Information Technology Essentials Test Preparation - 600 Verified Questions

Page 1


Information Technology Essentials

Test Preparation

Course Introduction

Information Technology Essentials provides a comprehensive introduction to the fundamental concepts and tools that underpin modern computing. The course covers key topics such as computer hardware, software, operating systems, networks, data management, cybersecurity, and the impact of IT on society. Students will explore the principles of information systems and gain practical experience in using productivity tools, cloud services, and basic troubleshooting techniques. Emphasis is placed on understanding how IT is applied in various business and personal environments, preparing students with the foundational knowledge necessary for further studies or careers in the technology field.

Recommended Textbook

Network+ Guide to Networks 8th Edition Jill West

Available Study Resources on Quizplus

12 Chapters

600 Verified Questions

600 Flashcards

Source URL: https://quizplus.com/study-set/183

Page 2

Chapter 1: Introduction to Networking

Available Study Resources on Quizplus for this Chatper

50 Verified Questions

50 Flashcards

Source URL: https://quizplus.com/quiz/2566

Sample Questions

Q1) At what layer of the OSI model do the IP, ICMP, and ARP protocols operate?

A) Application

B) Session

C) Transport

D) Network

Answer: D

Q2) The frame header at the Data Link layer includes hardware addresses of the source and destination NICs. What is another name for this address?

A) MAC (Media Access Control) address

B) DAC (Data Access Control) address

C) DAC (Digital Access Control) address

D) PAC (Packet Access Control) address

Answer: A

Q3) At what layer of the OSI model does a network switch normally operate?

A) Layer 2

B) Layer 3

C) Layer 4

D) Layer 5

Answer: A

To view all questions and flashcards with answers, click on the resource link above.

Page 3

Chapter 2: Network Infrastructure and Documentation

Available Study Resources on Quizplus for this Chatper

50 Verified Questions

50 Flashcards

Source URL: https://quizplus.com/quiz/2567

Sample Questions

Q1) What are some of the different types of software changes?

Answer: Some of the software changes that you might be called upon to implement include:

* patch-A software patch is a correction, improvement, or enhancement to software. It corrects a bug, closes a vulnerability, or adds minor enhancements to only part of the software, leaving most of the code untouched.

* upgrade-A software upgrade is a major change to a software package that enhances the functionality and features of the software, while also correcting bugs and vulnerabilities.

* rollback-A software rollback is the process of reverting to a previous version of software after attempting to patch or upgrade it.

* installation-New software, such as CRM (customer relationship management) software for sales reps or a financial software package for accountants, must be installed on the relevant devices and incorporated with network resources.

Q2) A 66 block is more suitable for data connections than the older 110 block.

A)True

B)False

Answer: False

To view all questions and flashcards with answers, click on the resource link above.

Page 4

Chapter 3: Addressing on Networks

Available Study Resources on Quizplus for this Chatper

50 Verified Questions

50 Flashcards

Source URL: https://quizplus.com/quiz/2568

Sample Questions

Q1) Why are the Class D and Class E IPv4 address ranges not available for general use?

Answer: Class D addresses begin with octets 224 through 239 and are used for multicast transmissions, in which one host sends messages to multiple hosts. An example of this is when a host transmits a videoconference over the Internet to multiple participants. Class E addresses, which begin with 240 through 254, are reserved for research.

Q2) DNS follows a centralized database model, allowing for easier management of DNS records.

A)True

B)False

Answer: False

Q3) What text editor can be used on Linux to view and edit the contents of a configuration file?

A) Notepad

B) Microsoft Word

C) vim

D) edit

Answer: C

To view all questions and flashcards with answers, click on the resource link above. Page 5

Chapter 4: Network Protocols and Routing

Available Study Resources on Quizplus for this Chatper

50 Verified Questions

50 Flashcards

Source URL: https://quizplus.com/quiz/2569

Sample Questions

Q1) The IP connectionless protocol relies on what other protocol to guarantee delivery of data?

A) UDP

B) ICMP

C) TCP

D) ARP

Q2) In IPv6, what field is used to indicate what sequence of packets from one source to one or multiple destinations a packet belongs to?

A) traffic class

B) group ID

C) flow label

D) traffic exchange

Q3) Which statement regarding the Border Gateway Protocol (BGP) is accurate?

A) BGP is limited to a single autonomous system.

B) BGP is exclusively a distance-vector protocol.

C) BGP utilizes TCP for communicating updates.

D) BGP is a more advanced version of OSPF.

Q4) IPv4 and IPv6 use the same packet format.

A)True

B)False

Page 6

To view all questions and flashcards with answers, click on the resource link above.

Chapter 5: Network Cabling

Available Study Resources on Quizplus for this Chatper

50 Verified Questions

50 Flashcards

Source URL: https://quizplus.com/quiz/2570

Sample Questions

Q1) Multimode fiber contains a core that is larger than a single mode fiber core.

A)True

B)False

Q2) What is the biggest limiting factor on fiber-optic cable length?

Q3) When tracing a wire, how do you utilize a toner and probe kit?

Q4) Bidirectional transceivers utilize what technology to separate the data in each direction?

A) wavelength division multiplexing

B) time division multiplexing

C) frequency division multiplexing

D) statistical time division multiplexing

Q5) PoE+ devices are defined by what IEEE standard?

A) 802.3at

B) 802.3af

C) 802.3fc

D) 802.3c

Q6) Latency on data networks is based on a calculation of a packet's round trip time (RTT).

A)True

B)False

To view all questions and flashcards with answers, click on the resource link above. Page 7

Chapter 6: Wireless Networking

Available Study Resources on Quizplus for this Chatper

50 Verified Questions

50 Flashcards

Source URL: https://quizplus.com/quiz/2571

Sample Questions

Q1) At what layer of the OSI model do the 802.11 standards vary?

A) Physical layer

B) Network layer

C) Data link layer

D) Transport layer

Q2) What is the purpose of the Layer 2 LLC sublayer?

A) It is used to handle multiplexing, flow and error control, and reliability.

B) It is used to manage MAC addresses in message frames.

C) It performs management of the physical layer's modulation techniques.

D) It is used to manage low-level encryption on a network.

Q3) Radiation patterns can be used to classify antennas into what two basic categories?

Q4) 802.11ac Wave 2 devices can theoretically support how much maximum throughput?

A) 600 Mbps

B) 1.3 Gbps

C) 3.47 Gbps

D) 6.93 Gbps

Q5) How does configuration of wireless clients for wireless access in an enterprise environment differ from normal setup?

Q6) What are some of the different types of wireless topologies that can be created?

Page 8

To view all questions and flashcards with answers, click on the resource link above.

Chapter 7: Virtualization and Cloud Computing

Available Study Resources on Quizplus for this Chatper

50 Verified Questions

50 Flashcards

Source URL: https://quizplus.com/quiz/2572

Sample Questions

Q1) Amazon and Rackspace both utilize what virtualization software below to create their cloud environments?

A) VMware vSphere

B) Oracle VirtualBox

C) Parallels

D) Citrix Xen

Q2) In a software defined network, what is responsible for controlling the flow of data?

A) flow director

B) vRouter

C) SDN controller

D) SDN switch

Q3) What open-source VPN protocol utilizes OpenSSL for encryption and has the ability to possibly cross firewalls where IPsec might be blocked?

A) Layer 2 Tunneling Protocol (L2TP)

B) Point-to-Point Tunneling Protocol (PPTP)

C) Generic Routing Encapsulation (GRE)

D) OpenVPN

Q4) What is the difference between a virtual firewall and a software firewall?

To view all questions and flashcards with answers, click on the resource link above. Page 9

Chapter 8: Subnets and VLANs

Available Study Resources on Quizplus for this Chatper

50 Verified Questions

50 Flashcards

Source URL: https://quizplus.com/quiz/2573

Sample Questions

Q1) What command will set the native VLAN on a Juniper switch port?

A) switchport trunk native vlan

B) switchport set native vlan

C) config native vlan

D) set native-vlan-id

Q2) Subtracting an interesting octet value from 256 yields what number?

A) network ID

B) subnet ID

C) magic number

D) host ID

Q3) How large is the 802.1Q tag that is added to an Ethernet frame when using VLANs?

A) 4 bytes

B) 8 bytes

C) 12 bytes

D) 20 bytes

Q4) How does a DHCP relay agent allow a centrally managed DHCP server to handle assignments for multiple subnets?

Q5) Where does the term trunk originate from, and how does it apply to modern networking?

10

Q6) What are some of the different reasons to use VLANs?

To view all questions and flashcards with answers, click on the resource link above.

Chapter 9: Network Risk Management

Available Study Resources on Quizplus for this Chatper

50 Verified Questions

50 Flashcards

Source URL: https://quizplus.com/quiz/2574

Sample Questions

Q1) What statement regarding denial-of-service (DoS) attacks is accurate?

A) A denial-of-service attack occurs when a MAC address is impersonated on the network.

B) A denial-of-service attack prevents legitimate users from accessing normal network resources.

C) A denial-of-service attack is generally a result of a disgruntled employee.

D) A denial-of-service attack is no longer a major concern due to the increased throughput available on most networks.

Q2) An RFID label on a box is an example of what type of physical security detection method?

A) motion detection technology

B) video surveillance via CCTV

C) tamper detection

D) asset tracking tagging

Q3) Over a long-distance connection, using SSH keys is more secure than using passwords.

A)True

B)False

Q4) What are some of the characteristics of malware that make it difficult to detect?

To view all questions and flashcards with answers, click on the resource link above. Page 11

Chapter 10: Security in Network Design

Available Study Resources on Quizplus for this Chatper

50 Verified Questions

50 Flashcards

Source URL: https://quizplus.com/quiz/2575

Sample Questions

Q1) In ACL statements, using the "any" keyword is equivalent to using a wildcard mask of what value?

A) 0.0.0.0

B) 255.255.255.255

C) 255.255.0.0

D) 0.0.255.255

Q2) In order to prevent ports that are serving network hosts from being considered as best paths, what should be enabled to block BPDUs?

A) BPDU filter

B) BPDU guard

C) root guard

D) BPDU drop

Q3) What is multifactor authentication, and what are some examples?

Q4) How does the CCMP help ensure data confidentiality?

Q5) By default, Active Directory is configured to use the Kerberos protocol, but can be configured to use LDAP or a combination of LDAP and Kerberos.

A)True

B)False

Q6) What is the purpose of Unified Threat Management (UTM)?

Page 12

To view all questions and flashcards with answers, click on the resource link above.

Chapter 11: Network Performance and Recovery

Available Study Resources on Quizplus for this Chatper

50 Verified Questions

50 Flashcards

Source URL: https://quizplus.com/quiz/2576

Sample Questions

Q1) What Storage Area Network (SAN) protocol runs on top of TCP, and can be used on an existing twisted-pair Ethernet network, while maintaining low cost?

A) Fibre Channel (FC)

B) Fibre Channel over Ethernet (FCoE)

C) Internet SCSI (iSCSI)

D) InfiniBand (IB)

Q2) If you wish to maintain a "4 nines" availability rating, what is the maximum amount of down time you can have per day?

A) .4 seconds

B) 8 seconds

C) 1 minute, 26 seconds

D) 14 minutes, 23 seconds

Q3) What are some of the more common network performance metrics that are utilized?

Q4) What happens when an NMS uses the SNMP walk command?

A) The NMS sends a request for data to the agent on a managed device.

B) The NMS uses get requests to move through sequential rows in the MIB database.

C) The NMS requests a list of all active SNMP traps on the system.

D) The NMS walks through a list of given SNMP hosts.

To view all questions and flashcards with answers, click on the resource link above.

Page 13

Chapter 12: Wide Area Networks

Available Study Resources on Quizplus for this Chatper

50 Verified Questions

50 Flashcards

Source URL: https://quizplus.com/quiz/2577

Sample Questions

Q1) What is the MPLS standard, and why is it often used by ISPs to move traffic from one customer site to another?

Q2) List and describe the four different generations of cellular technology.

Q3) What is the difference between a DTE and a DCE?

Q4) In metro settings, end-to-end, carrier-grade Ethernet networks can be established via what protocol?

A) Metro Carrier Transport

B) Carrier Ethernet Transport

C) Intra-city Ethernet

D) Ethernet SONET

Q5) CDMA (Code Division Multiple Access) is an open standard that is accepted and used worldwide.

A)True

B)False

Q6) In a cellular network, where does each wireless base station connect to?

A) They connect directly to the central office.

B) They connect to a mobile switching center.

C) They connect to other wireless base stations, then to the central office.

D) They connect to a wireless station repeater.

Q7) What is the role of a multiplexer when working with T-carrier lines?

To view all questions and flashcards with answers, click on the resource link above. Page 14

Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.
Information Technology Essentials Test Preparation - 600 Verified Questions by Quizplus - Issuu