ITM 301: IT Infrastructure Basics
34 Questions
74 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

Which model allows direct communication between devices without a central server?

  • Client-server model
  • Peer-to-peer model (correct)
  • Hybrid network model
  • Cloud computing model
  • What are the first 24 bits of a MAC address used for?

  • To encrypt network communications
  • To identify the vendor of the device (correct)
  • To determine the geographical location
  • To assign a unique user ID
  • Which layer of the OSI model is responsible for reliable data transfer?

  • Application layer
  • Network layer
  • Physical layer
  • Transport layer (correct)
  • What is a common mistake made when connecting multiple devices in a peer-to-peer setup?

    <p>Connecting more than two devices directly</p> Signup and view all the answers

    Which is NOT a typical safety best practice when working on networks and computers?

    <p>Sharing passwords with trusted colleagues</p> Signup and view all the answers

    What is the primary function of a Windows domain?

    <p>To control Active Directory for a group of computers</p> Signup and view all the answers

    Which of the following protocols is not part of the TCP/IP suite?

    <p>Hypertext Transfer Protocol</p> Signup and view all the answers

    What is a significant advantage of using a Windows domain model?

    <p>It allows user access from any network computer</p> Signup and view all the answers

    Which statement regarding Active Directory (AD) is true?

    <p>AD is primarily used to manage user account information and security.</p> Signup and view all the answers

    Which of the following applications is typically not a client-server application?

    <p>Peer-to-peer file sharing</p> Signup and view all the answers

    What is one disadvantage of using Telnet service?

    <p>It is not necessarily secure.</p> Signup and view all the answers

    What one of the following is NOT an advantage of using Active Directory Domain Services (ADDS)?

    <p>Ability for large file downloads.</p> Signup and view all the answers

    Which responsibility is NOT related to a Network Operating System (NOS)?

    <p>Directly controls hardware production.</p> Signup and view all the answers

    What requirement is essential for a Network Operating System (NOS)?

    <p>Special hardware for network management.</p> Signup and view all the answers

    In a typical Local Area Network (LAN) setup, what role does a switch play?

    <p>Redirects incoming data to the correct port.</p> Signup and view all the answers

    Which topology describes a LAN where all devices connect to a central device?

    <p>Star topology.</p> Signup and view all the answers

    What is a major benefit of having centralized control in a network environment?

    <p>Enhanced problem monitoring and diagnostics.</p> Signup and view all the answers

    Which of the following is NOT a server example mentioned?

    <p>Amazon Web Services.</p> Signup and view all the answers

    What is the primary function of BGP (Border Gateway Protocol)?

    <p>To facilitate data transmission between different autonomous systems</p> Signup and view all the answers

    Which statement accurately describes EIGRP?

    <p>It combines features of both distance-vector and link-state protocols.</p> Signup and view all the answers

    What does bandwidth refer to in data transmission?

    <p>The maximum rate at which data can theoretically be transmitted.</p> Signup and view all the answers

    Which of the following best defines throughput?

    <p>The actual amount of data that is transmitted in a defined period.</p> Signup and view all the answers

    Which of the following represents a transmission flaw?

    <p>Latency</p> Signup and view all the answers

    What is the primary limitation of coaxial cable compared to fiber-optic cable?

    <p>Coaxial cable is more prone to signal interference.</p> Signup and view all the answers

    What does attenuation refer to in the context of data transmission?

    <p>The reduction of signal strength as it travels away from the source.</p> Signup and view all the answers

    Which of the following is NOT a characteristic shared by BGP?

    <p>It provides fast data transmission rates.</p> Signup and view all the answers

    Which statement accurately describes administrative distance in routing protocols?

    <p>Lower values indicate a more reliable path.</p> Signup and view all the answers

    What is a consequence of a router being turned off and then back on in a network?

    <p>It takes time for the router to learn all network nodes.</p> Signup and view all the answers

    What issue is associated with the Distance Vector routing protocol?

    <p>It broadcasts routing tables every 30 seconds regardless of change.</p> Signup and view all the answers

    Why is RIP considered unsuitable for larger networks?

    <p>It has a limit of 15 hops.</p> Signup and view all the answers

    What is the main disadvantage of overhead in network communication?

    <p>It increases the response time during data transmission.</p> Signup and view all the answers

    What technology do wireless networks primarily utilize for signal transmission?

    <p>Radio frequency waves.</p> Signup and view all the answers

    What is a key characteristic of the wireless spectrum?

    <p>It spans a frequency range between 9 kHz and 300 GHz.</p> Signup and view all the answers

    What role does an antenna play in wireless communication?

    <p>It emits signals as electromagnetic waves into the atmosphere.</p> Signup and view all the answers

    Study Notes

    Introduction to IT Infrastructure

    • ITM 301 is a course that introduces the fundamentals of IT Infrastructure.
    • The course is taught by Dana Osborne and has a TA.
    • Assessment includes assignments, labs, a midterm, and a final exam.

    Client-Server vs. Peer-to-Peer Models

    • Peer-to-peer (P2P) networks are simple, cost-effective, and lack centralized control.
      • Suitable for small networks but not scalable.
    • Client-server models offer centralized control, scalability, and enhanced security.
      • Uses Active Directory (AD) to manage user accounts and network access.
      • Examples of client-server applications include web services, email services, FTP services, Telnet services, remote applications, and remote desktop.

    Network Operating Systems (NOS)

    • NOS manage client data, resources, user access, and communication rules.
    • Examples of NOS include Windows Server, Ubuntu Server, and Red Hat Enterprise Linux.
    • NOS require specialized hardware to manage network functions.

    Network Hardware and Topologies

    • Local Area Networks (LANs) are confined to a small space, such as an office or building.
    • Switches receive incoming data and redirect it to the intended destination.
    • Star Topology connects all devices to a central device, typically a switch.

    Routing Protocols

    • BGP (Border Gateway Protocol) is the primary Exterior Gateway Protocol (EGP) used on the internet.
    • EIGRP (Enhanced Interior Gateway Routing Protocol) is a hybrid protocol that combines features of link-state and distance-vector protocols.

    Data Transmission Concepts

    • Throughput: The actual amount of data transmitted in a given time period.
    • Bandwidth: The theoretical maximum data transfer rate.
    • Multiplexing: A technique that allows multiple signals to share a single communication channel.

    Cabling Types and Standards

    • Coaxial Cable: Consists of a central conductor surrounded by insulation and a braided metal shield.
    • Twisted-Pair Cable: Consists of two insulated wires twisted together to reduce interference.
    • Fiber-optic Cable: Transmits data as light pulses through thin strands of glass.

    Wireless Networking

    • Wireless Networks (WLANs) transmit signals through the air using radio frequency (RF) waves.
    • They use similar protocols to wired networks (Layers 3 and higher).
    • Wireless Spectrum refers to the frequency range used for wireless communication.
    • Antennas emit and receive electromagnetic waves for wireless communication.

    802.11 Standards

    • 802.11 standards define wireless network specifications, including data rates and security features.

    Wi-Fi Network Security

    • Implement security measures like encryption (WPA2/3) and strong passwords to protect Wi-Fi networks.

    Studying That Suits You

    Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

    Quiz Team

    Description

    This quiz covers the fundamentals of IT Infrastructure as introduced in the ITM 301 course. Topics include the differences between client-server and peer-to-peer models, as well as the management roles of network operating systems. Test your understanding of key concepts and examples related to IT infrastructure.

    Use Quizgecko on...
    Browser
    Browser