3D152 Ure Volume 2

Approved & Edited by ProProfs Editorial Team
The editorial team at ProProfs Quizzes consists of a select group of subject experts, trivia writers, and quiz masters who have authored over 10,000 quizzes taken by more than 100 million users. This team includes our in-house seasoned quiz moderators and subject matter experts. Our editorial experts, spread across the world, are rigorously trained using our comprehensive guidelines to ensure that you receive the highest quality quizzes.
Learn about Our Editorial Process
| By Marcus Zhou
M
Marcus Zhou
Community Contributor
Quizzes Created: 2 | Total Attempts: 3,632
Questions: 124 | Attempts: 1,915

SettingsSettingsSettings
3D152 Quizzes & Trivia

Questions and Answers
  • 1. 

    (201) At what Open System Interconnection (OSI) layer are virtual circuits established, maintained and terminated?

    • A.

      Network.

    • B.

      Physical.

    • C.

      Data Link.

    • D.

      Transport.

    Correct Answer
    D. Transport.
    Explanation
    At the Transport layer of the OSI model, virtual circuits are established, maintained, and terminated. This layer is responsible for end-to-end communication and ensures the reliable delivery of data between network devices. It establishes a logical connection between the sender and receiver, sets up parameters for data transmission, and manages flow control and error correction. The Transport layer also provides multiplexing and demultiplexing of data, allowing multiple applications to use the network simultaneously. Therefore, virtual circuits are handled at the Transport layer.

    Rate this question:

  • 2. 

    (201) Which of the following is an example of a video compression standard?

    • A.

      Motion Picture Experts Group-4 (MPEG-4).

    • B.

      Joint Photographic Expert Group (JPEG).

    • C.

      File Transfer Protocol (FTP).

    • D.

      G.711.

    Correct Answer
    A. Motion Picture Experts Group-4 (MPEG-4).
    Explanation
    MPEG-4 is a video compression standard developed by the Motion Picture Experts Group (MPEG). It is widely used for compressing and transmitting video files over the internet. JPEG, on the other hand, is a standard for compressing still images, not videos. FTP is a protocol used for transferring files, not for video compression. G.711 is a standard for compressing audio, not video. Therefore, the correct answer is Motion Picture Experts Group-4 (MPEG-4).

    Rate this question:

  • 3. 

    (202) In the Open System Interconnect (OSI) model, a layer will communicate with three other OSI layers. Which one is not one of those layers?

    • A.

      Layer above.

    • B.

      Layer below.

    • C.

      Lowest layer.

    • D.

      Peer layer.

    Correct Answer
    C. Lowest layer.
    Explanation
    In the Open System Interconnect (OSI) model, each layer communicates with the layer directly above and below it, as well as with its peer layer in another system. The lowest layer, also known as the physical layer, is responsible for the actual transmission of data over the physical medium, such as cables or wireless signals. It does not communicate with any other layers below it since it is the lowest layer in the hierarchy.

    Rate this question:

  • 4. 

    (203) What data communication protocol uses characters or "handshaking" to control the link and represent information?

    • A.

      Asynchronous protocol.

    • B.

      Binary synchronous protocol.

    • C.

      Synchronous Data Link Control (SDLC).

    • D.

      High-Level Data Link Control (HDLC).

    Correct Answer
    B. Binary synchronous protocol.
    Explanation
    Binary synchronous protocol is a data communication protocol that uses characters or "handshaking" to control the link and represent information. It is a synchronous protocol, meaning that data is transmitted in a continuous stream without start and stop bits. The protocol uses a specific sequence of characters to establish and maintain synchronization between the sender and receiver. It also provides error checking and flow control mechanisms to ensure reliable data transmission. Therefore, the correct answer is Binary synchronous protocol.

    Rate this question:

  • 5. 

    (203) In binary-synchronous protocol, which characters establishes and maintains character synchronization prior to the message block and during transmission?

    • A.

      SEQ.

    • B.

      SYN.

    • C.

      STX.

    • D.

      EST.

    Correct Answer
    B. SYN.
    Explanation
    In binary-synchronous protocol, the character "SYN" is used to establish and maintain character synchronization prior to the message block and during transmission. This character is responsible for ensuring that both the sender and receiver are in sync and ready to transmit and receive data. It helps to prevent any data corruption or loss during the transmission process.

    Rate this question:

  • 6. 

    (203) Which data communication protocol is based on bits and the position of the bits?

    • A.

      Character-oriented.

    • B.

      Bit-oriented.

    • C.

      Network.

    • D.

      Routing.

    Correct Answer
    B. Bit-oriented.
    Explanation
    Bit-oriented data communication protocol is based on the individual bits and their positions within a data stream. This protocol focuses on the manipulation and interpretation of the bits themselves, rather than treating them as part of larger characters or data units. It is commonly used in applications where precise control and synchronization of individual bits are required, such as in telecommunication systems or error detection and correction algorithms.

    Rate this question:

  • 7. 

    (203) Which data communication protocol is a transmission code that supports a variety of link types and topologies?

    • A.

      Asynchronous protocol.

    • B.

      Binary synchronous protocol

    • C.

      Synchronous Data Link Control (SDLC).

    • D.

      High-Level Data Link Control (HDLC).

    Correct Answer
    C. Synchronous Data Link Control (SDLC).
    Explanation
    SDLC is a data communication protocol that supports a variety of link types and topologies. It is a synchronous protocol, meaning that it uses a clock signal to synchronize the transmission and reception of data. SDLC is widely used in telecommunications and networking systems, and it provides reliable and efficient data transmission by ensuring error detection and correction, flow control, and data integrity. Asynchronous protocol does not support a variety of link types and topologies, while Binary Synchronous Protocol (BSP) and High-Level Data Link Control (HDLC) are specific protocols that are based on SDLC.

    Rate this question:

  • 8. 

    (204) Which network layer protocol matches a known Internet protocol (IP) address for a destination device to a Media Access Control (MAC) address?

    • A.

      IP.

    • B.

      Address Resolution Protocol (ARP).

    • C.

      Reverse Address Resolution Protocol (RARP).

    • D.

      Internet Control Message Protocol (ICMP).

    Correct Answer
    B. Address Resolution Protocol (ARP).
    Explanation
    The network layer protocol that matches a known IP address to a MAC address is the Address Resolution Protocol (ARP). ARP is responsible for mapping an IP address to its corresponding MAC address in order to establish communication between devices on a local network.

    Rate this question:

  • 9. 

    (204) Which Network layer protocol provides messaging that can help with troubleshooting?

    • A.

      Internet Protocol (IP).

    • B.

      Address Resolution Protocol (ARP).

    • C.

      Reserve Address Resolution Protocol (RARP).

    • D.

      Internet Control Message Protocol (ICMP).

    Correct Answer
    D. Internet Control Message Protocol (ICMP).
    Explanation
    ICMP is a network layer protocol that provides messaging capabilities to help with troubleshooting. It is used by network devices to send error messages and operational information, allowing network administrators to identify and diagnose network problems. ICMP messages include error reporting, echo requests, and echo replies, which can be used to test connectivity and measure network performance. Therefore, ICMP is the correct answer as it assists in troubleshooting network issues.

    Rate this question:

  • 10. 

    (204) Which Transport layer protocol provides reliable data delivery services?

    • A.

      Internet Protocol (IP).

    • B.

      User Datagram Protocol (UDP).

    • C.

      Transmission Control Protocol (TCP).

    • D.

      Internet Control Message Protocol (ICMP).

    Correct Answer
    C. Transmission Control Protocol (TCP).
    Explanation
    Transmission Control Protocol (TCP) provides reliable data delivery services. Unlike User Datagram Protocol (UDP), TCP ensures that data is delivered in the correct order and without errors. TCP uses acknowledgments and retransmissions to guarantee that all data packets are successfully received by the recipient. This makes TCP suitable for applications that require accurate and complete data transmission, such as file transfer and web browsing. Internet Protocol (IP), User Datagram Protocol (UDP), and Internet Control Message Protocol (ICMP) do not provide the same level of reliability as TCP.

    Rate this question:

  • 11. 

    (204) Which Application layer protocol is used to synchronize the clocks of computers on a network?

    • A.

      Simple Network Management Protocol (SNMP).

    • B.

      Dynamic Host Configuration Protocol (DHCP).

    • C.

      Network Time Protocol (NTP).

    • D.

      Packet Internet Groper (PING).

    Correct Answer
    C. Network Time Protocol (NTP).
    Explanation
    Network Time Protocol (NTP) is the correct answer because it is specifically designed to synchronize the clocks of computers on a network. NTP allows computers to accurately maintain time by synchronizing with a reference time source, such as an atomic clock or a time server. It ensures that all devices on the network have consistent and accurate time, which is crucial for various network operations, including authentication, logging, and coordination of distributed systems. SNMP, DHCP, and PING are not used for clock synchronization purposes.

    Rate this question:

  • 12. 

    (205) Which network Class has the most addresses for hosts?

    • A.

      A.

    • B.

      B.

    • C.

      C.

    • D.

      D.

    Correct Answer
    A. A.
    Explanation
    Network Class A has the most addresses for hosts because it uses a 32-bit address space, allowing for a maximum of 2^24 (16,777,216) host addresses. This class is typically assigned to large organizations and internet service providers, which require a large number of host addresses. Network Class B and C have progressively smaller address spaces, with Class B allowing for a maximum of 2^16 (65,536) host addresses and Class C allowing for a maximum of 2^8 (256) host addresses.

    Rate this question:

  • 13. 

    (205) How many subnet bits are required to support 90 subnets on a Class B network?

    • A.

      Three.

    • B.

      Five.

    • C.

      Seven.

    • D.

      Nine.

    Correct Answer
    C. Seven.
    Explanation
    To support 90 subnets on a Class B network, we need to determine the number of subnet bits required. A Class B network has a default subnet mask of 16 bits for the network portion. To calculate the number of subnet bits required, we need to find the smallest power of 2 that is equal to or greater than 90. The smallest power of 2 greater than 90 is 128, which requires 7 bits. Therefore, seven subnet bits are required to support 90 subnets on a Class B network.

    Rate this question:

  • 14. 

    (206) Internet protocol version 6 (IPv6) addresses are represented by

    • A.

      8 groups of dotted decimal numbers.

    • B.

      8 groups of hexadecimal numbers.

    • C.

      4 dotted decimal numbers.

    • D.

      128 decimal numbers.

    Correct Answer
    B. 8 groups of hexadecimal numbers.
    Explanation
    IPv6 addresses are represented by 8 groups of hexadecimal numbers. This is because IPv6 uses a 128-bit address format, which is much larger than the 32-bit address format used by IPv4. In order to represent this larger address space, IPv6 addresses are written in hexadecimal notation, with each group consisting of 4 hexadecimal digits. The groups are separated by colons, resulting in a total of 8 groups. This representation allows for a much larger number of unique addresses to be assigned, which is necessary to accommodate the growing number of devices connecting to the internet.

    Rate this question:

  • 15. 

    (206) Teredo has four tunneling components. Which one is not one of them?

    • A.

      Host-specific relay.

    • B.

      Client.

    • C.

      Server.

    • D.

      Agent.

    Correct Answer
    D. Agent.
    Explanation
    The question is asking about the tunneling components of Teredo. Teredo is an IPv6 transition technology that enables IPv6 connectivity for IPv4-only hosts. It has four tunneling components, which are host-specific relay, client, server, and agent. The correct answer is "Agent" because it is not one of the tunneling components of Teredo.

    Rate this question:

  • 16. 

    (207) Which device has multiport connectivity that directs data between nodes on a network?

    • A.

      Bridge.

    • B.

      Router.

    • C.

      Gateway.

    • D.

      Repeater.

    Correct Answer
    B. Router.
    Explanation
    A router is a device that has multiport connectivity and is responsible for directing data between nodes on a network. It determines the most efficient path for data packets to travel and forwards them accordingly. Unlike a bridge, which connects two separate networks, a router can connect multiple networks together. A gateway, on the other hand, is a device that connects a network to another network using different protocols. A repeater is a device that amplifies or regenerates signals to extend the reach of a network.

    Rate this question:

  • 17. 

    (207) Which routing protocol do internet backbones use?

    • A.

      Border Gateway Protocol (BGP).

    • B.

      Open Shortest Path First (OSPF).

    • C.

      Routing Information Protocol (RIP).

    • D.

      Enhanced Interior Gateway Routing Protocol (EIGRP).

    Correct Answer
    A. Border Gateway Protocol (BGP).
    Explanation
    Internet backbones use Border Gateway Protocol (BGP) as the routing protocol. BGP is designed to exchange routing and reachability information between different autonomous systems (AS) on the internet. It allows internet service providers (ISPs) to determine the most efficient paths for data traffic and enables the exchange of routing information between different networks. BGP is widely used in large-scale networks and is known for its scalability and ability to handle complex routing policies.

    Rate this question:

  • 18. 

    (208) Which router port is used for initial configuration?

    • A.

      Auxiliary.

    • B.

      Console.

    • C.

      Ethernet.

    • D.

      Telnet.

    Correct Answer
    B. Console.
    Explanation
    The console port is used for the initial configuration of a router. This port allows direct access to the router's command-line interface (CLI) through a console cable. By connecting a computer to the console port using a console cable, network administrators can configure the router using terminal emulation software. This port is typically used for initial setup, troubleshooting, and password recovery purposes. The auxiliary port, on the other hand, is used for remote access to the router. Ethernet and Telnet are not used for the initial configuration process.

    Rate this question:

  • 19. 

    (208) When configuring a router, you control access to privileged EXEC mode by configuring which password?

    • A.

      Line console.

    • B.

      Line vty.

    • C.

      Enable.

    • D.

      Secret.

    Correct Answer
    C. Enable.
    Explanation
    When configuring a router, the access to privileged EXEC mode is controlled by configuring the "enable" password. This password is used to authenticate users and grant them access to the privileged EXEC mode, which allows them to make configuration changes and access sensitive information on the router. The "line console" and "line vty" passwords are used to control access to the console and virtual terminal lines respectively, while the "secret" password is used to encrypt the enable password.

    Rate this question:

  • 20. 

    (208) On a router's serial interface connection, what provides the timing signal for the communication link?

    • A.

      Data communication equipment.

    • B.

      Data terminal equipment.

    • C.

      Internal oscillator.

    • D.

      Atomic clock.

    Correct Answer
    A. Data communication equipment.
    Explanation
    Data communication equipment provides the timing signal for the communication link on a router's serial interface connection. This equipment is responsible for transmitting and receiving data between devices, and it also ensures that the timing of the data transmission is synchronized between the sender and receiver. The timing signal is crucial for maintaining the integrity and accuracy of the data being transferred over the communication link.

    Rate this question:

  • 21. 

    (209) Virtual Private Networks (VPNs) allow the AF to extend network resources across a/an

    • A.

      Department of Defense Network.

    • B.

      Air Force Network.

    • C.

      Local Area Network.

    • D.

      A Public Network.

    Correct Answer
    D. A Public Network.
    Explanation
    Virtual Private Networks (VPNs) allow the AF to extend network resources across a public network. This means that the AF can securely access and utilize network resources from remote locations using the internet or any other public network. VPNs provide a secure connection by encrypting the data transmitted over the public network, ensuring confidentiality and integrity of the information being transmitted. This allows the AF to connect to and utilize resources on a public network as if they were directly connected to it, without compromising security.

    Rate this question:

  • 22. 

    (210) Which topology defines the way in which devices communicate and data is transmitted throughout the network?

    • A.

      Physical.

    • B.

      Logical.

    • C.

      Hybrid.

    • D.

      Star.

    Correct Answer
    B. Logical.
    Explanation
    The correct answer is logical because logical topology refers to the way in which devices communicate and data is transmitted throughout the network, regardless of the physical layout or connections. It defines how devices are logically connected and how data flows between them, such as through a bus, ring, or mesh network. Physical topology, on the other hand, refers to the physical layout and connections of devices in the network, such as star, bus, or ring. Hybrid topology is a combination of different physical topologies, while star topology is a specific type of physical topology where all devices are connected to a central hub.

    Rate this question:

  • 23. 

    (210) Which topology has the stations connected in the form of a circle?

    • A.

      Bus.

    • B.

      Ring.

    • C.

      Star.

    • D.

      Hybrid.

    Correct Answer
    B. Ring.
    Explanation
    The stations connected in the form of a circle refers to a ring topology. In a ring topology, each station is connected to two neighboring stations, forming a closed loop. Data is transmitted in one direction around the ring, with each station receiving and forwarding the data until it reaches its destination. This topology is commonly used in token ring networks, where a token is passed around the ring to control access to the network.

    Rate this question:

  • 24. 

    (210) Which topology combines two or more different physical topologies in a single network?

    • A.

      Bus.

    • B.

      Ring.

    • C.

      Star.

    • D.

      Hybrid.

    Correct Answer
    D. Hybrid.
    Explanation
    A hybrid topology combines two or more different physical topologies in a single network. This means that the network can have elements of different topologies such as bus, ring, and star. The hybrid topology allows for flexibility and scalability as it can adapt to different network requirements. It combines the advantages of multiple topologies while minimizing their limitations, making it a versatile choice for complex networks.

    Rate this question:

  • 25. 

    (211) Which device subdivides a network into smaller logical pieces, or segments?

    • A.

      Switch.

    • B.

      Firewall.

    • C.

      Gateway.

    • D.

      Repeater.

    Correct Answer
    A. Switch.
    Explanation
    A switch is a device that subdivides a network into smaller logical pieces or segments. It operates at the data link layer of the OSI model and is responsible for forwarding data packets between devices within a local area network (LAN). A switch learns the MAC addresses of connected devices and uses this information to efficiently transmit data to the appropriate destination. By dividing a network into segments, a switch improves network performance, reduces collisions, and increases overall network efficiency.

    Rate this question:

  • 26. 

    (211) The time it takes a switch to figure out where to forward a data unit is called its

    • A.

      Lag.

    • B.

      Hop.

    • C.

      Latency.

    • D.

      Time zone.

    Correct Answer
    C. Latency.
    Explanation
    Latency refers to the time it takes for a switch to determine the appropriate destination for a data unit. It is the delay caused by processing and forwarding the data. The other options, such as lag, hop, and time zone, are not relevant to the process of forwarding data in a switch.

    Rate this question:

  • 27. 

    (211) Which of the following is not a distinct layer of a hierarchical network design?

    • A.

      Core.

    • B.

      Access.

    • C.

      Transport.

    • D.

      Distribution.

    Correct Answer
    C. Transport.
    Explanation
    In a hierarchical network design, the core layer, access layer, and distribution layer are all distinct layers that serve different purposes. The core layer is responsible for high-speed backbone connectivity between different network segments. The access layer provides connectivity for end devices and users to the network. The distribution layer aggregates traffic from the access layer and provides routing and filtering functions. However, the transport layer is not a distinct layer in the hierarchical network design. It is a layer in the OSI model that is responsible for end-to-end communication between hosts and ensures reliable data delivery.

    Rate this question:

  • 28. 

    (214) Which physical security action can you take to ensure network equipment supports the widest range of security services?

    • A.

      Configure the equipment with the maximum amount of memory possible.

    • B.

      Configure the equipment to use a line console password.

    • C.

      Power cycle the equipment at the end of the duty day.

    • D.

      Configure the equipment using setup mode.

    Correct Answer
    A. Configure the equipment with the maximum amount of memory possible.
    Explanation
    By configuring the network equipment with the maximum amount of memory possible, it can support a wider range of security services. Memory plays a crucial role in the performance and functionality of network equipment. With more memory, the equipment can handle and store more data, allowing it to support various security services effectively. This includes features like encryption, firewall, intrusion detection systems, and other security measures that require additional memory resources. Therefore, by maximizing the equipment's memory capacity, it can provide a stronger and more comprehensive security infrastructure for the network.

    Rate this question:

  • 29. 

    How many broadcast domains forms a Virtual LAN (VLAN)?

    • A.

      1.

    • B.

      2.

    • C.

      3.

    • D.

      4.

    Correct Answer
    A. 1.
    Explanation
    A Virtual LAN (VLAN) is a logical division of a network into separate broadcast domains. By creating VLANs, network administrators can segment a network into smaller, isolated groups, allowing for better control and management of network traffic. Each VLAN forms its own broadcast domain, meaning that broadcast traffic is isolated within each VLAN and does not propagate to other VLANs. Therefore, only one broadcast domain is formed by a single VLAN.

    Rate this question:

  • 30. 

    (211) What allows transportation of all active Virtual LANs (VLAN) between switches using a single physical link?

    • A.

      VLAN trunks.

    • B.

      VLAN frames.

    • C.

      VLAN links.

    • D.

      VLAN ports.

    Correct Answer
    A. VLAN trunks.
    Explanation
    VLAN trunks allow for the transportation of all active VLANs between switches using a single physical link. A VLAN trunk is a network link that can carry multiple VLANs simultaneously, allowing for efficient and flexible network design. By using VLAN trunks, multiple VLANs can be transmitted over a single physical connection, eliminating the need for separate links for each VLAN. This enables the consolidation of network traffic and simplifies network management.

    Rate this question:

  • 31. 

    (211) Which of the following will minimize EtherChannel configuration problems?

    • A.

      Disable all the interfaces after creating the EtherChannel.

    • B.

      Configure all interfaces to operate at the same speed and duplex mode.

    • C.

      Configure all interfaces for the same parameters as the last port configured.

    • D.

      Assign all interfaces in the EtherChannel to a different Virtual LAN (VLAN).

    Correct Answer
    B. Configure all interfaces to operate at the same speed and duplex mode.
    Explanation
    Configuring all interfaces to operate at the same speed and duplex mode will minimize EtherChannel configuration problems. This ensures that all interfaces in the EtherChannel have consistent settings, preventing any mismatch or compatibility issues. By having the same speed and duplex mode, the interfaces can communicate effectively and efficiently, reducing the chances of errors or performance degradation. This configuration also simplifies troubleshooting as any issues related to speed or duplex mismatch can be eliminated.

    Rate this question:

  • 32. 

    (212) Which institute of Electrical Electronics Engineers (IEEE) specification is least susceptible to interference caused by household appliances and medical devices?

    • A.

      802.11a.

    • B.

      802.11b.

    • C.

      802.11g.

    • D.

      802.11r.

    Correct Answer
    A. 802.11a.
    Explanation
    The IEEE specification 802.11a operates in the 5 GHz frequency band, which is less crowded compared to the 2.4 GHz frequency band used by 802.11b and 802.11g. Household appliances and medical devices typically operate in the 2.4 GHz frequency band, so 802.11a is least susceptible to interference from these devices. 802.11r is a fast roaming standard and is not related to interference susceptibility.

    Rate this question:

  • 33. 

    (212) Which wireless design phase accounts for the amount of users on the network, the training required for the users and security and integrity requirements of the network data?

    • A.

      Planning.

    • B.

      Securing.

    • C.

      Deployment.

    • D.

      Management.

    Correct Answer
    A. Planning.
    Explanation
    The wireless design phase that accounts for the amount of users on the network, the training required for the users, and security and integrity requirements of the network data is planning. During the planning phase, the network designers analyze the requirements and constraints of the wireless network, including the number of users, their training needs, and the security measures needed to protect the network data. This phase helps in creating a solid foundation for the wireless network design and ensures that it meets the specific needs of the users and the organization.

    Rate this question:

  • 34. 

    (212) What identifier differentiates one wireless local area network (WLAN) from anther?

    • A.

      Host name.

    • B.

      Network name.

    • C.

      Service Set Identifier (SSID).

    • D.

      Virtual LAN Identifier (VLAN ID).

    Correct Answer
    C. Service Set Identifier (SSID).
    Explanation
    The Service Set Identifier (SSID) is the correct answer because it is a unique identifier that differentiates one wireless local area network (WLAN) from another. It is a case-sensitive alphanumeric string that is assigned to a WLAN and is used by wireless devices to connect to a specific network. The SSID allows devices to identify and connect to the correct network among multiple available networks in the vicinity.

    Rate this question:

  • 35. 

    (213) A Management Information Base (MIB) is a collection of information that is organized

    • A.

      Alphabetically.

    • B.

      Hierarchically.

    • C.

      Numerically.

    • D.

      Objectively.

    Correct Answer
    B. Hierarchically.
    Explanation
    A Management Information Base (MIB) is a collection of information that is organized hierarchically. This means that the information is structured in a hierarchical manner, with parent-child relationships between different levels of information. This organization allows for easier management and navigation of the information within the MIB, as it provides a clear structure and allows for efficient retrieval of specific data.

    Rate this question:

  • 36. 

    (213) Simple Network Management Protocol (SNMP) is a tool used by network administrators to manage network performance, investigate and solve network problems and help plan for

    • A.

      Future growth.

    • B.

      Network security.

    • C.

      Remote monitoring.

    • D.

      Network contingencies.

    Correct Answer
    A. Future growth.
    Explanation
    SNMP is a tool used by network administrators to manage network performance, investigate and solve network problems, and help plan for future growth. It allows administrators to monitor and gather information about network devices and their performance, which can be used to identify potential bottlenecks or areas that need improvement. By analyzing this data, administrators can make informed decisions about network upgrades or expansions to accommodate future growth and ensure the network remains efficient and reliable.

    Rate this question:

  • 37. 

    (214) In general, you should deny direct dial-in access to a network device by disabling which port?

    • A.

      Console.

    • B.

      Auxiliary.

    • C.

      Interface.

    • D.

      Virtual terminal.

    Correct Answer
    B. Auxiliary.
    Explanation
    Denying direct dial-in access to a network device can be achieved by disabling the auxiliary port. The auxiliary port is typically used for out-of-band management, allowing remote access to the device. By disabling this port, unauthorized users cannot directly dial into the network device, enhancing security. The console port is used for local management, the interface ports are used for network connectivity, and virtual terminal ports are used for remote access via telnet or SSH.

    Rate this question:

  • 38. 

    (215) Individual pulses within a digital signal are

    • A.

      Bits.

    • B.

      Bytes.

    • C.

      Codes.

    • D.

      Blocks.

    Correct Answer
    A. Bits.
    Explanation
    Individual pulses within a digital signal are referred to as bits. In digital communication, information is represented using binary digits or bits, which can have a value of either 0 or 1. These bits are transmitted as pulses, where each pulse represents a single bit of data. Therefore, the correct answer is bits.

    Rate this question:

  • 39. 

    (215) What is most commonly used in data systems to express signaling speed? 

    • A.

      Baud rate.

    • B.

      Interface speed.

    • C.

      Bits per second.

    • D.

      Baud per second.

    Correct Answer
    C. Bits per second.
    Explanation
    In data systems, the most commonly used term to express signaling speed is "bits per second." This refers to the number of bits that can be transmitted or processed in one second. Baud rate, interface speed, and baud per second are not as commonly used terminologies in this context.

    Rate this question:

  • 40. 

    (216) Which option is a characteristic of synchronous data operation?

    • A.

      Timing pulses are transmitted within the signal stream.

    • B.

      Start and stop pulses control data transmission.

    • C.

      System timing is not critical importance.

    • D.

      All data bits are the same length in time.

    Correct Answer
    D. All data bits are the same length in time.
    Explanation
    A characteristic of synchronous data operation is that all data bits are the same length in time. This means that each bit of data is transmitted for the same duration, ensuring that the receiver can accurately interpret the data. This allows for precise timing and synchronization between the sender and receiver, as they both operate on the assumption that each bit will be transmitted and received within the same timeframe. This characteristic is important in ensuring reliable and accurate data transmission.

    Rate this question:

  • 41. 

    (216) A digital signal that contains synchronizing bits within the signal stream describes

    • A.

      Synchronous operation.

    • B.

      Asynchronous operation.

    • C.

      Synchronous and/or isochronous operation.

    • D.

      Asynchronous and/or synchronous operation.

    Correct Answer
    B. Asynchronous operation.
    Explanation
    A digital signal that contains synchronizing bits within the signal stream describes asynchronous operation. This means that the signal does not rely on a fixed timing mechanism or clock to transmit data. Instead, the synchronizing bits are used to indicate the start and end of each data unit, allowing for flexibility in the timing of transmission. This allows for more efficient and reliable communication, especially in situations where there may be variations in the timing of data transmission.

    Rate this question:

  • 42. 

    (217) How many voltage levels does a binary signal have?

    • A.

      1.

    • B.

      2.

    • C.

      3.

    • D.

      4.

    Correct Answer
    B. 2.
    Explanation
    A binary signal has two voltage levels, typically represented as 0 and 1. These voltage levels correspond to the two possible states of a binary signal, indicating either the absence or presence of a signal. This is the fundamental characteristic of a binary signal, allowing for the representation and transmission of digital information.

    Rate this question:

  • 43. 

    (217) In what type of digital signal does the signal level move to one of the discrete signal levels, but returns to the zero level after a predetermined time?

    • A.

      Non-return-to-zero (NRZ) level.

    • B.

      NRZ mark.

    • C.

      NRZ space.

    • D.

      Return-to-zero

    Correct Answer
    D. Return-to-zero
    Explanation
    Return-to-zero is a type of digital signal where the signal level moves to one of the discrete signal levels and then returns to the zero level after a predetermined time. This means that the signal alternates between positive and negative levels, with a period of zero in between each level change. Unlike non-return-to-zero (NRZ) signals, which maintain a constant level until the next signal change, return-to-zero signals have a built-in mechanism to ensure that the signal returns to the zero level, providing synchronization and preventing signal distortion.

    Rate this question:

  • 44. 

    (218) Digital coding techniques such as binary with eight-zero substitution (B8ZS) are becoming more popular because they are designed to

    • A.

      Provide error-free signaling.

    • B.

      Operate at higher data rates.

    • C.

      Eliminate bipolar violations.

    • D.

      Maintain ones density standards.

    Correct Answer
    D. Maintain ones density standards.
    Explanation
    Digital coding techniques such as binary with eight-zero substitution (B8ZS) are designed to maintain ones density standards. Ones density refers to the ratio of ones to zeros in a digital signal. By substituting eight consecutive zeros with a specific pattern, B8ZS ensures that the density of ones is maintained, which is important for synchronization and clock recovery in high-speed digital communication systems. This coding technique helps in reducing errors and maintaining the integrity of the transmitted data.

    Rate this question:

  • 45. 

    (218) Which statement best describes a binary with eight-zero substitution (B8ZS) signal?

    • A.

      The information is transmitted in three different voltage levels.

    • B.

      A logic one is transmitted as positive voltage if the previous logic one was negative.

    • C.

      The level always returns to zero for 50 percent of the bit cycle after every transition.

    • D.

      Bipolar violations are intentionally inserted into a data signal to break up long strings of zeros.

    Correct Answer
    D. Bipolar violations are intentionally inserted into a data signal to break up long strings of zeros.
    Explanation
    A B8ZS signal is a type of line encoding used in telecommunications. It is designed to break up long strings of zeros in the data signal by intentionally inserting bipolar violations. This helps to ensure that the receiver can accurately detect the boundaries between bits and maintain synchronization. The other statements in the question do not accurately describe the characteristics of a B8ZS signal.

    Rate this question:

  • 46. 

    (219) How many bits are in the extended superframe format (ESF) framing sequence?

    • A.

      8.

    • B.

      12.

    • C.

      24.

    • D.

      48.

    Correct Answer
    C. 24.
    Explanation
    The extended superframe format (ESF) framing sequence consists of 24 bits. This framing sequence is used in T1 digital transmission systems to provide synchronization and framing information. It is composed of various bits that help in identifying the beginning and end of each frame, as well as in detecting errors in the transmission. Therefore, the correct answer is 24.

    Rate this question:

  • 47. 

    (220) The signaling equipment has three types of communications signals that functions to

    • A.

      Process switch addressing.

    • B.

      Control digit translations.

    • C.

      Control and process calls.

    • D.

      Provide a clear signal.

    Correct Answer
    C. Control and process calls.
    Explanation
    The signaling equipment has three types of communication signals that control and process calls. This means that the equipment is responsible for managing and handling phone calls, ensuring that they are routed correctly and that the necessary translations and addressing are performed. The signals play a crucial role in controlling the flow of calls and ensuring smooth communication.

    Rate this question:

  • 48. 

    (220) Which communications control signal uses a two-frequency dialing combination?

    • A.

      Pulse.

    • B.

      Tone.

    • C.

      Digit.

    • D.

      Address.

    Correct Answer
    B. Tone.
    Explanation
    The correct answer is "Tone" because tone dialing uses a two-frequency combination to transmit signals during phone communication. This method replaced the older pulse dialing system, which relied on mechanical switches to send electrical pulses corresponding to the dialed numbers. Tone dialing is more efficient and allows for faster and more accurate dialing.

    Rate this question:

  • 49. 

    (221) In common associated signaling (CAS), what is the seventh bit in frame 6 and 12 used for?

    • A.

      Bit robbing.

    • B.

      Bit stuffing.

    • C.

      Frame correction.

    • D.

      Frame enhancement.

    Correct Answer
    A. Bit robbing.
    Explanation
    In common associated signaling (CAS), the seventh bit in frame 6 and 12 is used for "bit robbing." Bit robbing refers to the process of stealing a bit from the least significant digit in order to transmit additional information. It is commonly used in telecommunication systems to transmit signaling information along with voice data. By robbing this bit, the system can convey important signaling information without affecting the voice quality or other data being transmitted.

    Rate this question:

  • 50. 

    (221) How is supervisory signaling information transferred in common channel signaling (CCS)?

    • A.

      Bit robbing.

    • B.

      Bit stuffing.

    • C.

      Frame correction.

    • D.

      Separate network channel.

    Correct Answer
    D. Separate network channel.
    Explanation
    In common channel signaling (CCS), supervisory signaling information is transferred through a separate network channel. This means that the signaling information is sent separately from the voice or data traffic, ensuring that it does not interfere with the main communication channel. This allows for more efficient and reliable signaling, as it is not affected by congestion or other issues that may occur in the main channel.

    Rate this question:

Quiz Review Timeline +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 21, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • May 18, 2016
    Quiz Created by
    Marcus Zhou
Back to Top Back to top
Advertisement