

Telecommunications Management
Solved Exam Questions
Course Introduction
Telecommunications Management explores the principles, technologies, and strategies involved in managing modern telecommunications systems within organizations. The course covers topics such as network architecture, data transmission, wireless and wired communication, regulatory issues, and emerging trends like 5G and cloud communications. Students learn to evaluate, design, and oversee telecommunications infrastructure while addressing challenges related to security, scalability, and cost-effectiveness. Emphasis is placed on aligning telecommunications solutions with business objectives, developing effective management policies, and understanding the impact of telecommunications on organizational efficiency and competitiveness.
Recommended Textbook Business Data Networks and Security 11th Edition by
Available Study Resources on Quizplus
12 Chapters
1009 Verified Questions
1009 Flashcards
Source URL: https://quizplus.com/study-set/2197

Page 2
Raymond R. Panko

Chapter 1: Core Network Concepts and Terminology
Available Study Resources on Quizplus for this Chatper
68 Verified Questions
68 Flashcards
Source URL: https://quizplus.com/quiz/43742
Sample Questions
Q1) paths across a single network are called ________.
A) routes
B) data links
C) physical links
D) none of the above
Answer: B
Q2) Which of the following is an Internet supervisory protocol?
A) DNS
B) IP
C) both A and B
D) neither A nor B
Answer: A
Q3) Internet communication that does not involve a human is referred to with the term
A) World Wide Web
B) impersonal
C) anonymous
D) IoT
Answer: D
To view all questions and flashcards with answers, click on the resource link above.
Page 3
Chapter 2: Network Standards
Available Study Resources on Quizplus for this Chatper
112 Verified Questions
112 Flashcards
Source URL: https://quizplus.com/quiz/43743
Sample Questions
Q1) How many bytes will it take to transmit "Brain Dead" without the quotation marks?
A) 2
B) 3
C) 9
D) none of the above
Answer: D
Q2) There is always a data field in a message.
A)True
B)False
Answer: False
Q3) If a destination host does not receive a segment,it will ________.
A) transmit an ACK segment
B) transmit a NAC segment
C) transmit an RSND segment
D) none of the above
Answer: D
To view all questions and flashcards with answers, click on the resource link above.

Page 4

Chapter 3: Network Management
Available Study Resources on Quizplus for this Chatper
66 Verified Questions
66 Flashcards
Source URL: https://quizplus.com/quiz/43744
Sample Questions
Q1) In SNMP,the manager communicates directly with the managed device.
A)True
B)False
Answer: False
Q2) Error rates can soar when the network traffic level is at a(n)________.
A) high level
B) fluctuating level
C) unregulated level
D) none of the above
Answer: A
Q3) SNMP Get commands can ________.
A) ask agents for information about the managed device
B) change router operation
C) both A and B
D) neither A nor B
Answer: A
Q4) Priority is a way to handle a chronic lack of capacity.
A)True
B)False
Answer: False
To view all questions and flashcards with answers, click on the resource link above. Page 5

Chapter 4: Network Security
Available Study Resources on Quizplus for this Chatper
106 Verified Questions
106 Flashcards
Source URL: https://quizplus.com/quiz/43745
Sample Questions
Q1) Traditionally,we have told users that passwords ________.
A) should have a mix of characters (uppercase and lowercase letters, digits, other keyboard characters)
B) should be easy to remember
C) both A and B
D) neither A nor B
Q2) Vulnerability-based attacks that occur before a patch is available are called ________ attacks.
A) indefensible
B) stealth
C) malware
D) zero-day
Q3) Which of the following attach themselves to other programs?
A) viruses
B) worms
C) both A and B
D) neither A nor B
To view all questions and flashcards with answers, click on the resource link above. Page 6

Chapter 5: Ethernet 8023switched Lans
Available Study Resources on Quizplus for this Chatper
91 Verified Questions
91 Flashcards
Source URL: https://quizplus.com/quiz/43746
Sample Questions
Q1) EUI-48 addresses in expressed in hexadecimal notation if used by ________.
A) switches
B) routers
C) both A and B
D) neither A nor B
Q2) What type of switch connects switches to other switches?
A) trunk switches
B) core switches
C) workgroup switches
D) none of the above
Q3) The two tag frames provide information about ________.
A) transmission media
B) the length of Jumbo packets
C) priority
D) all of the above
Q4) Trunk links connect switches to ________ switches.
A) core
B) workgroup
C) both A and B
D) neither A nor B
To view all questions and flashcards with answers, click on the resource link above. Page 7

Chapter 6: Wireless Lans I
Available Study Resources on Quizplus for this Chatper
92 Verified Questions
92 Flashcards
Source URL: https://quizplus.com/quiz/43747
Sample Questions
Q1) If two products both comply with 802.11 ac,their performance will always be similar.
A)True
B)False
Q2) In Wi-Fi,2.4 GHz and 5 GHz refer to ________.
A) frequency spectrums
B) broadbands
C) channels
D) none of the above.
Q3) In general,the fewer the channels,________.
A) the greater the likelihood of interference between access points
B) the smaller the individual channels will be
C) both A and B
D) neither A nor B
Q4) Channels with wide bandwidths are called ________ channels.
A) multimode
B) full-duplex
C) broadband
D) parallel
To view all questions and flashcards with answers, click on the resource link above. Page 8

Chapter 7: Wireless Lans II
Available Study Resources on Quizplus for this Chatper
73 Verified Questions
73 Flashcards
Source URL: https://quizplus.com/quiz/43748
Sample Questions
Q1) NFC transmission standards have been set for ________.
A) its service band
B) mesh networking
C) both A and B
D) neither A nor B
Q2) Compared to an omnidirectional antenna,a dish antenna quadruples radiated power.How much is this change in decibels?
A) 6 dB
B) 9 db
C) 16 db
D) none of the above
Q3) Bluetooth uses ________ operation.
A) all-to-all
B) point-to-multipoint
C) one-to-all
D) one-to-one
Q4) Nearly all public Wi-Fi hotspots encrypt your transmissions.
A)True
B)False
To view all questions and flashcards with answers, click on the resource link above. Page 9
Chapter 8: TCP/IP Internetworking I
Available Study Resources on Quizplus for this Chatper
86 Verified Questions
86 Flashcards
Source URL: https://quizplus.com/quiz/43749
Sample Questions
Q1) One-bit fields are called ________ fields.
A) SYN
B) flag
C) ACK
D) none of the above
Q2) An internal router connects different IP ________.
A) subnets
B) networks
C) both A and B
D) neither A nor B
Q3) Which of the following allows packet fragmentation?
A) IPv4
B) IPv6
C) both A and B
D) neither A nor B
Q4) In IPv6 addresses before simplification,there are ________ in a field.
A) 2 symbols
B) 8 bits
C) both A and B
D) neither A nor B

Page 10
To view all questions and flashcards with answers, click on the resource link above.

Chapter 9: TCP/IP Internetworking II
Available Study Resources on Quizplus for this Chatper
81 Verified Questions
81 Flashcards
Source URL: https://quizplus.com/quiz/43750
Sample Questions
Q1) Convert the following EUI-48 address to a modified EUI-64 address: AA-00-00-FF-FF-00.
A) aa00:ff:feff:ff0
B) ae00:ff:feff:ff0
C) aa00:00ff:feff:ff0
D) ae00:00ff:feff:ff0
Q2) The DNS ________ record is for the host name's ________ address
A) A; IPv4
B) A; IPv6
C) AAAA; IPv4
D) none of the above
Q3) For a particular domain name,a DNS server will have ________.
A) a single record
B) multiple records
C) two records-one for IPv4 and one for IPv6.
D) all of the above
Q4) Which is less expensive to implement?
A) SSL/TLS
B) IPsec
C) Both cost about the same to implement.
Page 11
To view all questions and flashcards with answers, click on the resource link above.
Chapter 10: Carrier Wide Area Networks Wans
Available Study Resources on Quizplus for this Chatper
81 Verified Questions
81 Flashcards
Source URL: https://quizplus.com/quiz/43751
Sample Questions
Q1) If you need speeds of 16 Mbps between two corporate sites in the United States,you would need a ________ leased line.
A) T1
B) T3
C) OC3
D) none of the above
Q2) Two-way amplifiers are needed for cable ________ service.
A) television
B) data
C) both A and B
D) neither A nor B
Q3) In Carrier Ethernet,which connects multiple distant sites into a single Ethernet network?
A) E-Line service
B) E-LAN service
C) both A and B
D) neither A nor B
To view all questions and flashcards with answers, click on the resource link above.

12

Chapter 11: Networked Applications
Available Study Resources on Quizplus for this Chatper
84 Verified Questions
84 Flashcards
Source URL: https://quizplus.com/quiz/43752
Sample Questions
Q1) Telephones that can plug directly into a VoIP network are called PCs with multimedia hardware and added software.
A)True
B)False
Q2) Which of the following is considered a bigger problem with client/server architecture than peer-to-peer architecture?
A) underutilized processing capacity of client PCs
B) potential for essential data/services to become unavailable because devices providing services are often turned off
C) lack of corporate control
D) none of the above
Q3) The primary applications architecture is ________.
A) TCP/IP
B) OSI
C) both A and B
D) neither A nor B
Q4) A networked application requires a network to operate.
A)True
B)False
To view all questions and flashcards with answers, click on the resource link above. Page 13

Chapter 12: Appendix: Managing the Security Process
Available Study Resources on Quizplus for this Chatper
69 Verified Questions
69 Flashcards
Source URL: https://quizplus.com/quiz/43741
Sample Questions
Q1) CSIRT leaders should come from ________.
A) an outside crisis vendor
B) a business department
C) the security department
D) the IT department
Q2) Errors in assigning permission are reduced if assignments are based on ________.
A) individuals
B) roles
C) standard authorizations
D) none of the above
Q3) A building with some unlocked exterior doors most specifically violates the principle of ________.
A) network segmentation
B) protecting single points of takeover
C) comprehensive security
D) risk analysis
Q4) The goal of security is to eliminate risk.
A)True
B)False
To view all questions and flashcards with answers, click on the resource link above. Page 14