

Data Communications
Midterm Exam
Course Introduction
Data Communications explores the fundamental principles and technologies involved in the exchange of data between computers and networked devices. The course covers key concepts such as transmission media, encoding techniques, error detection and correction, data link protocols, and network topologies. Students learn about both wired and wireless communication methods, standards such as Ethernet and Wi-Fi, and the layered protocols that make modern networking possible. Practical topics also include data security, performance measurement, and strategies for optimizing communication in diverse network environments. Through theoretical study and hands-on projects, students gain a comprehensive understanding of how data is reliably transmitted and managed in today's interconnected world.
Recommended Textbook
Computer Networking from LANs to WANs Hardware Software and Security 1st Edition by
Available Study Resources on Quizplus
24 Chapters
720 Verified Questions
720 Flashcards
Source URL: https://quizplus.com/study-set/1764

Page 2
Jr. Kenneth
Chapter 1: What Is a Computer Network
Available Study Resources on Quizplus for this Chatper
30 Verified Questions
30 Flashcards
Source URL: https://quizplus.com/quiz/35121
Sample Questions
Q1) Describe how data is represented when an analog medium is used.
Answer: When an analog medium is used to transmit digital data (such as through the telephone system with a modem),the digital data may be represented by various forms of a carrier-modulated signal.Two forms of carrier modulation are amplitude modulation and frequency-shift keying.In amplitude modulation,the digital data controls the presence of a fixed-frequency carrier signal.In frequency-shift keying,the 0s and 1s are assigned two different frequencies,resulting in a shift in carrier frequency when the data changes from 0 to 1 or from 1 to 0.A third method is called phase-shift keying,in which the digital data controls the phase shift of the carrier signal.
Q2) Just throwing 1s and 0s onto a communication link is enough to establish coherent communication between two nodes in a network.
A)True
B)False
Answer: False
Q3) Different ____________________ are used between layers of the OSI model to handle such things as error recovery and information routing between nodes.
Answer: protocols
To view all questions and flashcards with answers, click on the resource link above.

Page 3

Chapter 2: Network Topology
Available Study Resources on Quizplus for this Chatper
30 Verified Questions
30 Flashcards
Source URL: https://quizplus.com/quiz/35122
Sample Questions
Q1) A(n)____________________ network is owned and managed by a private organization or company and may have a much larger bandwidth capability than a public network.
Answer: private
Q2) Describe a private network.
Answer: A private network is owned and managed by a private organization or company and may have a much larger bandwidth capability than a public network,depending on how much money its parent company invests in network infrastructure (by installing its own media between sites or by leasing private,dedicated communication lines from the telephone company).Private networks have higher maintenance costs per user and have the capability of restricting access to sensitive data.
Q3) In a fully connected network,the number of connections at each node equals the total number of nodes plus one. A)True
B)False
Answer: False
Q4) In a star network,all nodes connect to a central communications
Answer: hub
To view all questions and flashcards with answers, click on the resource link above. Page 4

Chapter 3: Networking Hardware
Available Study Resources on Quizplus for this Chatper
30 Verified Questions
30 Flashcards
Source URL: https://quizplus.com/quiz/35123
Sample Questions
Q1) ____________________,also called concentrators,expand one Ethernet connection into many.
Answer: Hubs
Q2) Describe a satellite network system.
Answer: The Hughes Corporation offers a unique solution to low-speed Internet connections.For a few hundred dollars,you can buy their HughesNet Internet satellite networking system.Internet data comes to your PC via satellite at speeds between 500Kbps to 800Kbps.Upload speeds are considerably slower at approximately 128Kbps,but well within an acceptable range.This is an ideal situation for browsing,when you need to receive information fast (if a Web page contains many images)but only send information out (clicking on a new URL to load a new page)occasionally.A lower-speed connection for transmitted packets is generally acceptable,unless you are uploading large files to an FTP site or sending e-mail with large attachments.If there is no cable where you live or work (for a cable modem connection),HughesNet or another Internet satellite provider may be the answer for you.
Q3) The maximum length of a thinwire Ethernet segment is ____________________ meters.
Answer: 185
To view all questions and flashcards with answers, click on the resource link above.
Page 5

Chapter 4: Ethernet Technology
Available Study Resources on Quizplus for this Chatper
30 Verified Questions
30 Flashcards
Source URL: https://quizplus.com/quiz/35124
Sample Questions
Q1) Packet ____________________ keep track of many different Ethernet errors.
Q2) The destination address is the destination ____________________ address of the station that is to receive the frame.
Q3) When the frame size is smaller,more of the available bandwidth is utilized.
A)True
B)False
Q4) The maximum frame size allowed on the network.
A)Jabber
B)Jam sequence
C)Runt
D)MTU
E)Collision domain
Q5) Diffused IR uses line-of-sight IR lasers and provides a faster data rate than diffused IR.
A)True
B)False
Q6) Describe CSMA/CA.
Q7) List three properties that 10base5,10base2 and 10baseT have in common.
Page 6
Q8) Describe the destination address of an Ethernet frame.
Q9) The Ethernet ____________________ is the time required to transmit 512 bits.
To view all questions and flashcards with answers, click on the resource link above.
Page 7

Chapter 5: Token-Ring, fddi, and Other LAN Technologies
Available Study Resources on Quizplus for this Chatper
30 Verified Questions
30 Flashcards
Source URL: https://quizplus.com/quiz/35125
Sample Questions
Q1) The topology of a Bluetooth network is called a ____.
A)micronet
B)piconet
C)mininet
D)petanet
Q2) List three things that diagnosing problems with LAN technologies requires.
Q3) Contains support for voice,video,and other multimedia applications
A)ARCnet
B)Token
C)Bluetooth
D)Scatternet
E)FDDI-II
Q4) In a token-ring network,one station on the ring acts as the ____ and is responsible for ensuring that valid tokens circulate on the ring.
A)passive monitor
B)active relay
C)active monitor
D)passive relay
Q5) Describe Bluetooth.
Q6) Describe broadband LANs.
To view all questions and flashcards with answers, click on the resource link above. Page 8

Chapter 6: Network Design and Troubleshooting Scenarios
Available Study Resources on Quizplus for this Chatper
30 Verified Questions
30 Flashcards
Source URL: https://quizplus.com/quiz/35126
Sample Questions
Q1) Windows machines with built-in networking support will automatically communicate over the network via ____.
A)NETBEUI
B)NETBIOS
C)IPX/SPX
D)TCP/IP
Q2) The ______________________________ window shows the network information (addresses,mask,lease details,etc. )on a Windows XP computer system.
Q3) Manages voice and data traffic between the residential user,PSTN switch,and ISP
A)PSTN
B)DSLAM
C)Baseband network
D)T1 line
E)Broadband communication networks
Q4) If your machine is properly networked,you should be able to open up My Network ____________________ and see hosts sharing resources on the network.
Q5) The use of coax in Ethernet networking installations is obsolete.
A)True
B)False
To view all questions and flashcards with answers, click on the resource link above. Page 9

Chapter 7: Low-Level Protocols
Available Study Resources on Quizplus for this Chatper
30 Verified Questions
30 Flashcards
Source URL: https://quizplus.com/quiz/35127
Sample Questions
Q1) Originally used by IBM for its LAN Manager network
A)SLIP
B)Parity
C)Baud
D)NetBEUI
E)Serial
Q2) A(n)____________________ is where networking data are transmitted or received.
Q3) In serial communication,an 8-bit binary number is transmitted one bit at a time,beginning with the ____________________ bit.
Q4) The last two bits in the transmission frame for a wave form are the ____ bits.
A)hold
B)start
C)stop
D)separation
Q5) Describe PPPoE.
Q6) The main component of a NetBIOS message is the ____ it carries.
A)SMS
B)SMB
C)SMF
D)IOP
To view all questions and flashcards with answers, click on the resource link above. Page 10
Chapter 8: The Tcpip Protocols
Available Study Resources on Quizplus for this Chatper
30 Verified Questions
30 Flashcards
Source URL: https://quizplus.com/quiz/35128
Sample Questions
Q1) ____ defines the format and meaning of messages exchanged by the manager and agents.
A)SNMP
B)HTTP
C)HTTPS
D)SMTP
Q2) Allows a user to establish a terminal emulation connection on a remote computer
A)Telnet session
B)HTTPS
C)FTP
D)RFCs
E)PING
Q3) Describe SMTP.
Q4) Allows a user to log in to a remote computer and transfer files back and forth through simple commands
A)Telnet session
B)HTTPS
C)FTP
D)RFCs
E)PING

11
To view all questions and flashcards with answers, click on the resource link above.

Chapter 9: Ipxspx, Appletalk, and Other Network Protocols
Available Study Resources on Quizplus for this Chatper
30 Verified Questions
30 Flashcards
Source URL: https://quizplus.com/quiz/35129
Sample Questions
Q1) The first part of a DECnet Phase V address is called the ____.
A)source part
B)initial domain part
C)initial source part
D)initial interface part
Q2) Responsible for the majority of traffic on a NetWare network
A)Internet Packet Exchange (IPX)protocol
B)SSCP
C)NCP
D)IPX/SPX protocol suite
E)Sequenced Packet Exchange (SPX)protocol
Q3) A(n)____ unit is used to access the programs run by the end user.
A)physical
B)interpreted
C)logical
D)virtual
Q4) Describe NCP.
Q5) List the services that IBM developed to connect the logical units of SNA.
Q6) The communication between two NAUs is called a(n)____________________.
Q7) List the four fields of the domain-specific part of the DECnet address.
To view all questions and flashcards with answers, click on the resource link above. Page 12

Chapter 10: Switching and Routing
Available Study Resources on Quizplus for this Chatper
30 Verified Questions
30 Flashcards
Source URL: https://quizplus.com/quiz/35130
Sample Questions
Q1) Section of the switch that contains the Ethernet receiving logic
A)Crossbar switch
B)Buffer
C)Switching fabric
D)Input port logic
E)Multiplexed bus
Q2) The MAC address and port number are stored in a special high-speed memory called ____.
A)content accessible memory
B)content addressable memory
C)common addressable memory
D)content attainable memory
Q3) The ____ algorithm is a type of routing algorithm that is based on the number of hops in a route between a source and destination computer.
A)distance-vector routing
B)distance-volume routing
C)distance-domain routing
D)domain-vector routing
Q4) List five characteristics of a link-state router.
Q5) ____________________ switching reduces the latency of a switch tremendously.
To view all questions and flashcards with answers, click on the resource link above. Page 13

Chapter 11: Network Management and Security
Available Study Resources on Quizplus for this Chatper
30 Verified Questions
30 Flashcards
Source URL: https://quizplus.com/quiz/35131
Sample Questions
Q1) A(n)____ combines traffic sniffing with analysis techniques.
A)firewall
B)intrusion detection system
C)router
D)application firewall
Q2) List and describe five areas to consider in User Management.
Q3) A(n)____ is a stand-alone hardware unit that connects to the network or a software program running on a network host,collecting statistical information about the network performance.
A)program analyzer
B)packet analyzer
C)interface analyzer
D)protocol analyzer
Q4) Discuss the advantage of having a disk image.
Q5) Integrity of information is achieved through encryption.
A)True
B)False
Q6) List five disaster recovery safeguards that can be used to help guarantee a relatively quick and painless recovery in the event that a disaster occurs.
Page 14
To view all questions and flashcards with answers, click on the resource link above.

Chapter 12: Electronic Mail
Available Study Resources on Quizplus for this Chatper
30 Verified Questions
30 Flashcards
Source URL: https://quizplus.com/quiz/35132
Sample Questions
Q1) A Telnet session to a POP3 server is accomplished by entering a command similar to
A)telnet athena.sunybroome.edu 25
B)telnet athena.sunybroome.edu 1101
C)telnet athena.sunybroome.edu 110
D)telnet 110 athena.sunybroome.edu
Q2) The ____________________ encoding method is used to encode 8-bit text codes such as those used in a foreign language character set into 7-bit U.S.ASCII characters.
Q3) Why should public e-mail client computer systems never be configured to save an e-mail password?
Q4) A(n)____________________ program exchanges information with a designated e-mail server to send and receive messages.
Q5) Used primarily to transfer binary attachments
A)Header
B)IMAP
C)IMAP4
D)Base64 encoding method
E)SMTP
Q6) Discuss the issue with sending messages in clear text.
Page 15
To view all questions and flashcards with answers, click on the resource link above.

Chapter 13: FTP and Telnet
Available Study Resources on Quizplus for this Chatper
30 Verified Questions
30 Flashcards
Source URL: https://quizplus.com/quiz/35133
Sample Questions
Q1) The initial response from an FTP server is called the ____.
A)greeting
B)handshake
C)sync
D)connect
Q2) FTP uses connection-oriented TCP as the underlying transport protocol providing the guaranteed reliability.
A)True
B)False
Q3) When using ____________________ FTP,it is necessary to provide a valid username and password in order to access the private files on the FTP server.
Q4) It is always a good idea to record the FTP activity of the server into a(n)____________________ file.
Q5) Initially,FTP was designed to run on ____ connected to a mainframe computer.
A)weak terminals
B)smart terminals
C)soft terminals
D)dumb terminals
Q6) The FTP client can use any port numbers greater than ____________________.
Page 16
To view all questions and flashcards with answers, click on the resource link above.

Chapter 14: Multimedia Networking
Available Study Resources on Quizplus for this Chatper
30 Verified Questions
30 Flashcards
Source URL: https://quizplus.com/quiz/35134
Sample Questions
Q1) ____________________ is a method for sending voice and fax data using the IP protocol.
Q2) The algorithm used to sample,digitize,and recreate the video (and audio)stream
A)Lossy compression
B)IGMP
C)CODEC
D)Lossless compression
E)MPEG
Q3) In order to play audio and video clips downloaded off the network,it is necessary to have the proper ____ installed.
A)CODERs
B)CODECs
C)DECs
D)CODs
Q4) None of the original image data is lost during compression
A)Lossy compression
B)IGMP
C)CODEC
D)Lossless compression
E)MPEG
To view all questions and flashcards with answers, click on the resource link above. Page 17

Chapter 15: The Internet
Available Study Resources on Quizplus for this Chatper
30 Verified Questions
30 Flashcards
Source URL: https://quizplus.com/quiz/35135
Sample Questions
Q1) ____________________ is an application that provides the capability for a user to send and receive instant messages,which are delivered to the recipient instantly-even faster than electronic mail.
Q2) Java consists of a programming language,a run-time environment,and a class dictionary.
A)True
B)False
Q3) Describe the Java programming language.
Q4) One of the most popular Web server programs for business and personal use is the ____ from the Apache Software Foundation.
A)Apache Server
B)Native Server
C)Python Server
D)Navajo Server
Q5) Describe XML.
Q6) ____________________ Web pages contain a combination of HTML code and Java applets,or Microsoft Active Server Pages.
Q7) ___________________ is a programming language used to perform client side processing on the Web.
Page 18
To view all questions and flashcards with answers, click on the resource link above.

Chapter 16: Writing a Network Application
Available Study Resources on Quizplus for this Chatper
30 Verified Questions
30 Flashcards
Source URL: https://quizplus.com/quiz/35136
Sample Questions
Q1) The IP Address Calculator CGI application uses its ____ data to determine what class of IP address was supplied.
A)FORM
B)OPTION
C)ACTION
D)POST
Q2) The IPS device operates using ____.
A)TCP
B)UDP
C)ICMP
D)IETF
Q3) List five of the special features of the IPS device.
Q4) Associates the protocol (Internet),the IP address (ANY)and the specific port number (7500)with a socket
A)Connectionless communication
B)Socket binding
C)Socket
D)Connection-oriented communication
E)Administrator privileges
Q5) Perl programs are called ____________________.
To view all questions and flashcards with answers, click on the resource link above. Page 19

Chapter 17: An Introduction to Networking With Windows
Available Study Resources on Quizplus for this Chatper
30 Verified Questions
30 Flashcards
Source URL: https://quizplus.com/quiz/35137
Sample Questions
Q1) Whenever you use a network to transfer data,an entire set of ____________________ is used to set up and maintain reliable data transfer between the two network stations.
Q2) Allows you to add,modify,or remove various networking components
A)Thin client
B)DHCP server
C)Network Properties menu
D)Dial-Up Networking
E)NetBEUI
Q3) Describe how to map a network drive.
Q4) TCP/IP will not work without a DNS server.
A)True
B)False
Q5) Although Windows supports many different types of common networking protocols,the backbone of its original network operations were based on ____.
A)TCPBEUI
B)IPX/SPX
C)NetBEUI
D)WinBEUI
Q6) List the three components that the ICA uses.
To view all questions and flashcards with answers, click on the resource link above. Page 20

Chapter 18: Windows Domains
Available Study Resources on Quizplus for this Chatper
30 Verified Questions
30 Flashcards
Source URL: https://quizplus.com/quiz/35138
Sample Questions
Q1) List four different versions of the Windows 2008 Server operating system.
Q2) When a new ____________________ domain is created,it takes advantage of the existing domain resources.
Q3) List the categories of choices for Active Directory installation when a domain already exists.
Q4) When is the Administrator account created in Windows NT?
Q5) Using the Windows Server operating systems,a dial-in user can be granted access to the network resources using ____.
A)RRAN
B)RAS
C)RIAS
D)RIS
Q6) The domain controller in the Windows 2000 domains is encapsulated into a product called the ____.
A)Windows Directory
B)Activated Directory
C)Network Directory Services
D)Active Directory
Q7) List four important Active Directory Management features.
To view all questions and flashcards with answers, click on the resource link above. Page 21

Chapter 19: Unix and Linux
Available Study Resources on Quizplus for this Chatper
30 Verified Questions
30 Flashcards
Source URL: https://quizplus.com/quiz/35139
Sample Questions
Q1) The ____ program allows for a Linux system to participate in a Windows network by sharing files and printers using SMB (Server Message Blocks)and CIFS (Common Internet File System)protocols.
A)Wimba
B)Samba
C)Winbind
D)WINE
Q2) Many of the programs available in UNIX and Linux can be run from the "Terminal" window ___________________ prompt.
Q3) The software for Red Hat Fedora Linux is distributed free of charge.
A)True
B)False
Q4) The ____ operating system has been available since the 1970 and was originally developed by Ken Thompson,Dennis Ritchie,and others at AT&T labs.
A)Linux
B)BSD
C)UNIX
D)GNU
Q5) Describe NIS+.
To view all questions and flashcards with answers, click on the resource link above. Page 22

Chapter 20: Other Network Operating Systems
Available Study Resources on Quizplus for this Chatper
30 Verified Questions
30 Flashcards
Source URL: https://quizplus.com/quiz/35140
Sample Questions
Q1) A workstation connecting to a NetWare server may do so by installing the appropriate ____________________ software.
Q2) Selecting a network operating system should be based solely on the features provided.
A)True
B)False
Q3) What is NDS?
Q4) Why is it always best to run the latest version of Mac system software?
Q5) A core component of NetWare consists of the services available for managing and using ____________________.
Q6) Inherited and/or modified via filters or masks that designate permissible operations
A)Across-the-wire migration
B)OpenVMS
C)System area network card
D)In-place migration
E)Rights
Q7) Describe the two ways to perform an upgrade of NetWare.
Q8) List four activities involved in managing any network to ensure quality control.
Q9) The latest version of NetWare is version ____________________.
To view all questions and flashcards with answers, click on the resource link above. Page 23

Chapter 21: Cryptography and Security
Available Study Resources on Quizplus for this Chatper
30 Verified Questions
30 Flashcards
Source URL: https://quizplus.com/quiz/35141
Sample Questions
Q1) A single key is used to encrypt and decrypt the data
A)Encryption
B)Symmetric encryption
C)Cryptography
D)Decryption
E)Asymmetric encryption
Q2) Symmetric encryption is generally thought to be more secure than asymmetric encryption.
A)True
B)False
Q3) How is data hidden inside a WAV?
Q4) A(n)____________________ cipher is an algorithm that encrypts or decrypts blocks of data,such as 64-bit or 128-bit chunks of information at a time.
Q5) The power of a particular encryption technique is based on the ____.
A)key length
B)encryption strength
C)storage technique
D)system entropy
Q6) Describe symmetric encryption.
Q7) Describe asymmetric encryption.
To view all questions and flashcards with answers, click on the resource link above. Page 24

Chapter 22: Security Hardware
Available Study Resources on Quizplus for this Chatper
30 Verified Questions
30 Flashcards
Source URL: https://quizplus.com/quiz/35142
Sample Questions
Q1) Can be used to combine the bandwidth of two network adapters
A)Multi-homed
B)Intrusion Detection System
C)Link aggregation
D)Fault tolerance
E)Hardening
Q2) Describe the types of doors and locks that should be used to secure an area.
Q3) Hand ____________________ readers are biometric devices used to capture the unique characteristics of a human hand.
Q4) ____ includes the techniques and physical barriers used to protect computers and information from attacks that do not originate electronically.
A)Physical security
B)Network security
C)Virtual security
D)Intermediate security
Q5) Describe a physical security plan.
Q6) Just running a RAID Level 5 system means your data are completely safe.
A)True
B)False
To view all questions and flashcards with answers, click on the resource link above. Page 25

Chapter 23: Security Software
Available Study Resources on Quizplus for this Chatper
30 Verified Questions
30 Flashcards
Source URL: https://quizplus.com/quiz/35143
Sample Questions
Q1) A ____ is an alert given when normal,non-malicious traffic happens to match one or more rules for malicious traffic.
A)false negative
B)true negative
C)true positive
D)false positive
Q2) Discuss the process of guessing a password.
Q3) One way around the switch-based limitation is to use a managed switch that allows a ____ to be designated.
A)block port
B)pan port
C)management port
D)mirror port
Q4) Security policies and procedures should be static.
A)True
B)False
Q5) A(n)____________________ examines traffic and notes suspicious behavior in a log and may also notify a network manager through email,instant message,or some other communication.
Q6) A(n)____________________ describes the steps needed to execute the policy.
Page 26
To view all questions and flashcards with answers, click on the resource link above.

Chapter 24: Forensic Techniques
Available Study Resources on Quizplus for this Chatper
30 Verified Questions
30 Flashcards
Source URL: https://quizplus.com/quiz/35144
Sample Questions
Q1) The ____________________ is a written record of all interaction with the evidence from the moment it is acquired to the moment it is released.
Q2) List the skills that you need to become proficient at analyzing malware.
Q3) List the steps in the incident response process.
Q4) The first thing you want to do before analyzing network traffic is make sure you have permission to look at it.
A)True
B)False
Q5) A snapshot of the state of the system at a point in time
A)Restore Point
B)CSIRT
C)Regular expression
D)Slack space
E)Honeypot
Q6) The ____ file is used when Windows goes into hibernation.
A)Hiberfil.sys
B)Pagefile.sys
C)IO.sys
D)BOOT.INI
To view all questions and flashcards with answers, click on the resource link above. Page 27