2
Business Data Communications By Manish Agrawal
Email: richard@qwconsultancy.com
Question Bank accompanying Business Data Communications By Manish Agrawal
Chapter 1 - Introduction 1.
Business Data Communications refers to the movement of data from _____. a) b)
one computer to another computer one computer application on a computer to another computer application on another computer one computer network to another computer network one person to another
c) d)
Answer: (b) 2.
The continent with the highest growth rate of Internet traffic is _____. a) b) c) d)
North America Asia South America Europe
Answer: (c) 3.
Businesses generate more network data than consumers. a) b)
True False
Answer: (b) 4.
The novelty of the telegraph was that _____. a) b) c) d)
Answer: (a)
it allowed instantaneous long-distance communication over a wire it allowed people to talk to each other it allowed one wire to connect a user to multiple destinations it allowed users to draw graphs
Chapter 1 - Introduction
5.
The novelty of multiplexing is that _____. a) b) c) d)
it allows instantaneous long distance communications it allows one wire to carry multiple signals simultaneously it allows one wire to connect a user to multiple destinations None of the above
Answer: (b) 6.
The novelty of switching is that _____. a) b) c) d)
it allows instantaneous long distance communications it allows one wire to carry multiple signals simultaneously it allows one wire to connect a user to multiple destinations it breaks data down into small units of information
Answer: (c) 7.
The novelty of packet switching is that _____. a) b) c) d)
it allowed instantaneous long distance communications for the first time it enabled long distance voice communication for the first time it allows all users to be connected to all other users simultaneously None of the above
Answer: (c) 8.
Packetization is the process of _____. a) b) c) d)
sending letters to friends sending user data over networks communicating between computer applications breaking down user data into small segments
Answer: (d) 9.
The header of a data packet contains all of the following except _____. a) b) c) d)
sender address receiver address packet size user data
Answer: (d)
Chapter 1 - Introduction
10.
Layering is the practice of _____. a)
arranging functionality of components so that upper layers support the services of lower layers arranging functionality of components so that lower layers support the services of upper layers breaking down user data into small segments using one wire to carry multiple signals simultaneously
b) c) d)
Answer: (b) 11.
One feature common to most computer software and data communications is _____. a) b) c) d)
the use of layering to organize functionality the use of packetization the use of routing the use of signaling
Answer: (a) 12.
The physical layer in the TCP/ IP stack is responsible for _____. a) b) c) d)
error control identifying and locating the destination signaling segmentation and reassembly of packets
Answer: (c) 13.
The data link layer in the TCP/ IP stack is responsible for _____. a) b) c) d)
error control identifying and locating the destination signaling segmentation and reassembly of packets
Answer: (a) 14.
The network layer in the TCP/ IP stack is responsible for _____. a) b) c) d)
error control identifying and locating the destination specifying end user needs segmentation and reassembly of packets
Chapter 1 - Introduction
Answer: (b) 15.
The transport layer in the TCP/ IP stack is responsible for _____. a) b) c) d)
error control identifying and locating the destination specifying end user needs segmentation and reassembly of packets
Answer: (d) 16.
The application layer in the TCP/ IP stack is responsible for _____. a) b) c) d)
error control identifying and locating the destination specifying end user needs segmentation and reassembly of packets
Answer: (c) 17.
The contribution of the OSI model was that _____. a) b) c) d)
it helped develop the technology used for routing it helped develop the technologies used for signaling it helped develop the technologies used for reliable data delivery it helped specify the concept of layers in data communication
Answer: (d) 18.
The presentation layer in the OSI model is responsible for _____. a) b) c) d)
error control specifying end user needs presenting information to end users syntax conversion from host-specific syntax for network transfer
Answer: (d) 19.
The session layer in the OSI model is responsible for _____. a) b) c) d)
error control specifying end user needs creating and terminating connections tracking cookies
Chapter 1 - Introduction
Answer: (c) 20.
A protocol is a set of rules that _____. a) b) c) d)
define layers permit information systems to exchange information with each other break down user data into small segments arrange functionality of components
Answer: (b) 21.
A unique feature of the Internet compared to phone and TV networks is that _____. a) b) c) d)
the Internet has a higher data transfer rate the Internet uses a common packet format to transfer data from any application the Internet was operational long before phone and TV networks the Internet can be used to transmit information
Answer: (b) 22.
A technology defined at the data link layer is _____. a) b) c) d)
Ethernet IP TCP SMTP
Answer: (a) 23.
The OSI model has ______ layers. a) b) c) d)
5 6 3 7
Answer: (d) 24.
The TCP/ IP stack has ______ layers. a) b) c) d)
5 6 3 7
Chapter 1 - Introduction
Answer: (a) 25. The common packet format that can be transferred by any network and that serves all applications is defined at the _______ layer. a) b) c) d)
data link network transport application
Answer: (b)
Question Bank accompanying Business Data Communications By Manish Agrawal
Chapter 2 – Physical Layer 1.
Signaling is _____. a) b) c) d)
the transmission path over which information propagates wiring cables between locations combining multiple signals for transmission over one medium converting data to signals for transmission over physical media
Answer: (d) 2.
A signal is _____. a) b) c) d)
information added to data to remove errors cables connecting networked locations detectable transmitted energy that can be used to carry information converting data to signals for transmission over physical media
Answer: (c) 3.
The only layer in the TCP/ IP stack that deals with the limitations of nature is _____. a) b) c) d)
the data link layer the physical layer the network layer the transport layer
Answer: (b) 4.
Signals in copper wire are transmitted as _____. a) b) c) d)
sound signals light signals electrical signals. smoke signals
Chapter 2 – Physical Layer
Answer: (c) 5.
A physical medium is _____. a) b) c) d)
the transmission path over which a signal propagates the method of combining multiple signals for transmission over one medium used to convert data to signals for transmission detectable transmitted energy that can be used to carry information
Answer: (a) 6.
As a physical medium, copper possesses all of the following properties except _____. a) b) c) d)
copper is relatively abundant copper is a good conductor of electricity copper is relatively inexpensive copper can transmit information over very long distances
Answer: (d) 7.
The term UTP stands for _____. a) b) c) d)
unshielded telephone pair unshielded twisted pair uncovered twisted pair uncovered telephone pair
Answer: (b) 8.
A CAT 5 cable has _____ wires. a) b) c) d)
4 6 8 10
Answer: (c) 9.
A CAT 5 cable is terminated using connectors called _____. a) b) c) d)
RJ 11 connectors RJ 19 connectors RJ 45 connectors RJ 54 connectors
Chapter 2 – Physical Layer
Answer: (c) 10. As a physical medium, optical fiber possesses all of the following properties except _____. a) b) c) d)
it is relatively light in weight it can carry signals for long distances without the need for repeaters it is relatively inexpensive it is as robust as copper in withstanding abuse
Answer: (d) 11.
Single mode fiber is preferred over multi-mode fiber for short distances. a) b)
True False
Answer: (b) 12.
Data is converted to signals for transmission because _____. a) b) c) d)
data is expensive to transport over physical media there is no known method to transport data over physical media signals are inexpensive to transport over physical media network carriers prefer to transport signals
Answer: (b) 13.
Good signals have all the following properties except _____. a) b) c) d)
good signals do not need to be multiplexed good signals are efficient at using bandwidth good signals are resistant to noise good signals are easy to detect at the receiver’s end
Answer: (a) 14.
The figure shows an example of _____. a) b) c)
digital data transmitted using a digital signal digital data transmitted using an analog signal analog data transmitted using a digital signal
Chapter 2 – Physical Layer
d)
analog data transmitted using an analog signal
Answer: (b) 15.
Amplitude is a measure of _____. a) b) c) d)
the height of a sine wave the number of cycles made by a sine wave in one second the position of a sine wave at the start time None of the above
Answer: (a) 16.
Modulation is the process of _____. a) b) c) d)
spinning a wheel to generate a sine wave increasing the amplitude of a sine wave increasing the frequency of a sine wave changing one or more properties of a sine wave in response to data
Answer: (d) 17.
Quadrature amplitude modulation _____. a) b) c) d)
is another name for amplitude modulation combines amplitude modulation with phase modulation combines amplitude modulation with frequency modulation None of the above
Answer: (b) 18. Binary signals are preferred over other forms of signals (ternary, decimal etc) because _____. a) b) c) d)
binary signals are the easiest to detect reliably by the receiver binary signals can carry the most amount of information in a given time period binary signals are the fastest known means of transmitting data binary signals are the easiest to generate for the sender
Answer: (a) 19.
A bit _____. a) b)
transforms elements from one set of elements to another set generates sine waves for transmission over a medium
Chapter 2 – Physical Layer
c) d)
is the unit of information that designates one of two possible states changes one or more properties of a sine wave in response to data
Answer: (c) 20.
Coding is _____. a) b) c) d)
the unit of information the transformation of elements from one set of elements to another set the generation of sine waves for transmission over a medium changing one or more properties of a sine wave in response to data
Answer: (b) 21.
Noise is _____. a) b) c) d)
the transformation of elements from one set of elements to another set the generation of sine waves for transmission over a medium changing one or more properties of a sine wave in response to data any disturbance that interferes with the normal operation of a device
Answer: (d) 22.
The ASCII code is used to encode _____. a) b) c) d)
characters in the English alphabet characters in the Chinese language characters in all languages characters in most languages spoken around the world
Answer: (a) 23.
Unicode is used to encode _____. a) b) c) d)
characters in the English alphabet only characters in the Chinese language only characters in most languages characters in the 5 most common languages spoken around the world
Answer: (c) 24.
In FDM _____. a) b)
signals from each channel are sent at a specified frequency signals from each channel are sent at a specified amplitude
Chapter 2 – Physical Layer
c) d)
signals from each channel are sent at a specified phase signals from each channel are sent at a specified time
Answer: (a) 25.
In TDM _____. a) b) c) d)
signals from each channel are sent at a specified frequency signals from each channel are sent at a specified amplitude signals from each channel are sent at a specified phase signals from each channel are sent at a specified time
Answer: (d)
Question Bank accompanying Business Data Communications By Manish Agrawal
Chapter 3 – Data Link Layer 1.
The functions of the data link layer include _____. a) b) c) d)
routing local addressing and error-detection segmentation and re-assembly of data link data networks
Answer: (b) 2.
The data link is responsible for sending data between _____. a) b) c) d)
devices on a single network devices on neighboring networks devices anywhere on the Internet None of the above
Answer: (a) 3.
When the data link layer detects errors in incoming data, it typically _____. a) b) c) d)
attempts to fix the error accepts the data anyway accepts the data, but marks it so that upper layers can fix the error deletes the data
Answer: (d) 4. When the data link layer deletes incoming frames, the lost frames are recovered by _____. a) b) c) d)
the network layer the transport layer the application layer the physical layer
Chapter 3 – Data Link Layer
Answer: (b) 5.
The most common data link layer technology used in corporate networks is _____. a) b) c) d)
TCP Internet Ethernet IP
Answer: (c) 6.
A network using Ethernet can be up to ______ in radius. a) b) c) d)
1,000 meters 100 meters 10 miles indefinite
Answer: (b) 7.
A technology that uses broadcasting to transmit data sends the data to _____. a) b) c) d)
all computers on the Internet only the intended destination of the data all stations on the network None of the above
Answer: (c) 8.
All of the following are examples of using broadcasting to transmit data except _____. a) b) c) d) e)
satellite radio transmission college classroom spam email junk mail a letter in the mail addressed to a friend
Answer: (e) 9.
All of the following are advantages of using broadcasting to send data except _____. a) b) c) d)
it is simple it is inexpensive it can be used for networks of any size it does not require any controllers to regulate who can transmit data
Chapter 3 – Data Link Layer
Answer: (c) 10.
A disadvantage of using broadcasting to transmit data is that _____. a) b) c) d)
it is inexpensive it is simple most users who receive the data have no use for the data it leads to too many errors
Answer: (c) 11. The receiver of a data packet determines that the packet was sent to it by looking at _____. a) b) c) d)
the destination address of the packet the source address of the packet the frame check sequence field The start of frame delimiter
Answer: (a) 12.
In computer networking, a collision is a situation where _____. a) b) c) d)
an end user collides with his workstation two or more end users collide with each other at the water cooler two or more end users get into an argument over who has access to the network two or more demands are placed on a network that can only handle one demand at a time
Answer: (d) 13. In computer networking, medium access control is the method used to determine _____. a) b) c) d)
who can enter the office who can send data over a shared medium who can determine the data rate of the physical medium who can mediate a dispute between two or more end users
Answer: (b) 14.
In computer networking, carrier sensing refers to _____. a) b)
monitoring the medium to detect whether another station is transmitting data monitoring network carriers (ex. AT&T, Comcast etc) to ensure quality of service
Chapter 3 – Data Link Layer
c) d)
sensing the network load of the network carriers (ex. AT&T, Comcast etc) None of the above
Answer: (a) 15.
In Ethernet, CSMA/ CD refers to _____. a) b) c) d)
Carrier Sense multiple access with collision detection Carrier Sense multiple access with collision deference Collision Sense for multiple access computers and devices Carriers Sense for multiple access computers and devices
Answer: (a) 16. Echo is not a useful error detection techniques in computer networking because _____. a) b) c) d)
it is complex to use it is difficult to implement it is time consuming errors may cancel out during the echo
Answer: (d) 17.
CRC is an error-detecting algorithm that checks data integrity by _____. a) b) c) d)
using redundant information computing a polynomial algorithm based checksum using echo discarding data
Answer: (b) 18.
If the data is 101011 and the divisor is 1011, the CRC remainder is _____. a) b) c) d)
110 101 001 010
Answer: (d) 19.
If the data is 111011 and the divisor is 1101, the CRC remainder is _____. a)
110
Chapter 3 – Data Link Layer
b) c) d)
101 111 010
Answer: (c) 20.
The Ethernet address (MAC address) has _____ bits. a) b) c) d)
32 64 48 16
Answer: (c) 21.
The first 24 bits of a MAC address identify the _____. a) b) c) d)
manufacturer of the network card computer on the network owner of the computer network owner of the IP address
Answer: (a) 22.
One character in the hexadecimal notation represents _______ bits. a) b) c) d)
2 4 6 8
Answer: (b) 23.
Switches improve the efficiency of Ethernets by _____. a) b) c) d)
reducing errors speeding transmission rates reducing collisions improving signals
Answer: (c) 24. Switches discover the MAC addresses of computers connected on the different ports by looking at the _____.
Chapter 3 – Data Link Layer
a) b) c) d)
source address of outgoing packets destination address of outgoing packets destination address of incoming packets source address of incoming packets
Answer: (d) 25.
Most modern corporate Ethernets use switches instead of hubs. a) b)
Answer: (a)
True False
Question Bank accompanying Business Data Communications By Manish Agrawal
Chapter 4 – Network Layer 1.
The network layer is responsible for transferring packets of data from the _____. a) b) c) d)
source computer to the destination computer on the same network source computer to the destination computer via one of more networks source computer to the destination computer on adjacent networks source computer to the Internet
Answer: (b) 2. When you use a GPS to navigate to the destination, the street address of the final destination is analogous to the _____. a) b) c) d)
IP address of a packet MAC address of a frame port address of an application header length of a packet
Answer: (a) 3. When you use a GPS to navigate to the destination, the intermediate exit numbers along the route are analogous to the _____. a) b) c) d)
IP address of a packet MAC address of a frame port address of an application header length of a packet
Answer: (b) 4. The advantage(s) of using two different addresses on a computer (MAC address and IP address) include _____. a) b)
it is possible to upgrade the IP software without upgrading the network hardware it is possible to upgrade the network hardware without upgrading the IP software
Chapter 4 – Network Layer
c) d)
the data link and network layers can be independent of each other All of the above
Answer: (d) 5.
The current version of IP is _____. a) b) c) d)
2 4 8 16
Answer: (b) 6.
IP provides _____. a) b) c) d)
best effort delivery guaranteed delivery priority delivery error-free delivery
Answer: (a) 7.
The time to live field of an IP packet indicates _____. a) b) c) d)
the remaining life of the packet in seconds the remaining life of the packet in network hops the announced life of the packet by the source the number of routers encountered by the packet during its journey
Answer: (b) 8.
An address is _____. a) b) c) d)
a unique label associated with an object the name of an application a unique label that helps locate an object on a network None of the above
Answer: (c) 9.
A 6-bit binary number can be used to uniquely label _____________ objects. a) b)
64 32
Chapter 4 – Network Layer
c) d)
16 256
Answer: (a) 10.
A 12-bit binary number can be used to uniquely label _____________ objects. a) b) c) d)
8,192 1,024 2,048 4,096
Answer: (d) 11.
The binary number 10001110 represents the decimal number _____. a) b) c) d)
140 138 142 144
Answer: (c) 12.
The binary number 1100111 represents the decimal number _____. a) b) c) d)
187 197 189 199
Answer: (d) 13.
The binary representation of the decimal number 231 is _____. a) b) c) d)
11000011 11100011 11100111 11000111
Answer: (c) 14.
The binary representation of the decimal number 212 is _____. a) b)
10110100 10110100
Chapter 4 – Network Layer
c) d)
11101110 11010100
Answer: (d) 15. The IP address 10000011 11100011 10101010 11000011 is written in dotted decimal notation as _____. a) b) c) d)
131.227.170.195 131.247.170.193 131.227.167.193 131.237.168.195
Answer: (a) 16. The IP address 10001011 11101010 10111010 11001110 is written in dotted decimal notation as _____. a) b) c) d)
139.224.176.206 137.247.170.193 139.234.186.206 137.237.168.195
Answer: (c) 17.
The IP address 192.168.50.75 is written in binary notation as _____. a) b) c) d)
11000001 10101000 00110011 01001011 11000000 10101001 00110010 01001011 10000000 10101000 00110010 01001010 11000000 10101000 00110010 01001011
Answer: (d) 18.
The IP address 172.16.80.125 is written in binary notation as _____. a) b) c) d)
10101100 00010000 01010001 01111101 10101100 00010000 01010000 01111101 10101100 00010000 01010000 01111100 10101101 00010000 01010000 01111101
Answer: (b) 19.
The left-most bits of an IP address identify the _____.
Chapter 4 – Network Layer
a) b) c) d)
host on the network the network in which the host is located the manufacturer of the host’s networking hardware the country in which the host is located
Answer: (b) 20.
The right-most bits of an IP address identify the _____. a) b) c) d)
host on the network the network in which the host is located the manufacturer of the host’s networking hardware the country in which the host is located
Answer: (a) 21.
The disadvantage of address classes was that _____. a) b) c) d)
it could support network of different sizes it wasted too many IP addresses, particularly among the largest networks it was too easy to obtain an IP address block None of the above
Answer: (b) 22.
CIDR stands for _____. a) b) c) d)
classed inter-domain routing classless inter-district routing classless international and domestic routing classless inter-domain routing
Answer: (d) 23.
Using CIDR, and organization that needs 2,000 IP addresses is best served by a _____. a) b) c) d)
/21 address block /20 address block /24 address block /22 address block
Answer: (a) 24.
An organization with a /20 CIDR address block can have at most _____.
Chapter 4 – Network Layer
a) b) c) d)
2,048 hosts 4,096 hosts 1,024 hosts 512 hosts
Answer: (b) 25.
In IPv6, the source and destination address fields are _____ bits long. a) b) c) d)
Answer: (c)
32 64 128 96
Question Bank accompanying Business Data Communications By Manish Agrawal
Chapter 5 – Transport Layer 1. The important functions of the transport layer include all of the following except _____. a) b) c) d)
segmentation routing port addressing duplicate detection
Answer: (b) 2. The transport layer protocol that provides end-to-end reliability over packet switched networks is _____. a) b) c) d)
IP UDP TCP HTTP
Answer: (c) 3. The transport layer protocol that does not provide end-to-end reliability over packet switched networks is _____. a) b) c) d)
IP UDP TCP HTTP
Answer: (b) 4. The sequence numbers added by TCP to every datagram enable the detection of _____. a)
duplicate segments
Chapter 5 – Transport Layer
b) c) d) e)
lost segments bit level errors A and B A and C
Answer: (d) 5.
TCP assigns a sequence number to every byte of data to _____. a) b) c) d)
enable better detection of bit-level errors enable the receiver to acknowledge partial datagrams simplify counting of segments None of the above
Answer: (b) 6. A TCP segment with sequence number 1,000 has a length of 350 Bytes. The next segment in the sequence will have a sequence number of _____. a) b) c) d)
1000 1001 1350 1351
Answer: (c) 7.
The advantages of segmentation in TCP include _____. a) b) c) d)
reduction in the likelihood of errors in each datagram reduction in the amount of rework if a datagram is lost simplification of router hardware All of the above
Answer: (d) 8.
Ensuring that TCP recovers from lost and duplicate packets is called _____. a) b) c) d) e)
Answer: (a)
reliability flow control multiplexing segmentation connection establishment
Chapter 5 – Transport Layer
9.
Optimizing the transmission rate in TCP to minimize lost packets is called _____. a) b) c) d) e)
reliability flow control multiplexing segmentation connection establishment
Answer: (b) 10.
The ability of TCP to serve multiple applications simultaneously is called _____. a) b) c) d) e)
reliability flow control multiplexing segmentation connection establishment
Answer: (c) 11. Breaking application data of arbitrary size into smaller fragments for delivery by IP is called _____. a) b) c) d) e)
reliability flow control multiplexing segmentation connection establishment
Answer: (d) 12.
The three-way handshake is used in _____. a) b) c) d) e)
reliability flow control multiplexing segmentation connection establishment
Answer: (e) 13.
The mechanism used for flow control in TCP is _____. a) b)
sliding window three-way handshake
Chapter 5 – Transport Layer
c) d)
stop-and-wait CSMA/ CD
Answer: (b) 14. When a TCP connection is initiated, the sequence number of the first datagram is _____. a) b) c) d)
1 a randomly chosen number Either A or B None of the above
Answer: (b) 15.
Multiplexing at the transport layer enables _____. a) b) c) d)
multiple applications on the host to share a common network connection multiple hosts to share a common physical medium Both of the above None of the above
Answer: (a) 16.
Flow control in TCP is used to _____. a) b) c) d)
speed up the receiver if necessary speed up the sender if necessary slow down the receiver if necessary slow down the sender if necessary
Answer: (d) 17.
The window size field in TCP specifies the _____. a) b) c) d)
amount of data the receiver is capable of processing amount of data the sender is capable of processing size of the window in the data center where the sender is located sequence number of the last received datagram
Answer: (a) 18. In the sliding windows mechanism for flow control, the ____ before waiting for an acknowledgment.
Chapter 5 – Transport Layer
a) b) c) d)
receiver processes as much data as specified by the sender in the window size field sender sends as much data as specified by the receiver in the window size field sender transmits data one segment at a time receiver acknowledge data one segment at a time
Answer: (b) 19.
An example of a standard port in TCP is _____. a) b) c) d)
a web browser using port 7756 an FTP client using port 34567 a web server listening on port 80 a network application written by you in Java, listening on port 8000
Answer: (c) 20.
Standard ports are defined in TCP for _____. a) b) c) d)
web browsers common network server applications common network client applications common desktop applications
Answer: (b) 21. Incoming packets are directed to the appropriate application on the computer based on the _____. a) b) c) d)
MAC address IP address port address URL
Answer: (c) 22.
A communication socket or Internet socket is defined by a(n) _____. a) b) c) d)
IP address port address IP address and port address together None of the above
Answer: (c) 23.
The standard ports in TCP are port numbers in the range _____.
Chapter 5 – Transport Layer
a) b) c) d)
1 – 1,023 1 - 100 1 – 65,535 1 – 10,000
Answer: (a) 24.
UDP is used when _____. a) b) c) d)
large quantities of data are to be transferred small quantities of data are to be transferred ordered and reliable delivery is not necessary for an application ordered and reliable delivery is required for an application
Answer: (c) 25.
The advantages of UDP include _____. a) b) c) d)
it can be faster than TCP it is simpler than TCP it is suitable for multi-media applications it is as reliable as TCP
Answer: (d)
Question Bank accompanying Business Data Communications By Manish Agrawal
Chapter 6 – Application Layer 1.
The application layer is responsible for _____. a) b) c) d)
specifying end user needs segmenting user data routing data None of the above
Answer: (a) 2. A unique feature of the application layer compared to the other layers of the TCP/ IP stack is that _____. a) b) c) d)
the application layer performs segmentation there is a separate protocol for each application the application layer provides security the application layer provides pretty interfaces
Answer: (b) 3. The only layer in the TCP/ IP stack that interfaces with the end user’s file system is _____. a) b) c) d)
the transport layer the network layer the application layer the physical layer
Answer: (c) 4. You have created a new application protocol for online games. To use this protocol, users will need to install _____. a) b)
an entire networking stack a new routing protocol
Chapter 6 – Application Layer
c) d)
a new segmentation protocol only the new application protocol
Answer: (d) 5.
HTTP is an application layer protocol that enables the transfer of _____. a) b) c) d)
any files between computers only web pages between computers parts of files between computers only web pages and images between computers
Answer: (a) 6.
The world wide web is an information system that _____. a) b) c) d)
displays web pages on computers located anywhere on the local network displays web pages on computers located anywhere in the world displays text files on computers located anywhere in the world displays graphics on computers located anywhere in the world
Answer: (b) 7.
The web is an effective filter of information because _____. a) b) c)
most web pages are automatically generated by computers most web pages are located in exotic locations most web pages are created by people or programs with a great interest in ensuring that the content on the page is correct and engaging most web pages are used for marketing
d) Answer: (c)
8. The special feature of the web that makes it useful as a marketing tool is its ability to _____. a) b) c) d)
display visually attractive pages play sound along with images and text provide correct information customize information for each individual
Answer: (d) 9.
Search advertising is _____.
Chapter 6 – Application Layer
a) b) c) d)
the placement of advertisements near web search results searching for advertisements on the Internet advertising search engines on the Internet allowing users to search for coupons on the Internet
Answer: (a) 10.
A hyperlink is _____. a) b) c) d)
a web page for very active individuals text on a web page that can be clicked to reach another web page a group of very active individuals a social network for very active individuals
Answer: (b) 11.
The <a> tag in HTML is used to _____. a) b) c) d)
display text display images display hyperlinks display annotations
Answer: (c) 12.
Inlinks are _____. a) b) c) d)
links on a web page that point to other parts of the same web page links on a web page that point to other web pages on the same web server links on web pages that point to each other links on other web pages that point to the given web page
Answer: (d) 13.
When the browser requests a web page using HTTP, it typically specifies _____. a)
the file name of the web page requested along with some useful information about itself only the file name of the web page requested only its own identification None of the above
b) c) d) Answer: (a) 14.
A URL is _____.
Chapter 6 – Application Layer
a) b)
used only to access web pages a character string describing the location and access method of a networked resource another way of specifying an IP address used to help in routing packets
c) d)
Answer: (b) 15.
In the URL http://ftp.net.usf.edu:80/favicon.ico, ftp.net.usf.edu indicates that _____. a) b) c) d)
the protocol used to download the information is FTP the user wishes to download the home page of the URL ftp.net.usf.edu the requested resource is located at ftp.net.usf.edu the user is trying to connect to port 80
Answer: (c) 16.
Advantages of email include _____. a) b) c) d)
the low cost of sending information to members in the organization the ability to communicate asynchronously the ability to eliminate cues related to age and gender All of the above
Answer: (d) 17.
SMTP is used to _____. a) b) c) d)
deliver email to the destination mail server manipulate the contents of the mailbox access web pages delete mail in the mailbox
Answer: (a) 18.
Email is the most suitable medium to disseminate information to a global audience. a) b)
True False
Answer: (b) 19.
IMAP and POP are used to _____. a)
deliver email to the destination mail server
Chapter 6 – Application Layer
b) c) d)
manipulate the contents of the mailbox access web pages serve web pages
Answer: (c) 20.
The differences between POP and IMAP include all of the following except _____. a) b) c) d)
IMAP allows the synchronization of multiple mail clients to the same mailbox IMAP associates a unique identifier to each email IMAP defines a set of flags that can be used to label mails in the mailbox POP allows the synchronization of multiple mail clients to the same mailbox
Answer: (d) 21.
FTP would be preferred over HTTP when _____. a) b) c) d) e)
a file is to be uploaded to a web server by the site administrator a large number of files are to be downloaded from a remote server a large file is to be downloaded from a remote server A and B A and C
Answer: (d) 22.
HTTP is one of the oldest application layer protocols. a) b)
True False
Answer: (b) 23.
All of the following industries have been affected by the web except _____. a) b) c) d)
stock brokerage travel reservations lawn mowing book selling
Answer: (c) 24.
The pull model of communication used on the web means that _____. a) b)
end users must choose to pull down content on web pages site administrators must pull content on their web sites from other sites
Chapter 6 – Application Layer
c) d)
web sites are ranked based on how many visitors they pull in every month None of the above
Answer: (a) 25.
One unique feature of instant messaging compared to SMTP or HTTP is that _____. a) b) c) d)
IM enables communication IM lets people know whether other users are online IM can be used to exchange files IM can be used to send text messages
Answer: (b)
Question Bank accompanying Business Data Communications By Manish Agrawal
Chapter 7 – Support Services 1.
In most networks, hosts are assigned IP addresses _____. a) b) c) d)
manually using DNS using DHCP using NAT
Answer: (c) 2.
DHCP _____. a) b) c) d)
automates the allocation of IP addresses enables IP address reuse translates hostnames to IP addresses defines non-routable IP addresses
Answer: (a) 3.
Clients locate the DHCP server on their network because _____. a) b) c) d)
the IP address of the DHCP server is typically programmed into the computer the DHCP DISCOVER message sent by the computer is broadcast on the network any computer on the network can act as a DHCP server the client can act as its own DHCP server
Answer: (b) 4.
In automatic allocation, IP addresses are assigned by DHCP _____. a) b) c)
automatically and forever, based on a first-come-first-serve basis, from a pool of addresses manually and forever on a per-host basis automatically and for a short period, based on a first-come-first-serve basis, from a pool of addresses
Chapter 7 – Support Services
d)
None of the above
Answer: (a) 5.
In manual allocation, IP addresses are assigned by DHCP _____. a)
automatically and forever, based on a first-come-first-serve basis, from a pool of addresses manually and forever on a per-host basis automatically and for a short period, based on a first-come-first-serve basis, from a pool of addresses None of the above
b) c) d)
Answer: (b) 6.
In dynamic allocation, IP addresses are assigned by DHCP _____. a)
automatically and forever, based on a first-come-first-serve basis, from a pool of addresses manually and forever on a per-host basis automatically and for a short period, based on a first-come-first-serve basis, from a pool of addresses None of the above
b) c) d) Answer: (c) 7.
Manual allocation by DHCP is useful for _____. a) b) c) d)
client PCs servers such as workstations non-server networked devices such as printers None of the above
Answer: (c) 8.
Dynamic allocation by DHCP is useful for _____. a) b) c) d)
client PCs servers such as workstations non-server networked devices such as printers None of the above
Answer: (a) 9.
Non-routable addresses are also called _____.
Chapter 7 – Support Services
a) b) c) d)
useless addresses experimental addresses hobby addresses RFC 1918 addresses
Answer: (d) 10.
All of the following are RFC 1918 address blocks except _____. a) b) c) d)
10.0.0.0/ 8 172.16.0.0/ 16 192.168.0.0/ 16 118.7.8.0/ 24
Answer: (d) 11.
Non-routable addresses are useful because _____. a) b) c) d)
they enable IP address reuse they enable automatic assignment of IP addresses they enable translation of host names to IP addresses they are reserved for academic use
Answer: (a) 12.
Network address translation is the method of _____. a) b) c) d)
allocating IP addresses automatically mapping IP addresses from one address block to another address block translating host names to IP addresses allocating IP address blocks to ISPs
Answer: (b) 13.
Network address translation is useful because it enables _____. a) b) c) d)
the automatic allocation of IP addresses the translation of host names to IP addresses IP address reuse the allocation of IP address blocks to ISPs
Answer: (c) 14.
A limitation of network address translation is that _____.
Chapter 7 – Support Services
a) b) c) d)
it wastes IP addresses it adds complexity to DNS it cannot be used with RFC 1918 addresses it cannot be used to assign IP addresses to servers
Answer: (d) 15. When NAT is used in home networks, RFC 1918 addresses can be reused in neighboring homes _____. a) b)
True False
Answer: (a) 16.
Address resolution protocol (ARP) is used to _____. a) b) c) d)
automate the allocation of IP addresses discover the MAC address of a host whose IP address is known discover the IP address of a host whose MAC address is known define non-routable IP addresses
Answer: (b) 17.
DNS is used to _____. a) b) c) d)
automate the allocation of IP addresses enable IP address reuse translate hostnames to IP addresses define non-routable IP addresses
Answer: (c) 18.
Clients locate the DNS server on their network because _____. a) b) c) d)
the IP address of the DNS server is typically programmed into the computer all computers on the network act as DNS servers the client can typically act as its own DNS server they obtain it using DHCP at boot time
Answer: (d) 19. When a client wishes to translate the hostname www.example.com, it sends a translation request to _____.
Chapter 7 – Support Services
a) b) c) d)
the DNS server identified by DHCP the DNS server responsible for the example.com domain the DNS server responsible for all “.com” domains any DNS server
Answer: (a) 20. The administrator for the “.com” domain is responsible for knowing the IP address of _____. a) b) c) d)
www.example.com example.com example.edu A and B
Answer: (b) 21.
___________ know(s) the name to IP address mapping of all “.com” addresses. a) b) c) d)
The root name servers The “.com” name servers No single name server The “.edu” name server
Answer: (c) 22.
The time-to-live for a DNS record specifies the _____. a) b) c) d)
the maximum number of hops allowed for a packet to reach the host the mean number of hops allowed for a packet to reach the host the time at which the host is expected to be taken down for maintenance the duration for which the name to IP address mapping is expected to be valid
Answer: (d) 23.
DNS organizes the name to IP address mappings _____. a) b) c) d)
hierarchically in a relational database table in a central database located at the root name servers in a spreadsheet
Answer: (a) 24.
In a typical home network, the router also acts as the _____.
Chapter 7 – Support Services
a) b) c) d)
DNS server DHCP server NAT device All of the above
Answer: (d) 25.
In a typical home network, all computers in the home are assigned IP addresses _____. a) b) c) d)
from the ISP’s allocated address pool from the RFC 1918 address pool from the home owner’s preferred address pool randomly
Answer: (b)
Question Bank accompanying Business Data Communications By Manish Agrawal
Chapter 8 – Subnetting 1.
Subnetting is _____. a) b) c) d)
a way of breaking down large blocks of IP addresses into smaller address blocks a way of reusing IP addresses a way of reducing the size of networks a way of distributing applications
Answer: (a) 2.
Subnetting is most useful for _____. a) b) c) d)
the Internet registrars network administrators end users None of the above
Answer: (b) 3.
Subnetting offers all of the following benefits except _____. a) b) c) d)
it helps organize IP addresses it helps delegation of networking responsibilities it helps DNS operation it simplifies routing
Answer: (c) 4. When a network uses subnetting, the IP addresses in the organization can be seen to have at least _____ parts. a) b) c) d)
2 6 4 3
Chapter 8 – Subnetting
Answer: (d) 5.
The number of subnets in the organization is best determined by _____. a) b) c) d)
the structure of the organization the network administrator’s abilities the number of hosts (computers) in the organization None of the above
Answer: (a) 6. An organization has 20 subnets. The subnet part of the IP addresses in the organization must have at least _______ bits. a) b) c) d)
4 5 6 7
Answer: (b) 7. An organization has 50 subnets. The subnet part of the IP addresses in the organization must have at least _______ bits. a) b) c) d)
4 5 6 7
Answer: (c) 8. An organization has 100 subnets. The subnet part of the IP addresses in the organization must have at least _______ bits. a) b) c) d)
5 6 7 8
Answer: (c) 9. An organization with a class B network address uses 8 bits for the subnet ID. Each subnet in this organization can have _____ hosts. a)
512
Chapter 8 – Subnetting
b) c) d)
64 128 256
Answer: (d) 10. An organization with a class B network address uses 7 bits for the subnet ID. Each subnet in this organization can have _____ hosts. a) b) c) d)
512 64 128 256
Answer: (a) 11. An organization with a class B network address uses 6 bits for the subnet ID. Each subnet in this organization can have _____ hosts. a) b) c) d)
512 1,024 2,048 4,096
Answer: (b) 12. An organization with a class B network address has 200 subnets. Each subnet in this organization can have at most _____ bits for the host ID. a) b) c) d)
8 9 7 6
Answer: (a) 13. An organization with a class B network address has 100 subnets. Each subnet in this organization can have at most _____ bits for the host ID. a) b) c) d)
8 9 7 6
Answer: (b)
Chapter 8 – Subnetting
14. An organization with a class B network address has 50 subnets. Each subnet in this organization can have at most _____ bits for the host ID. a) b) c) d)
8 9 10 12
Answer: (c) 15. An organization with a class B network address has 200 subnets. Each subnet in this organization can have at most _____ hosts. a) b) c) d)
64 128 256 512
Answer: (c) 16. An organization with a class B network address has 100 subnets. Each subnet in this organization can have at most _____ hosts. a) b) c) d)
64 128 256 512
Answer: (d) 17. An organization with a class B network address has 50 subnets. Each subnet in this organization can have at most _____ hosts. a) b) c) d)
1,024 512 256 128
Answer: (a) 18. An organization with a class B network address has 200 subnets. The most suitable subnet mask for the organization is _____. a) b)
255.255.255.0 255.255.254.0
Chapter 8 – Subnetting
c) d)
255.255.252.0 255.255.248.0
Answer: (a) 19. An organization with a class B network address has 100 subnets. The most suitable subnet mask for the organization is _____. a) b) c) d)
255.255.255.0 255.255.254.0 255.255.252.0 255.255.248.0
Answer: (b) 20. An organization with a class B network address has 50 subnets. The most suitable subnet mask for the organization is _____. a) b) c) d)
255.255.255.0 255.255.254.0 255.255.252.0 255.255.248.0
Answer: (c) 21. When the subnet mask 255.255.255.0 is applied to the IP address 192.168.151.45, the result is _____. a) b) c) d)
255.255.255.0 192.168.151.45 255.255.255.255 192.168.151.0
Answer: (d) 22. When the subnet mask 255.255.254.0 is applied to the IP address 192.168.151.45, the result is _____. a) b) c) d)
255.255.255.0 192.168.151.0 255.155.155.155 192.168.150.0
Answer: (d)
Chapter 8 – Subnetting
23. When the subnet mask 255.255.252.0 is applied to the IP address 192.168.151.45, the result is _____. a) b) c) d)
255.255.255.0 192.168.151.145 192.168.148.0 192.168.150.0
Answer: (c) 24.
Hosts typically obtain their subnet mask information from _____. a) b) c) d)
network administrators, who configure hosts manually at first boot DHCP the factory, where the subnet mask is hard-wired during computer assembly None of the above
Answer: (b) 25. If an organization has a subnet mask of 255.255.252.0, each subnet in the organization can have at most _____ hosts. a) b) c) d) Answer: (c)
256 512 1,024 2,048
Question Bank accompanying Business Data Communications By Manish Agrawal
Chapter 9 – Routing 1.
Routing is the process of _____. a) b) c) d)
selecting information paths from the source network to the destination network directing end users to their user stations in the office directing network traffic around defective routers None of the above
Answer: (a) 2.
Broadcast is used to transfer data across the Internet. a) b)
True False
Answer: (b) 3.
Compared to routers, switches typically cannot _____. a) b) c) d)
locate the destination host on the network transfer data select the correct path from multiple available paths handle broadcasts
Answer: (c) 4.
To reduce broadcasts in a LAN, the most suitable device is a _____. a) b) c) d)
hub router CAT 5 cable switch
Answer: (d)
Chapter 9 – Routing
5.
Routers connect _____. a) b) c) d)
two or more networks two or more hosts two or more users two or more applications
Answer: (a) 6.
A router has two or more _____. a) b) c) d)
network administrators IP addresses hosts switches
Answer: (b) 7.
An autonomous system is _____. a) b) c) d)
another name for a router a collection of switches a collection of routers under one administrative entity a collection of end users
Answer: (c) 8.
An autonomous system _____. a) b) c) d)
transfers data to a neighboring AS for delivery to the destination assists neighboring routers in locating destination hosts operates independently of the Internet is responsible for delivering data to hosts within the AS
Answer: (d) 9.
The basic unit of Internet routing is _____. a) b) c) d)
Answer: (a)
an autonomous system a switch a host a router
Chapter 9 – Routing
10.
Each autonomous system is identified by _____. a) b) c) d)
its MAC address its AS number its IP address its host name
Answer: (b) 11.
A routing table is a table stored in a router which keeps track of _____. a) b) c) d)
all known paths to neighboring networks the best paths to neighboring networks all known paths to destination networks the best paths to destination networks
Answer: (c) 12.
Routing tables maintain routes as _____. a) b) c) d)
a sequence of IP addresses a sequence of router IDs a sequence of URLs a sequence of AS numbers
Answer: (d) 13.
A router is responsible for forwarding data packets to _____. a) b) c) d)
a suitable neighboring router the final destination any neighboring router None of the above
Answer: (a) 14.
A routing metric for a route is a measure of _____. a) b) c) d)
the cost of building the network route the cost of sending packets through the route the cost of operating the network route the rental fee for using the network route
Answer: (b)
Chapter 9 – Routing
15.
Routing protocols are the mechanisms used by routers to _____. a) b) c) d)
deliver data over the cables resolve host names to IP addresses maintain routing tables speed up routing
Answer: (c) 16.
The most popular exterior routing protocol is _____. a) b) c) d)
address resolution protocol (ARP) open shortest path first protocol (OSPF) dynamic host control protocol (DHCP) border gateway protocol (BGP)
Answer: (d) 17.
The most popular interior routing protocol is _____. a) b) c) d)
open shortest path first protocol (OSPF) address resolution protocol (ARP) dynamic host control protocol (DHCP) border gateway protocol (BGP)
Answer: (a) 18. In exterior routing protocols, routers typically exchange routing information with _____. a) b) c) d)
all routers on the network only the neighboring routers only routers within the AS None of the above
Answer: (b) 19. In interior routing protocols, routers typically exchange routing information with _____. a) b) c) d)
all routers on the network only the neighboring routers only routers outside the network None of the above
Chapter 9 – Routing
Answer: (a) 20.
Route aggregation _____. a) b) c) d)
deletes unused destination addresses from the routing table combines multiple smaller IP address blocks into one larger IP address block increases the size of routing tables slows down routing
Answer: (b) 21.
All of the following are advantages of route aggregation except _____. a) b) c) d)
it can speed up routing it reduces the size of routing tables it reduces the number of hops required to reach a destination it can simplify network administration
Answer: (c) 22.
If two /16 IP address blocks are aggregated, the aggregated block will be a _____. a) b) c) d)
/14 address block /16 address block /17 address block /15 address block
Answer: (d) 23.
MPLS stands for _____. a) b) c) d)
multi-protocol label switching multi-party live service multi-protocol live service multi-party label switching
Answer: (a) 24.
In MPLS, packets are delivered based on _____. a) b) c) d)
IP destination addresses pre-defined labels port addresses the location of switches
Chapter 9 – Routing
Answer: (b) 25.
A forwarding equivalence class is _____. a) b) c) d)
Answer: (c)
a new kind of address class used in large networks a mechanism to treat all networks as equivalent to each other a group of IP packets treated similarly in the network None of the above
Question Bank accompanying Business Data Communications By Manish Agrawal
Chapter 10 – Wide Area Networks 1.
Wide area networks are defined by their ability to _____. a) b) c) d)
provide data communication services to a large numbers of users provide very high bandwidths provide very high data rates use wireless technologies
Answer: (a) 2.
WAN technologies use broadcast. a) b)
True False
Answer: (b) 3.
When a device has data to be delivered over a WAN network _____. a) b) c) d)
it waits for the medium to become idle it stops the existing traffic over the medium to send the data the data is merged with the existing traffic None of the above
Answer: (c) 4.
When a phone line is used to carry data traffic, the highest data rate possible is _____. a) b) c) d)
32 kbps 1.544 mbps 128 kbps 64 kbps
Answer: (d)
Chapter 10 – Wide Area Networks
5.
The earliest wide area data networks were built using _____. a) b) c) d)
phone lines t-carriers ATM X.25
Answer: (a) 6. T-1 is the simplest WAN data service provided by telecom carriers. It has a data rate of _____. a) b) c) d)
64 kbps 1.544 mbps 256 kbps 44.736 mbps
Answer: (b) 7. T-3 is a very popular WAN data service provided by telecom carriers. Its data rate is _____. a) b) c) d)
64 kbps 1.544 mbps 44.736 mbps 256 kbps
Answer: (c) 8.
ISDN stands for _____. a) b) c) d)
inter-state data network inter-state digital network improved speed digital network integrated services digital network
Answer: (d) 9.
The goal of ISDN was to _____. a) b) c) d)
provide all communication services (data, voice, video) over one network provide a single bill for all communication services build a network to support data rates up to 10 mbps None of the above
Chapter 10 – Wide Area Networks
Answer: (a) 10. The limitations of point-to-point technologies include all of the following except _____. a) b) c) d)
they provide very limited opportunities for traffic aggregation they use a relatively simple technology a very large number of links may become necessary when networks grow in size average link utilization can be low
Answer: (b) 11. Statistically multiplexed WANs are defined by their ability to allocate network resources _____. a) b) c) d)
according to defined time slots according to defined frequencies according to needs on a dedicated basis
Answer: (c) 12. Compared to point-to-point links, statistically multiplexed WANs improve data link utilization by _____. a) b) c) d)
increasing data link capacity increasing the number of data links available increasing the number of end users aggregating traffic
Answer: (d) 13.
In data communications, a virtual circuit _____. a) b) c) d)
can carry data over various real circuits cannot really carry data is another name for the NASCAR circuit is another name for a circuit
Answer: (a) 14.
A virtual circuit ID is assigned to _____. a) b)
each autonomous system each source-destination pair
Chapter 10 – Wide Area Networks
c) d)
each source each destination
Answer: (b) 15.
Virtual circuit IDs are _____. a) b) c) d)
global shared among neighboring network carriers local to the network carrier None of the above
Answer: (c) 16. The statistically multiplexed WAN technology that uses link-by-link acknowledgments _____.is a) b) c) d)
frame relay T-3 ATM X.25
Answer: (d) 17.
In data communications, the term ATM stands for _____. a) b) c) d)
asynchronous transfer mode automatic teller machine any time money any transfer method
Answer: (a) 18. The statistically multiplexed WAN technology that is specifically designed to carry multiple kinds of traffic (data and voice) is _____. a) b) c) d)
frame relay ATM T-3 X.25
Answer: (b) 19.
A popular TDM WAN technology is _____.
Chapter 10 – Wide Area Networks
a) b) c) d)
frame relay ATM Synchronous Optical Network (SONET) X.25
Answer: (c) 20. Frequency division multiplexed WANs are used to leverage the data carrying capacity of _____. a) b) c) d)
wireless media copper wires SONET optical fiber
Answer: (d) 21.
When traversing from the source to destination, data packets typically cross _____. a) b) c) d)
multiple LANs and multiple WANs multiple LANs and one WAN one LAN and multiple WANs None of the above
Answer: (a) 22.
In the TCP/ IP stack, WAN technologies are considered to be instances of the _____. a) b) c) d)
transport layer data link layer network layer physical layer
Answer: (b) 23.
ATM specifies data rates in the range of _____. a) b) c) d)
56 kbps – 2 mbps 56 kbps – 45 mbps 1.544 mbps – 622.08 mbps 50.112 mbps – 150.336 mbps
Answer: (c) 24.
Frame relay specifies data rates in the range of _____.
Chapter 10 – Wide Area Networks
a) b) c) d)
1.544 mbps – 622.08 mbps 50.112 mbps – 150.336 mbps 56 kbps – 2 mbps 56 kbps – 45 mbps
Answer: (d) 25.
Virtual circuits are used with _____. a) b) c) d)
point-to-point WANS statistically multiplexed WANs TDM WANs FDM WANs
Answer: (b)
Question Bank accompanying Business Data Communications By Manish Agrawal
Chapter 11 – Wireless Networks 1.
The potential advantages of wireless LANs include all of the following except _____. a) b) c) d)
reliability lower installation costs user convenience quick installation
Answer: (a) 2. The potential disadvantages of wireless networks include all of the following except _____. a) b) c) d)
reliability costs data rates security
Answer: (b) 3.
Wireless LANs use wireless frequencies in the _____ frequency band. a) b) c) d)
Ku Ka ISM L
Answer: (c) 4.
All of the following are ISM frequency bands except _____. a) b) c) d)
915 MHz 2.45 GHz 5.8 GHz 50 GHz
Chapter 11 – Wireless Networks
Answer: (d) 5.
In the US, the agency that determines the uses of frequency bands is _____. a) b) c) d)
the Federal Communications Commission (FCC) the Federal Trade Commission (FTC) the National Science Foundation (NSF) the Securities and Exchange Commission (SEC)
Answer: (a) 6.
In wireless communication, the term ISM stands for _____. a) b) c) d)
intelligence, self-confidence and merit industrial, scientific and medical integrity, solidarity and method insight, sincerity and might
Answer: (b) 7. All of the following are among the three popular categories of wireless networks available for end users except _____. a) b) c) d)
personal area networks local area networks Ethernet metropolitan area networks
Answer: (c) 8.
The popular term Wi-Fi is a synonym for _____. a) b) c) d)
wireless personal area networks wireless telephone networks wireless metropolitan area networks wireless local area networks
Answer: (d) 9.
All of the following are differences between wireless and wired LANs except _____. a) b) c) d)
wireless LANs do not use CRC for error-detection wireless LANs have no well-defined boundaries the coverage areas of wireless LANs can overlap different users of the same wireless LAN may operate at different data rates
Chapter 11 – Wireless Networks
Answer: (a) 10.
CSMA/ CA stands for _____. a) b) c) d)
control signal multiple access with collision alertness carrier sense multiple access with collision avoidance carrier sense mediated access with collision alertness control signal mediated access with collision avoidance
Answer: (b) 11.
In wireless LANs, when a station is ready to transmit data, it _____. a) b) c) d)
sends the data right away sends the data as soon as the medium becomes idle sends the data a little after the medium becomes idle sends the data after waiting after a random delay
Answer: (c) 12.
Wireless LAN technologies are defined by the ____ group of standards. a) b) c) d)
ITU X.25 ITU T.40 IEEE 802.3 IEEE 802.11
Answer: (d) 13.
In a wireless LAN, the area covered by a single access point is a _____. a) b) c) d)
basic service area (BSA) distribution system (DS) extended service set (ESS) portal
Answer: (a) 14. In a wireless LAN, when a user moves from one basic service set (BSS) to another BSS within the same extended service set (ESS), typically _____. a) b) c) d)
its IP address changes, but the subnet membership remains the same it remains in the same subnet, with the same IP address both the IP address and subnet membership change None of the above
Chapter 11 – Wireless Networks
Answer: (b) 15. Any packet format changes required when the frame leaves the wireless LAN are done by the _____. a) b) c) d)
distribution system (DS) access point (AP) portal basic service set (BSS)
Answer: (c) 16.
To secure wireless LANs, the current recommendation is to _____. a) b) c) d)
use passwords use wired equivalent privacy (WEP) ignore security risks use Wi-Fi protected access (WPA-2)
Answer: (d) 17.
The goal of 802.11n is to _____. a) b) c) d)
improve the data rates of wireless LANs improve the security of wireless LANs reduce the configuration requirements for wireless LANs fix bugs in wireless LAN technologies
Answer: (a) 18.
The goal of wireless personal area networks is to _____. a) b) c) d)
provide high speed Internet access to laptops eliminate cable clutter around computing devices improve the security of wireless LANs extend the range of wireless LANs
Answer: (b) 19. You have invented a new device that can rapidly flip book pages and scan the pages. To connect this device to a computer for archiving the scanned data, the most suitable wireless technology is _____. a) b)
IEEE 802.3 IEEE 802.11
Chapter 11 – Wireless Networks
c) d)
IEEE 802.15 IEEE 802.16
Answer: (c) 20.
A piconet is _____. a) b) c) d)
an extremely small LAN a LAN with extremely low data rates a net used to capture pictures a Bluetooth master device together with the slave devices controlled by this master
Answer: (d) 21.
The maximum data rate possible in Bluetooth is _____. a) b) c) d)
up to 20 mbps up to 1 mbps up to 54 mbps up to 100 mbps
Answer: (a) 22.
WiMAX is another name for _____. a) b) c) d)
wireless local area networks (802.11) wireless metropolitan area networks (802.16) wireless personal area networks (802.15) wired local area networks (802.3)
Answer: (b) 23. You wish to offer low cost Internet connectivity to homes and businesses in a wealthy suburb. The most suitable wireless technology for the purpose is _____. a) b) c) d)
wireless local area networks (802.11) wireless personal area networks (802.15) wireless metropolitan area networks (802.16) wired local area networks (802.3)
Answer: (c) 24. You wish to offer low cost Internet and phone connectivity to homes in an underdeveloped country. The most suitable wireless technology for the purpose is _____.
Chapter 11 – Wireless Networks
a) b) c) d)
wireless local area networks (802.11) wireless personal area networks (802.15) wired local area networks (802.3) wireless metropolitan area networks (802.16)
Answer: (d) 25. The highest data rates possible in wireless metropolitan area networks (IEEE 802.16 networks) are _____. a) b) c) d)
1 mbps 11 mbps 54 mbps Over 100 mbps
Answer: (d)
Question Bank accompanying Business Data Communications By Manish Agrawal
Chapter 12 – Phone Networks 1.
The first widely used network to obtain Internet access in homes was _____. a) b) c) d)
the phone network Ethernet ATM frame relay
Answer: (a) 2.
In the phone network, end users are connected to each other using _____. a) b) c) d)
packet switching circuit switching routing MPLS
Answer: (b) 3.
In circuit switching, communicating devices are connected _____. a) b) c) d)
all the time most of the time on demand None of the above
Answer: (c) 4. Once a connection is established using circuit switching, the communicating devices at the two ends of the circuit _______________ for the duration of the connection. a) b) c) d)
share the circuit with neighboring users are connected on an as needed basis are connected on a round-robin basis have exclusive use of the circuit
Chapter 12 – Phone Networks
Answer: (d) 5.
The phone network is also called the POTS, which stands for _____. a) b) c) d)
Plain Old Telephone Service Planned Obsolescence Telecommunication Service Plain Out-of-Fashion Telecommunication System People’s Open Telephone Structure
Answer: (a) 6.
In the phone network, the local loop is the _____. a) b)
circuit between the phone company’s last switch and the local billing office circuit from the customer’s premises to the nearest switch in the phone company’s network the phone technician’s repair route network inside the customer’s premises
c) d)
Answer: (b) 7.
In the phone network, the local loop is _____. a) b) c) d)
shared by all users of the end office shared by users in a neighborhood dedicated to a single user dedicated to business customers
Answer: (c) 8. In the phone network, the end office is the location from where the phone company _____. a) b) c) d)
sends the customer’s bills provides customer service manages its own network provides the customer’s dial tone
Answer: (d) 9.
In the phone network, interexchange carriers are _____. a) b) c)
networks that carry traffic between end offices parcel services that help exchange traffic information between carriers devices that provide the customer’s dial tone
Chapter 12 – Phone Networks
d)
the links that carry signals from the end office to the customer’s premises
Answer: (a) 10.
In the phone network, the interexchange carrier link is _____. a) b) c) d)
shared by users in a neighborhood shared by all users of the end office dedicated to a single user dedicated to business customers
Answer: (b) 11.
The unit of frequency is _____. a) b) c) d)
volts degrees hertz angstrom
Answer: (c) 12.
The phone system transmits signals in the range _____. a) b) c) d)
520 kHz – 1,610 kHz 87.5 MHz – 108.0 MHz 2.44 GHz – 2.46 GHz 300 Hz – 3,400 Hz
Answer: (d) 13. In the early years of the 20th century, the phone network in the US operated as a _____. a) b) c) d)
regulated monopoly regulated duopoly competitive industry regulated oligopoly
Answer: (a) 14. The seven local phone companies created as a result of the modified final judgment of 1984 were called _____. a)
Lucent
Chapter 12 – Phone Networks
b) c) d)
The Regional Bell Operating Companies Bell Labs Verizon
Answer: (b) 15.
All of the following are true of the modified final judgment of 1984, except _____. a) b) c) d)
it created the seven RBOCs it limited AT&T’s monopoly in providing long distance phone service it created competition in local phone service it was the result of an anti-trust lawsuit filed by the U.S. Government against AT&T
Answer: (c) 16. The most important contribution of the Telecommunications Act of 1996 was that it _____. a) b) c) d)
created the seven RBOCs limited AT&T’s monopoly in providing long distance phone service was the result of an anti-trust lawsuit filed by the U.S. Government against AT&T created competition in local phone service
Answer: (d) 17. The technology developed by phone companies to offer basic high-speed data service over existing phone wires was _____. a) b) c) d)
DSL SONET T-1 T-3
Answer: (a) 18.
Typically in DSL _____. a) b) c) d)
downstream data rates are the same as upstream data rates downstream data rates are higher than upstream data rates downstream data rates are lower than upstream data rates None of the above
Answer: (b) 19.
Cell phone systems divide the coverage area into cells because _____.
Chapter 12 – Phone Networks
a) b) c) d)
cell phone signals cannot be transmitted beyond the range of a typical cell it keeps the heights of cell towers within permissible limits this enables frequency reuse this is required for regulatory compliance
Answer: (c) 20.
As a result of frequency reuse, the cell phone system _____. a) b) c) d)
becomes more expensive can operate with shorter towers does not need to use encryption can support as many subscribers as necessary using the limited bandwidth available
Answer: (d) 21. In the cell phone system, conversations are switched to the most suitable tower by the _____. a) b) c) d)
mobile telephone switching office (MTSO) end office central office base station
Answer: (a) 22. In a cell phone system, the process of transferring a call from one tower to another is called _____. a) b) c) d)
routing handoff switching None of the above
Answer: (b) 23.
The major advantage of CDMA over TDM and FDM is that _____. a) b) c) d)
Answer: (c)
CDMA is simpler to implement than TDM or FDM CDMA combines the benefits of TDM and FDM CDMA can support many more users using the same network resources than TDM or FDM None of the above
Chapter 12 – Phone Networks
24.
The multiplexing method used by 3-G cell phone systems is _____. a) b) c) d)
time division multiplexing (TDM) frequency division multiplexing (FDM) orthogonal frequency division multiplexing (OFDM) code division multiplexing access (CDMA)
Answer: (d) 25. The major development in 2-G cell phone systems compared to 1-G cell phone systems was the _____. a) b) c) d) Answer: (a)
use of digital signals instead of analog signals use of CDMA instead of FDM ability to offer very high data rates use of CDMA instead of TDM
Question Bank accompanying Business Data Communications By Manish Agrawal
Chapter 13 – Network Security 1.
Information security is defined as _____. a) b) c) d)
providing confidentiality, integrity and availability to information encrypting information hiding information providing robust data storage of information
Answer: (a) 2.
Confidentiality is defined as _____. a) b) c) d)
guarding against improper modification of information to ensure authenticity maintaining restrictions on information to protect personal privacy ensuring timely and reliable use of information None of the above
Answer: (b) 3.
Integrity is defined as _____. a) b) c) d)
maintaining restrictions on information to protect personal privacy ensuring timely and reliable use of information guarding against improper modification of information to ensure authenticity None of the above
Answer: (c) 4.
Availability is defined as _____. a) b) c) d)
guarding against improper modification of information to ensure authenticity maintaining restrictions on information to protect personal privacy encrypting information ensuring timely and reliable use of information
Chapter 13 – Network Security
Answer: (d) 5.
Vulnerabilities are _____. a)
weaknesses in an information system that can be exploited to compromise information security capabilities, intentions and methods of adversaries to compromise information security measures taken to mitigate the dangers from information security threats restrictions on information to protect personal privacy
b) c) d) Answer: (a) 6.
Threats are _____. a)
weaknesses in an information system that can be exploited to compromise information security capabilities, intentions and methods of adversaries to compromise information security measures taken to mitigate the dangers from information security threats restrictions on information to protect personal privacy
b) c) d)
Answer: (b) 7.
Controls are _____. a)
weaknesses in an information system that can be exploited to compromise information security capabilities, intentions and methods of adversaries to compromise information security measures taken to mitigate the dangers from information security threats restrictions on information to protect personal privacy
b) c) d) Answer: (c) 8.
Information security controls are commonly classified in the industry as _____. a) b) c) d)
confidentiality, integrity and availability controls firewalls, passwords and anti-virus systems militarized and de-militarized zones procedural, physical and technical controls
Answer: (d) 9.
Network security _____.
Chapter 13 – Network Security
a) b) c) d)
protects information against dangers created by network connectivity protects network hardware against dangers created by network connectivity protects end users against dangers created by network connectivity None of the above
Answer: (a) 10.
In the context of network security, patching _____. a) b) c) d)
applies cosmetic changes to software updates software to fix known software bugs improves the look and feel of software adds user friendly features to software
Answer: (b) 11.
Authentication is _____. a) b) c) d)
hiding information providing an alternate identity the verification of a claimed identity granting certain specific privileges over information to a user
Answer: (c) 12.
Authorization is _____. a) b) c) d)
hiding information providing an alternate identity the verification of a claimed identity granting certain specific privileges over information to a user
Answer: (d) 13.
In network security, a firewall is a device which lies between two networks and _____. a) b) c) d)
Answer: (a)
regulates data traffic between the networks to prevent attacks originating from the external network to cause harm to the internal network regulates the movement of network administrators from the external network to the internal network prevents fires in the external network from spreading to the internal network None of the above
Chapter 13 – Network Security
14.
In the context of network security, the de-militarized zone _____. a) b) c) d)
is most useful in military networks contains the organization’s external services such as web and email servers contains the organization’s sensitive data None of the above
Answer: (b) 15.
The limitations of firewalls include all the following except _____. a) b) c) d)
it is ineffective if an internal computer is compromised it cannot protect services accessible from the Internet it can block traffic from any identified host or network its effectiveness depends upon the abilities of the administrator
Answer: (c) 16.
A denial-of-service attack _____. a) b) c) d)
blocks traffic from any identified host or network typically only affects military computers compromises the integrity of information prevents a host from performing its legitimate functions
Answer: (d) 17.
Encryption is the process of _____. a)
rendering information unreadable in such a way that authorized users may later make the information readable adding a password to information placing information behind a firewall placing information in the de-militarized zone
b) c) d) Answer: (a) 18.
In symmetric key encryption _____. a) b) c) d)
the key used for encryption is a mirror image of the key used for decryption the same key is used for encryption and decryption the key used for encryption is independent of the key used for decryption None of the above
Answer: (b)
Chapter 13 – Network Security
19.
All the following are properties of asymmetric key encryption except _____. a) b) c) d)
it makes it easy to exchange the encryption key it uses two keys it is computationally simple the key used for encryption cannot be used for decryption
Answer: (c) 20.
The most popular implementation of asymmetric key encryption is _____. a) b) c) d)
Data Encryption Standard (DES) International Data Encryption Algorithm (IDEA) Advanced Encryption Standard (AES) Rivest, Shamir and Alderman (RSA)
Answer: (d) 21.
Most commercial encryption technologies such as SSL and VPN _____. a) b) c) d)
combine the best features of symmetric and asymmetric key encryption use only symmetric key encryption use only asymmetric key encryption allow the user to choose whether to use symmetric or asymmetric key encryption
Answer: (a) 22. The most common control used to ensure availability of outgoing information is _____. a) b) c) d)
firewall redundancy encryption de-militarized zone
Answer: (b) 23.
Redundancy is _____. a) b) c) d)
Answer: (c)
scheduling periodic maintenance to improve availability hiding information to provide confidentiality the provision of surplus service capacity to improve availability None of the above
Chapter 13 – Network Security
24. An organization maintains multiple network connections to the Internet. This is an example of _____. a) b) c) d)
encryption patching modulation redundancy
Answer: (d) 25. A mobile worker requires secure access to corporate business applications from his hotel room. The most suitable encryption technology for this purpose is _____. a) b) c) d) Answer: (a)
Virtual Private Network (VPN) Transport Layer Security (TLS) Secure Shell (SSH) Digital Signature
Question Bank accompanying Business Data Communications By Manish Agrawal
Chapter 14 – Managerial Issues 1.
A design is a _____. a) b) c) d)
detailed description of a product or service wish list for desired features in a network implementation of a network upgrade to a network implementation
Answer: (a) 2.
The goal of network design is to _____. a) b) c) d)
create a visually attractive network meet end user needs within budget use the latest technologies to implement the network use the least expensive technologies to implement the network
Answer: (b) 3.
Network costs include _____. a) b) c) d)
setup costs only maintenance costs only setup costs, maintenance costs and downtime costs downtime costs only
Answer: (c) 4.
During the requirements analysis phase, the goal is to _____. a) b) c) d)
identify the latest networking technologies available identify the most promising new technologies identify the least expensive technologies available identify the categories and locations of users and applications
Chapter 14 – Managerial Issues
Answer: (d) 5.
The logical network design includes all of the following except _____. a) b) c) d)
specific technologies used to implement the network layout of the network subnets in the network IP address and naming schemes used in the network
Answer: (a) 6.
The physical network design updates the logical design by including the _____. a) b) c) d)
layout of the network specific technologies used to implement the network subnets in the network IP address and naming schemes used in the network
Answer: (b) 7. In a small office network where the hosts are within 100 meters of each other, the most suitable technology to connect the devices is usually _____. a) b) c) d)
SONET frame relay Ethernet ATM
Answer: (c) 8.
Subnets can be created in the network using _____. a) b) c) d)
hubs switches access points routers
Answer: (d) 9.
All of the following are advantages of standardizing on one vendor except _____. a) b) c) d)
access to the best technologies for every network component ease of maintaining an inventory of spare parts interoperability of equipment the ability to develop deep expertise
Chapter 14 – Managerial Issues
Answer: (a) 10. A network that connects devices located within a single building is commonly called a _____. a) b) c) d)
core network building network campus network distribution network
Answer: (b) 11. A network that connects multiple buildings located near each other is commonly called a _____. a) b) c) d)
core network building network campus network distribution network
Answer: (c) 12.
In the modular approach to network design _____. a) b)
each part of the network uses a design customized to that part of the network the administrator of each part of the network selects their own design for their part of the network the network is built using Lego blocks the network is built by reusing a standard design that has been refined from experience
c) d)
Answer: (d) 13.
The core layer of a campus network is responsible for _____. a) b) c) d)
fast and reliable transportation of data across different parts of the network providing administrative and support services to the network providing network ports to end users None of the above
Answer: (a) 14.
The distribution layer of a campus network is responsible for _____. a)
fast and reliable transportation of data across different parts of the network
Chapter 14 – Managerial Issues
b) c) d)
providing administrative and support services to the network providing network ports to end users None of the above
Answer: (b) 15.
The access layer of a campus network is responsible for _____. a) b) c) d)
fast and reliable transportation of data across different parts of the network providing administrative and support services to the network providing network ports to end users None of the above
Answer: (c) 16. In class, you hook your laptop to a network port on the room wall. The port is part of the ______ of the campus network. a) b) c) d)
support layer core layer distribution layer access layer
Answer: (d) 17. To ensure availability in a campus network, redundancy is usually provided at the _____. a) b) c) d)
core layer distribution layer access layer support layer
Answer: (a) 18.
An organization’s geographically scattered network is called a(n) _____. a) b) c) d)
wide area network enterprise network local area network campus network
Answer: (b) 19.
The simple network management protocol is used to _____.
Chapter 14 – Managerial Issues
a) b) c) d)
distribute IP addresses detect and remove computer viruses and worms on the network manage and control IP devices block incoming requests from rogue hosts and networks
Answer: (c) 20.
The management information base of a device manageable by SNMP contains _____. a) b) c) d)
the users’ browsing history the users’ email history the size of the organization in which the device is located only information essential for fault or configuration management
Answer: (d) 21.
Standards are _____. a) b) c) d)
rules that ensure inter-operability among devices bureaucratic procedures financial rules political statements
Answer: (a) 22.
Standards provide all the following advantages except _____. a) b) c) d)
interoperability of devices rapid introduction of a technology lower costs increased competition among vendors
Answer: (b) 23. Standards for Ethernet and wireless LANs (802.11) are developed and maintained by _____. a) b) c) d)
the International Telecommunications Union (ITU) the Federal Communications Commission (FCC) the Institute for Electrical and Electronics Engineers (IEEE) the Internet Engineering Task Force (IETF)
Answer: (c) 24.
In the TCP/ IP stack, standards at the network and transport layers are mainly
Chapter 14 – Managerial Issues
developed by _____. a) b) c) d)
the International Telecommunications Union (ITU) the Federal Communications Commission (FCC) the Institute for Electrical and Electronics Engineers (IEEE) the Internet Engineering Task Force (IETF)
Answer: (d) 25. The US Department of Defense (DoD) funded the development of TCP/ IP with the goal of _____. a) b) c) d) Answer: (a)
developing a robust communication system that would be functional even if large parts of the system were destroyed in war developing classified technology for military use competing with Ethernet None of the above