3C051 CDC Volume 3

85 Questions | Total Attempts: 687

SettingsSettingsSettings
CDC Quizzes & Trivia

CDC 3C051 provides you with the general knowledge you'll need for understanding and performing duties in the 3c051 AFSC.


Questions and Answers
  • 1. 
    What is defined as a bundle of application software designed to significantly improve network efficiency and productivity?
    • A. 

      Fault management server

    • B. 

      Security management server

    • C. 

      Network management server

    • D. 

      Performance management server

  • 2. 
    What are the 3 most common network management architectures?
    • A. 

      Cetralized, Hierarchical, and distributed

    • B. 

      Cetralized, Hierarchical, and Hybrid

    • C. 

      Hybrid, Hierarchical, and distributed

    • D. 

      Centralized, hybrid, and distributed

  • 3. 
    What network management architecture has an NM platform on one computer system at a location that is responsible for all NM duties?
    • A. 

      Centralized

    • B. 

      Distributed

    • C. 

      Hierarchical

    • D. 

      Hybrid

  • 4. 
    What network management architecture uses multiple systems, with one system acting as the central server and the others working as clients?
    • A. 

      Centralized

    • B. 

      Distributed

    • C. 

      Hierarchical

    • D. 

      Hybrid

  • 5. 
    At what level of network management activity are you working when you, as the network manager, are monitoring and troubleshooting components to eliminate the side effect alarms and isolate problems to a root cause?
    • A. 

      Inactive

    • B. 

      Reactive

    • C. 

      Proactive

    • D. 

      Interactive

  • 6. 
    At what level of network management activity are you working when the automated monitoring of components provides problem analysis, giving a root cause alarm for the problem at hand? 
    • A. 

      Inactive

    • B. 

      Reactive

    • C. 

      Proactive

    • D. 

      Interactive

  • 7. 
    Gathering information about current network device settings is a step of what functional network management area?
    • A. 

      Configuration Management

    • B. 

      Performance Management

    • C. 

      Accounting Management

    • D. 

      Security management

  • 8. 
    What are the two functional categories of performance management?
    • A. 

      Monitoring and analyzing

    • B. 

      Monitoring and replacing

    • C. 

      Monitoring and tuning

    • D. 

      Analyzing and tuning

  • 9. 
    Which functional category of performance management tracks historical data by tracking activities on a network?
    • A. 

      Tuning

    • B. 

      Analyzing

    • C. 

      Gathering

    • D. 

      Monitoring

  • 10. 
    What network management area is concerned with controlling access points to information?
    • A. 

      Configuration management

    • B. 

      Performance management

    • C. 

      Accounting management

    • D. 

      Security management

  • 11. 
    What is established to distinguish between errors that fall within a normal range and excessive errors because of a fault?
    • A. 

      Fault Parameters

    • B. 

      Tolerence Paramenters

    • C. 

      Low-level software alarms

    • D. 

      Low-level hardware alarms

  • 12. 
    Network  management protocols are designed (in most cases) to reside above what layer of the OSI model?
    • A. 

      Sesion

    • B. 

      Transport

    • C. 

      Presentation

    • D. 

      Application

  • 13. 
    What is a hierarchical, structured format that defines the network management information available from network devices? 
    • A. 

      Network device map

    • B. 

      Network protocol list

    • C. 

      Object identifier

    • D. 

      Management information base

  • 14. 
    Which category of simple network management protocol node is responsible for monitoring, collecting, and reporting managementdata to the management system?
    • A. 

      Primary domain controller

    • B. 

      Backup domain controller

    • C. 

      Manager

    • D. 

      Agent

  • 15. 
    What SNMP operational message retrieves the value of one instance of management information?
    • A. 

      Get

    • B. 

      Set

    • C. 

      Trap

    • D. 

      GetNext

  • 16. 
    What type of simple network management protocol node is resposible to authenticate logons for clients by validating the supplied user name and password against the account in the database?
    • A. 

      Network management controller

    • B. 

      Stand-alone servers

    • C. 

      Domain controllers

    • D. 

      Member servers

  • 17. 
    In the event that a domain controller is no longer functioning, what action is taken to make another DC take over responsibility?
    • A. 

      No action is required

    • B. 

      The spare is promoted to the DC position

    • C. 

      The logical name of the backup DC is changed to the logical name of the primary DC

    • D. 

      The IP address of the backup DC is is changed to the IP address of the primary DC

  • 18. 
    What type of network server is dedicated to an intensive application or database?
    • A. 

      Network management controller

    • B. 

      Domain controller

    • C. 

      Stand-alone server

    • D. 

      Member server

  • 19. 
    What protocol is usedprimarily to obtain connectivity to the large base of Novell Netware clients?
    • A. 

      Data link control protocol

    • B. 

      Network basic input/output system extended user interface

    • C. 

      Transfer control protocol/internet protocol

    • D. 

      Internetwork packet exchange/sequenced packet exchange

  • 20. 
    What network protocol is used for network connection to Hewlett Packard network printers?
    • A. 

      Data link protocol

    • B. 

      Network basic input output system extended user interface

    • C. 

      Transfer control protocol/internet protocol

    • D. 

      Internetwork packet exchange/sequenced packet exchange

  • 21. 
    Why are users required to change their passwords upon logging into the network for the first time?
    • A. 

      To ensure users don't create vulnerability by leaving the default password in place

    • B. 

      To ensure users understand how to create a password

    • C. 

      To ensure the integrity of each user's unique password

    • D. 

      To ensure user's remember their unique password

  • 22. 
    For user accounts with elevated privileges, such as a client support administrator, what are the correct number and type of characters needed for the account password?
    • A. 

      Minimum of nine characters consisting of at least 2 upper and lowercase letters and numbers

    • B. 

      Minimum of nine characters consisting of at least 2 upper and lowercase letters and numbers and 2 special characters

    • C. 

      Minimum of 15 characters consisting of least 2 upper and lowercase letters

    • D. 

      Minimum of 15 characters consisting of least 2 upper and lowercase letters and 2 special characters

  • 23. 
    Which group scope allows member permissions to be assigned in any domain or forest?
    • A. 

      Local

    • B. 

      Global

    • C. 

      Universal

    • D. 

      Domain local

  • 24. 
    What defines the rules by which operations can be performed on a particular resource?
    • A. 

      Rights

    • B. 

      Permissions

    • C. 

      Access control lists

    • D. 

      Hardware configuration

  • 25. 
    What is used to verify the level of availability an individual has to the resource?
    • A. 

      Rights

    • B. 

      Permissions

    • C. 

      Access control lists

    • D. 

      Hardware configuration

Back to Top Back to top