Business Data Communications Exam Materials - 854 Verified Questions

Page 1


Business Data Communications

Exam Materials

Course Introduction

Business Data Communications introduces students to the principles, technologies, and practices that enable effective data exchange within and between organizations. The course covers foundational concepts such as networking architectures, transmission media, protocols, and standards used in modern business environments. Students will explore network topologies, the role of network infrastructure in supporting business operations, security considerations, and current trends like cloud computing and wireless communication. Practical applications emphasize how reliable, efficient data communication underpins business processes, decision-making, and digital transformation initiatives.

Recommended Textbook

Business Data Communications Infrastructure Networking and Security 7th Edition by William Stallings

Available Study Resources on Quizplus

19 Chapters

854 Verified Questions

854 Flashcards

Source URL: https://quizplus.com/study-set/3889

Page 2

Chapter 1: Introduction

Available Study Resources on Quizplus for this Chatper

45 Verified Questions

45 Flashcards

Source URL: https://quizplus.com/quiz/77458

Sample Questions

Q1) _________ is the ability to determine,in real time,where someone is,how he or she prefers to be reached,and what he or she is currently doing.

Answer: Presence

Q2) __________ allows users in two or more locations to interact simultaneously via two-way video and audio transmission.

A)Web conferencing

B)Unified messaging

C)Videoconferencing

D)Audio conferencing

Answer: C

Q3) Computerization has enhanced the range of features available to businesses for voice communication.

A)True

B)False

Answer: True

Q4) The type of network commonly used with multiple premises in businesses is called a

Answer: Wide Area Network (WAN)

To view all questions and flashcards with answers, click on the resource link above. Page 3

Chapter 2: Business Information

Available Study Resources on Quizplus for this Chatper

44 Verified Questions

44 Flashcards

Source URL: https://quizplus.com/quiz/77447

Sample Questions

Q1) The number of different characters that can be represented in the International Reference Alphabet text code is:

A)512

B)256

C)128

D)64

Answer: C

Q2) A representation of images that uses an array of pixels is called ______.

Answer: raster graphics

Q3) Some of the International Reference Alphabet text code patterns represent invisible,nonprintable characters called __________.

Answer: control characters

Q4) _________ screens use thin sandwiches of glass containing a liquid-crystal material to display images.

A)PDF

B)LCD

C)CRT

D)all of the above

Answer: B

To view all questions and flashcards with answers, click on the resource link above. Page 4

Chapter 3: Distributed Data Processing

Available Study Resources on Quizplus for this Chatper

45 Verified Questions

45 Flashcards

Source URL: https://quizplus.com/quiz/77446

Sample Questions

Q1) Database applications are always distributed applications.

A)True

B)False

Answer: False

Q2) SAP's in-memory computing system is called _________.

Answer: HANA (High Performance Analytic Appliance)

Q3) Like the Internet,intranets are difficult to manage.

A)True

B)False

Answer: False

Q4) Which of the following is NOT a benefit of distributed data processing?

A)increased responsiveness to organizational needs

B)better correspondence to organizational patterns

C)greater user involvement and control

D)enhanced centralization of data definitions

Answer: D

Q5) Two types of distributed data processing are horizontal and _________ partitioning.

Answer: vertical

To view all questions and flashcards with answers, click on the resource link above. Page 5

Chapter 4: Data Transmission

Available Study Resources on Quizplus for this Chatper

45 Verified Questions

45 Flashcards

Source URL: https://quizplus.com/quiz/77445

Sample Questions

Q1) Analog signals differ from digital signals in that:

A)analog signals are represented versus time while digital signals are measured versus frequency

B)analog signals are periodic,digital signals are not

C)analog signals are continuous while digital signals remain at one constant level and then move to another constant level

D)analog signals operate at higher frequencies than digital signals

Q2) For guided media such as twisted pair,coaxial cable,and optical fiber,the most significant sources of signal quality impairments are: attenuation and attenuation distortion,delay distortion,and __________.

Q3) The rate at which data can be transmitted over a given communication path,or channel,under given conditions,is referred to as the ___________.

Q4) _________ is the unwanted coupling between signal paths.

A)Thermal noise

B)Intermodulation noise

C)Crosstalk

D)Impulse noise

Q5) The width of the range of frequencies that comprise the signal is the ________.

To view all questions and flashcards with answers, click on the resource link above. Page 6

Chapter 5: Data Communication Fundamentals

Available Study Resources on Quizplus for this Chatper

45 Verified Questions

45 Flashcards

Source URL: https://quizplus.com/quiz/77444

Sample Questions

Q1) ________ is concerned with the content of the signal.

A)Digital transmission

B)Analog transmission

C)Digital signaling

D)Analog signaling

Q2) Digital signals are:

A)continuous

B)discrete

C)discontinuous

D)none of the above

Q3) Asynchronous transmission includes a start and stop bit with each character transmitted to ensure:

A)that the total number of bits is a factor of 10

B)to allow a continuous stream of data

C)to prevent single bit errors from occurring

D)to allow the receiver to maintain synchronization with the sender

Q4) Synchronous serial transmissions are frame based,require the use of a preamble and are more efficient than asynchronous serial transmissions.

A)True

B)False

Page 7

To view all questions and flashcards with answers, click on the resource link above.

Chapter 6: Data Link Control and Multiplexing

Available Study Resources on Quizplus for this Chatper

45 Verified Questions

45 Flashcards

Source URL: https://quizplus.com/quiz/77443

Sample Questions

Q1) A disadvantage of sliding window flow control is that it is not supported by many data link control protocols.

A)True

B)False

Q2) A data link control protocol includes techniques for regulating the flow of data over a communications link and for compensating for transmission errors.

A)True

B)False

Q3) The term "SONET" corresponds to:

A)special operations networking environment testing

B)synchronous optical networking environment testing

C)synchronous optical network

D)synchronous operational networking

Q4) When ________ is used,the radio spectrum used to connect mobile devices and cell towers is divided into separate frequency channels; each channel is capable of carrying one call.

Q5) The data transmitted by a synchronous TDM system are organized into ________,each of which contains a cycle of time slots.

To view all questions and flashcards with answers, click on the resource link above. Page 8

Chapter 7: The Internet

Available Study Resources on Quizplus for this Chatper

45 Verified Questions

45 Flashcards

Source URL: https://quizplus.com/quiz/77442

Sample Questions

Q1) A ________ refers to a group of hosts that are under the administrative control of a single entity,such as a company or government agency.

Q2) In the Internet,individual hosts and / or local area networks are connected to an Internet services provider through a point-of-presence.

A)True

B)False

Q3) End users typically contact all of the company servers by IP address rather than by name.

A)True

B)False

Q4) _______ provides a universal language for remote computer terminals.

Q5) The key features of the DNA database are:

A)variable-depth hierarchy for names,distributed databases,and name servers

B)resolvers,distributed databases,and name servers

C)distribution controlled by the database,resolvers,and distributed databases

D)variable-depth hierarchy for names,distributed databases,and distribution controlled by the database

Q6) The most important service an ISP provides is access to other _________ networks.

Page 9

To view all questions and flashcards with answers, click on the resource link above.

Chapter 8: Tcp / Ip

Available Study Resources on Quizplus for this Chatper

45 Verified Questions

45 Flashcards

Source URL: https://quizplus.com/quiz/77441

Sample Questions

Q1) ________ is an Internet-based standard and is the framework for developing a complete range of computer communications standards.

Q2) For most applications running as part of the TCP / IP architecture,the transport layer protocol is _________.

Q3) A router is a more complex intermediate system than a bridge.

A)True

B)False

Q4) Protocol architectures are a set of complementary protocol modules governing communication between entities in a network.

A)True

B)False

Q5) An error detection code is also referred to as a frame check sequence or a ________.

Q6) The TCP / IP architecture contains ________ layers.

A)two

B)three

C)four D)five

Q7) The standard network management protocol for TCP / IP networks is _________.

Page 10

To view all questions and flashcards with answers, click on the resource link above.

Chapter 9: Client Server, intranet, and Cloud Computing

Available Study Resources on Quizplus for this Chatper

45 Verified Questions

45 Flashcards

Source URL: https://quizplus.com/quiz/77440

Sample Questions

Q1) NIST defines three service models that can be viewed as nested service alternatives: SaaS,PaaS,and IaaS.

A)True

B)False

Q2) Typically cloud computing services will be rented from an external company that hosts and manages them.

A)True

B)False

Q3) The _________ is a networking facility that provides connectivity and transport of cloud services between cloud consumers and cloud providers.

Q4) __________ binding means that a logical connection is established between the two processes at the time of the RPC and that as soon as the values are returned,the connection is dismantled.

Q5) A _________ is a generalization of the firewall approach and takes advantage of IP security capabilities to allow secure communications between external users and the company's intranet.

Q6) A _________ is a networked information requestor,usually a PC or workstation,that can query database and / or other information from a server.

To view all questions and flashcards with answers, click on the resource link above. Page 11

Chapter 10: Internet-Based Applications

Available Study Resources on Quizplus for this Chatper

45 Verified Questions

45 Flashcards

Source URL: https://quizplus.com/quiz/77457

Sample Questions

Q1) Email functions concerned with the protocol operations needed to transmit and deliver messages are considered:

A)message transfer agent functions

B)client functions

C)email client functions

D)user agent functions

Q2) ________ is the protocol used for transfer of mail from a user agent to an MTA and from one MTA to another.

Q3) SSL provides three categories of security: confidentiality,message integrity,and ___________.

Q4) A(n)_________ is an Internet e-mail provider.

A)POP

B)ADMD

C)DNS

D)IEP

Q5) In order to be compliant,a mail system must include all five of the additional MIME headers.

A)True

B)False

To view all questions and flashcards with answers, click on the resource link above. Page 12

Chapter 11: Internet Operation

Available Study Resources on Quizplus for this Chatper

45 Verified Questions

45 Flashcards

Source URL: https://quizplus.com/quiz/77456

Sample Questions

Q1) Both the broadcast and multiple unicast strategies are inefficient because they generate unnecessary copies of the source packet.

A)True

B)False

Q2) Most IP addresses consist of a network identification and a host identification within that network.

A)True

B)False

Q3) _________ is an identifier for a set of interfaces in which a packet is delivered to all interfaces identified by that address.

Q4) One way to assure that the packet is received by all members of the group is to broadcast a copy of each packet to each network in the configuration,over the least-cost route for each network.

A)True

B)False

Q5) Using what is known as a link state routing algorithm,the ________ protocol is widely used as an interior router protocol in TCP / IP networks.

Q6) The term _________ refers to two routers that share the same network.

To view all questions and flashcards with answers, click on the resource link above. Page 13

Chapter 12: Lan Architecture and Infrastructure

Available Study Resources on Quizplus for this Chatper

45 Verified Questions

45 Flashcards

Source URL: https://quizplus.com/quiz/77455

Sample Questions

Q1) Higher-level data,such as an IP datagram,are passed down to LLC,which appends control information as a header,creating an LLC ___________.

Q2) In a data transmission system,the __________ is the physical path between transmitter and receiver.

Q3) Which of the following is NOT one of the distinguishing characteristics for optical fiber cables compared with twisted pair or coaxial cables?

A)greater capacity

B)lower attenuation

C)electromagnetic isolation

D)heavier weight

Q4) The fact that signal strength falls off with distance is called ________________.

A)bandwidth

B)attenuation

C)resistance

D)propagation

Q5) __________ are the termination points for all of the cabling and where the networking equipment will be located.

To view all questions and flashcards with answers, click on the resource link above. Page 14

Chapter 13: Ethernet, switches, and Virtual Lans

Available Study Resources on Quizplus for this Chatper

45 Verified Questions

45 Flashcards

Source URL: https://quizplus.com/quiz/77454

Sample Questions

Q1) On a bus topology LAN,each station can send and receive data to or from another station independent of other bus activity.

A)True

B)False

Q2) Which of the following LAN technologies has the highest capacity?

A)Ethernet

B)Fast Ethernet

C)Fibre Channel

D)Gigabit Ethernet

Q3) This short-wavelength option supports duplex links of up to 275 m using 62.5- m multimode or up to 550 m using 50- m multimode fiber.Wavelengths are in the range of 770-860 nm.

A)1000BASE-SX

B)1000BASE-T

C)1000BASE-LX

D)1000BASE-CX

Q4) A hub uses a ________ wiring arrangement to attach stations to the hub.

Q5) A _________ provides a means of interconnecting similar LANs.

Q6) A _________ is octets added to ensure that the frame is long enough for proper CD operation.

Page 15

To view all questions and flashcards with answers, click on the resource link above.

Chapter 14: Wireless Lans

Available Study Resources on Quizplus for this Chatper

45 Verified Questions

45 Flashcards

Source URL: https://quizplus.com/quiz/77453

Sample Questions

Q1) A basic rule of thumb for radio-based communication is that the higher the frequency,the shorter the transmission distance.

A)True

B)False

Q2) When all the stations in the BSS are mobile stations,with no connection to other BSSs,the BSS is called an ___________.

Q3) For privacy ,802.11 defined the __________ algorithm.

Q4) A __________ is any device that contains an IEEE 802.11 conformant MAC and physical layer.

Q5) Infrared LANs are an economic alternative to spread spectrum LANs.

A)True

B)False

Q6) The two frequency bands typically used by IEEE 802.11 wireless networks are located approximately at 900 MHz and 2.4 GHz.

A)True

B)False

Q7) The end result for 802.11 is a MAC algorithm called __________ that provides a distributed access control mechanism with an optional centralized control built on top of that.

Page 16

To view all questions and flashcards with answers, click on the resource link above.

Chapter 15: Wan Technology and Protocol

Available Study Resources on Quizplus for this Chatper

45 Verified Questions

45 Flashcards

Source URL: https://quizplus.com/quiz/77452

Sample Questions

Q1) __________ allows users to plan for network expansion and modifications arising as their needs change.

Q2) Data communications via circuit switching involves three phases:

A)connect,transfer,hang-up

B)ring,talk,hang-up

C)dial,transfer,disconnect

D)establishment,data transfer,disconnect

Q3) ________ are the means by which the network is managed and by which calls are established,maintained,and terminated.

Q4) In a circuit switching network,the path that will be used through the network is determined prior to any data transfer.

A)True B)False

Q5) _________ signals are used for the maintenance,troubleshooting,and overall operation of the network.

Q6) The public telephone network is a good example of a circuit switched network. A)True B)False

Q7) ________ signals identify a subscriber.

17

To view all questions and flashcards with answers, click on the resource link above.

Chapter 16: Wan Services

Available Study Resources on Quizplus for this Chatper

45 Verified Questions

45 Flashcards

Source URL: https://quizplus.com/quiz/77451

Sample Questions

Q1) A _________ is a bundle of virtual channels that have the same endpoints.

Q2) The cell loss priority within the ATM cell is similar to the DE bit in Frame Relay.

A)True

B)False

Q3) Which of the following lists the items in order such that the associated channel capacities are increasing?

A)ATM,X.25,Frame Relay,and ISDN

B)ISDN,ATM,Frame Relay,and X.25

C)ATM,Frame Relay,ISDN,and X.25

D)X.25,ISDN,Frame Relay,and ATM

Q4) Typically initiated when the network has begun to drop frames due to congestion,congestion _________ procedures are used to prevent network collapse in the face of severe congestion.

Q5) Basically a VPN that simplifies linking Ethernet LANs at remote locations,_________ is marketed as an alternative to traditional WAN services such as T-1,leased lines,and frame relay.

Q6) WAE uses _________ connectivity to deliver high-speed WAN service.

Q7) Most WAE implementations use __________to interconnect network endpoints.

Q8) Logical connections in ATM are referred to as __________.

To view all questions and flashcards with answers, click on the resource link above. Page 18

Chapter 17: Wireless Lans

Available Study Resources on Quizplus for this Chatper

45 Verified Questions

45 Flashcards

Source URL: https://quizplus.com/quiz/77450

Sample Questions

Q1) ___________ have the following characteristics: Circular orbit at an altitude in the range of 5000-12,000 km. The orbit period is about 6 hours. The diameter of coverage is from 10,000 to 15,000 km. Round-trip signal propagation delay is less than 50 ms. The maximum time that the satellite is visible from a fixed point on earth (above the radio horizon)is a few hours.

Q2) When using wireless systems,you are limited in how often you can use the same frequency band for different communications because the signals are not constrained and can interfere with each other even when separated geographically.

A)True

B)False

Q3) With ____________,a cell is divided into a number of wedge shaped sectors,each with its own set of channels,typically three or six sectors per cell.

Q4) Which of the following is NOT one of the components of the WAP specification?

A)A framework for wireless telephony applications

B)A full-featured communications protocol stack

C)A programming model based on the WWW

D)A markup language adhering to XML

Q5) The antenna systems on or near the earth are referred to as earth _________ .

To view all questions and flashcards with answers, click on the resource link above. Page 19

Chapter 18: Computer and Network Security Threats

Available Study Resources on Quizplus for this Chatper

45 Verified Questions

45 Flashcards

Source URL: https://quizplus.com/quiz/77449

Sample Questions

Q1) A _________ is code embedded in some legitimate program that is set to "explode" when certain conditions are met.

Q2) Which of the following is a type of scanning strategy?

A)hit list

B)topological

C)local subnet

D)all of the above

Q3) Of the three classes of intruders into computer systems and networks,the clandestine user is typically:

A)an insider to the organization

B)an outsider to the organization

C)either an insider or an outsider to the organization

D)none of the above

Q4) ___________ refers to programs (e.g.,script,macro,or other portable instruction) that can be shipped unchanged to a heterogeneous collection of platforms and execute with identical semantics.

Q5) A backdoor is the same as a trapdoor.

A)True

B)False

To view all questions and flashcards with answers, click on the resource link above. Page 20

Chapter 19: Computer and Network Security Techniques

Available Study Resources on Quizplus for this Chatper

45 Verified Questions

45 Flashcards

Source URL: https://quizplus.com/quiz/77448

Sample Questions

Q1) A typical use of circuit-level gateways is a situation in which the system administrator trusts the internal users.

A)True

B)False

Q2) The higher-layer protocols defined as part of SSL include:

A)handshake protocol

B)change cipher spec protocol

C)alert protocol

D)all of the above

Q3) IPSec transport mode provides protection primarily for:

A)the Internet layer

B)upper-layer protocols

C)network and link-layer protocols

D)all of the above

Q4) The primary benefit of a host-based IDS is that it can detect both external and internal intrusions.

A)True

B)False

Q5) The SSL Record Protocol provides two services for SSL connections: confidentiality and ___________.

21

To view all questions and flashcards with answers, click on the resource link above.

Turn static files into dynamic content formats.

Create a flipbook