3D152 Volume 2 UREs

Reviewed by Editorial Team
The ProProfs editorial team is comprised of experienced subject matter experts. They've collectively created over 10,000 quizzes and lessons, serving over 100 million users. Our team includes in-house content moderators and subject matter experts, as well as a global network of rigorously trained contributors. All adhere to our comprehensive editorial guidelines, ensuring the delivery of high-quality content.
Learn about Our Editorial Process
| By Bryansomeone
B
Bryansomeone
Community Contributor
Quizzes Created: 2 | Total Attempts: 727
| Attempts: 336 | Questions: 93
Please wait...
Question 1 / 93
0 %
0/100
Score 0/100
1. What protocol analyzer utility is used to determine if a network node is connected or responding?

Explanation

"The Ping utility is used to determine if a network node is connected or responding. It sends a series of Internet Control Message Protocol (ICMP) echo request messages to the target node. The results, an ICMP echo reply, identify the target node’s response and the time (delay in milliseconds) it took for the target to receive the request and respond." Page 3-17

Submit
Please wait...
About This Quiz
3D152 Volume 2 UREs - Quiz

The 3D152 Volume 2 UREs quiz assesses knowledge on digital signal processing, networking standards, and telecommunications systems. It covers topics such as bit representation, wiring standards, and international... see moretelecommunications formats, essential for professionals in cyber operations and IT. see less

2. Which Application layer protocol is an automated means of assigning a unique internet protocol (IP) address to every device on a network?

Explanation

"Dynamic host configuration protocol (DHCP) is an automated means of assigning a unique IP address to every device on a network." Page 2-8

Submit
3. How many possible symbols can 4 bits represent?

Explanation

"One bit can indicate only two possible messages. When a second bit is added, the number of possible messages increases to four (22). A further increase to 3 bits increases the possibilities to eight different choices (23). The number of bits (called X) available can have 2 to X possible combinations to represent
information. For example, a code with 8 bits (28) can represent 256 possible messages or symbols. Generally 8 bits of data refers to a unit of data transmission known as a “byte.”" Page 1-2

Submit
4. In binary-synchronous protocol, what character is used to establish and maintain character synchronization prior to the message block and during transmission?

Explanation

"Establishes and maintains character synchronization prior to the message block and during transmission. Also used as time fill in the absence of control characters and data." Table on Page 1-21

Submit
5. What defines traffic flow and is a basic protection mechanism on routers?

Explanation

"Access lists on routers are essential to performing basic protection mechanisms and defining traffic flows." Page 5-3

Submit
6. Which Transport layer protocol does not guarantee that packets will be received at all?

Explanation

"UDP is a connectionless transport service. In other words, UDP offers no assurance that packets will be received in the correct sequence. In fact, this protocol does not guarantee that the packets will be received at all." Page 2-6

Submit
7. The physical address of any device on the network is a/an

Explanation

"Media Access Control (MAC) address. This is the physical address of any device—such as the NIC in a computer—on the network. The MAC address, which is made up of two equal parts, is 6 bytes long." Page 2-11

Submit
8. A collection of standards for local area network (LAN) architectures, protocols, and technologies called Project 802 were developed by the

Explanation

"A major contribution of the IEEE in the field of computer networking is Project 802; a collection of standards for local area network (LAN) architectures, protocols, and technologies. The 802 specifications define the operation of the physical network components—cabling, network adapters, and connectivity devices such as routers and switches." Page 1-5

Submit
9. What protocol analyzer utility is used to see the path that packets are traveling and the time it takes the packets to complete the trip?

Explanation

"The trace route test is used to see the path that packets are traveling and the time (delay in milliseconds) it takes the packets to complete the trip. Each node that processes the packet responds with the IP address of its ingress (inward) network interface. The results list the IP address of the network interface of each node the packet is routed through until the packet reaches the target node. The response time (delay in milliseconds) it took for each node to respond is also displayed." Page 3-17

Submit
10. The combination transmitter/receiver device, in a single package, is called a

Explanation

"a transceiver is a combination transmitter/receiver in a single package." Page 3-1

Submit
11. What Electronic Industries Alliance (EIA)/Telecommunications Industry Association (TIA) standard is used for commercially building telecommunications cabling?

Explanation

"EIA/TIA 568A& B: Commercial Building Telecommunications Cabling Standard." Page 1-4

Submit
12. What device provides the physical, electrical, and electronic connections to the network media?

Explanation

"The network interface card (NIC), as its name suggests, is an expansion card you install in your computer to connect, or interface, your computer to the network. The NICs can be viewed as the actual interface between workstations, servers, clients, and the shared media of the network. These devices provide the physical, electrical, and electronic connections to the network media." Page 3-1 through 3-2

Submit
13. The interconnection of several networks in a city into a single larger network is a

Explanation

"A MAN is a network that interconnects users with computer resources in a geographic area or region larger than that covered by even a large LAN but smaller than the area covered by a WAN. The term is applied to the interconnection of networks in a city into a single larger network." Page 1-29

Submit
14. Virtual private networks (VPN) allow the AF to extend network resources across a/an

Explanation

"Virtual private networks (VPN) allow the AF to extend network resources across a public shared infrastructure employing the same management policies applied to a protected network." Page 3-8

Submit
15. What type of cable property changes does a time-domain reflectometer (TDR) detect to identify problems?

Explanation

"The TDR detects impedance changes along a cable. The operation of the TDR is similar to radar. Pulses of energy are transmitted down the cable." Page 3-11

Submit
16. What data communication protocol is based on bits and the position of the bits?

Explanation

"Whereas COPs are based on characters, bit-oriented protocols (BOP) are based on bits and the position of the bits." Page 1-24

Submit
17. What device subdivides a network into smaller logical pieces, or segments?

Explanation

"A switch is a device that subdivides a network into smaller logical pieces, or segments." Page 3-3

Submit
18. A router's strength is its

Explanation

"A router’s strength lies in its intelligence. Not only can routers keep track of the locations of certain nodes on the network, as switches can, but they can also determine the shortest, fastest path between two nodes." Page 3-5

Submit
19. A cable scanner wire-map display identifies crossover and straight-through cables by

Explanation

"The wire-map test configuration uses the injector for complete mapping of wiring at both ends of the cable. With the scanner and the injector connected at opposite ends of a link or cable, the correct wire map reading can be determined. The display shows the manner in which each wire is mated to the connectors at both ends of the cable. This feature helps to identify crossover and straight-through cables." Page 3-13

Submit
20. What test equipment has the capability of diagnosing digital network and developing communications software?

Explanation

"A protocol analyzer provides a capability for digital network diagnostics and for developing communications software." Page 3-13

Submit
21. What Open System Interconnect (OSI) layer is closest to the end user?

Explanation

"The application layer is the OSI layer closest to the end user, which means that both the OSI application layer and the user interact directly with the software application." Page 1-15

Submit
22. A group of computers and associated devices that share a common communications line within a small geographic area is a

Explanation

"A LAN is a group of computers and associated devices that share a common communications line and typically share the resources of a single processor or server within a small geographic area (for example, within an office building)." Page 1-29

Submit
23. In the Open System Interconnect (OSI) model, a layer will communicate with three other OSI layers. Which one is not one of those layers?

Explanation

"With the exception of the layers on each end, any layer in the OSI model communicates with three other OSI layers: the layer directly above it, the layer directly below it, and its peer layer in other networked devices." Page 1-16

Submit
24. What type of network connects networks that are typically separated by geographical distances?

Explanation

"A WAN is a network that links LANs and MANs by using long-distance communication links that are leased or purchased from a telecommunications company. Long-distance communication links can be described as telephone lines, microwave, or satellite communications. A WAN connects networks that are typically separated by geographical distances. These distances are between two cities within a state, between two states, across a country, or around the world." Page 1-29

Submit
25. Which routing protocol does internet backbones use?

Explanation

"The BGP is the routing protocol of internet backbones and is not used to route between nodes on an autonomous LAN—that is, it is used on border and exterior routers." Page 3-7

Submit
26. An intrusion detection system (IDS) may miss attacks that bypass the firewall like application-based attacks and

Explanation

"On the other hand, the more subtle and complex rules that an IDS uses to analyze system activity allow it to detect vulnerabilities and intrusions that a firewall may miss, including attacks that bypass the firewall. Examples are tunneling and application-based attacks." Page 5-12 Question was written incorrectly in book possibly?

Submit
27. What are the two vulnerability scanner examination techniques?

Explanation

"Vulnerability scanners perform rigorous examinations of systems to identify weaknesses that might allow security violations. These products use two techniques for performing these examinations. First, passive, host-based mechanisms inspect system configuration files for unwise settings, system password files for weak passwords, and other system objects for security policy violations. These checks are followed, in most cases, by the second technique, active. In active examination, a networkbased assessment that reenacts common intrusion detection scripts and records system responses to the scripts." Page 5-14

Submit
28. What is not a recommendation for planning networks using variable length subnet masking (VLSM)?

Explanation

"A number of points are worth emphasizing in relation to VLSM:
 Start with the shortest mask. Plan the subnets that support the most hosts. This is typically the mask used on most or all of the LAN segments.
 Choose one or more available subnets and subnet further. This is sometimes called “subnetting the subnets.” It is important to remember that this can be done only with one or more subnets that have not already been used up.
 Aim to use contiguous subnets where possible. Although it is not essential, it certainly makes very good sense to choose a continuous range of addresses and apply a particular mask to them. The advantage of this type of consistency is that it can be determined from the third octet address that this is a LAN segment and also that the mask is 24-bit." Page 2-17

Submit
29. Which protocol is simpler than File Transfer Protocol (FTP) when transferring files between computers?

Explanation

"Trivial file transfer protocol (TFTP) is a protocol that enables file transfers between computers, but it is simpler (or more trivial) than FTP. A significant difference between FTP and TFTP is that TFTP relies on UDP at the Transport layer." Page 2-7

Submit
30. Which Application layer protocol is used to send and receive files by way of transmission control protocol/internet protocol (TCP/IP)?

Explanation

"File transfer protocol (FTP) is used to send and receive files by way of TCP/IP. In FTP exchanges, a host running the FTP server portion accepts commands from another host running the FTP client portion." Page 2-6

Submit
31. What security posture prevents everything that is not specifically authorized?

Explanation

"A “default deny” posture to deny everything that is not specifically authorized." Page 5-8

Submit
32. What is the first line of defense when gaining access to a laptop computer's operating system?

Explanation

"The first line of defense is to require a logon ID and password combination to gain access to the PC's operating system." Page 5-9

Submit
33. What is the oldest routing protocol?

Explanation

"The oldest routing protocol, RIP, which is still widely used, factors in only the number of hops between nodes when determining a path from one point to another." Page 3-6

Submit
34. Who has unrestricted access to system commands and data?

Explanation

"Control utility programs that provide unrestricted access to sensitive data. Some utility programs provide unrestricted access to system commands and data to “superusers” (e.g., system administrators)." Page 5-9

Submit
35. What two sublayers did the Institute of Electrical and Electronics Engineers (IEEE) divide the Open System Interconnect (OSI) data link layers into?

Explanation

"The IEEE has subdivided the data link layer into two sublayers: LLC and media access control (MAC)." Page 1-14

Submit
36. The time it takes a switch to figure out where to forward a data unit is called

Explanation

"The time a switch takes to figure out where to forward a data unit is called its latency." Page 3-4

Submit
37. What are the two parts to an Internet Protocol version 4 (IPv4) address?

Explanation

"The octets are split into two sections: Net and Host. The Net section always contains the first octet. It is used to identify the network that a computer belongs to. Host (sometimes referred to as Node) identifies the actual computer on the network. The Host section always contains the last octet." Page 2-11

Submit
38. What is used on a transmission control protocol/internet protocol (TCP/IP) network to determine which network a computer is on?

Explanation

"A computer on a TCP/IP network uses a subnet mask to determine what network it is on and whether a computer that it needs to send data to is located on a local network or on a remote network." Page 2-12

Submit
39. Which Electronics Industries Alliance (EIA) interface standard has the ability to work in either balanced or unbalanced electrical circuits?

Explanation

"The RS–530 is also based on a 25-pin connection (fig. 1–2). It works in either balanced or unbalanced electrical circuits." Page 1-11

Submit
40. Which Application layer protocol is a utility that can verify that transmission control protocol/internet protocol (TCP/IP) is installed and communicating with the network?

Explanation

"Ping is a utility that can verify that TCP/IP is installed, bound to the network interface card (NIC), configured correctly, and communicating with the network. It is often employed simply to determine whether a host is responding (or “up”). Ping uses ICMP services to send echo request and echo reply messages that determine the validity of an IP address." Page 2-9

Submit
41. Which information unit, whose source and destination are network-layer entities, uses connectionless network service?

Explanation

"The term datagram usually refers to an information unit whose source and destination are network layer entities that use connectionless network service." Page 1-18

Submit
42. Which Internet protocol version 6 (IPv6) tunneling approach attempts to solve the issue of IPv6 to IP version 4 (IPv4), IP protocol 41 issue?

Explanation

"Teredo attempts to solve the lack of functionality issue 6to4 has with Network Address Translation (NAT). Tunneling from the hosts presents an issue for NAT: IPv6 packets that are
encapsulated within IPv4 have the Protocol field in the IPv4 header set to 41." Page 2-21

Submit
43. There is a worldwide nonprofit association of technical professionals that promotes the development of standards called the

Explanation

"IEEE is a worldwide nonprofit association of technical professionals that promotes the development of standards and acts as a catalyst for new technology in all aspects of the engineering industry, including computer networking, telecommunications, electric power, aerospace, and consumer electronics." Page 1-5

Submit
44. Which of the following is not a basic Simple Network Management Protocol (SNMP) command?

Explanation

"Managed devices are controlled and monitored using four basic SNMP commands: read, write, trap, and traversal operations." Page 4-2

Submit
45. Which network management function provides the capability to initialize, operate and shut down managed devices?

Explanation

"Configuration management provides the capability to initialize, reconfigure, operate, and shut down managed devices." Page 4-4

Submit
46. Which type network enables users to share resources, files, and printers in a decentralized way?

Explanation

"Peer-to-peer networking enables users to share resources, files, and printers in a decentralized way." Page 1-30

Submit
47. What protocol analyzer feature automatically runs in the background when the protocol analyzer application is activated?

Explanation

"Node discovery automatically runs in the background when the protocol analyzer application is activated." Page 3-17

Submit
48. What must be employed to ensure data integrity?

Explanation

"Standardized transmission check sums must be employed throughout the network to be sure of data integrity. In case of an incident or catastrophic failure, routine data backup is used to help make sure of data integrity." Page 5-10

Submit
49. How many subnet bits are required to support 90 subnets on a Class B network?

Explanation

http://www.subnet-calculator.com/

Submit
50. When using an optical time-domain reflectometer (OTDR), what action is suggested by most manufacturers to prevent false readings?

Explanation

"The OTDR receiver circuit is very sensitive and is easily overloaded. For this reason, the manufacturer may suggest that a “pulse suppresser” or “launch” cable be connected between the test set and the cable to be measured so that false readings do not occur." Page 3-13

Submit
51. A repeater with more than one output port is a

Explanation

"At its most primitive, a hub is a repeater with more than one output port. A hub typically contains multiple data ports into which the patch cables for network nodes are connected." Page 3-2

Submit
52. The definition of the Open System Interconnect (OSI) reference model was a major contribution to networking made by the

Explanation

"ISO’s major contribution to networking has been the definition of the OSI Reference Model, which is a layered architecture model for communication between open network systems." Page 1-7

Submit
53. Which Application layer protocol is a terminal emulation used to log on to remote hosts?

Explanation

"Telnet is a terminal emulation protocol used to log on to remote hosts using the TCP/IP protocol suite. Using Telnet, a TCP connection is established and keystrokes on the user’s machine act like keystrokes on the remotely connected machine." Page 2-8

Submit
54. Which network management function obtains the utilization and error rates of network devices and provides statistical data about the network?

Explanation

"Performance management measures network performance and provides statistical data about the network. It obtains the utilization and error rates of network devices and provides a consistent level of performance by ensuring that devices have a sufficient capacity." Page 4-4

Submit
55. The community name that is used with the network management systems (NMS) authenticates

Explanation

"The community name operates like a password to authenticate SNMP requests." Page 4-5

Submit
56. Which Network layer protocol matches a known internet protocol (IP) address for a destination device to a Media Access Control (MAC) address?

Explanation

"ARP provides the service of matching a known IP address for a destination device to a MAC address." Page 2-4

Submit
57. What type of network enables a group of two or more computer systems to communicate over the public Internet?

Explanation

"A virtual private network (VPN) provides a private tunnel through a public cloud (the internet). A VPN enables a group of two or more computer systems to communicate over the public internet." Page 1-29

Submit
58. Which of the following is an International Telecommunication Union (ITU) standardized format used for digital telecommunications services backbone system?

Explanation

"E-carrier is the digital telecommunications services backbone system of Europe–a format standardized by the International Telecommunication Union (ITU)." Page 1-4

Submit
59. What transmission rates does Electronic Industries Alliance (EIA) RS–530 accommodate?

Explanation

"The RS-530 accommodates data transmission rates from 20 Kbps to 2 Mbps; and its maximum distance depends on which electrical interface is used." Page 1-11

Submit
60. A Management Information Base (MIB) can be identified by either its object name or its object what?

Explanation

"For example, the managed object, ifNumber, from a network switch, can be identified either by the object name: iso.org.dod.internet.mgmt.mib-2.interfaces.ifNumber, or by the equivalent object descriptor: 1.3.6.1.2.1.2.1. The MIB describes all the objects that a device can report the status of and in some cases the value of." Page 4-1

Submit
61. What cable discrepancies can a time-domain reflectometer (TDR) detect?

Explanation

"A TDR will detect discrepancies such as opens, shorts, and pinholes in cable shielding, kinks, and mismatched or corroded connectors." Page 3-11

Submit
62. What Network layer protocol provides information about how and where data should be delivered, including the data's source and destination addresses?

Explanation

"IP provides information about how and where data should be delivered, including the data’s source and destination addresses." Page 2-2

Submit
63. What process provides the overall process to secure and protect our information networks?

Explanation

"Defense Communications Systems (DCS), Command, Control, Communications and Computers (USAF/SC) established Barrier Reef as the Air Force concept for protecting our information network boundaries. Barrier Reef is the electronic equivalent of the physical perimeter defense provided on AF bases by our security forces. Proxies and firewalls act as electronic “gate guards” at our network boundaries, inspecting traffic and allowing only authorized traffic." Page 5-1

Submit
64. The World Wide Web (WWW) proxy provides three benefits: it conceals internal network configuration, provides a means to monitor and eliminate traffic to unofficial WWW sites, and

Explanation

"HTML data is cached to the proxy's local hard drive, providing much faster access than accessing the Internet." Page 5-5

Submit
65. What data communication protocol ensures that the receiving station can distinguish information from garbage?

Explanation

"HDLC’s major difference over SDLC is that it ensures that the receiving station can distinguish information from garbage." Page 1-28

Submit
66. Which Network layer protocol provides the internet protocol (IP) address for a device that knows its own Media Access Control (MAC) address?

Explanation

"The RARP provides the reverse of the ARP service. Rather than finding out the MAC address of a device whose IP address is already known, RARP provides the IP address for a device that knows its own MAC address." Page 2-4

Submit
67. Which series of standards are recommended for data transmission using the telephone network?

Explanation

"The V-series is a code designation used to list the recommendations for data transmission using the telephone network." Page 1-7

Submit
68. What is one of the primary functions of the Network Control Center (NCC), usually done in real time, and ensures the system is being operated within the parameters established by network security policy?

Explanation

"System monitoring is one of the primary functions of the NCC. Unlike system auditing functions, it is usually done in real time. Not only does it verify that the system is operational, it also makes sure the system is being operated within the parameters established by network security policy and the DAA." Page 5-7

Submit
69. The "parent" organization, headquartered in Geneva, Switzerland, for all other telecommunications organizations is the

Explanation

"The ITU is the “parent” organization for all other telecommunications organizations. ITU does not usually specify things itself, but merely coordinates the specification work of others. It may set the goals for some standardization work, but local organizations (ETSI, TIA, etc.) often do the actual work. In many cases, ITU works as a catalyst for future standardization work. ITU is a United Nations organization headquartered in Geneva, Switzerland." Page 1-6

Submit
70. What type of firewall can filter messages according to a set of rules for a specific application?

Explanation

"A third type of firewall device is the proxy server. A proxy server runs a “proxy” version of an Internet application, such as e-mail, and filters messages according to a set of rules for that application." Page 5-13

Submit
71. What mechanism allows for easier Internet protocol version 6 (IPv6) address allocations?

Explanation

"A problem with a 32 hexadecimal address is assigning them correctly; it’s easy to mistype a character. IPv6 uses dynamic host configuration protocol (DHCP) similar to IPv4 but there’s another option to acquire an IPv6 address, and it is called autoconfiguration. In autoconfiguration, the host appends the prefix information of its closest router to its own unique hardware or media access control (MAC) address to make up the IPv6 address, making it easier to allocate addresses." Page 2-19

Submit
72. What layers of the open system interconnection (OSI) model do network interface cards (NIC) belong?

Explanation

"NICs belong to both the physical layer and data link layer of the OSI model, because they apply data signals to the wire and assemble or disassemble data frames." Page 3-2

Submit
73. Simple Network Management Protocol (SNMP) has three components: a managed device, an agent and a

Explanation

"An SNMP-managed network consists of three key components: managed devices, agents, and a
network-management system (NMS)" Page 4-2

Submit
74. Which component of a protocol analyzer discards frames based on its definition or activates a trigger based on the trigger definition?

Explanation

"the filter discards frames based on the filter definition or activates a trigger based on the trigger definition." 3-14

Submit
75. Which device has multiport connectivity that directs data between nodes on a network?

Explanation

"A router is a multiport connectivity device that directs data between nodes on a network." Page 3-5

Submit
76. What method is approved for changing passwords through the use of remote access?

Explanation

"Use of remote access for changing passwords must be severely restricted, unless a strongly encrypted virtual private network (VPN) protects the entire session." Page 5-10

Submit
77. At what Open System Interconnect (OSI) layer are common data compression and encryption schemes used?

Explanation

"Some examples of presentation layer coding and conversion schemes include common data representation formats, conversion of character representation formats, common data compression schemes, and common data encryption schemes." Page 1-15

Submit
78. What component of a protocol analyzer processes the frames based on the selected test and the user configuration inputs?

Explanation

"Protocol analyzer CPU: this specialized processor processes the frames based on the selected test and the user configuration inputs." Page 3-14

Submit
79. Teredo has four tunneling components. Which one is not one of them?

Explanation

"-Teredo client is an IPv6/IPv4 node that supports a Teredo tunneling interface through which packets are tunneled to either other Teredo clients or nodes on the IPv6 Internet (via a Teredo relay). A Teredo
client communicates with a Teredo server to obtain an address prefix from which a Teredo-based IPv6 address is configured or to help initiate communication with other Teredo clients or hosts on the IPv6 Internet.
-A Teredo server is a IPv6/IPv4 node that is connected to both an IPv4 network and a IPv6 network, and acts as a Teredo tunneling interface over which packets are received. The role of the Teredo server is to assist in the address configuration of the Teredo client and to facilitate the initial communication between Teredo clients and other Teredo clients or between Teredo clients and IPv6-only hosts. The Teredo server listens on UDP port 3544 for Teredo traffic.
-A Teredo relay is an IPv6/IPv4 router that can forward packets between Teredo clients on the IPv4 network, using a Teredo tunneling interface, and IPv6-only hosts. The Teredo relay interacts with a Teredo server to help it facilitate initial communication between Teredo clients and IPv6-only hosts. The Teredo relay listens on UDP port 3544 for Teredo traffic.
-A Teredo host-specific relay is an IPv6/IPv4 node that has an interface and connectivity to both the IPv4 Internet and the IPv6 Internet and can communicate directly with Teredo clients over the IPv4 Internet, without the need for an intermediate Teredo relay."Pages 2-21 through 2-22

Submit
80. What happens when more bits are added to a digital signal arranged in a sequence understood by the sender and receiver?

Explanation

"The more bits that are added to a digital signal, the greater the number of choices to be made. If the sender and receiver arrange these bits in a preset sequence that is understood, a code set is established." Page 1-1

Submit
81. What organization sets important computer networking wiring standards for residential and commercial network cabling?

Explanation

"An important computer networking function of the EIA is the series of standards for residential and commercial network cabling that are collectively known as the Electronic Industries Alliance/ Telecommunications Industry Association (EIA/TIA) wiring standards." Page 1-3

Submit
82. What organization is responsible for the X-series and V-series standards?

Explanation

"The ITU-T is responsible for a number of important international networking and communication standards, including the following X and V series standards." Page 1-6

Submit
83. Which of the following is not a function that a virtual private network (VPN) concentrator performs?

Explanation

"The VPN Concentrator performs the following functions:
 Establishes tunnels
 Negotiates tunnel parameters
 Authenticates users
 Assigns user addresses
 Encrypts and decrypts data
 Manages security keys
 Manages data transfer across the tunnel
 Manages data transfer inbound and outbound as a tunnel endpoint or router
 Invokes various standard protocols to accomplish these functions" Page 3-9

Submit
84. How many bits are available for host bits on a Class B network using seven bits?

Explanation

http://www.subnet-calculator.com/

Submit
85. What defines the format and type of data in a network management system (NMS) report?

Explanation

"The report templates define the type of data in the report and the format." Page 4-6

Submit
86. What can be used to extend the size of a network?

Explanation

"An active hub performs the same function as a passive hub, but it contains electronic circuits that regenerate and retransmit the information. Thus, active hubs can be used to extend the size of a network." Page 3-3

Submit
87. What security posture permits everything that is not specifically blocked?

Explanation

"An “open” posture to allow everything that is not specifically denied." Page 5-8

Submit
88. Within how many feet of the data communications equipment (DCE) connection does the Electronics Industries Alliance (EIA) RS–232–C standard prescribes bipolar-voltage serial data transmission?

Explanation

"Normally cable between the two is no longer than 50 feet or 15 meters, but may be longer if load capacitance requirements are met." Page 1-8

Submit
89. In networking, a byte is identified as a/an

Explanation

"Normally bytes are 8 (binary) data bits in length. However, since some systems use bytes that are longer than 8 bits, generally, the term octet is used when referring to networking." Page 1-2

Submit
90. What type of gateway might include remote access servers that allow dial-up connectivity to a local area network (LAN)?

Explanation

"LAN gateway—a gateway that allows segments of a LAN running different protocols or different network models to communicate with each other. A router, a single port on a router, or even a server may act as a LAN gateway. The LAN gateway category might also include remote access servers that allow dial-up connectivity to a LAN." Page 3-8

Submit
91. Which one of the following is not an Internet protocol version 6 (IPv6) transition approach?

Explanation

Pages 2-19 through 2-23

Submit
92. What data communication protocol is used to govern the flow and format of information between systems?

Explanation

"Character-oriented protocols (COP) use characters and symbols (character code set) to govern the flow and format of information between systems." Page 1-20

Submit
93. What type of gateway can restrict the kind of access local area network (LAN) users have to the internet, and vice versa?

Explanation

"Internet gateway—A gateway that allows and manages access between LANs and the internet. An internet gateway can restrict the kind of access LAN users have to the internet, and vice versa." Page 3-8

Submit
View My Results

Quiz Review Timeline (Updated): Mar 21, 2023 +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 21, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Dec 09, 2014
    Quiz Created by
    Bryansomeone
Cancel
  • All
    All (93)
  • Unanswered
    Unanswered ()
  • Answered
    Answered ()
What protocol analyzer utility is used to determine if a network node...
Which Application layer protocol is an automated means of assigning a...
How many possible symbols can 4 bits represent?
In binary-synchronous protocol, what character is used to establish...
What defines traffic flow and is a basic protection mechanism on...
Which Transport layer protocol does not guarantee that packets will be...
The physical address of any device on the network is a/an
A collection of standards for local area network (LAN) architectures,...
What protocol analyzer utility is used to see the path that packets...
The combination transmitter/receiver device, in a single package, is...
What Electronic Industries Alliance (EIA)/Telecommunications Industry...
What device provides the physical, electrical, and electronic...
The interconnection of several networks in a city into a single larger...
Virtual private networks (VPN) allow the AF to extend network...
What type of cable property changes does a time-domain reflectometer...
What data communication protocol is based on bits and the position of...
What device subdivides a network into smaller logical pieces, or...
A router's strength is its
A cable scanner wire-map display identifies crossover and...
What test equipment has the capability of diagnosing digital network...
What Open System Interconnect (OSI) layer is closest to the end user?
A group of computers and associated devices that share a common...
In the Open System Interconnect (OSI) model, a layer will communicate...
What type of network connects networks that are typically separated by...
Which routing protocol does internet backbones use?
An intrusion detection system (IDS) may miss attacks that bypass the...
What are the two vulnerability scanner examination techniques?
What is not a recommendation for planning networks using variable...
Which protocol is simpler than File Transfer Protocol (FTP) when...
Which Application layer protocol is used to send and receive files by...
What security posture prevents everything that is not specifically...
What is the first line of defense when gaining access to a laptop...
What is the oldest routing protocol?
Who has unrestricted access to system commands and data?
What two sublayers did the Institute of Electrical and Electronics...
The time it takes a switch to figure out where to forward a data unit...
What are the two parts to an Internet Protocol version 4 (IPv4)...
What is used on a transmission control protocol/internet protocol...
Which Electronics Industries Alliance (EIA) interface standard has the...
Which Application layer protocol is a utility that can verify that...
Which information unit, whose source and destination are network-layer...
Which Internet protocol version 6 (IPv6) tunneling approach attempts...
There is a worldwide nonprofit association of technical professionals...
Which of the following is not a basic Simple Network Management...
Which network management function provides the capability to...
Which type network enables users to share resources, files, and...
What protocol analyzer feature automatically runs in the background...
What must be employed to ensure data integrity?
How many subnet bits are required to support 90 subnets on a Class B...
When using an optical time-domain reflectometer (OTDR), what action is...
A repeater with more than one output port is a
The definition of the Open System Interconnect (OSI) reference model...
Which Application layer protocol is a terminal emulation used to log...
Which network management function obtains the utilization and error...
The community name that is used with the network management systems...
Which Network layer protocol matches a known internet protocol (IP)...
What type of network enables a group of two or more computer systems...
Which of the following is an International Telecommunication Union...
What transmission rates does Electronic Industries Alliance (EIA)...
A Management Information Base (MIB) can be identified by either its...
What cable discrepancies can a time-domain reflectometer (TDR) detect?
What Network layer protocol provides information about how and where...
What process provides the overall process to secure and protect our...
The World Wide Web (WWW) proxy provides three benefits: it conceals...
What data communication protocol ensures that the receiving station...
Which Network layer protocol provides the internet protocol (IP)...
Which series of standards are recommended for data transmission using...
What is one of the primary functions of the Network Control Center...
The "parent" organization, headquartered in Geneva, Switzerland, for...
What type of firewall can filter messages according to a set of rules...
What mechanism allows for easier Internet protocol version 6 (IPv6)...
What layers of the open system interconnection (OSI) model do network...
Simple Network Management Protocol (SNMP) has three components: a...
Which component of a protocol analyzer discards frames based on its...
Which device has multiport connectivity that directs data between...
What method is approved for changing passwords through the use of...
At what Open System Interconnect (OSI) layer are common data...
What component of a protocol analyzer processes the frames based on...
Teredo has four tunneling components. Which one is not one of them?
What happens when more bits are added to a digital signal arranged in...
What organization sets important computer networking wiring standards...
What organization is responsible for the X-series and V-series...
Which of the following is not a function that a virtual private...
How many bits are available for host bits on a Class B network using...
What defines the format and type of data in a network management...
What can be used to extend the size of a network?
What security posture permits everything that is not specifically...
Within how many feet of the data communications equipment (DCE)...
In networking, a byte is identified as a/an
What type of gateway might include remote access servers that allow...
Which one of the following is not an Internet protocol version 6...
What data communication protocol is used to govern the flow and format...
What type of gateway can restrict the kind of access local area...
Alert!

Advertisement