

![]()


Data Communications explores the fundamental concepts and technologies involved in the transmission of digital data between devices and across networks. The course covers topics such as data transmission methods, communication protocols, network topologies, error detection and correction, signal modulation, and standards for local and wide area networks. Students will gain a comprehensive understanding of how information is encoded, transmitted, and received, as well as the challenges associated with ensuring reliable and secure communications. Practical applications and current advancements in networking technologies will also be discussed, preparing students for further study or careers in the field of information technology and computer networking.
Recommended Textbook
CWNA Guide to Wireless LANs Networking 2nd Edition by Mark Ciampa
Available Study Resources on Quizplus
12 Chapters
504 Verified Questions
504 Flashcards
Source URL: https://quizplus.com/study-set/1032 Page 2
Available Study Resources on Quizplus for this Chatper
41 Verified Questions
41 Flashcards
Source URL: https://quizplus.com/quiz/20462
Sample Questions
Q1) In a wireless network, the ____ acts as a base station to receive the signals and transmit signals back to the wireless network interface cards in the other wireless devices.
A) cable
B) wireless adapter
C) network interface card
D) access point
Answer: D
Q2) Where can a RFID tag be read?
A) only when next to the scanner
B) anywhere within the range of a transmitted radio signal
C) only within the line of sight of the scanner
D) when physically connected to the scanner
Answer: B
Q3) A(n) ____________________ cable connects the AP to a wired LAN or to the Internet.
Answer: patch
Q4) Public ____________________ are locations where wireless data services are available.
Answer: hotspots

Page 3
To view all questions and flashcards with answers, click on the resource link above.

Available Study Resources on Quizplus for this Chatper
41 Verified Questions
41 Flashcards
Source URL: https://quizplus.com/quiz/20463
Sample Questions
Q1) The IEEE 802.11g draft was a compromise based on input from several different chip (microprocessor) manufacturers, who had a major stake in the outcome.
A)True
B)False
Answer: True
Q2) Only one type of wireless NIC is available for laptop computers.
A)True
B)False
Answer: False
Q3) The radio frequency spectrum is divided into ____ different sections or bands.
A) 300
B) 450
C) 900
D) 1200
Answer: B
Q4) De facto standards are not actually standards at all.
A)True
B)False
Answer: True
To view all questions and flashcards with answers, click on the resource link above. Page 4

Available Study Resources on Quizplus for this Chatper
41 Verified Questions
41 Flashcards
Source URL: https://quizplus.com/quiz/20464
Sample Questions
Q1) Which of the following is an electromagnetic wave?
A) light
B) heat
C) radio
D) All of the above
Answer: D
Q2) Which of the following types of wave is imperceptible?
A) light
B) radio
C) heat
D) ether
Answer: B
Q3) ____________________ is defined as the positive difference in amplitude between two signals.
Answer: Gain
Q4) A(n) ____________________ signal has numerous starts and stops throughout the signal stream.
Answer: digital
To view all questions and flashcards with answers, click on the resource link above.
Page 5
Available Study Resources on Quizplus for this Chatper
41 Verified Questions
41 Flashcards
Source URL: https://quizplus.com/quiz/20465
Sample Questions
Q1) Because a device must wait to transmit until it receives the last reflected signal, this in effect puts a ceiling limit on the overall speed of the WLAN. What is the current ceiling for WLAN speed?
A) under 10 Mbps
B) between 10 and 20 Mbps
C) between 20 and 30 Mbps
D) over 50 Mbps
Q2) Bluetooth divides the 2.4 GHz frequency into ____ different frequencies spaced 1 GHz apart.
A) 52
B) 68
C) 79
D) 93
Q3) The amount of time that a transmission occurs on a specific frequency is called the ____________________ time.
Q4) When was the concept used by FHSS technology developed?
A) during World War I
B) during World War II
C) in the 1960s
D) in the 1980s

Page 6
To view all questions and flashcards with answers, click on the resource link above.

Available Study Resources on Quizplus for this Chatper
41 Verified Questions
41 Flashcards
Source URL: https://quizplus.com/quiz/20466
Sample Questions
Q1) CSMA/CA eliminates the possibility of collisions.
A)True
B)False
Q2) The ____ field appears last in a data frame.
A) Frame control
B) Duration
C) Sequence control
D) Frame check sequence
Q3) Describe the three interframe spaces (IFS) defined in the 802.11 standard.
Q4) A home agent is a forwarding mechanism that keeps track of where the mobile computer is located.
A)True
B)False
Q5) How does open system authentication work?
Q6) What is the minimum number of BSS networks required to form an ESS?
A) 0
B) 1
C) 2
D) 10
Q7) What is a management frame? What are the fields in this type of frame? Page 7
To view all questions and flashcards with answers, click on the resource link above.
Page 8

Available Study Resources on Quizplus for this Chatper
41 Verified Questions
41 Flashcards
Source URL: https://quizplus.com/quiz/20467
Sample Questions
Q1) Wireless access to network resources can improve the quality and productivity of meetings.
A)True
B)False
Q2) According to a study conducted by NOP World-Technology, wireless LANs enable users to be connected to network resources ____ additional hours per day.
A) .5
B) 1
C) 1.75
D) 2.5
Q3) According to NOP-World Technology, ____ percent of end users said that a WLAN improves their quality of life by increasing flexibility and productivity, and saving time.
A) 30
B) 56
C) 87
D) 93
Q4) List the seven different deployment scenarios for WLANs.
Q5) ____________________ is a standard measure of the profitability of a project.
To view all questions and flashcards with answers, click on the resource link above. Page 9

Available Study Resources on Quizplus for this Chatper
41 Verified Questions
41 Flashcards
Source URL: https://quizplus.com/quiz/20468
Sample Questions
Q1) Users need higher data rates for time-bound transmissions, such as audio and video and therefore need higher ____________________.
Q2) The first step in collecting RF information is to position the access point in what may appear to be the most logical location.
A)True
B)False
Q3) In addition to access points, what wireless tool(s) are required for a site survey?
Q4) What affects the coverage pattern?
A) wireless protocol
B) objects that interfere with the RF signal
C) notebook operating system
D) skill of person conducting site survey
Q5) The process of planning a wireless LAN to meet the design goals is known as a(n)
Q6) What is packet throughput? How can this information be collected if the site survey software does not calculate throughput?
Q7) What are the steps involved in gathering data for a site survey?
To view all questions and flashcards with answers, click on the resource link above. Page 10

Available Study Resources on Quizplus for this Chatper
41 Verified Questions
41 Flashcards
Source URL: https://quizplus.com/quiz/20469
Sample Questions
Q1) Using the same (shared) secret key to both encrypt as well as decrypt is called ____________________ cryptography.
Q2) Information security involves more than protecting the information itself.
A)True
B)False
Q3) In WEP, the CRC generates a(n) ____ based on the contents of the text.
A) initialization vector
B) cipher
C) checksum
D) key
Q4) On wireless networks, ____ attacks are commonly done by attackers setting up a "fake" access point.
A) spoof
B) weak key
C) DoS
D) man-in-the-middle
Q5) Describe the five steps in the process of WEP encryption.
Q6) What is a dictionary attack?
Q7) Briefly describe the goal of InfraGard.
Q8) Describe open system authentication.
To view all questions and flashcards with answers, click on the resource link above. Page 11

Available Study Resources on Quizplus for this Chatper
41 Verified Questions
41 Flashcards
Source URL: https://quizplus.com/quiz/20470
Sample Questions
Q1) The ____ method of encryption is used in a personal security model.
A) PSK
B) WEP
C) TKIP
D) MAC
Q2) Describe pre-shared key authentication.
Q3) ____________________ was developed by the Massachusetts Institute of Technology (MIT) and used to verify the identity of network users.
Q4) WEP2 attempted to overcome the limitations of WEP by adding two new security enhancements.
A)True
B)False
Q5) Temporal Key Integrity Protocol (TKIP) has three major components to address vulnerabilities. List and describe them.
Q6) Describe Kerberos.
Q7) Describe Advanced Encryption Standard (AES).
Q8) The block cipher used in 802.11i is the Data Encryption Standard (DES).
A)True
B)False
To view all questions and flashcards with answers, click on the resource link above. Page 12

Available Study Resources on Quizplus for this Chatper
41 Verified Questions
41 Flashcards
Source URL: https://quizplus.com/quiz/20471
Sample Questions
Q1) A ____ antenna is most typically used on a WLAN.
A) panel
B) rod
C) sectorized
D) beam steering
Q2) Acquiring data, such as error statistics and packets received, from each access point and each wireless device across the network is normally a quick and easy task.
A)True
B)False
Q3) Describe a sectorized antenna.
Q4) ____ attenuators are the only type permitted by the FCC for WLAN systems.
A) Variable-loss
B) Fixed-loss
C) Bidirectional
D) Unidirectional
Q5) A wireless network is a static system.
A)True
B)False
Q6) What is an RF amplifier?
To view all questions and flashcards with answers, click on the resource link above. Page 13

Available Study Resources on Quizplus for this Chatper
41 Verified Questions
41 Flashcards
Source URL: https://quizplus.com/quiz/20472
Sample Questions
Q1) Filtering can be performed by configuring the access point so that it acts as a type of
A) firewall
B) gateway
C) bridge
D) router
Q2) Problems on the wireless device are more common than problems affecting access points.
A)True
B)False
Q3) What are some of the factors that influence system throughput?
Q4) With some wireless networks using Mobile IP, up to ____ AAPs can be designated.
A) three
B) four
C) six
D) ten
Q5) How would you solve a near/far transmission problem?
Q6) In Mobile IP what are the home and foreign agents?
Q7) What are the three different frame formats?
Q8) Describe the LED indicator lights that appear on an AP. Page 14
To view all questions and flashcards with answers, click on the resource link above.
Page 15

Networks
Available Study Resources on Quizplus for this Chatper
41 Verified Questions
41 Flashcards
Source URL: https://quizplus.com/quiz/20473
Sample Questions
Q1) Mode ____ of IEEE 802.15.3 provides protection using digital certificates.
A) 0
B) 1
C) 2
D) 3
Q2) The ZigBee group has drafted standards relating to network configuration, security, and other higher-level features that are not covered by the IEEE 802.15.4 standard.
A)True
B)False
Q3) There are several significant differences between 802.15.3 and 802.15.1 (Bluetooth). What are they?
Q4) Power consumption is so low for 802.15.4 devices that it is estimated that batteries powering the devices can last up to ____.
A) 4 months
B) 1 year
C) 2 years
D) 5 years
Q5) Describe the way cellular telephone networks work.
Q6) Describe wireless personal area networks.
To view all questions and flashcards with answers, click on the resource link above. Page 16