Data Communications Midterm Exam - 720 Verified Questions

Page 1


Data Communications

Midterm Exam

Course Introduction

Data Communications explores the fundamental principles and technologies involved in the exchange of data between computers and networked devices. The course covers key concepts such as transmission media, encoding techniques, error detection and correction, data link protocols, and network topologies. Students learn about both wired and wireless communication methods, standards such as Ethernet and Wi-Fi, and the layered protocols that make modern networking possible. Practical topics also include data security, performance measurement, and strategies for optimizing communication in diverse network environments. Through theoretical study and hands-on projects, students gain a comprehensive understanding of how data is reliably transmitted and managed in today's interconnected world.

Recommended Textbook

Computer Networking from LANs to WANs Hardware Software and Security 1st Edition by

Available Study Resources on Quizplus

24 Chapters

720 Verified Questions

720 Flashcards

Source URL: https://quizplus.com/study-set/1764

Page 2

Jr. Kenneth

Chapter 1: What Is a Computer Network

Available Study Resources on Quizplus for this Chatper

30 Verified Questions

30 Flashcards

Source URL: https://quizplus.com/quiz/35121

Sample Questions

Q1) Describe how data is represented when an analog medium is used.

Answer: When an analog medium is used to transmit digital data (such as through the telephone system with a modem),the digital data may be represented by various forms of a carrier-modulated signal.Two forms of carrier modulation are amplitude modulation and frequency-shift keying.In amplitude modulation,the digital data controls the presence of a fixed-frequency carrier signal.In frequency-shift keying,the 0s and 1s are assigned two different frequencies,resulting in a shift in carrier frequency when the data changes from 0 to 1 or from 1 to 0.A third method is called phase-shift keying,in which the digital data controls the phase shift of the carrier signal.

Q2) Just throwing 1s and 0s onto a communication link is enough to establish coherent communication between two nodes in a network.

A)True

B)False

Answer: False

Q3) Different ____________________ are used between layers of the OSI model to handle such things as error recovery and information routing between nodes.

Answer: protocols

To view all questions and flashcards with answers, click on the resource link above.

Page 3

Chapter 2: Network Topology

Available Study Resources on Quizplus for this Chatper

30 Verified Questions

30 Flashcards

Source URL: https://quizplus.com/quiz/35122

Sample Questions

Q1) A(n)____________________ network is owned and managed by a private organization or company and may have a much larger bandwidth capability than a public network.

Answer: private

Q2) Describe a private network.

Answer: A private network is owned and managed by a private organization or company and may have a much larger bandwidth capability than a public network,depending on how much money its parent company invests in network infrastructure (by installing its own media between sites or by leasing private,dedicated communication lines from the telephone company).Private networks have higher maintenance costs per user and have the capability of restricting access to sensitive data.

Q3) In a fully connected network,the number of connections at each node equals the total number of nodes plus one. A)True

B)False

Answer: False

Q4) In a star network,all nodes connect to a central communications

Answer: hub

To view all questions and flashcards with answers, click on the resource link above. Page 4

Chapter 3: Networking Hardware

Available Study Resources on Quizplus for this Chatper

30 Verified Questions

30 Flashcards

Source URL: https://quizplus.com/quiz/35123

Sample Questions

Q1) ____________________,also called concentrators,expand one Ethernet connection into many.

Answer: Hubs

Q2) Describe a satellite network system.

Answer: The Hughes Corporation offers a unique solution to low-speed Internet connections.For a few hundred dollars,you can buy their HughesNet Internet satellite networking system.Internet data comes to your PC via satellite at speeds between 500Kbps to 800Kbps.Upload speeds are considerably slower at approximately 128Kbps,but well within an acceptable range.This is an ideal situation for browsing,when you need to receive information fast (if a Web page contains many images)but only send information out (clicking on a new URL to load a new page)occasionally.A lower-speed connection for transmitted packets is generally acceptable,unless you are uploading large files to an FTP site or sending e-mail with large attachments.If there is no cable where you live or work (for a cable modem connection),HughesNet or another Internet satellite provider may be the answer for you.

Q3) The maximum length of a thinwire Ethernet segment is ____________________ meters.

Answer: 185

To view all questions and flashcards with answers, click on the resource link above.

Page 5

Chapter 4: Ethernet Technology

Available Study Resources on Quizplus for this Chatper

30 Verified Questions

30 Flashcards

Source URL: https://quizplus.com/quiz/35124

Sample Questions

Q1) Packet ____________________ keep track of many different Ethernet errors.

Q2) The destination address is the destination ____________________ address of the station that is to receive the frame.

Q3) When the frame size is smaller,more of the available bandwidth is utilized.

A)True

B)False

Q4) The maximum frame size allowed on the network.

A)Jabber

B)Jam sequence

C)Runt

D)MTU

E)Collision domain

Q5) Diffused IR uses line-of-sight IR lasers and provides a faster data rate than diffused IR.

A)True

B)False

Q6) Describe CSMA/CA.

Q7) List three properties that 10base5,10base2 and 10baseT have in common.

Page 6

Q8) Describe the destination address of an Ethernet frame.

Q9) The Ethernet ____________________ is the time required to transmit 512 bits.

To view all questions and flashcards with answers, click on the resource link above.

Page 7

Chapter 5: Token-Ring, fddi, and Other LAN Technologies

Available Study Resources on Quizplus for this Chatper

30 Verified Questions

30 Flashcards

Source URL: https://quizplus.com/quiz/35125

Sample Questions

Q1) The topology of a Bluetooth network is called a ____.

A)micronet

B)piconet

C)mininet

D)petanet

Q2) List three things that diagnosing problems with LAN technologies requires.

Q3) Contains support for voice,video,and other multimedia applications

A)ARCnet

B)Token

C)Bluetooth

D)Scatternet

E)FDDI-II

Q4) In a token-ring network,one station on the ring acts as the ____ and is responsible for ensuring that valid tokens circulate on the ring.

A)passive monitor

B)active relay

C)active monitor

D)passive relay

Q5) Describe Bluetooth.

Q6) Describe broadband LANs.

To view all questions and flashcards with answers, click on the resource link above. Page 8

Chapter 6: Network Design and Troubleshooting Scenarios

Available Study Resources on Quizplus for this Chatper

30 Verified Questions

30 Flashcards

Source URL: https://quizplus.com/quiz/35126

Sample Questions

Q1) Windows machines with built-in networking support will automatically communicate over the network via ____.

A)NETBEUI

B)NETBIOS

C)IPX/SPX

D)TCP/IP

Q2) The ______________________________ window shows the network information (addresses,mask,lease details,etc. )on a Windows XP computer system.

Q3) Manages voice and data traffic between the residential user,PSTN switch,and ISP

A)PSTN

B)DSLAM

C)Baseband network

D)T1 line

E)Broadband communication networks

Q4) If your machine is properly networked,you should be able to open up My Network ____________________ and see hosts sharing resources on the network.

Q5) The use of coax in Ethernet networking installations is obsolete.

A)True

B)False

To view all questions and flashcards with answers, click on the resource link above. Page 9

Chapter 7: Low-Level Protocols

Available Study Resources on Quizplus for this Chatper

30 Verified Questions

30 Flashcards

Source URL: https://quizplus.com/quiz/35127

Sample Questions

Q1) Originally used by IBM for its LAN Manager network

A)SLIP

B)Parity

C)Baud

D)NetBEUI

E)Serial

Q2) A(n)____________________ is where networking data are transmitted or received.

Q3) In serial communication,an 8-bit binary number is transmitted one bit at a time,beginning with the ____________________ bit.

Q4) The last two bits in the transmission frame for a wave form are the ____ bits.

A)hold

B)start

C)stop

D)separation

Q5) Describe PPPoE.

Q6) The main component of a NetBIOS message is the ____ it carries.

A)SMS

B)SMB

C)SMF

D)IOP

To view all questions and flashcards with answers, click on the resource link above. Page 10

Chapter 8: The Tcpip Protocols

Available Study Resources on Quizplus for this Chatper

30 Verified Questions

30 Flashcards

Source URL: https://quizplus.com/quiz/35128

Sample Questions

Q1) ____ defines the format and meaning of messages exchanged by the manager and agents.

A)SNMP

B)HTTP

C)HTTPS

D)SMTP

Q2) Allows a user to establish a terminal emulation connection on a remote computer

A)Telnet session

B)HTTPS

C)FTP

D)RFCs

E)PING

Q3) Describe SMTP.

Q4) Allows a user to log in to a remote computer and transfer files back and forth through simple commands

A)Telnet session

B)HTTPS

C)FTP

D)RFCs

E)PING

11

To view all questions and flashcards with answers, click on the resource link above.

Chapter 9: Ipxspx, Appletalk, and Other Network Protocols

Available Study Resources on Quizplus for this Chatper

30 Verified Questions

30 Flashcards

Source URL: https://quizplus.com/quiz/35129

Sample Questions

Q1) The first part of a DECnet Phase V address is called the ____.

A)source part

B)initial domain part

C)initial source part

D)initial interface part

Q2) Responsible for the majority of traffic on a NetWare network

A)Internet Packet Exchange (IPX)protocol

B)SSCP

C)NCP

D)IPX/SPX protocol suite

E)Sequenced Packet Exchange (SPX)protocol

Q3) A(n)____ unit is used to access the programs run by the end user.

A)physical

B)interpreted

C)logical

D)virtual

Q4) Describe NCP.

Q5) List the services that IBM developed to connect the logical units of SNA.

Q6) The communication between two NAUs is called a(n)____________________.

Q7) List the four fields of the domain-specific part of the DECnet address.

To view all questions and flashcards with answers, click on the resource link above. Page 12

Chapter 10: Switching and Routing

Available Study Resources on Quizplus for this Chatper

30 Verified Questions

30 Flashcards

Source URL: https://quizplus.com/quiz/35130

Sample Questions

Q1) Section of the switch that contains the Ethernet receiving logic

A)Crossbar switch

B)Buffer

C)Switching fabric

D)Input port logic

E)Multiplexed bus

Q2) The MAC address and port number are stored in a special high-speed memory called ____.

A)content accessible memory

B)content addressable memory

C)common addressable memory

D)content attainable memory

Q3) The ____ algorithm is a type of routing algorithm that is based on the number of hops in a route between a source and destination computer.

A)distance-vector routing

B)distance-volume routing

C)distance-domain routing

D)domain-vector routing

Q4) List five characteristics of a link-state router.

Q5) ____________________ switching reduces the latency of a switch tremendously.

To view all questions and flashcards with answers, click on the resource link above. Page 13

Chapter 11: Network Management and Security

Available Study Resources on Quizplus for this Chatper

30 Verified Questions

30 Flashcards

Source URL: https://quizplus.com/quiz/35131

Sample Questions

Q1) A(n)____ combines traffic sniffing with analysis techniques.

A)firewall

B)intrusion detection system

C)router

D)application firewall

Q2) List and describe five areas to consider in User Management.

Q3) A(n)____ is a stand-alone hardware unit that connects to the network or a software program running on a network host,collecting statistical information about the network performance.

A)program analyzer

B)packet analyzer

C)interface analyzer

D)protocol analyzer

Q4) Discuss the advantage of having a disk image.

Q5) Integrity of information is achieved through encryption.

A)True

B)False

Q6) List five disaster recovery safeguards that can be used to help guarantee a relatively quick and painless recovery in the event that a disaster occurs.

Page 14

To view all questions and flashcards with answers, click on the resource link above.

Chapter 12: Electronic Mail

Available Study Resources on Quizplus for this Chatper

30 Verified Questions

30 Flashcards

Source URL: https://quizplus.com/quiz/35132

Sample Questions

Q1) A Telnet session to a POP3 server is accomplished by entering a command similar to

A)telnet athena.sunybroome.edu 25

B)telnet athena.sunybroome.edu 1101

C)telnet athena.sunybroome.edu 110

D)telnet 110 athena.sunybroome.edu

Q2) The ____________________ encoding method is used to encode 8-bit text codes such as those used in a foreign language character set into 7-bit U.S.ASCII characters.

Q3) Why should public e-mail client computer systems never be configured to save an e-mail password?

Q4) A(n)____________________ program exchanges information with a designated e-mail server to send and receive messages.

Q5) Used primarily to transfer binary attachments

A)Header

B)IMAP

C)IMAP4

D)Base64 encoding method

E)SMTP

Q6) Discuss the issue with sending messages in clear text.

Page 15

To view all questions and flashcards with answers, click on the resource link above.

Chapter 13: FTP and Telnet

Available Study Resources on Quizplus for this Chatper

30 Verified Questions

30 Flashcards

Source URL: https://quizplus.com/quiz/35133

Sample Questions

Q1) The initial response from an FTP server is called the ____.

A)greeting

B)handshake

C)sync

D)connect

Q2) FTP uses connection-oriented TCP as the underlying transport protocol providing the guaranteed reliability.

A)True

B)False

Q3) When using ____________________ FTP,it is necessary to provide a valid username and password in order to access the private files on the FTP server.

Q4) It is always a good idea to record the FTP activity of the server into a(n)____________________ file.

Q5) Initially,FTP was designed to run on ____ connected to a mainframe computer.

A)weak terminals

B)smart terminals

C)soft terminals

D)dumb terminals

Q6) The FTP client can use any port numbers greater than ____________________.

Page 16

To view all questions and flashcards with answers, click on the resource link above.

Chapter 14: Multimedia Networking

Available Study Resources on Quizplus for this Chatper

30 Verified Questions

30 Flashcards

Source URL: https://quizplus.com/quiz/35134

Sample Questions

Q1) ____________________ is a method for sending voice and fax data using the IP protocol.

Q2) The algorithm used to sample,digitize,and recreate the video (and audio)stream

A)Lossy compression

B)IGMP

C)CODEC

D)Lossless compression

E)MPEG

Q3) In order to play audio and video clips downloaded off the network,it is necessary to have the proper ____ installed.

A)CODERs

B)CODECs

C)DECs

D)CODs

Q4) None of the original image data is lost during compression

A)Lossy compression

B)IGMP

C)CODEC

D)Lossless compression

E)MPEG

To view all questions and flashcards with answers, click on the resource link above. Page 17

Chapter 15: The Internet

Available Study Resources on Quizplus for this Chatper

30 Verified Questions

30 Flashcards

Source URL: https://quizplus.com/quiz/35135

Sample Questions

Q1) ____________________ is an application that provides the capability for a user to send and receive instant messages,which are delivered to the recipient instantly-even faster than electronic mail.

Q2) Java consists of a programming language,a run-time environment,and a class dictionary.

A)True

B)False

Q3) Describe the Java programming language.

Q4) One of the most popular Web server programs for business and personal use is the ____ from the Apache Software Foundation.

A)Apache Server

B)Native Server

C)Python Server

D)Navajo Server

Q5) Describe XML.

Q6) ____________________ Web pages contain a combination of HTML code and Java applets,or Microsoft Active Server Pages.

Q7) ___________________ is a programming language used to perform client side processing on the Web.

Page 18

To view all questions and flashcards with answers, click on the resource link above.

Chapter 16: Writing a Network Application

Available Study Resources on Quizplus for this Chatper

30 Verified Questions

30 Flashcards

Source URL: https://quizplus.com/quiz/35136

Sample Questions

Q1) The IP Address Calculator CGI application uses its ____ data to determine what class of IP address was supplied.

A)FORM

B)OPTION

C)ACTION

D)POST

Q2) The IPS device operates using ____.

A)TCP

B)UDP

C)ICMP

D)IETF

Q3) List five of the special features of the IPS device.

Q4) Associates the protocol (Internet),the IP address (ANY)and the specific port number (7500)with a socket

A)Connectionless communication

B)Socket binding

C)Socket

D)Connection-oriented communication

E)Administrator privileges

Q5) Perl programs are called ____________________.

To view all questions and flashcards with answers, click on the resource link above. Page 19

Chapter 17: An Introduction to Networking With Windows

Available Study Resources on Quizplus for this Chatper

30 Verified Questions

30 Flashcards

Source URL: https://quizplus.com/quiz/35137

Sample Questions

Q1) Whenever you use a network to transfer data,an entire set of ____________________ is used to set up and maintain reliable data transfer between the two network stations.

Q2) Allows you to add,modify,or remove various networking components

A)Thin client

B)DHCP server

C)Network Properties menu

D)Dial-Up Networking

E)NetBEUI

Q3) Describe how to map a network drive.

Q4) TCP/IP will not work without a DNS server.

A)True

B)False

Q5) Although Windows supports many different types of common networking protocols,the backbone of its original network operations were based on ____.

A)TCPBEUI

B)IPX/SPX

C)NetBEUI

D)WinBEUI

Q6) List the three components that the ICA uses.

To view all questions and flashcards with answers, click on the resource link above. Page 20

Chapter 18: Windows Domains

Available Study Resources on Quizplus for this Chatper

30 Verified Questions

30 Flashcards

Source URL: https://quizplus.com/quiz/35138

Sample Questions

Q1) List four different versions of the Windows 2008 Server operating system.

Q2) When a new ____________________ domain is created,it takes advantage of the existing domain resources.

Q3) List the categories of choices for Active Directory installation when a domain already exists.

Q4) When is the Administrator account created in Windows NT?

Q5) Using the Windows Server operating systems,a dial-in user can be granted access to the network resources using ____.

A)RRAN

B)RAS

C)RIAS

D)RIS

Q6) The domain controller in the Windows 2000 domains is encapsulated into a product called the ____.

A)Windows Directory

B)Activated Directory

C)Network Directory Services

D)Active Directory

Q7) List four important Active Directory Management features.

To view all questions and flashcards with answers, click on the resource link above. Page 21

Chapter 19: Unix and Linux

Available Study Resources on Quizplus for this Chatper

30 Verified Questions

30 Flashcards

Source URL: https://quizplus.com/quiz/35139

Sample Questions

Q1) The ____ program allows for a Linux system to participate in a Windows network by sharing files and printers using SMB (Server Message Blocks)and CIFS (Common Internet File System)protocols.

A)Wimba

B)Samba

C)Winbind

D)WINE

Q2) Many of the programs available in UNIX and Linux can be run from the "Terminal" window ___________________ prompt.

Q3) The software for Red Hat Fedora Linux is distributed free of charge.

A)True

B)False

Q4) The ____ operating system has been available since the 1970 and was originally developed by Ken Thompson,Dennis Ritchie,and others at AT&T labs.

A)Linux

B)BSD

C)UNIX

D)GNU

Q5) Describe NIS+.

To view all questions and flashcards with answers, click on the resource link above. Page 22

Chapter 20: Other Network Operating Systems

Available Study Resources on Quizplus for this Chatper

30 Verified Questions

30 Flashcards

Source URL: https://quizplus.com/quiz/35140

Sample Questions

Q1) A workstation connecting to a NetWare server may do so by installing the appropriate ____________________ software.

Q2) Selecting a network operating system should be based solely on the features provided.

A)True

B)False

Q3) What is NDS?

Q4) Why is it always best to run the latest version of Mac system software?

Q5) A core component of NetWare consists of the services available for managing and using ____________________.

Q6) Inherited and/or modified via filters or masks that designate permissible operations

A)Across-the-wire migration

B)OpenVMS

C)System area network card

D)In-place migration

E)Rights

Q7) Describe the two ways to perform an upgrade of NetWare.

Q8) List four activities involved in managing any network to ensure quality control.

Q9) The latest version of NetWare is version ____________________.

To view all questions and flashcards with answers, click on the resource link above. Page 23

Chapter 21: Cryptography and Security

Available Study Resources on Quizplus for this Chatper

30 Verified Questions

30 Flashcards

Source URL: https://quizplus.com/quiz/35141

Sample Questions

Q1) A single key is used to encrypt and decrypt the data

A)Encryption

B)Symmetric encryption

C)Cryptography

D)Decryption

E)Asymmetric encryption

Q2) Symmetric encryption is generally thought to be more secure than asymmetric encryption.

A)True

B)False

Q3) How is data hidden inside a WAV?

Q4) A(n)____________________ cipher is an algorithm that encrypts or decrypts blocks of data,such as 64-bit or 128-bit chunks of information at a time.

Q5) The power of a particular encryption technique is based on the ____.

A)key length

B)encryption strength

C)storage technique

D)system entropy

Q6) Describe symmetric encryption.

Q7) Describe asymmetric encryption.

To view all questions and flashcards with answers, click on the resource link above. Page 24

Chapter 22: Security Hardware

Available Study Resources on Quizplus for this Chatper

30 Verified Questions

30 Flashcards

Source URL: https://quizplus.com/quiz/35142

Sample Questions

Q1) Can be used to combine the bandwidth of two network adapters

A)Multi-homed

B)Intrusion Detection System

C)Link aggregation

D)Fault tolerance

E)Hardening

Q2) Describe the types of doors and locks that should be used to secure an area.

Q3) Hand ____________________ readers are biometric devices used to capture the unique characteristics of a human hand.

Q4) ____ includes the techniques and physical barriers used to protect computers and information from attacks that do not originate electronically.

A)Physical security

B)Network security

C)Virtual security

D)Intermediate security

Q5) Describe a physical security plan.

Q6) Just running a RAID Level 5 system means your data are completely safe.

A)True

B)False

To view all questions and flashcards with answers, click on the resource link above. Page 25

Chapter 23: Security Software

Available Study Resources on Quizplus for this Chatper

30 Verified Questions

30 Flashcards

Source URL: https://quizplus.com/quiz/35143

Sample Questions

Q1) A ____ is an alert given when normal,non-malicious traffic happens to match one or more rules for malicious traffic.

A)false negative

B)true negative

C)true positive

D)false positive

Q2) Discuss the process of guessing a password.

Q3) One way around the switch-based limitation is to use a managed switch that allows a ____ to be designated.

A)block port

B)pan port

C)management port

D)mirror port

Q4) Security policies and procedures should be static.

A)True

B)False

Q5) A(n)____________________ examines traffic and notes suspicious behavior in a log and may also notify a network manager through email,instant message,or some other communication.

Q6) A(n)____________________ describes the steps needed to execute the policy.

Page 26

To view all questions and flashcards with answers, click on the resource link above.

Chapter 24: Forensic Techniques

Available Study Resources on Quizplus for this Chatper

30 Verified Questions

30 Flashcards

Source URL: https://quizplus.com/quiz/35144

Sample Questions

Q1) The ____________________ is a written record of all interaction with the evidence from the moment it is acquired to the moment it is released.

Q2) List the skills that you need to become proficient at analyzing malware.

Q3) List the steps in the incident response process.

Q4) The first thing you want to do before analyzing network traffic is make sure you have permission to look at it.

A)True

B)False

Q5) A snapshot of the state of the system at a point in time

A)Restore Point

B)CSIRT

C)Regular expression

D)Slack space

E)Honeypot

Q6) The ____ file is used when Windows goes into hibernation.

A)Hiberfil.sys

B)Pagefile.sys

C)IO.sys

D)BOOT.INI

To view all questions and flashcards with answers, click on the resource link above. Page 27

Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.