Unlock hundreds more features
Save your Quiz to the Dashboard
View and Export Results
Use AI to Create Quizzes and Analyse Results

Sign inSign in with Facebook
Sign inSign in with Google

Take the IT Infrastructure Fundamentals Quiz

Master Essential IT Infrastructure Concepts Today

Difficulty: Moderate
Questions: 20
Learning OutcomesStudy Material
Colorful paper art depicting elements related to IT Infrastructure Fundamentals Quiz

Unlock your IT infrastructure expertise with this engaging IT infrastructure quiz, tailored for students and professionals seeking mastery of infrastructure fundamentals. Test your understanding of network, server, and storage concepts in just 15 questions, and get instant feedback to identify areas for improvement. Explore a more in-depth IT Infrastructure Knowledge Assessment Quiz or try the Network Infrastructure Knowledge Test for targeted practice. All our quizzes are fully editable - customise questions, add images, or adjust difficulty to suit your learning journey. Dive in now and elevate your infrastructure understanding with confidence!

Which network device operates at the data link layer to connect multiple devices within a LAN?
Router
Switch
Firewall
Hub
A switch works at layer 2, forwarding frames based on MAC addresses and segregating collision domains. Routers operate at layer 3 and direct traffic between networks. Hubs and firewalls serve different functions and do not perform layer 2 switching.
Which device is responsible for forwarding packets between different IP networks?
Switch
Router
Firewall
Hub
Routers operate at the network layer, using IP addresses to determine the best path between networks. Switches handle frame forwarding within a single network segment. Firewalls filter traffic and hubs simply repeat signals without intelligent routing.
What is the primary purpose of DNS in IT infrastructure?
Routing IP traffic
Managing email delivery
Resolving domain names to IP addresses
Encrypting network data
DNS translates human-friendly domain names into IP addresses to enable network communication. Without DNS, users and applications would have to use numerical IP addresses directly. Other options describe different services or functions.
Which RAID level provides data mirroring for redundancy?
RAID 1
RAID 0
RAID 6
RAID 5
RAID 1 duplicates all data on two or more disks, creating a mirror that protects against single disk failures. RAID 0 offers striping without redundancy, while RAID 5 and RAID 6 use parity for fault tolerance.
Which practice helps secure user accounts on servers?
Disabling login audits
Using default passwords
Sharing credentials
Enforcing strong passwords
Enforcing strong passwords reduces the risk of unauthorized access by requiring complexity and length. Sharing or using default credentials undermines security, and disabling audits hinders monitoring of login activity.
At which OSI layer does routing occur between different networks?
Network (Layer 3)
Transport (Layer 4)
Data Link (Layer 2)
Physical (Layer 1)
The network layer (Layer 3) handles logical addressing and path determination for routing packets between networks. The data link layer deals with MAC addresses, while transport handles end-to-end communication like TCP/UDP.
Which network diagnostic tool shows the path packets take to reach a destination and identifies each hop?
netstat
nslookup
ping
traceroute
Traceroute reveals each hop and timing information to help locate latency or failure points along the network path. Ping only tests reachability, nslookup queries DNS, and netstat displays open connections and ports.
Which type of storage area network (SAN) provides block-level access to storage resources over a TCP/IP network?
NAS
Fibre Channel
DAS
iSCSI
iSCSI encapsulates SCSI commands within TCP/IP packets to offer block-level storage access over IP networks. Fibre Channel uses its own fabric, NAS provides file-level access, and DAS connects directly without network transport.
Which RAID level stripes data across multiple disks without parity or redundancy to maximize performance?
RAID 1
RAID 5
RAID 0
RAID 6
RAID 0 distributes data across multiple disks to improve read/write throughput but offers no fault tolerance. RAID 1 mirrors data for redundancy, while RAID 5 and RAID 6 use parity data to protect against disk failures.
Which service is responsible for automatically assigning IP addresses to devices on a network?
DHCP
DNS
FTP
HTTP
The Dynamic Host Configuration Protocol (DHCP) automatically allocates IP addresses and other network settings to clients. DNS resolves hostnames, and HTTP/FTP are application layer protocols for web and file transfers.
Which backup method copies only the data that has changed since the last full backup?
Incremental backup
Full backup
Mirror backup
Differential backup
Incremental backups store only the data changed since the previous backup, saving time and storage space. Differential backups copy changes since the last full backup, while full and mirror backups duplicate all data.
Which security principle ensures users and processes have only the permissions necessary to perform their tasks?
Defense in depth
Open access
Least privilege
Separation of duties
The principle of least privilege restricts accounts to access only the resources required for their roles, minimizing risk. Separation of duties divides responsibilities, defense in depth layers security, and open access is insecure.
In DNS records, which record type maps a hostname directly to an IPv4 address?
CNAME
A
TXT
MX
An A record links a domain name to an IPv4 address in DNS zone files. MX records specify mail servers, CNAME creates aliases, and TXT stores arbitrary text for verification or policy.
At which OSI layer does a network switch primarily operate?
Application (Layer 7)
Physical (Layer 1)
Network (Layer 3)
Data Link (Layer 2)
Switches forward data frames based on MAC addresses at the data link layer (Layer 2). Routers handle layer 3 routing, hubs function at layer 1, and applications operate at layer 7.
What device or component balances incoming network traffic across multiple servers to optimize resource utilization?
Switch
Modem
Load balancer
Firewall
Load balancers distribute client requests across multiple servers to improve performance and ensure high availability. Firewalls filter traffic, switches connect devices locally, and modems convert between digital and analog signals.
Given the network 192.168.10.64/26, which is the highest usable host IP address?
192.168.10.126
192.168.10.191
192.168.10.65
192.168.10.127
A /26 subnet has 64 addresses from .64 to .127; .127 is the broadcast address, making .126 the highest usable host. Addresses .65 through .126 serve hosts. .191 falls outside this subnet range.
Which RAID level uses dual parity to allow up to two simultaneous disk failures without data loss?
RAID 0
RAID 5
RAID 6
RAID 1
RAID 6 stores two separate parity blocks across the disks, enabling the array to tolerate two disk failures. RAID 5 supports only one failure, RAID 1 mirrors data, and RAID 0 has no redundancy.
What type of server cluster configuration allows all nodes to actively handle workloads simultaneously, providing high availability and load distribution?
Failover only
Active-passive
N+1
Active-active
In an active-active cluster, every node actively serves traffic and shares the load, improving performance and resilience. Active-passive clusters keep standby nodes idle until a failure occurs. N+1 refers to spare capacity planning.
What is the primary functional difference between an Intrusion Detection System (IDS) and an Intrusion Prevention System (IPS)?
IDS encrypts data while IPS scans for viruses
IDS and IPS have identical functions
IDS only logs and alerts while IPS can block malicious traffic
IDS blocks traffic while IPS only logs
An IDS monitors network or system activity and alerts administrators of suspicious events but does not intervene. An IPS goes further by actively blocking or rejecting malicious traffic based on defined rules.
Which protocol uses TCP port 3260 for transmitting SCSI commands over IP networks in storage area networks?
NFS
SMB
Fibre Channel
iSCSI
iSCSI encapsulates SCSI commands in TCP/IP packets, commonly using port 3260 for SAN connections. Fibre Channel uses separate hardware, while NFS and SMB are file-level network protocols, not block-level.
0
{"name":"Which network device operates at the data link layer to connect multiple devices within a LAN?", "url":"https://www.quiz-maker.com/QPREVIEW","txt":"Which network device operates at the data link layer to connect multiple devices within a LAN?, Which device is responsible for forwarding packets between different IP networks?, What is the primary purpose of DNS in IT infrastructure?","img":"https://www.quiz-maker.com/3012/images/ogquiz.png"}

Learning Outcomes

  1. Identify key components of IT infrastructure and their functions.
  2. Analyse network architecture to troubleshoot connectivity issues.
  3. Evaluate storage solutions for performance and scalability requirements.
  4. Apply best practices for server configuration and management.
  5. Demonstrate understanding of security measures for protecting infrastructure.

Cheat Sheet

  1. Understand the Core Components of IT Infrastructure - Dive into the building blocks of any IT environment: hardware like servers and computers, software including operating systems and applications, networking gear such as routers and switches, and the data centers that house it all. Grasping how each piece interacts sets you up for success in designing and managing robust systems. IBM Think: Infrastructure Essentials
  2. Master Network Architecture and Troubleshooting - Unlock the magic of data flow by learning how devices connect and communicate over local and wide-area networks. You'll get hands-on with routers, switches, and firewalls to diagnose and resolve common hiccups that can bring operations to a halt. Atlassian: IT Infrastructure Guide
  3. Evaluate Storage Solutions for Performance and Scalability - From spinning hard drives to speedy SSDs and versatile cloud repositories, storage options shape how quickly you can read or write data. Compare throughput, latency, and capacity planning so your solutions grow alongside your organization's needs. Techlocity: Storage Deep Dive
  4. Apply Best Practices for Server Configuration and Management - Servers are the workhorses of your infrastructure - treat them well with optimized roles, secure settings, and scheduled maintenance. Learn routine health checks, patching strategies, and resource monitoring to keep your digital engines humming. SAI Infosolution: Server Management Tips
  5. Implement Security Measures to Protect Infrastructure - Lock down your environment with firewalls, intrusion detection systems, and strong encryption methods. These layers form a digital fortress that defends against ransomware, DDoS attacks, and unauthorized access. Synlabs: Security Essentials
  6. Recognize the Importance of Data Centers - Data centers are the powerhouses that house critical servers, storage, and networking equipment under tightly controlled environments. Explore how cooling, backup power, and physical security ensure high availability and disaster resilience. Atlassian: Data Center Fundamentals
  7. Explore Cloud Services and Their Benefits - Shift from physical racks to on-demand virtual servers, storage, and networking in the cloud. Learn how elasticity, pay-as-you-go models, and global reach can streamline costs and accelerate deployments. Red Hat: Cloud Infrastructure Insights
  8. Understand Virtualization and Its Role in IT Infrastructure - Virtualization layers allow multiple virtual machines to share one physical host, boosting resource utilization and simplifying management. Discover hypervisors, containerization, and how they support agile development and testing. Scale Computing: Virtualization Explained
  9. Grasp the Significance of Network Security - Secure gateways, vigilant antivirus tools, and real-time monitoring guard your network perimeter and endpoints. Learn to configure access controls, segment traffic, and respond swiftly to breaches. Synlabs: Network Security Guide
  10. Stay Updated with IT Infrastructure Best Practices - The tech landscape evolves fast - regularly audit your systems, implement redundancy, monitor performance, and update security protocols to maintain peak efficiency. Cultivate a proactive mindset to anticipate challenges before they arise. SAI Infosolution: Best Practices Handbook
Powered by: Quiz Maker