3D152 Ure Volume 2

Reviewed by Editorial Team
The ProProfs editorial team is comprised of experienced subject matter experts. They've collectively created over 10,000 quizzes and lessons, serving over 100 million users. Our team includes in-house content moderators and subject matter experts, as well as a global network of rigorously trained contributors. All adhere to our comprehensive editorial guidelines, ensuring the delivery of high-quality content.
Learn about Our Editorial Process
| By Marcus Zhou
M
Marcus Zhou
Community Contributor
Quizzes Created: 2 | Total Attempts: 3,632
| Attempts: 1,915 | Questions: 124
Please wait...
Question 1 / 124
0 %
0/100
Score 0/100
1. (206) Internet protocol version 6 (IPv6) addresses are represented by

Explanation

IPv6 addresses are represented by 8 groups of hexadecimal numbers. This is because IPv6 uses a 128-bit address format, which is much larger than the 32-bit address format used by IPv4. In order to represent this larger address space, IPv6 addresses are written in hexadecimal notation, with each group consisting of 4 hexadecimal digits. The groups are separated by colons, resulting in a total of 8 groups. This representation allows for a much larger number of unique addresses to be assigned, which is necessary to accommodate the growing number of devices connecting to the internet.

Submit
Please wait...
About This Quiz
Communication Quizzes & Trivia

This quiz, titled '3D152 URE Volume 2', tests knowledge on OSI layers, video compression standards, and data communication protocols. It's designed for learners in the Air Force communications sector, focusing on essential IT and networking skills.

Tell us your name to personalize your report, certificate & get on the leaderboard!
2. (210) Which topology has the stations connected in the form of a circle?

Explanation

The stations connected in the form of a circle refers to a ring topology. In a ring topology, each station is connected to two neighboring stations, forming a closed loop. Data is transmitted in one direction around the ring, with each station receiving and forwarding the data until it reaches its destination. This topology is commonly used in token ring networks, where a token is passed around the ring to control access to the network.

Submit
3. (210) Which topology combines two or more different physical topologies in a single network?

Explanation

A hybrid topology combines two or more different physical topologies in a single network. This means that the network can have elements of different topologies such as bus, ring, and star. The hybrid topology allows for flexibility and scalability as it can adapt to different network requirements. It combines the advantages of multiple topologies while minimizing their limitations, making it a versatile choice for complex networks.

Submit
4. (249) In an Intrusion Detection System (IDS), what is the main purpose of a boundary fence?

Explanation

The main purpose of a boundary fence in an Intrusion Detection System (IDS) is to present a physical and psychological deterrent to unauthorized entry. The fence acts as a barrier that makes it difficult for intruders to enter the protected area, thereby discouraging unauthorized access. Additionally, the presence of a boundary fence can create a psychological deterrent by signaling that the area is protected and increasing the perception of risk for potential intruders. This helps to enhance the overall security of the IDS by reducing the likelihood of unauthorized entry.

Submit
5. (240) What should security policies encompass to help mitigate the threat of convergence?

Explanation

Security policies should encompass both voice and data networks to help mitigate the threat of convergence. Convergence refers to the integration of voice and data networks, which can introduce new vulnerabilities and risks. By including both voice and data networks in security policies, organizations can ensure that comprehensive measures are in place to protect against potential threats and attacks. This approach acknowledges the interconnected nature of these networks and the need for a holistic approach to security.

Submit
6. (211) What allows transportation of all active Virtual LANs (VLAN) between switches using a single physical link?

Explanation

VLAN trunks allow for the transportation of all active VLANs between switches using a single physical link. A VLAN trunk is a network link that can carry multiple VLANs simultaneously, allowing for efficient and flexible network design. By using VLAN trunks, multiple VLANs can be transmitted over a single physical connection, eliminating the need for separate links for each VLAN. This enables the consolidation of network traffic and simplifies network management.

Submit
7. (239) The three cornerstones of voice network system security are availability,

Explanation

The three cornerstones of voice network system security are confidentiality and integrity. Confidentiality ensures that only authorized individuals can access and view sensitive information, preventing unauthorized disclosure. Integrity ensures that the data and information within the system remains accurate, complete, and unaltered, protecting against unauthorized modifications or tampering. Availability and circumvention are not mentioned as cornerstones of voice network system security in this context.

Submit
8. (218) Which statement best describes a binary with eight-zero substitution (B8ZS) signal?

Explanation

A B8ZS signal is a type of line encoding used in telecommunications. It is designed to break up long strings of zeros in the data signal by intentionally inserting bipolar violations. This helps to ensure that the receiver can accurately detect the boundaries between bits and maintain synchronization. The other statements in the question do not accurately describe the characteristics of a B8ZS signal.

Submit
9. (212) What identifier differentiates one wireless local area network (WLAN) from anther?

Explanation

The Service Set Identifier (SSID) is the correct answer because it is a unique identifier that differentiates one wireless local area network (WLAN) from another. It is a case-sensitive alphanumeric string that is assigned to a WLAN and is used by wireless devices to connect to a specific network. The SSID allows devices to identify and connect to the correct network among multiple available networks in the vicinity.

Submit
10. (201) Which of the following is an example of a video compression standard?

Explanation

MPEG-4 is a video compression standard developed by the Motion Picture Experts Group (MPEG). It is widely used for compressing and transmitting video files over the internet. JPEG, on the other hand, is a standard for compressing still images, not videos. FTP is a protocol used for transferring files, not for video compression. G.711 is a standard for compressing audio, not video. Therefore, the correct answer is Motion Picture Experts Group-4 (MPEG-4).

Submit
11. (240) What are attempts to gain access to a switch system by posing as an authorized user?

Explanation

Masquerades refer to attempts to gain access to a switch system by posing as an authorized user. This involves impersonating someone with legitimate access privileges in order to bypass security measures and gain unauthorized entry. It is a form of social engineering where the attacker disguises their identity to deceive the system and gain unauthorized access.

Submit
12. (208) Which router port is used for initial configuration?

Explanation

The console port is used for the initial configuration of a router. This port allows direct access to the router's command-line interface (CLI) through a console cable. By connecting a computer to the console port using a console cable, network administrators can configure the router using terminal emulation software. This port is typically used for initial setup, troubleshooting, and password recovery purposes. The auxiliary port, on the other hand, is used for remote access to the router. Ethernet and Telnet are not used for the initial configuration process.

Submit
13. (204) Which Application layer protocol is used to synchronize the clocks of computers on a network?

Explanation

Network Time Protocol (NTP) is the correct answer because it is specifically designed to synchronize the clocks of computers on a network. NTP allows computers to accurately maintain time by synchronizing with a reference time source, such as an atomic clock or a time server. It ensures that all devices on the network have consistent and accurate time, which is crucial for various network operations, including authentication, logging, and coordination of distributed systems. SNMP, DHCP, and PING are not used for clock synchronization purposes.

Submit
14. (203) Which data communication protocol is based on bits and the position of the bits?

Explanation

Bit-oriented data communication protocol is based on the individual bits and their positions within a data stream. This protocol focuses on the manipulation and interpretation of the bits themselves, rather than treating them as part of larger characters or data units. It is commonly used in applications where precise control and synchronization of individual bits are required, such as in telecommunication systems or error detection and correction algorithms.

Submit
15. (229) Which agency is the preferred transport provider for Internet and commercial satellite connections used for voice, video and/or data services on DOD networks?

Explanation

The Defense Information System Agency (DISA) is the preferred transport provider for Internet and commercial satellite connections used for voice, video, and/or data services on DOD networks. DISA is responsible for providing secure and reliable communication and information technology services to the Department of Defense. They work with commercial providers to ensure that DOD networks have the necessary connectivity for their communication needs. The National Security Agency (NSA) is primarily responsible for intelligence and cybersecurity, while the Air Force Space Command (AFPC) focuses on space operations. Therefore, DISA is the most appropriate choice for this role.

Submit
16. (211) Which device subdivides a network into smaller logical pieces, or segments?

Explanation

A switch is a device that subdivides a network into smaller logical pieces or segments. It operates at the data link layer of the OSI model and is responsible for forwarding data packets between devices within a local area network (LAN). A switch learns the MAC addresses of connected devices and uses this information to efficiently transmit data to the appropriate destination. By dividing a network into segments, a switch improves network performance, reduces collisions, and increases overall network efficiency.

Submit
17. (251) Which interior intrusion detection system (IIDS) sensor uses heat radiation to detect intruders?

Explanation

Passive infrared sensors use heat radiation to detect intruders. These sensors detect the infrared energy emitted by living beings and objects in their surroundings. When an intruder enters the range of the sensor, the heat radiation emitted by their body triggers the sensor, alerting the system of the intrusion. Ultrasonic sensors use sound waves, microwave sensors use microwave radiation, and dual-phenomenology sensors combine multiple detection methods, but neither of them specifically use heat radiation to detect intruders.

Submit
18. (204) Which Transport layer protocol provides reliable data delivery services?

Explanation

Transmission Control Protocol (TCP) provides reliable data delivery services. Unlike User Datagram Protocol (UDP), TCP ensures that data is delivered in the correct order and without errors. TCP uses acknowledgments and retransmissions to guarantee that all data packets are successfully received by the recipient. This makes TCP suitable for applications that require accurate and complete data transmission, such as file transfer and web browsing. Internet Protocol (IP), User Datagram Protocol (UDP), and Internet Control Message Protocol (ICMP) do not provide the same level of reliability as TCP.

Submit
19. (213) A Management Information Base (MIB) is a collection of information that is organized

Explanation

A Management Information Base (MIB) is a collection of information that is organized hierarchically. This means that the information is structured in a hierarchical manner, with parent-child relationships between different levels of information. This organization allows for easier management and navigation of the information within the MIB, as it provides a clear structure and allows for efficient retrieval of specific data.

Submit
20. (209) Virtual Private Networks (VPNs) allow the AF to extend network resources across a/an

Explanation

Virtual Private Networks (VPNs) allow the AF to extend network resources across a public network. This means that the AF can securely access and utilize network resources from remote locations using the internet or any other public network. VPNs provide a secure connection by encrypting the data transmitted over the public network, ensuring confidentiality and integrity of the information being transmitted. This allows the AF to connect to and utilize resources on a public network as if they were directly connected to it, without compromising security.

Submit
21. (210) Which topology defines the way in which devices communicate and data is transmitted throughout the network?

Explanation

The correct answer is logical because logical topology refers to the way in which devices communicate and data is transmitted throughout the network, regardless of the physical layout or connections. It defines how devices are logically connected and how data flows between them, such as through a bus, ring, or mesh network. Physical topology, on the other hand, refers to the physical layout and connections of devices in the network, such as star, bus, or ring. Hybrid topology is a combination of different physical topologies, while star topology is a specific type of physical topology where all devices are connected to a central hub.

Submit
22. (204) Which network layer protocol matches a known Internet protocol (IP) address for a destination device to a Media Access Control (MAC) address?

Explanation

The network layer protocol that matches a known IP address to a MAC address is the Address Resolution Protocol (ARP). ARP is responsible for mapping an IP address to its corresponding MAC address in order to establish communication between devices on a local network.

Submit
23. (211) The time it takes a switch to figure out where to forward a data unit is called its

Explanation

Latency refers to the time it takes for a switch to determine the appropriate destination for a data unit. It is the delay caused by processing and forwarding the data. The other options, such as lag, hop, and time zone, are not relevant to the process of forwarding data in a switch.

Submit
24. (215) What is most commonly used in data systems to express signaling speed? 

Explanation

In data systems, the most commonly used term to express signaling speed is "bits per second." This refers to the number of bits that can be transmitted or processed in one second. Baud rate, interface speed, and baud per second are not as commonly used terminologies in this context.

Submit
25. (217) In what type of digital signal does the signal level move to one of the discrete signal levels, but returns to the zero level after a predetermined time?

Explanation

Return-to-zero is a type of digital signal where the signal level moves to one of the discrete signal levels and then returns to the zero level after a predetermined time. This means that the signal alternates between positive and negative levels, with a period of zero in between each level change. Unlike non-return-to-zero (NRZ) signals, which maintain a constant level until the next signal change, return-to-zero signals have a built-in mechanism to ensure that the signal returns to the zero level, providing synchronization and preventing signal distortion.

Submit
26. (202) In the Open System Interconnect (OSI) model, a layer will communicate with three other OSI layers. Which one is not one of those layers?

Explanation

In the Open System Interconnect (OSI) model, each layer communicates with the layer directly above and below it, as well as with its peer layer in another system. The lowest layer, also known as the physical layer, is responsible for the actual transmission of data over the physical medium, such as cables or wireless signals. It does not communicate with any other layers below it since it is the lowest layer in the hierarchy.

Submit
27. (203) In binary-synchronous protocol, which characters establishes and maintains character synchronization prior to the message block and during transmission?

Explanation

In binary-synchronous protocol, the character "SYN" is used to establish and maintain character synchronization prior to the message block and during transmission. This character is responsible for ensuring that both the sender and receiver are in sync and ready to transmit and receive data. It helps to prevent any data corruption or loss during the transmission process.

Submit
28. (222) The signal components that occur as bands above and below a carrier are called

Explanation

When a carrier signal is modulated, it results in the creation of additional signal components called sidebands. These sidebands occur above and below the carrier frequency and carry the modulating information. They are responsible for encoding the variations in the amplitude, frequency, or phase of the carrier signal. Therefore, the correct answer is sidebands.

Submit
29. (249) In an Intrusion Detection System (IDS), what must a line of detection detect?

Explanation

The correct answer is "Walking, running, rolling, crawling or jumping through the line of detection." In an Intrusion Detection System (IDS), the line of detection refers to the boundary or area that the system is monitoring. The purpose of the IDS is to detect any unauthorized or suspicious activities within this line of detection. Therefore, the line of detection must be able to detect various types of movement such as walking, running, rolling, crawling, or jumping, indicating potential intruders trying to breach the system.

Submit
30. (215) Individual pulses within a digital signal are

Explanation

Individual pulses within a digital signal are referred to as bits. In digital communication, information is represented using binary digits or bits, which can have a value of either 0 or 1. These bits are transmitted as pulses, where each pulse represents a single bit of data. Therefore, the correct answer is bits.

Submit
31. (252) What type alarm occurs if the sensor post cover in vertical taut-wire sensor (VTWS) is removed?

Explanation

The correct answer is "Tamper." In a vertical taut-wire sensor (VTWS), if the sensor post cover is removed, it indicates tampering. This alarm is triggered to alert that someone has tampered with the sensor, potentially compromising its functionality or security.

Submit
32. (242) The primary reason you should measure the voltage across faulty terminal protectors before removing and replacing them is to

Explanation

The primary reason for measuring the voltage across faulty terminal protectors before removing and replacing them is to ensure dangerous voltages are not present on the line. This is important for safety reasons as working with live circuits can be hazardous. By measuring the voltage, one can determine if there are any dangerous levels present and take appropriate precautions before proceeding with the replacement.

Submit
33. (217) How many voltage levels does a binary signal have?

Explanation

A binary signal has two voltage levels, typically represented as 0 and 1. These voltage levels correspond to the two possible states of a binary signal, indicating either the absence or presence of a signal. This is the fundamental characteristic of a binary signal, allowing for the representation and transmission of digital information.

Submit
34. (207) Which device has multiport connectivity that directs data between nodes on a network?

Explanation

A router is a device that has multiport connectivity and is responsible for directing data between nodes on a network. It determines the most efficient path for data packets to travel and forwards them accordingly. Unlike a bridge, which connects two separate networks, a router can connect multiple networks together. A gateway, on the other hand, is a device that connects a network to another network using different protocols. A repeater is a device that amplifies or regenerates signals to extend the reach of a network.

Submit
35. (204) Which Network layer protocol provides messaging that can help with troubleshooting?

Explanation

ICMP is a network layer protocol that provides messaging capabilities to help with troubleshooting. It is used by network devices to send error messages and operational information, allowing network administrators to identify and diagnose network problems. ICMP messages include error reporting, echo requests, and echo replies, which can be used to test connectivity and measure network performance. Therefore, ICMP is the correct answer as it assists in troubleshooting network issues.

Submit
36. (205) Which network Class has the most addresses for hosts?

Explanation

Network Class A has the most addresses for hosts because it uses a 32-bit address space, allowing for a maximum of 2^24 (16,777,216) host addresses. This class is typically assigned to large organizations and internet service providers, which require a large number of host addresses. Network Class B and C have progressively smaller address spaces, with Class B allowing for a maximum of 2^16 (65,536) host addresses and Class C allowing for a maximum of 2^8 (256) host addresses.

Submit
37. (250) The basic configuration of the entry control facility includes a

Explanation

The basic configuration of an entry control facility includes a gatehouse, personnel entry gate, inspection equipment, and a vehicle entrapment area. This setup ensures that there is a designated area for security personnel to monitor and control access to the facility. The gatehouse serves as a central point for security operations, while the personnel entry gate allows authorized individuals to enter. The inspection equipment is used to screen individuals and their belongings for any prohibited items. Lastly, the vehicle entrapment area provides a secure space for vehicles to be inspected before entering the facility.

Submit
38. (214) Which physical security action can you take to ensure network equipment supports the widest range of security services?

Explanation

By configuring the network equipment with the maximum amount of memory possible, it can support a wider range of security services. Memory plays a crucial role in the performance and functionality of network equipment. With more memory, the equipment can handle and store more data, allowing it to support various security services effectively. This includes features like encryption, firewall, intrusion detection systems, and other security measures that require additional memory resources. Therefore, by maximizing the equipment's memory capacity, it can provide a stronger and more comprehensive security infrastructure for the network.

Submit
39. (213) Simple Network Management Protocol (SNMP) is a tool used by network administrators to manage network performance, investigate and solve network problems and help plan for

Explanation

SNMP is a tool used by network administrators to manage network performance, investigate and solve network problems, and help plan for future growth. It allows administrators to monitor and gather information about network devices and their performance, which can be used to identify potential bottlenecks or areas that need improvement. By analyzing this data, administrators can make informed decisions about network upgrades or expansions to accommodate future growth and ensure the network remains efficient and reliable.

Submit
40. (207) Which routing protocol do internet backbones use?

Explanation

Internet backbones use Border Gateway Protocol (BGP) as the routing protocol. BGP is designed to exchange routing and reachability information between different autonomous systems (AS) on the internet. It allows internet service providers (ISPs) to determine the most efficient paths for data traffic and enables the exchange of routing information between different networks. BGP is widely used in large-scale networks and is known for its scalability and ability to handle complex routing policies.

Submit
41. (236) Who determines if Preventative Maintenance Inspection (PMI) are accomplished when commercial manuals or publications are not available?

Explanation

The flight commander is responsible for determining if Preventative Maintenance Inspections (PMI) are accomplished when commercial manuals or publications are not available. This is because the flight commander has the authority and knowledge to make decisions regarding maintenance procedures and inspections in the absence of specific guidelines from manuals or publications. They are responsible for ensuring the overall maintenance and safety of the aircraft, and therefore have the authority to determine if PMIs should be carried out in such situations.

Submit
42. (229) What web application is used to order telecommunications products and services from the Defense Information System Agency (DISA)?

Explanation

DISA Direct Order Entry (DDOE) is the correct answer because it is the web application used to order telecommunications products and services from the Defense Information System Agency (DISA). The other options, FaCIT, CIPS, and TCOSS, are not mentioned as the web applications used for this purpose.

Submit
43. (230) If the circuit files are lost or destroyed, what document are Technical Control Facilities required to obtain?

Explanation

Technical Control Facilities are required to obtain the latest telecommunication service order (TSO) that reflects the current end-to-end circuit configuration if the circuit files are lost or destroyed. This document will provide the necessary information about the circuit configuration and help in restoring the circuit to its previous state. The original TSO and the original circuit test data may not be sufficient as they might not reflect any changes or updates made after their creation. The latest TSO and the latest circuit test data ensure that the circuit is restored accurately.

Submit
44. (232) Trend analysis is a program that ensures circuits meet management thresholds on what basis?

Explanation

Trend analysis is a program that ensures circuits meet management thresholds on a monthly basis. This means that the program analyzes data and tracks trends over a period of one month to determine if circuits are meeting the required thresholds set by management. It is not done on a daily, weekly, or annual basis, but specifically on a monthly basis.

Submit
45. (212) Which wireless design phase accounts for the amount of users on the network, the training required for the users and security and integrity requirements of the network data?

Explanation

The wireless design phase that accounts for the amount of users on the network, the training required for the users, and security and integrity requirements of the network data is planning. During the planning phase, the network designers analyze the requirements and constraints of the wireless network, including the number of users, their training needs, and the security measures needed to protect the network data. This phase helps in creating a solid foundation for the wireless network design and ensures that it meets the specific needs of the users and the organization.

Submit
46. (208) When configuring a router, you control access to privileged EXEC mode by configuring which password?

Explanation

When configuring a router, the access to privileged EXEC mode is controlled by configuring the "enable" password. This password is used to authenticate users and grant them access to the privileged EXEC mode, which allows them to make configuration changes and access sensitive information on the router. The "line console" and "line vty" passwords are used to control access to the console and virtual terminal lines respectively, while the "secret" password is used to encrypt the enable password.

Submit
47. (214) In general, you should deny direct dial-in access to a network device by disabling which port?

Explanation

Denying direct dial-in access to a network device can be achieved by disabling the auxiliary port. The auxiliary port is typically used for out-of-band management, allowing remote access to the device. By disabling this port, unauthorized users cannot directly dial into the network device, enhancing security. The console port is used for local management, the interface ports are used for network connectivity, and virtual terminal ports are used for remote access via telnet or SSH.

Submit
48. How many broadcast domains forms a Virtual LAN (VLAN)?

Explanation

A Virtual LAN (VLAN) is a logical division of a network into separate broadcast domains. By creating VLANs, network administrators can segment a network into smaller, isolated groups, allowing for better control and management of network traffic. Each VLAN forms its own broadcast domain, meaning that broadcast traffic is isolated within each VLAN and does not propagate to other VLANs. Therefore, only one broadcast domain is formed by a single VLAN.

Submit
49. (211) Which of the following will minimize EtherChannel configuration problems?

Explanation

Configuring all interfaces to operate at the same speed and duplex mode will minimize EtherChannel configuration problems. This ensures that all interfaces in the EtherChannel have consistent settings, preventing any mismatch or compatibility issues. By having the same speed and duplex mode, the interfaces can communicate effectively and efficiently, reducing the chances of errors or performance degradation. This configuration also simplifies troubleshooting as any issues related to speed or duplex mismatch can be eliminated.

Submit
50. (227) What do Global Positioning System (GPS) satellites use to provide very precise time to GPS receivers?

Explanation

GPS satellites use atomic clocks to provide very precise time to GPS receivers. Atomic clocks are extremely accurate timekeeping devices that rely on the vibrations of atoms to measure time. By using atomic clocks, GPS satellites can accurately calculate the time it takes for signals to travel from the satellite to the receiver, allowing for precise positioning and navigation. Crystal oscillators, internal timing, and station clocks are not as accurate as atomic clocks and therefore cannot provide the same level of precision in timekeeping for GPS satellites.

Submit
51. (212) Which institute of Electrical Electronics Engineers (IEEE) specification is least susceptible to interference caused by household appliances and medical devices?

Explanation

The IEEE specification 802.11a operates in the 5 GHz frequency band, which is less crowded compared to the 2.4 GHz frequency band used by 802.11b and 802.11g. Household appliances and medical devices typically operate in the 2.4 GHz frequency band, so 802.11a is least susceptible to interference from these devices. 802.11r is a fast roaming standard and is not related to interference susceptibility.

Submit
52. (242) What is the maximum number of ports that a Meridian System Logic - 100 (MSL-100) supports?

Explanation

The Meridian System Logic - 100 (MSL-100) supports a maximum of 30,000 ports.

Submit
53. (222) What is the process, or result of the process, of modifying (varying) one or more characteristics of a carrier signal in accordance with an instantaneous characteristic of an information signal?

Explanation

Modulation is the process or result of modifying one or more characteristics of a carrier signal in accordance with an instantaneous characteristic of an information signal. This process allows the information signal to be transmitted over a carrier signal, such as in radio or telecommunications systems. Modulation is essential for transmitting and receiving signals accurately and efficiently, as it allows the information to be encoded onto the carrier signal and then decoded at the receiving end.

Submit
54. (252) What type of signal is sent to the fence protection system (FPS) signal processor when an alarm is detected?

Explanation

When an alarm is detected in the fence protection system (FPS), an analog signal is sent to the signal processor. An analog signal is a continuous signal that represents information by varying its voltage or current levels. In the context of the FPS, this analog signal would likely indicate the location or intensity of the alarm, allowing the system to accurately detect and respond to any breaches or disturbances in the fence.

Submit
55. (205) How many subnet bits are required to support 90 subnets on a Class B network?

Explanation

To support 90 subnets on a Class B network, we need to determine the number of subnet bits required. A Class B network has a default subnet mask of 16 bits for the network portion. To calculate the number of subnet bits required, we need to find the smallest power of 2 that is equal to or greater than 90. The smallest power of 2 greater than 90 is 128, which requires 7 bits. Therefore, seven subnet bits are required to support 90 subnets on a Class B network.

Submit
56. (231) What report must be sent if the circuit does not meet all required parameters and the Telecommunications Service Order (TSO) issuing authority advises that the circuit is accepted for service?

Explanation

If the circuit does not meet all required parameters but is still accepted for service by the TSO issuing authority, a report must be sent indicating the exception. This means that there is an acknowledgment that the circuit does not meet all the necessary parameters, but it is still being accepted for service due to certain circumstances or considerations. The report will likely outline the specific parameters that are not met and any actions or precautions that need to be taken.

Submit
57. (240) What provides enterprise wide visibility into telecom resource utilization, phone network usage and incidents of toll fraud?

Explanation

The Enterprise Telephony Management System is the correct answer because it is designed to provide enterprise-wide visibility into telecom resource utilization, phone network usage, and incidents of toll fraud. This system allows organizations to monitor and manage their telephony infrastructure effectively, ensuring optimal utilization of resources and detecting any fraudulent activities. It provides detailed reports and analytics, allowing businesses to make informed decisions and take necessary actions to improve efficiency and security in their telephony networks.

Submit
58. (237) When a telephone network is circuit switched, each call

Explanation

In a circuit-switched telephone network, each call has a dedicated circuit created by the switch. This means that a specific path is established between the calling and receiving parties for the duration of the call. This dedicated circuit ensures a continuous connection and guarantees that the resources are exclusively allocated to that call, providing consistent and reliable communication. Unlike packet-switched networks, where data is divided into packets and transmitted separately, circuit-switched networks keep the connection open throughout the call, allowing for real-time and uninterrupted communication.

Submit
59. (206) Teredo has four tunneling components. Which one is not one of them?

Explanation

The question is asking about the tunneling components of Teredo. Teredo is an IPv6 transition technology that enables IPv6 connectivity for IPv4-only hosts. It has four tunneling components, which are host-specific relay, client, server, and agent. The correct answer is "Agent" because it is not one of the tunneling components of Teredo.

Submit
60. (235) Combined distribution frames encompass the functions of a main distribution frame and

Explanation

Combined distribution frames encompass the functions of a main distribution frame and an intermediate distribution frame. This means that they serve as a central point for connecting various communication lines and distributing them to different areas. The main distribution frame is responsible for connecting external lines, while the intermediate distribution frame handles the connection of internal lines. By combining these two functions into one frame, it simplifies the organization and management of communication lines within a network.

Submit
61. (227) Which stratum level is a Global Positioning System (GPS) timing source?

Explanation

A Global Positioning System (GPS) timing source is considered to be at the stratum level 1. This means that it is a highly accurate and reliable time source that is directly connected to a reference clock, such as an atomic clock. Stratum 1 devices are typically used as primary time sources and provide the most accurate time synchronization for computer networks and other systems that require precise timing.

Submit
62. (242) What Digital Multiplex System (DMS)-100 system contains subsystems for test routing fault detection, fault analysis and error reporting?

Explanation

The correct answer is Maintenance and administration position. The DMS-100 system contains subsystems for test routing fault detection, fault analysis, and error reporting. These functions are typically performed by the maintenance and administration position, which is responsible for monitoring and managing the system's performance and identifying and resolving any faults or errors that may occur. This position utilizes various tools and resources, such as visual display units, digital trunk controllers, and line concentrating modules, to carry out these tasks effectively.

Submit
63. (216) Which option is a characteristic of synchronous data operation?

Explanation

A characteristic of synchronous data operation is that all data bits are the same length in time. This means that each bit of data is transmitted for the same duration, ensuring that the receiver can accurately interpret the data. This allows for precise timing and synchronization between the sender and receiver, as they both operate on the assumption that each bit will be transmitted and received within the same timeframe. This characteristic is important in ensuring reliable and accurate data transmission.

Submit
64. (226) Which wave-division multiplexing technology uses uncooled lasers to reduce cost?

Explanation

Coarse wave division multiplexing (CWDM) is a wave-division multiplexing technology that uses uncooled lasers to reduce cost. By using uncooled lasers, CWDM eliminates the need for expensive temperature control mechanisms, making it a more cost-effective solution compared to other wave-division multiplexing technologies such as dense wave division multiplexing (DWDM) or long wave division multiplexing (LWDM). CWDM allows multiple wavelengths of light to be combined and transmitted over a single optical fiber, increasing the capacity of the network without the need for additional fiber optic cables.

Submit
65. (229) What document is the authority for the operations and maintenance agencies to procure specific devices and ancillary equipment necessary for the installation or operation of the circuit?

Explanation

The authority for operations and maintenance agencies to procure specific devices and ancillary equipment necessary for the installation or operation of the circuit is the Telecommunications service order. This document outlines the specific details and requirements for the procurement process, ensuring that the necessary equipment is obtained for the circuit's functioning.

Submit
66. (222) To prevent frequency modulation (FM) radio stations from interfering with each other, the Federal Communications Commission (FCC) has set limits that allow each station to cause its oscillator frequency to deviate no more than

Explanation

To prevent interference between FM radio stations, the FCC has set limits on the amount of frequency deviation allowed for each station. The correct answer is 75 kHz because this is the maximum amount of deviation allowed for each station. This means that the oscillator frequency of a station can vary by up to 75 kHz from its assigned frequency. This ensures that there is enough separation between stations to avoid interference and maintain clear reception for listeners.

Submit
67. (224) Which form of multiplexing is very susceptible to signal deterioration?

Explanation

Frequency-division multiplexing (FDM) is a form of multiplexing where multiple signals are combined and transmitted simultaneously over a shared medium by allocating different frequency ranges to each signal. However, FDM is very susceptible to signal deterioration because it relies on separating signals based on their frequency. Factors such as interference and noise can cause the signals to overlap and degrade the quality of the transmitted signals. This can result in a loss of data and a decrease in the overall performance of the multiplexed system.

Submit
68. (251) Which interior intrusion detection system is designed to detect intruders attempting to enter a shelter, storage igloo or building?

Explanation

The AN/GSS-39 interior intrusion detection system is specifically designed to detect intruders attempting to enter a shelter, storage igloo, or building. This system is likely equipped with sensors and alarms that can detect unauthorized entry and alert security personnel. The other options, AN/GSS-42, AN/GSS-41, and AN/GSS-29, are not specifically designed for detecting intruders attempting to enter a shelter, storage igloo, or building.

Submit
69. (244) Which Digital Multiplex System (DMS)-100 database facility is responsible for creating and maintaining tables of data in a controlled manner?

Explanation

Table control is the correct answer because it refers to the Digital Multiplex System (DMS)-100 database facility responsible for creating and maintaining tables of data in a controlled manner. This facility ensures that the data in the tables is organized and managed effectively, allowing for efficient access and retrieval of information. The other options, such as journal file, dump/restore, and pending order file, do not specifically pertain to the creation and maintenance of tables in a controlled manner.

Submit
70. (238) In Integrated Services Digital Network (ISDN), the "B" channel carries

Explanation

In Integrated Services Digital Network (ISDN), the "B" channel is responsible for carrying user traffic. This means that it is used to transmit the actual data, such as voice, video, or internet traffic, between the user's device and the network. The "B" channel is separate from the "D" channel, which is used for call setup and signaling purposes. Therefore, the correct answer is user traffic.

Submit
71. (220) The signaling equipment has three types of communications signals that functions to

Explanation

The signaling equipment has three types of communication signals that control and process calls. This means that the equipment is responsible for managing and handling phone calls, ensuring that they are routed correctly and that the necessary translations and addressing are performed. The signals play a crucial role in controlling the flow of calls and ensuring smooth communication.

Submit
72. (220) Which communications control signal uses a two-frequency dialing combination?

Explanation

The correct answer is "Tone" because tone dialing uses a two-frequency combination to transmit signals during phone communication. This method replaced the older pulse dialing system, which relied on mechanical switches to send electrical pulses corresponding to the dialed numbers. Tone dialing is more efficient and allows for faster and more accurate dialing.

Submit
73. (240) Which is not a characteristic and capability of a voice protection system?

Explanation

The given options describe various characteristics and capabilities of a voice protection system. Securing communications refers to the system's ability to protect voice communications from unauthorized access or interception. Enabling real-time notifications means that the system can provide immediate alerts or updates regarding any security threats or breaches. Detecting and blocking inbound and outbound modem connections indicates the system's ability to monitor and control modem connections to prevent unauthorized access. However, centralizing yet distribution management does not directly relate to the characteristics and capabilities of a voice protection system, making it the correct answer.

Submit
74. (245) What names are given to the shifted R-Y and B-Y signals, respectively?

Explanation

The shifted R-Y and B-Y signals are referred to as I (in-phase) and Q (quadrature).

Submit
75. (231) Within how many normal duty hours of completion action on the Telecommunications Service Order (TSO) must the circuit control office (CCO) submit an in-effect report?

Explanation

Within 72 normal duty hours of completion action on the Telecommunications Service Order (TSO), the circuit control office (CCO) must submit an in-effect report. This report is necessary to ensure that the TSO has been successfully implemented and is functioning as intended. It allows for proper documentation and tracking of the TSO's progress and effectiveness.

Submit
76. (246) Which digital broadcast system was adopted by the United States as the standard?

Explanation

The correct answer is Advanced Television Systems Committee. The Advanced Television Systems Committee (ATSC) is the digital broadcast system that was adopted by the United States as the standard. This system is responsible for the transmission and reception of digital television signals, ensuring high-quality audio and video for viewers. It replaced the previous analog broadcast system and allowed for the transition to digital television in the United States.

Submit
77. (240) Which is not a component of the voice protection system architecture?

Explanation

The voice protection system architecture consists of components such as servers, software, and appliances. These components work together to ensure the security and protection of voice communications. However, a firewall is not typically considered a component of the voice protection system architecture. Firewalls are primarily used to monitor and control network traffic, but they do not directly contribute to the protection of voice communications.

Submit
78. (221) In common associated signaling (CAS), what is the seventh bit in frame 6 and 12 used for?

Explanation

In common associated signaling (CAS), the seventh bit in frame 6 and 12 is used for "bit robbing." Bit robbing refers to the process of stealing a bit from the least significant digit in order to transmit additional information. It is commonly used in telecommunication systems to transmit signaling information along with voice data. By robbing this bit, the system can convey important signaling information without affecting the voice quality or other data being transmitted.

Submit
79. (225) What are the two major type of frame structures?

Explanation

The correct answer is CCITT and low speed. CCITT stands for Comité Consultatif International Téléphonique et Télégraphique, which is an international organization that sets standards for telecommunications. Low speed refers to slower data transmission rates, while high speed refers to faster rates. Therefore, CCITT and low speed are the two major types of frame structures.

Submit
80. (225) The method of multiplexing the T1 multiplexer uses is

Explanation

The correct answer is time division. Time division multiplexing (TDM) is a method used by T1 multiplexers to transmit multiple signals over a single communication channel. In TDM, each input signal is given a specific time slot, and these time slots are interleaved to create a composite signal for transmission. This allows multiple signals to be transmitted simultaneously without interference.

Submit
81. (232) If a circuit fails its management threshold, what test might be performed?

Explanation

If a circuit fails its management threshold, the appropriate test that might be performed is quality control. Quality control involves inspecting and testing the circuit to ensure that it meets the required standards and specifications. This test is essential to identify any faults or deficiencies in the circuit and to ensure its proper functioning. Operational acceptance, test and acceptance, and operations and maintenance are not directly related to addressing a circuit failure, making them incorrect options.

Submit
82. (240) Where are voice protection system servers installed?

Explanation

The voice protection system servers are installed in the Integrated Network and Security Center. This is the most suitable location as it ensures centralized control and monitoring of the voice protection system across the Air Force network. Placing the servers in the Integrated Network and Security Center allows for efficient management and coordination of voice protection measures, ensuring the security and integrity of voice communications within the Air Force.

Submit
83. (247) What does the GVG-110 video switcher serial interface allow?

Explanation

The GVG-110 video switcher serial interface allows for remote control of all switcher functions by a personal computer. This means that the switcher can be controlled and operated from a computer, allowing for more convenience and flexibility in managing and manipulating the switcher's functions. This feature enables users to have greater control over the switcher and its operations, enhancing the overall efficiency and effectiveness of video production processes.

Submit
84. (230) Which DD form do you use for an official narrative log that is often used to brief unit commander?

Explanation

The correct answer is 1753 because it is the DD form used for an official narrative log that is often used to brief unit commander. This form is specifically designed for this purpose and provides a standardized format for recording and presenting information in a clear and concise manner. It ensures that all relevant details are included and allows for easy reference and understanding by the unit commander.

Submit
85. (243) Where do incoming (unswitched) circuits transmitted to the ENET enter the NT9X35A cross-point card?

Explanation

Incoming circuits transmitted to the NT9X35A cross-point card enter through the Vertical bus (V-bus).

Submit
86. (252) What is the secondary mode of detection for the microwave fence sensor?

Explanation

The secondary mode of detection for the microwave fence sensor is multipath reflection. This means that the sensor detects variations in the reflected microwave signals caused by objects or obstacles in the vicinity of the fence. Multipath reflection occurs when the microwave signals bounce off surfaces such as walls, buildings, or trees, creating multiple paths for the signals to reach the sensor. By analyzing these reflections, the sensor can detect any disturbances or intrusions near the fence.

Submit
87. The vulnerabilities of voice and data converged networks were highlighted in a report released by the

Explanation

The correct answer is the President's National Security Telecommunications Advisory Committee. The question asks about the report that highlighted the vulnerabilities of voice and data converged networks. The President's National Security Telecommunications Advisory Committee is a government organization that provides advice and recommendations to the President on matters related to national security and telecommunications. Therefore, it is likely that they released the report discussing the vulnerabilities of voice and data converged networks.

Submit
88. (219) How many bits are in the extended superframe format (ESF) framing sequence?

Explanation

The extended superframe format (ESF) framing sequence consists of 24 bits. This framing sequence is used in T1 digital transmission systems to provide synchronization and framing information. It is composed of various bits that help in identifying the beginning and end of each frame, as well as in detecting errors in the transmission. Therefore, the correct answer is 24.

Submit
89. (221) Which common channel signaling (CCS) mode does the transfer of message relating to signaling between two points occur directly over links interconnecting the signaling points?

Explanation

In the Associated mode of Common Channel Signaling (CCS), the transfer of signaling messages occurs directly over links that connect the signaling points. This means that the signaling messages are sent between the specific points involved in the communication, without any intermediate or additional signaling points. This mode is typically used for point-to-point signaling, where the signaling points have a direct connection and there is no need for additional routing or signaling intermediaries.

Submit
90. (252) What is the maximum detection distance in meters of an Infrared Pulsed Intrusion Detection System (IPIDS)?

Explanation

The maximum detection distance of an Infrared Pulsed Intrusion Detection System (IPIDS) is 80 meters.

Submit
91. (227) To create a better timing environment in communication networks, external timing distribution occurs through

Explanation

External timing distribution occurs through station clocks in order to create a better timing environment in communication networks. Station clocks are synchronized clocks that are used to distribute accurate timing signals throughout the network. These clocks ensure that all devices in the network are operating on the same time reference, which is crucial for maintaining the integrity and efficiency of the communication system. By using station clocks for timing distribution, the network can achieve precise synchronization, minimize timing errors, and optimize the overall performance of the communication network.

Submit
92. (201) At what Open System Interconnection (OSI) layer are virtual circuits established, maintained and terminated?

Explanation

At the Transport layer of the OSI model, virtual circuits are established, maintained, and terminated. This layer is responsible for end-to-end communication and ensures the reliable delivery of data between network devices. It establishes a logical connection between the sender and receiver, sets up parameters for data transmission, and manages flow control and error correction. The Transport layer also provides multiplexing and demultiplexing of data, allowing multiple applications to use the network simultaneously. Therefore, virtual circuits are handled at the Transport layer.

Submit
93. (242) Which elements make up the control component of the SuperNode central control?

Explanation

The control component of the SuperNode central control is made up of the computing mode (CM) and the system load module (SLM). These elements are responsible for managing and controlling the operations of the SuperNode system. The computing mode determines the mode in which the system operates, while the system load module monitors and manages the system's workload. Together, these elements ensure efficient and effective control of the SuperNode central control.

Submit
94. (234) When you restore user service by rerouting, what is the second type of circuit you preempt?

Explanation

When restoring user service by rerouting, the second type of circuit that is preempted is nonactive on-call circuits. These circuits are not currently in use and can be temporarily taken out of service in order to prioritize the restoration of user service.

Submit
95. (228) Who is responsible for all circuits within their facility up to the designated demarcation point and provides troubleshooting assistance at the direction of the Global NetOps Support Center (GNSC)?

Explanation

The Node Side Coordinator is responsible for all circuits within their facility up to the designated demarcation point and provides troubleshooting assistance at the direction of the Global NetOps Support Center (GNSC).

Submit
96. (242) What link is used to connect the Digital Multiplex System (DMS)-core to the DMS-bus?

Explanation

The link used to connect the Digital Multiplex System (DMS)-core to the DMS-bus is DS-512.

Submit
97. (211) Which of the following is not a distinct layer of a hierarchical network design?

Explanation

In a hierarchical network design, the core layer, access layer, and distribution layer are all distinct layers that serve different purposes. The core layer is responsible for high-speed backbone connectivity between different network segments. The access layer provides connectivity for end devices and users to the network. The distribution layer aggregates traffic from the access layer and provides routing and filtering functions. However, the transport layer is not a distinct layer in the hierarchical network design. It is a layer in the OSI model that is responsible for end-to-end communication between hosts and ensures reliable data delivery.

Submit
98. (208) On a router's serial interface connection, what provides the timing signal for the communication link?

Explanation

Data communication equipment provides the timing signal for the communication link on a router's serial interface connection. This equipment is responsible for transmitting and receiving data between devices, and it also ensures that the timing of the data transmission is synchronized between the sender and receiver. The timing signal is crucial for maintaining the integrity and accuracy of the data being transferred over the communication link.

Submit
99. Which DD form is used as the primary source of information when preparing DOD Information Network (DODIN) status reports?

Explanation

DD Form 1443 is used as the primary source of information when preparing DOD Information Network (DODIN) status reports. This form is specifically designed for reporting DODIN status and provides a standardized format for collecting and reporting relevant information. It includes sections for reporting network status, security posture, outages, and other critical information. By using DD Form 1443, organizations can ensure consistent and accurate reporting of DODIN status, which is essential for monitoring and managing the network effectively.

Submit
100. (230) Which test results do you record on the reverse/back side of the DD form 1697-Analog?

Explanation

On the reverse/back side of the DD form 1697-Analog, you record the test results for frequency response and envelop delay. This means that you would document the performance of the system in terms of its ability to accurately reproduce frequencies across the entire audio spectrum and the delay in the transmission of the signal.

Submit
101. (223) Which type of pulse modulation is least affected by noise?

Explanation

Pulse-code modulation (PCM) is a type of pulse modulation that encodes analog signals into digital form by sampling the amplitude of the signal at regular intervals and quantizing the samples into discrete values. This digital representation is less susceptible to noise interference compared to other forms of pulse modulation such as pulse-amplitude modulation (PAM), pulse-duration modulation (PDM), and pulse-position modulation (PPM). PCM uses error detection and correction techniques to minimize the impact of noise, making it the least affected by noise among the given options.

Submit
102. (240) During the initial research for voice system security, who recognized that the most common security threats could be addressed by voice protection system?

Explanation

The Air Force Information Warfare Battle Lab recognized that the most common security threats could be addressed by a voice protection system.

Submit
103. (241) How many serial data interface ports does the Meridian Option 11C Small System Controller have?

Explanation

The Meridian Option 11C Small System Controller has 3 serial data interface ports.

Submit
104. (248) Which basic circuit in the video distribution amplifier consists of two transistors that form the upper leg of a totem pole circuit?

Explanation

The correct answer is Output driver. In a video distribution amplifier, the output driver circuit consists of two transistors that form the upper leg of a totem pole circuit. This circuit is responsible for driving the output signal to the desired level and impedance, ensuring that the signal can be properly distributed to multiple devices without degradation. The other options mentioned, such as equalizer and peaking amp, fixed gain and level shift, and variable gain amp, do not specifically refer to the circuit that forms the upper leg of a totem pole circuit.

Submit
105. (223) The form of pulse modulation in which a discrete pulse is varied within a range of positions is known as

Explanation

Pulse-position modulation is a form of pulse modulation where the position of a discrete pulse within a time interval is varied to represent information. In this modulation technique, the amplitude and duration of the pulse remain constant, but the position of the pulse within the time interval is changed. This allows for the transmission of multiple discrete pulses within the same time interval, increasing the data transmission capacity. Therefore, pulse-position modulation is the correct answer in this case.

Submit
106. (228) Which agency has responsibility for a circuit end-to-end?

Explanation

The Circuit Control Office (CCO) is responsible for managing a circuit end-to-end. They oversee the control and coordination of the circuit, ensuring its proper functioning and troubleshooting any issues that may arise. The Defense Information System Agency (DISA) is a separate agency that provides information technology and communication support to the Department of Defense. The Network Control Center (NCC) and Node Side Coordinator (NSC) may have roles in managing specific aspects of the network, but the CCO is specifically responsible for the circuit itself.

Submit
107. (216) A digital signal that contains synchronizing bits within the signal stream describes

Explanation

A digital signal that contains synchronizing bits within the signal stream describes asynchronous operation. This means that the signal does not rely on a fixed timing mechanism or clock to transmit data. Instead, the synchronizing bits are used to indicate the start and end of each data unit, allowing for flexibility in the timing of transmission. This allows for more efficient and reliable communication, especially in situations where there may be variations in the timing of data transmission.

Submit
108. (251) What does the AN/GSS-39(V) system use to monitor the integrity of all sensor wiring to the control panel?

Explanation

The AN/GSS-39(V) system uses the end-of-line module to monitor the integrity of all sensor wiring to the control panel. This module is responsible for detecting any breaks or faults in the wiring and ensures that the system is functioning properly. It acts as a safeguard to ensure that all sensors are properly connected and functioning, providing accurate monitoring and control of the system.

Submit
109. (218) Digital coding techniques such as binary with eight-zero substitution (B8ZS) are becoming more popular because they are designed to

Explanation

Digital coding techniques such as binary with eight-zero substitution (B8ZS) are designed to maintain ones density standards. Ones density refers to the ratio of ones to zeros in a digital signal. By substituting eight consecutive zeros with a specific pattern, B8ZS ensures that the density of ones is maintained, which is important for synchronization and clock recovery in high-speed digital communication systems. This coding technique helps in reducing errors and maintaining the integrity of the transmitted data.

Submit
110. (252) How many sensors does a taut-wire system in the  Y taut-wire sensor (YTWS) configuration contain?

Explanation

A taut-wire system in the Y taut-wire sensor (YTWS) configuration contains 12 sensors. This configuration consists of three perpendicular wires, with four sensors attached to each wire. Therefore, when all the sensors are combined, there are a total of 12 sensors in the YTWS configuration.

Submit
111. (252) What is the maximum length of the vertical taut-wire sensor (VTWS)?

Explanation

The maximum length of the vertical taut-wire sensor (VTWS) is 328 feet. This means that the sensor can accurately measure distances up to 328 feet vertically.

Submit
112. (252) How many vertical taut-wire sensor (VTWS) sectors can be serviced per field distribution box (FDB)?

Explanation

The correct answer is 2. This means that each field distribution box (FDB) can service two vertical taut-wire sensor (VTWS) sectors. This suggests that the FDB has the capacity to support and distribute signals from two VTWS sectors, allowing for monitoring and detection in those specific areas.

Submit
113. (223) Which form of modulation is insensitive to signal variations?

Explanation

Binary-phase shift keying (BPSK) is a form of modulation that is insensitive to signal variations. In BPSK, the phase of the carrier signal is shifted by 180 degrees to represent different binary values. This means that the amplitude and frequency of the carrier signal remain constant, regardless of the signal variations. As a result, BPSK is less susceptible to noise and interference, making it a robust modulation technique for communication systems. Delta modulation, frequency shift keying, and pulse-amplitude modulation are all sensitive to signal variations and can be affected by noise and interference.

Submit
114. (223) Which publication lists the methods used to identify systems, links, trunks and circuits?

Explanation

not-available-via-ai

Submit
115. (203) Which data communication protocol is a transmission code that supports a variety of link types and topologies?

Explanation

SDLC is a data communication protocol that supports a variety of link types and topologies. It is a synchronous protocol, meaning that it uses a clock signal to synchronize the transmission and reception of data. SDLC is widely used in telecommunications and networking systems, and it provides reliable and efficient data transmission by ensuring error detection and correction, flow control, and data integrity. Asynchronous protocol does not support a variety of link types and topologies, while Binary Synchronous Protocol (BSP) and High-Level Data Link Control (HDLC) are specific protocols that are based on SDLC.

Submit
116. (224) Which Digital Multiplex System (DMS)-100 database facility provides facilities for storing data modifications orders (DMO) and for retrieving them at a specified time for execution?

Explanation

The correct answer is "Pending order file." In a Digital Multiplex System (DMS)-100 database facility, the pending order file is used to store data modification orders (DMO) and retrieve them at a specified time for execution. This file keeps track of any pending orders or modifications that need to be processed, ensuring that they are executed in the correct sequence and at the appropriate time.

Submit
117. (244) Which Digital Multiplex System (DMS)-100 database facility provides facilities to preserving data modifications orders (DMO) on tape or disk so that data tables can be restored if the system fails?

Explanation

The Journal file in the DMS-100 database facility provides the necessary facilities to preserve data modifications orders (DMO) on tape or disk. This allows for the restoration of data tables in case of a system failure. The Journal file acts as a log that records all changes made to the database, ensuring that the modifications can be replayed and the data can be restored to its previous state if needed.

Submit
118. (234) Which office or system confirms a restoration priority?

Explanation

The National Communications System (NCS) confirms a restoration priority. The NCS is responsible for ensuring the availability and reliability of national security and emergency preparedness communications. In the event of a disruption or outage, the NCS determines the priority for restoring communication services based on the criticality of the situation. This ensures that essential communications are restored first, allowing for effective response and coordination during emergencies or national security incidents.

Submit
119. (247) The GVG-110 video switcher effects key fills with

Explanation

The GVG-110 video switcher effects key fills with key bus video or an internally-generated color matte signal. This means that the video switcher can use either the video signal from the key bus or a color matte signal that is generated internally as the fill for the effects key. The fill is the background image or video that is combined with the key signal to create the final composite image.

Submit
120. (252) What is the maximum length of the Y taut-wire sensor (YTWS)?

Explanation

The maximum length of the Y taut-wire sensor (YTWS) is 200 feet. This means that the sensor can measure distances up to 200 feet accurately.

Submit
121. (221) How is supervisory signaling information transferred in common channel signaling (CCS)?

Explanation

In common channel signaling (CCS), supervisory signaling information is transferred through a separate network channel. This means that the signaling information is sent separately from the voice or data traffic, ensuring that it does not interfere with the main communication channel. This allows for more efficient and reliable signaling, as it is not affected by congestion or other issues that may occur in the main channel.

Submit
122. (251) How many selectable frequencies are obtainable with a SD80DC microwave sensor?

Explanation

The SD80DC microwave sensor is capable of providing a total of 10 selectable frequencies.

Submit
123. (203) What data communication protocol uses characters or "handshaking" to control the link and represent information?

Explanation

Binary synchronous protocol is a data communication protocol that uses characters or "handshaking" to control the link and represent information. It is a synchronous protocol, meaning that data is transmitted in a continuous stream without start and stop bits. The protocol uses a specific sequence of characters to establish and maintain synchronization between the sender and receiver. It also provides error checking and flow control mechanisms to ensure reliable data transmission. Therefore, the correct answer is Binary synchronous protocol.

Submit
124. (247) The total number of effects storage registers in the GVG-110 video switcher is

Explanation

The GVG-110 video switcher has a total of 16 effects storage registers. These registers are used to store and recall different video effects, allowing users to easily switch between them during live video production. With 16 storage registers, the switcher provides a wide range of options for creating and managing video effects.

Submit
View My Results

Quiz Review Timeline (Updated): Mar 21, 2023 +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 21, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • May 18, 2016
    Quiz Created by
    Marcus Zhou
Cancel
  • All
    All (124)
  • Unanswered
    Unanswered ()
  • Answered
    Answered ()
(206) Internet protocol version 6 (IPv6) addresses are represented by
(210) Which topology has the stations connected in the form of a...
(210) Which topology combines two or more different physical...
(249) In an Intrusion Detection System (IDS), what is the main purpose...
(240) What should security policies encompass to help mitigate the...
(211) What allows transportation of all active Virtual LANs (VLAN)...
(239) The three cornerstones of voice network system security are...
(218) Which statement best describes a binary with eight-zero...
(212) What identifier differentiates one wireless local area network...
(201) Which of the following is an example of a video compression...
(240) What are attempts to gain access to a switch system by posing as...
(208) Which router port is used for initial configuration?
(204) Which Application layer protocol is used to synchronize the...
(203) Which data communication protocol is based on bits and the...
(229) Which agency is the preferred transport provider for Internet...
(211) Which device subdivides a network into smaller logical pieces,...
(251) Which interior intrusion detection system (IIDS) sensor uses...
(204) Which Transport layer protocol provides reliable...
(213) A Management Information Base (MIB) is a collection of...
(209) Virtual Private Networks (VPNs) allow the AF to extend network...
(210) Which topology defines the way in which devices communicate...
(204) Which network layer protocol matches a known Internet protocol...
(211) The time it takes a switch to figure out where to forward a data...
(215) What is most commonly used in data systems to express signaling...
(217) In what type of digital signal does the signal level move to one...
(202) In the Open System Interconnect (OSI) model, a layer will...
(203) In binary-synchronous protocol, which characters establishes and...
(222) The signal components that occur as bands above and below a...
(249) In an Intrusion Detection System (IDS), what must a line of...
(215) Individual pulses within a digital signal are
(252) What type alarm occurs if the sensor post cover in vertical...
(242) The primary reason you should measure the voltage across faulty...
(217) How many voltage levels does a binary signal have?
(207) Which device has multiport connectivity that directs data...
(204) Which Network layer protocol provides messaging that can help...
(205) Which network Class has the most addresses for hosts?
(250) The basic configuration of the entry control facility includes a
(214) Which physical security action can you take to ensure network...
(213) Simple Network Management Protocol (SNMP) is a tool used by...
(207) Which routing protocol do internet backbones use?
(236) Who determines if Preventative Maintenance Inspection (PMI) are...
(229) What web application is used to order telecommunications...
(230) If the circuit files are lost or destroyed, what document are...
(232) Trend analysis is a program that ensures circuits meet...
(212) Which wireless design phase accounts for the amount of users on...
(208) When configuring a router, you control access to privileged EXEC...
(214) In general, you should deny direct dial-in access to a network...
How many broadcast domains forms a Virtual LAN (VLAN)?
(211) Which of the following will minimize EtherChannel configuration...
(227) What do Global Positioning System (GPS) satellites use to...
(212) Which institute of Electrical Electronics Engineers (IEEE)...
(242) What is the maximum number of ports that a Meridian System Logic...
(222) What is the process, or result of the process, of modifying...
(252) What type of signal is sent to the fence protection system (FPS)...
(205) How many subnet bits are required to support 90 subnets on a...
(231) What report must be sent if the circuit does not meet all...
(240) What provides enterprise wide visibility into telecom resource...
(237) When a telephone network is circuit switched, each call
(206) Teredo has four tunneling components. Which one is not one of...
(235) Combined distribution frames encompass the functions of a main...
(227) Which stratum level is a Global Positioning System (GPS) timing...
(242) What Digital Multiplex System (DMS)-100 system contains...
(216) Which option is a characteristic of synchronous data operation?
(226) Which wave-division multiplexing technology uses uncooled lasers...
(229) What document is the authority for the operations and...
(222) To prevent frequency modulation (FM) radio stations from...
(224) Which form of multiplexing is very susceptible to signal...
(251) Which interior intrusion detection system is designed to detect...
(244) Which Digital Multiplex System (DMS)-100 database facility is...
(238) In Integrated Services Digital Network (ISDN), the "B"...
(220) The signaling equipment has three types of communications...
(220) Which communications control signal uses a two-frequency dialing...
(240) Which is not a characteristic and capability of a voice...
(245) What names are given to the shifted R-Y and B-Y signals,...
(231) Within how many normal duty hours of completion action on the...
(246) Which digital broadcast system was adopted by the United States...
(240) Which is not a component of the voice protection system...
(221) In common associated signaling (CAS), what is the seventh bit in...
(225) What are the two major type of frame structures?
(225) The method of multiplexing the T1 multiplexer uses is
(232) If a circuit fails its management threshold, what test might be...
(240) Where are voice protection system servers installed?
(247) What does the GVG-110 video switcher serial interface allow?
(230) Which DD form do you use for an official narrative log that is...
(243) Where do incoming (unswitched) circuits transmitted to the ENET...
(252) What is the secondary mode of detection for the microwave fence...
The vulnerabilities of voice and data converged networks were...
(219) How many bits are in the extended superframe format (ESF)...
(221) Which common channel signaling (CCS) mode does the transfer of...
(252) What is the maximum detection distance in meters of an Infrared...
(227) To create a better timing environment in communication networks,...
(201) At what Open System Interconnection (OSI) layer are virtual...
(242) Which elements make up the control component of the SuperNode...
(234) When you restore user service by rerouting, what is the second...
(228) Who is responsible for all circuits within their facility up to...
(242) What link is used to connect the Digital Multiplex System...
(211) Which of the following is not a distinct layer of a hierarchical...
(208) On a router's serial interface connection, what provides the...
Which DD form is used as the primary source of information when...
(230) Which test results do you record on the reverse/back side of the...
(223) Which type of pulse modulation is least affected by noise?
(240) During the initial research for voice system security, who...
(241) How many serial data interface ports does the Meridian Option...
(248) Which basic circuit in the video distribution amplifier consists...
(223) The form of pulse modulation in which a discrete pulse is varied...
(228) Which agency has responsibility for a circuit end-to-end?
(216) A digital signal that contains synchronizing bits within the...
(251) What does the AN/GSS-39(V) system use to monitor the integrity...
(218) Digital coding techniques such as binary with eight-zero...
(252) How many sensors does a taut-wire system in the  Y...
(252) What is the maximum length of the vertical taut-wire sensor...
(252) How many vertical taut-wire sensor (VTWS) sectors can be...
(223) Which form of modulation is insensitive to signal variations?
(223) Which publication lists the methods used to identify systems,...
(203) Which data communication protocol is a transmission code that...
(224) Which Digital Multiplex System (DMS)-100 database facility...
(244) Which Digital Multiplex System (DMS)-100 database facility...
(234) Which office or system confirms a restoration priority?
(247) The GVG-110 video switcher effects key fills with
(252) What is the maximum length of the Y taut-wire sensor (YTWS)?
(221) How is supervisory signaling information transferred in common...
(251) How many selectable frequencies are obtainable with a SD80DC...
(203) What data communication protocol uses characters or...
(247) The total number of effects storage registers in the GVG-110...
Alert!

Advertisement