Data Communications and Networking Test Questions - 599 Verified Questions

Page 1


Data Communications and Networking Test Questions

Course Introduction

Data Communications and Networking introduces the fundamental concepts and principles that underpin the transfer of data across computer networks. Students will explore topics such as network models, data transmission methods, protocol architectures, network devices, and various types of networks including LANs, WANs, and wireless systems. The course also covers critical aspects of error detection and correction, network security, and network management. Practical lab exercises reinforce theoretical concepts, enabling students to understand how data is sent, received, and managed in real-world scenarios, and preparing them for roles in network design, implementation, and troubleshooting.

Recommended Textbook Network+ Guide to Networks 7th Edition by Jill West

Available Study Resources on Quizplus

12 Chapters

599 Verified Questions

599 Flashcards

Source URL: https://quizplus.com/study-set/2166 Page 2

Chapter 1: Introduction to Networking

Available Study Resources on Quizplus for this Chatper

50 Verified Questions

50 Flashcards

Source URL: https://quizplus.com/quiz/43224

Sample Questions

Q1) Explain the two different categories of Application layer protocols,and then detail the PDU used at this layer.

Answer: Applicationlayer protocols are used by programs that fall into two categories: Application programs that provide services to a user,such as a browser and Webserver using the HTTP Application layer protocol

Utility programs that provide services to the system,such as SNMP (Simple NetworkManagement Protocol)programs that monitor and gather information about networktraffic and can alert network administrators about adverse conditions that needattention.Data that is passed between applications or utility programs and the operating system iscalled a payload and includes control information.The two end-system computers that initiatesending and receiving data are called hosts.

Q2) Which of the following is not one of the disadvantages of peer-to-peer networks?

A)They lack scalability

B)They are not necessarily secure

C)They are impractical for connecting large numbers of computers

D)They centralize user account logins

Answer: D

To view all questions and flashcards with answers, click on the resource link above. Page 3

Chapter 2: How Computers Find Each Other on Networks

Available Study Resources on Quizplus for this Chatper

49 Verified Questions

49 Flashcards

Source URL: https://quizplus.com/quiz/43225

Sample Questions

Q1) A loopback IP address begins with what number?

A)254

B)127

C)169

D)192

Answer: B

Q2) A ___________ is a DNS client that requests information from DNS name servers. Answer: resolver

Q3) What range of ports is referred to as the "well-known" range of ports?

A)0-1023

B)1024-49151

C)49152-65535

D)500 - 1024

Answer: A

Q4) Select the IPv6 address below that indicates a global unicast address:

A)FE80::10

B)2000::/3

C)FC00::/7

D)FD00::/8

Answer: A

To view all questions and flashcards with answers, click on the resource link above. Page 4

Chapter 3: How Data Is Transported Over Networks

Available Study Resources on Quizplus for this Chatper

50 Verified Questions

50 Flashcards

Source URL: https://quizplus.com/quiz/43226

Sample Questions

Q1) What netstat command option lists only current connections,including IP addresses and port numbers?

A)-s

B)-r

C)-n

D)-o

Answer: C

Q2) What protocol replaces ARP,IGMP,and ICMPv4 on IPv6 based networks?

A)ARPng

B)BGPv6

C)IGMPv6

D)ICMPv6

Answer: D

Q3) Which of the following is not a task handled by a router?

A)A router forwards broadcasts over the network.

B)A router can reroute traffic if the path of first choice is down but a second path is available.

C)A router can interpret Layer 3 and often Layer 4 addressing.

D)A router can connect dissimilar networks.

Answer: A

To view all questions and flashcards with answers, click on the resource link above. Page 5

Chapter 4: Structured Cabling and Networking Elements

Available Study Resources on Quizplus for this Chatper

50 Verified Questions

50 Flashcards

Source URL: https://quizplus.com/quiz/43227

Sample Questions

Q1) Select the two Transport Layer protocols that are used by SANs:

A)Fibre Channel

B)iSCSI

C)SAS

D)SATA

Q2) The industry-standard unit for measuring rackheight.Standard racks are 42U tall-about 6 feet.

A)airflow

B)alternating current (AC)

C)collision domain

D)direct current (DC)

E)FCS (frame check sequence)

F)inverter

G)NAS (Network attached storage)

H)power converter

I)rack unit (RU)

J)voltage regulator

Q3) A volt-ampere (VA)is the product of the voltage and the ________________ of the electricity on a line.

Q4) Describe the differences between a brownout and a blackout.

Page 6

To view all questions and flashcards with answers, click on the resource link above.

Chapter 5: Network Cabling

Available Study Resources on Quizplus for this Chatper

50 Verified Questions

50 Flashcards

Source URL: https://quizplus.com/quiz/43228

Sample Questions

Q1) A measure of a signal's strength at any given time is known as which term below?

A)amplitude

B)frequency

C)phase

D)wavelength

Q2) A form of transmission that allows multiplesignals to travel simultaneously over one medium.

A)1000Base-LX

B)1000Base-TX

C)ASCII

D)Cat (category)

E)DWDM (Dense Wavelength Division Multiplexing)

F)far end cross-talk (FEXT)

G)multiplexing

H)short circuit

I)throughput

J)wavelength

Q3) Multimode fiber contains a core that is larger than a single mode fiber core.

A)True

B)False

To view all questions and flashcards with answers, click on the resource link above. Page 7

Chapter 6: Wireless Networking

Available Study Resources on Quizplus for this Chatper

50 Verified Questions

50 Flashcards

Source URL: https://quizplus.com/quiz/43229

Sample Questions

Q1) All wireless signals are carried through the air by electromagnetic waves.

A)True

B)False

Q2) How many address fields exist in an 802.11 frame?

A)2

B)3

C)4

D)6

Q3) The proportion of noise to the strength of a signal is called the _________________.

Q4) What two frequencies are used for most wireless networks?

A)900 MHz

B)2.4 GHz

C)4.9 GHz

D)5 GHz

Q5) In an 802.11 data frame,what is the size of the frame check sequence field?

A)2 bytes

B)4 bytes

C)6 bytes

D)8 bytes

To view all questions and flashcards with answers, click on the resource link above. Page 8

Chapter 7: Cloud Computing and Remote Access

Available Study Resources on Quizplus for this Chatper

50 Verified Questions

50 Flashcards

Source URL: https://quizplus.com/quiz/43230

Sample Questions

Q1) The SSH service listens on what TCP port?

A)20

B)21

C)22

D)23

Q2) A service model in whichapplications are provided through an online user interfaceand are compatible with a multitude of devices and operatingsystems.

A)IaaS (Infrastructure as a Service)

B)PaaS (Platform as a Service)

C)SaaS (Software as a Service)

D)PPP (Point to Point Protocol)

E)IKE (Internet Key Exchange)

F)AH (Authentication Header)

G)ESP (Encapsulating Security Payload)

H)CHAP (Challenge Handshake Authentication Protocol)

I)TKIP (Temporal Key Integrity Protocol)

J)KDC (Key Distribution Center)KDC)

Q3) Describe the three way handshake process as used by CHAP.

Q4) When PPP is used over an Ethernet network,it is known as ________________.

Q5) Describe how public key encryption works.

Page 9

To view all questions and flashcards with answers, click on the resource link above.

Chapter 8: Network Risk Management

Available Study Resources on Quizplus for this Chatper

50 Verified Questions

50 Flashcards

Source URL: https://quizplus.com/quiz/43231

Sample Questions

Q1) A proxy that provides Internet clients access to services on its own network is known as what type of proxy?

A)reverse proxy

B)cache proxy

C)service proxy

D)inverse proxy

Q2) Which virus below combines polymorphism and stealth techniques to create a very destructive virus?

A)Natas

B)Macro

C)Michelangelo

D)Stoned

Q3) Which two viruses below are examples of boot sector viruses?

A)Michelangelo

B)Stoned

C)Natas

D)Klez

Q4) Describe a boot sector virus.

Q5) Describe some of the characteristics of malware that make it difficult to detect.

To view all questions and flashcards with answers, click on the resource link above. Page 10

Chapter 9: Unified Communications and Network Performance Management

Available Study Resources on Quizplus for this Chatper

50 Verified Questions

50 Flashcards

Source URL: https://quizplus.com/quiz/43232

Sample Questions

Q1) What are the minimum functions supported by all network monitoring tools?

Q2) Which of the following is not a requirement in order to use a softphone?

A)An IP telephony client.

B)The ability to communicate with a digital telephone switch.

C)A microphone and speakers,or a headset.

D)A wireless carrier to handle the voice path.

Q3) What two terms below describe a network device with three ports,two of which send and receive all traffic,and the third port mirrors the traffic?

A)network hub

B)network tap

C)network splitter

D)packet sniffer

Q4) What is the Health Insurance Portability and Accountability Act (HIPAA)?

Q5) What two log files are used by older versions of Unix and newer version of Linux to store log information?

A)/var/log/messages

B)/var/log/syslog

C)/var/log/log

D)/var/adm/messages

To view all questions and flashcards with answers, click on the resource link above. Page 11

Chapter 10: Network Segmentation and Virtualization

Available Study Resources on Quizplus for this Chatper

50 Verified Questions

50 Flashcards

Source URL: https://quizplus.com/quiz/43233

Sample Questions

Q1) With VTP,the VLAN database is stored on a switch known as which option below?

A)root bridge

B)stack master

C)trunk root

D)vlan server

Q2) A switch is typically preconfigured with one _______________ that includes all its ports.

Q3) The Spanning Tree Protocol stipulates that on any bridge,only one root port,which is the bridge's port that is closest to the root bridge,can forward frames toward the root bridge.

A)True

B)False

Q4) Network segmentation decreases both performance and security on a network.

A)True

B)False

Q5) Only Class B and Class C networks can be subnetted.

A)True

B)False

Q6) To eliminate the possibility of traffic loops on switches and bridges,the ________________ is used.

Page 12

To view all questions and flashcards with answers, click on the resource link above.

Chapter 11: Wide Area Networks

Available Study Resources on Quizplus for this Chatper

50 Verified Questions

50 Flashcards

Source URL: https://quizplus.com/quiz/43234

Sample Questions

Q1) In a PON system,an OLT contains a splitter that splits each port into how many logical channels?

A)16

B)32

C)64

D)96

Q2) What are some of the features of the WiMAX standard?

Q3) In ATM,a packet is called a _____________ and always consists of 48 bytes of data plus a 5 byte header.

Q4) What is the frequency range of the C-band that is used by satellites?

A)1.5 - 2.7 GHz

B)2.7 - 3.5 GHz

C)3.4 - 6.7 GHz

D)12 - 18 GHz

Q5) How many channels exist in a T1 connection?

A)1

B)24

C)48

D)96

Q6) List and describe the four different generations of cellular technology.

Page 13

To view all questions and flashcards with answers, click on the resource link above.

Chapter 12: Industrial and Enterprise Networking

Available Study Resources on Quizplus for this Chatper

50 Verified Questions

50 Flashcards

Source URL: https://quizplus.com/quiz/43235

Sample Questions

Q1) Which type of recovery site is a place where computers,devices,and connectivity necessary to rebuild a network exist,with some pieces appropriately configured,updated,or connected?

A)cold site

B)warm site

C)hot site

D)temp site

Q2) An enclosure made of conductive material thatis designed to block electromagnetic signals,including Wi-Fi.

A)acquisitions server

B)biorecognition access

C)degausser

D)Faraday cage

E)human-machine interfaces (HMI)

F)master terminal unit (MTU)

G)prox card

H)smart card

I)SOW (statement of work)

J)telemetry

Q3) The goal of a disaster recovery plan is to ensure ______________.

To view all questions and flashcards with answers, click on the resource link above. Page 14

Turn static files into dynamic content formats.

CreateΒ aΒ flipbook