets Layer (SSL)

C) Secure Shell (SSH)

D) Remote Desktop Protocol (RDP)

Answer: D

To view all questions and flashcards with answers, click on the resource link above.

Page 3

Chapter 2: Network Infrastructure and Documentation

Available Study Resources on Quizplus for this Chatper

50 Verified Questions

50 Flashcards

Source URL: https://quizplus.com/quiz/2567

Sample Questions

Q1) Each type of cable has a prescribed bend radius, which is the radius of the maximum arc into which you can loop a cable without impairing data transmission.

A)True

B)False

Answer: True

Q2) A 66 block is more suitable for data connections than the older 110 block.

A)True

B)False

Answer: False

Q3) A master service agreement (MSA) is a contract that defines the terms of future contracts between parties, such as payment terms or arbitration arrangements.

A)True

B)False

Answer: True

Q4) Fiber-optic cable comes in two types: single-mode fiber (SMF) or multimode fiber (MMF).

A)True

B)False Answer: True

To view all questions and flashcards with answers, click on the resource link above. Page 4

Chapter 3: Addressing on Networks

Available Study Resources on Quizplus for this Chatper

50 Verified Questions

50 Flashcards

Source URL: https://quizplus.com/quiz/2568

Sample Questions

Q1) Each organization that provides host services on the public Internet is responsible for providing and maintaining DNS authoritative servers for public access.

A)True

B)False

Answer: True

Q2) What part of a MAC address serves as the extension identifier, or device ID?

A) The first 24 bits of the MAC address.

B) The last 24 bits of the MAC address.

C) The first 12 bits of the MAC address.

D) The last 12 bits of the MAC address.

Answer: B

Q3) What statement regarding the Server Message Block protocol is accurate?

A) It is a simple protocol used to synchronize block messages written to iSCSI drives on a network.

B) It is used by Windows and UNIX-based operating systems to share files.

C) It is a signaling protocol used to make a connection between hosts prior to data transfer.

D) It is a protocol used for accessing network-based LDAP directories.

Answer: B

To view all questions and flashcards with answers, click on the resource link above.

Page 5

Chapter 4: Network Protocols and Routing

Available Study Resources on Quizplus for this Chatper

50 Verified Questions

50 Flashcards

Source URL: https://quizplus.com/quiz/2569

Sample Questions

Q1) How are routing paths determined?

Q2) ARP tables might contain two different types of entries. What are they, and how are they created?

Q3) UDP provides error checking, but not sequencing.

A)True

B)False

Q4) In IPv6, what field is used to indicate what sequence of packets from one source to one or multiple destinations a packet belongs to?

A) traffic class

B) group ID

C) flow label

D) traffic exchange

Q5) What field in an IPv4 packet informs routers the level of precedence they should apply when processing an incoming packet?

A) Differentiated Services (DiffServ)

B) Internet header length (IHL)

C) Time to Live (TTL)

D) Padding

Q6) What are some of the basic functions of a network router?

Page 6

To view all questions and flashcards with answers, click on the resource link above.

Chapter 5: Network Cabling

Available Study Resources on Quizplus for this Chatper

50 Verified Questions

50 Flashcards

Source URL: https://quizplus.com/quiz/2570

Sample Questions

Q1) RG-59 is more expensive than RG-6, but has better resistance to attenuation.

A)True

B)False

Q2) Bidirectional transceivers utilize what technology to separate the data in each direction?

A) wavelength division multiplexing

B) time division multiplexing

C) frequency division multiplexing

D) statistical time division multiplexing

Q3) Multimode fiber contains a core that is larger than a single mode fiber core.

A)True

B)False

Q4) Which statement accurately describes what near end crosstalk (NEXT) is?

A) NEXT is crosstalk that occurs between wire pairs near the source of a signal.

B) NEXT is crosstalk that occurs near the opposite end of a signal source.

C) NEXT is crosstalk that occurs when an EMI source is near the data signal source.

D) NEXT is crosstalk that occurs only when a cable segment exceeds the bend radius.

Q5) Noise can degrade or distort a signal on a network; what are some of its causes?

To view all questions and flashcards with answers, click on the resource link above. Page 7

Chapter 6: Wireless Networking

Available Study Resources on Quizplus for this Chatper

50 Verified Questions

50 Flashcards

Source URL: https://quizplus.com/quiz/2571

Sample Questions

Q1) Radiation patterns can be used to classify antennas into what two basic categories?

Q2) What type of device can be used to assess the quality of a wireless signal?

A) Wi-Fi analyzer

B) spectrum analyzer

C) channel scanner

D) frequency hopper

Q3) Healing messages are a feature of what smart home protocol?

A) ZigBee

B) Bluetooth

C) Z-Wave

D) ANT+

Q4) How does configuration of wireless clients for wireless access in an enterprise environment differ from normal setup?

Q5) In Linux, what command can be used for viewing and setting wireless interface parameters?

A) ifconfig

B) iwconfig

C) wlanconf

D) wifid

To view all questions and flashcards with answers, click on the resource link above. Page 8

Chapter 7: Virtualization and Cloud Computing

Available Study Resources on Quizplus for this Chatper

50 Verified Questions

50 Flashcards

Source URL: https://quizplus.com/quiz/2572

Sample Questions

Q1) Why is the telnet utility a poor choice for remote access to a device?

A) It provides no mechanism for authentication.

B) It does not allow for control of a computer remotely.

C) It cannot be used over a public WAN connection.

D) It provides poor authentication and no encryption.

Q2) In order to generate a public and private key for use with SSH, what command line utility should you use?

A) ssh-keygen

B) key-generate

C) ssh-newkey

D) gpg --ssh

Q3) The Virtual Network Computing (VNC) application uses the cross-platform remote frame buffer (RFB) protocol.

A)True

B)False

Q4) What two different types of encryption can be utilized with IPsec?

Q5) What are some of the features that all cloud services usually have in common?

Q6) The HTTPS (HTTP Secure) protocol utilizes the same TCP port as HTTP, port 80.

A)True

B)False

Page 9

To view all questions and flashcards with answers, click on the resource link above.

Chapter 8: Subnets and VLANs

Available Study Resources on Quizplus for this Chatper

50 Verified Questions

50 Flashcards

Source URL: https://quizplus.com/quiz/2573

Sample Questions

Q1) In order to identify the transmissions that belong to each VLAN, a switch will add a tag to Ethernet frames that identifies the port through which they arrive at the switch.

A)True

B)False

Q2) How many /64 subnets can be created within a /56 prefix?

A) 256

B) 512

C) 1024

D) 2048

Q3) Only Class B and Class C networks can be subnetted.

A)True

B)False

Q4) You are working on a Cisco switch and need to learn what VLANs exist on the switch. Which command will list the current VLANs recognized by the switch?

A) get vlans

B) show vlan

C) list switch-vlans

D) show vlandb

To view all questions and flashcards with answers, click on the resource link above.

Page 10

Chapter 9: Network Risk Management

Available Study Resources on Quizplus for this Chatper

50 Verified Questions

50 Flashcards

Source URL: https://quizplus.com/quiz/2574

Sample Questions

Q1) On a Linux based system, what command can you use to create a hash of a file using SHA-256?

A) sha1sum

B) md5sum

C) sha256sum

D) shasum -a 256

Q2) What statement regarding the different versions of the SHA hashing algorithm is accurate?

A) SHA-0 is the most secure version of SHA.

B) SHA-1 supports a 128-bit hash function.

C) SHA-2 only supports a 256-bit hash.

D) SHA-2 and SHA-3 both support the same hash lengths.

Q3) What type of an attack forces clients off a wireless network, creating a form of Wi-Fi DoS?

A) deauthentication attack

B) channel hopping attack

C) man-in-the-middle attack

D) ARP poisoning attack

Q4) What is vulnerability scanning, and what are the two different types of vulnerability scans?

To view all questions and flashcards with answers, click on the resource link above. Page 11

Chapter 10: Security in Network Design

Available Study Resources on Quizplus for this Chatper

50 Verified Questions

50 Flashcards

Source URL: https://quizplus.com/quiz/2575

Sample Questions

Q1) What aspect of AAA is responsible for determining what a user can and cannot do with network resources?

A) authentication

B) authorization

C) accounting

D) accessibility

Q2) By default, Active Directory is configured to use the Kerberos protocol, but can be configured to use LDAP or a combination of LDAP and Kerberos.

A)True

B)False

Q3) Which encryption standard was originally utilized with WPA's TKIP?

A) Advanced Encryption Standard (AES)

B) Rivest Cipher 4 (RC4)

C) Blowfish

D) Data Encryption Standard (DES)

Q4) What are the three components required to manage access control to a network and its resources?

Q5) Describe the TACACS+ AAA protocol, and detail how it differs from RADIUS.

Q6) How does the CCMP help ensure data confidentiality?

To view all questions and flashcards with answers, click on the resource link above. Page 12

Chapter 11: Network Performance and Recovery

Available Study Resources on Quizplus for this Chatper

50 Verified Questions

50 Flashcards

Source URL: https://quizplus.com/quiz/2576

Sample Questions

Q1) When using DiffServ, what type of forwarding utilizes a minimum departure rate from a given node, which is then assigned to each data stream?

A) assured forwarding

B) prioritized forwarding

C) scaled forwarding

D) expedited forwarding

Q2) The Link Aggregation Control Protocol (LACP) can be configured in what three different ways?

Q3) In planning for disaster recovery, what is the ultimate goal?

A) The preservation of critical data.

B) The continuation of business.

C) The management of damage.

D) The protection of infrastructure.

Q4) What is the difference between a fault and a failure in relation to networking?

Q5) You can find out where various logs are kept on some UNIX and Linux systems by viewing the /etc/syslog.conf or /etc/rsyslog.conf files.

A)True

B)False

Q6) How do the three versions of the Simple Network Management Protocol differ?

Page 13

To view all questions and flashcards with answers, click on the resource link above.

Chapter 12: Wide Area Networks

Available Study Resources on Quizplus for this Chatper

50 Verified Questions

50 Flashcards

Source URL: https://quizplus.com/quiz/2577

Sample Questions

Q1) How does a LAN connection differ from a WAN connection?

Q2) Multiplexing enables a single T1 circuit to carry how many channels?

A) 1

B) 12

C) 24

D) 64

Q3) What OC level is primarily used as a regional ISP backbone, and occasionally by very large hospitals, universities, or other major enterprises?

A) OC-3

B) OC-12

C) OC-48

D) OC-96

Q4) Which statement regarding the use of cable modems is NOT accurate?

A) Modems that utilize the DOCSIS 3.0 or 3.1 standard are backward compatible with older DOCSIS networks.

B) DOCSIS 3.1 allows for full duplex speeds up to 10 Gbps.

C) Cable modems only operate at the Physical layer of the OSI model.

D) Cable broadband provides a dedicated and continuous connection.

Q5) What is the role of a multiplexer when working with T-carrier lines?

To view all questions and flashcards with answers, click on the resource link above. Page 14

Turn static files into dynamic content formats.

CreateΒ aΒ flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.