1.
What Air Force instruction series covers communications and information?
Correct Answer
D. 33
Explanation
Air Force instruction series 33 covers communications and information.
2.
What Air Force publication establishes policy on how C4 systems are acquired, operated, and maintained?
Correct Answer
A. AFPD 33-1
Explanation
AFPD 33-1 is the correct answer because it establishes policy on how C4 systems are acquired, operated, and maintained in the Air Force. It provides guidance and direction for the management and use of C4 systems and ensures that they are effectively and efficiently utilized to support Air Force operations. This publication outlines the procedures and responsibilities for acquiring, operating, and maintaining C4 systems, ensuring that they are aligned with the Air Force's overall mission and objectives.
3.
What Air Force publication identifies responsibilities for supporting critical Air Force communications and information networks, primarily through network control centers?
Correct Answer
C. AFI 33-115 Volume 1
Explanation
AFI 33-115 Volume 1 is the correct answer because it is an Air Force publication that specifically identifies responsibilities for supporting critical Air Force communications and information networks. This publication primarily focuses on network control centers, which are crucial for maintaining and managing these networks. Therefore, AFI 33-115 Volume 1 is the most relevant publication for understanding the responsibilities related to supporting Air Force communications and information networks.
4.
What Air Force publication provides the policy and procedures for certifying network professionals who manage and operate government-provided information systems on Air Force networks?
Correct Answer
D. AFI 33-115 Volume 2
Explanation
AFI 33-115 Volume 2 is the correct answer because it provides the policy and procedures for certifying network professionals who manage and operate government-provided information systems on Air Force networks. AFPD 33-1 and AFPD 33-2 are Air Force policy directives that may cover other topics, and AFI 33-115 Volume 1 may provide information on a different aspect of network management.
5.
What organization does communication and information services entering and exiting the base or site fall under the operational control of?
Correct Answer
C. Base Network Control Center
Explanation
The communication and information services entering and exiting the base or site fall under the operational control of the Base Network Control Center. This center is responsible for managing and controlling the network infrastructure and ensuring the security and integrity of the communication and information services within the base or site.
6.
What function within the Network Control Center provides technical assistance to the unit functional system administrators and work-group managers?
Correct Answer
D. Network administration
Explanation
The function within the Network Control Center that provides technical assistance to the unit functional system administrators and work-group managers is network administration. This role involves managing and maintaining the network infrastructure, troubleshooting network issues, and providing support to users and administrators. Network administration encompasses tasks such as configuring network devices, monitoring network performance, ensuring network security, and resolving technical problems.
7.
Whose network areal of responsibility starts at the user's terminal and ends at the server, but does not include the network backbone infrastructure components?
Correct Answer
B. Unit functional systems administrator
Explanation
The correct answer is "Unit functional systems administrator." This person is responsible for the network area that starts at the user's terminal and ends at the server. However, they do not have control over the network backbone infrastructure components.
8.
What Air Force Instruction sets the policies that unit client support administrators must comply with?
Correct Answer
A. 33-115
Explanation
Air Force Instruction 33-115 sets the policies that unit client support administrators must comply with.
9.
What Network Control Center function responds to detected security incidents, network faults and user-reported outages at the time of help desk referral?
Correct Answer
B. Network management
Explanation
Network management is the correct answer because it involves the monitoring and control of a network's performance and security. This function is responsible for responding to security incidents, network faults, and user-reported outages, typically through the help desk. Network management ensures that the network operates efficiently, addresses any issues that arise, and maintains the overall integrity and availability of the network.
10.
What Network Control Center function is the central point of contact for network distribution and maintenance/update of an Air Force Computer Emergency Response Team and automated systems security and antivirus software?
Correct Answer
D. Configuration management
Explanation
Configuration management is the correct answer because it involves the central point of contact for network distribution and maintenance/update of an Air Force Computer Emergency Response Team and automated systems security and antivirus software. Configuration management focuses on managing and controlling changes to the network's hardware, software, and documentation, ensuring that all components are properly configured and updated. This function plays a crucial role in maintaining the security and integrity of the network by overseeing the deployment and configuration of security measures and antivirus software.
11.
Performance management can be broken into which tow separate functional categories?
Correct Answer
A. Monitoring and tuning
Explanation
Performance management involves monitoring and optimizing the performance of a system or process. Monitoring refers to the continuous tracking and measurement of performance metrics to identify any issues or areas for improvement. Tuning, on the other hand, involves making adjustments and optimizations to improve the performance based on the insights gained from monitoring. Therefore, the correct answer is "Monitoring and tuning."
12.
To determine the level of network service provided to the users, you will make a measurement of the total response time
Correct Answer
D. Rejection rate and availability of the network
Explanation
The rejection rate and availability of the network are important factors in determining the level of network service provided to the users. The rejection rate indicates the number of requests that are denied or rejected by the network, which can give an indication of how well the network is able to handle the incoming traffic. On the other hand, the availability of the network measures the percentage of time that the network is operational and accessible to users. By considering both the rejection rate and availability, one can assess the overall performance and reliability of the network in providing service to the users.
13.
What Network Control Center function increases network reliability by giving the network management tools to detect problems and initiate recovery procedures?
Correct Answer
A. Fault Management
Explanation
Fault Management is the correct answer because it refers to the function that increases network reliability by providing network management tools to detect problems and initiate recovery procedures. Fault Management involves monitoring the network for any faults or errors, identifying the root cause of the issues, and taking appropriate actions to resolve them. This includes activities such as fault detection, fault isolation, fault diagnosis, and fault correction, which all contribute to enhancing the overall reliability of the network.
14.
What does Network Security work to ensure a network?
Correct Answer
A. Availability, confidentiality, and integrity of data
Explanation
Network security works to ensure the availability, confidentiality, and integrity of data. Availability refers to ensuring that the network and its resources are accessible and functioning properly. Confidentiality involves protecting sensitive information from unauthorized access or disclosure. Integrity ensures that data is accurate, complete, and unaltered. These three aspects are crucial for maintaining a secure and reliable network environment. Backup of data, although important, is not specifically mentioned as a primary focus of network security in this context.
15.
Which of the following jobs are performed by a help desk technician on a daily basis?
Correct Answer
B. Network monitoring, account unlocks, and account creations
Explanation
A help desk technician performs network monitoring on a daily basis to ensure the smooth functioning of the network. They also handle account unlocks, which involves resetting passwords or unlocking user accounts that have been locked due to multiple failed login attempts. Additionally, they are responsible for account creations, which involves setting up new user accounts and granting appropriate access privileges. These tasks are common responsibilities of a help desk technician to ensure the efficient operation of the network and provide support to users.
16.
Within the Network Control Center, what function is initially responsible for taking trouble calls, deciding what type of problem has occurred, and what to do about the problem?
Correct Answer
A. Help Desk
Explanation
The Help Desk function within the Network Control Center is initially responsible for taking trouble calls, determining the type of problem that has occurred, and deciding on the appropriate course of action to resolve the problem. The Help Desk serves as the first point of contact for users experiencing network issues and is responsible for troubleshooting and resolving problems or escalating them to the appropriate support team if necessary.
17.
What is one of the most important communication skills you can develop as a help desk operator?
Correct Answer
C. Listening
Explanation
Listening is one of the most important communication skills that a help desk operator can develop. It is crucial for the operator to actively listen and understand the customer's concerns or issues in order to provide effective assistance. By listening attentively, the operator can gather all the necessary information and accurately assess the situation, leading to better problem-solving and customer satisfaction. Additionally, listening helps build trust and rapport with the customer, as they feel heard and understood.
18.
What software is used to open trouble tickets for customer trouble calls?
Correct Answer
B. Remedy
Explanation
Remedy is the correct answer because it is a software commonly used in IT service management to track and manage customer trouble tickets. It allows for efficient logging, tracking, and resolution of customer issues, ensuring timely and effective customer support. Microsoft Access, The C+ Database, and Fileit are not specifically designed for trouble ticket management and are less commonly used for this purpose.
19.
What is a set of subnets that are connected with routers?
Correct Answer
A. Internetwork
Explanation
An internetwork is a set of subnets that are connected with routers. Routers are used to connect different subnets and enable communication between them. This allows for the creation of a larger network that spans multiple locations or networks. In an internetwork, data can be transmitted between subnets through the routing process, which involves forwarding packets based on their destination addresses. This term is commonly used in the context of the internet, where multiple networks are interconnected to form a global network.
20.
What is the set of systems/nodes on a local segment that can be off of a switch or a router?
Correct Answer
B. Intranetwork
Explanation
An intranetwork refers to the set of systems or nodes on a local segment that can be connected to a switch or a router. It is a private network that is only accessible to a specific organization or group of users. The term "intra" signifies that the network is internal and confined within a particular organization or location. This distinguishes it from an internetwork, which refers to the interconnected networks of different organizations or locations. Homogeneous and heterogeneous networks do not specifically refer to the set of systems or nodes on a local segment, making them incorrect choices for this question.
21.
What type of network environments consist of computer systems from different vendors that run different operating systems and communication protocols?
Correct Answer
D. Heterogeneous Network
Explanation
A heterogeneous network consists of computer systems from different vendors that run different operating systems and communication protocols. In this type of network environment, there is a mix of hardware and software components from various manufacturers, making it diverse and complex. The different systems and protocols may require special configurations and compatibility measures to ensure smooth communication and interoperability between the devices.
22.
What type of network environments consist of computer systems from the same vendors that run the same operating systems and communication protocols?
Correct Answer
C. Homogeneous Network
Explanation
A homogeneous network consists of computer systems from the same vendors that run the same operating systems and communication protocols. In this type of network environment, all the devices are compatible with each other and can seamlessly communicate and share resources. This allows for easier management and troubleshooting as there are fewer compatibility issues.
23.
What type of communication network serves users within a confined geographical area?
Correct Answer
A. Local Area Network
Explanation
A Local Area Network (LAN) is a type of communication network that serves users within a confined geographical area. It typically covers a small area such as a home, office building, or campus. LANs are commonly used to connect computers, devices, and servers within a limited space, allowing for the sharing of resources, data, and internet access. This type of network is characterized by high data transfer rates, low latency, and high security.
24.
What type of communications network links geographically dispersed offices in other cities or around the globe?
Correct Answer
C. Wide Area Network
Explanation
A Wide Area Network (WAN) is a type of communications network that connects geographically dispersed offices in different cities or even across the globe. Unlike a Local Area Network (LAN) or a Metropolitan Area Network (MAN) which are limited to a specific area, a WAN covers a larger geographical area and allows for the exchange of data and information between remote locations. An Enterprise Network, on the other hand, refers to the overall network infrastructure of an organization, which may include both LANs and WANs. Therefore, the correct answer is Wide Area Network.
25.
How many users are in a peer to peer network?
Correct Answer
A. 2 to 10
Explanation
A peer-to-peer network is a decentralized network where computers, or peers, connect and communicate directly with each other without the need for a central server. In such a network, the number of users can vary, but typically it consists of a small group of 2 to 10 users. This limited number of users allows for easier communication and sharing of resources among the peers.
26.
How many users are in a single server network?
Correct Answer
B. 10 to 50
Explanation
A single server network typically has a limited number of users connected to it. The range of 10 to 50 users is a reasonable estimate for the number of users that can be accommodated on a single server network. This range ensures that the server can handle the workload and provide sufficient resources to all connected users without experiencing significant performance issues.
27.
How many users are in a multi-server high-speed backbone network?
Correct Answer
D. 250 to 1000
Explanation
The correct answer is 250 to 1000. This range suggests that a multi-server high-speed backbone network can accommodate a significant number of users, ranging from 250 to 1000. It indicates that the network has the capacity to handle a large volume of traffic and support a substantial user base.
28.
In most cases, the frequencies used by wireless networks are in what frequency band?
Correct Answer
D. Industrial, scientific, and medical
Explanation
Wireless networks typically operate in the Industrial, Scientific, and Medical (ISM) frequency band. This band is reserved for non-licensed use and is commonly used for various wireless applications, including Wi-Fi networks. The ISM band includes frequencies such as 2.4 GHz and 5 GHz, which are commonly used for wireless communication. Television bands, VHF band, and UHF band are not typically used for wireless networks.
29.
What is the distorting and/or weakening of a signal as it traverses the media called?
Correct Answer
A. Attenuation
Explanation
Attenuation refers to the reduction in the strength or intensity of a signal as it travels through a medium. This can occur due to various factors such as distance, interference, or the characteristics of the medium itself. Attenuation can distort and weaken the signal, leading to a decrease in its quality or effectiveness. Impedance, resistance, and inductive coupling are related concepts but do not specifically refer to the distorting and weakening of a signal as it traverses a medium.
30.
What is a measurement of data transferred through the medium between network connections?
Correct Answer
C. Throughput
Explanation
Throughput is the measurement of data transferred through the medium between network connections. It represents the amount of data that can be transmitted over a network connection in a given amount of time. It is an important metric to evaluate the performance and efficiency of a network connection.
31.
What is a form of communication that transmits as a serial stream of bits or bytes?
Correct Answer
A. Asynchronous communication
Explanation
Asynchronous communication is a form of communication that transmits data as a serial stream of bits or bytes. In this type of communication, the sender and receiver do not have to be synchronized with each other. The data is transmitted in an intermittent manner, allowing for flexibility in timing. This method is commonly used in computer networks and telecommunication systems where there may be variations in the transmission speed or delays in data transfer.
32.
Which of the following categories of the twisted-pair cable has the highest throughput?
Correct Answer
D. Cat 5
Explanation
Cat 5 twisted-pair cable has the highest throughput among the given options. This is because Cat 5 cable has a higher bandwidth and can support faster data transmission compared to Cat 2, Cat 3, and Cat 4 cables. Cat 5 cables are capable of transmitting data at speeds up to 1000 Mbps (1 Gbps), making it suitable for high-speed internet connections and Ethernet networks.
33.
A fiber-optic network uses a laser or light-emitting diode to send a signal through what portion of the cable?
Correct Answer
A. Core
Explanation
A fiber-optic network uses a laser or light-emitting diode to send a signal through the core of the cable. The core is the innermost part of the cable and is responsible for carrying the light signal. The cladding, buffer, and Kevlar are all protective layers that surround the core and provide support and insulation, but they do not play a direct role in transmitting the signal. Therefore, the correct answer is the core.
34.
Light signals in fiber optic cables can travel distances in excess of how many miles before they need to be boosted?
Correct Answer
C. 100
Explanation
Light signals in fiber optic cables can travel distances in excess of 100 miles before they need to be boosted. This is because fiber optic cables use total internal reflection to transmit light signals, which allows them to maintain the signal strength over long distances. The signals are transmitted as pulses of light, and the fiber optic cable's low loss and high bandwidth capabilities enable the signals to travel without significant degradation. Boosting or amplifying the signals is only necessary after distances exceeding 100 miles to compensate for any loss of signal strength.
35.
What type of optic fiber is used to span extremely long distances?
Correct Answer
D. Single Mode
Explanation
Single mode optic fiber is used to span extremely long distances. This type of fiber has a small core diameter, allowing only one mode of light to propagate through it. This results in less dispersion and attenuation, making it ideal for long-distance communication. Single mode fiber can transmit data over distances of up to hundreds of kilometers without significant loss of signal quality.
36.
What type of optic fiber is designed for the LAN environment and light is typically generated with a light-emitting diode?
Correct Answer
C. Multi - mode
Explanation
Multi-mode optic fiber is designed for the LAN environment and light is typically generated with a light-emitting diode (LED). This type of fiber allows multiple modes or paths for the light to travel through, which results in a larger core size. It is suitable for shorter distances and lower bandwidth applications, making it ideal for LAN environments where data transmission needs to occur over relatively short distances. The use of an LED as the light source is cost-effective and provides sufficient performance for LAN applications.
37.
What are the principal advantages of fiber optics with present-day transmission technology?
Correct Answer
A. Sturdiness and security
Explanation
Fiber optics offer the principal advantages of sturdiness and security in present-day transmission technology. The physical properties of fiber optics, such as their resistance to electromagnetic interference and durability, make them highly reliable and sturdy for transmitting data. Additionally, fiber optic cables are difficult to tap into, providing enhanced security for transmitting sensitive information.
38.
What network topology consists of a single central cable to which all computers and other devices connect?
Correct Answer
B. Bus
Explanation
A bus network topology consists of a single central cable to which all computers and other devices connect. In this topology, all devices share the same communication medium, and data is transmitted in both directions along the cable. Each device on the network receives all the data transmitted, but only the intended recipient processes the data. This type of network is relatively simple to set up and cost-effective, making it suitable for small-scale networks. However, if the central cable fails, the entire network can be affected.
39.
What is the greatest risk to a bus network?
Correct Answer
C. The bus itself becoming inoperable
Explanation
The greatest risk to a bus network is the bus itself becoming inoperable. If the bus malfunctions or breaks down, it can disrupt the entire network and cause delays or cancellations in the bus service. This can inconvenience passengers and affect the efficiency of the transportation system. Therefore, it is crucial to ensure that the buses are well-maintained and regularly inspected to prevent any potential issues that could lead to inoperability.
40.
On what network topology, can multiple transmit frames co-exist?
Correct Answer
D. Fiber Distributed Data Interface
Explanation
Fiber Distributed Data Interface (FDDI) is a network topology that allows multiple transmit frames to co-exist. FDDI uses a dual-ring architecture where data is transmitted in both directions simultaneously, allowing for high-speed and reliable communication. This topology is commonly used in high-performance networks that require high bandwidth and fault tolerance.
41.
What is the major Department of Defense contribution to networking?
Correct Answer
D. The Transmission Control Protocol/Internet Protocol Suite
Explanation
The major Department of Defense contribution to networking is the Transmission Control Protocol/Internet Protocol Suite. This suite of protocols is the foundation of the modern internet and allows for the transmission of data across networks. It provides a standardized set of rules and procedures for data communication, ensuring that devices can connect and communicate with each other effectively. The TCP/IP suite is widely used and forms the basis of internet communication, making it a significant contribution to networking.
42.
What is a set of rules that define how communications are to take place in a network, including the format, timing, sequences, and error checking and correction?
Correct Answer
B. A Protocol
Explanation
A protocol is a set of rules that define how communications are to take place in a network, including the format, timing, sequences, and error checking and correction. It ensures that devices in a network can understand and communicate with each other effectively.
43.
What layer of the Open Systems Interconnection reference model is really a set of rules regarding the hardware used to transmit data?
Correct Answer
A. pHysical
Explanation
The layer of the Open Systems Interconnection reference model that is a set of rules regarding the hardware used to transmit data is the Physical layer. This layer deals with the physical transmission of data, including the electrical, mechanical, and functional aspects of the hardware used for communication. It defines the physical characteristics of the transmission medium, such as cables, connectors, and signaling methods, ensuring that data can be successfully transmitted and received between devices.
44.
What Layer of the OSI model provides the grammar by which machines converse with each other and serves as a vehicle for information transmission?
Correct Answer
B. Data Link
Explanation
The Data Link layer of the OSI model provides the grammar by which machines converse with each other and serves as a vehicle for information transmission. This layer is responsible for the reliable transmission of data frames between nodes over a physical network. It ensures error-free transmission, flow control, and access to the physical medium. The Data Link layer also handles addressing and framing of data packets, allowing machines to communicate effectively and efficiently.
45.
What layer of the OSI model prevents a fast computer from overwhelming a slow terminal?
Correct Answer
D. Transport
Explanation
The Transport layer of the OSI model prevents a fast computer from overwhelming a slow terminal. This layer is responsible for the reliable transmission of data between devices and manages the flow control, ensuring that data is delivered at an appropriate rate. It establishes a connection between the source and destination devices and breaks the data into smaller segments for transmission. By regulating the flow of data, the Transport layer ensures that a fast computer does not flood a slow terminal with an excessive amount of data, thus preventing overload and ensuring efficient communication.
46.
A feature which involves the periodic insertion of points into data from which any recovery necessary can be started at is known as what?
Correct Answer
A. Checkpointing
Explanation
Checkpointing is a feature that involves the periodic insertion of points into data from which any recovery necessary can be started at. It allows for the creation of restore points in a system, enabling the system to recover from failures or errors. By periodically saving the state of the system, checkpointing ensures that if a failure occurs, the system can be restored to a previous known good state. This feature is commonly used in databases, operating systems, and distributed systems to ensure data integrity and fault tolerance.
47.
Which layer of the OSI model is concerned with network security, file transfers, and formatting functions?
Correct Answer
D. Presentation
Explanation
The Presentation layer of the OSI model is concerned with network security, file transfers, and formatting functions. This layer is responsible for translating data into a format that can be understood by the receiving application. It also handles encryption and decryption of data for secure transmission. Therefore, the correct answer is Presentation.
48.
The IEEE 802.3 standard describes a local area network using what kind of topology?
Correct Answer
A. Bus
Explanation
The IEEE 802.3 standard describes a local area network using a bus topology. In a bus topology, all devices are connected to a single communication line, known as a bus. Each device on the network can transmit data onto the bus, and all other devices can receive that data. This type of topology is simple and cost-effective, as it requires minimal cabling. However, it can be prone to collisions and performance issues as the network grows larger.
49.
What protocol is used by the IEEE 802.3 standard to avoid collisions on the network?
Correct Answer
D. Carrier Sense Multiple Access/Collision Detection
Explanation
The IEEE 802.3 standard uses the Carrier Sense Multiple Access/Collision Detection (CSMA/CD) protocol to avoid collisions on the network. This protocol ensures that multiple devices on the network listen for traffic before transmitting, and if a collision is detected, the devices involved wait for a random period of time before retransmitting. This helps to prevent data collisions and ensure efficient communication on the network.
50.
What does a station specifically send when it sends a general request through the network asking any station to respond to receive the token?
Correct Answer
D. Solicit Successor Frame
Explanation
When a station sends a general request through the network asking any station to respond to receive the token, it specifically sends a Solicit Successor Frame. This frame is used to request the next station in line to take control of the token and transmit data.