3d0x2 Volume 1 Self Test Questions

Approved & Edited by ProProfs Editorial Team
The editorial team at ProProfs Quizzes consists of a select group of subject experts, trivia writers, and quiz masters who have authored over 10,000 quizzes taken by more than 100 million users. This team includes our in-house seasoned quiz moderators and subject matter experts. Our editorial experts, spread across the world, are rigorously trained using our comprehensive guidelines to ensure that you receive the highest quality quizzes.
Learn about Our Editorial Process
| By Jonjapo
J
Jonjapo
Community Contributor
Quizzes Created: 1 | Total Attempts: 89
Questions: 33 | Attempts: 89

SettingsSettingsSettings
Internet Quizzes & Trivia

-


Questions and Answers
  • 1. 

    What is the ineternetwork?

    • A.

      When all the devices were physically connected to the same network, the MAC address was enough.

    • B.

      A set of subnets that are connected with routers to a larger network.

    • C.

      Base two number system that computer use to represent data.

    • D.

      A network environment that consists of computer systems from different vendors that run different OSs.

    Correct Answer
    B. A set of subnets that are connected with routers to a larger network.
    Explanation
    The correct answer is "A set of subnets that are connected with routers to a larger network." This answer accurately describes an internetwork as a collection of interconnected subnets that are connected through routers to form a larger network. This concept is commonly used in computer networking to describe the structure and connectivity of multiple networks.

    Rate this question:

  • 2. 

    What does a heterogeneous network environment consist of?

    • A.

      The systems management mechanism that monitors and controls data collection for the purpose of data analysis.

    • B.

      A bundle of application software designed to significantly improve network efficiency and productivity that specifically runs SNMP-based management applications.

    • C.

      A network environment that consists of computer systems from different vendors that run different OSs and communication protocols.

    • D.

      Where network personnel ract to a problem after it has occurred.

    Correct Answer
    C. A network environment that consists of computer systems from different vendors that run different OSs and communication protocols.
    Explanation
    A heterogeneous network environment refers to a network that includes computer systems from different vendors, running different operating systems and communication protocols. This means that the network is comprised of diverse hardware and software components, which can pose challenges for integration and interoperability. In such an environment, it is necessary to ensure compatibility and seamless communication between the various systems in order to maintain network efficiency and productivity.

    Rate this question:

  • 3. 

    A network of components from the same vendor or compatible equipment that all run under the same OS or NOS is what kind of network?

    • A.

      Homogeneous

    • B.

      Heterogeneous

    Correct Answer
    A. Homogeneous
    Explanation
    A network of components from the same vendor or compatible equipment that all run under the same OS or NOS is referred to as a homogeneous network. In this type of network, all the devices and software are uniform and seamlessly integrated, allowing for easier management, configuration, and troubleshooting. This uniformity promotes compatibility and interoperability among the network components, making it more efficient and reliable.

    Rate this question:

  • 4. 

    Which type of network is most common?

    • A.

      Homogeneous

    • B.

      Heterogeneous

    Correct Answer
    B. Heterogeneous
    Explanation
    A heterogeneous network is the most common type of network. This type of network consists of different types of devices, operating systems, and protocols. It allows for diverse devices to connect and communicate with each other, making it more versatile and flexible. In contrast, a homogeneous network consists of similar devices and operating systems, which is less common in practice. Therefore, the correct answer is heterogeneous.

    Rate this question:

  • 5. 

    What is a communications network that serves users within a confined geographical area?

    • A.

      WAN

    • B.

      LAN

    • C.

      GAN

    • D.

      MAN

    Correct Answer
    B. LAN
    Explanation
    A Local Area Network (LAN) is a communications network that serves users within a confined geographical area. LANs are commonly used in homes, offices, schools, and other small-scale settings. They allow devices to connect and share resources, such as files, printers, and internet access, within the local area. Unlike Wide Area Networks (WANs) that cover larger areas like cities or countries, LANs are limited to a specific location. Therefore, LAN is the correct answer for this question.

    Rate this question:

  • 6. 

    What type of network usually provides services for 2-10 users?

    • A.

      Peer-to-Peer

    • B.

      Single-server Network

    • C.

      Multi-server Network

    • D.

      Enterprise Network

    Correct Answer
    A. Peer-to-Peer
    Explanation
    A peer-to-peer network is a type of network that usually provides services for 2-10 users. In this type of network, each user has equal privileges and responsibilities, and they can share files, resources, and services directly with each other without the need for a central server. This decentralized approach is suitable for small-scale networks where the number of users is limited, making it an efficient and cost-effective solution for small businesses or home networks.

    Rate this question:

  • 7. 

    How many users does a single server network normally service?

    • A.

      2-10

    • B.

      10-50

    • C.

      50-250

    • D.

      250-1,000

    Correct Answer
    B. 10-50
    Explanation
    A single server network normally services between 10-50 users. This range is considered typical for a small to medium-sized network where a single server can handle the workload and provide sufficient resources for the connected users. The number of users within this range allows for efficient performance and optimal utilization of the server's capabilities.

    Rate this question:

  • 8. 

    What type of network can service 1000 or more users?

    • A.

      Peer-to-Peer

    • B.

      Single-Server

    • C.

      Multi-Server

    • D.

      Enterprise

    Correct Answer
    D. Enterprise
    Explanation
    An enterprise network is capable of servicing 1000 or more users. This type of network is designed to handle large-scale operations and can support a high volume of users simultaneously. It typically consists of multiple servers, routers, switches, and other networking devices to ensure efficient communication and data transfer. Enterprise networks are commonly used in large organizations or corporations where a large number of users need access to resources and services.

    Rate this question:

  • 9. 

    What is used for addressing on a physically connected network to identify network nodes?

    • A.

      MAC address

    • B.

      IP address

    • C.

      Subnet

    • D.

      Dotted decimal notation

    Correct Answer
    A. MAC address
    Explanation
    A MAC address, also known as a Media Access Control address, is used for addressing on a physically connected network to identify network nodes. It is a unique identifier assigned to each network interface card (NIC) or network adapter. The MAC address is used at the data link layer of the OSI model and is used by the network devices to communicate with each other within a local area network (LAN). Unlike an IP address, which can change based on network configurations, a MAC address is hard-coded into the network interface and remains constant.

    Rate this question:

  • 10. 

    What is the numbering system that computers use to represent data?

    • A.

      MAC

    • B.

      Binary

    • C.

      IP

    • D.

      Subnet

    Correct Answer
    B. Binary
    Explanation
    Computers use the binary numbering system to represent data. Binary is a base-2 system that uses only two digits, 0 and 1, to represent all numbers and symbols. This is because computers work with electronic circuits that can only distinguish between two states, on and off. Therefore, data is stored and processed in binary format, where each bit represents a 0 or 1. This allows computers to perform calculations and manipulate data efficiently using electronic circuits.

    Rate this question:

  • 11. 

    Within IP addressing, how many bits are used and how are they broken down?

    • A.

      8-bit is broken into 3 sets of 6 bits

    • B.

      16-bit is broken into 3 sets of 8 bits

    • C.

      32-bit is broken into 4 sets of 8 bits

    • D.

      64-bit is broken into 4 sets of 10 bits

    Correct Answer
    C. 32-bit is broken into 4 sets of 8 bits
    Explanation
    IP addressing is a method used to identify and locate devices on a network. In this case, the correct answer states that a 32-bit IP address is broken down into 4 sets of 8 bits. This means that the address is divided into four sections, with each section consisting of 8 bits or one byte. Each section represents a different component of the IP address, such as the network address and the host address. By breaking down the 32-bit address into 4 sets of 8 bits, it allows for a larger range of possible addresses to be assigned to devices on the network.

    Rate this question:

  • 12. 

    What mechanism is used to designate a part of an IP address as the network address, and other parts as the host address?

    • A.

      Network

    • B.

      IPv6

    • C.

      Subnet Mask

    • D.

      Host

    Correct Answer
    C. Subnet Mask
    Explanation
    A subnet mask is used to designate a part of an IP address as the network address and other parts as the host address. The subnet mask is a 32-bit value that is used to divide an IP address into two parts: the network address and the host address. It works by comparing each bit of the IP address with the corresponding bit in the subnet mask. If the bit in the subnet mask is set to 1, that part of the IP address is designated as the network address. If the bit in the subnet mask is set to 0, that part of the IP address is designated as the host address.

    Rate this question:

  • 13. 

    What is the primary reason for subnetting in IPv4?

    • A.

      To improve efficiency

    • B.

      To improve internet speed

    • C.

      To improve security

    • D.

      Both A and C

    Correct Answer
    D. Both A and C
    Explanation
    Subnetting in IPv4 is primarily done to improve efficiency and security. By dividing a large network into smaller subnets, it becomes easier to manage and control network traffic. This helps in optimizing the utilization of network resources and improving overall efficiency. Additionally, subnetting enhances security by creating smaller broadcast domains, which reduces the potential impact of network attacks and improves network isolation. Therefore, the primary reasons for subnetting in IPv4 are to improve efficiency and security.

    Rate this question:

  • 14. 

    What bits in an IP address are routers mainly concerned with?

    • A.

      Network/Subnet

    • B.

      Host/Subnet

    • C.

      Subnet Mask/Subnet

    • D.

      WAN

    Correct Answer
    A. Network/Subnet
    Explanation
    Routers are mainly concerned with the network/subnet bits in an IP address. This is because routers use these bits to determine the network portion of the IP address and make routing decisions based on it. The network/subnet bits help routers identify the destination network and determine the appropriate path for forwarding the data packets.

    Rate this question:

  • 15. 

    What is the Air Force instruction series that covers Network Management?

    • A.

      33

    • B.

      36

    • C.

      910

    • D.

      28

    Correct Answer
    A. 33
    Explanation
    Air Force Instruction (AFI) series 33 covers Network Management.

    Rate this question:

  • 16. 

    What establishes AF policy for responsibly acquiring, planning, and managing its information resources?

    • A.

      AFPD 33-1

    • B.

      AFPD 33-2

    • C.

      AFPD 33-104

    • D.

      AFPD 33-114

    Correct Answer
    A. AFPD 33-1
    Explanation
    AFPD 33-1 establishes the policy for the Air Force (AF) in responsibly acquiring, planning, and managing its information resources. This policy document provides guidelines and procedures for the effective and efficient use of information resources within the AF. It ensures that the AF's information resources are acquired and managed in a responsible manner, aligning with the overall goals and objectives of the organization. AFPD 33-1 helps to establish a framework for the responsible use and management of information resources, ensuring that they are utilized to support the AF's mission effectively.

    Rate this question:

  • 17. 

    What outlines standardized management practices and tells how to manage planning and implementation of communications and information systems and the base-level infrastructure?

    • A.

      AFPD 33-1

    • B.

      AFPD 33-2

    • C.

      AFPD 33-104

    • D.

      AFPD 33-112

    Correct Answer
    C. AFPD 33-104
    Explanation
    AFPD 33-104 outlines standardized management practices and provides guidance on how to manage planning and implementation of communications and information systems and the base-level infrastructure. This document specifically focuses on the management of information technology (IT) systems and infrastructure within the Air Force. It provides a framework for ensuring efficient and effective use of IT resources, as well as ensuring the security and reliability of communications and information systems.

    Rate this question:

  • 18. 

    What are three areas of distributed responsibility does the DIICC consist of?

    • A.

      Global, regional, and local events

    • B.

      Regional, local, and building

    • C.

      Local, building, and office

    • D.

      Building, office, and single user

    Correct Answer
    A. Global, regional, and local events
    Explanation
    The DIICC (Distributed Incident and Intelligence Center) consists of three areas of distributed responsibility: global, regional, and local events. This means that the center is responsible for handling incidents and intelligence at a global level, as well as at regional and local levels. By having distributed responsibility, the DIICC can effectively address and manage incidents and intelligence across different scales and locations, ensuring a comprehensive approach to security and response.

    Rate this question:

  • 19. 

    What is the system management mechanism that monitors and controls data collection for the purpose of data analysis and report generation on an OSI-based communications network?

    • A.

      Network Management

    • B.

      Performance Management

    • C.

      Quality Assurance

    • D.

      Planning and Implementation

    Correct Answer
    A. Network Management
    Explanation
    Network management is the correct answer because it refers to the system management mechanism that monitors and controls data collection on an OSI-based communications network. This includes tasks such as monitoring network performance, managing network devices, troubleshooting network issues, and generating reports on network performance and usage. Network management plays a crucial role in ensuring the smooth operation and optimization of the network infrastructure.

    Rate this question:

  • 20. 

    What is a bundle of application software designed to significantly improve network efficiency and productivity that specifically runs SNMP-based management applications?

    • A.

      Network Management

    • B.

      Network Management Server

    • C.

      Information resources Management

    • D.

      Quality Assurance

    Correct Answer
    B. Network Management Server
    Explanation
    A network management server is a bundle of application software designed to improve network efficiency and productivity. It specifically runs SNMP-based management applications, which allow for the monitoring and control of network devices. This server helps in managing and organizing network resources, ensuring smooth operations, and optimizing network performance.

    Rate this question:

  • 21. 

    Where should the NM Server be located?

    • A.

      INOSC

    • B.

      ESD

    • C.

      NCC

    • D.

      Your desk

    Correct Answer
    C. NCC
    Explanation
    The NM Server should be located in the NCC. The NCC, or Network Control Center, is typically the central hub for managing and monitoring network operations. Placing the NM Server in the NCC allows for easy access and control over the network management functions. It also ensures that the server is in close proximity to other network equipment and personnel, facilitating efficient communication and troubleshooting.

    Rate this question:

  • 22. 

    What are the three most common NM architectures?

    • A.

      Centralized, inactive, hierarchical

    • B.

      Hierarchical, reactive, distributed

    • C.

      Centralized, hierarchical, reactive

    • D.

      Centralized, hierarchical, distributed

    Correct Answer
    D. Centralized, hierarchical, distributed
    Explanation
    The three most common NM (Network Management) architectures are centralized, hierarchical, and distributed. In a centralized architecture, there is a single management entity that controls and monitors the entire network. In a hierarchical architecture, the network is divided into multiple levels or domains, with each level having its own management entity responsible for that specific domain. In a distributed architecture, the management functions are distributed among multiple entities or devices, allowing for more flexibility and scalability.

    Rate this question:

  • 23. 

    What is the process of obtaining data from the network and using that data to manage the setup of all managed network devices?

    • A.

      Network Management

    • B.

      Configuration Management

    • C.

      Quality Assurance

    • D.

      Implementation and Planning

    Correct Answer
    B. Configuration Management
    Explanation
    Configuration management is the process of obtaining data from the network and using that data to manage the setup of all managed network devices. It involves collecting information about the network devices, such as their configurations, settings, and performance data, and then using this information to ensure that the devices are properly configured and functioning as intended. Configuration management helps in maintaining the consistency and integrity of the network by providing a centralized approach to manage and control the network devices' configurations.

    Rate this question:

  • 24. 

    What consists of facilities needed to evaluate the behavior of network objects and the effectiveness of communications activities?

    • A.

      Network management

    • B.

      Performance management

    • C.

      Implementation and Planning

    • D.

      Network security

    Correct Answer
    B. Performance management
    Explanation
    Performance management consists of the facilities needed to evaluate the behavior of network objects and the effectiveness of communications activities. This includes monitoring network performance, analyzing data, and identifying areas for improvement. Performance management helps ensure that the network is functioning optimally and meeting the desired performance goals. It involves measuring and monitoring various performance metrics such as network latency, throughput, and availability to identify any issues and take appropriate actions to improve performance.

    Rate this question:

  • 25. 

    What is the protection of sensitive information on devices attached to a data network by controlling access points to that information?

    • A.

      Security Management

    • B.

      Quality Assurance

    • C.

      Planning and Implementation

    • D.

      Leaf Nodes

    Correct Answer
    A. Security Management
    Explanation
    Security management involves controlling access points to sensitive information on devices attached to a data network. It focuses on protecting the confidentiality, integrity, and availability of information by implementing security measures such as authentication, encryption, and access controls. By effectively managing security, organizations can ensure that only authorized individuals have access to sensitive information, reducing the risk of unauthorized access, data breaches, and other security incidents.

    Rate this question:

  • 26. 

    What is the process of identifying, locating and correcting network problems?

    • A.

      Network Management

    • B.

      Security Management

    • C.

      Fault Management

    • D.

      Labeled Nodes

    Correct Answer
    C. Fault Management
    Explanation
    Fault management is the process of identifying, locating, and correcting network problems. It involves monitoring and detecting any faults or issues in the network infrastructure, analyzing the root cause of the problem, and taking appropriate actions to resolve it. Fault management aims to ensure the smooth operation of the network by minimizing downtime and maximizing network performance. It includes tasks such as fault detection, fault isolation, fault diagnosis, and fault resolution.

    Rate this question:

  • 27. 

    Unreliable delivery of packets, need for polling, and limited information derived from responses are examples of some drawbacks to what as a NM tool?

    • A.

      Tracert

    • B.

      Get

    • C.

      ICMP Pinging

    • D.

      MIB

    Correct Answer
    C. ICMP Pinging
    Explanation
    ICMP Pinging is a network management tool that allows administrators to check the availability and responsiveness of network devices. However, it has some drawbacks. One drawback is the unreliable delivery of packets, which means that some packets may get lost or delayed during transmission, leading to inaccurate results. Another drawback is the need for polling, which requires continuous sending of ICMP echo requests to the target device, consuming network resources. Additionally, ICMP Pinging provides limited information derived from responses, often only indicating whether the device is reachable or not, without providing detailed insights into its performance or configuration.

    Rate this question:

  • 28. 

    What is a hierarchical, structured format that defines the NM information available from network devices?

    • A.

      IAB

    • B.

      TCP

    • C.

      SNMP

    • D.

      MIB

    Correct Answer
    D. MIB
    Explanation
    A hierarchical, structured format that defines the NM information available from network devices is called MIB (Management Information Base). MIB provides a standardized way to organize and access data from network devices, allowing network administrators to monitor and manage the devices efficiently. It is used in conjunction with SNMP (Simple Network Management Protocol) to collect and manage information about network devices such as routers, switches, and servers. MIB contains a collection of objects that represent various aspects of the device's configuration, performance, and status.

    Rate this question:

  • 29. 

    What are the two categories of SNMP(Simple Network Management Protocol)?

    • A.

      Manager, and user

    • B.

      User, and agent

    • C.

      Agent and customer

    • D.

      Manager and agent

    Correct Answer
    D. Manager and agent
    Explanation
    SNMP (Simple Network Management Protocol) has two main categories: Manager and Agent. The Manager is responsible for controlling and monitoring network devices, collecting data, and sending commands to the agents. On the other hand, the Agent is a software module or device that resides on the managed network device and provides information to the Manager upon request. The Manager-Agent relationship is essential for efficient network management and communication.

    Rate this question:

  • 30. 

    What query retrieves the value of one instance of management information?

    • A.

      Getnext

    • B.

      Get

    • C.

      Ping

    • D.

      Retrieve

    Correct Answer
    B. Get
    Explanation
    The correct answer is "Get". In network management, the "Get" query is used to retrieve the value of one instance of management information. This query is commonly used in SNMP (Simple Network Management Protocol) to retrieve information from network devices such as routers, switches, and servers. By sending a "Get" query, the management system can request specific information or variables from the managed device and receive the corresponding value in response.

    Rate this question:

  • 31. 

    The Common information model(CIM) has two hierarchies, physical and logical.

    • A.

      True

    • B.

      False

    Correct Answer
    A. True
    Explanation
    The Common Information Model (CIM) is a standard that defines how managed elements in an IT environment can be represented as a common set of objects and relationships. One of the key features of CIM is its hierarchical structure, which includes two main hierarchies: physical and logical. The physical hierarchy represents the physical components of the IT infrastructure, such as servers, storage devices, and network devices. The logical hierarchy, on the other hand, represents the logical relationships and dependencies between these components. Therefore, the statement that the CIM has two hierarchies, physical and logical, is true.

    Rate this question:

  • 32. 

    What are the three main components to SMARTS?

    • A.

      Domain manager, client, customer

    • B.

      Agent, customer, brokner

    • C.

      Domain manager, broker, customer

    • D.

      Domain manger, broker, client

    Correct Answer
    D. Domain manger, broker, client
    Explanation
    The three main components of SMARTS are the domain manager, broker, and client. The domain manager is responsible for managing the domain and its resources. The broker acts as an intermediary between the domain manager and the client, facilitating communication and transactions. The client is the end-user or customer who interacts with the system and utilizes its services.

    Rate this question:

  • 33. 

    What modifies the value of one or more instances of management information?

    • A.

      Get

    • B.

      GetNext

    • C.

      Ping

    • D.

      Set

    Correct Answer
    D. Set
    Explanation
    The correct answer is "Set". In the context of management information, "Set" refers to the action of modifying the value of one or more instances of management information. This action allows for the adjustment or updating of the information, potentially changing its values or properties. The other options, "Get", "GetNext", and "Ping" do not involve modifying the information, but rather retrieving or checking its status. Therefore, "Set" is the most appropriate choice for modifying the value of management information.

    Rate this question:

Quiz Review Timeline +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 21, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • May 25, 2012
    Quiz Created by
    Jonjapo
Back to Top Back to top
Advertisement
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.