3d0x2 Vol. 1

95 Questions | Attempts: 1421
Share

SettingsSettingsSettings
CDC Quizzes & Trivia

This is all URE questions from Volume 1 of the 3D0X2 CDC (As of 20011)


Questions and Answers
  • 1. 

    What is the minimum number of computers needed for a computer network?

    • A.

      2

    • B.

      5

    • C.

      10

    • D.

      1

    Correct Answer
    A. 2
  • 2. 

    What is a privately-owned network whose access is restricted to authorized personnel?

    • A.

      Homogeneous network

    • B.

      Internetwork

    • C.

      Intranetwork

    • D.

      Local area network

    Correct Answer
    C. Intranetwork
  • 3. 

    What type of network environments consist of computer systems from different vendors that run different operating systems and communication protocols?

    • A.

      Internetwork

    • B.

      Intranetwork

    • C.

      Homogeneous network

    • D.

      Heterogeneous network

    Correct Answer
    D. Heterogeneous network
  • 4. 

    What is a communications network that serves users within a confined geographical area?

    • A.

      Global area network

    • B.

      Local area network

    • C.

      Metropolitan area network

    • D.

      Wide area network

    Correct Answer
    B. Local area network
  • 5. 

    What type of communications network links a broad geographical region?

    • A.

      Global area network

    • B.

      Local area network

    • C.

      Metropolitan area network

    • D.

      Wide area network

    Correct Answer
    D. Wide area network
  • 6. 

    What type of communications network links different interconnected networks over an unlimited geographical region?

    • A.

      Local

    • B.

      Global

    • C.

      Regional

    • D.

      Snoop Dawg

    Correct Answer
    B. Global
  • 7. 

    How many users are normally in a peer-to-peer network?

    • A.

      2-10

    • B.

      10-50

    • C.

      50-250

    • D.

      250-1,000

    Correct Answer
    A. 2-10
  • 8. 

    How many users are in a single-server network?

    • A.

      10-50

    • B.

      250-1,000

    • C.

      2-10

    • D.

      50-250

    Correct Answer
    A. 10-50
  • 9. 

    How many users are in a multi-server network?

    • A.

      2-10

    • B.

      10-50

    • C.

      50-250

    • D.

      250-1,000

    Correct Answer
    C. 50-250
  • 10. 

    What type of communications network links geographically dispersed offices in other cities or around the globe?

    • A.

      Global area network

    • B.

      Wide area network

    • C.

      Node serial number

    • D.

      Local area network

    Correct Answer
    B. Wide area network
  • 11. 

    What is used to identify network nodes on a physically connected network?

    • A.

      Mac adress

    • B.

      IP Adress

    • C.

      Auto discovery

    • D.

      6

    Correct Answer
    A. Mac adress
  • 12. 

    How many octets is the standard internet protocol broken down into?

    • A.

      2

    • B.

      8

    • C.

      6

    • D.

      4

    Correct Answer
    D. 4
  • 13. 

    What is the binary equivalent to the dotted decimal number 96?

    • A.

      01100000

    • B.

      00010000

    • C.

      00010010

    • D.

      11100000

    Correct Answer
    A. 01100000
  • 14. 

    What is the network id of internet protocol (IP) address 131.10.230.120/24?

    • A.

      0.0.0.120

    • B.

      131.10.0.0

    • C.

      0.10.230.0

    • D.

      255.255.255.0

    Correct Answer
    B. 131.10.0.0
  • 15. 

    What is the host id of internet protocol (IP) address 131.10.230.120/24?

    • A.

      0.0.0.10

    • B.

      131.0.0.

    • C.

      131.10.230.0

    • D.

      0.10.230.120

    Correct Answer
    A. 0.0.0.10
  • 16. 

    How many bits are typically covered in an internet protocol version 6 (IPv6) subnet mask?

    • A.

      24

    • B.

      64

    • C.

      128

    • D.

      84

    Correct Answer
    C. 128
  • 17. 

    What series of Air Force instruction series covers communications and information?

    • A.

      AFPD 33–1

    • B.

      AFI 33–112

    • C.

      AFI 33–104

    • D.

      AFI 29–2603v2

    Correct Answer
    C. AFI 33–104
  • 18. 

    According to the Air Force network structure, what tier is the Air Force network operations center (AFNOSC)?

    • A.

      1

    • B.

      3

    • C.

      2

    • D.

      4

    Correct Answer
    A. 1
  • 19. 

    What network entity provides reliable, secure networks and network services for base level customers?

    • A.

      Network control center (NCC)

    • B.

      Network control center-deployable (NCC-D)

    • C.

      Network operations center (NOSC)

    • D.

      Air Force network operations center (AFNOSC)

    Correct Answer
    A. Network control center (NCC)
  • 20. 

    What is defined as a bundle of application software designed to significantly improve network efficiency and productivity?

    • A.

      Fault management server

    • B.

      Performance management server

    • C.

      Network management server

    • D.

      Security management server

    Correct Answer
    C. Network management server
  • 21. 

    Which of the following are the three most common network management architectures?

    • A.

      Centralized, hierarchical, and hybrid

    • B.

      Centralized, hybrid and distributed

    • C.

      Centralized, hierarchical, and distributed

    • D.

      Hybrid, hierarchical, and distributed

    Correct Answer
    C. Centralized, hierarchical, and distributed
  • 22. 

    What network architecture has a network management platform on one computer system at a location that is responsible for all network management duties?

    • A.

      Centralized

    • B.

      Hybrid

    • C.

      Hierarchical

    • D.

      Distributed

    Correct Answer
    A. Centralized
  • 23. 

    What network architecture uses multiple systems for network management, with one system acting as a central server and the others working as clients?

    • A.

      Centralized

    • B.

      Distributed

    • C.

      Hierarchical

    • D.

      Hybrid

    Correct Answer
    C. Hierarchical
  • 24. 

    What level of network management activity are you working at when you as the network manager are monitoring and troubleshooting components to eliminate the side-effect alarms and isolate problems to a root cause?

    • A.

      Inactive

    • B.

      Interactive

    • C.

      Proactive

    • D.

      Reactive

    Correct Answer
    B. Interactive
  • 25. 

    What level of network management activity are you working at when the automated monitoring of components provides problem analysis, giving a root cause alarm for the problem at-hand,and automatic restorative processes are in-place wherever possible to minimize downtime.

    • A.

      Inactive

    • B.

      Reactive

    • C.

      Interactive

    • D.

      Proactive

    Correct Answer
    D. Proactive
  • 26. 

    Performance management can be broke into what two separate functional categories?

    • A.

      Monitoring and analyzing

    • B.

      Monitoring and replacing

    • C.

      Monitoring and tuning

    • D.

      Analyzing and tuning

    Correct Answer
    C. Monitoring and tuning
  • 27. 

    Which function of performance management tracks historical data by tracking activities on the network?

    • A.

      Tuning

    • B.

      Analyzing

    • C.

      Gathering

    • D.

      Monitoring

    Correct Answer
    D. Monitoring
  • 28. 

    What is established to distinguish between errors that fall within a normal range and excessive errors because of a fault?

    • A.

      Fault parameters

    • B.

      Tolerance parameters

    • C.

      Low-level software alarms

    • D.

      Low-level hardware alarms

    Correct Answer
    B. Tolerance parameters
  • 29. 

    Network management protocols are designed (in most cases) to reside above what layer of the operational system interface (OSI) model?

    • A.

      Session

    • B.

      Transport

    • C.

      Presentation

    • D.

      Application

    Correct Answer
    A. Session
  • 30. 

    What is a hierarchical structured format that defines the network management information available from network devices?

    • A.

      Object identifier

    • B.

      Network device map

    • C.

      Network protocol list

    • D.

      Management information base

    Correct Answer
    D. Management information base
  • 31. 

    What area of the simple network management protocol (SNMP) tree structure is reserved for vendors related label and leaf objects associated with specific manufactured equipment?

    • A.

      Management

    • B.

      Private

    • C.

      Directory

    • D.

      Experimental

    Correct Answer
    B. Private
  • 32. 

    What simple network management protocol (SNMP) node is responsible for monitoring, collecting and reporting management data to the management system?

    • A.

      Primary domain controller

    • B.

      Backup domain controller

    • C.

      Manager

    • D.

      Agent

    Correct Answer
    D. Agent
  • 33. 

    What operational simple network management protocol (SNMP) message asks for a specific instance of management information?

    • A.

      Get

    • B.

      Set

    • C.

      Trap

    • D.

      GetNext

    Correct Answer
    A. Get
  • 34. 

    What operational simple network management protocol (SNMP) message is used to retrieve multiple pieces of information with minimal overhead?

    • A.

      Get

    • B.

      Set

    • C.

      Trap

    • D.

      GetNext

    Correct Answer
    D. GetNext
  • 35. 

    What operational simple network management protocol (SNMP) message is used to modify the value of one or more instances of management information?

    • A.

      Get

    • B.

      Set

    • C.

      Trap

    • D.

      GetNext

    Correct Answer
    B. Set
  • 36. 

    What operational simple network management protocol (SNMP) message is an unsolicited message from an agent to the manager?

    • A.

      Get

    • B.

      Set

    • C.

      Trap

    • D.

      GetNext

    Correct Answer
    C. Trap
  • 37. 

    What is the type of probe that collects inter-device connectivity information using proprietary topology management information bases (MIB)?

    • A.

      Virtual local area network (VLAN) probe

    • B.

      Neighbor probe

    • C.

      Containment probe

    • D.

      System information probe

    Correct Answer
    B. Neighbor probe
  • 38. 

    What is the centerpiece of a systems management automated report tracking system (SMARTS) application?

    • A.

      Broker

    • B.

      Clients

    • C.

      Map console

    • D.

      Domain manager

    Correct Answer
    D. Domain manager
  • 39. 

    What component of the systems management automated report tracking system (SMARTS) application contains knowledge of available domain managers?

    • A.

      Broker

    • B.

      Clients

    • C.

      Probes

    • D.

      Consoles

    Correct Answer
    A. Broker
  • 40. 

    What are the three types of systems management automated report tracking system (SMARTS) notifications?

    • A.

      Compound events, alarm, and trend

    • B.

      Compound events, problems, and network

    • C.

      Auto-discovery, compound, and symptomatic events

    • D.

      Compound events, problems, and symptomatic events

    Correct Answer
    D. Compound events, problems, and symptomatic events
  • 41. 

    What color on the systems management automated report tracking system (SMARTS) alarm log indicates one or more events?

    • A.

      Blue

    • B.

      Orange

    • C.

      Purple

    • D.

      Yellow

    Correct Answer
    C. Purple
  • 42. 

    How many different categories of information does the performance monitor provide you about your network?

    • A.

      7

    • B.

      19

    • C.

      14

    • D.

      21

    Correct Answer
    D. 21
  • 43. 

    What device provides a capability for digital network diagnostics and developing communications software?

    • A.

      Systems management automated report tracking system (SMARTS)

    • B.

      Protocol analyzer

    • C.

      Network root router

    • D.

      Windows advanced server

    Correct Answer
    B. Protocol analyzer
  • 44. 

    What provides information concerning the network utilization and frame errors that are related to a specific protocol?

    • A.

      Media access control (MAC) node statistics

    • B.

      Connection statistics

    • C.

      Protocol statistics

    • D.

      Node discovery

    Correct Answer
    C. Protocol statistics
  • 45. 

    What reports errors that occur at the physical layer such as bad frame check sequence (FCS), short frames, and jabbers?

    • A.

      Media access control (MAC) node statistics

    • B.

      Connection statistics

    • C.

      Protocol statistics

    • D.

      Node discovery

    Correct Answer
    A. Media access control (MAC) node statistics
  • 46. 

    What automatically runs in the background when the protocol analyzer application is activated?

    • A.

      Media access control (MAC)

    • B.

      Connection statistics

    • C.

      Protocol statistics

    • D.

      Node discovery

    Correct Answer
    D. Node discovery
  • 47. 

    What is a measure used to verify the eligibility of a subject and the ability of the subject to access certain information?

    • A.

      Authentication.

    • B.

      Recertification.

    • C.

      Accreditation.

    • D.

      Identification.

    Correct Answer
    A. Authentication.
  • 48. 

    What are three primary ways to authenticate one-self?

    • A.

      Finger and voiceprints, or retinal scans.

    • B.

      Passwords, finger prints, or identification cards.

    • C.

      Passwords, fortezza cards, or identification cards.

    • D.

      Something you know, something you have, or something are.

    Correct Answer
    D. Something you know, something you have, or something are.
  • 49. 

    Knowledge-based identification and authentication methods require the user to provide something you

    • A.

      Know

    • B.

      Have

    • C.

      Need

    • D.

      Read

    Correct Answer
    A. Know
  • 50. 

    The Air Force requires a network password to be at least how many characters long?

    • A.

      6

    • B.

      7

    • C.

      8

    • D.

      9

    Correct Answer
    D. 9

Quiz Review Timeline +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 15, 2022
    Quiz Edited by
    ProProfs Editorial Team
  • Mar 17, 2011
    Quiz Created by
    Maldesto
Back to Top Back to top
Advertisement
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.