3d152 CDC's URE Set 2 Volume 2

93 cards

3d152 CDC's URE Questions From Set 2 Volume 2


 
  
Created Oct 22, 2011
by
bruenor80

 

 
Table View
 
Download
 
Print

Flashcard Set Preview

  Side A   Side B
1
What happens when more bits are added to a digital signal arranged in a sequence understood...
 
A code set is established
2
How many possible symbols can 4 bits represent?
 
16
3
In networking, a byte is defined as a/an
 
word
4
What organization sets important computer networking wiring standards for residential...
 
Telecommunications Industry Association (TIA)
5
What Electronic Industry Alliance (EIA)/ Telecommunications Industry Association (TIA) format...
 
568A
6
Which of the following is an International Telecommunications union (ITU) standardized format...
 
E-carrier
7
There is world wide nonprofit association of technical professionals that promotes...
 
Institute of Electrical and Electronics Engineers(IEEE)
8
A collection of standards for local area network (LAN) architectures, protocols, and technologies...
 
Institute of Electrical and Electronic Engineers(IEEE)
9
The parent organization, headquartered in Geneva, Switzerland, for all other telecommunications...
 
International Telecommunications Union(ITU)
10
What organization is responsible for the X-series and V-series standards?
 
International Telecommunications Union Telecommunications Standardization Sector(ITU-T)
11
Which series of standards are recommended for data transmission using the telephone network
 
V
12
The definition of Open System Interconnect(OSI) reference model was a major contribution to...
 
International Organization for Standardization (ISO)
13
Within how many feet of the data communications equipment (DCE) connection does the Electronics...
 
50
14
Which Electronics Industries Alliance(EIA) interface standard has the ability to work in either...
 
RS-530
15
What transmission rates does Electronic Industries Alliance (EIA) RS-530 accommodate?
 
20 Kbps to 2 megabits per second(Mbps)
16
What two sublayers did the Institute of Electrical and Electronics Engineers (IEEE) divide...
 
Logical Link Control(LLC) and Media Access Control(MAC)
17
At what OSI layer are common data compression and encryption schemes used?
 
presentation
18
What OSI layer is closest to the end user?
 
Application
19
In the OSI model, a layer will communicate with three other OSI layers. Which is not one of...
 
Lowest layer
20
Which information unit, whose source and destination are network-layer entities , uses connectionless...
 
Datagram
21
What data communications protocol is used to govern the flow and format of information between...
 
Character-oriented
22
In binary-synchronous protocol, what character is used to establish and maintain character...
 
SYN
23
What data communication protocol is based on bits and the position of the bits?
 
Bit-oriented
24
What data communications protocol ensures that the receiving station can distinguish information...
 
High-Level Data Link Control(HDLC)
25
A group of computers and associated devices that share a common communications line within...
 
Local Area Network(LAN)
26
The interconnection of several networks in a city into a single larger network is a
 
Metropolitan Area Network(MAN)
27
What types of network connects networks that are typically separated by geographical...
 
Wide Area Network (WAN)
28
What type of network enables a group of two or more computer systems to communicate...
 
Virtual Private Network(VPN)
29
Which type of network enables users to share resources, files and printers in a decentralized...
 
peer-to-peer (P2P)
30
What Network layer protocol provides information about how and where data should be delivered,...
 
Internet Protocol(IP)
31
Which network layer protocol matches a known IP address for a destination device...
 
Address Resolution Protocol (ARP)
32
Which network layer protocol provides the IP address for a device that knows its own MAC address?
 
Reverse Address Resolution Protocol (RARP)
33
Which transport layer protocol does not guarantee that packets will be received at...
 
User Datagram Protocol (UDP)
34
Which application layer protocol is used to send and receive files by way of TCP/IP?
 
File Transfer Protocol (FTP)
35
Which protocol is simpler than FTP when transferring files between computers?
 
Trivial File Transfer Protocol (TFTP)
36
Which application layer protocol is a terminal emulation being used to log on to remote hosts?
 
Teletype Network
37
Which Application layer protocol is an automated means of assigning a unique IP address to...
 
Dynamic Host Configuration Protocol (DHCP)
38
Which application layer protocol is a utility that can verify that TCP/IP is installed and...
 
Ping
39
The physical address of any device on the network is a/an
 
MAC address
40
What are the two parts to an IPv4 address?
 
Class and host
41
What is used on a TCP/IP network to determine which network a computer is on?
 
Subnet mask
42
How many subnet bits are required to support 90 subnets on a class B network?
 
7
43
How many bits are available for host bits on a class B network using 7 bits?
 
Seven
44
What is not a recommendation for planning networks using variable length subnet masking (VLSM)?
 
Re-addressing the entire network
45
What mechanism allows for easier IPv6 address allocations?
 
Auto configuration
46
Which one of the following is not an IPv6 transition approach?
 
Auto configuration
47
Which IPv6 tunneling approach attempts to solve the issue of IPv6 to IPv4, IP protocol 41 issue?
 
Teredo
48
Teredo has four tunneling components. Which one is not one of them?
 
Teredo Agent
49
The combination transmitter/receiver device, in a single package, is called a
 
Transceiver
50
What device provides the physical, electrical, and electronic connections to the network media?
 
Network interface card (NIC)
51
What layers of the OSI model do network interface cards (NIC) belong?
 
Physical and Data Link layers
52
A repeater with more than one output port is a 
 
hub
53
What can be used to extend the size of a network?
 
Active hubs
54
What device subdivides a network into smaller logical pieces, or segments?
 
Switch
55
The time it takes a switch to figure out where to forward a data unit is called
 
Latency
56
Which device has multiport connectivity that directs data between nodes on a network?
 
Router
57
A router's strength is ists
 
intelligence
58
What is the oldest routing protocol
 
Routing Information Protocol (RIP)
59
Which routing protocol does internet backbones use?
 
Border Gateway Protocol (BGP)
60
What type of gateway can restrict the kind of access local area network (LAN) users have to...
 
Firewall
61
What type of gateway might include remote access servers that allow dial-up connectivity to...
 
Voice/data
62
Virtual private network (VPN) allow the AF to extend network resources across a/an
 
Wide area network
63
Which of the following is not a function that a VPN concentrator performs?
 
Manages data transfer across the tunnel
64
What cable discrepancies can a Time-domain reflectometer (TDR) detect?
 
Kinks, opens, and corroded connectors
65
What type of cable property changes does a TDR detect to identify problems?
 
Impedance
66
When using and optical time-domain reflectometer (OTDR), what action is suggested by most manufacturers...
 
Connect a launch cable between the test set and the cable being tested
67
A cable scanner wire-map display identifies crossover and straight-through cables by 
 
providing wiring maps at both ends of the cable
68
What test equipment has the capability of diagnosing digital network and developing communications...
 
Protocol Analyzer
69
Which component of a protocol analyzer discards frames based on its definition or activates
 
Filter
70
What components of a protocol analyzer processes the frames based on the selected test and...
 
Central Processing Units (CPU)
71
What protocol analyzer feature automatically runs in the background when the protocol analyzer...
 
Node discovery
72
What protocol analyzer utility is used to determine if a network node is connected or responding?
 
Ping
73
What protocol analyzer utility is used to see the path that packets are traveling and the time...
 
Trace Route
74
A Management Information Base (MIB) can be identified by either its object name or its object...
 
Descriptor
75
A Simple Network Management Protocol (SNMP) has three components: a managed device, an agent,...
 
Network Management System (NMS)
76
Which of the following is not a basic SNMP command?
 
Get
77
Which network management function provides the capability to initialize, operate shut down...
 
Configuration
78
Which network management functions obtains the utilization and error rates of network devices...
 
Performance
79
The community name that is used with the NMS authenticates
 
A SNMP request
80
What defines the format and type of data in a NMS report?
 
Report template
81
What process provides the overall process to secure and protect our information networks?
 
Barrier Reef
82
What defines traffic flow and is a basic protection mechanism on routers?
 
Access lists
83
The World Wide Web (WWW) proxy provides three benefits: it conceals the internal network configuration,...
 
Allows web pages to download in a considerably less time
84
What is one of the primary functions of the Network Control Center (NCC), usually done in real...
 
System monitoring
85
What security posture permits everything that is not specifically blocked?
 
Default allow
86
What security posture prevents everything that is not specifically authorized?
 
Default deny
87
What is the first line of defense when gaining access to a laptop computer's operating system?
 
Physical security
88
Who has unrestricted access to system commands and data?
 
Superusers
89
What must be employed to ensure data integrity?
 
Encryption
90
What method is approved for changing passwords through the use of remote access?
 
Strongly encrypted VPN
91
An intrusion detection system (IDS) may miss attacks that bypass the firewall like application-based...
 
tunneling
92
What type of firewall can filter messages according to a set of rules for a specific application?
 
Packet filtering
93
What are the two vulnerability scanner examination techniques?
 
Passive and active

Error related query: You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near 's URE Set 2 Volume 2') AND SUBSTRING(link_url, ((INSTR(link_url, 'id='))+3), LEN' at line 1