

Data Communications and Networking Exam Preparation Guide
Course Introduction
This course introduces the fundamental concepts of data communications and networking, focusing on the technologies and protocols that enable modern networked systems. Topics include the OSI and TCP/IP reference models, network topologies, transmission media, error detection and correction techniques, switching methods, and networking hardware. The course covers the design and operation of local area networks (LANs) and wide area networks (WANs), including Ethernet and wireless communication standards. Students will also explore routing and congestion control, network security basics, and emerging trends in networking. Practical exercises and case studies help students develop critical skills in configuring, managing, and troubleshooting network environments.
Recommended Textbook
Guide to Network Defense and Countermeasures 3rd Edition by Randy Weaver
Available Study Resources on Quizplus 14 Chapters
699 Verified Questions
699 Flashcards
Source URL: https://quizplus.com/study-set/2179

Page 2

Chapter 1: Network Security Fundamentals
Available Study Resources on Quizplus for this Chatper
50 Verified Questions
50 Flashcards
Source URL: https://quizplus.com/quiz/43421
Sample Questions
Q1) Which of the following is NOT information that a packet filter uses to determine whether to block a packet?
A) checksum
B) port
C) IP address
D) protocol
Answer: A
Q2) With which access control method do system administrators establish what information users can share?
A) discretionary access control
B) mandatory access control
C) administrative access control
D) role-based access control
Answer: B
Q3) What can an attacker use a port scanner to test for on a target computer?
A) invalid IP addresses
B) SYN flags
C) open sockets
D) ping floods
Answer: C
To view all questions and flashcards with answers, click on the resource link above. Page 3

Chapter 2: TCP-IP
Available Study Resources on Quizplus for this Chatper
50 Verified Questions
50 Flashcards
Source URL: https://quizplus.com/quiz/43422
Sample Questions
Q1) List three reasons an administrator would want to use subnetting.
Answer: Mirroring the organization's physical layout
Mirroring the organization's administrative structure
Planning for future growth
Reducing and controlling network traffic
Increasing network security
Logically segment a network
Q2) What does a sliding window do in a TCP packet?
A) ensures all packets are delivered
B) provides packet security
C) provides flow control
D) ensures transmission reliability
Answer: C
Q3) The _____________ field in an IP header is a 3-bit value indicating whether a datagram is a fragment.
Answer: flags
Q4) DNS operates at the _________________ layer of the OSI model.
Answer: Application
To view all questions and flashcards with answers, click on the resource link above. Page 4

Chapter 3: Network Traffic Signatures
Available Study Resources on Quizplus for this Chatper
49 Verified Questions
49 Flashcards
Source URL: https://quizplus.com/quiz/43423
Sample Questions
Q1) Under which suspicious traffic signature category would a port scan fall?
A) informational
B) reconnaissance
C) denial of service
D) unauthorized access
Answer: B
Q2) All devices interpret attack signatures uniformly.
A)True
B)False
Answer: False
Q3) A ______________ is made up of IP numbers and options,TCP flags,and port number that define a type of network activity.
Answer: signature
Q4) Under which attack category does a UNIX Sendmail exploitation fall?
A) bad header information
B) single-packet attack
C) multiple-packet attack
D) suspicious data payload
Answer: D
To view all questions and flashcards with answers, click on the resource link above. Page 5

Chapter 4: Routing Fundamentals
Available Study Resources on Quizplus for this Chatper
50 Verified Questions
50 Flashcards
Source URL: https://quizplus.com/quiz/43424
Sample Questions
Q1) What Cisco router command encrypts all passwords on the router?
A) enable secret password
B) secure passwords enable
C) crypto key passwords
D) service password-encryption
Q2) To determine best path,routers use metrics such as the value of the first octet of the destination IP address.
A)True
B)False
Q3) Current Microsoft OSs include IPv6,but to use it,you must enable it first.
A)True
B)False
Q4) Which of the following is true about standard IP ACLs?
A) they can filter on source and destination IP address
B) they automatically apply to all active interfaces
C) a 0.0.0.0 inverse mask means all bits are significant
D) they can filter on IP address and port
Q5) ____________ routes are manually configured routes that direct all packets not specifically configured in the routing table.
Page 6
Q6) Describe antispoofing logging and how you can prevent it with ACLs.
To view all questions and flashcards with answers, click on the resource link above.

Chapter 5: Cryptography
Available Study Resources on Quizplus for this Chatper
50 Verified Questions
50 Flashcards
Source URL: https://quizplus.com/quiz/43425
Sample Questions
Q1) Encrypted files can be transmitted in both electronic form and as written messages.
A)True
B)False
Q2) Which of the following was developed as a way of enabling Web servers and browsers to exchange encrypted information and uses a hashed message authentication code to increase security?
A) SSH
B) SSL
C) TLS
D) IPsec
Q3) Which of the following is commonly used for verifying message integrity?
A) registration authority
B) CRL
C) pseudorandom number generator
D) hashing function
Q4) What is a MAC tag and how does it work?
Q5) How does an asymmetric algorithm differ from a symmetric algorithm?
Q6) A ________________ occurs when computing the MD5 algorithm with two different initialization vectors produces the same hash value.
Page 7
To view all questions and flashcards with answers, click on the resource link above.

Chapter 6: Wireless Network Fundamentals
Available Study Resources on Quizplus for this Chatper
50 Verified Questions
50 Flashcards
Source URL: https://quizplus.com/quiz/43426
Sample Questions
Q1) Which of the following pairs represents a medium frequency band and its common use?
A) 300 KHz-3MHz, AM radio
B) 144-174 MHz, TV channels
C) 30-300 KHz, cordless phones
D) 3-30 MHz, CB and shortwave radio
Q2) What is the difference between directed IR transmission and diffused IR transmission?
Q3) Which digital signal modulation method is a binary modulation technique in which the carrier signal's frequency is changed to represent a 1 or 0 bit?
A) ASK
B) FSK
C) PSK
D) FDM
Q4) A _________________ IR transmission relies on reflected light that can bounce off walls and other objects.
Q5) Why should you use caution when using multiple APs?
Q6) Compare and contrast analog and digital RF signals.
Q7) Discuss how an ESS works.
To view all questions and flashcards with answers, click on the resource link above. Page 8

Chapter 7: Understanding Wireless Security
Available Study Resources on Quizplus for this Chatper
50 Verified Questions
50 Flashcards
Source URL: https://quizplus.com/quiz/43427
Sample Questions
Q1) What function does a RADIUS server provide to a wireless network?
A) association
B) encryption
C) decryption
D) authentication
Q2) Wireless networks are inherently secure because the original IEEE 802.11 standard addressed strong authentication and encryption.
A)True
B)False
Q3) Which of the following is NOT a suggested practice before using a newly configured wireless network?
A) change the administrator password
B) change the manufacturer's default key
C) use the default encryption method
D) alter the default channel
Q4) Which of the following is true about wardriving?
A) attackers use RF monitor mode
B) the hardware is very expensive
C) the software is very expensive
D) their goal is simply to hijack a connection
To view all questions and flashcards with answers, click on the resource link above. Page 9

Chapter 8: Intrusion Detection and Prevention Systems
Available Study Resources on Quizplus for this Chatper
50 Verified Questions
50 Flashcards
Source URL: https://quizplus.com/quiz/43428
Sample Questions
Q1) an NIDPS sensor positioned so that all traffic on the network segment is examined as it passes through
A)accountability
B)escalated
C)event horizon
D)inline sensor
E)intrusion
F)passive sensor
G)profiles
H)sensor
I)stateful protocol analysis
J)true positive
Q2) If you see a /16 in the header of a snort rule,what does it mean?
A) a maximum of 16 log entries should be kept
B) the size of the log file is 16 MB
C) the subnet mask is 255.255.0.0
D) the detected signature is 16 bits in length
Q3) List two approaches to stateful protocol analysis.
Q4) Define stateful protocol analysis.Include in your answer the concept of the event horizon.
To view all questions and flashcards with answers, click on the resource link above. Page 10

Chapter 9: Firewalls
Available Study Resources on Quizplus for this Chatper
50 Verified Questions
50 Flashcards
Source URL: https://quizplus.com/quiz/43429
Sample Questions
Q1) What is a cleanup rule? Provide an example.
Q2) Since ICMP messages use authentication,man-in-the-middle attacks cannot be successful.
A)True
B)False
Q3) a packet-filtering rule that comes last in a rule base and covers any packets that have not been covered by preceding rules
A)cleanup rule
B)firewall
C)firewall appliance
D)firewall policy
E)proxy server
F)rule base
G)socket
H)state table
I)stateful packet filters
J)stateless packet filters
Q4) What are the most common features of IP protocol headers that stateless packet filters base their filtering decisions on?
To view all questions and flashcards with answers, click on the resource link above. Page 11

Chapter 10: Firewall Design and Management
Available Study Resources on Quizplus for this Chatper
50 Verified Questions
50 Flashcards
Source URL: https://quizplus.com/quiz/43430
Sample Questions
Q1) How does a server farm and load-balancing software figure into the multiple DMZ/firewall configuration?
Q2) Which type of translation should you use if you need 50 computers in the corporate network to be able to access the Internet using a single public IP address?
A) one-to-one NAT
B) port address translation
C) one-to-many NAT
D) DMZ proxy translation
Q3) A dual-homed host has a single NIC with two MAC addresses.
A)True
B)False
Q4) A _______________ router determines whether to allow or deny packets based on their source and destination IP addresses.
Q5) Where should network management systems generally be placed?
A) out of band
B) in the DMZ
C) on the perimeter
D) in the server farm
Q6) What is a reverse firewall and why would you use one?
Page 12
To view all questions and flashcards with answers, click on the resource link above.

Chapter 11: VPN Concepts
Available Study Resources on Quizplus for this Chatper
50 Verified Questions
50 Flashcards
Source URL: https://quizplus.com/quiz/43431
Sample Questions
Q1) Which of the following is NOT a factor a secure VPN design should address?
A) encryption
B) authentication
C) nonrepudiation
D) performance
Q2) If you use Windows RRAS for your VPN,you will need a third-party RADIUS server if you want to use RADIUS for authentication.
A)True
B)False
Q3) Which IPsec component authenticates TCP/IP packets to ensure data integrity?
A) AH
B) ESP
C) IKE
D) ISAKMP
Q4) List two reasons IPsec has become the standard set of protocols for VPN security.
Q5) Hardware VPNs create a gateway-to-gateway VPN.
A)True
B)False
Q6) What four events occur when one IPsec-compliant computer connects to another?
Page 13
To view all questions and flashcards with answers, click on the resource link above.

Chapter 12: Internet and World Wide Web Security
Available Study Resources on Quizplus for this Chatper
50 Verified Questions
50 Flashcards
Source URL: https://quizplus.com/quiz/43432
Sample Questions
Q1) What is the DNS hierarchical system? Include a discussion of root servers in your answer.
Q2) What type of attack involves plaintext scripting that affects databases?
A) phishing
B) ActiveX control
C) Java applet
D) SQL injection
Q3) How can you provide data confidentiality for your IIS Web server?
Q4) SQL injection attacks are isolated to custom applications,so administrators can prevent them.
A)True
B)False
Q5) What makes IP spoofing possible for computers on the Internet?
A) network address translation
B) the lack of authentication
C) the 32-bit address space
D) the DNS hierarchy
Q6) _______________________ is a name-resolution service that translates domain names to IP addresses.
Q7) What is a buffer overflow attack?
To view all questions and flashcards with answers, click on the resource link above. Page 14

Chapter 13: Security Policy Design and Implementation
Available Study Resources on Quizplus for this Chatper
50 Verified Questions
50 Flashcards
Source URL: https://quizplus.com/quiz/43433
Sample Questions
Q1) Which of the following is NOT among the six factors needed to create a risk analysis?
A) threats
B) consequences
C) personnel profiles
D) probabilities
Q2) a method of authentication that grants users limited system access based on their assigned role in the company
A)extranet
B)network assets
C)privileged access policy
D)risk management
E)role-based authentication
F)search warrant
G)subpoena
H)tunneling protocols
I)two-factor authentication
J)vulnerabilities
Q3) What is the purpose of a privileged access policy?
Q4) When should you update the security policy?
To view all questions and flashcards with answers, click on the resource link above. Page 15

Chapter 14: On-Going Security Management
Available Study Resources on Quizplus for this Chatper
50 Verified Questions
50 Flashcards
Source URL: https://quizplus.com/quiz/43434
Sample Questions
Q1) You monitor and evaluate network traffic to gather evidence that indicates whether your IDPS _________________ are working well or need to be updated.
Q2) Each IDPS has _____________ that gather data passing through the gateway.
Q3) Which of the following is NOT a type of event that you would normally monitor?
A) user account creation
B) e-mail attachment handling
C) antivirus scanning
D) access to shared folders
Q4) Change management should be used before making changes to firewall or IDPS rules that affect users.
A)True
B)False
Q5) An operational audit looks for accounts that have weak or blank passwords.
A)True
B)False
Q6) Groups known as ______________ teams are assembled to actively test a network.
Q7) What is security auditing and what type of information should be analyzed?
Q9) List the advantages of centralized data collection. Page 16
Q8) List and define the areas for which DiD calls for maintenance.
To view all questions and flashcards with answers, click on the resource link above.
Page 17