FBLA Netrworking Infrastructures

0.0(0)
Studied by 0 people
call kaiCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/150

encourage image

There's no tags or description

Looks like no tags are added yet.

Last updated 10:53 PM on 4/10/26
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

151 Terms

1
New cards

"Which OSI layer is primarily responsible for logical addressing and routing?"

"Physical"

2
New cards

"Which OSI layer provides end-to-end communication and flow control between hosts?"

"Session"

3
New cards

"Which OSI layer is responsible for converting bits into electrical or optical signals on the medium?"

"Application"

4
New cards

"Which of the following best describes a SOHO LAN?"

"High-density datacenter network with redundant fabrics"

5
New cards

"Which address type is used to uniquely identify a network interface at the data link layer?"

"IPv4 address"

6
New cards

"Which IPv4 class provides addresses from 192.0.0.0 to 223.255.255.255 and is commonly used for medium-sized networks?"

"Class A"

7
New cards

"Which statement about IPv6 compared to IPv4 is correct?"

"IPv6 uses 32-bit addresses; IPv4 uses 128-bit addresses."

8
New cards

"Which device forwards frames based on MAC addresses and operates at the Data Link layer?"

"Router"

9
New cards

"Which device connects different IP networks and makes forwarding decisions based on IP addresses?"

"Switch"

10
New cards

"Which of the following best describes subnetting?"

"Combining multiple networks into one large broadcast domain"

11
New cards

"Given the IPv4 address 192.168.10.0/26

how many usable host addresses are available in that subnet?"

12
New cards

"Which of the following is a valid private IPv4 address block?"

"8.8.8.0/24"

13
New cards

"Which term describes the unit of data at the Network layer?"

"Frame"

14
New cards

"Which term describes the unit of data at the Data Link layer?"

"Packet"

15
New cards

"Which transport protocol provides reliable

ordered delivery and congestion control?"

16
New cards

"Which transport protocol is connectionless and suitable for low-latency applications like DNS queries?"

"TCP"

17
New cards

"Which of the following best describes a datacenter LAN?"

"Single switch connecting a few devices in a home"

18
New cards

"Which of these is NOT a function of the Data Link layer?"

"MAC addressing"

19
New cards

"Which of the following is true about ARP (Address Resolution Protocol)?"

"ARP maps IP addresses to MAC addresses on a local network."

20
New cards

"Which of the following best describes a MAN (Metropolitan Area Network)?"

"A network covering a small office or home"

21
New cards

"Which of the following IPv4 addresses is a broadcast address for the subnet 10.0.0.0/24?"

"10.0.0.0"

22
New cards

"Which of the following is a loopback IPv4 address?"

"127.0.0.1"

23
New cards

"Which of the following best describes a client-server network?"

"All nodes have equal roles and share resources directly."

24
New cards

"Which of the following best describes a peer-to-peer network?"

"Centralized authentication and file servers only"

25
New cards

"Which of the following is the correct binary length of an IPv6 address?"

"32 bits"

26
New cards

"Which IPv6 notation compresses consecutive zero groups?"

"Dotted decimal"

27
New cards

"Which IPv4 class is reserved for experimental use?"

"Class A"

28
New cards

"Which of the following best describes how data travels across networks?"

"Data is sent as a continuous analog signal end-to-end."

29
New cards

"Which of the following is required for a device to obtain an internet connection from an ISP?"

"A public IPv6-only address only"

30
New cards

"Which of the following best describes subnet mask 255.255.255.192 in CIDR notation?"

"/24"

31
New cards

"Which topology connects every node to every other node directly and provides the highest redundancy?"

"Star"

32
New cards

"Which topology uses a central device to which all nodes connect and is easy to troubleshoot?"

"Mesh"

33
New cards

"Which topology is most vulnerable to a single point of failure if the backbone is broken?"

"Mesh"

34
New cards

"Which cloud model provides virtualized computing resources and is most like renting infrastructure?"

"SaaS"

35
New cards

"Which cloud model provides a platform for developers without managing underlying infrastructure?"

"IaaS"

36
New cards

"Which cloud model delivers complete applications over the internet with no local installation?"

"IaaS"

37
New cards

"Which factor most directly reduces wireless range?"

"Higher transmit power"

38
New cards

"Which 802.11 standard introduced 5 GHz operation and higher data rates than 802.11g?"

"802.11a"

39
New cards

"Which 802.11 standard introduced MIMO and significantly improved throughput over single-stream standards?"

"802.11a"

40
New cards

"Which 802.11 standard is commonly called Wi‑Fi 6 and introduced OFDMA and improved MU‑MIMO?"

"802.11n"

41
New cards

"Which wireless encryption standard is the most secure among the following?"

"WEP"

42
New cards

"Which of the following best describes 5G characteristics?"

"Only higher latency and lower throughput than 4G"

43
New cards

"Which cloud benefit is most associated with shifting capital expenditure to operational expenditure?"

"Increased latency"

44
New cards

"Which cloud risk is most associated with multi-tenant environments?"

"Physical cable failure only"

45
New cards

"Which topology is best when you need deterministic token passing and equal access for all nodes?"

"Star"

46
New cards

"Which wireless frequency band generally provides better range but lower throughput?"

"5 GHz"

47
New cards

"Which wireless band is less crowded and supports higher throughput but shorter range?"

"2.4 GHz"

48
New cards

"Which of the following is a benefit of a mesh wireless deployment for a large campus?"

"Single point of failure"

49
New cards

"Which architecture is most appropriate for a small business with a single site and few users?"

"Enterprise datacenter with spine-leaf fabric"

50
New cards

"Which of the following best describes a hybrid cloud architecture?"

"Only on-premises servers with no cloud usage"

51
New cards

"Which wireless standard introduced 160 MHz channels and higher throughput in 5 GHz?"

"802.11n"

52
New cards

"Which of the following affects wireless reliability the most?"

"Cable type used for the AP uplink only"

53
New cards

"Which cloud service model would you choose to deploy a custom web application without managing OS patches?"

"IaaS (virtual machines)"

54
New cards

"Which topology is often used in datacenters to provide predictable latency and high bandwidth between racks?"

"Bus"

55
New cards

"Which of the following best describes a collapsed core network design?"

"Separate core and distribution layers with many routers"

56
New cards

"Which wireless standard is optimized for short-range

very high throughput in the 60 GHz band?"

57
New cards

"Which of the following is a primary design consideration when choosing network topology for a business?"

"The color of the server rack"

58
New cards

"Which of the following best describes edge computing in network architecture?"

"Centralizing all compute in a single datacenter only"

59
New cards

"Which wireless standard family introduced WPA3 improvements for authentication and forward secrecy?"

"802.11a family"

60
New cards

"Which of the following is a common method to increase wireless capacity in high-density areas?"

"Increase transmit power on all APs to maximum"

61
New cards

"Which term describes a potential negative event that could exploit a vulnerability?"

"Asset"

62
New cards

"Which term describes a weakness in a system that can be exploited?"

"Threat"

63
New cards

"Which of the following best describes a zero-day vulnerability?"

"A vulnerability that has been patched for zero days"

64
New cards

"Which security principle ensures that data is not altered in an unauthorized way?"

"Confidentiality"

65
New cards

"Which security principle ensures that authorized users can access resources when needed?"

"Confidentiality"

66
New cards

"Which of the following is a common mitigation against phishing attacks?"

"Disabling DNS"

67
New cards

"Which of the following best describes a DDoS attack?"

"A single host sending malformed packets to crash a service"

68
New cards

"Which of the following is an example of an authentication factor?"

"MAC address only"

69
New cards

"Which authentication method provides an additional layer beyond password and is recommended for sensitive systems?"

"Single sign-on (SSO) only"

70
New cards

"Which protocol is commonly used to provide secure remote authentication and management for network devices?"

"Telnet"

71
New cards

"Which of the following best describes hashing in security?"

"Encrypting data with a reversible key"

72
New cards

"Which mechanism provides proof that a message came from a specific sender and has not been altered?"

"Plaintext transmission"

73
New cards

"Which of the following is a role of a certificate authority (CA)?"

"Assigning IP addresses to hosts"

74
New cards

"Which of the following is an effective mitigation against malware propagation in a network?"

"Disabling all logging"

75
New cards

"Which attack involves an attacker impersonating another device or user to intercept traffic?"

"Phishing"

76
New cards

"Which attack poisons the ARP cache to redirect traffic through an attacker’s machine?"

"DNS amplification"

77
New cards

"Which of the following best describes the principle of least privilege?"

"Give all users admin rights for convenience"

78
New cards

"Which of the following is a common method to detect intrusions on a network?"

"Intrusion Detection Systems (IDS) and Intrusion Prevention Systems (IPS)"

79
New cards

"Which of the following best describes MFA (multi-factor authentication)?"

"Using multiple passwords only"

80
New cards

"Which of the following is a secure method for remote authentication in enterprise networks?"

"RADIUS or TACACS+ for centralized authentication and accounting"

81
New cards

"Which of the following best describes a man-in-the-middle (MitM) attack?"

"An attacker passively listens to broadcast traffic only"

82
New cards

"Which of the following is a recommended mitigation for MitM attacks on web traffic?"

"Use HTTP only"

83
New cards

"Which of the following best describes a supply-chain attack in networking?"

"Attacking only the physical cables in a building"

84
New cards

"Which of the following is a common method to protect data confidentiality in transit?"

"Using cleartext protocols like HTTP and FTP"

85
New cards

"Which of the following best describes a vulnerability mitigation technique at the network perimeter?"

"Opening all ports to reduce complexity"

86
New cards

"Which of the following is a common indicator of compromise (IoC) for malware infection?"

"Normal CPU usage only"

87
New cards

"Which of the following best describes the role of hashing in password storage?"

"Hashing stores passwords in reversible form for easy recovery"

88
New cards

"Which of the following is a benefit of using SSO with strong authentication?"

"Users must remember more passwords for each service"

89
New cards

"Which of the following best describes a defense in depth strategy?"

"Relying on a single security control to protect everything"

90
New cards

"Which of the following is a recommended practice for patch management?"

"Never apply patches to production systems"

91
New cards

"Which protocol is used to dynamically assign IP addresses to hosts on a network?"

"DNS"

92
New cards

"Which port is the default for SSH and SFTP?"

"21"

93
New cards

"Which protocol resolves domain names to IP addresses?"

"DHCP"

94
New cards

"Which protocol is used to transfer files securely over an encrypted channel?"

"FTP"

95
New cards

"Which protocol is used to send email between mail servers?"

"SMTP"

96
New cards

"Which transport protocol uses sequence numbers and acknowledgements to ensure reliable delivery?"

"UDP"

97
New cards

"Which transport protocol is best suited for streaming audio/video where occasional packet loss is acceptable?"

"TCP"

98
New cards

"Which of the following is a dynamic routing protocol that is path-vector and used for inter-domain routing on the internet?"

"OSPF"

99
New cards

"Which routing protocol is link-state and commonly used inside large enterprise networks?"

"RIP"

100
New cards

"Which routing protocol is Cisco-proprietary and uses a hybrid approach?"

"OSPF"