Business Data Networks Review Questions - 1009 Verified Questions

Page 1


Business Data Networks

Review Questions

Course Introduction

Business Data Networks explores the principles and practices underlying modern organizational data communication systems. The course covers foundational topics such as network architectures, protocols, and hardware, as well as key issues in network design, management, and security. Students learn about the operational needs of business environments, including local area networks (LANs), wide area networks (WANs), wireless networking, and cloud connectivity. Through practical case studies and hands-on exercises, students develop the skills necessary to evaluate, implement, and maintain network solutions that support business goals and enable secure, efficient data exchange across enterprises.

Recommended Textbook

Business Data Networks and Security 11th Edition by Raymond R. Panko

Available Study Resources on Quizplus

12 Chapters

1009 Verified Questions

1009 Flashcards

Source URL: https://quizplus.com/study-set/2197 Page 2

Chapter 1: Core Network Concepts and Terminology

Available Study Resources on Quizplus for this Chatper

68 Verified Questions

68 Flashcards

Source URL: https://quizplus.com/quiz/43742

Sample Questions

Q1) When a source host sends a packet to a destination host,there will probably be ________ along the way.

A) more routes

B) more data links

C) about the same number of routes and data links

D) all of the above

Answer: B

Q2) A packet sent from one host to another over the Internet will ALWAYS pass through

A) a single ISP

B) more than 2 ISPs

C) exactly 2 ISPs

D) none of the above

Answer: D

Q3) Most servers are ________.

A) mainframes

B) Windows PCs

C) rack servers

D) routers

Answer: C

To view all questions and flashcards with answers, click on the resource link above. Page 3

Chapter 2: Network Standards

Available Study Resources on Quizplus for this Chatper

112 Verified Questions

112 Flashcards

Source URL: https://quizplus.com/quiz/43743

Sample Questions

Q1) TCP messages are called ________.

A) frames

B) packets

C) segments

D) fragments

Answer: C

Q2) Which of the following is an architecture?

A) ISO

B) IETF

C) both A and B

D) neither A nor B

Answer: D

Q3) Which layer governs wires?

A) transport

B) physical

C) Internet

D) none of the above

Answer: B

To view all questions and flashcards with answers, click on the resource link above.

4

Chapter 3: Network Management

Available Study Resources on Quizplus for this Chatper

66 Verified Questions

66 Flashcards

Source URL: https://quizplus.com/quiz/43744

Sample Questions

Q1) Priority is a way to handle a chronic lack of capacity.

A)True

B)False

Answer: False

Q2) In a coffee shop hot spot,the rated speed is 10 Mbps.Throughput is about half of the rated speed.There are ten people using the hot spot.If you and three others are transmitting or receiving at the same time,what speed should you expect to get?

A) 0.5 Mbps

B) 1 Mbps

C) 1.25 Mbps

D) none of the above

Answer: C

Q3) In SDN,applications ________.

A) increase network management labor

B) are required to make SDN work effectively

C) both A and B

D) neither A nor B

Answer: B

To view all questions and flashcards with answers, click on the resource link above. Page 5

Chapter 4: Network Security

Available Study Resources on Quizplus for this Chatper

106 Verified Questions

106 Flashcards

Source URL: https://quizplus.com/quiz/43745

Sample Questions

Q1) A specific encryption method is called a ________.

A) code

B) schema

C) key method

D) cipher

Q2) Trojan horses can spread by ________.

A) e-mailing themselves to victim computers

B) directly propagating to victim computers

C) both A and B

D) neither A nor B

Q3) In a DDoS attack,a ________ sends messages directly to the victim.

A) botmaster

B) bot

C) command and control server

D) all of the above

Q4) The Target attackers sold stolen card information to ________.

A) crimeware shops

B) card shops

C) card counterfeiters

D) all of the above

To view all questions and flashcards with answers, click on the resource link above. Page 6

Chapter 5: Ethernet 8023switched Lans

Available Study Resources on Quizplus for this Chatper

91 Verified Questions

91 Flashcards

Source URL: https://quizplus.com/quiz/43746

Sample Questions

Q1) The longest transmission distances are possible with ________.

A) USB

B) UTP

C) single-mode fiber

D) multimode fiber

Q2) ARP cache poisoning is ________.

A) a DoS attack

B) a DDoS attack

C) an illegal login attack

D) a man-in-the middle attack

Q3) To transmit five bits per clock cycle,you must have ________ states.

A) 5

B) 16

C) 32

D) none of the above

Q4) Which UTP quality levels can send signals at 10 gigabits per second?

A) category 6

B) category 6A

C) both A and B

D) neither A nor B

Page 7

To view all questions and flashcards with answers, click on the resource link above.

Chapter 6: Wireless Lans I

Available Study Resources on Quizplus for this Chatper

92 Verified Questions

92 Flashcards

Source URL: https://quizplus.com/quiz/43747

Sample Questions

Q1) The 802.11 standard has two mechanisms for media access control.Of the two,________ is mandatory.

A) MAC

B) CSMA/CA+ACK

C) RTS/CTS

D) CSMA/CD

Q2) In CSMA/CA,CS means ________.

A) cancel sending

B) counter-source

C) carriage suspension

D) carrier sense

Q3) What is the bandwidth of a channel that extends from 55 MHz to 60 MHz?

A) 60 MHz

B) 55 MHz

C) 65 MHz

D) none of the above

Q4) Wireless access points typically link wireless clients to ________.

A) wireless servers

B) servers on the wired network

C) both A and B

Page 8

To view all questions and flashcards with answers, click on the resource link above.

Chapter 7: Wireless Lans II

Available Study Resources on Quizplus for this Chatper

73 Verified Questions

73 Flashcards

Source URL: https://quizplus.com/quiz/43748

Sample Questions

Q1) Bluetooth ________ is likely to be used most of the time in IoT transmission.

A) HDR

B) HS

C) LE

D) COIN

Q2) Wi-Fi direct ________ uses access points.

A) always

B) usually

C) rarely

D) never

Q3) The protection of communication between a wireless client and the access point is ________.

A) link security

B) end-to-end security

C) both A and B

D) neither A nor B

Q4) You can test whether an evil twin attack has taken place against your wireless client.

A)True

B)False

To view all questions and flashcards with answers, click on the resource link above. Page 9

Chapter 8: TCP/IP Internetworking I

Available Study Resources on Quizplus for this Chatper

86 Verified Questions

86 Flashcards

Source URL: https://quizplus.com/quiz/43749

Sample Questions

Q1) ________ are the only extension headers that all routers must consider.

A) Destination options

B) Mobility headers

C) Encapsulating security protocol headers

D) Hop-by-hop options

Q2) Simplification of IPv6 addresses must be standardized ________.

A) to maximize text compression

B) for the retrieval of IPv6 addresses in text fields of documents and spreadsheets

C) both A and B

D) neither A nor B

Q3) The maximum application message size when UDP is used at the transport layer is approximately ________.

A) 16,000 bytes

B) 64,000 bytes

C) 1 million bytes

D) none of the above

To view all questions and flashcards with answers, click on the resource link above. Page 10

Chapter 9: TCP/IP Internetworking II

Available Study Resources on Quizplus for this Chatper

81 Verified Questions

81 Flashcards

Source URL: https://quizplus.com/quiz/43750

Sample Questions

Q1) Which of the following would be an SNMP object?

A) number of rows in routing table

B) system uptime (since last reboot)

C) both A and B

D) neither A nor B

Q2) Your firm has a 22-bit network part and a 6-bit subnet part.How many hosts can you have per subnet?

A) 6

B) 8

C) 14

D) none of the above

Q3) IPsec is used for ________ VPNs.

A) remote-access

B) site-to-site

C) both A and B

D) neither A nor B

Q4) NAT is transparent to all applications.

A)True

B)False

To view all questions and flashcards with answers, click on the resource link above. Page 11

Chapter 10: Carrier Wide Area Networks Wans

Available Study Resources on Quizplus for this Chatper

81 Verified Questions

81 Flashcards

Source URL: https://quizplus.com/quiz/43751

Sample Questions

Q1) Most end-office switches are Class ________ switches.

A) 1

B) 2

C) 4

D) 5

Q2) LANs are ________.

A) single networks

B) local internets

C) either A or B

D) neither A nor B

Q3) In Carrier Ethernet,which service is a competitor for leased line service?

A) E-Line

B) E-LAN

C) both A and B

D) neither A nor B

Q4) Traffic shaping reduces traffic by ________.

A) compression

B) preventing or limiting undesirable traffic from entering the network

C) both A and B

To view all questions and flashcards with answers, click on the resource link above. Page 12

Chapter 11: Networked Applications

Available Study Resources on Quizplus for this Chatper

84 Verified Questions

84 Flashcards

Source URL: https://quizplus.com/quiz/43752

Sample Questions

Q1) In Skype,transport is governed by ________.

A) peers providing signaling

B) super nodes

C) Skype servers

D) direct communication between the calling and receiving peers

Q2) SIP is a ________ protocol for VoIP.

A) signaling

B) transport

C) both A and B

D) neither A nor B

Q3) A traditional e-mail user retrieving messages from her mail server could use

A) IMAP

B) HTTP

C) HTML

D) SMTP

Q4) Telephones that can plug directly into a VoIP network are called PCs with multimedia hardware and added software.

A)True

B)False

Page 13

To view all questions and flashcards with answers, click on the resource link above.

Chapter 12: Appendix: Managing the Security Process

Available Study Resources on Quizplus for this Chatper

69 Verified Questions

69 Flashcards

Source URL: https://quizplus.com/quiz/43741

Sample Questions

Q1) The policy server creates ________.

A) DMZs

B) policies

C) ACLs for individual firewalls

D) standards that firewalls must follow

Q2) An attacker must break through two firewalls to get to a host.This most specifically illustrates the ________ principle.

A) comprehensive security

B) risk assurance

C) weakest link protection

D) defense in depth

Q3) The statement that people in quality control should have access to robots on the shop floor is an example of a firewall ________.

A) policy

B) DMZ

C) ACL rule

D) procedure

To view all questions and flashcards with answers, click on the resource link above.

14

Turn static files into dynamic content formats.

CreateΒ aΒ flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.