3D152 Volume 2 UREs

Reviewed by Editorial Team
The ProProfs editorial team is comprised of experienced subject matter experts. They've collectively created over 10,000 quizzes and lessons, serving over 100 million users. Our team includes in-house content moderators and subject matter experts, as well as a global network of rigorously trained contributors. All adhere to our comprehensive editorial guidelines, ensuring the delivery of high-quality content.
Learn about Our Editorial Process
| By Bryansomeone
B
Bryansomeone
Community Contributor
Quizzes Created: 2 | Total Attempts: 727
| Attempts: 336
SettingsSettings
Please wait...
  • 1/93 Questions

    How many possible symbols can 4 bits represent?

    • 2.
    • 4.
    • 8.
    • 16.
Please wait...
About This Quiz

The 3D152 Volume 2 UREs quiz assesses knowledge on digital signal processing, networking standards, and telecommunications systems. It covers topics such as bit representation, wiring standards, and international telecommunications formats, essential for professionals in cyber operations and IT.

3D152 Volume 2 UREs - Quiz

Quiz Preview

  • 2. 

    Which Application layer protocol is an automated means of assigning a unique internet protocol (IP) address to every device on a network?

    • Dynamic Host Configuration Protocol (DHCP).

    • Trivial File Transfer Protocol (TFTP).

    • Simple Mail Transfer Protocol (SMTP).

    • Hypertext Transfer Protocol (HTTP).

    Correct Answer
    A. Dynamic Host Configuration Protocol (DHCP).
    Explanation
    "Dynamic host configuration protocol (DHCP) is an automated means of assigning a unique IP address to every device on a network." Page 2-8

    Rate this question:

  • 3. 

    What protocol analyzer utility is used to determine if a network node is connected or responding?

    • Trace Route.

    • Ping.

    • Who is.

    • Address Resolution Protocol (ARP).

    Correct Answer
    A. Ping.
    Explanation
    "The Ping utility is used to determine if a network node is connected or responding. It sends a series of Internet Control Message Protocol (ICMP) echo request messages to the target node. The results, an ICMP echo reply, identify the target node’s response and the time (delay in milliseconds) it took for the target to receive the request and respond." Page 3-17

    Rate this question:

  • 4. 

    In binary-synchronous protocol, what character is used to establish and maintain character synchronization prior to the message block and during transmission?

    • SEQ.

    • SYN.

    • STX.

    • EST.

    Correct Answer
    A. SYN.
    Explanation
    "Establishes and maintains character synchronization prior to the message block and during transmission. Also used as time fill in the absence of control characters and data." Table on Page 1-21

    Rate this question:

  • 5. 

    Which Transport layer protocol does not guarantee that packets will be received at all?

    • Internet protocol (IP).

    • User Datagram Protocol (UDP).

    • Transmission Control Protocol (TCP).

    • Internet Control Message Protocol (ICMP).

    Correct Answer
    A. User Datagram Protocol (UDP).
    Explanation
    "UDP is a connectionless transport service. In other words, UDP offers no assurance that packets will be received in the correct sequence. In fact, this protocol does not guarantee that the packets will be received at all." Page 2-6

    Rate this question:

  • 6. 

    The physical address of any device on the network is a/an

    • Internet protocol version 4 (IPv4) address.

    • Internet protocol version 6 (IPv6) address.

    • Static internet protocol (IP) address.

    • Media Access Control (MAC) address.

    Correct Answer
    A. Media Access Control (MAC) address.
    Explanation
    "Media Access Control (MAC) address. This is the physical address of any device—such as the NIC in a computer—on the network. The MAC address, which is made up of two equal parts, is 6 bytes long." Page 2-11

    Rate this question:

  • 7. 

    What defines traffic flow and is a basic protection mechanism on routers?

    • Telnet.

    • Access lists.

    • Hypertext Transfer Protocol session.

    • Virtual Local Area Networks.

    Correct Answer
    A. Access lists.
    Explanation
    "Access lists on routers are essential to performing basic protection mechanisms and defining traffic flows." Page 5-3

    Rate this question:

  • 8. 

    A collection of standards for local area network (LAN) architectures, protocols, and technologies called Project 802 were developed by the

    • Internet Engineering Task Force (IETF).

    • Institute of Electrical and Electronics Engineers (IEEE).

    • European Telecommunications Standards Institute (ETSI).

    • Internet Corporation for Assigned Names and Numbers (ICANN).

    Correct Answer
    A. Institute of Electrical and Electronics Engineers (IEEE).
    Explanation
    "A major contribution of the IEEE in the field of computer networking is Project 802; a collection of standards for local area network (LAN) architectures, protocols, and technologies. The 802 specifications define the operation of the physical network components—cabling, network adapters, and connectivity devices such as routers and switches." Page 1-5

    Rate this question:

  • 9. 

    What Electronic Industries Alliance (EIA)/Telecommunications Industry Association (TIA) standard is used for commercially building telecommunications cabling?

    • 568A.

    • 569A.

    • 570A.

    • 606A.

    Correct Answer
    A. 568A.
    Explanation
    "EIA/TIA 568A& B: Commercial Building Telecommunications Cabling Standard." Page 1-4

    Rate this question:

  • 10. 

    The interconnection of several networks in a city into a single larger network is a

    • Local area network (LAN).

    • Wide area network (WAN).

    • Virtual private network (VPN).

    • Metropolitan area network (MAN).

    Correct Answer
    A. Metropolitan area network (MAN).
    Explanation
    "A MAN is a network that interconnects users with computer resources in a geographic area or region larger than that covered by even a large LAN but smaller than the area covered by a WAN. The term is applied to the interconnection of networks in a city into a single larger network." Page 1-29

    Rate this question:

  • 11. 

    The combination transmitter/receiver device, in a single package, is called a

    • Transceiver.

    • Repeater.

    • Router.

    • Hub.

    Correct Answer
    A. Transceiver.
    Explanation
    "a transceiver is a combination transmitter/receiver in a single package." Page 3-1

    Rate this question:

  • 12. 

    What device provides the physical, electrical, and electronic connections to the network media?

    • Bridge.

    • Router.

    • Gateway.

    • Network interface card (NIC).

    Correct Answer
    A. Network interface card (NIC).
    Explanation
    "The network interface card (NIC), as its name suggests, is an expansion card you install in your computer to connect, or interface, your computer to the network. The NICs can be viewed as the actual interface between workstations, servers, clients, and the shared media of the network. These devices provide the physical, electrical, and electronic connections to the network media." Page 3-1 through 3-2

    Rate this question:

  • 13. 

    What protocol analyzer utility is used to see the path that packets are traveling and the time it takes the packets to complete the trip?

    • Trace Route.

    • Ping.

    • Who is.

    • Address Resolution Protocol (ARP).

    Correct Answer
    A. Trace Route.
    Explanation
    "The trace route test is used to see the path that packets are traveling and the time (delay in milliseconds) it takes the packets to complete the trip. Each node that processes the packet responds with the IP address of its ingress (inward) network interface. The results list the IP address of the network interface of each node the packet is routed through until the packet reaches the target node. The response time (delay in milliseconds) it took for each node to respond is also displayed." Page 3-17

    Rate this question:

  • 14. 

    What data communication protocol is based on bits and the position of the bits?

    • Character-oriented.

    • Bit-oriented.

    • Routing.

    • Network.

    Correct Answer
    A. Bit-oriented.
    Explanation
    "Whereas COPs are based on characters, bit-oriented protocols (BOP) are based on bits and the position of the bits." Page 1-24

    Rate this question:

  • 15. 

    What device subdivides a network into smaller logical pieces, or segments?

    • Switch.

    • Brouter.

    • Gateway.

    • Repeater.

    Correct Answer
    A. Switch.
    Explanation
    "A switch is a device that subdivides a network into smaller logical pieces, or segments." Page 3-3

    Rate this question:

  • 16. 

    Virtual private networks (VPN) allow the AF to extend network resources across a/an

    • Department of Defense network.

    • Air Force network.

    • Wide area network.

    • Public network.

    Correct Answer
    A. Public network.
    Explanation
    "Virtual private networks (VPN) allow the AF to extend network resources across a public shared infrastructure employing the same management policies applied to a protected network." Page 3-8

    Rate this question:

  • 17. 

    What type of cable property changes does a time-domain reflectometer (TDR) detect to identify problems?

    • Conductance.

    • Inductance.

    • Impedance.

    • Capacitance.

    Correct Answer
    A. Impedance.
    Explanation
    "The TDR detects impedance changes along a cable. The operation of the TDR is similar to radar. Pulses of energy are transmitted down the cable." Page 3-11

    Rate this question:

  • 18. 

    What Open System Interconnect (OSI) layer is closest to the end user?

    • Application.

    • Session.

    • Presentation.

    • Transport.

    Correct Answer
    A. Application.
    Explanation
    "The application layer is the OSI layer closest to the end user, which means that both the OSI application layer and the user interact directly with the software application." Page 1-15

    Rate this question:

  • 19. 

    In the Open System Interconnect (OSI) model, a layer will communicate with three other OSI layers. Which one is not one of those layers?

    • Layer above.

    • Layer below.

    • Lowest layer.

    • Peer layer.

    Correct Answer
    A. Lowest layer.
    Explanation
    "With the exception of the layers on each end, any layer in the OSI model communicates with three other OSI layers: the layer directly above it, the layer directly below it, and its peer layer in other networked devices." Page 1-16

    Rate this question:

  • 20. 

    A group of computers and associated devices that share a common communications line within a small geographic area is a

    • Metropolitan area network (MAN).

    • Local area network (LAN).

    • Wide area network (WAN).

    • Virtual private network (VPN).

    Correct Answer
    A. Local area network (LAN).
    Explanation
    "A LAN is a group of computers and associated devices that share a common communications line and typically share the resources of a single processor or server within a small geographic area (for example, within an office building)." Page 1-29

    Rate this question:

  • 21. 

    What type of network connects networks that are typically separated by geographical distances?

    • Local area network (LAN).

    • Wide area network (WAN).

    • Virtual private network (VPN).

    • Metropolitan area network (MAN).

    Correct Answer
    A. Wide area network (WAN).
    Explanation
    "A WAN is a network that links LANs and MANs by using long-distance communication links that are leased or purchased from a telecommunications company. Long-distance communication links can be described as telephone lines, microwave, or satellite communications. A WAN connects networks that are typically separated by geographical distances. These distances are between two cities within a state, between two states, across a country, or around the world." Page 1-29

    Rate this question:

  • 22. 

    A router’s strength is its

    • Intelligence.

    • Quality of service.

    • Different interface cards.

    • Different types of network connectors.

    Correct Answer
    A. Intelligence.
    Explanation
    "A router’s strength lies in its intelligence. Not only can routers keep track of the locations of certain nodes on the network, as switches can, but they can also determine the shortest, fastest path between two nodes." Page 3-5

    Rate this question:

  • 23. 

    Which routing protocol does internet backbones use?

    • Border Gateway Protocol (BGP).

    • Open Shortest Path First (OSPF).

    • Routing Information Protocol (RIP).

    • Enhanced Interior Gateway Routing Protocol (EIGRP).

    Correct Answer
    A. Border Gateway Protocol (BGP).
    Explanation
    "The BGP is the routing protocol of internet backbones and is not used to route between nodes on an autonomous LAN—that is, it is used on border and exterior routers." Page 3-7

    Rate this question:

  • 24. 

    A cable scanner wire-map display identifies crossover and straight-through cables by

    • Displaying opens, shorts, and split pairs.

    • Providing wiring maps at both ends of the cable.

    • Monitoring and providing access to conductors.

    • Measuring current, frequency, and resistance.

    Correct Answer
    A. Providing wiring maps at both ends of the cable.
    Explanation
    "The wire-map test configuration uses the injector for complete mapping of wiring at both ends of the cable. With the scanner and the injector connected at opposite ends of a link or cable, the correct wire map reading can be determined. The display shows the manner in which each wire is mated to the connectors at both ends of the cable. This feature helps to identify crossover and straight-through cables." Page 3-13

    Rate this question:

  • 25. 

    What test equipment has the capability of diagnosing digital network and developing communications software?

    • Digital distortion analyzer.

    • Protocol analyzer.

    • Communications test set.

    • Data analysis center.

    Correct Answer
    A. Protocol analyzer.
    Explanation
    "A protocol analyzer provides a capability for digital network diagnostics and for developing communications software." Page 3-13

    Rate this question:

  • 26. 

    Which Application layer protocol is used to send and receive files by way of transmission control protocol/internet protocol (TCP/IP)?

    • File Transfer Protocol (FTP).

    • Trivial File Transfer Protocol (TFTP).

    • Simple Mail Transfer Protocol (SMTP).

    • Hypertext Transfer Protocol (HTTP).

    Correct Answer
    A. File Transfer Protocol (FTP).
    Explanation
    "File transfer protocol (FTP) is used to send and receive files by way of TCP/IP. In FTP exchanges, a host running the FTP server portion accepts commands from another host running the FTP client portion." Page 2-6

    Rate this question:

  • 27. 

    Which protocol is simpler than File Transfer Protocol (FTP) when transferring files between computers?

    • FTP.

    • Trivial File Transfer Protocol (TFTP).

    • Simple Mail Transfer Protocol (SMTP).

    • Hypertext Transfer Protocol (HTTP).

    Correct Answer
    A. Trivial File Transfer Protocol (TFTP).
    Explanation
    "Trivial file transfer protocol (TFTP) is a protocol that enables file transfers between computers, but it is simpler (or more trivial) than FTP. A significant difference between FTP and TFTP is that TFTP relies on UDP at the Transport layer." Page 2-7

    Rate this question:

  • 28. 

    What is not a recommendation for planning networks using variable length subnet masking (VLSM)?

    • Start with the shortest mask.

    • Re-address the entire network.

    • Aim to use contiguous subnets where possible.

    • Choose one or more available subnets and subnet further.

    Correct Answer
    A. Re-address the entire network.
    Explanation
    "A number of points are worth emphasizing in relation to VLSM:
     Start with the shortest mask. Plan the subnets that support the most hosts. This is typically the mask used on most or all of the LAN segments.
     Choose one or more available subnets and subnet further. This is sometimes called “subnetting the subnets.” It is important to remember that this can be done only with one or more subnets that have not already been used up.
     Aim to use contiguous subnets where possible. Although it is not essential, it certainly makes very good sense to choose a continuous range of addresses and apply a particular mask to them. The advantage of this type of consistency is that it can be determined from the third octet address that this is a LAN segment and also that the mask is 24-bit." Page 2-17

    Rate this question:

  • 29. 

    What is the oldest routing protocol?

    • Border Gateway Protocol (BGP).

    • Open Shortest Path First (OSPF).

    • Routing Information Protocol (RIP).

    • Enhanced Interior Gateway Routing Protocol (EIGRP).

    Correct Answer
    A. Routing Information Protocol (RIP).
    Explanation
    "The oldest routing protocol, RIP, which is still widely used, factors in only the number of hops between nodes when determining a path from one point to another." Page 3-6

    Rate this question:

  • 30. 

    What security posture prevents everything that is not specifically authorized?

    • Default deny.

    • Default allow.

    • Close.

    • Open.

    Correct Answer
    A. Default deny.
    Explanation
    "A “default deny” posture to deny everything that is not specifically authorized." Page 5-8

    Rate this question:

  • 31. 

    What is the first line of defense when gaining access to a laptop computer’s operating system?

    • Physical security.

    • Information condition.

    • Logon identification and password combination.

    • File share level of effective permissions.

    Correct Answer
    A. Logon identification and password combination.
    Explanation
    "The first line of defense is to require a logon ID and password combination to gain access to the PC's operating system." Page 5-9

    Rate this question:

  • 32. 

    Who has unrestricted access to system commands and data?

    • Powerusers.

    • Supersusers.

    • Server operators.

    • Backup operators.

    Correct Answer
    A. Supersusers.
    Explanation
    "Control utility programs that provide unrestricted access to sensitive data. Some utility programs provide unrestricted access to system commands and data to “superusers” (e.g., system administrators)." Page 5-9

    Rate this question:

  • 33. 

    An intrusion detection system (IDS) may miss attacks that bypass the firewall like application-based attacks and

    • Snooping.

    • Tunneling.

    • Capturing.

    • Rejecting.

    Correct Answer
    A. Tunneling.
    Explanation
    "On the other hand, the more subtle and complex rules that an IDS uses to analyze system activity allow it to detect vulnerabilities and intrusions that a firewall may miss, including attacks that bypass the firewall. Examples are tunneling and application-based attacks." Page 5-12 Question was written incorrectly in book possibly?

    Rate this question:

  • 34. 

    What are the two vulnerability scanner examination techniques?

    • Internal and external.

    • Physical and logical.

    • Static and dynamic.

    • Passive and active.

    Correct Answer
    A. Passive and active.
    Explanation
    "Vulnerability scanners perform rigorous examinations of systems to identify weaknesses that might allow security violations. These products use two techniques for performing these examinations. First, passive, host-based mechanisms inspect system configuration files for unwise settings, system password files for weak passwords, and other system objects for security policy violations. These checks are followed, in most cases, by the second technique, active. In active examination, a networkbased assessment that reenacts common intrusion detection scripts and records system responses to the scripts." Page 5-14

    Rate this question:

  • 35. 

    What two sublayers did the Institute of Electrical and Electronics Engineers (IEEE) divide the Open System Interconnect (OSI) data link layers into?

    • High Level Data Link Control (HDLC) and Synchronous Data Link Control (SDLC).

    • Logical Link Control (LLC) and Media Access Control (MAC).

    • Data communications equipment (DCE) and data terminal equipment (DTE).

    • Electronic Industries Alliance (EIA) RS–232 and RS–530.

    Correct Answer
    A. Logical Link Control (LLC) and Media Access Control (MAC).
    Explanation
    "The IEEE has subdivided the data link layer into two sublayers: LLC and media access control (MAC)." Page 1-14

    Rate this question:

  • 36. 

    What are the two parts to an Internet Protocol version 4 (IPv4) address?

    • Network and host.

    • Network and class.

    • Class and host.

    • Network and octet.

    Correct Answer
    A. Network and host.
    Explanation
    "The octets are split into two sections: Net and Host. The Net section always contains the first octet. It is used to identify the network that a computer belongs to. Host (sometimes referred to as Node) identifies the actual computer on the network. The Host section always contains the last octet." Page 2-11

    Rate this question:

  • 37. 

    What is used on a transmission control protocol/internet protocol (TCP/IP) network to determine which network a computer is on?

    • Subnet host.

    • Subnet network.

    • Subnet mask.

    • Host mask.

    Correct Answer
    A. Subnet mask.
    Explanation
    "A computer on a TCP/IP network uses a subnet mask to determine what network it is on and whether a computer that it needs to send data to is located on a local network or on a remote network." Page 2-12

    Rate this question:

  • 38. 

    The time it takes a switch to figure out where to forward a data unit is called

    • Lag.

    • Hop.

    • Latency.

    • Time zone.

    Correct Answer
    A. Latency.
    Explanation
    "The time a switch takes to figure out where to forward a data unit is called its latency." Page 3-4

    Rate this question:

  • 39. 

    There is a worldwide nonprofit association of technical professionals that promotes the development of standards called the

    • Internet Engineering Task Force (IETF).

    • Institute of Electrical and Electronics Engineers (IEEE).

    • European Telecommunications Standards Institute (ETSI).

    • Internet Corporation for Assigned Names and Numbers (ICANN).

    Correct Answer
    A. Institute of Electrical and Electronics Engineers (IEEE).
    Explanation
    "IEEE is a worldwide nonprofit association of technical professionals that promotes the development of standards and acts as a catalyst for new technology in all aspects of the engineering industry, including computer networking, telecommunications, electric power, aerospace, and consumer electronics." Page 1-5

    Rate this question:

  • 40. 

    Which Electronics Industries Alliance (EIA) interface standard has the ability to work in either balanced or unbalanced electrical circuits?

    • RS–232–C.

    • RS–423.

    • RS–485.

    • RS–530.

    Correct Answer
    A. RS–530.
    Explanation
    "The RS–530 is also based on a 25-pin connection (fig. 1–2). It works in either balanced or unbalanced electrical circuits." Page 1-11

    Rate this question:

  • 41. 

    Which information unit, whose source and destination are network-layer entities, uses connectionless network service?

    • Frame.

    • Packet.

    • Segment.

    • Datagram.

    Correct Answer
    A. Datagram.
    Explanation
    "The term datagram usually refers to an information unit whose source and destination are network layer entities that use connectionless network service." Page 1-18

    Rate this question:

  • 42. 

    Which Application layer protocol is a utility that can verify that transmission control protocol/internet protocol (TCP/IP) is installed and communicating with the network?

    • Dynamic Host Configuration Protocol (DHCP).

    • Network Time Protocol (NTP).

    • File Transfer Protocol (FTP).

    • Ping.

    Correct Answer
    A. Ping.
    Explanation
    "Ping is a utility that can verify that TCP/IP is installed, bound to the network interface card (NIC), configured correctly, and communicating with the network. It is often employed simply to determine whether a host is responding (or “up”). Ping uses ICMP services to send echo request and echo reply messages that determine the validity of an IP address." Page 2-9

    Rate this question:

  • 43. 

    Which Internet protocol version 6 (IPv6) tunneling approach attempts to solve the issue of IPv6 to IP version 4 (IPv4), IP protocol 41 issue?

    • 6to4.

    • Teredo.

    • Tunnel Broker.

    • Intra-Site Automatic Tunnel Addressing Protocol (ISATAP).

    Correct Answer
    A. Teredo.
    Explanation
    "Teredo attempts to solve the lack of functionality issue 6to4 has with Network Address Translation (NAT). Tunneling from the hosts presents an issue for NAT: IPv6 packets that are
    encapsulated within IPv4 have the Protocol field in the IPv4 header set to 41." Page 2-21

    Rate this question:

  • 44. 

    Which type network enables users to share resources, files, and printers in a decentralized way?

    • Intranet.

    • Extranet.

    • Peer-to-peer.

    • Client-server.

    Correct Answer
    A. Peer-to-peer.
    Explanation
    "Peer-to-peer networking enables users to share resources, files, and printers in a decentralized way." Page 1-30

    Rate this question:

  • 45. 

    What protocol analyzer feature automatically runs in the background when the protocol analyzer application is activated?

    • Media Access Control (MAC) node statistics.

    • Connection statistics.

    • Protocol statistics.

    • Node discovery.

    Correct Answer
    A. Node discovery.
    Explanation
    "Node discovery automatically runs in the background when the protocol analyzer application is activated." Page 3-17

    Rate this question:

  • 46. 

    Which of the following is not a basic Simple Network Management Protocol (SNMP) command?

    • Write.

    • Read.

    • Trap.

    • Get.

    Correct Answer
    A. Get.
    Explanation
    "Managed devices are controlled and monitored using four basic SNMP commands: read, write, trap, and traversal operations." Page 4-2

    Rate this question:

  • 47. 

    Which network management function provides the capability to initialize, operate and shut down managed devices?

    • Fault.

    • Accounting.

    • Performance.

    • Configuration.

    Correct Answer
    A. Configuration.
    Explanation
    "Configuration management provides the capability to initialize, reconfigure, operate, and shut down managed devices." Page 4-4

    Rate this question:

  • 48. 

    What must be employed to ensure data integrity?

    • Check sums.

    • Access lists.

    • Encryption.

    • Authentication.

    Correct Answer
    A. Check sums.
    Explanation
    "Standardized transmission check sums must be employed throughout the network to be sure of data integrity. In case of an incident or catastrophic failure, routine data backup is used to help make sure of data integrity." Page 5-10

    Rate this question:

  • 49. 

    The definition of the Open System Interconnect (OSI) reference model was a major contribution to networking made by the

    • Internet Engineering Task Force (IETF).

    • International Telecommunication Union (ITU).

    • International Organization for Standardization (ISO).

    • Institute of Electrical and Electronics Engineers (IEEE).

    Correct Answer
    A. International Organization for Standardization (ISO).
    Explanation
    "ISO’s major contribution to networking has been the definition of the OSI Reference Model, which is a layered architecture model for communication between open network systems." Page 1-7

    Rate this question:

Quiz Review Timeline (Updated): Mar 21, 2023 +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 21, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Dec 09, 2014
    Quiz Created by
    Bryansomeone
Back to Top Back to top
Advertisement
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.