Reviewed by Editorial Team
The ProProfs editorial team is comprised of experienced subject matter experts. They've collectively created over 10,000 quizzes and lessons, serving over 100 million users. Our team includes in-house content moderators and subject matter experts, as well as a global network of rigorously trained contributors. All adhere to our comprehensive editorial guidelines, ensuring the delivery of high-quality content.
Learn about Our Editorial Process
| By 72jmpmaster
7
72jmpmaster
Community Contributor
Quizzes Created: 2 | Total Attempts: 1,942
| Attempts: 826 | Questions: 124
Please wait...
Question 1 / 124
0 %
0/100
Score 0/100
1. (205) Which of the following categories of twisted-pair cable has the highest throughput?

Explanation

Cat 5 twisted-pair cable has the highest throughput among the given options. This is because Cat 5 cable has a higher bandwidth compared to Cat 2, Cat 3, and Cat 4 cables. It is capable of supporting data transfer rates of up to 1000 Mbps (1 Gbps). Cat 5 cable is commonly used for Ethernet networks and is suitable for various applications, including video streaming, online gaming, and large file transfers.

Submit
Please wait...
About This Quiz
Air Force Quizzes & Trivia

This is all URE questions from Volume 2 of the 3C051 CDC (As of 2009)

Personalize your quiz and earn a certificate with your name on it!
2. (203) Within the NCC, what function is initially responsible for taking trouble calls, deciding what type of problem has occurred, and what to do about the problem?

Explanation

The help desk is initially responsible for taking trouble calls, deciding what type of problem has occurred, and determining the appropriate course of action. They are the first point of contact for users who are experiencing issues or have questions about the network. The help desk staff assesses the problem, identifies its nature, and provides guidance or escalates the issue to the appropriate department for further resolution.

Submit
3. (203) What software is used to open trouble tickets for customer trouble calls?

Explanation

Remedy is the software used to open trouble tickets for customer trouble calls. This software is specifically designed for managing and tracking customer issues and incidents. It allows customer service representatives to log and track customer complaints, assign them to appropriate teams or individuals, and monitor the progress until the issue is resolved. Remedy provides a centralized platform for efficient communication and problem resolution, ensuring smooth customer support operations.

Submit
4. (209) Why can a token ring network cover a greater distance than a token bus network without loss of signal?

Explanation

In a token ring network, each workstation repeats the signal before passing it on to the next workstation. This repetition of the signal helps to maintain its strength and integrity, allowing the network to cover a greater distance without any loss of signal. On the other hand, a token bus network does not have this feature, which may lead to signal degradation over longer distances. Therefore, the ability of each workstation to repeat the signal is the reason why a token ring network can cover a greater distance without signal loss.

Submit
5. (203) What is one of the most important communication skills you can develop as a help desk operator?

Explanation

Listening is one of the most important communication skills that a help desk operator can develop. As a help desk operator, it is crucial to actively listen to the concerns and issues raised by the customers. By listening attentively, the operator can fully understand the problem and provide appropriate solutions. Additionally, listening allows the operator to show empathy and build rapport with the customers, which can enhance the overall customer experience and satisfaction.

Submit
6. (204) What type of network is made up of components from the same vendor or compatible equipment that all run under the same operating system or network operating system?

Explanation

A homogeneous network is a type of network that is made up of components from the same vendor or compatible equipment, all running under the same operating system or network operating system. This means that all the devices and software in the network are designed to work seamlessly together, resulting in a more efficient and reliable network infrastructure. This type of network simplifies management and troubleshooting processes as there is a uniformity in the hardware and software used.

Submit
7. (206) A fiber optic network uses a laser or light-emitting diode to send a signal through what portion of the cable?

Explanation

A fiber optic network uses a laser or light-emitting diode to send a signal through the core of the cable. The core is the innermost part of the cable and is responsible for transmitting the light signals. The cladding, buffer, and kevlar are other components of the cable that provide protection and support, but they do not directly transmit the signal.

Submit
8. (207) What is the greatest risk to a bus network?

Explanation

The greatest risk to a bus network is the bus itself becoming inoperable. If the bus malfunctions or breaks down, it can disrupt the entire network, causing delays and inconvenience for passengers. This can lead to loss of revenue and negative impact on the overall efficiency of the bus network. Therefore, ensuring the proper functioning and maintenance of the buses is crucial to minimize the risk of network disruptions.

Submit
9. (204) What is a set of systems/nodes on a local segment that can be off of a switch or router?

Explanation

An intranetwork refers to a set of systems or nodes that are connected on a local segment, which can be either a switch or a router. This network is private and is only accessible to authorized users within an organization. It allows for the sharing of resources, such as files and printers, and facilitates communication and collaboration among employees. Unlike an internetwork, which connects multiple networks together, an intranetwork is confined to a specific local area.

Submit
10. (204) What type of network environments consist of computer systems from different vendors that run different operating systems and communication protocols?

Explanation

A heterogeneous network consists of computer systems from different vendors that run different operating systems and communication protocols. In this type of network environment, there is a mix of hardware and software from various manufacturers and developers. This can present challenges in terms of compatibility and interoperability between different systems. However, it also allows for greater flexibility and diversity in terms of technology choices and capabilities.

Submit
11. (204) What type of communications network links geographically dispersed offices in other cities or around the globe?

Explanation

A wide area network (WAN) is a type of communications network that connects geographically dispersed offices in different cities or even around the world. Unlike a local area network (LAN) or metropolitan area network (MAN), which are limited to a specific location or region, a WAN allows for long-distance connectivity and enables organizations to share resources, data, and applications across multiple locations. An enterprise network refers to the overall network infrastructure of an organization, which can include both LANs and WANs.

Submit
12. (205) What is the distorting and/or weakening of a signal as it traverses the media called? 

Explanation

Attenuation refers to the process of reducing the strength or intensity of a signal as it travels through a medium. This can occur due to various factors such as distance, interference, or the characteristics of the medium itself. Attenuation can result in a loss of signal quality, clarity, or strength, making it appear weaker or distorted at the receiving end. Impedance, resistance, and inductive coupling are all related concepts but do not specifically refer to the distorting or weakening of a signal as it traverses the media.

Submit
13. (220) What is required due to the differences between the physical speed of the print device and the processing speed of the workstation generating the print job?

Explanation

Print queues are required due to the differences between the physical speed of the print device and the processing speed of the workstation generating the print job. Print queues act as buffers, allowing the workstation to send print jobs to the queue without having to wait for the print device to finish processing previous jobs. This ensures that the workstation can continue its processing tasks without being slowed down by the slower print device. The print device can then process the print jobs in the queue at its own speed, resulting in a more efficient workflow.

Submit
14. (208) A feature which involves the periodic insertion of points into data from which any recovery necessary can be started is known as what?

Explanation

Checkpointing is a feature that involves the periodic insertion of points into data from which any recovery necessary can be started. It allows for the creation of restore points in a system, enabling the system to recover from errors or failures by reverting back to a previous checkpoint. This feature is commonly used in computer systems and databases to ensure data integrity and provide a mechanism for fault tolerance.

Submit
15. (213) What communications device converts binary electrical signals into acoustic signals for transmission over telephone lines?

Explanation

A modem is a communications device that converts binary electrical signals into acoustic signals for transmission over telephone lines. It is used to connect computers or other devices to the internet or other networks through a telephone line. The modem modulates the digital signals from the computer into analog signals that can be transmitted over the telephone line, and then demodulates the analog signals back into digital signals at the receiving end. This allows for the transmission of data over long distances using existing telephone infrastructure.

Submit
16. (218) What command is used to restrict access to the privileged exec mode?

Explanation

The correct answer is "enable password." This command is used to restrict access to the privileged exec mode. By setting an enable password, only users who know the password can access the privileged exec mode and perform privileged commands. This helps to ensure that only authorized individuals can make changes to the system configuration and perform administrative tasks.

Submit
17. (220) What type of server is set aside to perform a specific task or function all the time?

Explanation

A dedicated server is a type of server that is specifically allocated for performing a particular task or function continuously. Unlike other types of servers, a dedicated server is not shared with other users or applications, ensuring that its resources are solely dedicated to the designated task. This allows for enhanced performance, reliability, and security, making it an ideal choice for organizations or individuals with specific and demanding requirements.

Submit
18. (218) What prompt is displayed when in the Priveleged Exec mode on a router?

Explanation

When in the Privileged Exec mode on a router, the prompt displayed is "Router#". This prompt indicates that the user has administrative privileges and can access and configure advanced settings on the router. The "#" symbol signifies the Privileged Exec mode, which allows the user to execute privileged commands and make changes to the router's configuration.

Submit
19. (220) What frees the computer's attention so the user can continue working while waiting for a document to print?

Explanation

Print spooling is the process that frees the computer's attention so the user can continue working while waiting for a document to print. It allows the computer to send the print job to a temporary storage area called a print spooler, which then manages the printing process in the background. This way, the user can continue with other tasks while the document is being processed and printed, improving overall productivity.

Submit
20. (202) What organization does communication and information services entering and exiting the base or site fall under the operational control of?

Explanation

The correct answer is the Base network control center. This organization is responsible for the operational control of communication and information services entering and exiting the base or site. They oversee and manage the network infrastructure, ensuring the security and smooth functioning of communication systems within the base.

Submit
21. (204) How many users are in a peer-to-peer network?

Explanation

A peer-to-peer network is a decentralized network where all devices are equal and can act as both clients and servers. In such a network, the number of users can vary, but typically it ranges from 2 to 10. This limited number of users ensures efficient communication and sharing of resources among the peers.

Submit
22. (205) What is a measurement of data transferred through the medium between network connections?

Explanation

Throughput refers to the amount of data that can be transferred through a network connection within a given period of time. It measures the efficiency and speed of data transfer between devices connected in a network. A higher throughput indicates a faster and more efficient transmission of data, while a lower throughput suggests slower data transfer. Therefore, throughput is the measurement of data transferred through the medium between network connections.

Submit
23. (206) What type of fiber optic is designed for the local area network environment and light is typically generated with a light emitting diode?

Explanation

Multi mode fiber optic is designed for the local area network environment and light is typically generated with a light emitting diode. Multi mode fiber optic cables have a larger core diameter compared to single mode fiber optic cables, allowing multiple modes or paths for light to travel through. This makes multi mode fiber optic suitable for short-distance communication within a local area network. The use of a light emitting diode as the light source in multi mode fiber optic is cost-effective and suitable for shorter distances.

Submit
24. (212) What is used to identify network nodes on a physically connected network?

Explanation

A media access control address (MAC address) is used to identify network nodes on a physically connected network. It is a unique identifier assigned to the network interface card (NIC) of each device connected to the network. The MAC address is used by the data link layer of the network protocol to ensure that data is sent to the correct destination device. It is different from the network server name, subnet mask address, and node serial number, which have different functions in networking.

Submit
25. (217) What type of routing involves the use of routing protocols that adjust real-time to changing network circumstances?

Explanation

Dynamic routing involves the use of routing protocols that adjust in real-time to changing network circumstances. Unlike static routing, which uses manually configured routes that do not adapt to network changes, dynamic routing protocols automatically exchange routing information with other routers to determine the best path for data packets. This allows for efficient and flexible routing in dynamic network environments where routes may change frequently due to factors such as network congestion, link failures, or new network connections.

Submit
26. (222) The measurement of traffic volume actually being carried by the network, typically expressed in kilobytes per second is

Explanation

Data throughput refers to the measurement of the actual amount of traffic being carried by the network in terms of kilobytes per second. It represents the rate at which data is transmitted over the network. This measurement is important in assessing the network's performance and capacity. Network response time, percentage utilization, and traffic congestion are related concepts but do not specifically measure the amount of traffic being carried by the network.

Submit
27. (201) What Air Force instruction series covers communications and information?

Explanation

Air Force instruction series 33 covers communications and information.

Submit
28. (202) What does network security work to ensure about a network?

Explanation

Network security works to ensure the availability, confidentiality, and data integrity of a network. Availability refers to the network being accessible and operational for authorized users. Confidentiality ensures that sensitive information is only accessible to authorized individuals. Data integrity ensures that data remains accurate and unaltered during transmission and storage.

Submit
29. (203) Which of the following jobs are performed by a help desk technician on a daily basis?

Explanation

A help desk technician performs network monitoring on a daily basis to ensure the smooth functioning of the network and identify any issues or abnormalities. They also handle account unlocks, which involves assisting users in regaining access to their accounts after they have been locked due to various reasons such as incorrect passwords. Additionally, they are responsible for account creations, which involves setting up new user accounts and granting appropriate access privileges. These tasks are part of the regular responsibilities of a help desk technician in order to provide technical support and maintain the efficiency of the system.

Submit
30. (207) What network topology consists of a single central cable to which all computers and other devices connect?

Explanation

A network topology that consists of a single central cable to which all computers and other devices connect is called a bus topology. In this type of network, all devices are connected to a single cable, known as the bus or backbone. Data is transmitted along the bus, and each device listens for the data intended for it. If a device wants to transmit data, it sends it onto the bus, and all devices receive the data, but only the intended recipient processes it.

Submit
31. (214) What is a group of devices connected to the same physical media such that if two devices access the media at the same time, the result is a collision of the two signals?

Explanation

A collision domain refers to a group of devices that are connected to the same physical media, such as an Ethernet cable. In this domain, if two devices attempt to access the media at the same time, their signals will collide and result in data loss or corruption. This can occur in Ethernet networks where devices share the same network segment. To avoid collisions, techniques like CSMA/CD (Carrier Sense Multiple Access with Collision Detection) are used to manage access to the media.

Submit
32. (215) Bridging loops are created when

Explanation

Bridging loops are created when there is more than one path to the destination. This occurs when there are multiple routes or connections between two points in a network. These loops can cause packets to continuously circulate within the network, leading to broadcast storms, network congestion, and potential data loss. Spanning Tree Protocol (STP) is commonly used to prevent bridging loops by identifying and blocking redundant paths in a network, ensuring that there is only one active path to the destination.

Submit
33. (204) How many users are in a single-server network?

Explanation

A single-server network typically refers to a network where all users are connected to a central server. The given answer range of 10 to 50 suggests that in a single-server network, there are typically between 10 and 50 users. This range indicates that the network is relatively small in scale, with a moderate number of users relying on the central server for their network services and resources.

Submit
34. (206) What type of fiber optic is used to span extremely long distances?

Explanation

Single mode fiber optic is used to span extremely long distances. This type of fiber optic has a smaller core size, allowing light to travel in a straight line, minimizing signal loss and allowing for longer distances. It is designed to carry a single mode of light, which means that only one wavelength of light is transmitted, resulting in a higher bandwidth and longer transmission distances compared to multi-mode fiber optic.

Submit
35. (208) What is the set of rules that define how communications are to take place in a network, including the format, timing, sequences, and error checking and correction?

Explanation

A protocol is a set of rules that governs how communications are conducted in a network. It specifies the format, timing, sequences, error checking, and correction methods to ensure reliable and efficient data transmission. By following a protocol, devices in a network can communicate with each other effectively and understand how to interpret and respond to data packets.

Submit
36. (210) Which protocol of TCP/IP is a connection oriented, reliable, host-to-host transport protocol?

Explanation

The correct answer is transmission control protocol. TCP is a connection-oriented protocol that ensures reliable delivery of data between hosts in a network. It establishes a connection between the sender and receiver, breaks the data into packets, and reassembles them at the destination. TCP also provides mechanisms for flow control, error detection, and congestion control, making it a reliable transport protocol for applications that require guaranteed delivery of data.

Submit
37. (213) What network interface card module converts information into a coded data stream? 

Explanation

The network interface card module that converts information into a coded data stream is the encode/decode module. This module is responsible for encoding the data into a format that can be transmitted over the network, and decoding the received data back into its original form.

Submit
38. (216) What is a logical grouping of end stations, independent of physical location, with a common set of requirements called?

Explanation

A virtual local area network (VLAN) is a logical grouping of end stations, independent of physical location, with a common set of requirements. It allows for the segmentation of a network into multiple virtual networks, enabling better control and management of network traffic. VLANs provide increased security, flexibility, and scalability by allowing different groups of devices to be logically grouped together, even if they are physically dispersed across the network. This ensures that devices within the same VLAN can communicate with each other efficiently and securely, while also restricting communication with devices in other VLANs.

Submit
39. (214) The purpose of a network repeater is that it?

Explanation

A network repeater is a device that regenerates any signal it receives. This means that it takes in a weak or degraded signal and reproduces it at its original strength. By doing so, the repeater helps to extend the range of the network and improve the quality of the signal. Unlike amplifiers, which simply amplify the signal, repeaters actively regenerate and reproduce the signal, making it clearer and stronger for transmission.

Submit
40. (202) Performance management can be broken into which two separate functional categories?

Explanation

Performance management involves the process of monitoring and optimizing the performance of a system or process. Monitoring refers to the continuous tracking and measurement of performance metrics to identify any issues or deviations from desired performance levels. Tuning, on the other hand, involves making adjustments and optimizations to improve the performance based on the insights gained from monitoring. Therefore, monitoring and tuning are the two separate functional categories of performance management.

Submit
41. (219) What filters network traffic by controlling whether routed packets are forwarded or blocked at a router's interface?

Explanation

Access control lists (ACLs) are used to filter network traffic by controlling whether routed packets are forwarded or blocked at a router's interface. ACLs can be configured to allow or deny specific types of traffic based on criteria such as source/destination IP addresses, protocols, ports, or other parameters. By implementing ACLs, network administrators can enforce security policies and restrict access to certain resources or services, enhancing network security and controlling the flow of traffic within the network.

Submit
42. (219) What is the range of numbers that represent standard access lists?

Explanation

Standard access lists use numbers ranging from 1 to 99 to represent the range of numbers that can be used. These access lists are used to filter traffic based on source IP addresses only. They are generally used to block or permit specific traffic from entering or leaving a network. The range of 1-99 allows for a wide range of access list numbers to be used for different filtering purposes.

Submit
43. (209) What protocol is used by the IEEE 802.3 standard to avoid collisions on the network?

Explanation

The correct answer is carrier sense multiple access/collision detection (CSMA/CD). CSMA/CD is a protocol used by the IEEE 802.3 standard to avoid collisions on the network. It works by having devices on the network listen for traffic before transmitting data. If a device detects that the network is busy, it waits for a random amount of time before attempting to transmit again. This helps to prevent collisions and ensures that data is transmitted smoothly on the network.

Submit
44. (209) What Xseries protocol is a message handling system (MHS) standard, that defines the syructure of a store-and-forward e-mail message handling system?

Explanation

X.400 is the correct answer because it is a protocol that defines the structure of a store-and-forward e-mail message handling system. X.400 is a message handling system (MHS) standard that provides a framework for the exchange of electronic mail between different computer systems. It specifies how messages are formatted, addressed, and delivered in a store-and-forward manner, allowing for reliable communication across different networks and systems. X.400 is widely used in enterprise email systems and provides features such as message encryption, message tracking, and delivery status notifications.

Submit
45. (214) What network condition usually begins slowly and (if not stopped) gradually grows in severity until all traffic flow on the network is effectively stopped?

Explanation

A broadcast storm is a network condition where there is a high volume of broadcast or multicast traffic that floods the network. This excessive traffic can overwhelm network resources, causing congestion and slowing down the network. If not stopped, the severity of the broadcast storm increases over time, eventually leading to a complete halt in the flow of all traffic on the network.

Submit
46. (215) What is used to logically eliminate loops within a network?

Explanation

The spanning tree algorithm is used to logically eliminate loops within a network. This algorithm ensures that there is only one path between any two nodes in the network, preventing the formation of loops that can cause network congestion and data loss. By selecting a root node and creating a tree-like structure, the spanning tree algorithm determines the most efficient and loop-free paths for data transmission within the network.

Submit
47. (217) What prevents a router from sending route information back to the router from which it came? 

Explanation

Split horizons is a technique used in computer networking to prevent a router from sending route information back to the router from which it came. This technique is implemented by the router to avoid routing loops, where packets continuously loop between routers without reaching their destination. Split horizons involves the router not advertising a route back to the router it received the route from, effectively preventing the loop from occurring. By not advertising the route back, the router ensures that the route information does not get sent back to the same router, thus preventing routing loops.

Submit
48. (218) What are the network connections through which network traffic enters and exits a router called?

Explanation

The network connections through which network traffic enters and exits a router are called interfaces. These interfaces allow the router to connect to different networks and exchange data. Serial interfaces are used for connecting to wide area networks, while switching ports are used for connecting to local area networks. Console and auxiliary ports are used for management and troubleshooting purposes. However, the most general and inclusive term for these connections is interfaces.

Submit
49. (204) In most cases the frequencies used by wireless networks are in what frequency band?

Explanation

Wireless networks typically use frequencies in the Industrial, Scientific, and Medical (ISM) frequency band. This band is specifically designated for non-communication purposes such as scientific research, industrial equipment, and medical devices. It is commonly used for Wi-Fi networks, Bluetooth devices, and other wireless technologies. The television band, very high frequency (VHF), and ultra high frequency (UHF) are not typically used for wireless networks.

Submit
50. (205) What is a form of communication that transmits information as a serial stream of bits or bytes?

Explanation

Asynchronous communication is a form of communication that transmits information as a serial stream of bits or bytes. In this type of communication, data is sent without the need for a synchronized clock signal. Instead, each data packet is accompanied by start and stop bits, allowing the receiver to interpret the data at its own pace. This method is commonly used in computer networks and telecommunications systems where devices may operate at different speeds or have varying response times.

Submit
51. (212) What is the binary equivalent to the dotted decimal number 96?

Explanation

The binary equivalent to the dotted decimal number 96 is 01100000.

Submit
52. (217) What acts as a translator between two workstations or networks that use different operating systems, communication protocols, and data format structures?

Explanation

A gateway acts as a translator between two workstations or networks that use different operating systems, communication protocols, and data format structures. It enables communication and data exchange between these systems by converting the data from one format to another, allowing seamless communication between the different networks or workstations.

Submit
53. (219) What do all access lists end with?

Explanation

Access lists are used in routers to control traffic flow. They consist of a series of statements that define what traffic is allowed or denied. At the end of an access list, there is an implicit deny statement, which means that if a packet does not match any of the preceding statements, it will be denied by default. This ensures that only explicitly allowed traffic is permitted, and all other traffic is denied. Therefore, all access lists end with an implicit deny.

Submit
54. (221) What is a set of keys, subkeys, and values from the registry stored in its own file location called?

Explanation

A set of keys, subkeys, and values from the registry stored in its own file location is called a hive.

Submit
55. (202) What Air Force Instruction sets the policies that unit client support administrators must comply with? 

Explanation

Air Force Instruction 33-115 sets the policies that unit client support administrators must comply with.

Submit
56. (204) What is a set of subnets that are connected with routers?

Explanation

An internetwork is a set of subnets that are connected with routers. Routers are used to connect different subnets and enable communication between them. Therefore, an internetwork refers to a network that consists of multiple interconnected subnets, allowing for data to be routed between them.

Submit
57. (204) What type of communications network serves users within a confined geographical area?

Explanation

A local area network (LAN) is a type of communications network that serves users within a confined geographical area, such as a home, office, or campus. It is designed to connect computers and devices in close proximity to each other, allowing for the sharing of resources, such as files, printers, and internet access. LANs typically have high data transfer rates and low latency, making them ideal for local communication needs.

Submit
58. (204) How many users are in a multi-server high-speed backbone network?

Explanation

A multi-server high-speed backbone network is designed to handle large amounts of traffic and connect multiple users. The range of 250 to 1000 users suggests that this network can support a significant number of users, making it suitable for medium to large organizations or institutions. This range indicates that the network has the capacity to handle a substantial user base while maintaining efficient data transfer and high-speed connectivity.

Submit
59. (206) Light signals in fiber optic cables can travel distances in excess of how many miles before they need to be boosted?

Explanation

Light signals in fiber optic cables can travel distances in excess of 100 miles before they need to be boosted. This is because fiber optic cables use total internal reflection to guide the light signals along the cable without significant loss of signal strength. The light signals bounce off the walls of the cable, allowing them to travel long distances without the need for boosting or amplification. This makes fiber optic cables ideal for long-distance communication and data transmission.

Submit
60. (208) What layer of the OSI reference model is really a set of rules regarding the hardware used to transmit data?

Explanation

The physical layer of the OSI reference model is responsible for defining the hardware and electrical specifications required to transmit data. It deals with the physical connection between devices and includes aspects such as cables, connectors, and signaling. This layer ensures that the data is transmitted in the form of electrical or optical signals over the physical medium.

Submit
61. (212) How many octets is the standard internet protocol broken down into?

Explanation

The standard internet protocol is broken down into 4 octets. An octet is a unit of digital information that consists of 8 bits. In the case of the internet protocol, each octet represents a portion of the IP address. The IP address is a unique identifier assigned to devices connected to a network. It is divided into four sections, each represented by an octet, separated by periods. Therefore, the correct answer is 4.

Submit
62. (221) Data in which root-key determines which device drivers and services will load during the boot process?

Explanation

HKEY_LOCAL_MACHINE is the correct answer because it is a root key in the Windows Registry that contains configuration information for the local machine. During the boot process, the operating system uses this key to determine which device drivers and services should be loaded. It stores settings related to hardware, software, and system configuration, making it a crucial component in the boot process.

Submit
63. (208) What is the major Department of Defense contribution to networking?

Explanation

The major Department of Defense contribution to networking is the transmission control protocol/internet protocol (TCP/IP) suite. TCP/IP is a set of protocols that allows computers to communicate over a network. It provides a standardized way for data to be transmitted and received, ensuring that information can flow smoothly between different devices and networks. TCP/IP is the foundation of the internet and is used by virtually all modern computer networks.

Submit
64. (215) What are the four basic functions of a bridge?

Explanation

The four basic functions of a bridge are listen, learn, filter, and forward. "Listen" refers to the bridge's ability to receive and process network traffic. "Learn" means that the bridge can analyze the traffic and build a table of MAC addresses and corresponding ports. "Filter" involves the bridge examining the destination MAC address of incoming traffic and deciding whether to forward it or not. Finally, "forward" refers to the bridge forwarding the traffic to the appropriate port based on the MAC address table it has learned.

Submit
65. (215) The bridge in a network with the highest priority (the lowest number) is called the

Explanation

The bridge in a network with the highest priority (the lowest number) is called the "root." This is because in a network, the root bridge is the central point that connects all other bridges and devices. It acts as the main reference point for determining the shortest path and forwarding network traffic efficiently. The root bridge is responsible for electing the designated ports on each bridge and ensuring that the network operates smoothly.

Submit
66. (217) What type of routing is the establishment of routes by the network administrator that changes only when done manually?

Explanation

Static routing is the establishment of routes by the network administrator that changes only when done manually. In static routing, the network administrator manually configures the routes in the routing table of each network device. These routes remain unchanged until the administrator manually updates or modifies them. This type of routing is typically used in small networks or in situations where the network topology is stable and changes rarely occur. Unlike dynamic routing, static routing does not involve the use of routing protocols to dynamically learn and update routes based on network conditions.

Submit
67. (206) What are the principal advantages of fiber optics with present day transmission technology?

Explanation

Fiber optics have the principal advantages of sturdiness and security in present day transmission technology. The durability of fiber optic cables makes them resistant to physical damage, such as interference from weather conditions or electromagnetic interference. Additionally, fiber optics provide enhanced security as they are difficult to tap into or intercept, making them more secure for transmitting sensitive data.

Submit
68. (213) What network interface card module temporarily holds holds data for processing to or from the network?

Explanation

Frame buffering refers to the process of temporarily holding data for processing to or from the network. This involves storing incoming data packets in a buffer before they are processed by the network interface card. Similarly, outgoing data packets are also stored in a buffer before being transmitted onto the network. Frame buffering helps in managing the flow of data between the network and the computer, ensuring smooth and efficient communication.

Submit
69. (214) What type of hub has special capabilities for configurations and or management?

Explanation

An intelligent hub refers to a type of hub that has special capabilities for configurations and management. Unlike passive hubs that simply transmit data to all connected devices, an intelligent hub can actively manage network traffic, monitor connections, and provide advanced features such as VLAN support, port mirroring, and quality of service (QoS) settings. This allows for better control and optimization of the network, making it a suitable choice for environments where more advanced management capabilities are required.

Submit
70. (201) What Air Force publication identifies responsibilities for supporting critical Air Force communications and information networks, primarily through network control centers?

Explanation

AFI 33-115 Volume 1 is the correct answer because it is an Air Force publication that specifically identifies responsibilities for supporting critical Air Force communications and information networks. It primarily does this through network control centers. AFPD 33-1 and AFPD 33-2 are not the correct answers as they do not focus on the responsibilities for supporting critical Air Force communications and information networks. Similarly, AFI 33-115 Volume 2 is not the correct answer as it does not specifically address the responsibilities for supporting critical Air Force communications and information networks.

Submit
71. (211) As information passes down through the protocol layers, what is the packet that is formed called?

Explanation

As information passes down through the protocol layers, the packet that is formed is called a protocol data unit. This term refers to the data structure that contains both the data being transmitted and the necessary control information for the protocol to function properly. The protocol data unit is used to encapsulate and transport data across the network, ensuring that it is correctly received and interpreted by the receiving device.

Submit
72. (211) In the Ethernet environment, what is the minimum number of octets in a frame so it can be sent and received?

Explanation

In an Ethernet environment, the minimum number of octets in a frame that can be sent and received is 46. This is because the minimum Ethernet frame size is 64 octets, but this includes the preamble, start frame delimiter, and inter-frame gap. The actual data payload of the frame must be at least 46 octets to meet the minimum requirement for transmission and reception.

Submit
73. (217) In what dynamic routing protocol must packets go the complete distance before discovering the destination is unreachable?

Explanation

Distance vectoring is a dynamic routing protocol where packets must travel the complete distance before discovering that the destination is unreachable. In distance vectoring, routers exchange information about the network by sharing their routing tables with their neighboring routers. Each router calculates the distance and direction to reach a destination based on the information received from its neighbors. This process continues until the packets reach the destination or it is determined that the destination is unreachable. Unlike link state protocols, distance vectoring does not have complete knowledge of the entire network topology, which can lead to inefficient routing decisions.

Submit
74. (220) What network type normally utilizes non-dedicated servers?

Explanation

Peer-to-peer network type normally utilizes non-dedicated servers. In a peer-to-peer network, all computers are considered equal and can act as both clients and servers. Each computer can share its resources, such as files and printers, with other computers on the network. Unlike client-server networks where there is a dedicated server that provides services to the clients, peer-to-peer networks distribute the workload among all connected computers, eliminating the need for dedicated servers. Therefore, peer-to-peer networks typically utilize non-dedicated servers.

Submit
75. (210) What makes it possible for implementers to produce new Network File System systems without having to reconstruct their own system's internal data representation formats to suit Network File System?

Explanation

eXternal Data Representation (XDR) makes it possible for implementers to produce new Network File System systems without having to reconstruct their own system's internal data representation formats to suit Network File System. XDR provides a standard format for data representation that can be used across different systems and platforms, allowing for seamless communication and interoperability between systems. This eliminates the need for implementers to manually convert their internal data representation formats, saving time and effort in the development process.

Submit
76. (216) What is the technology called that allows Network Interface Card (NIC) to determine the type of Ethernet signal transmitted by a device at the other end and adjust its speed to the highest common speed between the two devices?

Explanation

Auto negotiation is the technology that allows Network Interface Card (NIC) to determine the type of Ethernet signal transmitted by a device at the other end and adjust its speed to the highest common speed between the two devices. This technology enables devices to automatically negotiate and establish a compatible speed for communication, ensuring efficient and reliable data transmission between devices.

Submit
77. (209) What does a station specifically send when it sends a general request through the network asking any station to respond to receive the token?

Explanation

A station specifically sends a "solicit successor frame" when it sends a general request through the network asking any station to respond to receive the token.

Submit
78. (214) What network component serves as a central connecting point and is used to extend the physical media by repeating the signal it receives in one port out to all the other ports indiscriminately?

Explanation

A hub is a network component that serves as a central connecting point and is used to extend the physical media by repeating the signal it receives in one port out to all the other ports indiscriminately. Unlike a switch or a router, a hub does not have any intelligence to filter or direct network traffic. Instead, it simply broadcasts the incoming signal to all connected devices. This makes it a simple and inexpensive device for connecting multiple devices in a network, but it can also lead to network congestion and reduced performance.

Submit
79. (207) On what network topology can multiple transmit frames co-exist?

Explanation

Fiber distributed data interface (FDDI) is a network topology that allows multiple transmit frames to co-exist. FDDI uses a dual ring topology, where data is transmitted in both directions simultaneously. This allows for high-speed and reliable communication between multiple devices on the network. The use of fiber optic cables in FDDI also ensures fast data transmission over long distances without any loss or interference. Therefore, FDDI is the correct answer for the given question.

Submit
80. (222) What is detailed analysis of the performance of a specific application or a specific network element?

Explanation

A benchmark is a detailed analysis of the performance of a specific application or a specific network element. It involves measuring and evaluating the performance of the application or network element against a set of predefined criteria or standards. This analysis helps in assessing the performance, identifying areas of improvement, and comparing the performance with industry standards or competitors.

Submit
81. (213) What network interface card module drives the signal onto and from the physical medium?

Explanation

The correct answer is "transmit/receive". A network interface card (NIC) is responsible for driving signals onto and from the physical medium, allowing communication between devices. The transmit function of the NIC converts digital data into signals that can be sent over the physical medium, while the receive function converts received signals back into digital data. This process enables data transmission and reception between devices connected to the network.

Submit
82. (217) The function performed by a router to move information from one router to another according to decided path determinations is

Explanation

A router performs the function of routing, which involves moving information from one router to another based on predetermined path determinations. Routing allows routers to determine the most efficient path for data to travel through a network, ensuring that information reaches its intended destination. This process involves analyzing network protocols, IP addresses, and other factors to make decisions about the best path for data transmission.

Submit
83. (218) From what level can all other command modes be accessed?

Explanation

The correct answer is privileged exec level. The privileged exec level is a command mode in networking devices that allows access to all other command modes, including user exec level, console exec level, and global configuration level. It is the highest level of command mode and provides more advanced configuration and troubleshooting options.

Submit
84. (218) To view the current configuration of a router, what command is used from privileged exec mode?

Explanation

The correct answer is "show running". In privileged exec mode, the "show running" command is used to view the current configuration of a router. This command displays the running configuration, which includes the current settings and parameters of the router. It provides a snapshot of how the router is currently configured and allows administrators to check and verify the configuration. The other options, "show router", "show config", and "show nvram" are not valid commands for viewing the current configuration.

Submit
85. (221) Within the windows environment, what is the central repository for the entire software and hardware configuration settings in a computer running the windows based NT operating system?

Explanation

The correct answer is "registry". The registry is the central repository for all software and hardware configuration settings in a computer running the Windows based NT operating system. It stores information about user preferences, system settings, installed applications, and hardware devices. The registry is organized into a hierarchical structure and can be accessed and modified using the Windows Registry Editor. It plays a crucial role in the functioning and customization of the Windows operating system.

Submit
86. (202) Whose network area of responsibility starts at the user's terminal and ends at the server, but does not include the network backbone infrastructure components?

Explanation

The Unit functional systems administrator is responsible for the network area that starts at the user's terminal and ends at the server. They are in charge of managing and supporting the functional systems within this network, but they do not have responsibility for the network backbone infrastructure components. This means that they are not involved in the administration and control of the overall network infrastructure, but rather focus on the systems and services that directly impact the users and servers.

Submit
87. (218) Where is the backup copy of the Cisco Internet Operating System configuration information stored in the internetworking device?

Explanation

The backup copy of the Cisco Internet Operating System configuration information is stored in nonvolatile random access memory (NVRAM). NVRAM is a type of memory that retains its data even when power is lost. This makes it an ideal location to store important configuration information that needs to be preserved in case of a power outage or device restart. Flash memory, random access memory (RAM), and read-only memory (ROM) are not suitable for storing backup configuration information as they either lose data when power is lost or are not easily writable.

Submit
88. (201) What Air Force publication provides the policy and procedures for certifying network professionals who manage and operate government-provided information systems on Air Force networks?

Explanation

AFI 33-115 Volume 2 is the correct answer because it provides the policy and procedures for certifying network professionals who manage and operate government-provided information systems on Air Force networks. AFPD 33-1 and AFPD 33-2 are Air Force policy directives that may provide broader guidance but do not specifically address the certification of network professionals. AFI 33-115 Volume 1 may provide some information on the topic but Volume 2 is the specific publication that focuses on the certification process.

Submit
89. (216) Switching conducted at the layer 3 category is based upon what information?

Explanation

Switching conducted at the layer 3 category is based upon the Media Access Control (MAC) and Internet Protocol (IP) address. Layer 3 switching involves routing packets between different networks based on the IP address. The MAC address is used at layer 2 for local network communication, while the IP address is used for routing between different networks. By considering both the MAC and IP address, layer 3 switching can efficiently route packets to their intended destinations across different networks.

Submit
90. (222) What is a set of statistical measurements made over a period of time that characterizes network performance?

Explanation

A baseline is a set of statistical measurements made over a period of time that characterizes network performance. It serves as a reference point to compare and evaluate the performance of the network. By establishing a baseline, network administrators can identify deviations or changes in performance, allowing them to troubleshoot and optimize the network effectively.

Submit
91. (209) What X series protocol is a directory services specification standard that defines the structure of a store-and-forward e-mail message handling system?

Explanation

X.500 is the correct answer because it is a directory services specification standard that defines the structure of a store-and-forward e-mail message handling system. X.25 is a packet-switched network protocol, X.50 is not a recognized protocol, and X.400 is a message handling system protocol but not specifically for directory services.

Submit
92. (211) What layer in the OSI model adds a trailer to the packet?

Explanation

The data link layer in the OSI model adds a trailer to the packet. This layer is responsible for the reliable transmission of data between adjacent network nodes and ensures error-free communication over the physical layer. Adding a trailer to the packet allows for error detection and correction, ensuring the integrity of the data being transmitted.

Submit
93. (216) Switching conducted at the layer 2 category is based solely upon what information?

Explanation

Switching conducted at the layer 2 category is based solely upon the media access control address. The media access control (MAC) address is a unique identifier assigned to a network interface card (NIC) by the manufacturer. It is used to identify devices on a local network and is essential for the switching process. Switches use the MAC address to determine the destination of a data packet and forward it to the appropriate port. This allows for efficient and accurate data transmission within a local network.

Submit
94. (217) At what level of the OSI model does a router work?

Explanation

A router works at the network level of the OSI model. The network layer is responsible for routing packets across different networks, determining the best path for the data to reach its destination. Routers use IP addresses to make routing decisions and forward packets between networks. Therefore, the correct answer is network.

Submit
95. (210) Which protocol of TCP/IP provides a connectionless datagram "network access" layer?

Explanation

The correct answer is Internet protocol (IP). IP is the protocol of TCP/IP that provides a connectionless datagram "network access" layer. It is responsible for routing packets across different networks and does not establish a direct connection between sender and receiver. IP is used for addressing and routing packets, while TCP and UDP operate at the transport layer and provide reliable or unreliable delivery of data respectively. Network File System (NFS) is a file-sharing protocol and is not related to the network access layer.

Submit
96. (212) What type of mask is used within a network that uses the same amount of bits for masking for all subnetworks?

Explanation

A standard mask is used within a network that uses the same amount of bits for masking for all subnetworks. This means that the network is divided into subnetworks with equal sizes, and each subnetwork uses the same number of bits for subnet masking. This allows for consistent and uniform subnetting across the network.

Submit
97. (213) What communications device is used for converting analog signals to digital for transmission on digital lines? 

Explanation

Codecs are the communications devices used for converting analog signals to digital for transmission on digital lines. Codecs are responsible for encoding and decoding audio or video signals into a digital format that can be transmitted over digital lines. They compress the data to reduce bandwidth requirements and ensure efficient transmission. Therefore, codecs are essential in enabling the conversion and transmission of analog signals over digital lines.

Submit
98. (218) What command interface configuration command is used to activate an interface?

Explanation

The correct answer is "no shutdown". This command is used in the command interface configuration to activate an interface that has been administratively shut down. By entering this command, the interface is enabled and allowed to send and receive traffic.

Submit
99. (201) What Air Force publication establishes policy on how C4 systems are aquired, operated, and maintained?

Explanation

AFPD 33-1 is the correct answer because it is the Air Force publication that specifically establishes policy on how C4 systems are acquired, operated, and maintained. The other options, AFPD 33-2, AFPD 33-202, and AFPD 33-204, may cover different topics or aspects of C4 systems, but they do not specifically address the policy for acquiring, operating, and maintaining these systems. Therefore, AFPD 33-1 is the most appropriate choice.

Submit
100. (217) What is the primary device used for connecting these networks, both within and between networks?

Explanation

A router is the primary device used for connecting networks, both within and between networks. It is responsible for directing network traffic between different networks, ensuring that data packets are delivered to their intended destinations. Routers use routing tables to determine the best path for data transmission, based on factors such as network congestion and the shortest available route. They also provide security features like firewalls to protect networks from unauthorized access. Overall, routers play a crucial role in facilitating communication and data transfer between networks.

Submit
101. (217) What routing metric is generally based upon the bit-error rate of the link?

Explanation

The routing metric that is generally based upon the bit-error rate of the link is reliability. Reliability refers to the probability that a link will not fail or introduce errors during data transmission. A lower bit-error rate indicates a higher level of reliability, making it a suitable metric for determining the quality and stability of a link for routing purposes.

Submit
102. (218) What command is used to change the bootup values within ROM monitor mode?

Explanation

The command "confreg" is used to change the bootup values within ROM monitor mode. This command allows the user to configure various settings related to the boot process, such as the boot device, boot image, and boot configuration register. By using the "confreg" command, the user can modify these settings and customize the bootup process according to their requirements.

Submit
103. (219) What does a standard access list use to filter packets?

Explanation

A standard access list uses the source IP address to filter packets. It examines the source IP address of each packet and compares it to the criteria specified in the access list. If the source IP address matches the criteria, the packet is either allowed or denied based on the access list configuration. This allows network administrators to control access to the network based on the source IP address of incoming packets.

Submit
104. (202) What function within the network control center provides technical assistance to the unit functional system administrators and workgroup managers?

Explanation

The function within the network control center that provides technical assistance to the unit functional system administrators and workgroup managers is network administration. This role is responsible for managing and maintaining the network infrastructure, ensuring its smooth operation, and providing support to the administrators and managers in resolving any technical issues or concerns they may have.

Submit
105. (216) What is the most common method of defining Virtual local area network membership?

Explanation

The most common method of defining Virtual local area network membership is through port grouping. This means that devices are assigned to specific ports on a switch, and those ports are then associated with a particular VLAN. By grouping devices based on the ports they are connected to, network administrators can easily control which devices belong to which VLANs, allowing for efficient network management and segmentation.

Submit
106. (218) What prompt is displayed when in the User Exec mode on a router?

Explanation

In the User Exec mode on a router, the prompt displayed is "Router>". This prompt indicates that the user is in the User Exec mode and can execute basic commands on the router.

Submit
107. (220) What type of server is a bundle of software designed to significantly improve network efficiency and productivity?

Explanation

A network management system is a type of server that is designed to improve network efficiency and productivity. It is a bundle of software that helps in monitoring and managing network resources, such as routers, switches, and servers. It provides tools and features that allow network administrators to monitor network performance, troubleshoot issues, and optimize network resources. By using a network management system, organizations can ensure that their networks are running smoothly and efficiently, leading to improved productivity and overall network performance.

Submit
108. (209) The IEEE 802.5 standard was developed to cover what local area network topology?

Explanation

The IEEE 802.5 standard was developed to cover the local area network topology known as token ring. In a token ring network, computers are connected in a ring configuration where data is transmitted in a sequential manner. Each computer has a unique token that allows it to transmit data when it receives the token. This ensures fair access to the network and prevents data collisions. The token ring topology was popular in the 1980s and 1990s but has since been largely replaced by Ethernet.

Submit
109. (218) From what mode is the banner motd command used in?

Explanation

The banner motd command is used in global configuration mode. In this mode, the user can configure settings that apply to the entire system, such as global parameters and device-wide features. This is the mode where the user can define the Message of the Day (MOTD) banner, which is a customizable message that is displayed to users when they log in to the device.

Submit
110. (209) The IEEE 802.3 standard describes a local area network using what kind of topology?

Explanation

The IEEE 802.3 standard describes a local area network using a bus topology. In a bus topology, all devices are connected to a single cable called the bus. Data is transmitted in both directions on the bus, and all devices on the network can see and receive the transmitted data. This type of topology is simple and cost-effective, but it can be prone to collisions and network congestion.

Submit
111. (219) Router access lists must be applied to

Explanation

Router access lists must be applied to interfaces. Access lists are used to control the flow of traffic in and out of a router. By applying access lists to interfaces, the router can filter and permit or deny specific types of traffic based on defined criteria. Applying access lists to ports, switches, or proxy servers would not have the same effect as these devices do not have the same level of control over traffic flow as a router's interfaces do.

Submit
112. (202) What network control center function increases network reliability by giving the network manager tools to detect problems and initiate recovery procedures?

Explanation

Fault management is the correct answer because it refers to the function that increases network reliability by providing the network manager with tools to detect problems and initiate recovery procedures. This involves monitoring the network for any faults or errors, identifying the root cause of the issue, and taking necessary actions to resolve it. By effectively managing faults, network downtime can be minimized, ensuring the smooth operation of the network and improving its overall reliability.

Submit
113. (216) What type of switch is limited in it's application to small workgroups where throughput is an issue but where potential network errors will not upset the network?

Explanation

Cut through switching is a type of switch that forwards network packets as soon as the destination address is determined, without waiting for the entire packet to be received. This type of switch offers low latency and high throughput, making it suitable for small workgroups where speed is important. However, it does not perform error checking or correction, so potential network errors will not be detected or corrected. Therefore, it is not recommended for networks where errors could disrupt the network.

Submit
114. (202) To determine the level of network service provided to the users, you will make a measurement of the total response time

Explanation

To determine the level of network service provided to the users, measuring the rejection rate and availability of the network is important. The rejection rate indicates the number of requests that are denied or not processed by the network, which can be an indicator of the network's capacity or efficiency. Availability refers to the percentage of time that the network is operational and accessible to users. By considering both rejection rate and availability, one can assess the network's performance and its ability to handle user requests effectively. Average bandwidth alone does not provide a comprehensive understanding of the network service, and systems failure rate is not directly related to the level of network service provided.

Submit
115. (202) What network control center function responds to detected security incidents, network faults(errors), and user reported outages at the timeof help desk referral?

Explanation

Network management is the correct answer because it involves the monitoring and control of a network's performance and resources. This includes responding to security incidents, network faults, and user reported outages. Network management ensures that the network is running smoothly, and any issues are addressed promptly to minimize disruptions and maintain the network's functionality.

Submit
116. (208) What layer of the OSI model prevents a fast computer from overwhelming a slow terminal?

Explanation

The transport layer of the OSI model is responsible for ensuring reliable and efficient communication between end systems. It prevents a fast computer from overwhelming a slow terminal by implementing flow control mechanisms. These mechanisms regulate the amount of data that can be sent from the fast computer to the slow terminal, preventing congestion and ensuring that the slow terminal can process the data at its own pace.

Submit
117. (211) What is the only layer in the OSI model that simply transmits the completed frame?

Explanation

The physical layer is responsible for transmitting the completed frame in the OSI model. This layer is concerned with the physical transmission of data over the network, including the electrical, mechanical, and functional aspects of the physical connection. It takes the frame from the data link layer and converts it into a stream of bits that can be transmitted over the network medium. The physical layer does not perform any error checking or routing functions like the other layers, it simply transmits the data as it is received.

Submit
118. (215) What is a local area network connection device with two or more ports that forwards frames from one LAN segement to another?

Explanation

A bridge is a local area network connection device with two or more ports that forwards frames from one LAN segment to another. Unlike a hub, a bridge operates at the data link layer (Layer 2) of the OSI model and can filter and forward frames based on the MAC addresses. It helps to divide a network into smaller segments to improve performance and reduce network congestion.

Submit
119. (216) What type of switch reads the first 64 bytes before forwarding the frame?

Explanation

A fragment free switch is a type of switch that reads the first 64 bytes of a frame before forwarding it. This type of switch is designed to prevent forwarding frames with errors or collisions, as it checks the first 64 bytes for any potential issues. By doing so, it helps to ensure the integrity and reliability of the forwarded frames.

Submit
120. (208) Which layer of the OSI model is concerned with network security, file transfers, and formatting functions?

Explanation

The presentation layer of the OSI model is responsible for ensuring that data is properly formatted, encrypted, and decrypted for transmission between different systems. It handles tasks such as data compression, encryption, and decryption, as well as converting data from one format to another. While network security and file transfers can involve multiple layers of the OSI model, the presentation layer specifically deals with the formatting and security aspects of data transmission.

Submit
121. (222) What network performance criteria is the most significant statistic to be collected and calculated?

Explanation

The most significant statistic to be collected and calculated in network performance is network availability. Network availability refers to the amount of time that a network is operational and accessible to users. It is a crucial metric as it indicates the reliability and uptime of the network. High network availability ensures that users can consistently access the network and perform their tasks without interruptions or downtime. Therefore, monitoring and measuring network availability is essential for maintaining a stable and efficient network infrastructure.

Submit
122. (221) What two types of environments are network operating systems implemented upon?

Explanation

Network operating systems are implemented upon two types of environments: peer-to-peer and client-server. In a peer-to-peer network, all computers have equal roles and can act as both clients and servers. This type of network is commonly used in small-scale environments where there is no dedicated server. On the other hand, a client-server network has a dedicated server that provides services to client computers. The clients request resources or services from the server, which manages and controls the network. Both types of environments are commonly used in different network configurations depending on the scale and requirements of the system.

Submit
123. (208) What layer of the Open Systems Interconnection reference model provides the grammar by which machines converse with each other and serves as a vehicle for information transmission?

Explanation

The data link layer of the Open Systems Interconnection reference model provides the grammar by which machines converse with each other and serves as a vehicle for information transmission. This layer is responsible for the reliable transmission of data frames between nodes on a network, ensuring error-free and efficient communication. It handles tasks such as framing, error detection and correction, flow control, and access control.

Submit
124. (202) What network control center function is the central point of contact for network distribution and maintenance/update of an Air Force Computer Emergency response team and automated systems security and antivirus software?  

Explanation

Configuration management is the correct answer because it refers to the function that is responsible for the distribution, maintenance, and update of network distribution and automated systems security and antivirus software. This function acts as the central point of contact for an Air Force Computer Emergency Response Team (AFCERT) and ensures that the network is properly configured and secured against potential threats.

Submit
View My Results

Quiz Review Timeline (Updated): Mar 17, 2023 +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 17, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Sep 02, 2009
    Quiz Created by
    72jmpmaster
Cancel
  • All
    All (124)
  • Unanswered
    Unanswered ()
  • Answered
    Answered ()
(205) Which of the following categories of twisted-pair cable has the...
(203) Within the NCC, what function is initially responsible for...
(203) What software is used to open trouble tickets for customer...
(209) Why can a token ring network cover a greater distance than a...
(203) What is one of the most important communication skills you can...
(204) What type of network is made up of components from the same...
(206) A fiber optic network uses a laser or light-emitting diode to...
(207) What is the greatest risk to a bus network?
(204) What is a set of systems/nodes on a local segment that can be...
(204) What type of network environments consist of computer systems...
(204) What type of communications network links geographically...
(205) What is the distorting and/or weakening of a signal as it...
(220) What is required due to the differences between the physical...
(208) A feature which involves the periodic insertion of points into...
(213) What communications device converts binary electrical signals...
(218) What command is used to restrict access to the privileged exec...
(220) What type of server is set aside to perform a specific task or...
(218) What prompt is displayed when in the Priveleged Exec mode on a...
(220) What frees the computer's attention so the user can continue...
(202) What organization does communication and information services...
(204) How many users are in a peer-to-peer network?
(205) What is a measurement of data transferred through the medium...
(206) What type of fiber optic is designed for the local area network...
(212) What is used to identify network nodes on a physically connected...
(217) What type of routing involves the use of routing protocols that...
(222) The measurement of traffic volume actually being carried by the...
(201) What Air Force instruction series covers communications and...
(202) What does network security work to ensure about a network?
(203) Which of the following jobs are performed by a help desk...
(207) What network topology consists of a single central cable to...
(214) What is a group of devices connected to the same physical media...
(215) Bridging loops are created when
(204) How many users are in a single-server network?
(206) What type of fiber optic is used to span extremely long...
(208) What is the set of rules that define how communications are to...
(210) Which protocol of TCP/IP is a connection oriented, reliable,...
(213) What network interface card module converts information into a...
(216) What is a logical grouping of end stations, independent of...
(214) The purpose of a network repeater is that it?
(202) Performance management can be broken into which two separate...
(219) What filters network traffic by controlling whether routed...
(219) What is the range of numbers that represent standard access...
(209) What protocol is used by the IEEE 802.3 standard to avoid...
(209) What Xseries protocol is a message handling system (MHS)...
(214) What network condition usually begins slowly and (if not...
(215) What is used to logically eliminate loops within a network?
(217) What prevents a router from sending route information back to...
(218) What are the network connections through which network traffic...
(204) In most cases the frequencies used by wireless networks are in...
(205) What is a form of communication that transmits information as a...
(212) What is the binary equivalent to the dotted decimal number 96?
(217) What acts as a translator between two workstations or networks...
(219) What do all access lists end with?
(221) What is a set of keys, subkeys, and values from the registry...
(202) What Air Force Instruction sets the policies that unit client...
(204) What is a set of subnets that are connected with...
(204) What type of communications network serves users within a...
(204) How many users are in a multi-server high-speed backbone...
(206) Light signals in fiber optic cables can travel distances in...
(208) What layer of the OSI reference model is really a set of rules...
(212) How many octets is the standard internet protocol broken down...
(221) Data in which root-key determines which device drivers and...
(208) What is the major Department of Defense contribution to...
(215) What are the four basic functions of a bridge?
(215) The bridge in a network with the highest priority (the lowest...
(217) What type of routing is the establishment of routes by the...
(206) What are the principal advantages of fiber optics with present...
(213) What network interface card module temporarily holds holds data...
(214) What type of hub has special capabilities for configurations and...
(201) What Air Force publication identifies responsibilities for...
(211) As information passes down through the protocol layers, what is...
(211) In the Ethernet environment, what is the minimum number of...
(217) In what dynamic routing protocol must packets go the complete...
(220) What network type normally utilizes non-dedicated servers?
(210) What makes it possible for implementers to produce new Network...
(216) What is the technology called that allows Network Interface Card...
(209) What does a station specifically send when it sends a general...
(214) What network component serves as a central connecting point and...
(207) On what network topology can multiple transmit frames co-exist?
(222) What is detailed analysis of the performance of a specific...
(213) What network interface card module drives the signal onto and...
(217) The function performed by a router to move information from one...
(218) From what level can all other command modes be accessed?
(218) To view the current configuration of a router, what command is...
(221) Within the windows environment, what is the central repository...
(202) Whose network area of responsibility starts at the user's...
(218) Where is the backup copy of the Cisco Internet Operating System...
(201) What Air Force publication provides the policy and procedures...
(216) Switching conducted at the layer 3 category is based upon...
(222) What is a set of statistical measurements made over a period of...
(209) What X series protocol is a directory services specification...
(211) What layer in the OSI model adds a trailer to the packet?
(216) Switching conducted at the layer 2 category is based solely upon...
(217) At what level of the OSI model does a router work?
(210) Which protocol of TCP/IP provides a connectionless datagram...
(212) What type of mask is used within a network that uses the same...
(213) What communications device is used for converting analog signals...
(218) What command interface configuration command is used to activate...
(201) What Air Force publication establishes policy on how C4 systems...
(217) What is the primary device used for connecting these networks,...
(217) What routing metric is generally based upon the bit-error rate...
(218) What command is used to change the bootup values within ROM...
(219) What does a standard access list use to filter packets?
(202) What function within the network control center provides...
(216) What is the most common method of defining Virtual local area...
(218) What prompt is displayed when in the User Exec mode on a router?
(220) What type of server is a bundle of software designed to...
(209) The IEEE 802.5 standard was developed to cover what local area...
(218) From what mode is the banner motd command used in?
(209) The IEEE 802.3 standard describes a local area network using...
(219) Router access lists must be applied to
(202) What network control center function increases network...
(216) What type of switch is limited in it's application to small...
(202) To determine the level of network service provided to the users,...
(202) What network control center function responds to detected...
(208) What layer of the OSI model prevents a fast computer from...
(211) What is the only layer in the OSI model that simply transmits...
(215) What is a local area network connection device with two or more...
(216) What type of switch reads the first 64 bytes before forwarding...
(208) Which layer of the OSI model is concerned with network security,...
(222) What network performance criteria is the most significant...
(221) What two types of environments are network operating systems...
(208) What layer of the Open Systems Interconnection reference model...
(202) What network control center function is the central point of...
Alert!

Advertisement