3d1x2 5 Level CDC Vol. 2

Reviewed by Editorial Team
The ProProfs editorial team is comprised of experienced subject matter experts. They've collectively created over 10,000 quizzes and lessons, serving over 100 million users. Our team includes in-house content moderators and subject matter experts, as well as a global network of rigorously trained contributors. All adhere to our comprehensive editorial guidelines, ensuring the delivery of high-quality content.
Learn about Our Editorial Process
| By Woodjh
W
Woodjh
Community Contributor
Quizzes Created: 3 | Total Attempts: 4,193
| Attempts: 1,214 | Questions: 93
Please wait...
Question 1 / 93
0 %
0/100
Score 0/100
1. Which Application layer protocol is an automated means of assigning a unique internet protocol (IP) address to every device on a network?

Explanation

The correct answer is Dynamic Host Configuration Protocol (DHCP). DHCP is an application layer protocol that automates the process of assigning unique IP addresses to devices on a network. It allows for the dynamic allocation of IP addresses, making it easier to manage and configure network devices. DHCP eliminates the need for manual IP address assignment and ensures efficient utilization of available IP addresses.

Submit
Please wait...
About This Quiz
Professional Certification Quizzes & Trivia

This quiz, titled '3D1X2 5 level CDC vol. 2', assesses knowledge in digital signal processing, telecommunications cabling standards, and data encoding systems. It is designed for professionals seeking... see moreto validate their expertise in network and communication infrastructure. see less

2. The physical address of any device on the network is a/an

Explanation

The physical address of any device on the network is a Media Access Control (MAC) address. A MAC address is a unique identifier assigned to network interfaces for communications on the physical network segment. It is used to identify devices on a local network and is different from an IP address. MAC addresses are assigned by the manufacturer and are hardcoded into the network interface card, making them unique to each device.

Submit
3. What device provides the physical, electrical, and electronic connections to the network media?

Explanation

A network interface card (NIC) is a device that provides the physical, electrical, and electronic connections to the network media. It is responsible for connecting a computer or other network-enabled device to the network, allowing it to send and receive data. The NIC acts as an interface between the computer and the network, converting the digital data into electrical signals that can be transmitted over the network media, such as Ethernet cables or wireless connections. Therefore, the NIC is the correct answer as it directly provides the necessary connections to the network media.

Submit
4. What protocol analyzer utility is used to determine if a network node is connected or responding?

Explanation

Ping is a protocol analyzer utility that is commonly used to determine if a network node is connected or responding. It sends a small packet of data to the specified network node and waits for a response. If a response is received, it indicates that the node is connected and responding. If no response is received, it suggests that the node may be disconnected or not responding. Therefore, Ping is the correct answer for this question.

Submit
5. How many possible symbols can 4 bits represent?

Explanation

Four bits can represent 2^4 = 16 possible symbols. Each bit can have two possible values, 0 or 1. Therefore, with four bits, there are 2 * 2 * 2 * 2 = 16 different combinations, each representing a unique symbol.

Submit
6. What device subdivides a network into smaller logical pieces, or segments?

Explanation

A switch is a device that subdivides a network into smaller logical pieces or segments. It operates at the data link layer of the OSI model and uses MAC addresses to forward data packets to the appropriate destination. Switches provide improved network performance and security by creating separate collision domains, allowing for simultaneous communication between different devices on the network. They also help to reduce network congestion by only forwarding data packets to the specific devices that need them, rather than broadcasting them to all devices on the network.

Submit
7. What protocol analyzer utility is used to see the path that packets are traveling and the time it takes the packets to complete the trip?

Explanation

Trace Route is a protocol analyzer utility that is used to see the path that packets are traveling and the time it takes for the packets to complete the trip. It helps in identifying the routers or network devices through which the packets are passing and also provides information about the round-trip time (RTT) for each hop. This can be useful in troubleshooting network connectivity issues and identifying any bottlenecks or delays in the network. Ping, Who is, and Address Resolution Protocol (ARP) are not specifically designed for this purpose.

Submit
8. What defines traffic flow and is a basic protection mechanism on routers?

Explanation

Access lists are a basic protection mechanism on routers that define traffic flow. They are used to filter network traffic based on specific criteria, such as source or destination IP addresses, protocols, or port numbers. Access lists can be configured to allow or deny traffic, providing control over the flow of data through the router. By using access lists, administrators can implement security measures and prevent unauthorized access or malicious activities on the network.

Submit
9. A collection of standards for local area network (LAN) architectures, protocols, and technologies called Project 802 were developed by the

Explanation

The correct answer is Institute of Electrical and Electronics Engineers (IEEE). The IEEE developed a collection of standards for LAN architectures, protocols, and technologies called Project 802. The IEEE is a professional association that focuses on the advancement of technology in various fields, including electrical engineering and computer science. They are responsible for setting standards in the industry to ensure compatibility and interoperability between different devices and systems.

Submit
10. In binary-synchronous protocol, what character is used to establish and maintain character synchronization prior to the message block and during transmission?

Explanation

In binary-synchronous protocol, the character "SYN" is used to establish and maintain character synchronization prior to the message block and during transmission. This character helps to ensure that the sender and receiver are in sync and can accurately interpret the data being transmitted. It acts as a signal to indicate the start and end of a message, allowing for reliable communication between devices.

Submit
11. What data communication protocol is based on bits and the position of the bits?

Explanation

Bit-oriented is the correct answer because this data communication protocol is based on individual bits and their positions. It focuses on the manipulation and transmission of bits, ensuring accurate and reliable data transfer. Character-oriented protocols, on the other hand, deal with complete characters or groups of characters rather than individual bits. Routing and network are not relevant to the question as they refer to different aspects of data communication.

Submit
12. The interconnection of several networks in a city into a single larger network is a

Explanation

A metropolitan area network (MAN) refers to the interconnection of several networks within a city to form a larger network. Unlike a local area network (LAN) which is limited to a small geographical area, a MAN covers a larger area such as a city or metropolitan region. This allows for the sharing of resources and communication between different networks within the city. Therefore, a MAN is the most suitable option for the given scenario.

Submit
13. A router's strength is its

Explanation

A router's strength lies in its intelligence. This refers to its ability to analyze network traffic, make decisions on the most efficient path for data packets, and manage the flow of data between different networks. The intelligence of a router allows it to effectively route data, prioritize certain types of traffic over others, and provide security features such as firewall protection. This intelligence is what makes routers essential in directing and managing network traffic in a reliable and efficient manner.

Submit
14. What is the oldest routing protocol?

Explanation

The correct answer is Routing Information Protocol (RIP). RIP is the oldest routing protocol and was one of the first widely used protocols in the early days of networking. It is a distance-vector routing protocol that uses hop count as the metric to determine the best path for data packets. RIP has limitations in terms of scalability and convergence time, but it is still used in small networks or as a basic routing protocol. BGP, OSPF, and EIGRP are newer routing protocols that have been developed to address the limitations of RIP and provide more advanced features and capabilities.

Submit
15. What type of network connects networks that are typically separated by geographical distances?

Explanation

A wide area network (WAN) is a type of network that connects networks that are typically separated by geographical distances. Unlike a local area network (LAN) which is confined to a small area, a WAN covers a larger area and allows for communication between different LANs or other networks that are located in different locations. This type of network is commonly used by organizations to connect their offices or branches that are located in different cities or countries.

Submit
16. The combination transmitter/receiver device, in a single package, is called a

Explanation

A combination transmitter/receiver device, in a single package, is commonly known as a transceiver. This device is capable of both transmitting and receiving signals, making it a versatile tool for communication purposes. It eliminates the need for separate devices for transmitting and receiving, providing convenience and efficiency. A transceiver is often used in various communication systems, such as telecommunications, wireless networks, and radio frequency applications.

Submit
17. What type of cable property changes does a time-domain reflectometer (TDR) detect to identify problems?

Explanation

A time-domain reflectometer (TDR) is a device used to measure the impedance of a cable. Impedance refers to the total opposition to the flow of an alternating current in a circuit. By detecting changes in impedance, a TDR can identify problems in the cable, such as breaks, shorts, or impedance mismatches. Conductance, inductance, and capacitance are also properties of cables, but they do not specifically indicate problems in the same way that changes in impedance do.

Submit
18. There is a worldwide nonprofit association of technical professionals that promotes the development of standards called the

Explanation

The correct answer is Institute of Electrical and Electronics Engineers (IEEE). IEEE is a worldwide nonprofit association of technical professionals that promotes the development of standards in various fields, including electrical engineering, electronics, telecommunications, and computer science. While organizations like IETF, ETSI, and ICANN also play important roles in establishing standards, IEEE is specifically known for its contributions in the field of electrical and electronics engineering.

Submit
19. In the Open System Interconnect (OSI) model, a layer will communicate with three other OSI layers. Which one is not one of those layers?

Explanation

The lowest layer is not one of the layers that a layer in the OSI model communicates with. The OSI model consists of seven layers, and each layer communicates with the layer above, the layer below, and its peer layer. The lowest layer, also known as the physical layer, is responsible for the actual transmission and reception of data on the physical medium, such as cables or wireless signals. It does not communicate with any other layers in the model.

Submit
20. A group of computers and associated devices that share a common communications line within a small geographic area is a

Explanation

A local area network (LAN) is a group of computers and devices that are connected together and share a common communications line within a small geographic area. LANs are typically used in homes, offices, or schools where the computers and devices are located in close proximity to each other. This allows for efficient and fast communication between the devices on the network. In contrast, a metropolitan area network (MAN) covers a larger geographic area, a wide area network (WAN) covers an even larger area, and a virtual private network (VPN) is a network that uses a public telecommunication infrastructure, such as the internet, to provide secure remote access to a private network.

Submit
21. Which Transport layer protocol does not guarantee that packets will be received at all?

Explanation

UDP is a transport layer protocol that does not guarantee the delivery of packets. Unlike TCP, which ensures reliable and ordered delivery, UDP is a connectionless protocol that does not establish a connection before sending data. It does not track whether packets are received or not, making it a faster but less reliable option. ICMP is a network layer protocol used for diagnostic and error reporting, while IP is a network layer protocol responsible for addressing and routing packets.

Submit
22. Which Application layer protocol is a utility that can verify that transmission control protocol/internet protocol (TCP/IP) is installed and communicating with the network?

Explanation

Ping is a utility that can verify that TCP/IP is installed and communicating with the network. It sends a small packet of data to a specific IP address and waits for a response. If a response is received, it indicates that the TCP/IP stack is functioning properly and the network connection is active. This makes Ping a useful tool for troubleshooting network connectivity issues and testing network performance. DHCP is a protocol for automatically assigning IP addresses, NTP is a protocol for synchronizing clocks on network devices, and FTP is a protocol for transferring files over a network. None of these protocols specifically verify TCP/IP installation or communication.

Submit
23. What are the two parts to an Internet Protocol version 4 (IPv4) address?

Explanation

An Internet Protocol version 4 (IPv4) address is divided into two parts: the network portion and the host portion. The network portion identifies the specific network that the device is connected to, while the host portion identifies the specific device within that network. This division allows for efficient routing of data packets across the internet, ensuring that they reach the correct destination.

Submit
24. The time it takes a switch to figure out where to forward a data unit is called

Explanation

Latency refers to the time delay that occurs when a switch or any other networking device needs to determine the appropriate destination for a data unit. It is the time taken for the switch to process and make a forwarding decision. Lag refers to a delay or interruption in data transmission, hop refers to the number of devices a data unit passes through in a network, and time zone refers to the geographical region with a specific time offset.

Submit
25. Which type network enables users to share resources, files, and printers in a decentralized way?

Explanation

A peer-to-peer network enables users to share resources, files, and printers in a decentralized way. In this type of network, each computer can act as both a client and a server, allowing users to directly connect and share resources with each other without the need for a central server. This allows for greater flexibility and independence among users, as they can easily access and share resources with each other without relying on a central authority.

Submit
26. What is used on a transmission control protocol/internet protocol (TCP/IP) network to determine which network a computer is on?

Explanation

A subnet mask is used on a TCP/IP network to determine which network a computer is on. It is a 32-bit number that is used to divide an IP address into network and host portions. The subnet mask is applied to the IP address to determine the network address. By comparing the network address of the computer with the network address of other computers, it can be determined whether they are on the same network or not. Therefore, the subnet mask is used to determine the network a computer is on.

Submit
27. What is not a recommendation for planning networks using variable length subnet masking (VLSM)?

Explanation

Re-addressing the entire network is not a recommendation for planning networks using variable length subnet masking (VLSM). VLSM allows for the creation of subnets with different sizes, so re-addressing the entire network would be unnecessary and time-consuming. It is more efficient to start with the shortest mask, aim to use contiguous subnets where possible, and choose one or more available subnets to subnet further.

Submit
28. A repeater with more than one output port is a

Explanation

A repeater with more than one output port is a hub. A hub is a networking device that allows multiple devices to connect to a network. It receives data packets from one device and broadcasts them to all other devices connected to it. In this case, the repeater acts as a hub by receiving the data packets and transmitting them to multiple output ports, allowing multiple devices to receive the data.

Submit
29. What test equipment has the capability of diagnosing digital network and developing communications software?

Explanation

A protocol analyzer is a test equipment that can diagnose digital networks and develop communication software. It is specifically designed to capture, analyze, and decode the communication protocols used in digital networks. It can monitor and analyze the data packets being transmitted, identify any errors or issues in the protocol, and help in troubleshooting and debugging network communication problems. This makes it an essential tool for network administrators and developers working with digital networks and communication software.

Submit
30. Which network management function provides the capability to initialize, operate and shut down managed devices?

Explanation

The network management function that provides the capability to initialize, operate, and shut down managed devices is Configuration. This function involves setting up and configuring the devices according to the desired specifications, ensuring they are operational, and being able to shut them down when necessary. Fault management deals with detecting, isolating, and resolving network issues. Accounting involves tracking and monitoring network resource usage. Performance management focuses on optimizing network performance.

Submit
31. What is one of the primary functions of the Network Control Center (NCC), usually done in real time, and ensures the system is being operated within the parameters established by network

Explanation

System monitoring is one of the primary functions of the Network Control Center (NCC). It is usually done in real time and involves keeping a close watch on the system to ensure that it is being operated within the parameters established by the network. This includes monitoring network traffic, performance, and security to identify any issues or anomalies that may arise. System monitoring plays a crucial role in maintaining the overall health and efficiency of the network infrastructure.

Submit
32. Who has unrestricted access to system commands and data?

Explanation

Supersusers have unrestricted access to system commands and data. They are privileged users who have the highest level of access and control over the system. They can perform any operation, modify system settings, and access all data without any restrictions. Powerusers, server operators, and backup operators may have certain levels of access and permissions, but they do not have the same level of unrestricted control as supersusers.

Submit
33. What Open System Interconnect (OSI) layer is closest to the end user?

Explanation

The Open System Interconnect (OSI) model is a conceptual framework that standardizes the functions of a communication system into seven different layers. The layer closest to the end user is the Application layer. This layer provides services directly to the user and is responsible for tasks such as file transfers, email services, and web browsing. It interacts with software applications that the user interacts with, making it the closest layer to the end user.

Submit
34. Which protocol is simpler than File Transfer Protocol (FTP) when transferring files between computers?

Explanation

TFTP is simpler than FTP when transferring files between computers. TFTP is a lightweight protocol that only provides basic file transfer functionality, whereas FTP is a more comprehensive protocol with additional features such as directory listing and file manipulation. TFTP is commonly used in scenarios where simplicity and efficiency are prioritized over advanced functionality. SMTP and HTTP are not file transfer protocols, but rather protocols used for email and web communication respectively.

Submit
35. A cable scanner wire-map display identifies crossover and straight-through cables by

Explanation

The cable scanner wire-map display identifies crossover and straight-through cables by providing wiring maps at both ends of the cable. This means that the display will show the wiring configuration of the cable at both ends, allowing the user to determine whether it is a crossover or straight-through cable. The other options mentioned, such as displaying opens, shorts, and split pairs, monitoring and providing access to conductors, and measuring current, frequency, and resistance, do not directly relate to identifying crossover and straight-through cables.

Submit
36. What are the two vulnerability scanner examination techniques?

Explanation

Passive and active are the two vulnerability scanner examination techniques. Passive scanning involves monitoring network traffic and collecting data without actively sending any packets, while active scanning involves actively sending packets and probing the network for vulnerabilities. Both techniques are important in identifying and assessing vulnerabilities in a system or network.

Submit
37. Which routing protocol does internet backbones use?

Explanation

Internet backbones use the Border Gateway Protocol (BGP) as their routing protocol. BGP is specifically designed for large-scale networks and is used to exchange routing information between different autonomous systems (AS). It allows internet service providers (ISPs) to determine the best path for data to travel across the internet, ensuring efficient and reliable routing. BGP is known for its scalability, stability, and ability to handle complex routing policies, making it the preferred choice for internet backbone networks.

Submit
38. What security posture prevents everything that is not specifically authorized?

Explanation

Default deny is a security posture that blocks all access and permissions by default, allowing only what is specifically authorized. It is a proactive approach to security that assumes everything is a potential threat unless explicitly allowed. This helps to minimize the risk of unauthorized access, data breaches, and other security incidents. By contrast, default allow is a less secure posture that grants access and permissions to everything by default, requiring explicit restrictions to be put in place. Therefore, default deny is the correct answer as it aligns with the principle of least privilege and is a best practice in security.

Submit
39. An intrusion detection system (IDS) may miss attacks that bypass the firewall like application-based attacks and

Explanation

An intrusion detection system (IDS) is designed to monitor and analyze network traffic to detect and prevent unauthorized access or malicious activities. However, IDS may miss attacks that bypass the firewall, such as application-based attacks and snooping. Capturing refers to the act of intercepting network traffic, which an IDS is typically able to detect. Rejecting refers to the act of denying or blocking network traffic, which is not related to IDS capabilities. Therefore, the correct answer is tunneling, which refers to the technique of encapsulating one network protocol within another, making it difficult for an IDS to detect any malicious activity within the encapsulated traffic.

Submit
40. What Electronic Industries Alliance (EIA)/Telecommunications Industry Association (TIA) standard is used for commercially building telecommunications cabling?

Explanation

The correct answer is 568A. The 568A standard, developed by the Electronic Industries Alliance (EIA) and the Telecommunications Industry Association (TIA), is used for commercially building telecommunications cabling. This standard specifies the wiring arrangement and color codes for eight-pin modular connectors, commonly known as RJ45 connectors, used in Ethernet connections. It ensures consistency and compatibility in the installation of telecommunications cabling systems.

Submit
41. Which of the following is an International Telecommunication Union (ITU) standardized format used for digital telecommunications services backbone system?

Explanation

The correct answer is E-carrier. E-carrier is an International Telecommunication Union (ITU) standardized format that is used for digital telecommunications services backbone system. It is widely used in Europe, Asia, and Australia for transmitting voice and data over digital networks. The E-carrier system provides a hierarchical structure for multiplexing multiple digital signals onto a single transmission medium, allowing for efficient and reliable communication.

Submit
42. What happens when more bits are added to a digital signal arranged in a sequence understood by the sender and receiver?

Explanation

When more bits are added to a digital signal arranged in a sequence understood by the sender and receiver, a code set is established. This means that the additional bits are used to represent different symbols or characters, allowing for a wider range of information to be transmitted and understood. The code set defines the mapping between the digital signal and the corresponding symbols or characters, enabling effective communication between the sender and receiver.

Submit
43. The definition of the Open System Interconnect (OSI) reference model was a major contribution to networking made by the

Explanation

The Open System Interconnect (OSI) reference model was developed by the International Organization for Standardization (ISO). This model is a conceptual framework that standardizes the functions of a communication system into seven different layers. It provides a common language and structure for different network technologies to communicate with each other. The ISO's contribution in creating the OSI model has been significant in the field of networking and has helped in the development and interoperability of various networking protocols and technologies.

Submit
44. Which Network layer protocol matches a known internet protocol (IP) address for a destination device to a Media Access Control (MAC) address?

Explanation

The correct answer is Address Resolution Protocol (ARP). ARP is a network layer protocol that is used to match a known IP address to a MAC address. It is responsible for resolving IP addresses to MAC addresses in order to facilitate communication between devices on a local network. When a device wants to send data to another device on the same network, it needs to know the MAC address of the destination device. ARP helps in mapping the IP address to the corresponding MAC address, allowing the data to be properly delivered.

Submit
45. Which Application layer protocol is used to send and receive files by way of transmission control protocol/internet protocol (TCP/IP)?

Explanation

FTP is the correct answer because it is an application layer protocol specifically designed for sending and receiving files over a TCP/IP network. FTP provides a set of commands that allow users to authenticate, navigate directories, and transfer files between a client and a server. It is widely used for file sharing and is supported by most operating systems. TFTP, SMTP, and HTTP are also application layer protocols, but they serve different purposes such as simple file transfers, email transmission, and web browsing respectively.

Submit
46. Which Internet protocol version 6 (IPv6) tunneling approach attempts to solve the issue of IPv6 to IP version 4 (IPv4), IP protocol 41 issue?

Explanation

Teredo is an Internet protocol version 6 (IPv6) tunneling approach that attempts to solve the issue of IPv6 to IP version 4 (IPv4), IP protocol 41 issue. Teredo is designed to allow IPv6 traffic to pass through IPv4 network address translators (NATs) and firewalls by encapsulating IPv6 packets within IPv4 UDP datagrams. This allows devices with only IPv4 connectivity to communicate with IPv6-enabled devices. Teredo uses a client-server architecture and automatically assigns IPv6 addresses to devices.

Submit
47. Virtual private networks (VPN) allow the AF to extend network resources across a/an a. Department of Defense network.

Explanation

Virtual private networks (VPN) allow the AF to extend network resources across a public network. VPNs create a secure and encrypted connection over a public network, such as the internet, allowing users to access network resources remotely. This enables the AF to securely connect to and utilize network resources from any location, even when connected to a public network with potential security risks. By using a VPN, the AF can ensure the confidentiality and integrity of their data while extending their network resources beyond their own private network.

Submit
48. What protocol analyzer feature automatically runs in the background when the protocol analyzer application is activated?

Explanation

When the protocol analyzer application is activated, the automatic feature that runs in the background is node discovery. Node discovery is the process of identifying and mapping the network nodes or devices present in a network. This feature helps in discovering and displaying the network topology, including information about the nodes, their connections, and their characteristics. It allows the protocol analyzer to gather information about the network and its components, enabling better analysis and troubleshooting of network issues.

Submit
49. Which network management function obtains the utilization and error rates of network devices and provides statistical data about the network?

Explanation

The network management function that obtains the utilization and error rates of network devices and provides statistical data about the network is performance management. This function is responsible for monitoring and analyzing the performance of the network, including measuring the bandwidth usage, error rates, and other performance metrics. By collecting and analyzing this data, network administrators can identify potential bottlenecks, troubleshoot performance issues, and make informed decisions to optimize the network's performance.

Submit
50. The community name that is used with the network management systems (NMS) authenticates

Explanation

The correct answer is simple network management protocol (SNMP) requests. SNMP is a protocol used for network management and monitoring. It allows network devices to be managed and monitored by a central management system, known as the network management system (NMS). The community name is used as a password or authentication mechanism to ensure that only authorized SNMP requests are accepted by the NMS. Therefore, the community name is used with the NMS to authenticate SNMP requests.

Submit
51. What is the first line of defense when gaining access to a laptop computer's operating system?

Explanation

The first line of defense when gaining access to a laptop computer's operating system is the logon identification and password combination. This is the primary method of authentication that verifies the user's identity and ensures that only authorized individuals can access the system. Physical security refers to measures taken to protect the physical device itself, while information condition and file share level of effective permissions are unrelated to the initial access to the operating system.

Submit
52. Which Application layer protocol is a terminal emulation used to log on to remote hosts?

Explanation

The correct answer is Teletype Network. Teletype Network is an application layer protocol used for terminal emulation, allowing users to log on to remote hosts. It provides a means of communication between a user and a remote system, enabling the user to interact with the remote host as if they were directly connected to it via a physical terminal. This protocol is commonly used in scenarios where remote access to a host is required, such as in the case of remote administration or remote troubleshooting.

Submit
53. What mechanism allows for easier Internet protocol version 6 (IPv6) address allocations?

Explanation

Auto configuration is the mechanism that allows for easier IPv6 address allocations. This process enables devices to automatically assign themselves an IPv6 address without the need for manual configuration or intervention from a network administrator. It simplifies the allocation process and ensures that devices can easily connect to the network and communicate with other devices using IPv6.

Submit
54. Which series of standards are recommended for data transmission using the telephone network?

Explanation

The correct answer is V. The V series of standards are recommended for data transmission using the telephone network. These standards define protocols and procedures for various types of data communication, including dial-up modems, fax machines, and digital subscriber lines (DSL). The V series standards ensure compatibility and reliable data transmission over the telephone network.

Submit
55. What two sublayers did the Institute of Electrical and Electronics Engineers (IEEE) divide the Open System Interconnect (OSI) data link layers into?

Explanation

The Institute of Electrical and Electronics Engineers (IEEE) divided the Open System Interconnect (OSI) data link layers into Logical Link Control (LLC) and Media Access Control (MAC). The LLC sublayer handles flow control, error control, and framing, while the MAC sublayer is responsible for controlling access to the physical media and handling media contention.

Submit
56. When using an optical time-domain reflectometer (OTDR), what action is suggested by most manufacturers to prevent false readings?

Explanation

Most manufacturers suggest connecting a launch cable between the test set and the cable being tested when using an optical time-domain reflectometer (OTDR) to prevent false readings. This is because a launch cable helps to eliminate any initial reflections that may occur at the connection point, ensuring more accurate and reliable measurements. By using a launch cable, the OTDR can properly analyze the characteristics of the cable being tested without interference from any reflections caused by the connection point.

Submit
57. Which component of a protocol analyzer discards frames based on its definition or activates a trigger based on the trigger definition?

Explanation

A protocol analyzer is a tool used to monitor and analyze network traffic. The component of a protocol analyzer that discards frames based on its definition or activates a trigger based on the trigger definition is the filter. The filter allows the user to specify certain criteria or conditions that need to be met for a frame to be captured or discarded. This helps in focusing on specific network traffic of interest and reducing the amount of unnecessary data that needs to be analyzed.

Submit
58. What process provides the overall process to secure and protect our information networks?

Explanation

not-available-via-ai

Submit
59. What must be employed to ensure data integrity?

Explanation

Check sums are used to ensure data integrity by verifying the accuracy and integrity of data during transmission or storage. A check sum is a calculated value that is generated from the data and is compared with the received or stored value to check for any errors or corruption. If the check sum matches, it indicates that the data is intact and has not been tampered with. Therefore, employing check sums is crucial in maintaining data integrity.

Submit
60. The "parent" organization, headquartered in Geneva, Switzerland, for all other telecommunications organizations is the

Explanation

The correct answer is the International Telecommunication Union (ITU). The ITU is the parent organization for all other telecommunications organizations and is headquartered in Geneva, Switzerland. It is responsible for coordinating and standardizing global telecommunications networks and services. The ITU plays a crucial role in promoting international cooperation in the field of telecommunications and ensuring the interoperability of different communication systems worldwide.

Submit
61. What transmission rates does Electronic Industries Alliance (EIA) RS–530 accommodate?

Explanation

The Electronic Industries Alliance (EIA) RS-530 accommodates transmission rates ranging from 20 kilobits per second (Kbps) to 2 megabits per second (Mbps).

Submit
62. What type of network enables a group of two or more computer systems to communicate over the public Internet?

Explanation

A virtual private network (VPN) enables a group of two or more computer systems to communicate over the public Internet. Unlike a local area network (LAN) or a wide area network (WAN), which are physical networks confined to a specific location or geographical area, a VPN creates a secure and encrypted connection over the Internet, allowing users to access and share data as if they were directly connected to a private network. This makes VPNs a popular choice for businesses and organizations that need to connect remote offices or provide secure access for remote workers.

Submit
63. Which Electronics Industries Alliance (EIA) interface standard has the ability to work in either balanced or unbalanced electrical circuits?

Explanation

RS-530 is the correct answer because it is an Electronics Industries Alliance (EIA) interface standard that has the ability to work in either balanced or unbalanced electrical circuits. RS-232-C, RS-423, and RS-485 are also EIA interface standards, but they do not have the same flexibility as RS-530 in terms of working in both balanced and unbalanced circuits.

Submit
64. Which information unit, whose source and destination are network-layer entities, uses connectionless network service?

Explanation

The correct answer is Datagram. A datagram is an information unit that uses connectionless network service. It is a self-contained unit of data that includes both the source and destination addresses. Unlike other information units like frames, packets, and segments, datagrams do not require a pre-established connection between the source and destination. Instead, they are individually routed and delivered independently, making them suitable for connectionless network services.

Submit
65. What data communication protocol ensures that the receiving station can distinguish information from garbage?

Explanation

HDLC is a data communication protocol that ensures the receiving station can distinguish information from garbage. HDLC provides a mechanism for error detection and correction, as well as flow control, ensuring that the data received is accurate and reliable. It uses a synchronous transmission method, where data is transmitted in a continuous stream, and includes control characters to indicate the start and end of frames, allowing the receiving station to properly interpret the data. This protocol is widely used in telecommunications and networking systems to ensure the integrity of data transmission.

Submit
66. How many bits are available for host bits on a Class B network using seven bits?

Explanation

A Class B network has a default subnet mask of 16 bits for the network portion and 16 bits for the host portion. However, in this question, it states that only seven bits are being used for the network portion. Therefore, the remaining nine bits are available for the host portion. This means that there are 2^9 or 512 possible host addresses that can be assigned within this Class B network.

Submit
67. A Management Information Base (MIB) can be identified by either its object name or its object what?

Explanation

A Management Information Base (MIB) can be identified by either its object name or its descriptor. The descriptor provides additional information about the object, such as its characteristics or properties. This helps in accurately identifying and understanding the object within the MIB.

Submit
68. Which of the following is not a basic Simple Network Management Protocol (SNMP) command?

Explanation

The correct answer is "Get." In SNMP, the "Get" command is not a basic command. The "Get" command is used to retrieve the value of a specific variable from a managed device. However, the basic SNMP commands include "Write," which is used to set the value of a specific variable, "Read," which is used to retrieve the value of a specific variable or a set of variables, and "Trap," which is used to send notifications to the SNMP manager when a specific event occurs.

Submit
69. The World Wide Web (WWW) proxy provides three benefits: it conceals internal network configuration, provides a means to monitor and eliminate traffic to unofficial WWW sites, and

Explanation

The correct answer is "provides much faster access to the internet." This is because a proxy server caches web pages, which means that it stores a copy of the web page on its own server. When a user requests that web page, the proxy server can deliver the cached copy instead of fetching it from the original server. This significantly reduces the time it takes to access the web page, resulting in faster internet access for users.

Submit
70. In networking, a byte is identified as a/an

Explanation

An octet is the term used in networking to identify a byte. A byte consists of 8 bits, and an octet is a group of 8 bits. This term is commonly used in networking protocols and standards to refer to a sequence of 8 bits.

Submit
71. Simple Network Management Protocol (SNMP) has three components: a managed device, an agent and a

Explanation

SNMP is a protocol used for managing and monitoring network devices. It consists of three components: a managed device, an agent, and a Network Management System (NMS). The managed device is the device being monitored, the agent is the software running on the managed device that collects and sends data to the NMS, and the NMS is the system responsible for receiving and analyzing the data sent by the agent. Therefore, the correct answer is Network Management System (NMS).

Submit
72. Which Network layer protocol provides the internet protocol (IP) address for a device that knows its own Media Access Control (MAC) address?

Explanation

RARP is a network layer protocol that provides the IP address for a device that knows its own MAC address. It allows a device to request its IP address from a RARP server using its MAC address as a reference. This is useful in situations where a device does not have a configured IP address and needs to obtain one dynamically. ARP, ICMP, and IP are not specifically designed for this purpose.

Submit
73. What Network layer protocol provides information about how and where data should be delivered, including the data's source and destination addresses?

Explanation

The correct answer is Internet protocol (IP). IP is a network layer protocol that provides information about how and where data should be delivered, including the data's source and destination addresses. It is responsible for routing packets across different networks and ensuring that they reach their intended destination. IP is a fundamental protocol in the TCP/IP suite and is used for communication over the internet.

Submit
74. How many subnet bits are required to support 90 subnets on a Class B network?

Explanation

To support 90 subnets on a Class B network, we need to determine the number of subnet bits required. In a Class B network, the default subnet mask is 255.255.0.0, which provides 16 bits for the network portion. To support 90 subnets, we need to borrow additional bits from the host portion. By using 7 subnet bits, we can create 128 subnets (2^7) which is more than enough to support 90 subnets. Therefore, the correct answer is 7.

Submit
75. What layers of the open system interconnection (OSI) model do network interface cards (NIC) belong?

Explanation

Network interface cards (NIC) belong to the Physical and Data Link layers of the OSI model. The Physical layer is responsible for the physical transmission of data, including the electrical, mechanical, and functional specifications of the physical medium. NICs handle the physical connection between the computer and the network, converting digital signals into analog signals for transmission over the network cable. The Data Link layer is responsible for the reliable transmission of data between adjacent network nodes and provides error detection and correction. NICs also handle data framing and flow control, which are functions of the Data Link layer.

Submit
76. What can be used to extend the size of a network?

Explanation

Active hubs can be used to extend the size of a network. An active hub is a networking device that amplifies and regenerates signals, allowing for the extension of the network beyond the limitations of a single segment. It receives data from one port and broadcasts it to all other ports, effectively increasing the number of devices that can be connected to the network. In contrast, passive hubs simply pass the signal along without any amplification or regeneration, limiting the network size. A brouter is a device that combines the functions of a bridge and a router, while a gateway is a device that connects different networks together.

Submit
77. What cable discrepancies can a time-domain reflectometer (TDR) detect?

Explanation

A time-domain reflectometer (TDR) is a tool used to detect cable discrepancies by sending a signal down the cable and measuring the reflections that occur when the signal encounters any impedance changes. Kinks in the cable can cause reflections, indicating a discrepancy. Opens, which are breaks in the cable, can also cause reflections. Corroded connectors can introduce impedance changes, leading to reflections as well. Therefore, a TDR can detect kinks, opens, and corroded connectors as cable discrepancies.

Submit
78. What defines the format and type of data in a network management system (NMS) report?

Explanation

The format and type of data in a network management system (NMS) report are defined by the report template. This template outlines the structure, layout, and content of the report, including the specific data fields and their formatting. It provides a standardized format for presenting the information gathered from the NMS, ensuring consistency and clarity in reporting. The grapher template and tools may be used to visualize and analyze the data, but the report template determines how the data is presented in the final report.

Submit
79. What method is approved for changing passwords through the use of remote access?

Explanation

A strongly encrypted virtual private network (VPN) is the approved method for changing passwords through remote access. A VPN creates a secure connection between the user's device and the network, allowing for encrypted data transmission. This ensures that passwords are protected during the process of changing them remotely. The other options, such as password authentication protocol and challenge handshake authentication protocol, do not specifically address the need for secure remote access for password changes. A strongly encrypted virtual local area network (VLAN) is not typically used for remote access, but rather for segmenting a local network.

Submit
80. What organization sets important computer networking wiring standards for residential and commercial network cabling?

Explanation

The Electronic Industries Alliance (EIA) sets important computer networking wiring standards for residential and commercial network cabling.

Submit
81. Teredo has four tunneling components. Which one is not one of them?

Explanation

The Teredo protocol is used to enable IPv6 connectivity for devices that are behind NAT devices. It consists of four tunneling components: Teredo host-specific relay, Teredo client, Teredo server, and Teredo agent. The Teredo agent is not one of the components.

Submit
82. What organization is responsible for the X-series and V-series standards?

Explanation

The correct answer is International Telecommunication Union Telecommunications Standardization Sector (ITU-T). ITU-T is responsible for the X-series and V-series standards. The X-series standards cover data networks and open system communications, while the V-series standards cover data communication over the telephone network. The ITU-T is a specialized agency of the International Telecommunication Union (ITU) that focuses on developing and maintaining telecommunications standards.

Submit
83. Within how many feet of the data communications equipment (DCE) connection does the Electronics Industries Alliance (EIA) RS–232–C standard prescribes bipolar-voltage serial data transmission?

Explanation

The EIA RS-232-C standard prescribes bipolar-voltage serial data transmission within 50 feet of the data communications equipment (DCE) connection. This means that the standard specifies that the transmission can be done without loss or degradation of signal quality within this distance.

Submit
84. Which device has multiport connectivity that directs data between nodes on a network?

Explanation

A router is a device that has multiport connectivity and directs data between nodes on a network. It is responsible for forwarding data packets between computer networks, making decisions based on the destination IP address. Routers are often used in homes and businesses to connect multiple devices to the internet and enable communication between them. Unlike switches, which operate at the data link layer and direct data within a local network, routers operate at the network layer and can direct data between different networks.

Submit
85. What type of firewall can filter messages according to a set of rules for a specific application?

Explanation

A proxy server is a type of firewall that can filter messages according to a set of rules for a specific application. It acts as an intermediary between clients and servers, intercepting and analyzing network traffic to enforce security policies. By examining the content of messages, a proxy server can make decisions based on application-specific rules, allowing or blocking certain types of traffic. This level of filtering provides more granular control compared to other types of firewalls like packet filtering or circuit level, making the proxy server the correct answer.

Submit
86. Which of the following is not a function that a virtual private network (VPN) concentrator performs?

Explanation

A virtual private network (VPN) concentrator performs various functions to ensure secure and efficient data transfer across the tunnel. It manages data transfer across the tunnel by routing and directing the flow of data. It encrypts and decrypts data to protect it from unauthorized access. It establishes tunnels by creating secure connections between the VPN concentrator and the client devices. However, encapsulating data is not a function of a VPN concentrator. Encapsulation is the process of wrapping data packets with additional headers and trailers for secure transmission, which is typically performed by network devices such as routers or switches.

Submit
87. What component of a protocol analyzer processes the frames based on the selected test and the user configuration inputs?

Explanation

The central processing unit (CPU) is responsible for processing the frames in a protocol analyzer based on the selected test and user configuration inputs. It performs the necessary calculations and operations to analyze the data and generate the desired results. The CPU acts as the brain of the protocol analyzer, handling all the processing tasks efficiently.

Submit
88. What security posture permits everything that is not specifically blocked?

Explanation

The correct answer is "Open." In terms of security posture, an "open" approach means that everything is permitted unless it is specifically blocked. This means that there are no restrictions or limitations on what can access the system or network, which can pose significant security risks. It is generally considered a less secure approach compared to a "default deny" posture, where everything is blocked unless specifically allowed.

Submit
89. At what Open System Interconnect (OSI) layer are common data compression and encryption schemes used?

Explanation

Common data compression and encryption schemes are used at the Presentation layer of the OSI model. This layer is responsible for the formatting and presentation of data, including encryption, compression, and other transformations that ensure data integrity and confidentiality. The Presentation layer prepares the data for the Application layer by converting it into a format that can be easily understood by the receiving system.

Submit
90. Which one of the following is not an Internet protocol version 6 (IPv6) transition approach?

Explanation

Auto configuration is not an IPv6 transition approach. Auto configuration refers to the process by which IPv6 hosts automatically configure their network interfaces and obtain the necessary network parameters, such as IP address, without manual intervention. It is a feature of IPv6 itself, rather than a specific transition approach. The other options, translation, tunneling, and dual stack, are all valid IPv6 transition approaches used to facilitate the transition from IPv4 to IPv6.

Submit
91. What data communication protocol is used to govern the flow and format of information between systems?

Explanation

Character-oriented protocols are used to govern the flow and format of information between systems. These protocols focus on the transmission and interpretation of characters or symbols, rather than individual bits or routing of data. They ensure that the data is properly formatted and transmitted in a way that both the sending and receiving systems can understand. This type of protocol is commonly used in applications such as text messaging, email, and file transfers.

Submit
92. What type of gateway might include remote access servers that allow dial-up connectivity to a local area network (LAN)?

Explanation

A LAN gateway is a type of gateway that can include remote access servers, which allow dial-up connectivity to a local area network. This means that users can connect to the LAN from remote locations using dial-up connections. Therefore, the correct answer is LAN.

Submit
93. What type of gateway can restrict the kind of access local area network (LAN) users have to the internet, and vice versa?

Explanation

A firewall is a type of gateway that can restrict the kind of access local area network (LAN) users have to the internet, and vice versa. Firewalls are designed to monitor and control incoming and outgoing network traffic based on predetermined security rules. They act as a barrier between the LAN and the internet, allowing only authorized traffic to pass through while blocking or filtering out unauthorized or potentially harmful traffic. By implementing a firewall, network administrators can enforce access restrictions, protect the LAN from external threats, and prevent unauthorized access to the internet from within the LAN.

Submit
View My Results

Quiz Review Timeline (Updated): Mar 19, 2023 +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 19, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Nov 04, 2011
    Quiz Created by
    Woodjh
Cancel
  • All
    All (93)
  • Unanswered
    Unanswered ()
  • Answered
    Answered ()
Which Application layer protocol is an automated means of assigning a...
The physical address of any device on the network is a/an
What device provides the physical, electrical, and electronic...
What protocol analyzer utility is used to determine if a network node...
How many possible symbols can 4 bits represent?
What device subdivides a network into smaller logical pieces, or...
What protocol analyzer utility is used to see the path that packets...
What defines traffic flow and is a basic protection mechanism on...
A collection of standards for local area network (LAN) architectures,...
In binary-synchronous protocol, what character is used to establish...
What data communication protocol is based on bits and the position of...
The interconnection of several networks in a city into a single larger...
A router's strength is its
What is the oldest routing protocol?
What type of network connects networks that are typically separated by...
The combination transmitter/receiver device, in a single package, is...
What type of cable property changes does a time-domain reflectometer...
There is a worldwide nonprofit association of technical professionals...
In the Open System Interconnect (OSI) model, a layer will communicate...
A group of computers and associated devices that share a common...
Which Transport layer protocol does not guarantee that packets will be...
Which Application layer protocol is a utility that can verify that...
What are the two parts to an Internet Protocol version 4 (IPv4)...
The time it takes a switch to figure out where to forward a data unit...
Which type network enables users to share resources, files, and...
What is used on a transmission control protocol/internet protocol...
What is not a recommendation for planning networks using variable...
A repeater with more than one output port is a
What test equipment has the capability of diagnosing digital network...
Which network management function provides the capability to...
What is one of the primary functions of the Network Control Center...
Who has unrestricted access to system commands and data?
What Open System Interconnect (OSI) layer is closest to the end user?
Which protocol is simpler than File Transfer Protocol (FTP) when...
A cable scanner wire-map display identifies crossover and...
What are the two vulnerability scanner examination techniques?
Which routing protocol does internet backbones use?
What security posture prevents everything that is not specifically...
An intrusion detection system (IDS) may miss attacks that bypass the...
What Electronic Industries Alliance (EIA)/Telecommunications Industry...
Which of the following is an International Telecommunication Union...
What happens when more bits are added to a digital signal arranged in...
The definition of the Open System Interconnect (OSI) reference model...
Which Network layer protocol matches a known internet protocol (IP)...
Which Application layer protocol is used to send and receive files by...
Which Internet protocol version 6 (IPv6) tunneling approach attempts...
Virtual private networks (VPN) allow the AF to extend network...
What protocol analyzer feature automatically runs in the background...
Which network management function obtains the utilization and error...
The community name that is used with the network management systems...
What is the first line of defense when gaining access to a laptop...
Which Application layer protocol is a terminal emulation used to log...
What mechanism allows for easier Internet protocol version 6 (IPv6)...
Which series of standards are recommended for data transmission using...
What two sublayers did the Institute of Electrical and Electronics...
When using an optical time-domain reflectometer (OTDR), what action is...
Which component of a protocol analyzer discards frames based on its...
What process provides the overall process to secure and protect our...
What must be employed to ensure data integrity?
The "parent" organization, headquartered in Geneva, Switzerland, for...
What transmission rates does Electronic Industries Alliance (EIA)...
What type of network enables a group of two or more computer systems...
Which Electronics Industries Alliance (EIA) interface standard has the...
Which information unit, whose source and destination are network-layer...
What data communication protocol ensures that the receiving station...
How many bits are available for host bits on a Class B network using...
A Management Information Base (MIB) can be identified by either its...
Which of the following is not a basic Simple Network Management...
The World Wide Web (WWW) proxy provides three benefits: it conceals...
In networking, a byte is identified as a/an
Simple Network Management Protocol (SNMP) has three components: a...
Which Network layer protocol provides the internet protocol (IP)...
What Network layer protocol provides information about how and where...
How many subnet bits are required to support 90 subnets on a Class B...
What layers of the open system interconnection (OSI) model do network...
What can be used to extend the size of a network?
What cable discrepancies can a time-domain reflectometer (TDR) detect?
What defines the format and type of data in a network management...
What method is approved for changing passwords through the use of...
What organization sets important computer networking wiring standards...
Teredo has four tunneling components. Which one is not one of them?
What organization is responsible for the X-series and V-series...
Within how many feet of the data communications equipment (DCE)...
Which device has multiport connectivity that directs data between...
What type of firewall can filter messages according to a set of rules...
Which of the following is not a function that a virtual private...
What component of a protocol analyzer processes the frames based on...
What security posture permits everything that is not specifically...
At what Open System Interconnect (OSI) layer are common data...
Which one of the following is not an Internet protocol version 6...
What data communication protocol is used to govern the flow and format...
What type of gateway might include remote access servers that allow...
What type of gateway can restrict the kind of access local area...
Alert!

Advertisement