3d1x1 Volume 1 CDCs

Reviewed by Editorial Team
The ProProfs editorial team is comprised of experienced subject matter experts. They've collectively created over 10,000 quizzes and lessons, serving over 100 million users. Our team includes in-house content moderators and subject matter experts, as well as a global network of rigorously trained contributors. All adhere to our comprehensive editorial guidelines, ensuring the delivery of high-quality content.
Learn about Our Editorial Process
| By Usaaffamily
U
Usaaffamily
Community Contributor
Quizzes Created: 2 | Total Attempts: 1,965
| Attempts: 677
SettingsSettings
Please wait...
  • 1/100 Questions

    What are minor software updates or improvements called?

    • Bundles
    • Patches
    • Databases
    • Processors
Please wait...
CDCs Quizzes & Trivia
About This Quiz

This quiz titled '3D1X1 Volume 1 CDCs' assesses knowledge in network technologies, focusing on client-server implementations, network operational tasks, and TCP\/IP configuration. It is designed to prepare learners for certifications in network management and operations.


Quiz Preview

  • 2. 

    This practice uses tapes, eletronic vaulting, or mirrored disks and should be done regularly

    • Reconfiguration

    • Programming

    • Data backup

    • Reloading

    Correct Answer
    A. Data backup
    Explanation
    Data backup is the correct answer because the practice mentioned in the question involves using tapes, electronic vaulting, or mirrored disks to regularly back up data. This process helps in creating copies of important data to protect it from loss or damage. Regular data backups are essential for ensuring data integrity and availability in case of any unforeseen events such as hardware failures, data corruption, or security breaches.

    Rate this question:

  • 3. 

    What devices are mostly small, lightweight, and designed for mobile use?

    • Software

    • Hardware

    • Computers

    • Handhelds

    Correct Answer
    A. Handhelds
    Explanation
    Handhelds are mostly small, lightweight, and designed for mobile use. Unlike computers or hardware, handhelds are portable devices that can be easily carried and used on the go. They are specifically designed to be compact and lightweight, making them convenient for mobile use. Software is a general term that refers to programs and applications, while hardware encompasses physical components of a device. Therefore, handhelds are the most suitable option for devices that are small, lightweight, and designed for mobile use.

    Rate this question:

  • 4. 

    What entails how we communicate and manage data?

    • Information systems

    • Satellite systems

    • Airfield systems

    • Power systems

    Correct Answer
    A. Information systems
    Explanation
    Information systems encompass the processes, technologies, and resources used to collect, store, process, and disseminate data and information. They involve the use of various hardware, software, networks, and databases to facilitate communication and data management within an organization or across multiple organizations. Information systems enable efficient and effective communication, data storage, retrieval, analysis, and decision-making, thereby enhancing overall organizational performance and productivity.

    Rate this question:

  • 5. 

    What is one of the best habits a CST can form in order to save time, effort and prevent mistakes?

    • Working fast

    • Minimizing tools

    • Getting organized

    • Remembering everything

    Correct Answer
    A. Getting organized
    Explanation
    Getting organized is one of the best habits a CST can form in order to save time, effort, and prevent mistakes. By being organized, a CST can easily locate and access the tools, equipment, and information needed for their work, reducing the time spent searching for things. It also helps in keeping track of tasks, deadlines, and important information, preventing any oversights or mistakes. Being organized allows a CST to work efficiently and effectively, ensuring that tasks are completed accurately and on time.

    Rate this question:

  • 6. 

    What is the unique identification number a network interface card (NIC) provides to a personal computer?

    • MAC address

    • IEEE address

    • OUI address

    • SAS address

    Correct Answer
    A. MAC address
    Explanation
    A network interface card (NIC) provides a unique identification number to a personal computer known as a MAC address. MAC stands for Media Access Control, and it is a unique identifier assigned to the NIC by the manufacturer. This address is used to identify the device on a network and is essential for communication between devices. The MAC address is a 48-bit hexadecimal number, typically displayed in six groups of two digits separated by colons or hyphens.

    Rate this question:

  • 7. 

    When troubleshooting after a system failure, this step is a last resort effort when all other avenues have been exhausted

    • Reboot the system

    • Reinstall application programs

    • Remove and replace the OS

    • Remove and replace the CD/DVD-ROM drive

    Correct Answer
    A. Remove and replace the OS
    Explanation
    When troubleshooting after a system failure, removing and replacing the operating system (OS) is considered a last resort effort when all other avenues have been exhausted. This step involves completely removing the current OS and installing a fresh copy. It is typically done when all other troubleshooting steps, such as rebooting the system or reinstalling application programs, have failed to resolve the issue. By removing and replacing the OS, it is hoped that any underlying software or configuration issues causing the system failure will be resolved.

    Rate this question:

  • 8. 

    What part of client systems includes the physical aspect of computers, telecommunications, and other devices, to include the interconnect devices?

    • Programs

    • Processes

    • Hardware

    • Paperwork

    Correct Answer
    A. Hardware
    Explanation
    The correct answer is hardware because it encompasses the physical components of client systems such as computers, telecommunications devices, and interconnect devices. This includes tangible items like monitors, keyboards, routers, and cables that are essential for the functioning of client systems. Programs and processes refer to the software and tasks that run on the hardware, while paperwork is unrelated to the physical aspect of client systems.

    Rate this question:

  • 9. 

    What protocol provides an almost unlimited number of IP addresses?

    • TCP/IP

    • VIP

    • IPv6

    • IPv4

    Correct Answer
    A. IPv6
    Explanation
    IPv6 is the correct answer because it provides an almost unlimited number of IP addresses. Unlike its predecessor, IPv4, which has a limited address space, IPv6 uses a 128-bit address format, allowing for approximately 3.4×10^38 unique addresses. This abundance of addresses ensures that there will be enough IP addresses to accommodate the growing number of devices connected to the internet.

    Rate this question:

  • 10. 

    What type of remote network provides a private tunnel through public cloud (the Internet)

    • VPN

    • Peer to peer

    • Broadband

    • Three tier

    Correct Answer
    A. VPN
    Explanation
    A VPN (Virtual Private Network) is a type of remote network that provides a private tunnel through a public cloud, which is typically the Internet. It allows users to securely access and transmit data over the Internet by encrypting the communication between the user's device and the remote network. This ensures that the data remains private and protected from unauthorized access or interception. VPNs are commonly used by individuals and organizations to establish secure connections and access resources remotely.

    Rate this question:

  • 11. 

    Which of these is a disadvantage of client-server networks?

    • A high level of security can be implemented at the server

    • Users are relieved of the burden of managing resources

    • Managing servers requires a dedicated staff

    • More powerful resources can be shared

    Correct Answer
    A. Managing servers requires a dedicated staff
    Explanation
    Managing servers requires a dedicated staff is a disadvantage of client-server networks. This means that organizations need to allocate resources and personnel to handle the maintenance, administration, and troubleshooting of the servers. This can increase the cost and complexity of the network infrastructure.

    Rate this question:

  • 12. 

    What is installed on a computer to act as the interface between the computer and network?

    • NIC

    • Ethernet

    • Transeiver

    • Coaxial cable

    Correct Answer
    A. NIC
    Explanation
    A Network Interface Card (NIC) is installed on a computer to act as the interface between the computer and the network. It allows the computer to connect to a network by providing the necessary hardware and software components. The NIC handles the conversion of data between the computer and the network, ensuring smooth communication and data transfer. It is an essential component for network connectivity and enables the computer to send and receive data over the network.

    Rate this question:

  • 13. 

    Any hardware added to a computer that expands its capabilities is referred to as a/an

    • Port

    • Peripheral

    • Interface

    • I/O device

    Correct Answer
    A. Peripheral
    Explanation
    A peripheral is a hardware device that is added to a computer to expand its capabilities. It is an external device that connects to the computer through a port or interface. Examples of peripherals include printers, scanners, keyboards, and mice. These devices allow the computer to interact with the outside world and perform additional functions beyond its basic capabilities.

    Rate this question:

  • 14. 

    What is an essential tool for any CST to find software approved for use on an AF network?

    • Certification

    • Enterprise license

    • Enterprise Software Agreement

    • Evaluated/Approved Product List

    Correct Answer
    A. Evaluated/Approved Product List
    Explanation
    The essential tool for any CST to find software approved for use on an AF network is the Evaluated/Approved Product List. This list contains software that has been evaluated and approved for use on the network, ensuring that it meets the necessary security and compatibility requirements. It helps CSTs make informed decisions about which software to use, reducing the risk of introducing vulnerabilities or compatibility issues on the network.

    Rate this question:

  • 15. 

    What piece of equipment is at the core of most Wi-Fi networks?

    • Client

    • Router

    • Network interface card

    • Intrustion detection system

    Correct Answer
    A. Router
    Explanation
    A router is the central piece of equipment in most Wi-Fi networks. It is responsible for connecting multiple devices to the network, directing data packets between them, and enabling communication between devices within the network and with devices outside the network. The router acts as a gateway, allowing devices to access the internet and facilitating the transmission of data between devices. Without a router, a Wi-Fi network would not be able to function properly.

    Rate this question:

  • 16. 

    What type of remote network access is often the only choice for rural or remote areas?

    • Dial-up

    • Wireless

    • Broadband

    • VPN

    Correct Answer
    A. Dial-up
    Explanation
    Dial-up is often the only choice for rural or remote areas because it uses existing telephone lines to establish a connection. In such areas, infrastructure for broadband or wireless networks might be limited or unavailable. Dial-up access allows users to connect to the internet using a modem and a telephone line, making it a viable option for areas where other types of network access are not feasible.

    Rate this question:

  • 17. 

    What does Wi-Fi use to carry network signals to the network access point?

    • Cable lines

    • Radio waves

    • Dedicated lines

    • Telephone lines

    Correct Answer
    A. Radio waves
    Explanation
    Wi-Fi uses radio waves to carry network signals to the network access point. Radio waves are electromagnetic waves that can travel through the air, allowing wireless communication between devices. Wi-Fi devices, such as routers and smartphones, transmit and receive data using these radio waves, enabling wireless internet connectivity. This technology eliminates the need for physical cables, making it convenient for users to connect to the internet from different locations within the Wi-Fi network's range.

    Rate this question:

  • 18. 

    Which file system is the best choice for data storage if the server is a dedicated Windows server?

    • NTFS

    • FATS

    • Neither FATS nor NTFS

    • Either FATS or NTFS

    Correct Answer
    A. NTFS
    Explanation
    NTFS (New Technology File System) is the best choice for data storage on a dedicated Windows server because it offers advanced features such as file and folder permissions, encryption, compression, and support for larger file sizes and volumes. NTFS also provides better stability, reliability, and security compared to FAT (File Allocation Table) systems.

    Rate this question:

  • 19. 

    Which hardware requirement is defined as the model and the clock speed of the CPU?

    • Memory

    • Peripherals

    • Architecture

    • Processing power

    Correct Answer
    A. Processing power
    Explanation
    The hardware requirement that is defined as the model and the clock speed of the CPU is processing power. Processing power refers to the capability of the CPU to perform tasks and process data. The model of the CPU determines its architecture and capabilities, while the clock speed represents the number of instructions it can execute per second. Therefore, processing power is directly influenced by the model and clock speed of the CPU.

    Rate this question:

  • 20. 

    What program translates commands between a device and the programs that use the device?

    • Operating system

    • Memory

    • Driver

    • Port

    Correct Answer
    A. Driver
    Explanation
    A driver is a program that facilitates communication between a device and the programs that use the device. It acts as a translator, converting commands from the programs into a language that the device can understand and vice versa. This allows the device to function properly and enables the programs to interact with the device effectively.

    Rate this question:

  • 21. 

    What is the simplest and most efficient way to duplicate a computer's software, with no loss of files or configurations within the programs?

    • WinZip

    • Norton Utilities

    • Bundled software

    • Imaging software

    Correct Answer
    A. Imaging software
    Explanation
    Imaging software is the simplest and most efficient way to duplicate a computer's software without any loss of files or configurations within the programs. Imaging software creates an exact copy or image of the entire hard drive, including the operating system, installed programs, and data. This image can then be easily transferred to another computer or stored as a backup. It ensures that all files, settings, and configurations are preserved, making it an ideal solution for duplicating a computer's software.

    Rate this question:

  • 22. 

    The term used to refer to the process of launching the OS is the

    • Boot

    • Random access memory

    • Basic Input/Output System

    • Complimentary Metal-Oxide Semiconductor

    Correct Answer
    A. Boot
    Explanation
    The term used to refer to the process of launching the OS is "Boot". Booting is the initial process that a computer undergoes when it is turned on. During this process, the computer's hardware is initialized, and the operating system is loaded into the computer's memory. The term "boot" is derived from the phrase "pulling oneself up by one's bootstraps," as the computer essentially pulls itself up and starts running on its own.

    Rate this question:

  • 23. 

    Which item is not a good practice in helping with future troubleshooting?

    • Remembering every step taken

    • Knowing your network

    • Documentation

    • Gathering facts

    Correct Answer
    A. Remembering every step taken
    Explanation
    Remembering every step taken is not a good practice in helping with future troubleshooting because relying solely on memory can lead to inaccuracies and omissions. Documentation, on the other hand, provides a reliable and detailed record of the troubleshooting process, making it easier to identify and resolve issues in the future. Additionally, knowing your network and gathering facts are essential practices that contribute to effective troubleshooting by providing a better understanding of the system and its potential problems.

    Rate this question:

  • 24. 

    What type of printer software configuration option requires a new port to be created?

    • Telnet

    • Local printer

    • Driver printing

    • TCP/IP printing

    Correct Answer
    A. TCP/IP printing
    Explanation
    TCP/IP printing is a type of printer software configuration option that requires a new port to be created. This is because TCP/IP printing allows printing over a network using the TCP/IP protocol. In order to establish the connection between the printer and the network, a new port needs to be created to facilitate the communication. This port will enable the printer to receive print jobs from multiple devices connected to the network and ensure efficient printing.

    Rate this question:

  • 25. 

    What item below is not found in the Active Directory structure?

    • Domains

    • Objects

    • Forests

    • Wi-Fi

    Correct Answer
    A. Wi-Fi
    Explanation
    The Active Directory structure is a hierarchical structure used by Microsoft Windows to store information about objects on a network. Domains, objects, and forests are all components of the Active Directory structure. However, Wi-Fi is not a component of the Active Directory structure as it is a wireless networking technology and not directly related to the management and organization of network objects within Active Directory.

    Rate this question:

  • 26. 

    Which term describes that data is whole or complete?

    • Driver

    • Parity bit

    • Data integrity

    • Error correction

    Correct Answer
    A. Data integrity
    Explanation
    Data integrity refers to the accuracy, consistency, and reliability of data throughout its entire lifecycle. It ensures that data is complete, accurate, and reliable, without any errors or inconsistencies. Therefore, data integrity is the term that describes that data is whole or complete.

    Rate this question:

  • 27. 

    With a software license agreement, who has the full rights to the software and its further distribution and repoduction?

    • Buyer

    • Publisher

    • US Air Force

    • US government

    Correct Answer
    A. Publisher
    Explanation
    The correct answer is "Publisher." In a software license agreement, the publisher retains the full rights to the software and its further distribution and reproduction. This means that they have the authority to control how the software is used, sold, and distributed to others. The buyer of the software typically only receives a license to use the software under certain conditions set by the publisher. The US Air Force and US government may have specific agreements or contracts with publishers for software usage, but they do not automatically have full rights to the software.

    Rate this question:

  • 28. 

    Use which tool to list all installed device drivers and their status, find hardware components that are not functioning properly or two devices that are in conflict on an operating system (OS)?

    • Event Viewer

    • Control Panel

    • Device Manager

    • Network Connections

    Correct Answer
    A. Device Manager
    Explanation
    Device Manager is the correct answer because it is a tool that allows users to view and manage all the installed device drivers on an operating system. It provides information about the status of each device driver and can help identify hardware components that are not functioning properly or devices that are in conflict with each other. It is a useful tool for troubleshooting and resolving issues related to hardware devices on a computer.

    Rate this question:

  • 29. 

    Members of this group have full control of the server or individual workstations and can assign user rights and access control permissions

    • Domain group accounts

    • Domain user accounts

    • Local Administrators

    • Local user

    Correct Answer
    A. Local Administrators
    Explanation
    Local Administrators have full control of the server or individual workstations and can assign user rights and access control permissions. This group is typically created on each individual computer or server and is used to manage local user accounts and permissions. Members of the Local Administrators group have the highest level of administrative privileges on a specific computer or server, allowing them to make changes, install software, and modify system settings.

    Rate this question:

  • 30. 

    What technology involves the capture and storage of a distinctive, measureable characteristic, feature, or trait of an individual for later recognition by automated means?

    • Microtechnology

    • Nanotechnology

    • Biometrics

    • Protocols

    Correct Answer
    A. Biometrics
    Explanation
    Biometrics refers to the technology that involves capturing and storing a unique characteristic or trait of an individual, such as fingerprints, facial features, or iris patterns, for later recognition by automated systems. This technology is widely used in various applications, including security systems, access control, and identification purposes, as it provides a reliable and accurate method of verifying a person's identity.

    Rate this question:

  • 31. 

    Which is not a valid form of identity management?

    • Iris

    • Hair

    • Palm

    • Voice

    Correct Answer
    A. Hair
    Explanation
    Hair is not a valid form of identity management because it is not unique to an individual and can easily be altered or changed. Unlike other options such as iris, palm, and voice, hair does not possess distinct characteristics that can be reliably used for identification purposes. Hair can be cut, dyed, or styled differently, making it an unreliable and easily manipulated form of identity management.

    Rate this question:

  • 32. 

    Printer hardware configuration via the web is done through

    • Hypertext transfer protocol

    • Printer font panel controls

    • Hewlett Packard Jetadmin

    • Telnet

    Correct Answer
    A. Hypertext transfer protocol
    Explanation
    Printer hardware configuration via the web is done through hypertext transfer protocol (HTTP). HTTP is the protocol used for transmitting data over the internet and it allows users to access and interact with webpages. In the context of printer configuration, HTTP enables users to access the printer's web interface through a web browser, where they can make changes to the printer settings and configurations. This method provides a user-friendly and convenient way to manage printer hardware configurations remotely.

    Rate this question:

  • 33. 

    Who centrally manages the Air Force server updates that keep your workstation antivirus software current?

    • Enterprise Information Technology Service Desk

    • AFNOC

    • Workgroups

    • Clients

    Correct Answer
    A. AFNOC
    Explanation
    AFNOC, or the Air Force Network Operations Center, centrally manages the Air Force server updates that keep your workstation antivirus software current. This suggests that AFNOC is responsible for overseeing and coordinating the updates for antivirus software on the Air Force servers, ensuring that all workstations are kept up to date with the latest protection against viruses and malware.

    Rate this question:

  • 34. 

    Which type of memory is used to duplicate frequently used information stored elsewhere or computer earlier, because the original date is time consuming to retrieve or to compute?

    • RAM

    • ROM

    • Buffer

    • Cache

    Correct Answer
    A. Cache
    Explanation
    Cache memory is used to duplicate frequently used information stored elsewhere or computed earlier because the original data retrieval or computation process is time-consuming. Cache memory is a high-speed memory that stores frequently accessed data closer to the CPU, allowing for faster access compared to accessing the data from the main memory or storage. This helps in improving the overall performance and efficiency of the computer system.

    Rate this question:

  • 35. 

    Which media has a storage capacity of a GB-TB, has a slow to moderate speed and is moderately expensive?

    • Tape

    • Network

    • CD-ROM

    • DVD Rom

    Correct Answer
    A. Tape
    Explanation
    Tape is the correct answer because it has a storage capacity of a GB-TB, which refers to gigabytes to terabytes. It also has a slow to moderate speed, meaning it may take longer to access or transfer data compared to other media. Additionally, tape is moderately expensive, suggesting that it is not as affordable as other options like CD-ROM or DVD-ROM.

    Rate this question:

  • 36. 

    What describes how a computer finds a specific byte it is looking for in memory?

    • Processing

    • Programming

    • Memory addressing

    • Memory segmenting

    Correct Answer
    A. Memory addressing
    Explanation
    Memory addressing refers to the process by which a computer locates a specific byte in its memory. It involves assigning unique addresses to each byte in memory, allowing the computer to easily retrieve and manipulate data. This process is crucial for efficient memory management and data retrieval within a computer system. By using memory addressing, a computer can quickly and accurately locate the specific byte it is looking for, enabling smooth execution of programs and processes.

    Rate this question:

  • 37. 

    What are the two major ways to implement a client server network?

    • First/last

    • High/low

    • Thick/thin

    • Client/workstation

    Correct Answer
    A. Thick/thin
    Explanation
    The two major ways to implement a client-server network are thick and thin. In a thick client-server network, the majority of the processing power and resources are located on the client side, while the server primarily handles data storage and retrieval. This type of network allows for more control and flexibility on the client side but requires more powerful hardware. In contrast, a thin client-server network offloads most of the processing and resources to the server, with the clients acting as simple terminals. This approach reduces the hardware requirements for clients but may result in decreased performance and limited functionality.

    Rate this question:

  • 38. 

    The specifications that should be met, if not exceeded, to ensure a computer is compatible as well as powerful enough to run an operating system without constant problems is for the computer to have the minimum

    • Software

    • Hardware

    • Processors

    • Applications

    Correct Answer
    A. Hardware
    Explanation
    To ensure a computer is compatible and powerful enough to run an operating system without constant problems, it is crucial for the computer to have the necessary hardware specifications. This includes components such as the processor, memory, storage, and graphics card, which should meet or exceed the minimum requirements specified by the operating system. Having the right hardware ensures that the computer can handle the demands of the operating system and its applications effectively, resulting in a smooth and efficient performance.

    Rate this question:

  • 39. 

    What should be done before anything else, once the operating system installation is complete?

    • A reboot

    • Install drivers

    • Set a password

    • Install antivirus

    Correct Answer
    A. Install antivirus
    Explanation
    Once the operating system installation is complete, it is important to install antivirus software before anything else. This is because without antivirus protection, the system is vulnerable to various malware and viruses that can compromise its security and functionality. Installing antivirus software ensures that the system is protected from potential threats and helps in maintaining a secure and healthy operating environment.

    Rate this question:

  • 40. 

    If this security feature is enabled on a wireless network, access points or routers perform additional checks, helping prevent netwrok break-ins

    • Encryption

    • SSID

    • DHCP

    • MAC address filtering

    Correct Answer
    A. MAC address filtering
    Explanation
    MAC address filtering is a security feature that can be enabled on a wireless network. It works by allowing or denying access to devices based on their unique MAC addresses. When this feature is enabled, access points or routers perform additional checks to verify the MAC address of devices trying to connect to the network. By filtering MAC addresses, the network can prevent unauthorized devices from accessing it, thus helping to prevent network break-ins.

    Rate this question:

  • 41. 

    How many byte sectors is a hard disk divided into?

    • 124

    • 248

    • 512

    • 1024

    Correct Answer
    A. 512
    Explanation
    A hard disk is divided into 512-byte sectors. This division allows for efficient storage and retrieval of data on the disk. Each sector is a small unit of storage that can hold a fixed amount of data. By dividing the hard disk into sectors, the operating system can easily manage and access the data stored on the disk.

    Rate this question:

  • 42. 

    The first sector at the beginning of a hard drive is called the master

    • Volume

    • Cylinder

    • Partition

    • Boot record

    Correct Answer
    A. Boot record
    Explanation
    The first sector at the beginning of a hard drive is called the boot record. This sector contains important information such as the file system type, the location of the operating system files, and instructions on how to boot up the computer. It is crucial for the computer to locate and read the boot record in order to start the operating system and initiate the booting process.

    Rate this question:

  • 43. 

    The transfer of eight bits of data simultaneously through eight separate lines in a single cable is a function of a

    • Serial port

    • Parallel port

    • Switching port

    • USB

    Correct Answer
    A. Parallel port
    Explanation
    The transfer of eight bits of data simultaneously through eight separate lines in a single cable is a function of a parallel port. Unlike a serial port which transfers data one bit at a time, a parallel port allows for faster data transfer by sending multiple bits simultaneously through separate lines. This is particularly useful for devices that require high-speed data transfer, such as printers or external storage devices.

    Rate this question:

  • 44. 

    This type of memory is blank and instructions can be placed on permanently

    • ROM

    • RAM

    • CMOS

    • PROM

    Correct Answer
    A. PROM
    Explanation
    PROM stands for Programmable Read-Only Memory. It is a type of memory that can be programmed with instructions or data permanently. Once the instructions are stored in PROM, they cannot be changed or erased. This makes PROM suitable for storing firmware or software that should not be modified. Unlike RAM (Random Access Memory) which is volatile and loses its content when power is turned off, PROM retains its data even when power is removed. CMOS (Complementary Metal-Oxide-Semiconductor) is a type of technology used in integrated circuits, while ROM (Read-Only Memory) refers to any type of memory that cannot be modified.

    Rate this question:

  • 45. 

    What access control uses segregation of duties and security screening for users?

    • Administrative

    • Technical

    • Physical

    • Local

    Correct Answer
    A. Administrative
    Explanation
    Administrative access control uses segregation of duties and security screening for users. This means that different tasks and responsibilities are assigned to different individuals to prevent any single person from having complete control over a system. Additionally, security screening processes are implemented to ensure that users are trustworthy and have the necessary qualifications and clearances to access certain resources. This helps to minimize the risk of unauthorized access and potential security breaches.

    Rate this question:

  • 46. 

    What percentage of all network problems occur at the data link and physical layers of the open systems interconnects reference model?

    • 15 percent

    • 30 percent

    • 45 percent

    • 60 percent

    Correct Answer
    A. 60 percent
    Explanation
    The correct answer is 60 percent because the data link and physical layers of the open systems interconnect reference model are responsible for handling the physical transmission of data and ensuring its integrity. These layers deal with issues such as signal interference, cable faults, and network congestion, which are common causes of network problems. Therefore, it is likely that a significant majority of network problems occur at these layers, making up 60 percent of all network problems.

    Rate this question:

  • 47. 

    What piece of test equipment can help verify connectivity and identify shorts, reversed, crossed or split pairs on a network?

    • Time domain reflectometer

    • Wide-area network tester

    • Local-area network tester

    • Signal generator

    Correct Answer
    A. Local-area network tester
    Explanation
    A local-area network tester is a piece of test equipment that can help verify connectivity and identify various issues on a network. It can be used to check for shorts, reversed connections, crossed connections, or split pairs, which are common problems that can affect network performance. By using a local-area network tester, technicians can quickly identify and troubleshoot these issues, ensuring that the network is functioning properly.

    Rate this question:

  • 48. 

    What drives faster processing speeds and increases the power of many computers and communication devices?

    • Microtechnology

    • Nanotechnology

    • Gigatechnology

    • Biotechnology

    Correct Answer
    A. Nanotechnology
    Explanation
    Nanotechnology is the correct answer because it involves manipulating and controlling matter at the nanoscale level, which allows for the creation of smaller and more efficient components in computers and communication devices. By utilizing nanotechnology, it is possible to enhance processing speeds and increase the power of these devices, leading to faster and more advanced technology.

    Rate this question:

  • 49. 

    What device receives information from the internet and translates it into a radio signal and sends it to the computer's wireless adapter?

    • Network interface card

    • Ethernet

    • Router

    • Wi-Fi

    Correct Answer
    A. Router
    Explanation
    A router is a device that receives information from the internet and translates it into a radio signal, which is then sent to the computer's wireless adapter. The router acts as a bridge between the internet and the computer, allowing for wireless connectivity and communication. It receives data packets from the internet and forwards them to the appropriate devices on the network, including the computer's wireless adapter, which can then interpret the radio signal and access the internet.

    Rate this question:

Quiz Review Timeline (Updated): Mar 21, 2023 +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 21, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Aug 22, 2012
    Quiz Created by
    Usaaffamily
Back to Top Back to top
Advertisement
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.