3C051 CDC Vol. 2

Approved & Edited by ProProfs Editorial Team
At ProProfs Quizzes, our dedicated in-house team of experts takes pride in their work. With a sharp eye for detail, they meticulously review each quiz. This ensures that every quiz, taken by over 100 million users, meets our standards of accuracy, clarity, and engagement.
Learn about Our Editorial Process
| Written by 72jmpmaster
7
72jmpmaster
Community Contributor
Quizzes Created: 2 | Total Attempts: 1,941
Questions: 124 | Attempts: 826

SettingsSettingsSettings
CDC Quizzes & Trivia

This is all URE questions from Volume 2 of the 3C051 CDC (As of 2009)


Questions and Answers
  • 1. 

    (201) What Air Force instruction series covers communications and information?

    • A. 

      30.

    • B. 

      31.

    • C. 

      32.

    • D. 

      33.

    Correct Answer
    D. 33.
    Explanation
    Air Force instruction series 33 covers communications and information.

    Rate this question:

  • 2. 

    (201) What Air Force publication establishes policy on how C4 systems are aquired, operated, and maintained?

    • A. 

      AFPD 33-1

    • B. 

      AFPD 33-2

    • C. 

      AFPD 33-202

    • D. 

      AFPD 33-204

    Correct Answer
    A. AFPD 33-1
    Explanation
    AFPD 33-1 is the correct answer because it is the Air Force publication that specifically establishes policy on how C4 systems are acquired, operated, and maintained. The other options, AFPD 33-2, AFPD 33-202, and AFPD 33-204, may cover different topics or aspects of C4 systems, but they do not specifically address the policy for acquiring, operating, and maintaining these systems. Therefore, AFPD 33-1 is the most appropriate choice.

    Rate this question:

  • 3. 

    (201) What Air Force publication identifies responsibilities for supporting critical Air Force communications and information networks, primarily through network control centers?

    • A. 

      AFPD 33-1

    • B. 

      AFPD 33-2

    • C. 

      AFI 33-115 Volume 1

    • D. 

      AFI 33-115 Volume 2

    Correct Answer
    C. AFI 33-115 Volume 1
    Explanation
    AFI 33-115 Volume 1 is the correct answer because it is an Air Force publication that specifically identifies responsibilities for supporting critical Air Force communications and information networks. It primarily does this through network control centers. AFPD 33-1 and AFPD 33-2 are not the correct answers as they do not focus on the responsibilities for supporting critical Air Force communications and information networks. Similarly, AFI 33-115 Volume 2 is not the correct answer as it does not specifically address the responsibilities for supporting critical Air Force communications and information networks.

    Rate this question:

  • 4. 

    (201) What Air Force publication provides the policy and procedures for certifying network professionals who manage and operate government-provided information systems on Air Force networks?

    • A. 

      AFPD 33-1

    • B. 

      AFPD 33-2

    • C. 

      AFI 33-115 Volume 1

    • D. 

      AFI 33-115 Volume 2

    Correct Answer
    D. AFI 33-115 Volume 2
    Explanation
    AFI 33-115 Volume 2 is the correct answer because it provides the policy and procedures for certifying network professionals who manage and operate government-provided information systems on Air Force networks. AFPD 33-1 and AFPD 33-2 are Air Force policy directives that may provide broader guidance but do not specifically address the certification of network professionals. AFI 33-115 Volume 1 may provide some information on the topic but Volume 2 is the specific publication that focuses on the certification process.

    Rate this question:

  • 5. 

    (202) What organization does communication and information services entering and exiting the base or site fall under the operational control of?

    • A. 

      Base security services information assurance office

    • B. 

      Base computer security control office

    • C. 

      Base network control center

    • D. 

      Base command post

    Correct Answer
    C. Base network control center
    Explanation
    The correct answer is the Base network control center. This organization is responsible for the operational control of communication and information services entering and exiting the base or site. They oversee and manage the network infrastructure, ensuring the security and smooth functioning of communication systems within the base.

    Rate this question:

  • 6. 

    (202) What function within the network control center provides technical assistance to the unit functional system administrators and workgroup managers?

    • A. 

      Network security

    • B. 

      Network performance

    • C. 

      Network management

    • D. 

      Network administration

    Correct Answer
    D. Network administration
    Explanation
    The function within the network control center that provides technical assistance to the unit functional system administrators and workgroup managers is network administration. This role is responsible for managing and maintaining the network infrastructure, ensuring its smooth operation, and providing support to the administrators and managers in resolving any technical issues or concerns they may have.

    Rate this question:

  • 7. 

    (202) Whose network area of responsibility starts at the user's terminal and ends at the server, but does not include the network backbone infrastructure components?

    • A. 

      Unit client support administrator

    • B. 

      Unit functional systems administrator

    • C. 

      Network control center help desk

    • D. 

      Network control center network administration

    Correct Answer
    B. Unit functional systems administrator
    Explanation
    The Unit functional systems administrator is responsible for the network area that starts at the user's terminal and ends at the server. They are in charge of managing and supporting the functional systems within this network, but they do not have responsibility for the network backbone infrastructure components. This means that they are not involved in the administration and control of the overall network infrastructure, but rather focus on the systems and services that directly impact the users and servers.

    Rate this question:

  • 8. 

    (202) What Air Force Instruction sets the policies that unit client support administrators must comply with? 

    • A. 

      33-115

    • B. 

      33-116

    • C. 

      33-202

    • D. 

      33-204

    Correct Answer
    A. 33-115
    Explanation
    Air Force Instruction 33-115 sets the policies that unit client support administrators must comply with.

    Rate this question:

  • 9. 

    (202) What network control center function responds to detected security incidents, network faults(errors), and user reported outages at the timeof help desk referral?

    • A. 

      Network administration

    • B. 

      Network management

    • C. 

      Configuration management

    • D. 

      Information protection operations

    Correct Answer
    B. Network management
    Explanation
    Network management is the correct answer because it involves the monitoring and control of a network's performance and resources. This includes responding to security incidents, network faults, and user reported outages. Network management ensures that the network is running smoothly, and any issues are addressed promptly to minimize disruptions and maintain the network's functionality.

    Rate this question:

  • 10. 

    (202) What network control center function is the central point of contact for network distribution and maintenance/update of an Air Force Computer Emergency response team and automated systems security and antivirus software?  

    • A. 

      Network management

    • B. 

      Security management

    • C. 

      Network administraton

    • D. 

      Configuration management

    Correct Answer
    D. Configuration management
    Explanation
    Configuration management is the correct answer because it refers to the function that is responsible for the distribution, maintenance, and update of network distribution and automated systems security and antivirus software. This function acts as the central point of contact for an Air Force Computer Emergency Response Team (AFCERT) and ensures that the network is properly configured and secured against potential threats.

    Rate this question:

  • 11. 

    (202) Performance management can be broken into which two separate functional categories?

    • A. 

      Monitoring and tuning

    • B. 

      Baselining and tuning

    • C. 

      Baselining and monitoring

    • D. 

      Inspecting and monitoring

    Correct Answer
    A. Monitoring and tuning
    Explanation
    Performance management involves the process of monitoring and optimizing the performance of a system or process. Monitoring refers to the continuous tracking and measurement of performance metrics to identify any issues or deviations from desired performance levels. Tuning, on the other hand, involves making adjustments and optimizations to improve the performance based on the insights gained from monitoring. Therefore, monitoring and tuning are the two separate functional categories of performance management.

    Rate this question:

  • 12. 

    (202) To determine the level of network service provided to the users, you will make a measurement of the total response time

    • A. 

      Average bandwidth and availability of the network

    • B. 

      Rejection rate and average bandwidth

    • C. 

      Systems failure rate and average bandwidth

    • D. 

      Rejection rate and availability of the network

    Correct Answer
    D. Rejection rate and availability of the network
    Explanation
    To determine the level of network service provided to the users, measuring the rejection rate and availability of the network is important. The rejection rate indicates the number of requests that are denied or not processed by the network, which can be an indicator of the network's capacity or efficiency. Availability refers to the percentage of time that the network is operational and accessible to users. By considering both rejection rate and availability, one can assess the network's performance and its ability to handle user requests effectively. Average bandwidth alone does not provide a comprehensive understanding of the network service, and systems failure rate is not directly related to the level of network service provided.

    Rate this question:

  • 13. 

    (202) What network control center function increases network reliability by giving the network manager tools to detect problems and initiate recovery procedures?

    • A. 

      Fault management

    • B. 

      Network management

    • C. 

      Performance management

    • D. 

      Configuration management

    Correct Answer
    A. Fault management
    Explanation
    Fault management is the correct answer because it refers to the function that increases network reliability by providing the network manager with tools to detect problems and initiate recovery procedures. This involves monitoring the network for any faults or errors, identifying the root cause of the issue, and taking necessary actions to resolve it. By effectively managing faults, network downtime can be minimized, ensuring the smooth operation of the network and improving its overall reliability.

    Rate this question:

  • 14. 

    (202) What does network security work to ensure about a network?

    • A. 

      Availability, confidentiality, and data integrity

    • B. 

      Availability, confidentiality, and backup of data

    • C. 

      Availabilty, integrity, and backup of data

    • D. 

      Confidentiality, integrity, and backup of data

    Correct Answer
    A. Availability, confidentiality, and data integrity
    Explanation
    Network security works to ensure the availability, confidentiality, and data integrity of a network. Availability refers to the network being accessible and operational for authorized users. Confidentiality ensures that sensitive information is only accessible to authorized individuals. Data integrity ensures that data remains accurate and unaltered during transmission and storage.

    Rate this question:

  • 15. 

    (203) Which of the following jobs are performed by a help desk technician on a daily basis?

    • A. 

      Account unlocks, account creations, and router configuration

    • B. 

      Network monitoring, account unlocks, and account creations

    • C. 

      Network monitoring, account unlocks, router access lists

    • D. 

      Operating system installations, account creations, and network monitoring

    Correct Answer
    B. Network monitoring, account unlocks, and account creations
    Explanation
    A help desk technician performs network monitoring on a daily basis to ensure the smooth functioning of the network and identify any issues or abnormalities. They also handle account unlocks, which involves assisting users in regaining access to their accounts after they have been locked due to various reasons such as incorrect passwords. Additionally, they are responsible for account creations, which involves setting up new user accounts and granting appropriate access privileges. These tasks are part of the regular responsibilities of a help desk technician in order to provide technical support and maintain the efficiency of the system.

    Rate this question:

  • 16. 

    (203) Within the NCC, what function is initially responsible for taking trouble calls, deciding what type of problem has occurred, and what to do about the problem?

    • A. 

      Help desk

    • B. 

      Network management

    • C. 

      Specific area of support

    • D. 

      Information protection operations

    Correct Answer
    A. Help desk
    Explanation
    The help desk is initially responsible for taking trouble calls, deciding what type of problem has occurred, and determining the appropriate course of action. They are the first point of contact for users who are experiencing issues or have questions about the network. The help desk staff assesses the problem, identifies its nature, and provides guidance or escalates the issue to the appropriate department for further resolution.

    Rate this question:

  • 17. 

    (203) What is one of the most important communication skills you can develop as a help desk operator?

    • A. 

      Speaking

    • B. 

      Writing

    • C. 

      Listening

    • D. 

      Briefing

    Correct Answer
    C. Listening
    Explanation
    Listening is one of the most important communication skills that a help desk operator can develop. As a help desk operator, it is crucial to actively listen to the concerns and issues raised by the customers. By listening attentively, the operator can fully understand the problem and provide appropriate solutions. Additionally, listening allows the operator to show empathy and build rapport with the customers, which can enhance the overall customer experience and satisfaction.

    Rate this question:

  • 18. 

    (203) What software is used to open trouble tickets for customer trouble calls?

    • A. 

      Microsoft access

    • B. 

      Remedy

    • C. 

      The C+ database

    • D. 

      Fileit

    Correct Answer
    B. Remedy
    Explanation
    Remedy is the software used to open trouble tickets for customer trouble calls. This software is specifically designed for managing and tracking customer issues and incidents. It allows customer service representatives to log and track customer complaints, assign them to appropriate teams or individuals, and monitor the progress until the issue is resolved. Remedy provides a centralized platform for efficient communication and problem resolution, ensuring smooth customer support operations.

    Rate this question:

  • 19. 

    (204) What is a set of subnets that are connected with routers?

    • A. 

      Internetwork

    • B. 

      Intranetwork

    • C. 

      Homogeneous network

    • D. 

      Heterogeneous network

    Correct Answer
    A. Internetwork
    Explanation
    An internetwork is a set of subnets that are connected with routers. Routers are used to connect different subnets and enable communication between them. Therefore, an internetwork refers to a network that consists of multiple interconnected subnets, allowing for data to be routed between them.

    Rate this question:

  • 20. 

    (204) What is a set of systems/nodes on a local segment that can be off of a switch or router?

    • A. 

      Internetwork

    • B. 

      Intranetwork

    • C. 

      Homogeneous network

    • D. 

      Heterogeneous network

    Correct Answer
    B. Intranetwork
    Explanation
    An intranetwork refers to a set of systems or nodes that are connected on a local segment, which can be either a switch or a router. This network is private and is only accessible to authorized users within an organization. It allows for the sharing of resources, such as files and printers, and facilitates communication and collaboration among employees. Unlike an internetwork, which connects multiple networks together, an intranetwork is confined to a specific local area.

    Rate this question:

  • 21. 

    (204) What type of network environments consist of computer systems from different vendors that run different operating systems and communication protocols?

    • A. 

      Internetwork

    • B. 

      Intranetwork

    • C. 

      Homogeneous network

    • D. 

      Heterogeneous network

    Correct Answer
    D. Heterogeneous network
    Explanation
    A heterogeneous network consists of computer systems from different vendors that run different operating systems and communication protocols. In this type of network environment, there is a mix of hardware and software from various manufacturers and developers. This can present challenges in terms of compatibility and interoperability between different systems. However, it also allows for greater flexibility and diversity in terms of technology choices and capabilities.

    Rate this question:

  • 22. 

    (204) What type of network is made up of components from the same vendor or compatible equipment that all run under the same operating system or network operating system?

    • A. 

      Internetwork

    • B. 

      Intranetwork

    • C. 

      Homogeneous network

    • D. 

      Heterogeneous network

    Correct Answer
    C. Homogeneous network
    Explanation
    A homogeneous network is a type of network that is made up of components from the same vendor or compatible equipment, all running under the same operating system or network operating system. This means that all the devices and software in the network are designed to work seamlessly together, resulting in a more efficient and reliable network infrastructure. This type of network simplifies management and troubleshooting processes as there is a uniformity in the hardware and software used.

    Rate this question:

  • 23. 

    (204) What type of communications network serves users within a confined geographical area?

    • A. 

      Local area network

    • B. 

      Metropolitan area network

    • C. 

      Wide area network

    • D. 

      Enterprise network

    Correct Answer
    A. Local area network
    Explanation
    A local area network (LAN) is a type of communications network that serves users within a confined geographical area, such as a home, office, or campus. It is designed to connect computers and devices in close proximity to each other, allowing for the sharing of resources, such as files, printers, and internet access. LANs typically have high data transfer rates and low latency, making them ideal for local communication needs.

    Rate this question:

  • 24. 

    (204) What type of communications network links geographically dispersed offices in other cities or around the globe?

    • A. 

      Local area network

    • B. 

      Metropolitan area network

    • C. 

      Wide area network

    • D. 

      Enterprise network

    Correct Answer
    C. Wide area network
    Explanation
    A wide area network (WAN) is a type of communications network that connects geographically dispersed offices in different cities or even around the world. Unlike a local area network (LAN) or metropolitan area network (MAN), which are limited to a specific location or region, a WAN allows for long-distance connectivity and enables organizations to share resources, data, and applications across multiple locations. An enterprise network refers to the overall network infrastructure of an organization, which can include both LANs and WANs.

    Rate this question:

  • 25. 

    (204) How many users are in a peer-to-peer network?

    • A. 

      2 to 10

    • B. 

      10 to 50

    • C. 

      50 to 250

    • D. 

      250 to 1000

    Correct Answer
    A. 2 to 10
    Explanation
    A peer-to-peer network is a decentralized network where all devices are equal and can act as both clients and servers. In such a network, the number of users can vary, but typically it ranges from 2 to 10. This limited number of users ensures efficient communication and sharing of resources among the peers.

    Rate this question:

  • 26. 

    (204) How many users are in a single-server network?

    • A. 

      2 to 10

    • B. 

      10 to 50

    • C. 

      50 to 250

    • D. 

      250 to 1000

    Correct Answer
    B. 10 to 50
    Explanation
    A single-server network typically refers to a network where all users are connected to a central server. The given answer range of 10 to 50 suggests that in a single-server network, there are typically between 10 and 50 users. This range indicates that the network is relatively small in scale, with a moderate number of users relying on the central server for their network services and resources.

    Rate this question:

  • 27. 

    (204) How many users are in a multi-server high-speed backbone network?

    • A. 

      2 to 10

    • B. 

      10 to 50

    • C. 

      50 to 250

    • D. 

      250 to 1000

    Correct Answer
    D. 250 to 1000
    Explanation
    A multi-server high-speed backbone network is designed to handle large amounts of traffic and connect multiple users. The range of 250 to 1000 users suggests that this network can support a significant number of users, making it suitable for medium to large organizations or institutions. This range indicates that the network has the capacity to handle a substantial user base while maintaining efficient data transfer and high-speed connectivity.

    Rate this question:

  • 28. 

    (204) In most cases the frequencies used by wireless networks are in what frequency band?

    • A. 

      Television band

    • B. 

      Very high frequency (VHF)

    • C. 

      Ultra high frequency (UHF)

    • D. 

      Industrial, scientific, and medical (ISM)

    Correct Answer
    D. Industrial, scientific, and medical (ISM)
    Explanation
    Wireless networks typically use frequencies in the Industrial, Scientific, and Medical (ISM) frequency band. This band is specifically designated for non-communication purposes such as scientific research, industrial equipment, and medical devices. It is commonly used for Wi-Fi networks, Bluetooth devices, and other wireless technologies. The television band, very high frequency (VHF), and ultra high frequency (UHF) are not typically used for wireless networks.

    Rate this question:

  • 29. 

    (205) What is the distorting and/or weakening of a signal as it traverses the media called? 

    • A. 

      Attenuation

    • B. 

      Impedance

    • C. 

      Resistance

    • D. 

      Inductive coupling

    Correct Answer
    A. Attenuation
    Explanation
    Attenuation refers to the process of reducing the strength or intensity of a signal as it travels through a medium. This can occur due to various factors such as distance, interference, or the characteristics of the medium itself. Attenuation can result in a loss of signal quality, clarity, or strength, making it appear weaker or distorted at the receiving end. Impedance, resistance, and inductive coupling are all related concepts but do not specifically refer to the distorting or weakening of a signal as it traverses the media.

    Rate this question:

  • 30. 

    (205) What is a measurement of data transferred through the medium between network connections?

    • A. 

      Attenuation

    • B. 

      Impedance

    • C. 

      Throughput

    • D. 

      Inductive coupling

    Correct Answer
    C. Throughput
    Explanation
    Throughput refers to the amount of data that can be transferred through a network connection within a given period of time. It measures the efficiency and speed of data transfer between devices connected in a network. A higher throughput indicates a faster and more efficient transmission of data, while a lower throughput suggests slower data transfer. Therefore, throughput is the measurement of data transferred through the medium between network connections.

    Rate this question:

  • 31. 

    (205) What is a form of communication that transmits information as a serial stream of bits or bytes?

    • A. 

      Asynchronous communication

    • B. 

      Synchronous communication

    • C. 

      Half-duplex communication

    • D. 

      Duplex communication

    Correct Answer
    A. Asynchronous communication
    Explanation
    Asynchronous communication is a form of communication that transmits information as a serial stream of bits or bytes. In this type of communication, data is sent without the need for a synchronized clock signal. Instead, each data packet is accompanied by start and stop bits, allowing the receiver to interpret the data at its own pace. This method is commonly used in computer networks and telecommunications systems where devices may operate at different speeds or have varying response times.

    Rate this question:

  • 32. 

    (205) Which of the following categories of twisted-pair cable has the highest throughput?

    • A. 

      Cat 2

    • B. 

      Cat 3

    • C. 

      Cat 4

    • D. 

      Cat 5

    Correct Answer
    D. Cat 5
    Explanation
    Cat 5 twisted-pair cable has the highest throughput among the given options. This is because Cat 5 cable has a higher bandwidth compared to Cat 2, Cat 3, and Cat 4 cables. It is capable of supporting data transfer rates of up to 1000 Mbps (1 Gbps). Cat 5 cable is commonly used for Ethernet networks and is suitable for various applications, including video streaming, online gaming, and large file transfers.

    Rate this question:

  • 33. 

    (206) A fiber optic network uses a laser or light-emitting diode to send a signal through what portion of the cable?

    • A. 

      Core

    • B. 

      Buffer

    • C. 

      Kevlar

    • D. 

      Cladding

    Correct Answer
    A. Core
    Explanation
    A fiber optic network uses a laser or light-emitting diode to send a signal through the core of the cable. The core is the innermost part of the cable and is responsible for transmitting the light signals. The cladding, buffer, and kevlar are other components of the cable that provide protection and support, but they do not directly transmit the signal.

    Rate this question:

  • 34. 

    (206) Light signals in fiber optic cables can travel distances in excess of how many miles before they need to be boosted?

    • A. 

      25

    • B. 

      50

    • C. 

      100

    • D. 

      125

    Correct Answer
    C. 100
    Explanation
    Light signals in fiber optic cables can travel distances in excess of 100 miles before they need to be boosted. This is because fiber optic cables use total internal reflection to guide the light signals along the cable without significant loss of signal strength. The light signals bounce off the walls of the cable, allowing them to travel long distances without the need for boosting or amplification. This makes fiber optic cables ideal for long-distance communication and data transmission.

    Rate this question:

  • 35. 

    (206) What type of fiber optic is used to span extremely long distances?

    • A. 

      Duplex

    • B. 

      Half duplex

    • C. 

      Multi mode

    • D. 

      Single mode

    Correct Answer
    D. Single mode
    Explanation
    Single mode fiber optic is used to span extremely long distances. This type of fiber optic has a smaller core size, allowing light to travel in a straight line, minimizing signal loss and allowing for longer distances. It is designed to carry a single mode of light, which means that only one wavelength of light is transmitted, resulting in a higher bandwidth and longer transmission distances compared to multi-mode fiber optic.

    Rate this question:

  • 36. 

    (206) What type of fiber optic is designed for the local area network environment and light is typically generated with a light emitting diode?

    • A. 

      Duplex

    • B. 

      Half duplex

    • C. 

      Multi mode

    • D. 

      Single mode

    Correct Answer
    C. Multi mode
    Explanation
    Multi mode fiber optic is designed for the local area network environment and light is typically generated with a light emitting diode. Multi mode fiber optic cables have a larger core diameter compared to single mode fiber optic cables, allowing multiple modes or paths for light to travel through. This makes multi mode fiber optic suitable for short-distance communication within a local area network. The use of a light emitting diode as the light source in multi mode fiber optic is cost-effective and suitable for shorter distances.

    Rate this question:

  • 37. 

    (206) What are the principal advantages of fiber optics with present day transmission technology?

    • A. 

      Sturdiness and security

    • B. 

      Security and throughput

    • C. 

      Sturdiness and media cost

    • D. 

      Throughput and media cost

    Correct Answer
    A. Sturdiness and security
    Explanation
    Fiber optics have the principal advantages of sturdiness and security in present day transmission technology. The durability of fiber optic cables makes them resistant to physical damage, such as interference from weather conditions or electromagnetic interference. Additionally, fiber optics provide enhanced security as they are difficult to tap into or intercept, making them more secure for transmitting sensitive data.

    Rate this question:

  • 38. 

    (207) What network topology consists of a single central cable to which all computers and other devices connect?

    • A. 

      Star

    • B. 

      Bus

    • C. 

      Ring

    • D. 

      Mesh

    Correct Answer
    B. Bus
    Explanation
    A network topology that consists of a single central cable to which all computers and other devices connect is called a bus topology. In this type of network, all devices are connected to a single cable, known as the bus or backbone. Data is transmitted along the bus, and each device listens for the data intended for it. If a device wants to transmit data, it sends it onto the bus, and all devices receive the data, but only the intended recipient processes it.

    Rate this question:

  • 39. 

    (207) What is the greatest risk to a bus network?

    • A. 

      The bus network server

    • B. 

      Security is easily breached

    • C. 

      The bus itself becoming inoperable

    • D. 

      The middle node connected to the bus

    Correct Answer
    C. The bus itself becoming inoperable
    Explanation
    The greatest risk to a bus network is the bus itself becoming inoperable. If the bus malfunctions or breaks down, it can disrupt the entire network, causing delays and inconvenience for passengers. This can lead to loss of revenue and negative impact on the overall efficiency of the bus network. Therefore, ensuring the proper functioning and maintenance of the buses is crucial to minimize the risk of network disruptions.

    Rate this question:

  • 40. 

    (207) On what network topology can multiple transmit frames co-exist?

    • A. 

      Star

    • B. 

      Bus

    • C. 

      Hybrid

    • D. 

      Fiber distributed data interface

    Correct Answer
    D. Fiber distributed data interface
    Explanation
    Fiber distributed data interface (FDDI) is a network topology that allows multiple transmit frames to co-exist. FDDI uses a dual ring topology, where data is transmitted in both directions simultaneously. This allows for high-speed and reliable communication between multiple devices on the network. The use of fiber optic cables in FDDI also ensures fast data transmission over long distances without any loss or interference. Therefore, FDDI is the correct answer for the given question.

    Rate this question:

  • 41. 

    (208) What is the major Department of Defense contribution to networking?

    • A. 

      The Ada programming language

    • B. 

      The file transfer protocol utility

    • C. 

      The open systems interconnection(OSI) reference model

    • D. 

      The transmission control protocol/internet protocol (TCP/IP) suite

    Correct Answer
    D. The transmission control protocol/internet protocol (TCP/IP) suite
    Explanation
    The major Department of Defense contribution to networking is the transmission control protocol/internet protocol (TCP/IP) suite. TCP/IP is a set of protocols that allows computers to communicate over a network. It provides a standardized way for data to be transmitted and received, ensuring that information can flow smoothly between different devices and networks. TCP/IP is the foundation of the internet and is used by virtually all modern computer networks.

    Rate this question:

  • 42. 

    (208) What is the set of rules that define how communications are to take place in a network, including the format, timing, sequences, and error checking and correction?

    • A. 

      A network operating system

    • B. 

      A protocol

    • C. 

      A standard

    • D. 

      A baseline

    Correct Answer
    B. A protocol
    Explanation
    A protocol is a set of rules that governs how communications are conducted in a network. It specifies the format, timing, sequences, error checking, and correction methods to ensure reliable and efficient data transmission. By following a protocol, devices in a network can communicate with each other effectively and understand how to interpret and respond to data packets.

    Rate this question:

  • 43. 

    (208) What layer of the OSI reference model is really a set of rules regarding the hardware used to transmit data?

    • A. 

      Physical

    • B. 

      Data link

    • C. 

      Network

    • D. 

      Transport

    Correct Answer
    A. Physical
    Explanation
    The physical layer of the OSI reference model is responsible for defining the hardware and electrical specifications required to transmit data. It deals with the physical connection between devices and includes aspects such as cables, connectors, and signaling. This layer ensures that the data is transmitted in the form of electrical or optical signals over the physical medium.

    Rate this question:

  • 44. 

    (208) What layer of the Open Systems Interconnection reference model provides the grammar by which machines converse with each other and serves as a vehicle for information transmission?

    • A. 

      Physical

    • B. 

      Data link

    • C. 

      Network

    • D. 

      Transport

    Correct Answer
    B. Data link
    Explanation
    The data link layer of the Open Systems Interconnection reference model provides the grammar by which machines converse with each other and serves as a vehicle for information transmission. This layer is responsible for the reliable transmission of data frames between nodes on a network, ensuring error-free and efficient communication. It handles tasks such as framing, error detection and correction, flow control, and access control.

    Rate this question:

  • 45. 

    (208) What layer of the OSI model prevents a fast computer from overwhelming a slow terminal?

    • A. 

      Physical

    • B. 

      Data link

    • C. 

      Network

    • D. 

      Transport

    Correct Answer
    D. Transport
    Explanation
    The transport layer of the OSI model is responsible for ensuring reliable and efficient communication between end systems. It prevents a fast computer from overwhelming a slow terminal by implementing flow control mechanisms. These mechanisms regulate the amount of data that can be sent from the fast computer to the slow terminal, preventing congestion and ensuring that the slow terminal can process the data at its own pace.

    Rate this question:

  • 46. 

    (208) A feature which involves the periodic insertion of points into data from which any recovery necessary can be started is known as what?

    • A. 

      Checkpointing

    • B. 

      Data transfers

    • C. 

      Formatting function

    • D. 

      Error recognition and recovery

    Correct Answer
    A. Checkpointing
    Explanation
    Checkpointing is a feature that involves the periodic insertion of points into data from which any recovery necessary can be started. It allows for the creation of restore points in a system, enabling the system to recover from errors or failures by reverting back to a previous checkpoint. This feature is commonly used in computer systems and databases to ensure data integrity and provide a mechanism for fault tolerance.

    Rate this question:

  • 47. 

    (208) Which layer of the OSI model is concerned with network security, file transfers, and formatting functions?

    • A. 

      Session

    • B. 

      Transport

    • C. 

      Application

    • D. 

      Presentation

    Correct Answer
    D. Presentation
    Explanation
    The presentation layer of the OSI model is responsible for ensuring that data is properly formatted, encrypted, and decrypted for transmission between different systems. It handles tasks such as data compression, encryption, and decryption, as well as converting data from one format to another. While network security and file transfers can involve multiple layers of the OSI model, the presentation layer specifically deals with the formatting and security aspects of data transmission.

    Rate this question:

  • 48. 

    (209) The IEEE 802.3 standard describes a local area network using what kind of topology?

    • A. 

      Bus

    • B. 

      Star

    • C. 

      Token bus

    • D. 

      Token ring

    Correct Answer
    A. Bus
    Explanation
    The IEEE 802.3 standard describes a local area network using a bus topology. In a bus topology, all devices are connected to a single cable called the bus. Data is transmitted in both directions on the bus, and all devices on the network can see and receive the transmitted data. This type of topology is simple and cost-effective, but it can be prone to collisions and network congestion.

    Rate this question:

  • 49. 

    (209) What protocol is used by the IEEE 802.3 standard to avoid collisions on the network?

    • A. 

      User data protocol

    • B. 

      Network file system

    • C. 

      Transmission control protocol/internet protocol TCP/IP

    • D. 

      Carrier sense multiple access/collision detection CSMA/CD

    Correct Answer
    D. Carrier sense multiple access/collision detection CSMA/CD
    Explanation
    The correct answer is carrier sense multiple access/collision detection (CSMA/CD). CSMA/CD is a protocol used by the IEEE 802.3 standard to avoid collisions on the network. It works by having devices on the network listen for traffic before transmitting data. If a device detects that the network is busy, it waits for a random amount of time before attempting to transmit again. This helps to prevent collisions and ensures that data is transmitted smoothly on the network.

    Rate this question:

  • 50. 

    (209) What does a station specifically send when it sends a general request through the network asking any station to respond to receive the token?

    • A. 

      Broadcast address

    • B. 

      Tapped approach

    • C. 

      Who follows frame

    • D. 

      Solicit successor frame

    Correct Answer
    D. Solicit successor frame
    Explanation
    A station specifically sends a "solicit successor frame" when it sends a general request through the network asking any station to respond to receive the token.

    Rate this question:

Back to Top Back to top
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.