Information Technology Essentials Textbook Exam Questions - 748 Verified Questions

Page 1


Information Technology Essentials

Textbook Exam Questions

Course Introduction

Information Technology Essentials provides a comprehensive introduction to the fundamental concepts and skills required in the field of information technology. The course covers essential topics such as computer hardware and software, operating systems, networking basics, cybersecurity principles, data management, and emerging trends in IT. Through hands-on activities and real-world scenarios, students gain practical experience with troubleshooting, installing software, managing files, and maintaining security. Designed for beginners, this course establishes a strong foundation for further study or careers in IT, emphasizing problem-solving, digital literacy, and ethical considerations in technology use.

Recommended Textbook Network+ Guide to Networks 5th Edition by Tamara Dean

Available Study Resources on Quizplus

15 Chapters

748 Verified Questions

748 Flashcards

Source URL: https://quizplus.com/study-set/430 Page 2

Chapter 1: An Introduction to Networking

Available Study Resources on Quizplus for this Chatper

50 Verified Questions

50 Flashcards

Source URL: https://quizplus.com/quiz/7588

Sample Questions

Q1) A ____ network is confined to a relatively small space.

A) NAN

B) MAN

C) WAN

D) LAN

Answer: D

Q2) A personal computer which may or may not be connected to a network.

Answer: E

Q3) To prepare to enter the networking field,a student should master a number of general networking technologies.

A)True

B)False

Answer: True

Q4) Security auditing is handled by ____.

A) management services

B) communication services

C) access services

D) Internet services

Answer: A

To view all questions and flashcards with answers, click on the resource link above. Page 3

Chapter 2: Network Standards and the OSI Model

Available Study Resources on Quizplus for this Chatper

50 Verified Questions

50 Flashcards

Source URL: https://quizplus.com/quiz/7589

Sample Questions

Q1) ____ is the process of reconstructing segmented data.

A) Reassembly

B) Reengineering

C) Resegmenting

D) Realigning

Answer: A

Q2) Standards assist in network design.

A)True

B)False

Answer: True

Q3) An international society composed of engineering professionals with goals of promoting development and education in the electrical engineering and computer science fields.

Answer: C

Q4) Standards define the ____ performance of a product or service.

A) ideal

B) most acceptable

C) minimum acceptable

D) maximum acceptable

Answer: C

To view all questions and flashcards with answers, click on the resource link above. Page 4

Chapter 3: Transmission Basics and Networking Media

Available Study Resources on Quizplus for this Chatper

50 Verified Questions

50 Flashcards

Source URL: https://quizplus.com/quiz/7590

Sample Questions

Q1) The data transmission characteristic most frequently discussed and analyzed by networking professionals is ____.

A) noise

B) scalability

C) throughput

D) cost

Answer: C

Q2) Modern LANs use ____ or higher wiring.

A) Cat 3

B) Cat 5

C) RG-6

D) RG-59

Answer: B

Q3) Describe two benefits of digital signaling that make it worthwhile even though extra signaling pulses are involved.

Answer: Because digital transmission involves sending and receiving only a pattern of 1s and 0s,represented by precise pulses,it is more reliable than analog transmission,which relies on variable waves.In addition,noise affects digital transmission less severely.

To view all questions and flashcards with answers, click on the resource link above. Page 5

Chapter 4: Introduction to TCP/IP Protocols

Available Study Resources on Quizplus for this Chatper

50 Verified Questions

50 Flashcards

Source URL: https://quizplus.com/quiz/7591

Sample Questions

Q1) Ports ranging from 1024 to 49151; accessible to network users and processes that do not have special administrative privileges.

Q2) Any hosts on the Internet that need to look up domain name information.

Q3) In IPv6,each address contains a(n)____,or a variable-length field at the beginning of the address that indicates what type of address it is.

A) Variable Prefix

B) Address Prefix

C) Format Prefix

D) Field Prefix

Q4) ____________________ is a process of subdividing a single class of networks into multiple,smaller logical networks,or segments.

Q5) In IPv4 addressing,a node with an IP address of 168.34.88.29 belongs to a Class ____ network.

A) A

B) B C) C

D) D

Q6) Define and describe Zeroconf (Zero Configuration).

To view all questions and flashcards with answers, click on the resource link above. Page 6

Chapter 5: Topologies and Ethernet Standards

Available Study Resources on Quizplus for this Chatper

48 Verified Questions

48 Flashcards

Source URL: https://quizplus.com/quiz/7592

Sample Questions

Q1) The data portion of an Ethernet frame may contain ____ bytes of information.

A) 46

B) 46 to 1500

C) 1500

D) more than 1500

Q2) A serial backbone is the simplest kind of backbone.

A)True

B)False

Q3) The smallest LANs do not have a backbone.

A)True

B)False

Q4) The most common 1-Gigabit Ethernet standard in use today is ____.

A) 1000Base-T

B) 1000Base-SX

C) 10GBase-SR

D) 1000Base-LX

Q5) Explain the 5-4-3 rule of networking.

Q6) IEEE standard for fiber-optic Ethernet networks transmitting data at 10 Gbps.

Q7) A network backbone is the ____________________ that connects the hubs,switches,and routers on a network.

To view all questions and flashcards with answers, click on the resource link above. Page 7

Chapter 6: Network Hardware

Available Study Resources on Quizplus for this Chatper

50 Verified Questions

50 Flashcards

Source URL: https://quizplus.com/quiz/7593

Sample Questions

Q1) By far,the most popular expansion board NIC is one that uses a(n)____ bus.

A) onboard

B) PCI

C) ExpressCard

D) ISA

Q2) A computer's ____________________ is the circuit,or signaling pathway,used by the motherboard to transmit data to the computer's components,including its memory,processor,hard disk,and NIC.

Q3) External peripheral device specifying 32-bit interface running at 33 MHz.

Q4) Explain hybrid routing protocols.Describe an example.

Q5) A switch running in this mode reads a frame's header and decides where to forward the data before it receives the entire packet.

Q6) ____ routing is a technique in which a network administrator programs a router to use specific paths between nodes.

A) Static

B) Dynamic

C) Best path

D) Link-state

Q7) Uses the IEEE 1394 standard.

To view all questions and flashcards with answers, click on the resource link above. Page 8

Chapter 7: WANs and Remote Connectivity

Available Study Resources on Quizplus for this Chatper

50 Verified Questions

50 Flashcards

Source URL: https://quizplus.com/quiz/7594

Sample Questions

Q1) Occurs when downstream throughput is higher than upstream throughput.

Q2) Define and describea PSTN.

Q3) Describe two important considerations when designing a VPN.

Q4) ____________________ encapsulates incoming Ethernet or token ring frames,then converts them into ATM cells for transmission over an ATM network.

Q5) Provides equal capacity for data traveling both upstream and downstream.

Q6) The portion of the PSTN that connects any residence or business to the nearest CO is known as the ____.

A) demarcation point

B) NIU (Network Interface Unit)

C) local loop

D) central office

Q7) Describe the fundamental properties WANs and LANs have in common.

Q8) In a process called ____,two 64-Kbps ISDN B channels can be combined to achieve an effective throughput of 128 Kbps.

A) slicing

B) linking

C) merging

D) bonding

Page 9

To view all questions and flashcards with answers, click on the resource link above.

Chapter 8: Wireless Networking

Available Study Resources on Quizplus for this Chatper

50 Verified Questions

50 Flashcards

Source URL: https://quizplus.com/quiz/7595

Sample Questions

Q1) Wireless networks are laid out using the same topologies as wired networks.

A)True

B)False

Q2) ____________________ means that satellites orbit the Earth at the same rate as the Earth turns.

Q3) Satellite Internet access providers typically use frequencies in the C- or ____ bands.

A) L-

B) S-

C) Ku-

D) Ka-

Q4) Describe the FHSS and DSSS spread spectrum technologies.

Q5) In wireless communication,to exchange information,two antennas must be tuned to the same ____.

A) frequency

B) variance

C) attenuation speed

D) port

Q6) Uses channels in the 5-GHz band and provides a maximum theoretical throughput of 54 Mbps.

Page 10

To view all questions and flashcards with answers, click on the resource link above.

Chapter 9: Network Operating Systems

Available Study Resources on Quizplus for this Chatper

50 Verified Questions

50 Flashcards

Source URL: https://quizplus.com/quiz/7596

Sample Questions

Q1) Describe symmetric multiprocessing and asymmetric multiprocessing.

Q2) Involves associating a letter,such as M or T,with a disk,directory,or other resource.

Q3) The core of all UNIX and Linux systems is called the kernel.

A)True

B)False

Q4) Describe the UNIX memory model in terms of addressing scheme and virtual memory.

Q5) Describe three advantages of choosing a proprietary UNIX system.

Q6) A service on the client workstation,called the ____________________,intercepts a request to determine whether it should be handled by the client or by the server.

Q7) Identify eight features of NTFS.

Q8) A file system developed by Microsoft and used with its Windows NT,Windows 2000 Server,Windows Server 2003,and Windows 2008 operating systems.

Q9) The support and use of multiple processors to handle multiple threads is known as ____.

A) multiprocessing

B) multitasking

C) multithreading

D) multisharing

Page 11

To view all questions and flashcards with answers, click on the resource link above. Page 12

Chapter 10: In-Depth TCP/IP Networking

Available Study Resources on Quizplus for this Chatper

50 Verified Questions

50 Flashcards

Source URL: https://quizplus.com/quiz/7597

Sample Questions

Q1) The TCP/IP administration utility for use with Windows NT,2000,XP,Vista,Server 2003,and Server 2008 operating systems.

Q2) The gateways that make up the Internet backbone are called ____ gateways.

A) proxy

B) core

C) Internet

D) default

Q3) Allows an administrator to query a DNS database and find the host name associated with a specific IP address or vice versa.

Q4) The standard message format specified by SMTP allows for lines that contain no more than ____ ASCII characters.

A) 100

B) 1000

C) 10,000

D) 1,000,000

Q5) IMAP4 servers require less storage space and usually more processing resources than POP servers do.

A)True

B)False

To view all questions and flashcards with answers, click on the resource link above. Page 13

Chapter 11: Voice and Video Over IP

Available Study Resources on Quizplus for this Chatper

50 Verified Questions

50 Flashcards

Source URL: https://quizplus.com/quiz/7598

Sample Questions

Q1) Many network engineers consider ____ to be superior to MGCP.

A) SIP

B) RTCP

C) MEGACO

D) MGC

Q2) When more than two people participate in a videoconference,for example,in a point-to-multipoint or multipoint-to-multipoint scenario,a video ____ is required.

A) bridge

B) switch

C) gateway

D) router

Q3) IP telephones are directly connected to the local loop.

A)True

B)False

Q4) The H.323 protocol that handles call or videoconference signaling.

Q5) A collection of H.323 terminals,gateways,and MCUs that are managed by a single H.323 gatekeeper.

Q6) Attempts to reserve a specific amount of network resources for a transmission before the transmission occurs.

To view all questions and flashcards with answers, click on the resource link above. Page 14

Chapter 12: Network Security

Available Study Resources on Quizplus for this Chatper

50 Verified Questions

50 Flashcards

Source URL: https://quizplus.com/quiz/7599

Sample Questions

Q1) A ____ attack occurs when a system becomes unable to function because it has been deluged with data transmissions or otherwise disrupted.

A) flashing

B) denial-of-service

C) war driving

D) phishing

Q2) A ____ attack occurs when an Internet chat user sends commands to a victim's machine that cause the screen to fill with garbage characters and requires the victim to terminate their chat sessions.

A) flashing

B) denial-of-service

C) war driving

D) phishing

Q3) Describe the SCP (Secure CoPy)utility.

Q4) Data is encrypted using two keys.

Q5) Encryption is the last means of defense against data theft.

A)True

B)False

Q6) A firewall that protects only the computer on which it is installed.

Page 15

To view all questions and flashcards with answers, click on the resource link above.

Chapter 13: Troubleshooting Network Problems

Available Study Resources on Quizplus for this Chatper

50 Verified Questions

50 Flashcards

Source URL: https://quizplus.com/quiz/7600

Sample Questions

Q1) ____ is a fundamental property of wire that depends on a wire's molecular structure and size.

A) Voltage

B) Current

C) Resistance

D) Impedance

Q2) Describe what a voltage event recorder is and explain how it works.

Q3) List eight questions to ask to help identify network problem symptoms that are not immediately obvious.

Q4) A ____ can generate traffic in an attempt to reproduce a network problem and monitor multiple network segments simultaneously.

A) multimeter

B) cable performance tester

C) network monitor

D) protocol analyzer

Q5) Describe how a performance tester compares to a continuity tester.

Q6) Collects data about power quality.

Q7) An instrument used to measure impedance,resistance,and voltage on a wire.

Q8) Also know as a linemans handset.

To view all questions and flashcards with answers, click on the resource link above. Page 16

Chapter 14: Ensuring Integrity and Availability

Available Study Resources on Quizplus for this Chatper

50 Verified Questions

50 Flashcards

Source URL: https://quizplus.com/quiz/7601

Sample Questions

Q1) A program that disguises itself as something useful but actually harms your system is called a ____.

A) virus

B) worm

C) bot

D) Trojan horse

Q2) ____ detects malware by comparing current characteristics of files and disks against an archived version of these characteristics to discover any changes.

A) Integrity checking

B) Polymorphic

C) Signature

D) Heuristic

Q3) A place where the computers,devices,and connectivity necessary to rebuild a network exist,and all are appropriately configured,updated,and connected to match your network's current state.

Q4) A place where the computers,devices,and connectivity necessary to rebuild a network exist,with some appropriately configured,updated,or connected.

Q5) Define and describe a virus.

To view all questions and flashcards with answers, click on the resource link above. Page 17

Chapter 15: Network Management

Available Study Resources on Quizplus for this Chatper

50 Verified Questions

50 Flashcards

Source URL: https://quizplus.com/quiz/7602

Sample Questions

Q1) Explain how a network management application can present an administrator with results after data is collected.

Q2) ____ management refers to the detection and signaling of device,link,or component faults.

A) Performance

B) Fault

C) Network

D) Configuration

Q3) Describes a flaw in a software application that causes some part of the application to malfunction.

Q4) ____ management is the collection,storage,and assessment of information related to the versions of software installed on every network device and every device's hardware configuration.

A) Change

B) Performance

C) Asset

D) Configuration

Q5) One of the most common free network management tools.

Q6) Describe how to perform a patch installation.

To view all questions and flashcards with answers, click on the resource link above. Page 18

Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.