3C051 : Trivia Quiz On Computer Systems Operations!

50 Questions | Total Attempts: 54

SettingsSettingsSettings
Please wait...
3C051 : Trivia Quiz On Computer Systems Operations!

What do you know about Computer Systems Operation? The control data corporation was a mainframe and supercomputer firm. A group of engineers founded it. CDC was one of the nine key United States computer companies through most of the 1960s. CDC was well-known and highly considered throughout the industry at the time. How much do you know? Take the quiz and see.


Questions and Answers
  • 1. 
    What Air Force instruction series covers communications and information?
    • A. 

      30

    • B. 

      31

    • C. 

      32

    • D. 

      33

  • 2. 
    What Air Force publication establishes policy on how C4 systems are acquired, operated, and maintained?
    • A. 

      AFPD 33-1

    • B. 

      AFPD 33-2

    • C. 

      AFI 33-115 Volume 1

    • D. 

      AFI 33-115 Volume 2

  • 3. 
    What Air Force publication identifies responsibilities for supporting critical Air Force communications and information networks, primarily through network control centers?
    • A. 

      AFPD 33-1

    • B. 

      AFPD 33-2

    • C. 

      AFI 33-115 Volume 1

    • D. 

      AFI 33-115 Volume 2

  • 4. 
    What Air Force publication provides the policy and procedures for certifying network professionals who manage and operate government-provided information systems on Air Force networks?
    • A. 

      AFPD 33-1

    • B. 

      AFPD 33-2

    • C. 

      AFI 33-115 Volume 1

    • D. 

      AFI 33-115 Volume 2

  • 5. 
    What organization does communication and information services entering and exiting the base or site fall under the operational control of?
    • A. 

      Base Security Services Information Assurance Office

    • B. 

      Base Computer Security control office

    • C. 

      Base Network Control Center

    • D. 

      Base Command Post

  • 6. 
    What function within the Network Control Center provides technical assistance to the unit functional system administrators and work-group managers?
    • A. 

      Network security

    • B. 

      Network performance

    • C. 

      Network management

    • D. 

      Network administration

  • 7. 
    Whose network areal of responsibility starts at the user's terminal and ends at the server, but does not include the network backbone infrastructure components?
    • A. 

      Unit client support administrator

    • B. 

      Unit functional systems administrator

    • C. 

      Network Control Center help desk.

    • D. 

      Network Control Center network administration

  • 8. 
    What Air Force Instruction sets the policies that unit client support administrators must comply with?
    • A. 

      33-115

    • B. 

      33-116

    • C. 

      33-202

    • D. 

      33-204

  • 9. 
    What Network Control Center function responds to detected security incidents, network faults and user-reported outages at the time of help desk referral?
    • A. 

      Network Administration

    • B. 

      Network management

    • C. 

      Configuration management

    • D. 

      Information protection operations

  • 10. 
    What Network Control Center function is the central point of contact for network distribution and maintenance/update of an Air Force Computer Emergency Response Team and automated systems security and antivirus software?
    • A. 

      Network management

    • B. 

      Security management

    • C. 

      Network administration

    • D. 

      Configuration management

  • 11. 
    Performance management can be broken into which tow separate functional categories?
    • A. 

      Monitoring and tuning

    • B. 

      Baselining and tuning

    • C. 

      Baselining and monitoring

    • D. 

      Inspecting and Monitoring

  • 12. 
    To determine the level of network service provided to the users, you will make a measurement of the total response time
    • A. 

      Average bandwidth and availability of the network

    • B. 

      Rejection rate and average bandwidth

    • C. 

      Systems failure and rate average bandwidth

    • D. 

      Rejection rate and availability of the network

  • 13. 
    What Network Control Center function increases network reliability by giving the network management tools to detect problems and initiate recovery procedures?
    • A. 

      Fault Management

    • B. 

      Network management

    • C. 

      Performance management

    • D. 

      Configuration management

  • 14. 
    What does Network Security work to ensure a network?
    • A. 

      Availability, confidentiality, and integrity of data

    • B. 

      Availability, confidentiality, and backup of the data

    • C. 

      Availability, integrity, and backup of the data

    • D. 

      Confidentiality, integrity, and backup of the data

  • 15. 
    Which of the following jobs are performed by a help desk technician on a daily basis?
    • A. 

      Account unlocks, account creations, and router reconfiguration

    • B. 

      Network monitoring, account unlocks, and account creations

    • C. 

      Network monitoring, account unlocks, router access lists

    • D. 

      Operating system installations, account creations, and network monitoring

  • 16. 
    Within the Network Control Center, what function is initially responsible for taking trouble calls, deciding what type of problem has occurred, and what to do about the problem?
    • A. 

      Help Desk

    • B. 

      Network management

    • C. 

      Specific area of support

    • D. 

      Information protection operations

  • 17. 
    What is one of the most important communication skills you can develop as a help desk operator?
    • A. 

      Speaking

    • B. 

      Writing

    • C. 

      Listening

    • D. 

      Briefing

  • 18. 
    What software is used to open trouble tickets for customer trouble calls?
    • A. 

      Microsoft Access

    • B. 

      Remedy

    • C. 

      The C+ Database

    • D. 

      Fileit

  • 19. 
    What is a set of subnets that are connected with routers?
    • A. 

      Internetwork

    • B. 

      Intranetwork

    • C. 

      Homogeneous Network

    • D. 

      Heterogeneous Network

  • 20. 
    What is the set of systems/nodes on a local segment that can be off of a switch or a router?
    • A. 

      Internetwork

    • B. 

      Intranetwork

    • C. 

      Homogeneous Network

    • D. 

      Heterogeneous Network

  • 21. 
    What type of network environments consist of computer systems from different vendors that run different operating systems and communication protocols?
    • A. 

      Internetwork

    • B. 

      Intranetwork

    • C. 

      Homogeneous Network

    • D. 

      Heterogeneous Network

  • 22. 
    What type of network environments consist of computer systems from the same vendors that run the same operating systems and communication protocols?
    • A. 

      Internetwork

    • B. 

      Intranetwork

    • C. 

      Homogeneous Network

    • D. 

      Heterogeneous Network

  • 23. 
    What type of communication network serves users within a confined geographical area?
    • A. 

      Local Area Network

    • B. 

      Metropolitan Area Network

    • C. 

      Wide Area Network

    • D. 

      Enterprise Network

  • 24. 
    What type of communications network links geographically dispersed offices in other cities or around the globe?
    • A. 

      Local Area Network

    • B. 

      Metropolitan Area Network

    • C. 

      Wide Area Network

    • D. 

      Enterprise Network

  • 25. 
    How many users are in a peer to peer network?
    • A. 

      2 to 10

    • B. 

      10 to 50

    • C. 

      50 to 250

    • D. 

      250 to 1000

  • 26. 
    How many users are in a single server network?
    • A. 

      2 to 10

    • B. 

      10 to 50

    • C. 

      50 to 250

    • D. 

      250 to 1000

  • 27. 
    How many users are in a multi-server high-speed backbone network?
    • A. 

      2 to 10

    • B. 

      10 to 50

    • C. 

      50 to 250

    • D. 

      250 to 1000

  • 28. 
    In most cases, the frequencies used by wireless networks are in what frequency band?
    • A. 

      Television Band

    • B. 

      VHF band

    • C. 

      UHF Band

    • D. 

      Industrial, scientific, and medical

  • 29. 
    What is the distorting and/or weakening of a signal as it traverses the media called?
    • A. 

      Attenuation

    • B. 

      Impedance

    • C. 

      Resistance

    • D. 

      Inductive Coupling

  • 30. 
    What is a measurement of data transferred through the medium between network connections?
    • A. 

      Attenuation

    • B. 

      Impedance

    • C. 

      Throughput

    • D. 

      Inductive Coupling

  • 31. 
    What is a form of communication that transmits as a serial stream of bits or bytes?
    • A. 

      Asynchronous communication

    • B. 

      Synchronous communication

    • C. 

      Half-Duplex

    • D. 

      Duplex

  • 32. 
    Which of the following categories of the twisted-pair cable has the highest throughput?
    • A. 

      Cat 2

    • B. 

      Cat 3

    • C. 

      Cat 4

    • D. 

      Cat 5

  • 33. 
    A fiber-optic network uses a laser or light-emitting diode to send a signal through what portion of the cable?
    • A. 

      Core

    • B. 

      Buffer

    • C. 

      Kevlar

    • D. 

      Cladding

  • 34. 
    Light signals in fiber optic cables can travel distances in excess of how many miles before they need to be boosted?
    • A. 

      25

    • B. 

      50

    • C. 

      100

    • D. 

      125

  • 35. 
    What type of optic fiber is used to span extremely long distances?
    • A. 

      Duplex

    • B. 

      Half Duplex

    • C. 

      Multi mode

    • D. 

      Single Mode

  • 36. 
    What type of optic fiber is designed for the LAN environment and light is typically generated with a light-emitting diode?
    • A. 

      Duplex

    • B. 

      Half duplex

    • C. 

      Multi - mode

    • D. 

      Single Mode

  • 37. 
    What are the principal advantages of fiber optics with present-day transmission technology?
    • A. 

      Sturdiness and security

    • B. 

      Security and throughput

    • C. 

      Sturdiness and media cost

    • D. 

      Throughput and media cost

  • 38. 
    What network topology consists of a single central cable to which all computers and other devices connect?
    • A. 

      Star

    • B. 

      Bus

    • C. 

      Ring

    • D. 

      Mesh

  • 39. 
    What is the greatest risk to a bus network?
    • A. 

      The bus network server

    • B. 

      Security is easily breached

    • C. 

      The bus itself becoming inoperable

    • D. 

      The middle node connected to the bus

  • 40. 
    On what network topology, can multiple transmit frames co-exist?
    • A. 

      Star

    • B. 

      Bus

    • C. 

      Hybrid

    • D. 

      Fiber Distributed Data Interface

  • 41. 
    What is the major Department of Defense contribution to networking?
    • A. 

      The Ada programming language

    • B. 

      The File Transfer Protocol utility

    • C. 

      The Open Systems Interconnection Reference Model

    • D. 

      The Transmission Control Protocol/Internet Protocol Suite

  • 42. 
    What is a set of rules that define how communications are to take place in a network, including the format, timing, sequences, and error checking and correction?
    • A. 

      A network operating system

    • B. 

      A Protocol

    • C. 

      A Standard

    • D. 

      A baseline

  • 43. 
    What layer of the Open Systems Interconnection reference model is really a set of rules regarding the hardware used to transmit data?
    • A. 

      Physical

    • B. 

      Data Link

    • C. 

      Network

    • D. 

      Transport

  • 44. 
    What Layer of the OSI model provides the grammar by which machines converse with each other and serves as a vehicle for information transmission?
    • A. 

      Physical

    • B. 

      Data Link

    • C. 

      Network

    • D. 

      Transport

  • 45. 
    What layer of the OSI model prevents a fast computer from overwhelming a slow terminal?
    • A. 

      Physical

    • B. 

      Data Link

    • C. 

      Network

    • D. 

      Transport

  • 46. 
    A feature which involves the periodic insertion of points into data from which any recovery necessary can be started at is known as what?
    • A. 

      Checkpointing

    • B. 

      Data Transfers

    • C. 

      Formatting function

    • D. 

      Error recognition and recovery

  • 47. 
    Which layer of the OSI model is concerned with network security, file transfers, and formatting functions?
    • A. 

      Session

    • B. 

      Transport

    • C. 

      Application

    • D. 

      Presentation

  • 48. 
    The IEEE 802.3 standard describes a local area network using what kind of topology?
    • A. 

      Bus

    • B. 

      Star

    • C. 

      Token Bus

    • D. 

      Token Ring

  • 49. 
    What protocol is used by the IEEE 802.3 standard to avoid collisions on the network?
    • A. 

      User Data Protocol

    • B. 

      Network File System

    • C. 

      TCP/IP

    • D. 

      Carrier Sense Multiple Access/Collision Detection

  • 50. 
    What does a station specifically send when it sends a general request through the network asking any station to respond to receive the token?
    • A. 

      Broadcast address

    • B. 

      Tapped approach

    • C. 

      Who follows frame

    • D. 

      Solicit Successor Frame