1.
What is the minimum number of computers needed for a computer network?
A. 
B. 
C. 
D. 
2.
What is a privately-owned network whose access is restricted to authorized personnel iscalled?
A. 
B. 
C. 
D. 
Local area network (LAN).
3.
What type of network environments consist of computer systems from different vendors that run different operating systems and communication protocols?
A. 
B. 
C. 
D. 
4.
What type of network is made up of components from the same vendor or compatibleequipment that all run under the same operating system or network operating system?
A. 
B. 
C. 
D. 
5.
What is a communications network that serves users within a confined geographical area?
A. 
Global area network (GAN).
B. 
Local area network (LAN).
C. 
Metropolitan area network. (MAN).
D. 
Wide area network. (WAN).
6.
What type of communications network links a broad geographical region?
A. 
Global area network (GAN).
B. 
Local area network (LAN).
C. 
Metropolitan area network. (MAN).
D. 
Wide area network. (WAN).
7.
What type of communications network links different interconnected networks over anunlimited geographical region?
A. 
Global area network (GAN).
B. 
Local area network (LAN).
C. 
Metropolitan area network. (MAN).
D. 
Wide area network. (WAN).
8.
How many users are normally in a peer-to-peer network?
A. 
B. 
C. 
D. 
9.
How many users are in a single-server network?
A. 
B. 
C. 
D. 
10.
How many users are in a multi-server network?
A. 
B. 
C. 
D. 
11.
How many users are in a multi-server high-speed backbone network?
A. 
B. 
C. 
D. 
12.
What type of communications network links geographically dispersed offices in other citiesor around the globe?
A. 
Local area network (LAN).
B. 
Metropolitan area network (MAN).
C. 
Multi-server high-speed backbone network.
D. 
13.
What is used to identify network nodes on a physically connected network?
A. 
Media access control address.
B. 
C. 
D. 
14.
How many octets is the standard internet protocol broken down into?
A. 
B. 
C. 
D. 
15.
What is the binary equivalent to the dotted decimal number 96?
A. 
B. 
C. 
D. 
16.
What is the network id of internet protocol (IP) address 131.10.230.120/24?
A. 
B. 
C. 
D. 
17.
What is the host id of internet protocol (IP) address 131.10.230.120/24?
A. 
B. 
C. 
D. 
18.
How many bits are typically covered in an internet protocol version 6 (IPv6) subnet mask?
A. 
B. 
C. 
D. 
19.
What series of Air Force instruction series covers communications and information?
A. 
B. 
C. 
D. 
20.
What Air Force instruction provides policy, direction, and structure for the Air Force globalinformation grid (AF-GIG)?
A. 
B. 
C. 
D. 
21.
According to the Air Force network structure, what tier is the Air Force network operationscenter (AFNOSC)?
A. 
B. 
C. 
D. 
22.
What network entity provides reliable, secure networks and network services for base levelcustomers?
A. 
Network control center (NCC).
B. 
Network control center-deployable (NCC-D).
C. 
Network operations center (NOSC).
D. 
Air Force network operations center (AFNOSC).
23.
What is defined as a bundle of application software designed to significantly improvenetwork efficiency and productivity?
A. 
B. 
Network management server.
C. 
Performance management server.
D. 
Security management server.
24.
Which of the following are the three most common network management architectures?
A. 
Centralized, hierarchical, and distributed.
B. 
Centralized, hybrid and distributed.
C. 
Centralized, hierarchical, and hybrid.
D. 
Hybrid, hierarchical, and distributed.
25.
What network architecture has a network management platform on one computer system ata location that is responsible for all network management duties?
A. 
B. 
C. 
D.