3C051 Set 2 Volume 2 Practice Test

Reviewed by Editorial Team
The ProProfs editorial team is comprised of experienced subject matter experts. They've collectively created over 10,000 quizzes and lessons, serving over 100 million users. Our team includes in-house content moderators and subject matter experts, as well as a global network of rigorously trained contributors. All adhere to our comprehensive editorial guidelines, ensuring the delivery of high-quality content.
Learn about Our Editorial Process
| By A1cbecker
A
A1cbecker
Community Contributor
Quizzes Created: 3 | Total Attempts: 1,176
| Attempts: 380
SettingsSettings
Please wait...
  • 1/126 Questions

    What is one of the most important communication skills you can develop as a help desk operator?

    • Speaking
    • Writing
    • Listening
    • Briefing
Please wait...
Air Force Quizzes & Trivia
About This Quiz

URE/Short Answer questions from the 2nd volume of the 3C051 CDCs. . .


Quiz Preview

  • 2. 

    Within the NCC, what function is intially responsible for taking trouble calls, deciding what type of problem has occured, and what to do about the problem?

    • Help Desk

    • Network management

    • Specific area of support

    • Information protection operations

    Correct Answer
    A. Help Desk
    Explanation
    The help desk is initially responsible for taking trouble calls, deciding what type of problem has occurred, and determining the appropriate course of action to resolve the issue. They serve as the first point of contact for users experiencing technical difficulties and are trained to troubleshoot and provide solutions or escalate the problem to the appropriate team for further assistance. The help desk plays a crucial role in ensuring efficient and effective problem resolution within the NCC.

    Rate this question:

  • 3. 

    What software is used to open trouble tickets for customer trouble calls?

    • Microsoft Access

    • Remedy

    • The C+ database

    • Filit

    Correct Answer
    A. Remedy
    Explanation
    Remedy is the software used to open trouble tickets for customer trouble calls. It is a widely used ticketing system that allows customer support teams to efficiently track and manage customer issues. Remedy provides a centralized platform for logging, prioritizing, and resolving customer complaints or inquiries. It helps streamline the troubleshooting process and ensures that customer problems are addressed in a timely manner. Microsoft Access, The C+ database, and Filit are not specifically designed for ticket management and are not commonly used for this purpose.

    Rate this question:

  • 4. 

    What type of network is made up of components from the same vendor or compatible equipment that all run under the same operating system or network operating system?

    • Internetwork

    • Intranetwork

    • Homogeneous network

    • Heterogeneous network

    Correct Answer
    A. Homogeneous network
    Explanation
    A homogeneous network is made up of components from the same vendor or compatible equipment that all run under the same operating system or network operating system. This means that all the devices and equipment in the network are from the same manufacturer or are compatible with each other, creating a seamless and integrated network environment. This type of network can be easier to manage and troubleshoot since all the components are designed to work together.

    Rate this question:

  • 5. 

    Which of the following categories of twisted-pair cable has the highest throughput?

    • Cat 2

    • Cat 3

    • Cat 4

    • Cat 5

    Correct Answer
    A. Cat 5
    Explanation
    Cat 5 twisted-pair cable has the highest throughput compared to Cat 2, Cat 3, and Cat 4. This is because Cat 5 cable has a higher bandwidth capacity and can support higher data transfer rates. Cat 5 cable is capable of transmitting data at speeds up to 1000 Mbps, making it suitable for high-speed internet connections and network applications that require fast data transmission.

    Rate this question:

  • 6. 

    A fiber optic network uses a laser or light-emitting diode to send a signal through what portion of the cable?

    • Core

    • Buffer

    • Kevlar

    • Cladding

    Correct Answer
    A. Core
    Explanation
    A fiber optic network uses a laser or light-emitting diode to send a signal through the core of the cable. The core is the innermost part of the cable and is responsible for carrying the light signal. The buffer is a protective layer around the core, the kevlar provides strength and protection, and the cladding is a reflective layer that helps keep the light signal within the core. However, it is the core that actually carries the signal.

    Rate this question:

  • 7. 

    Why can a token ring network cover a greater distance than a token bus network without loss of signal

    • Because they can use wire centers

    • Because each workstation repeats the signal

    • Because they reequire significantly more cable

    • Because each workstation creates less signal distortion

    Correct Answer
    A. Because each workstation repeats the signal
    Explanation
    In a token ring network, each workstation repeats the signal, which allows the signal to travel further without loss. This means that the signal is strengthened and refreshed at each workstation, preventing signal degradation over longer distances. In contrast, a token bus network does not have this feature, so the signal may weaken and distort as it travels along the network, resulting in a loss of signal quality. Therefore, the ability of each workstation to repeat the signal in a token ring network enables it to cover a greater distance without signal loss.

    Rate this question:

  • 8. 

    Which of the following are jobs performed by a help desk technician on a daily basis?

    • Account unlocks, account creations, and router reconfiguration

    • Network Monitoring, accounts unlocks, and account creations

    • Network monitoring, account unlocks, router access lists

    • Operation system installations, account creations, and network minitoring

    Correct Answer
    A. Network Monitoring, accounts unlocks, and account creations
    Explanation
    A help desk technician performs the job of network monitoring to ensure the smooth functioning of the network and identify any issues or abnormalities. They also handle account unlocks, which involves resetting passwords or unlocking user accounts that may be locked due to incorrect login attempts. Additionally, they are responsible for account creations, which involves setting up new user accounts or granting access to new employees. These tasks are part of the daily routine of a help desk technician to ensure the efficient operation of the network and provide support to users.

    Rate this question:

  • 9. 

    What type of communications network serves users within a confined geographical areas?

    • Local area network

    • Metropolitan area network

    • Wide area network

    • Enterprise network

    Correct Answer
    A. Local area network
    Explanation
    A local area network (LAN) is a type of communications network that serves users within a confined geographical area. It is typically used within a single building or a group of nearby buildings, such as a home, office, or school. LANs are designed to provide fast and reliable communication between devices, such as computers, printers, and servers, within the local area. They are commonly used for sharing resources, such as files and printers, and for enabling communication and collaboration between users.

    Rate this question:

  • 10. 

    What is a set of systems nodes on a local segment that can be off of a switch or a router?

    • Internetwork

    • Intranetwork

    • Homogeneous network

    • Heterogeneous network

    Correct Answer
    A. Intranetwork
    Explanation
    An intranetwork refers to a set of system nodes on a local segment that can be connected to either a switch or a router. It is a private network that is limited to a specific organization or company and is used for internal communication and data sharing. Unlike an internetwork, which refers to the connection of multiple networks, an intranetwork focuses on the internal connectivity within a single network.

    Rate this question:

  • 11. 

    What is the greatest risk to a bus network

    • The bus network server

    • Security is easily breached

    • The bus itself becoming inoperable

    • The middle node connected to the bus

    Correct Answer
    A. The bus itself becoming inoperable
    Explanation
    The greatest risk to a bus network is the bus itself becoming inoperable. This means that if the bus, which serves as the main communication pathway for devices connected to the network, stops functioning, the entire network will be affected. This can lead to a disruption in communication and data transfer between devices, resulting in a loss of productivity and efficiency. It is crucial to ensure the proper maintenance and functioning of the bus to prevent such risks.

    Rate this question:

  • 12. 

    What communications device converts binary electrical signals into acoustic signals for transmission over telephone lines?

    • Hub

    • Switch

    • Modem

    • Route

    Correct Answer
    A. Modem
    Explanation
    A modem is a communications device that converts binary electrical signals into acoustic signals for transmission over telephone lines. This allows for the transmission of data over traditional telephone networks. Modems are commonly used to connect computers to the internet via dial-up connections, where the binary data is converted into sound waves that can be transmitted over the telephone lines. Once the acoustic signals reach their destination, another modem converts them back into binary electrical signals that can be understood by the receiving device.

    Rate this question:

  • 13. 

    What server is set aside to perform a specific task or function all the time?

    • File server

    • Network server

    • Dedicated server

    • Nondedicated server

    Correct Answer
    A. Dedicated server
    Explanation
    A dedicated server is set aside specifically to perform a specific task or function all the time. Unlike other types of servers, such as file servers or network servers, a dedicated server is solely dedicated to one purpose and is not shared with other tasks or functions. This ensures that the server has all the resources and processing power necessary to efficiently perform its designated task without any interruptions or conflicts.

    Rate this question:

  • 14. 

    What type of network environments consist of of computer systems from different vendors that run different operation systems and communication protocols?

    • Internetwork

    • Intranetwork

    • Homogeneous network

    • Heterogeneous network

    Correct Answer
    A. Heterogeneous network
    Explanation
    A heterogeneous network refers to a network environment where computer systems from different vendors are connected, running different operating systems and communication protocols. In this type of network, there is a mix of hardware and software components that may not be compatible or interoperable. This can pose challenges in terms of system integration, data sharing, and communication between different systems.

    Rate this question:

  • 15. 

    A feature which involves the periodic insertion of points into data from which any recovery necessary can be started is known as what?

    • Checkpointing

    • Data transfers

    • Formatting function

    • Error recognition and recovery

    Correct Answer
    A. Checkpointing
    Explanation
    Checkpointing is a feature that involves the periodic insertion of points into data from which any recovery necessary can be started. It is a technique used in computing systems to ensure fault tolerance and recovery. By creating checkpoints at regular intervals, the system can save the current state of the data and use it as a starting point for recovery in case of failures or errors. This allows for efficient and reliable error recognition and recovery, making checkpointing the correct answer for this question.

    Rate this question:

  • 16. 

    What is a group of devices connected to the same physical media such that if two devices access the media at the same time, the result is a collision of the two signals?

    • A token domain

    • A jabber domain

    • A broadcast storm

    • A collision domain

    Correct Answer
    A. A collision domain
    Explanation
    A collision domain refers to a group of devices that are connected to the same physical media, such as an Ethernet cable or a hub. In this domain, if two devices attempt to access the media simultaneously, their signals will collide and result in data loss or corruption. This is because only one device can transmit data at a time within the collision domain.

    Rate this question:

  • 17. 

    The purpose of a network repeater is that it?

    • Amplifies the network signal

    • Regenerates any signal received

    • Amplifies and routes the signal

    • Internally routes the signal

    Correct Answer
    A. Regenerates any signal received
    Explanation
    A network repeater is used to regenerate any signal it receives. This means that it takes in a weak or degraded signal and restores it to its original strength and quality before transmitting it to the next device in the network. Unlike an amplifier, which only increases the strength of a signal, a repeater also cleans up and regenerates the signal, ensuring that it is clear and reliable. By regenerating the signal, a repeater helps to extend the range and improve the performance of a network.

    Rate this question:

  • 18. 

    What organization does communication and information services entering and exiting the base or site fall under the operational control of?

    • Base Security Services Information Assurance Office

    • Base Computer Security control office

    • Base Network Control Center

    • Base Command Post

    Correct Answer
    A. Base Network Control Center
    Explanation
    The correct answer is the Base Network Control Center. This organization is responsible for managing and controlling the communication and information services entering and exiting the base or site. They ensure that the network is secure and properly functioning, and they have operational control over the communication and information services within the base.

    Rate this question:

  • 19. 

    Performance management can be broken into which two separate functional categories?

    • Monitoring and tuning

    • Baselining and tuning

    • Baselining and monitoring

    • Inspecting and monitoring

    Correct Answer
    A. Monitoring and tuning
    Explanation
    Performance management involves monitoring and optimizing the performance of systems or processes. Monitoring refers to the continuous collection and analysis of performance data to identify any issues or areas for improvement. Tuning, on the other hand, involves making adjustments or optimizations based on the insights gained from monitoring. Therefore, the correct answer is "Monitoring and tuning."

    Rate this question:

  • 20. 

    What is a measurement of data transferred through the medium between network connections

    • Attenuation

    • Impedance

    • Throughput

    • Inductive coupling

    Correct Answer
    A. Throughput
    Explanation
    Throughput is a measurement of the amount of data that can be transferred through a network connection within a given time period. It represents the actual data transfer rate and is often measured in bits per second (bps) or bytes per second (Bps). Throughput is influenced by factors such as network congestion, latency, and the capacity of the network connection. It is an important metric in evaluating the performance and efficiency of a network connection.

    Rate this question:

  • 21. 

    What type of routing involves the use of routing protocols that adjust real-time to changing network circumstances?

    • Static routing

    • Manual routing

    • Dynamic routing

    • Group source routing

    Correct Answer
    A. Dynamic routing
    Explanation
    Dynamic routing involves the use of routing protocols that adjust in real-time to changing network circumstances. Unlike static routing, which requires manual configuration of routes, dynamic routing protocols automatically update and adapt to changes in the network topology. This allows for more efficient and flexible routing, as the protocols can dynamically select the best path for data transmission based on factors such as network congestion, link failures, or changes in network traffic. Therefore, dynamic routing is the correct answer in this case.

    Rate this question:

  • 22. 

    What prompt is displayed when in Privileged Exec mode on a routeR?

    • Router#

    • Router/

    • Router>

    • Router:

    Correct Answer
    A. Router#
    Explanation
    When in Privileged Exec mode on a router, the prompt displayed is "Router#". This prompt indicates that the user has administrative privileges and can execute privileged commands on the router. The "#" symbol signifies that the user is in Privileged Exec mode, which allows them to configure and manage the router's settings and functions.

    Rate this question:

  • 23. 

    What is the distorting and or weakening of a signal as it traverses the media called?

    • Attentuation

    • Impedance

    • Throughput

    • Inductive cabling

    Correct Answer
    A. Attentuation
    Explanation
    Attenuation refers to the distortion and weakening of a signal as it travels through a medium. This can occur due to various factors such as distance, interference, or impedance mismatches. Attenuation is a common phenomenon in communication systems and can result in a loss of signal strength, degradation of signal quality, or reduced throughput. It is important to consider attenuation when designing and implementing communication networks to ensure reliable and efficient signal transmission.

    Rate this question:

  • 24. 

    How many users are in a peer-to-peer network?

    • 2-10

    • 10-50

    • 50-250

    • 250-1000

    Correct Answer
    A. 2-10
    Explanation
    A peer-to-peer network is a decentralized network where all devices or nodes are considered equal and can act as both clients and servers. In such a network, the number of users typically ranges from 2 to 10. This range is common for small-scale peer-to-peer networks where a limited number of devices are connected and sharing resources or files among themselves.

    Rate this question:

  • 25. 

    What type of communications network links geographically dispersed offices in other cities or around the globe?

    • Local area network

    • Metropolitan area network

    • Wide area network

    • Enterprise network

    Correct Answer
    A. Wide area network
    Explanation
    A wide area network (WAN) is a type of communications network that connects geographically dispersed offices in other cities or around the globe. Unlike local area networks (LANs) and metropolitan area networks (MANs), which are limited to a specific geographic area, WANs cover larger areas and allow for long-distance communication. An enterprise network refers to a network within a single organization, so it is not the correct answer for linking dispersed offices. Therefore, the correct answer is wide area network.

    Rate this question:

  • 26. 

    What is used to logically eliminate loops within a network?

    • Internet Protocol

    • Transmission Control Protocol

    • Router Intranet Protocol

    • Spanning Tree Algorithm

    Correct Answer
    A. Spanning Tree Algorithm
    Explanation
    A spanning tree algorithm is used to logically eliminate loops within a network. This algorithm helps in creating a tree-like structure within the network by selecting a root node and then determining the shortest path from the root to each other node. By doing so, it ensures that there are no loops or redundant paths in the network, which can cause issues such as broadcast storms or excessive network traffic. Therefore, the spanning tree algorithm is an effective solution for eliminating loops and ensuring efficient network communication.

    Rate this question:

  • 27. 

    What is the range of numbers that represent standard access lists?

    • 1-40

    • 1-99

    • 50-99

    • 100-199

    Correct Answer
    A. 1-99
    Explanation
    Standard access lists use numbers ranging from 1 to 99 to represent the range of numbers. These numbers are used to identify the access list when configuring it on a router or switch. Standard access lists are typically used to filter traffic based on the source IP address only.

    Rate this question:

  • 28. 

    What Air Force Instruction sets the policies that unit client support administrators must comply with?

    • 33-115

    • 33-116

    • 33-202

    • 33-204

    Correct Answer
    A. 33-115
    Explanation
    Air Force Instruction 33-115 sets the policies that unit client support administrators must comply with.

    Rate this question:

  • 29. 

    What does Network Security work to ensure about a network?

    • Availability, confidentiality, and integrity of data

    • Availability, confidentiality, and backup of data

    • Availability, integrity, and backup of data

    • Confidentiality, intergrity, and backup of data

    Correct Answer
    A. Availability, confidentiality, and integrity of data
    Explanation
    Network security works to ensure the availability, confidentiality, and integrity of data. This means that the network is protected against unauthorized access or disruptions, the data is kept confidential and only accessible to authorized users, and the data is accurate and not tampered with.

    Rate this question:

  • 30. 

    What protocol is used by the IEEE 802.3 standard to avoid collisions on the network?

    • User data protocol

    • Network file system

    • Transmission control protocol internet protocol

    • Carrier Sense Multiple Access Collision Detection

    Correct Answer
    A. Carrier Sense Multiple Access Collision Detection
    Explanation
    Carrier Sense Multiple Access Collision Detection (CSMA/CD) is the protocol used by the IEEE 802.3 standard to avoid collisions on the network. This protocol allows devices on the network to listen and check if the network is currently being used by another device before transmitting data. If the network is clear, the device can send data. However, if multiple devices attempt to transmit at the same time and a collision occurs, CSMA/CD detects the collision and initiates a backoff algorithm, causing the devices to wait for a random amount of time before retransmitting. This helps to prevent further collisions and ensures efficient and reliable data transmission on the network.

    Rate this question:

  • 31. 

    What is a set of rules that define how communications are to take place in a network. Including the format, timing, sequences, and error checking and correction?

    • A network operating system

    • A protocol

    • A standard

    • A baseline

    Correct Answer
    A. A protocol
    Explanation
    A protocol is a set of rules that define how communications are to take place in a network. It includes specifications for the format, timing, sequences, and error checking and correction. Protocols ensure that devices on a network can communicate effectively and reliably by providing a common language and set of procedures for transmitting and receiving data. They establish the rules for how data is packaged, transmitted, and received, ensuring that information is sent and received accurately and efficiently.

    Rate this question:

  • 32. 

    What is used to identify network nodes on a physically connected network?

    • Media Access control address

    • Network server name

    • Subnet mask address

    • Node serial number

    Correct Answer
    A. Media Access control address
    Explanation
    A Media Access Control (MAC) address is used to identify network nodes on a physically connected network. The MAC address is a unique identifier assigned to the network interface card (NIC) of each device connected to the network. It is used at the data link layer of the OSI model to ensure that data is sent to the correct device on the network. The MAC address is typically a 48-bit hexadecimal number and is hard-coded into the NIC.

    Rate this question:

  • 33. 

    The bridge in a network with the highest priority (the lowest number) is called the

    • Main

    • Base

    • Root

    • Master

    Correct Answer
    A. Root
    Explanation
    In a network, the bridge with the highest priority, which is represented by the lowest number, is called the "Root" bridge. The Root bridge is responsible for determining the shortest path for data transmission within the network. It acts as the central point and all other bridges in the network are connected to it. The Root bridge plays a crucial role in maintaining the overall stability and efficiency of the network by controlling the flow of data.

    Rate this question:

  • 34. 

    What acts as a translator between two workstations or networks that use different operating systems, communication protocols, and data format structures?

    • Switch

    • Bridge

    • Router

    • Gateway

    Correct Answer
    A. Gateway
    Explanation
    A gateway acts as a translator between two workstations or networks that use different operating systems, communication protocols, and data format structures. It enables communication and data transfer between these networks by converting the data and protocols from one format to another. This allows seamless communication and interoperability between different systems and networks.

    Rate this question:

  • 35. 

    What is required due to the differences between the physical speed of the print device and the processing speed of the workstation generating the print job?

    • File server

    • Print queues

    • Timing devices

    • Multi processor servers

    Correct Answer
    A. Print queues
    Explanation
    Print queues are required due to the differences between the physical speed of the print device and the processing speed of the workstation generating the print job. Print queues allow the print jobs to be stored temporarily until the print device is ready to process them. This helps to prevent the print device from being overwhelmed with too many print jobs at once and ensures that the print jobs are processed in a timely manner.

    Rate this question:

  • 36. 

    What Air Force instruction series covers communications and information?

    • 30

    • 31

    • 32

    • 33

    Correct Answer
    A. 33
    Explanation
    Air Force instruction series 33 covers communications and information.

    Rate this question:

  • 37. 

    Light signals in fiber optic cables can travel distances in excess of how many miles before they need to be boosted?

    • 25

    • 50

    • 100

    • 125

    Correct Answer
    A. 100
    Explanation
    Light signals in fiber optic cables can travel distances in excess of 100 miles before they need to be boosted. This is because fiber optic cables use total internal reflection to transmit light signals, which minimizes signal loss and allows for long-distance transmission without the need for boosting the signal.

    Rate this question:

  • 38. 

    What type of optic fiber is used to span extremely long distances

    • Duplex

    • Half duplex

    • Multi mode

    • Single mode

    Correct Answer
    A. Single mode
    Explanation
    Single mode optic fiber is used to span extremely long distances because it has a smaller core diameter compared to multi mode fiber. This allows for a single pathway for the light to travel through, reducing the amount of dispersion and scattering that occurs over long distances. The smaller core also allows for higher transmission speeds and less signal loss, making it ideal for long-distance communication.

    Rate this question:

  • 39. 

    What is the major DoD contribution to networking?

    • The Ada programming language

    • The Filer Transfer Protocol Untility

    • The Open Systems Interconnection Reference Model

    • The Transmission Control Protocol Internet Protocol Suite

    Correct Answer
    A. The Transmission Control Protocol Internet Protocol Suite
    Explanation
    The major DoD contribution to networking is the Transmission Control Protocol Internet Protocol Suite. This suite is a set of protocols that allows for the transmission of data over networks. It includes protocols such as TCP, which ensures reliable delivery of data, and IP, which handles the routing of data packets. The TCP/IP suite is widely used in computer networks, including the internet, and has become the de facto standard for networking.

    Rate this question:

  • 40. 

    What network condition usually begins slowly and (if not stopped) gradually grows in severity until all traffic flow on the network is effectivley stopped?

    • Jabber

    • Hub port noise

    • Broadcast storm

    • Random Squitter

    Correct Answer
    A. Broadcast storm
    Explanation
    A broadcast storm is a network condition where there is an excessive amount of broadcast or multicast traffic, overwhelming the network's capacity. This can happen when a device on the network continuously sends out broadcast messages, causing other devices to respond with more broadcasts, creating a loop of excessive traffic. As the storm grows in severity, it consumes all available bandwidth, resulting in a complete halt of all network traffic.

    Rate this question:

  • 41. 

    What Air Force publication establishes policy on how C4 systems are acquired, operated, and maintained?

    • AFPD 33-1

    • AFPD 33-2

    • AFI 33-202

    • AF 33-204

    Correct Answer
    A. AFPD 33-1
    Explanation
    AFPD 33-1 is the correct answer because it is the Air Force publication that establishes policy on how C4 systems are acquired, operated, and maintained. This publication provides guidance and direction for the acquisition, operation, and maintenance of C4 systems within the Air Force. It outlines the policies and procedures that must be followed to ensure the effective and efficient use of C4 systems in support of Air Force missions.

    Rate this question:

  • 42. 

    How many users are in a single-server network?

    • 2-10

    • 10-50

    • 50-250

    • 250-1000

    Correct Answer
    A. 10-50
    Explanation
    In a single-server network, the number of users can range from 10 to 50. This means that there can be a minimum of 10 users and a maximum of 50 users in this type of network configuration.

    Rate this question:

  • 43. 

    What is a form of communication that transmits information as a serial stream of bits or bytes?

    • Asynchronous communication

    • Synchronous communication

    • Half-duplex communication

    • Duplex communication

    Correct Answer
    A. Asynchronous communication
    Explanation
    Asynchronous communication is a form of communication that transmits information as a serial stream of bits or bytes. In asynchronous communication, data is transmitted one bit at a time, with each bit being accompanied by start and stop bits to indicate the beginning and end of a data unit. This type of communication is commonly used in computer networks and telecommunications systems, where it allows for efficient and reliable transmission of data over long distances. Unlike synchronous communication, which transmits data in a continuous stream without start and stop bits, asynchronous communication is more flexible and can handle variations in timing between the sender and receiver.

    Rate this question:

  • 44. 

    What command is used to restrict access to Privileged Exec mode?

    • Password

    • Enable Password

    • Console Password

    • Virtual terminal password.

    Correct Answer
    A. Enable Password
    Explanation
    The command used to restrict access to Privileged Exec mode is "Enable Password". This command is used to set a password that must be entered in order to access Privileged Exec mode. By setting an enable password, only authorized users who know the password can gain access to the Privileged Exec mode and perform administrative tasks on the device.

    Rate this question:

  • 45. 

    What does AFPD 33-1 Establish policy on?

    • Outlines standardized management practices and tells how to manage planning and implementation of comm and info systems and the base-level infrastructure

    • Identifies responsibilities for managment of commercial off-the-shelf (COTS) and Air Force-unique software acquired by the Air Force

    • Establishes policy on how command, control, communications and computer (C4) systems are acquired, operated, and maintained.

    • Establishes Air Force Computer Security (COMPUSEC) requirements for Information Assurance

    Correct Answer
    A. Establishes policy on how command, control, communications and computer (C4) systems are acquired, operated, and maintained.
    Explanation
    The correct answer is "Establishes policy on how command, control, communications and computer (C4) systems are acquired, operated, and maintained." This answer accurately describes the purpose of AFPD 33-1, which is to establish policy guidelines for the acquisition, operation, and maintenance of command, control, communications, and computer systems. It outlines the standardized management practices for planning and implementing these systems and the base-level infrastructure.

    Rate this question:

  • 46. 

    What network topology consists of a single central cable to which all computers and other devices connect?

    • Star

    • Bus

    • Ring

    • Mesh

    Correct Answer
    A. Bus
    Explanation
    A network topology that consists of a single central cable to which all computers and other devices connect is known as a Bus topology. In this type of network, all devices share the same communication medium, which is the central cable. Each device is connected to the cable through a connector called a tap. When a device wants to communicate with another device, it sends the data onto the bus, and all devices on the network receive the data. This topology is simple and cost-effective, but it can be prone to collisions and network congestion.

    Rate this question:

  • 47. 

    What X series protocol is a Message handling System (MHS) standard, that defines the structure of a store-and-forward e-mail message handling system?

    • X.25

    • X.50

    • X.400

    • X.500

    Correct Answer
    A. X.400
    Explanation
    X.400 is a protocol that is a Message handling System (MHS) standard. It defines the structure of a store-and-forward e-mail message handling system. This protocol is used for sending and receiving messages in a distributed messaging environment. X.400 provides a standardized way to format, route, and deliver messages between different email systems. It is commonly used in government and military applications where secure and reliable message delivery is essential.

    Rate this question:

  • 48. 

    What X series protocol is a Directory Services specification standard that defines the structure of a store-and-forward e-mail message handling system?

    • X.25

    • X.50

    • X.400

    • X.500

    Correct Answer
    A. X.500
    Explanation
    The X.500 protocol is a Directory Services specification standard that defines the structure of a store-and-forward e-mail message handling system. This protocol is used for managing and accessing directory information in a network. It provides a hierarchical directory structure and allows for the retrieval and storage of information in a distributed directory database.

    Rate this question:

  • 49. 

    How many octets is the standard Internet Protocol broken down into?

    • 2

    • 4

    • 6

    • 8

    Correct Answer
    A. 4
    Explanation
    The standard Internet Protocol is broken down into 4 octets. An octet is a unit of digital information that consists of 8 bits. In the case of the Internet Protocol, each octet represents a portion of the IP address. The IP address is made up of four sets of numbers, with each set ranging from 0 to 255. Each set of numbers is represented by one octet, resulting in a total of 4 octets for the complete IP address. Therefore, the correct answer is 4.

    Rate this question:

Quiz Review Timeline (Updated): Mar 20, 2023 +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 20, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Apr 02, 2010
    Quiz Created by
    A1cbecker
Back to Top Back to top
Advertisement
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.