3C051 CDC Vol. 2

Reviewed by Editorial Team
The ProProfs editorial team is comprised of experienced subject matter experts. They've collectively created over 10,000 quizzes and lessons, serving over 100 million users. Our team includes in-house content moderators and subject matter experts, as well as a global network of rigorously trained contributors. All adhere to our comprehensive editorial guidelines, ensuring the delivery of high-quality content.
Learn about Our Editorial Process
| By 72jmpmaster
7
72jmpmaster
Community Contributor
Quizzes Created: 2 | Total Attempts: 1,942
| Attempts: 826
SettingsSettings
Please wait...
  • 1/124 Questions

    (203) Within the NCC, what function is initially responsible for taking trouble calls, deciding what type of problem has occurred, and what to do about the problem?

    • Help desk
    • Network management
    • Specific area of support
    • Information protection operations
Please wait...
About This Quiz

This is all URE questions from Volume 2 of the 3C051 CDC (As of 2009)

Air Force Quizzes & Trivia

Quiz Preview

  • 2. 

    (203) What software is used to open trouble tickets for customer trouble calls?

    • Microsoft access

    • Remedy

    • The C+ database

    • Fileit

    Correct Answer
    A. Remedy
    Explanation
    Remedy is the software used to open trouble tickets for customer trouble calls. This software is specifically designed for managing and tracking customer issues and incidents. It allows customer service representatives to log and track customer complaints, assign them to appropriate teams or individuals, and monitor the progress until the issue is resolved. Remedy provides a centralized platform for efficient communication and problem resolution, ensuring smooth customer support operations.

    Rate this question:

  • 3. 

    (205) Which of the following categories of twisted-pair cable has the highest throughput?

    • Cat 2

    • Cat 3

    • Cat 4

    • Cat 5

    Correct Answer
    A. Cat 5
    Explanation
    Cat 5 twisted-pair cable has the highest throughput among the given options. This is because Cat 5 cable has a higher bandwidth compared to Cat 2, Cat 3, and Cat 4 cables. It is capable of supporting data transfer rates of up to 1000 Mbps (1 Gbps). Cat 5 cable is commonly used for Ethernet networks and is suitable for various applications, including video streaming, online gaming, and large file transfers.

    Rate this question:

  • 4. 

    (203) What is one of the most important communication skills you can develop as a help desk operator?

    • Speaking

    • Writing

    • Listening

    • Briefing

    Correct Answer
    A. Listening
    Explanation
    Listening is one of the most important communication skills that a help desk operator can develop. As a help desk operator, it is crucial to actively listen to the concerns and issues raised by the customers. By listening attentively, the operator can fully understand the problem and provide appropriate solutions. Additionally, listening allows the operator to show empathy and build rapport with the customers, which can enhance the overall customer experience and satisfaction.

    Rate this question:

  • 5. 

    (204) What type of network is made up of components from the same vendor or compatible equipment that all run under the same operating system or network operating system?

    • Internetwork

    • Intranetwork

    • Homogeneous network

    • Heterogeneous network

    Correct Answer
    A. Homogeneous network
    Explanation
    A homogeneous network is a type of network that is made up of components from the same vendor or compatible equipment, all running under the same operating system or network operating system. This means that all the devices and software in the network are designed to work seamlessly together, resulting in a more efficient and reliable network infrastructure. This type of network simplifies management and troubleshooting processes as there is a uniformity in the hardware and software used.

    Rate this question:

  • 6. 

    (209) Why can a token ring network cover a greater distance than a token bus network without loss of signal?

    • Because they can use wire centers

    • Because each workstation repeats the signal

    • Because they require significantly more cable

    • Because each workstation creates less signal distortion

    Correct Answer
    A. Because each workstation repeats the signal
    Explanation
    In a token ring network, each workstation repeats the signal before passing it on to the next workstation. This repetition of the signal helps to maintain its strength and integrity, allowing the network to cover a greater distance without any loss of signal. On the other hand, a token bus network does not have this feature, which may lead to signal degradation over longer distances. Therefore, the ability of each workstation to repeat the signal is the reason why a token ring network can cover a greater distance without signal loss.

    Rate this question:

  • 7. 

    (204) What is a set of systems/nodes on a local segment that can be off of a switch or router?

    • Internetwork

    • Intranetwork

    • Homogeneous network

    • Heterogeneous network

    Correct Answer
    A. Intranetwork
    Explanation
    An intranetwork refers to a set of systems or nodes that are connected on a local segment, which can be either a switch or a router. This network is private and is only accessible to authorized users within an organization. It allows for the sharing of resources, such as files and printers, and facilitates communication and collaboration among employees. Unlike an internetwork, which connects multiple networks together, an intranetwork is confined to a specific local area.

    Rate this question:

  • 8. 

    (204) What type of network environments consist of computer systems from different vendors that run different operating systems and communication protocols?

    • Internetwork

    • Intranetwork

    • Homogeneous network

    • Heterogeneous network

    Correct Answer
    A. Heterogeneous network
    Explanation
    A heterogeneous network consists of computer systems from different vendors that run different operating systems and communication protocols. In this type of network environment, there is a mix of hardware and software from various manufacturers and developers. This can present challenges in terms of compatibility and interoperability between different systems. However, it also allows for greater flexibility and diversity in terms of technology choices and capabilities.

    Rate this question:

  • 9. 

    (206) A fiber optic network uses a laser or light-emitting diode to send a signal through what portion of the cable?

    • Core

    • Buffer

    • Kevlar

    • Cladding

    Correct Answer
    A. Core
    Explanation
    A fiber optic network uses a laser or light-emitting diode to send a signal through the core of the cable. The core is the innermost part of the cable and is responsible for transmitting the light signals. The cladding, buffer, and kevlar are other components of the cable that provide protection and support, but they do not directly transmit the signal.

    Rate this question:

  • 10. 

    (207) What is the greatest risk to a bus network?

    • The bus network server

    • Security is easily breached

    • The bus itself becoming inoperable

    • The middle node connected to the bus

    Correct Answer
    A. The bus itself becoming inoperable
    Explanation
    The greatest risk to a bus network is the bus itself becoming inoperable. If the bus malfunctions or breaks down, it can disrupt the entire network, causing delays and inconvenience for passengers. This can lead to loss of revenue and negative impact on the overall efficiency of the bus network. Therefore, ensuring the proper functioning and maintenance of the buses is crucial to minimize the risk of network disruptions.

    Rate this question:

  • 11. 

    (204) What type of communications network links geographically dispersed offices in other cities or around the globe?

    • Local area network

    • Metropolitan area network

    • Wide area network

    • Enterprise network

    Correct Answer
    A. Wide area network
    Explanation
    A wide area network (WAN) is a type of communications network that connects geographically dispersed offices in different cities or even around the world. Unlike a local area network (LAN) or metropolitan area network (MAN), which are limited to a specific location or region, a WAN allows for long-distance connectivity and enables organizations to share resources, data, and applications across multiple locations. An enterprise network refers to the overall network infrastructure of an organization, which can include both LANs and WANs.

    Rate this question:

  • 12. 

    (205) What is the distorting and/or weakening of a signal as it traverses the media called? 

    • Attenuation

    • Impedance

    • Resistance

    • Inductive coupling

    Correct Answer
    A. Attenuation
    Explanation
    Attenuation refers to the process of reducing the strength or intensity of a signal as it travels through a medium. This can occur due to various factors such as distance, interference, or the characteristics of the medium itself. Attenuation can result in a loss of signal quality, clarity, or strength, making it appear weaker or distorted at the receiving end. Impedance, resistance, and inductive coupling are all related concepts but do not specifically refer to the distorting or weakening of a signal as it traverses the media.

    Rate this question:

  • 13. 

    (220) What is required due to the differences between the physical speed of the print device and the processing speed of the workstation generating the print job?

    • File server

    • Print queues

    • Timing devices

    • Multi processor servers

    Correct Answer
    A. Print queues
    Explanation
    Print queues are required due to the differences between the physical speed of the print device and the processing speed of the workstation generating the print job. Print queues act as buffers, allowing the workstation to send print jobs to the queue without having to wait for the print device to finish processing previous jobs. This ensures that the workstation can continue its processing tasks without being slowed down by the slower print device. The print device can then process the print jobs in the queue at its own speed, resulting in a more efficient workflow.

    Rate this question:

  • 14. 

    (208) A feature which involves the periodic insertion of points into data from which any recovery necessary can be started is known as what?

    • Checkpointing

    • Data transfers

    • Formatting function

    • Error recognition and recovery

    Correct Answer
    A. Checkpointing
    Explanation
    Checkpointing is a feature that involves the periodic insertion of points into data from which any recovery necessary can be started. It allows for the creation of restore points in a system, enabling the system to recover from errors or failures by reverting back to a previous checkpoint. This feature is commonly used in computer systems and databases to ensure data integrity and provide a mechanism for fault tolerance.

    Rate this question:

  • 15. 

    (213) What communications device converts binary electrical signals into acoustic signals for transmission over telephone lines?

    • Hub

    • Switch

    • Modem

    • Router

    Correct Answer
    A. Modem
    Explanation
    A modem is a communications device that converts binary electrical signals into acoustic signals for transmission over telephone lines. It is used to connect computers or other devices to the internet or other networks through a telephone line. The modem modulates the digital signals from the computer into analog signals that can be transmitted over the telephone line, and then demodulates the analog signals back into digital signals at the receiving end. This allows for the transmission of data over long distances using existing telephone infrastructure.

    Rate this question:

  • 16. 

    (218) What command is used to restrict access to the privileged exec mode?

    • Password

    • Enable password

    • Console password

    • Virtual terminal password

    Correct Answer
    A. Enable password
    Explanation
    The correct answer is "enable password." This command is used to restrict access to the privileged exec mode. By setting an enable password, only users who know the password can access the privileged exec mode and perform privileged commands. This helps to ensure that only authorized individuals can make changes to the system configuration and perform administrative tasks.

    Rate this question:

  • 17. 

    (220) What type of server is set aside to perform a specific task or function all the time?

    • File server

    • Network server

    • Dedicated server

    • Nondedicated server

    Correct Answer
    A. Dedicated server
    Explanation
    A dedicated server is a type of server that is specifically allocated for performing a particular task or function continuously. Unlike other types of servers, a dedicated server is not shared with other users or applications, ensuring that its resources are solely dedicated to the designated task. This allows for enhanced performance, reliability, and security, making it an ideal choice for organizations or individuals with specific and demanding requirements.

    Rate this question:

  • 18. 

    (202) What organization does communication and information services entering and exiting the base or site fall under the operational control of?

    • Base security services information assurance office

    • Base computer security control office

    • Base network control center

    • Base command post

    Correct Answer
    A. Base network control center
    Explanation
    The correct answer is the Base network control center. This organization is responsible for the operational control of communication and information services entering and exiting the base or site. They oversee and manage the network infrastructure, ensuring the security and smooth functioning of communication systems within the base.

    Rate this question:

  • 19. 

    (218) What prompt is displayed when in the Priveleged Exec mode on a router?

    • Router#

    • Router/

    • Router>

    • Router}

    Correct Answer
    A. Router#
    Explanation
    When in the Privileged Exec mode on a router, the prompt displayed is "Router#". This prompt indicates that the user has administrative privileges and can access and configure advanced settings on the router. The "#" symbol signifies the Privileged Exec mode, which allows the user to execute privileged commands and make changes to the router's configuration.

    Rate this question:

  • 20. 

    (220) What frees the computer's attention so the user can continue working while waiting for a document to print?

    • Print queues

    • Timing devices

    • Print spooling

    • Print holding folders

    Correct Answer
    A. Print spooling
    Explanation
    Print spooling is the process that frees the computer's attention so the user can continue working while waiting for a document to print. It allows the computer to send the print job to a temporary storage area called a print spooler, which then manages the printing process in the background. This way, the user can continue with other tasks while the document is being processed and printed, improving overall productivity.

    Rate this question:

  • 21. 

    (201) What Air Force instruction series covers communications and information?

    • 30.

    • 31.

    • 32.

    • 33.

    Correct Answer
    A. 33.
    Explanation
    Air Force instruction series 33 covers communications and information.

    Rate this question:

  • 22. 

    (202) What does network security work to ensure about a network?

    • Availability, confidentiality, and data integrity

    • Availability, confidentiality, and backup of data

    • Availabilty, integrity, and backup of data

    • Confidentiality, integrity, and backup of data

    Correct Answer
    A. Availability, confidentiality, and data integrity
    Explanation
    Network security works to ensure the availability, confidentiality, and data integrity of a network. Availability refers to the network being accessible and operational for authorized users. Confidentiality ensures that sensitive information is only accessible to authorized individuals. Data integrity ensures that data remains accurate and unaltered during transmission and storage.

    Rate this question:

  • 23. 

    (203) Which of the following jobs are performed by a help desk technician on a daily basis?

    • Account unlocks, account creations, and router configuration

    • Network monitoring, account unlocks, and account creations

    • Network monitoring, account unlocks, router access lists

    • Operating system installations, account creations, and network monitoring

    Correct Answer
    A. Network monitoring, account unlocks, and account creations
    Explanation
    A help desk technician performs network monitoring on a daily basis to ensure the smooth functioning of the network and identify any issues or abnormalities. They also handle account unlocks, which involves assisting users in regaining access to their accounts after they have been locked due to various reasons such as incorrect passwords. Additionally, they are responsible for account creations, which involves setting up new user accounts and granting appropriate access privileges. These tasks are part of the regular responsibilities of a help desk technician in order to provide technical support and maintain the efficiency of the system.

    Rate this question:

  • 24. 

    (204) How many users are in a peer-to-peer network?

    • 2 to 10

    • 10 to 50

    • 50 to 250

    • 250 to 1000

    Correct Answer
    A. 2 to 10
    Explanation
    A peer-to-peer network is a decentralized network where all devices are equal and can act as both clients and servers. In such a network, the number of users can vary, but typically it ranges from 2 to 10. This limited number of users ensures efficient communication and sharing of resources among the peers.

    Rate this question:

  • 25. 

    (205) What is a measurement of data transferred through the medium between network connections?

    • Attenuation

    • Impedance

    • Throughput

    • Inductive coupling

    Correct Answer
    A. Throughput
    Explanation
    Throughput refers to the amount of data that can be transferred through a network connection within a given period of time. It measures the efficiency and speed of data transfer between devices connected in a network. A higher throughput indicates a faster and more efficient transmission of data, while a lower throughput suggests slower data transfer. Therefore, throughput is the measurement of data transferred through the medium between network connections.

    Rate this question:

  • 26. 

    (206) What type of fiber optic is designed for the local area network environment and light is typically generated with a light emitting diode?

    • Duplex

    • Half duplex

    • Multi mode

    • Single mode

    Correct Answer
    A. Multi mode
    Explanation
    Multi mode fiber optic is designed for the local area network environment and light is typically generated with a light emitting diode. Multi mode fiber optic cables have a larger core diameter compared to single mode fiber optic cables, allowing multiple modes or paths for light to travel through. This makes multi mode fiber optic suitable for short-distance communication within a local area network. The use of a light emitting diode as the light source in multi mode fiber optic is cost-effective and suitable for shorter distances.

    Rate this question:

  • 27. 

    (212) What is used to identify network nodes on a physically connected network?

    • Media access control address

    • Network server name

    • Subnet mask address

    • Node serial number

    Correct Answer
    A. Media access control address
    Explanation
    A media access control address (MAC address) is used to identify network nodes on a physically connected network. It is a unique identifier assigned to the network interface card (NIC) of each device connected to the network. The MAC address is used by the data link layer of the network protocol to ensure that data is sent to the correct destination device. It is different from the network server name, subnet mask address, and node serial number, which have different functions in networking.

    Rate this question:

  • 28. 

    (217) What type of routing involves the use of routing protocols that adjust real-time to changing network circumstances?

    • Static routing

    • Manual routing

    • Dynamic routing

    • Group source routing

    Correct Answer
    A. Dynamic routing
    Explanation
    Dynamic routing involves the use of routing protocols that adjust in real-time to changing network circumstances. Unlike static routing, which uses manually configured routes that do not adapt to network changes, dynamic routing protocols automatically exchange routing information with other routers to determine the best path for data packets. This allows for efficient and flexible routing in dynamic network environments where routes may change frequently due to factors such as network congestion, link failures, or new network connections.

    Rate this question:

  • 29. 

    (222) The measurement of traffic volume actually being carried by the network, typically expressed in kilobytes per second is

    • Network response time

    • Percentage utilization

    • Traffic congestion

    • Data throughput

    Correct Answer
    A. Data throughput
    Explanation
    Data throughput refers to the measurement of the actual amount of traffic being carried by the network in terms of kilobytes per second. It represents the rate at which data is transmitted over the network. This measurement is important in assessing the network's performance and capacity. Network response time, percentage utilization, and traffic congestion are related concepts but do not specifically measure the amount of traffic being carried by the network.

    Rate this question:

  • 30. 

    (207) What network topology consists of a single central cable to which all computers and other devices connect?

    • Star

    • Bus

    • Ring

    • Mesh

    Correct Answer
    A. Bus
    Explanation
    A network topology that consists of a single central cable to which all computers and other devices connect is called a bus topology. In this type of network, all devices are connected to a single cable, known as the bus or backbone. Data is transmitted along the bus, and each device listens for the data intended for it. If a device wants to transmit data, it sends it onto the bus, and all devices receive the data, but only the intended recipient processes it.

    Rate this question:

  • 31. 

    (214) What is a group of devices connected to the same physical media such that if two devices access the media at the same time, the result is a collision of the two signals?

    • A token domain

    • A jabber domain

    • A broadcast domain

    • A collision domain

    Correct Answer
    A. A collision domain
    Explanation
    A collision domain refers to a group of devices that are connected to the same physical media, such as an Ethernet cable. In this domain, if two devices attempt to access the media at the same time, their signals will collide and result in data loss or corruption. This can occur in Ethernet networks where devices share the same network segment. To avoid collisions, techniques like CSMA/CD (Carrier Sense Multiple Access with Collision Detection) are used to manage access to the media.

    Rate this question:

  • 32. 

    (215) Bridging loops are created when

    • There is only one path to the destination

    • There is more than one path to the destination

    • The destination is unreachable by only one path

    • The destination is unreachable by multiple paths

    Correct Answer
    A. There is more than one path to the destination
    Explanation
    Bridging loops are created when there is more than one path to the destination. This occurs when there are multiple routes or connections between two points in a network. These loops can cause packets to continuously circulate within the network, leading to broadcast storms, network congestion, and potential data loss. Spanning Tree Protocol (STP) is commonly used to prevent bridging loops by identifying and blocking redundant paths in a network, ensuring that there is only one active path to the destination.

    Rate this question:

  • 33. 

    (204) How many users are in a single-server network?

    • 2 to 10

    • 10 to 50

    • 50 to 250

    • 250 to 1000

    Correct Answer
    A. 10 to 50
    Explanation
    A single-server network typically refers to a network where all users are connected to a central server. The given answer range of 10 to 50 suggests that in a single-server network, there are typically between 10 and 50 users. This range indicates that the network is relatively small in scale, with a moderate number of users relying on the central server for their network services and resources.

    Rate this question:

  • 34. 

    (206) What type of fiber optic is used to span extremely long distances?

    • Duplex

    • Half duplex

    • Multi mode

    • Single mode

    Correct Answer
    A. Single mode
    Explanation
    Single mode fiber optic is used to span extremely long distances. This type of fiber optic has a smaller core size, allowing light to travel in a straight line, minimizing signal loss and allowing for longer distances. It is designed to carry a single mode of light, which means that only one wavelength of light is transmitted, resulting in a higher bandwidth and longer transmission distances compared to multi-mode fiber optic.

    Rate this question:

  • 35. 

    (208) What is the set of rules that define how communications are to take place in a network, including the format, timing, sequences, and error checking and correction?

    • A network operating system

    • A protocol

    • A standard

    • A baseline

    Correct Answer
    A. A protocol
    Explanation
    A protocol is a set of rules that governs how communications are conducted in a network. It specifies the format, timing, sequences, error checking, and correction methods to ensure reliable and efficient data transmission. By following a protocol, devices in a network can communicate with each other effectively and understand how to interpret and respond to data packets.

    Rate this question:

  • 36. 

    (210) Which protocol of TCP/IP is a connection oriented, reliable, host-to-host transport protocol?

    • Internet protocol

    • Transmission control protocol

    • User datagram protocol

    • Network file system

    Correct Answer
    A. Transmission control protocol
    Explanation
    The correct answer is transmission control protocol. TCP is a connection-oriented protocol that ensures reliable delivery of data between hosts in a network. It establishes a connection between the sender and receiver, breaks the data into packets, and reassembles them at the destination. TCP also provides mechanisms for flow control, error detection, and congestion control, making it a reliable transport protocol for applications that require guaranteed delivery of data.

    Rate this question:

  • 37. 

    (213) What network interface card module converts information into a coded data stream? 

    • Encode/decode

    • Frame buffering

    • Transmit/receive

    • MAC Layer processing

    Correct Answer
    A. Encode/decode
    Explanation
    The network interface card module that converts information into a coded data stream is the encode/decode module. This module is responsible for encoding the data into a format that can be transmitted over the network, and decoding the received data back into its original form.

    Rate this question:

  • 38. 

    (216) What is a logical grouping of end stations, independent of physical location, with a common set of requirements called?

    • Framed local area network

    • Logical local area network

    • Private local area network

    • Virtual local area network

    Correct Answer
    A. Virtual local area network
    Explanation
    A virtual local area network (VLAN) is a logical grouping of end stations, independent of physical location, with a common set of requirements. It allows for the segmentation of a network into multiple virtual networks, enabling better control and management of network traffic. VLANs provide increased security, flexibility, and scalability by allowing different groups of devices to be logically grouped together, even if they are physically dispersed across the network. This ensures that devices within the same VLAN can communicate with each other efficiently and securely, while also restricting communication with devices in other VLANs.

    Rate this question:

  • 39. 

    (202) Performance management can be broken into which two separate functional categories?

    • Monitoring and tuning

    • Baselining and tuning

    • Baselining and monitoring

    • Inspecting and monitoring

    Correct Answer
    A. Monitoring and tuning
    Explanation
    Performance management involves the process of monitoring and optimizing the performance of a system or process. Monitoring refers to the continuous tracking and measurement of performance metrics to identify any issues or deviations from desired performance levels. Tuning, on the other hand, involves making adjustments and optimizations to improve the performance based on the insights gained from monitoring. Therefore, monitoring and tuning are the two separate functional categories of performance management.

    Rate this question:

  • 40. 

    (214) The purpose of a network repeater is that it?

    • Amplifies the network signal

    • Regenerates any signal received

    • Amplifies and routes the signal

    • Internally routes the signal

    Correct Answer
    A. Regenerates any signal received
    Explanation
    A network repeater is a device that regenerates any signal it receives. This means that it takes in a weak or degraded signal and reproduces it at its original strength. By doing so, the repeater helps to extend the range of the network and improve the quality of the signal. Unlike amplifiers, which simply amplify the signal, repeaters actively regenerate and reproduce the signal, making it clearer and stronger for transmission.

    Rate this question:

  • 41. 

    (219) What filters network traffic by controlling whether routed packets are forwarded or blocked at a router's interface?

    • Password filters

    • User passwords

    • Router protocols

    • Access control lists

    Correct Answer
    A. Access control lists
    Explanation
    Access control lists (ACLs) are used to filter network traffic by controlling whether routed packets are forwarded or blocked at a router's interface. ACLs can be configured to allow or deny specific types of traffic based on criteria such as source/destination IP addresses, protocols, ports, or other parameters. By implementing ACLs, network administrators can enforce security policies and restrict access to certain resources or services, enhancing network security and controlling the flow of traffic within the network.

    Rate this question:

  • 42. 

    (219) What is the range of numbers that represent standard access lists?

    • 1-40

    • 1-99

    • 50-99

    • 100-199

    Correct Answer
    A. 1-99
    Explanation
    Standard access lists use numbers ranging from 1 to 99 to represent the range of numbers that can be used. These access lists are used to filter traffic based on source IP addresses only. They are generally used to block or permit specific traffic from entering or leaving a network. The range of 1-99 allows for a wide range of access list numbers to be used for different filtering purposes.

    Rate this question:

  • 43. 

    (209) What protocol is used by the IEEE 802.3 standard to avoid collisions on the network?

    • User data protocol

    • Network file system

    • Transmission control protocol/internet protocol TCP/IP

    • Carrier sense multiple access/collision detection CSMA/CD

    Correct Answer
    A. Carrier sense multiple access/collision detection CSMA/CD
    Explanation
    The correct answer is carrier sense multiple access/collision detection (CSMA/CD). CSMA/CD is a protocol used by the IEEE 802.3 standard to avoid collisions on the network. It works by having devices on the network listen for traffic before transmitting data. If a device detects that the network is busy, it waits for a random amount of time before attempting to transmit again. This helps to prevent collisions and ensures that data is transmitted smoothly on the network.

    Rate this question:

  • 44. 

    (209) What Xseries protocol is a message handling system (MHS) standard, that defines the syructure of a store-and-forward e-mail message handling system?

    • X.25

    • X.50

    • X.400

    • X.500

    Correct Answer
    A. X.400
    Explanation
    X.400 is the correct answer because it is a protocol that defines the structure of a store-and-forward e-mail message handling system. X.400 is a message handling system (MHS) standard that provides a framework for the exchange of electronic mail between different computer systems. It specifies how messages are formatted, addressed, and delivered in a store-and-forward manner, allowing for reliable communication across different networks and systems. X.400 is widely used in enterprise email systems and provides features such as message encryption, message tracking, and delivery status notifications.

    Rate this question:

  • 45. 

    (214) What network condition usually begins slowly and (if not stopped) gradually grows in severity until all traffic flow on the network is effectively stopped?

    • Jabber

    • Hub port noise

    • Broadcast storm

    • Random squitter

    Correct Answer
    A. Broadcast storm
    Explanation
    A broadcast storm is a network condition where there is a high volume of broadcast or multicast traffic that floods the network. This excessive traffic can overwhelm network resources, causing congestion and slowing down the network. If not stopped, the severity of the broadcast storm increases over time, eventually leading to a complete halt in the flow of all traffic on the network.

    Rate this question:

  • 46. 

    (215) What is used to logically eliminate loops within a network?

    • Internet protocol

    • Transmission control protocol

    • Router intranet protocol

    • Spanning tree algorithm

    Correct Answer
    A. Spanning tree algorithm
    Explanation
    The spanning tree algorithm is used to logically eliminate loops within a network. This algorithm ensures that there is only one path between any two nodes in the network, preventing the formation of loops that can cause network congestion and data loss. By selecting a root node and creating a tree-like structure, the spanning tree algorithm determines the most efficient and loop-free paths for data transmission within the network.

    Rate this question:

  • 47. 

    (217) What prevents a router from sending route information back to the router from which it came? 

    • Hold downs

    • Split horizons

    • Poison reverse

    • Excess transfer

    Correct Answer
    A. Split horizons
    Explanation
    Split horizons is a technique used in computer networking to prevent a router from sending route information back to the router from which it came. This technique is implemented by the router to avoid routing loops, where packets continuously loop between routers without reaching their destination. Split horizons involves the router not advertising a route back to the router it received the route from, effectively preventing the loop from occurring. By not advertising the route back, the router ensures that the route information does not get sent back to the same router, thus preventing routing loops.

    Rate this question:

  • 48. 

    (218) What are the network connections through which network traffic enters and exits a router called?

    • Interfaces

    • Serial interface

    • Switching ports

    • Console and auxillary ports

    Correct Answer
    A. Interfaces
    Explanation
    The network connections through which network traffic enters and exits a router are called interfaces. These interfaces allow the router to connect to different networks and exchange data. Serial interfaces are used for connecting to wide area networks, while switching ports are used for connecting to local area networks. Console and auxiliary ports are used for management and troubleshooting purposes. However, the most general and inclusive term for these connections is interfaces.

    Rate this question:

  • 49. 

    (202) What Air Force Instruction sets the policies that unit client support administrators must comply with? 

    • 33-115

    • 33-116

    • 33-202

    • 33-204

    Correct Answer
    A. 33-115
    Explanation
    Air Force Instruction 33-115 sets the policies that unit client support administrators must comply with.

    Rate this question:

Quiz Review Timeline (Updated): Mar 17, 2023 +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 17, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Sep 02, 2009
    Quiz Created by
    72jmpmaster
Back to Top Back to top
Advertisement
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.