Data Communications and Networking Exam Preparation Guide - 699 Verified Questions

Page 1


Data Communications and Networking Exam Preparation Guide

Course Introduction

This course introduces the fundamental concepts of data communications and networking, focusing on the technologies and protocols that enable modern networked systems. Topics include the OSI and TCP/IP reference models, network topologies, transmission media, error detection and correction techniques, switching methods, and networking hardware. The course covers the design and operation of local area networks (LANs) and wide area networks (WANs), including Ethernet and wireless communication standards. Students will also explore routing and congestion control, network security basics, and emerging trends in networking. Practical exercises and case studies help students develop critical skills in configuring, managing, and troubleshooting network environments.

Recommended Textbook

Guide to Network Defense and Countermeasures 3rd Edition by Randy Weaver

Available Study Resources on Quizplus 14 Chapters

699 Verified Questions

699 Flashcards

Source URL: https://quizplus.com/study-set/2179

Page 2

Chapter 1: Network Security Fundamentals

Available Study Resources on Quizplus for this Chatper

50 Verified Questions

50 Flashcards

Source URL: https://quizplus.com/quiz/43421

Sample Questions

Q1) Which of the following is NOT information that a packet filter uses to determine whether to block a packet?

A) checksum

B) port

C) IP address

D) protocol

Answer: A

Q2) With which access control method do system administrators establish what information users can share?

A) discretionary access control

B) mandatory access control

C) administrative access control

D) role-based access control

Answer: B

Q3) What can an attacker use a port scanner to test for on a target computer?

A) invalid IP addresses

B) SYN flags

C) open sockets

D) ping floods

Answer: C

To view all questions and flashcards with answers, click on the resource link above. Page 3

Chapter 2: TCP-IP

Available Study Resources on Quizplus for this Chatper

50 Verified Questions

50 Flashcards

Source URL: https://quizplus.com/quiz/43422

Sample Questions

Q1) List three reasons an administrator would want to use subnetting.

Answer: Mirroring the organization's physical layout

Mirroring the organization's administrative structure

Planning for future growth

Reducing and controlling network traffic

Increasing network security

Logically segment a network

Q2) What does a sliding window do in a TCP packet?

A) ensures all packets are delivered

B) provides packet security

C) provides flow control

D) ensures transmission reliability

Answer: C

Q3) The _____________ field in an IP header is a 3-bit value indicating whether a datagram is a fragment.

Answer: flags

Q4) DNS operates at the _________________ layer of the OSI model.

Answer: Application

To view all questions and flashcards with answers, click on the resource link above. Page 4

Chapter 3: Network Traffic Signatures

Available Study Resources on Quizplus for this Chatper

49 Verified Questions

49 Flashcards

Source URL: https://quizplus.com/quiz/43423

Sample Questions

Q1) Under which suspicious traffic signature category would a port scan fall?

A) informational

B) reconnaissance

C) denial of service

D) unauthorized access

Answer: B

Q2) All devices interpret attack signatures uniformly.

A)True

B)False

Answer: False

Q3) A ______________ is made up of IP numbers and options,TCP flags,and port number that define a type of network activity.

Answer: signature

Q4) Under which attack category does a UNIX Sendmail exploitation fall?

A) bad header information

B) single-packet attack

C) multiple-packet attack

D) suspicious data payload

Answer: D

To view all questions and flashcards with answers, click on the resource link above. Page 5

Chapter 4: Routing Fundamentals

Available Study Resources on Quizplus for this Chatper

50 Verified Questions

50 Flashcards

Source URL: https://quizplus.com/quiz/43424

Sample Questions

Q1) What Cisco router command encrypts all passwords on the router?

A) enable secret password

B) secure passwords enable

C) crypto key passwords

D) service password-encryption

Q2) To determine best path,routers use metrics such as the value of the first octet of the destination IP address.

A)True

B)False

Q3) Current Microsoft OSs include IPv6,but to use it,you must enable it first.

A)True

B)False

Q4) Which of the following is true about standard IP ACLs?

A) they can filter on source and destination IP address

B) they automatically apply to all active interfaces

C) a 0.0.0.0 inverse mask means all bits are significant

D) they can filter on IP address and port

Q5) ____________ routes are manually configured routes that direct all packets not specifically configured in the routing table.

Page 6

Q6) Describe antispoofing logging and how you can prevent it with ACLs.

To view all questions and flashcards with answers, click on the resource link above.

Chapter 5: Cryptography

Available Study Resources on Quizplus for this Chatper

50 Verified Questions

50 Flashcards

Source URL: https://quizplus.com/quiz/43425

Sample Questions

Q1) Encrypted files can be transmitted in both electronic form and as written messages.

A)True

B)False

Q2) Which of the following was developed as a way of enabling Web servers and browsers to exchange encrypted information and uses a hashed message authentication code to increase security?

A) SSH

B) SSL

C) TLS

D) IPsec

Q3) Which of the following is commonly used for verifying message integrity?

A) registration authority

B) CRL

C) pseudorandom number generator

D) hashing function

Q4) What is a MAC tag and how does it work?

Q5) How does an asymmetric algorithm differ from a symmetric algorithm?

Q6) A ________________ occurs when computing the MD5 algorithm with two different initialization vectors produces the same hash value.

Page 7

To view all questions and flashcards with answers, click on the resource link above.

Chapter 6: Wireless Network Fundamentals

Available Study Resources on Quizplus for this Chatper

50 Verified Questions

50 Flashcards

Source URL: https://quizplus.com/quiz/43426

Sample Questions

Q1) Which of the following pairs represents a medium frequency band and its common use?

A) 300 KHz-3MHz, AM radio

B) 144-174 MHz, TV channels

C) 30-300 KHz, cordless phones

D) 3-30 MHz, CB and shortwave radio

Q2) What is the difference between directed IR transmission and diffused IR transmission?

Q3) Which digital signal modulation method is a binary modulation technique in which the carrier signal's frequency is changed to represent a 1 or 0 bit?

A) ASK

B) FSK

C) PSK

D) FDM

Q4) A _________________ IR transmission relies on reflected light that can bounce off walls and other objects.

Q5) Why should you use caution when using multiple APs?

Q6) Compare and contrast analog and digital RF signals.

Q7) Discuss how an ESS works.

To view all questions and flashcards with answers, click on the resource link above. Page 8

Chapter 7: Understanding Wireless Security

Available Study Resources on Quizplus for this Chatper

50 Verified Questions

50 Flashcards

Source URL: https://quizplus.com/quiz/43427

Sample Questions

Q1) What function does a RADIUS server provide to a wireless network?

A) association

B) encryption

C) decryption

D) authentication

Q2) Wireless networks are inherently secure because the original IEEE 802.11 standard addressed strong authentication and encryption.

A)True

B)False

Q3) Which of the following is NOT a suggested practice before using a newly configured wireless network?

A) change the administrator password

B) change the manufacturer's default key

C) use the default encryption method

D) alter the default channel

Q4) Which of the following is true about wardriving?

A) attackers use RF monitor mode

B) the hardware is very expensive

C) the software is very expensive

D) their goal is simply to hijack a connection

To view all questions and flashcards with answers, click on the resource link above. Page 9

Chapter 8: Intrusion Detection and Prevention Systems

Available Study Resources on Quizplus for this Chatper

50 Verified Questions

50 Flashcards

Source URL: https://quizplus.com/quiz/43428

Sample Questions

Q1) an NIDPS sensor positioned so that all traffic on the network segment is examined as it passes through

A)accountability

B)escalated

C)event horizon

D)inline sensor

E)intrusion

F)passive sensor

G)profiles

H)sensor

I)stateful protocol analysis

J)true positive

Q2) If you see a /16 in the header of a snort rule,what does it mean?

A) a maximum of 16 log entries should be kept

B) the size of the log file is 16 MB

C) the subnet mask is 255.255.0.0

D) the detected signature is 16 bits in length

Q3) List two approaches to stateful protocol analysis.

Q4) Define stateful protocol analysis.Include in your answer the concept of the event horizon.

To view all questions and flashcards with answers, click on the resource link above. Page 10

Chapter 9: Firewalls

Available Study Resources on Quizplus for this Chatper

50 Verified Questions

50 Flashcards

Source URL: https://quizplus.com/quiz/43429

Sample Questions

Q1) What is a cleanup rule? Provide an example.

Q2) Since ICMP messages use authentication,man-in-the-middle attacks cannot be successful.

A)True

B)False

Q3) a packet-filtering rule that comes last in a rule base and covers any packets that have not been covered by preceding rules

A)cleanup rule

B)firewall

C)firewall appliance

D)firewall policy

E)proxy server

F)rule base

G)socket

H)state table

I)stateful packet filters

J)stateless packet filters

Q4) What are the most common features of IP protocol headers that stateless packet filters base their filtering decisions on?

To view all questions and flashcards with answers, click on the resource link above. Page 11

Chapter 10: Firewall Design and Management

Available Study Resources on Quizplus for this Chatper

50 Verified Questions

50 Flashcards

Source URL: https://quizplus.com/quiz/43430

Sample Questions

Q1) How does a server farm and load-balancing software figure into the multiple DMZ/firewall configuration?

Q2) Which type of translation should you use if you need 50 computers in the corporate network to be able to access the Internet using a single public IP address?

A) one-to-one NAT

B) port address translation

C) one-to-many NAT

D) DMZ proxy translation

Q3) A dual-homed host has a single NIC with two MAC addresses.

A)True

B)False

Q4) A _______________ router determines whether to allow or deny packets based on their source and destination IP addresses.

Q5) Where should network management systems generally be placed?

A) out of band

B) in the DMZ

C) on the perimeter

D) in the server farm

Q6) What is a reverse firewall and why would you use one?

Page 12

To view all questions and flashcards with answers, click on the resource link above.

Chapter 11: VPN Concepts

Available Study Resources on Quizplus for this Chatper

50 Verified Questions

50 Flashcards

Source URL: https://quizplus.com/quiz/43431

Sample Questions

Q1) Which of the following is NOT a factor a secure VPN design should address?

A) encryption

B) authentication

C) nonrepudiation

D) performance

Q2) If you use Windows RRAS for your VPN,you will need a third-party RADIUS server if you want to use RADIUS for authentication.

A)True

B)False

Q3) Which IPsec component authenticates TCP/IP packets to ensure data integrity?

A) AH

B) ESP

C) IKE

D) ISAKMP

Q4) List two reasons IPsec has become the standard set of protocols for VPN security.

Q5) Hardware VPNs create a gateway-to-gateway VPN.

A)True

B)False

Q6) What four events occur when one IPsec-compliant computer connects to another?

Page 13

To view all questions and flashcards with answers, click on the resource link above.

Chapter 12: Internet and World Wide Web Security

Available Study Resources on Quizplus for this Chatper

50 Verified Questions

50 Flashcards

Source URL: https://quizplus.com/quiz/43432

Sample Questions

Q1) What is the DNS hierarchical system? Include a discussion of root servers in your answer.

Q2) What type of attack involves plaintext scripting that affects databases?

A) phishing

B) ActiveX control

C) Java applet

D) SQL injection

Q3) How can you provide data confidentiality for your IIS Web server?

Q4) SQL injection attacks are isolated to custom applications,so administrators can prevent them.

A)True

B)False

Q5) What makes IP spoofing possible for computers on the Internet?

A) network address translation

B) the lack of authentication

C) the 32-bit address space

D) the DNS hierarchy

Q6) _______________________ is a name-resolution service that translates domain names to IP addresses.

Q7) What is a buffer overflow attack?

To view all questions and flashcards with answers, click on the resource link above. Page 14

Chapter 13: Security Policy Design and Implementation

Available Study Resources on Quizplus for this Chatper

50 Verified Questions

50 Flashcards

Source URL: https://quizplus.com/quiz/43433

Sample Questions

Q1) Which of the following is NOT among the six factors needed to create a risk analysis?

A) threats

B) consequences

C) personnel profiles

D) probabilities

Q2) a method of authentication that grants users limited system access based on their assigned role in the company

A)extranet

B)network assets

C)privileged access policy

D)risk management

E)role-based authentication

F)search warrant

G)subpoena

H)tunneling protocols

I)two-factor authentication

J)vulnerabilities

Q3) What is the purpose of a privileged access policy?

Q4) When should you update the security policy?

To view all questions and flashcards with answers, click on the resource link above. Page 15

Chapter 14: On-Going Security Management

Available Study Resources on Quizplus for this Chatper

50 Verified Questions

50 Flashcards

Source URL: https://quizplus.com/quiz/43434

Sample Questions

Q1) You monitor and evaluate network traffic to gather evidence that indicates whether your IDPS _________________ are working well or need to be updated.

Q2) Each IDPS has _____________ that gather data passing through the gateway.

Q3) Which of the following is NOT a type of event that you would normally monitor?

A) user account creation

B) e-mail attachment handling

C) antivirus scanning

D) access to shared folders

Q4) Change management should be used before making changes to firewall or IDPS rules that affect users.

A)True

B)False

Q5) An operational audit looks for accounts that have weak or blank passwords.

A)True

B)False

Q6) Groups known as ______________ teams are assembled to actively test a network.

Q7) What is security auditing and what type of information should be analyzed?

Q9) List the advantages of centralized data collection. Page 16

Q8) List and define the areas for which DiD calls for maintenance.

To view all questions and flashcards with answers, click on the resource link above.

Page 17

Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.