

Data Communications and Networking Test Bank
Course Introduction
Data Communications and Networking introduces the fundamental concepts, architectures, and protocols that enable reliable information exchange across modern computer networks. The course covers essential topics including data transmission methods, signal encoding, network topologies, OSI and TCP/IP reference models, and the roles of various networking devices such as routers, switches, and hubs. Students will also explore error detection and correction techniques, flow and congestion control mechanisms, and the functioning of LANs, WANs, wireless networks, and the Internet. Practical components may include configuring network equipment and analyzing network traffic, equipping students with the foundational skills required for designing, implementing, and maintaining communication networks.
Recommended Textbook
Business Data Networks and Security 10th Edition by Raymond R. Panko
Available Study Resources on Quizplus
15 Chapters
838 Verified Questions
838 Flashcards
Source URL: https://quizplus.com/study-set/1485

Page 2

Chapter 1: Welcome to the Cloud
Available Study Resources on Quizplus for this Chatper
95 Verified Questions
95 Flashcards
Source URL: https://quizplus.com/quiz/29502
Sample Questions
Q1) Who controls the Internet?
A)the U.S. government
B)the United Nations
C)the IETF
D)no one
Answer: D
Q2) When messages of different users share a transmission line,this is ________.
A)fragmentation
B)packetization
C)multiplexing
D)parallel transmission
Answer: C
Q3) ________ are carried inside ________.
A)Packets, frames
B)Frames, packets
C)Frames, application message segments
D)Packets, application message segments
Answer: A
To view all questions and flashcards with answers, click on the resource link above. Page 3

Chapter 2: Network Standards
Available Study Resources on Quizplus for this Chatper
69 Verified Questions
69 Flashcards
Source URL: https://quizplus.com/quiz/29509
Sample Questions
Q1) 2500 is in the range for ________ port numbers.
A)well-known
B)ephemeral
C)both A and B
D)neither A nor B
Answer: B
Q2) For every conversation,a client randomly generates an ephemeral port number for ________.
A)applications
B)conversations
C)both A and B
D)neither A nor B
Answer: B
Q3) An HTTP response message usually has a ________.
A)trailer
B)data field
C)both A and B
D)neither A nor B
Answer: B
To view all questions and flashcards with answers, click on the resource link above.
Page 4

Chapter 3: Network Security
Available Study Resources on Quizplus for this Chatper
88 Verified Questions
88 Flashcards
Source URL: https://quizplus.com/quiz/29510
Sample Questions
Q1) Passwords are widely used because they ________.
A)are demanded by users
B)offer strong authentication
C)are the only authentication techniques known by most security professionals
D)are inexpensive to use
Answer: D
Q2) The password "velociraptor" can be defeated most quickly by a ________.
A)dictionary attack
B)reverse engineering attack
C)brute-force attack
D)None of the above because it is more than 8 characters long.
Answer: A
Q3) In antivirus filtering,the best ways to filter currently use ________.
A)application awareness
B)stateful inspection
C)signature detection
D)behavioral detection
Answer: D
To view all questions and flashcards with answers, click on the resource link above.
5

Chapter 4: Network and Security Management
Available Study Resources on Quizplus for this Chatper
64 Verified Questions
64 Flashcards
Source URL: https://quizplus.com/quiz/29511
Sample Questions
Q1) SNMP Set commands can ________.
A)ask agents for information about the managed device
B)reroute traffic
C)both A and B
D)neither A nor B
Q2) Priority is assigning high priority to ________ applications while giving low priority to ________ applications.
A)latency-tolerant, latency-intolerant
B)latency-intolerant, latency-tolerant
Q3) To determine if a host is reachable,you would send a(n)________.
A)SNMP SET command
B)MIB
C)trap
D)ping
Q4) An SLA for speed should specify a ________.
A)maximum speed
B)minimum speed
C)both A and B
D)neither A nor B
To view all questions and flashcards with answers, click on the resource link above. Page 6

Chapter 5: Ethernet 8023switched Lans
Available Study Resources on Quizplus for this Chatper
70 Verified Questions
70 Flashcards
Source URL: https://quizplus.com/quiz/29512
Sample Questions
Q1) Optical fiber's main advantage over UTP is ________.
A)lower cost
B)lower fragility
C)higher speed
D)greater distance span
Q2) The longest transmission distances are possible with ________.
A)USB
B)UTP
C)single-mode fiber
D)multimode fiber
Q3) The ________ standard was created to prevent attackers from walking in and simply plugging a computer into a wall jack and therefore accessing the network.
A)Ethernet firewall
B)802.1AE
C)802.3X
D)802.1X
Q4) In this book,we use the terms Ethernet and 802.3 interchangeably.
A)True
B)False
To view all questions and flashcards with answers, click on the resource link above. Page 7

Chapter 6: Wireless Lans I
Available Study Resources on Quizplus for this Chatper
69 Verified Questions
69 Flashcards
Source URL: https://quizplus.com/quiz/29513
Sample Questions
Q1) The 2.4 GHz band supports ________ possible non-overlapping 20 MHz channel(s).
A)1
B)3
C)7
D)11
Q2) What propagation problem becomes worse as there is a large and dense object between sender and receiver?
A)multipath interference
B)shadow zones or dead zones
C)both A and B
D)neither A nor B
Q3) MIMO ________.
A)increases throughput
B)lowers propagation distance
C)both A and B
D)neither A nor B
Q4) Wireless network standards are ________ standards.
A)OSI
B)TCP/IP
C)both A and B
To view all questions and flashcards with answers, click on the resource link above. Page 8

Chapter 7: Wireless Lans 2
Available Study Resources on Quizplus for this Chatper
56 Verified Questions
56 Flashcards
Source URL: https://quizplus.com/quiz/29514
Sample Questions
Q1) In 802.11i PSK mode,the pass phrase should be at least ________ characters long.
A)8
B)12
C)20
D)128
Q2) In what mode of 802.11i operation is a central authentication server used?
A)802.1X mode
B)PSK mode
C)both A and B
D)neither A nor B
Q3) Session keys are used to ________.
A)make cryptanalysis more difficult
B)improve authentication
C)both A and B
D)neither A nor B
Q4) Wireless LAN standards come from ________.
A)OSI
B)TCP/IP
C)both A and B
D)neither A nor B
To view all questions and flashcards with answers, click on the resource link above. Page 9

Chapter 8: Tcp-Ip Internet Working I
Available Study Resources on Quizplus for this Chatper
61 Verified Questions
61 Flashcards
Source URL: https://quizplus.com/quiz/29515
Sample Questions
Q1) In the mask /14,how many 1s are there?
A)8
B)16
C)24
D)none of the above
Q2) If I simplify the address 2001:0000:0000:00fe:0000:0000:0000:cdef,I get ________.
A)2001:::fe::::cdef
B)2001::fe::::cdef
C)2001:::fe::cdef
D)2001::00fe:::cdef
Q3) Compared to normal routing,decision caching is ________.
A)faster
B)less dangerous
C)both A and B
Q4) The default row ________.
A)always has the mask /32
B)will always match the destination IP address of an incoming packet
C)both A and B
D)neither A nor B
To view all questions and flashcards with answers, click on the resource link above. Page 10

Chapter 9: Tcp-Ip Internet Working 2
Available Study Resources on Quizplus for this Chatper
56 Verified Questions
56 Flashcards
Source URL: https://quizplus.com/quiz/29516
Sample Questions
Q1) The IEEE calls 64-bit interface addresses ________.
A)Extended Unique Identifiers
B)Interface IDs
C)MAC addresses
D)half-IP
Q2) In SNMP,companies are often reluctant to use ________ commands because of security dangers.
A)Get
B)Set
C)trap
D)request
Q3) In an IPv6 global unicast address,the interface ID is ________ bits long.
A)32
B)64
C)128
D)It varies.
Q4) Which has stronger security?
A)SSL/TLS
B)IPsec
C)Both have about equal security.
To view all questions and flashcards with answers, click on the resource link above. Page 11

Chapter 10: Carrier Wide Area Networks Wans
Available Study Resources on Quizplus for this Chatper
74 Verified Questions
74 Flashcards
Source URL: https://quizplus.com/quiz/29503
Sample Questions
Q1) Cells are used in cellular telephony to provide ________.
A)service for more customers
B)greater reliability
C)greater transmission speed
D)all of the above
Q2) WANs are ________.
A)single networks
B)internets
C)either A or B
D)neither A nor B
Q3) Which of the following DSL services tends to be symmetric in speed?
A)residential
B)business
C)both A and B
D)neither A nor B
Q4) Most end-office switches are Class ________ switches.
A)1
B)2
C)3
D)5
To view all questions and flashcards with answers, click on the resource link above. Page 12

Chapter 11: Networked Applications
Available Study Resources on Quizplus for this Chatper
62 Verified Questions
62 Flashcards
Source URL: https://quizplus.com/quiz/29504
Sample Questions
Q1) Which header comes SECOND in a VoIP transport packet?
A)RTP
B)UDP
C)TCP
D)Application
Q2) For the transport layer,VoIP uses ________ for transport transmission.
A)TCP
B)UDP
C)SIP
D)IP
Q3) The advance that made the client/server application architecture possible was
A)the Internet
B)client processing power
C)application sophistication
D)input/output methods
Q4) Most P2P applications use servers.
A)True
B)False
To view all questions and flashcards with answers, click on the resource link above. Page 13

Chapter 12: Module a More on Tcp
Available Study Resources on Quizplus for this Chatper
4 Verified Questions
4 Flashcards
Source URL: https://quizplus.com/quiz/29505
Sample Questions
Q1) A TCP segment carries data octets 456 through 980.The following TCP segment is a supervisory segment carrying no data.What value is in the sequence number field of the latter TCP segment?
A)456
B)457
C)980
D)981
Q2) Flow control in TCP depends on the ________ field.
A)acknowledgement number
B)window size
C)both A and B
D)neither A nor B
Q3) A TCP segment begins with octet 8,658 and ends with octet 12,783.What number does the receiving host put in the acknowledgment number field of the TCP segment that acknowledges this TCP segment?
A)8,658
B)8,659
C)12,783
D)12,784
To view all questions and flashcards with answers, click on the resource link above.
Page 14

Chapter 13: Module B More on Modulation
Available Study Resources on Quizplus for this Chatper
12 Verified Questions
12 Flashcards
Source URL: https://quizplus.com/quiz/29506
Sample Questions
Q1) In QAM,if you have eight possible amplitudes,how many bits can you send per clock cycle?
A)3
B)6
C)8
D)16
Q2) In QAM,if you have four possible amplitudes,you have ________ possible states.
A)4
B)8
C)16
D)none of the above
Q3) Phase modulation uses two ________ levels.
A)loudness
B)frequency
C)wave
D)none of the above
Q4) Amplitude modulation uses two ________ levels.
A)loudness
B)frequency
C)both A and B
To view all questions and flashcards with answers, click on the resource link above. Page 15

Chapter 14: Module C More on Telecommunications
Available Study Resources on Quizplus for this Chatper
47 Verified Questions
47 Flashcards
Source URL: https://quizplus.com/quiz/29507
Sample Questions
Q1) Message units are a time and distance pricing method that can be used to charge for local calls.
A)True
B)False
Q2) Call restriction refers to a switch's ability to control incoming calls to a station.
A)True
B)False
Q3) Cross-connect devices are found in ________.
A)PBXs
B)equipment rooms
C)telecommunications closets
D)switches
Q4) For PBXs,call forwarding is ________.
A)a user service
B)an attendant service
C)a management service
Q5) In TDM,there are usually more frames than slots.
A)True
B)False
To view all questions and flashcards with answers, click on the resource link above. Page 16

Chapter 15: Module D Directory Servers
Available Study Resources on Quizplus for this Chatper
11 Verified Questions
11 Flashcards
Source URL: https://quizplus.com/quiz/29508
Sample Questions
Q1) In Active Directory domains,there is complete replication between domain controllers
A)in the same domain
B)in adjacent levels in the domain hierarchy
C)throughout a tree
D)throughout a forest
Q2) An Active Directory domain ________.
A)has only a single domain controller
B)makes all servers domain controllers
C)must have its servers organized as a tree
D)none of the above
Q3) Directory servers organize information in a ________.
A)mesh
B)hierarchy
C)relational database
D)all of the above
Q4) Active Directory is Microsoft's directory server product.
A)True
B)False
To view all questions and flashcards with answers, click on the resource link above. Page 17