3DX5X CDC Vol 2

Approved & Edited by ProProfs Editorial Team
The editorial team at ProProfs Quizzes consists of a select group of subject experts, trivia writers, and quiz masters who have authored over 10,000 quizzes taken by more than 100 million users. This team includes our in-house seasoned quiz moderators and subject matter experts. Our editorial experts, spread across the world, are rigorously trained using our comprehensive guidelines to ensure that you receive the highest quality quizzes.
Learn about Our Editorial Process
| By Gtarrant
G
Gtarrant
Community Contributor
Quizzes Created: 2 | Total Attempts: 17,164
Questions: 124 | Attempts: 6,427

SettingsSettingsSettings
3DX5X CDC Vol 2 - Quiz

.


Questions and Answers
  • 1. 

    What layer of the Open System Interconnect model defines the electrical, mechanical, procedural, and functional specifications for links between communicating network systems?

    • A.

      Physical.

    • B.

      Data Link

    • C.

      Network.

    • D.

      Transport.

    Correct Answer
    A. Physical.
    Explanation
    The correct answer is Physical. The Physical layer of the OSI model is responsible for defining the electrical, mechanical, procedural, and functional specifications for links between communicating network systems. It deals with the physical transmission of data over the network, including the physical media, connectors, and signaling. It ensures that the data is transmitted reliably and accurately between devices.

    Rate this question:

  • 2. 

    The Institute of Electrical and Electronics Engineers divide the Open System Interconnect Data Link Layers into what two sublayers?

    • A.

      High Level Data Link Control and Synchronous Data Link Control.

    • B.

      Logical Link Control and Media Access Control

    • C.

      Distance Vector and Link State.

    • D.

      RS–232 and RS–530.

    Correct Answer
    B. Logical Link Control and Media Access Control
    Explanation
    The correct answer is Logical Link Control and Media Access Control. The Open System Interconnect (OSI) Data Link Layer is divided into these two sublayers. The Logical Link Control (LLC) sublayer is responsible for managing the flow of data between devices and providing error control. The Media Access Control (MAC) sublayer is responsible for controlling access to the physical media and handling the transmission of data frames. These two sublayers work together to ensure reliable and efficient communication between devices in a network.

    Rate this question:

  • 3. 

    At what Open System Interconnect layer do network switches and bridges operate?

    • A.

      Network.

    • B.

      Physical.

    • C.

      Data Link.

    • D.

      Transport.

    Correct Answer
    C. Data Link.
    Explanation
    Network switches and bridges operate at the Data Link layer of the Open System Interconnect (OSI) model. This layer is responsible for the reliable transfer of data between adjacent network nodes. Switches and bridges use MAC addresses to forward data packets within a local area network (LAN). They examine the destination MAC address in the data frames and make forwarding decisions based on this information. Therefore, the correct answer is Data Link.

    Rate this question:

  • 4. 

    At what Open System Interconnect layer do routers operate?

    • A.

      Network.

    • B.

      Physical.

    • C.

      Data Link.

    • D.

      Transport.

    Correct Answer
    A. Network.
    Explanation
    Routers operate at the network layer of the Open System Interconnect (OSI) model. The network layer is responsible for routing and forwarding data packets between different networks. Routers use IP addresses to determine the best path for data packets to reach their destination. They make decisions based on network layer protocols such as IP (Internet Protocol) and ICMP (Internet Control Message Protocol). Routers play a crucial role in connecting multiple networks together and ensuring efficient data transmission across the internet.

    Rate this question:

  • 5. 

    At what Open System Interconnect layer are common data compression and encryption schemes used?

    • A.

      Application.

    • B.

      Session.

    • C.

      Presentation.

    • D.

      Transport.

    Correct Answer
    C. Presentation.
    Explanation
    Common data compression and encryption schemes are used at the Presentation layer of the Open System Interconnect (OSI) model. This layer is responsible for formatting, encrypting, and compressing data to be transmitted over the network. It ensures that the data is in a format that can be understood by the receiving system. By using compression, the size of the data is reduced, optimizing network bandwidth. Encryption ensures the security and confidentiality of the data during transmission. Therefore, the correct answer is Presentation.

    Rate this question:

  • 6. 

    What Open System Interconnect layer is closest to the end user?

    • A.

      Application.

    • B.

      Session.

    • C.

      Presentation.

    • D.

      Transport.

    Correct Answer
    A. Application.
    Explanation
    The Open System Interconnect (OSI) model is a conceptual framework that describes how network protocols interact and communicate with each other. It consists of seven layers, with the Application layer being the closest to the end user. The Application layer provides services directly to the user, such as web browsing, email, and file transfer. It interacts with the user and initiates communication with the lower layers of the OSI model to transmit and receive data over the network. Therefore, the Application layer is the correct answer as it is the layer closest to the end user.

    Rate this question:

  • 7. 

    What is a formal set of rules and conventions that govern how computers exchange information over a network medium?

    • A.

      Specification

    • B.

      Standard.

    • C.

      Etiquette

    • D.

      Protocol.

    Correct Answer
    D. Protocol.
    Explanation
    A protocol is a formal set of rules and conventions that govern how computers exchange information over a network medium. It ensures that data is transmitted and received correctly, and defines the format, timing, sequencing, and error control of the communication. A protocol acts as a common language that allows different devices and systems to communicate effectively and efficiently.

    Rate this question:

  • 8. 

    What topology defines the layout of a network’s devices and media?

    • A.

      Physical.

    • B.

      Logical.

    • C.

      Star.

    • D.

      Hybrid.

    Correct Answer
    A. Physical.
    Explanation
    The correct answer is physical because the physical topology refers to the actual layout of the devices and media in a network. It describes how the devices are physically connected to each other and to the network media, such as cables or wireless connections. This includes the arrangement of devices, the type of cables used, and the location of network components. On the other hand, logical topology refers to how data flows within the network, independent of the physical layout.

    Rate this question:

  • 9. 

    What topology defines the way in which devices communicate, and data is transmitted, throughout the network?

    • A.

      Physical.

    • B.

      Logical.

    • C.

      Star.

    • D.

      Hybrid.

    Correct Answer
    B. Logical.
    Explanation
    Logical topology refers to the way in which devices are connected and communicate with each other in a network, regardless of their physical location. It defines the pathways that data takes as it is transmitted between devices. Unlike physical topology, which focuses on the actual physical connections between devices, logical topology is concerned with the logical relationships between devices. It determines how data is transmitted, routed, and controlled within the network, allowing for efficient communication and data transfer.

    Rate this question:

  • 10. 

    What topology consists of devices connected to a common, shared cable?

    • A.

      Bus

    • B.

      Ring.

    • C.

      Star

    • D.

      Hybrid.

    Correct Answer
    A. Bus
    Explanation
    Bus topology consists of devices connected to a common, shared cable. In this topology, all devices are connected to a single cable, known as the bus. Each device on the network can transmit data onto the bus, and all other devices on the network can receive that data. It is a simple and cost-effective topology, but it has the disadvantage of being susceptible to a single point of failure, as if the main cable is damaged, the entire network may go down.

    Rate this question:

  • 11. 

    What topology consists of cable segments from each computer connected to a centralized component?

    • A.

      Bus

    • B.

      Ring.

    • C.

      Star.

    • D.

      Hybrid.

    Correct Answer
    C. Star.
    Explanation
    A star topology consists of cable segments from each computer connected to a centralized component, usually a switch or hub. In this configuration, all communication between computers passes through the central component, making it easier to manage and troubleshoot the network. Each computer has its own dedicated connection to the central component, which improves performance and allows for easier expansion of the network.

    Rate this question:

  • 12. 

    What topology combines two or more different physical topologies in a single network?

    • A.

      Bus

    • B.

      Ring

    • C.

      Star

    • D.

      Hybrid

    Correct Answer
    D. Hybrid
    Explanation
    A hybrid topology combines two or more different physical topologies in a single network. This means that it can have different sections of the network using different topologies such as bus, ring, or star. This allows for greater flexibility and scalability in the network design, as different sections can be configured to meet specific requirements or preferences.

    Rate this question:

  • 13. 

    Which network protocol has the Department of Defense chosen as its standard to govern the flow of information?

    • A.

      AppleTalk

    • B.

      NetBios Extended User Interface.

    • C.

      Transport Control Protocol/Internet Protocol

    • D.

      Internetwork Packet Exchange/ Sequenced Packet Exchange.

    Correct Answer
    C. Transport Control Protocol/Internet Protocol
    Explanation
    The Department of Defense has chosen the Transport Control Protocol/Internet Protocol (TCP/IP) as its standard network protocol to govern the flow of information. TCP/IP is a set of rules and protocols that allows for reliable and secure communication between devices on a network. It is widely used in the internet and is known for its robustness and scalability. The decision to adopt TCP/IP as the standard protocol by the Department of Defense highlights its effectiveness and widespread acceptance in the field of networking.

    Rate this question:

  • 14. 

    What Transmission Control Protocol/Internet Protocol network layer protocol provides the service of matching a known IP address for a destination device to a Media Access Control address?

    • A.

      Internet Protocol

    • B.

      Address Resolution Protocol

    • C.

      Reverse Address Resolution Protocol.

    • D.

      Internet Control Message Protocol.

    Correct Answer
    B. Address Resolution Protocol
    Explanation
    The Address Resolution Protocol (ARP) is the network layer protocol that provides the service of matching a known IP address for a destination device to a Media Access Control (MAC) address. ARP is used to resolve IP addresses to MAC addresses in a local network environment. When a device wants to communicate with another device on the same network, it uses ARP to find the MAC address corresponding to the IP address of the destination device. This allows for successful communication at the data link layer.

    Rate this question:

  • 15. 

    What Transmission Control Protocol/Internet Protocol network layer protocol provides the IP address for a device that knows its own MAC address?

    • A.

      Internet Protocol

    • B.

      Address Resolution Protocol.

    • C.

      Reverse Address Resolution Protocol.

    • D.

      Internet Control Message Protocol.

    Correct Answer
    C. Reverse Address Resolution Protocol.
    Explanation
    Reverse Address Resolution Protocol (RARP) is the correct answer because it is a network layer protocol that provides the IP address for a device that knows its own MAC address. RARP allows a device to send its MAC address to a RARP server and request its corresponding IP address. This is useful in situations where a device does not have a configured IP address and needs to obtain one dynamically.

    Rate this question:

  • 16. 

    What Transmission Control Protocol/Internet Protocol network layer protocol provides messaging that can help with troubleshooting

    • A.

      Internet Protocol

    • B.

      Address Resolution Protocol.

    • C.

      Reverse Address Resolution Protocol.

    • D.

      Internet Control Message Protocol

    Correct Answer
    D. Internet Control Message Protocol
    Explanation
    The correct answer is Internet Control Message Protocol. The Internet Control Message Protocol (ICMP) is a network layer protocol that provides messaging services for troubleshooting purposes. It is used to send error messages and operational information, such as network congestion or unreachable hosts, between network devices. ICMP messages are crucial for diagnosing and resolving network issues, as they allow network administrators to identify and troubleshoot problems in the network.

    Rate this question:

  • 17. 

    What Transmission Control Protocol/Internet Protocol transport layer protocol provides reliable data delivery services?

    • A.

      Internet Protocol

    • B.

      User Datagram Protocol

    • C.

      Transmission Control Protocol

    • D.

      Internet Control Message Protocol

    Correct Answer
    C. Transmission Control Protocol
    Explanation
    The correct answer is Transmission Control Protocol (TCP). TCP is a transport layer protocol that provides reliable data delivery services. It ensures that data packets are delivered in the correct order and without any errors or loss. TCP uses acknowledgment and retransmission mechanisms to guarantee reliable delivery, making it suitable for applications that require accurate and complete data transmission, such as web browsing and file transfer.

    Rate this question:

  • 18. 

    What application within Transmission Control Protocol/Internet Protocol is used to send and receive files via TCP?

    • A.

      File Transfer Protocol

    • B.

      Trivial File Transfer Protocol

    • C.

      Simple Mail Transfer Protocol

    • D.

      HyperText Transfer Protocol

    Correct Answer
    A. File Transfer Protocol
    Explanation
    File Transfer Protocol (FTP) is the correct answer because it is the application within TCP/IP that is specifically designed for sending and receiving files. FTP allows users to transfer files between a client and a server over a network, using TCP as the underlying protocol for reliable data transmission. FTP provides a set of commands for navigating and manipulating files on the server, making it a widely used protocol for file transfer over the internet.

    Rate this question:

  • 19. 

    What type of network connects networks that are typically separated by geographical distances between cities, states, countries, or around the world?

    • A.

      Local Area Network

    • B.

      Wide Area Network

    • C.

      Virtual Private Network.

    • D.

      Metropolitan Area Network

    Correct Answer
    B. Wide Area Network
    Explanation
    A Wide Area Network (WAN) is a type of network that connects networks that are typically separated by geographical distances between cities, states, countries, or around the world. Unlike a Local Area Network (LAN) which is confined to a small area, a WAN allows for long-distance communication and connects multiple LANs together. A Virtual Private Network (VPN) is a technology that allows secure remote access to a private network over a public network, and a Metropolitan Area Network (MAN) connects networks within a specific geographic area, such as a city.

    Rate this question:

  • 20. 

    What type of network makes use of tunneling and security protocols to enables a group of two or more computer systems to communicate over the public Internet

    • A.

      Local Area Network.

    • B.

      Wide Area Network

    • C.

      Virtual Private Network

    • D.

      Metropolitan Area Network

    Correct Answer
    C. Virtual Private Network
    Explanation
    A Virtual Private Network (VPN) is a type of network that uses tunneling and security protocols to enable a group of two or more computer systems to communicate over the public Internet. VPNs provide a secure and encrypted connection between the computers, allowing them to send and receive data as if they were directly connected to a private network. This makes VPNs particularly useful for remote workers or for accessing private networks while connected to a public network, such as the internet.

    Rate this question:

  • 21. 

    Which is a common port that contains Hyper Text Transfer Protocol servers and proxies?

    • A.

      Port 80.

    • B.

      Port 110.

    • C.

      Port 443.

    • D.

      Port 8080.

    Correct Answer
    D. Port 8080.
    Explanation
    Port 8080 is commonly used for HTTP servers and proxies. While port 80 is the standard port for HTTP, port 8080 is often used as an alternative when port 80 is already in use or blocked. Port 110 is used for POP3 email protocol, and port 443 is used for secure HTTPS communication.

    Rate this question:

  • 22. 

    How many bits are in an IPv4 address?

    • A.

      16 bits.

    • B.

      32 bits.

    • C.

      64 bits

    • D.

      128 bits.

    Correct Answer
    B. 32 bits.
    Explanation
    An IPv4 address is a 32-bit binary number, divided into four octets, each containing 8 bits. Therefore, the correct answer is 32 bits.

    Rate this question:

  • 23. 

    Instead of using binary, how are IPv4 addresses expressed to be more user-friendly?

    • A.

      Colon Hexadecimal Format.

    • B.

      Dotted Decimal Notation

    • C.

      Hexadecimal.

    • D.

      Octal.

    Correct Answer
    B. Dotted Decimal Notation
    Explanation
    IPv4 addresses are expressed in dotted decimal notation to make them more user-friendly. In this format, the address is divided into four sections, each representing an octet of the address. Each octet is represented as a decimal number ranging from 0 to 255, separated by dots. This format is easier for users to understand and remember compared to binary, hexadecimal, or octal formats.

    Rate this question:

  • 24. 

    Using a range of 1–126 in the first octet of an IPv4 address, what class does it belong to?

    • A.

      Class A.

    • B.

      Class B.

    • C.

      Class C.

    • D.

      Class D.

    Correct Answer
    A. Class A.
    Explanation
    An IPv4 address is divided into different classes based on the range of values in the first octet. Class A addresses have a first octet range of 1-126, which means that any IP address falling within this range belongs to Class A. Class A addresses are used for large networks, as they provide a large number of host addresses.

    Rate this question:

  • 25. 

    What IPv4 class address is used for networks with about 250 nodes?

    • A.

      Class C.

    • B.

      Class D.

    • C.

      Class E.

    • D.

      Class F.

    Correct Answer
    A. Class C.
    Explanation
    Class C IPv4 addresses are used for networks with about 250 nodes. Class C addresses have a range of 192.0.0.0 to 223.255.255.255 and provide 24 bits for the network portion and 8 bits for the host portion. This allows for a maximum of 2^8 (256) possible network addresses, with each network capable of accommodating up to 2^8 (256) hosts. Therefore, a Class C address is suitable for networks with approximately 250 nodes.

    Rate this question:

  • 26. 

    What IPv4 class address is used for multicast addressing?

    • A.

      Class C.

    • B.

      Class D.

    • C.

      Class E.

    • D.

      Class F.

    Correct Answer
    B. Class D.
    Explanation
    Class D is the correct answer because it is the class of IPv4 addresses that is reserved for multicast addressing. Multicast addressing allows a single packet to be sent to multiple recipients simultaneously. Class D addresses range from 224.0.0.0 to 239.255.255.255, and they are specifically designated for multicast group communication.

    Rate this question:

  • 27. 

    What IPv4 reserved address is used for loop back?

    • A.

      0.0.0.0.

    • B.

      127.0.0.1.

    • C.

      207.55.157.255.

    • D.

      255.255.255.255.

    Correct Answer
    B. 127.0.0.1.
    Explanation
    The IPv4 reserved address used for loop back is 127.0.0.1. This address is commonly referred to as the loopback address and is used to test network connectivity on a local machine. When a packet is sent to this address, it is looped back to the same machine without being transmitted on the network. This allows for testing and troubleshooting network applications without the need for an external network connection.

    Rate this question:

  • 28. 

    What is a mechanism that allows a network device to divide an IP address into a network and host number

    • A.

      Subnet mask.

    • B.

      Broadcast

    • C.

      Multicast.

    • D.

      Subnet.

    Correct Answer
    A. Subnet mask.
    Explanation
    A subnet mask is a mechanism that allows a network device to divide an IP address into a network and host number. It is used to determine which part of the IP address represents the network and which part represents the host. The subnet mask consists of a series of binary digits that correspond to the number of bits used for the network portion of the IP address. By applying the subnet mask to the IP address, the device can determine the network address and the host address, allowing for proper routing and communication within the network.

    Rate this question:

  • 29. 

    What is the default classful subnet mask on class B networks?

    • A.

      255.255.0.0.

    • B.

      255.255.240.0.

    • C.

      255.255.255.0.

    • D.

      255.255.255.224.

    Correct Answer
    A. 255.255.0.0.
    Explanation
    The default classful subnet mask for class B networks is 255.255.0.0. This subnet mask allows for 16 bits to be used for the network portion of the IP address and 16 bits for the host portion. This means that class B networks can have up to 65,536 hosts on each network.

    Rate this question:

  • 30. 

    What method borrows bits from the host field of an IP address to create a subnet?

    • A.

      Classful Subnet Masking

    • B.

      Classless Inter-Domain Routing

    • C.

      Virtual Private Networking.

    • D.

      Virtual Local Area Networking.

    Correct Answer
    A. Classful Subnet Masking
    Explanation
    Classful subnet masking is a method that borrows bits from the host field of an IP address to create a subnet. In classful subnet masking, the IP address is divided into network and host portions based on predetermined class boundaries. The subnet mask is used to determine the size of the network and host portions. By borrowing bits from the host field, the network can be further divided into smaller subnets, allowing for more efficient use of IP addresses and better network management.

    Rate this question:

  • 31. 

    Instead of using binary, how are IPv6 addresses expressed to be more user-friendly?

    • A.

      Colon Hexadecimal Format

    • B.

      Dotted Decimal Notation.

    • C.

      Hexadecimal.

    • D.

      Octal.

    Correct Answer
    A. Colon Hexadecimal Format
    Explanation
    IPv6 addresses are expressed in a colon hexadecimal format to make them more user-friendly. This format uses groups of four hexadecimal digits separated by colons. This allows for a larger address space and simplifies the representation of IPv6 addresses compared to the binary format used in IPv4. The use of hexadecimal digits also makes it easier for humans to read and remember the addresses.

    Rate this question:

  • 32. 

    What notation is expressed in leading zero compression for IPv6?

    • A.

      1234:1234:0:0:1234:0:0:1234.

    • B.

      10AB::3:0:1234:5678

    • C.

      255.255.255.255.

    • D.

      127.0.0.1.

    Correct Answer
    A. 1234:1234:0:0:1234:0:0:1234.
    Explanation
    Leading zero compression is a notation used in IPv6 to simplify the representation of consecutive blocks of zeros. It allows for the removal of one or more consecutive blocks of zeros and replaces them with a double colon (::). In the given answer, the notation 1234:1234:0:0:1234:0:0:1234 represents the IPv6 address with leading zero compression. The consecutive blocks of zeros have been compressed to ::, making the representation shorter and more concise.

    Rate this question:

  • 33. 

    What notation is expressed in zero compression for IPv6?

    • A.

      1234:1234:0:0:1234:0:0:1234.

    • B.

      10AB::3:0:1234:5678.

    • C.

      255.255.255.255.

    • D.

      127.0.0.1.

    Correct Answer
    B. 10AB::3:0:1234:5678.
    Explanation
    The correct answer is "10AB::3:0:1234:5678." This is an example of zero compression notation in IPv6. Zero compression allows consecutive blocks of zeros to be represented by "::". In this case, "::" is used to represent the consecutive blocks of zeros between "10AB" and "3", as well as the consecutive blocks of zeros between "3" and "1234:5678". This notation helps to simplify and shorten the representation of IPv6 addresses.

    Rate this question:

  • 34. 

    What Unicast address scope operates within a network segment, and will not originate from, or be destined to, an interface that requires a router to direct traffic?

    • A.

      Site-local.

    • B.

      Link-local

    • C.

      Aggregatable Local

    • D.

      Aggregatable Global

    Correct Answer
    B. Link-local
    Explanation
    Link-local addresses operate within a network segment and do not require a router to direct traffic. These addresses are automatically assigned to interfaces and are used for communication within the local network. They are not meant to be routed outside of the network segment and are only valid within that specific network.

    Rate this question:

  • 35. 

    What Unicast address scope is designed to be private, internally routable addresses that do not route outside the site?

    • A.

      Site-local.

    • B.

      Link-local.

    • C.

      Aggregatable Local

    • D.

      Aggregatable Global

    Correct Answer
    A. Site-local.
    Explanation
    Site-local addresses are designed to be private, internally routable addresses that do not route outside the site. These addresses are used within a specific site or organization and are not meant to be globally routable. They allow for communication within the site without the need for external routing. Site-local addresses were defined in older versions of the Internet Protocol (IPv6) but have been deprecated in favor of Unique Local Addresses (ULA).

    Rate this question:

  • 36. 

    What Unicast address scope is publicly accessible with the Network ID portion of the address broken up into different areas allowing for hierarchical design and allocation?

    • A.

      Site-local.

    • B.

      Link-local.

    • C.

      Aggregatable Local.

    • D.

      Aggregatable Global.

    Correct Answer
    D. Aggregatable Global.
    Explanation
    The correct answer is Aggregatable Global. Aggregatable Global Unicast addresses are publicly accessible and allow for hierarchical design and allocation by breaking up the Network ID portion of the address into different areas. This enables efficient routing and management of IP addresses on a global scale. Site-local addresses are not publicly accessible and are limited to a specific site or organization. Link-local addresses are only used for communication within a single network segment. Aggregatable Local addresses are not a recognized scope for Unicast addresses.

    Rate this question:

  • 37. 

    The computing part of the computer is the central processing unit, also called the

    • A.

      Control unit.

    • B.

      Minicomputer

    • C.

      Microprocessor

    • D.

      Arithmetic logic unit

    Correct Answer
    C. Microprocessor
    Explanation
    The central processing unit (CPU) is the computing part of a computer that performs all the necessary calculations and operations. It is responsible for executing instructions, managing data, and controlling the overall operation of the computer. The microprocessor is a key component of the CPU, acting as its brain and carrying out the actual processing of data. It is a small chip that contains millions of transistors and circuits, allowing it to perform complex calculations and operations at high speeds. Therefore, the microprocessor is the correct answer as it accurately represents the computing part of the computer.

    Rate this question:

  • 38. 

    What two main components make up the central processing unit?

    • A.

      Control unit and read-only memory

    • B.

      Control unit and arithmetic logic unit

    • C.

      Arithmetic logic unit and read-only memory

    • D.

      Arithmetic logic unit and random access memory

    Correct Answer
    B. Control unit and arithmetic logic unit
    Explanation
    The central processing unit (CPU) consists of two main components: the control unit and the arithmetic logic unit (ALU). The control unit is responsible for managing and coordinating the operations of the CPU, including fetching and decoding instructions, while the ALU performs mathematical and logical operations, such as addition, subtraction, and comparisons. Together, these two components work in tandem to carry out the instructions and process data within the CPU.

    Rate this question:

  • 39. 

    What is the type of memory that retains data after power is removed or lost?

    • A.

      Volatile.

    • B.

      Nonvolatile.

    • C.

      Secured.

    • D.

      Unsecured.

    Correct Answer
    B. Nonvolatile.
    Explanation
    Nonvolatile memory is the type of memory that retains data even after power is removed or lost. Unlike volatile memory, which requires a constant power source to retain data, nonvolatile memory can store information for long periods without power. This type of memory is commonly used in devices such as hard drives, solid-state drives, and flash memory, where data needs to be stored even when the device is turned off or loses power.

    Rate this question:

  • 40. 

    Which landline transmission medium is the primary carrier of voice communications?

    • A.

      Twisted pair cable

    • B.

      Fiber optic cable

    • C.

      Coaxial cable

    • D.

      Twinax cable

    Correct Answer
    A. Twisted pair cable
    Explanation
    Twisted pair cable is the primary carrier of voice communications because it is a widely used transmission medium for telephone systems. It consists of two insulated copper wires twisted together, which helps to minimize interference and crosstalk. The twisted pair cable is capable of carrying analog signals, such as voice, over long distances without significant degradation in quality. It is cost-effective, easy to install, and suitable for both residential and commercial applications, making it the preferred choice for voice communication.

    Rate this question:

  • 41. 

    An optical communications system is comprised of a

    • A.

      Transmitter, cable, and receiver

    • B.

      Transmitter, cable, and logic analyzer.

    • C.

      Transmitter, transmission medium, and logic analyzer

    • D.

      Transmitter, transmission medium, and protocol analyzer.

    Correct Answer
    A. Transmitter, cable, and receiver
    Explanation
    The correct answer is transmitter, cable, and receiver. In an optical communications system, the transmitter is responsible for converting electrical signals into optical signals, which are then transmitted through a cable made of optical fibers. The receiver at the other end of the cable receives the optical signals and converts them back into electrical signals. Therefore, the transmitter, cable, and receiver are the essential components of an optical communications system.

    Rate this question:

  • 42. 

    Which of the following is not one of the three advantages to using wireless technology?

    • A.

      Ease of installation

    • B.

      Lower Cost

    • C.

      Safety

    • D.

      Mobility

    Correct Answer
    C. Safety
    Explanation
    Safety is not one of the three advantages to using wireless technology because it can pose security risks and vulnerabilities. While wireless technology offers ease of installation, lower cost, and mobility, it may also be susceptible to unauthorized access, data breaches, and interference. Therefore, safety is not a direct advantage of wireless technology, but rather a concern that needs to be addressed and managed.

    Rate this question:

  • 43. 

    The ability to move about without being tethered by wires in wireless technology is called

    • A.

      Mobility.

    • B.

      Ease of installations

    • C.

      War driving

    • D.

      Motion capture technology

    Correct Answer
    A. Mobility.
    Explanation
    The correct answer is mobility. In wireless technology, mobility refers to the ability to move freely without being restricted by wires. This allows users to access and use devices or networks from different locations, providing convenience and flexibility. Mobility is a key feature of wireless technology that enables users to stay connected and access information on the go.

    Rate this question:

  • 44. 

    Which of the following is not one the four security threats to Wireless Local Area Network?

    • A.

      Rogue Access Points

    • B.

      Direct Connections

    • C.

      War Drivers

    • D.

      Hackers.

    Correct Answer
    B. Direct Connections
    Explanation
    Direct Connections is not considered one of the four security threats to Wireless Local Area Network because it refers to a legitimate method of connecting devices to a network using a physical cable, rather than wirelessly. Rogue Access Points, War Drivers, and Hackers, on the other hand, are all potential security threats to wireless networks.

    Rate this question:

  • 45. 

    Who is an authorized client that may unknowingly or maliciously help outside parties gain access to a network

    • A.

      Auditor.

    • B.

      Employee.

    • C.

      War Driver.

    • D.

      Hacker.

    Correct Answer
    B. Employee.
    Explanation
    An employee is an authorized client who may unknowingly or maliciously help outside parties gain access to a network. Employees have legitimate access to the network and can potentially compromise its security by either unintentionally falling victim to social engineering attacks or intentionally collaborating with external entities to breach the network's defenses.

    Rate this question:

  • 46. 

    What organization developed several wireless standards to meet the demands of security, speed, and flexibility of today’s wireless networks

    • A.

      Institute of Electrical Electronics Engineers

    • B.

      International Organization for Standardization

    • C.

      Internet assigned numbers authority

    • D.

      National Science Foundation network.

    Correct Answer
    A. Institute of Electrical Electronics Engineers
    Explanation
    The Institute of Electrical Electronics Engineers (IEEE) developed several wireless standards to meet the demands of security, speed, and flexibility of today's wireless networks. These standards, such as IEEE 802.11 (Wi-Fi), IEEE 802.15 (Bluetooth), and IEEE 802.16 (WiMAX), have played a crucial role in ensuring interoperability and reliable wireless communication. The IEEE is a renowned organization in the field of electrical and electronics engineering, and its contributions have greatly influenced the development and advancement of wireless technology.

    Rate this question:

  • 47. 

    How many peripherals can a Universal Serial Bus handle at once?

    • A.

      127

    • B.

      128.

    • C.

      227

    • D.

      228

    Correct Answer
    A. 127
    Explanation
    A Universal Serial Bus (USB) can handle up to 127 peripherals at once. This is because the USB specification supports a maximum of 127 unique device addresses, each of which can be assigned to a peripheral device. Therefore, any additional peripherals beyond this limit would not be recognized or supported by the USB.

    Rate this question:

  • 48. 

    How many devices can connect to a FireWire bus?

    • A.

      63

    • B.

      64

    • C.

      65

    • D.

      66

    Correct Answer
    A. 63
    Explanation
    A FireWire bus can support up to 63 devices. This is because the FireWire protocol uses a 6-bit device address field, allowing for a maximum of 2^6 - 1 (63) unique addresses. Each device connected to the bus is assigned a unique address, and therefore, the maximum number of devices that can be connected is 63.

    Rate this question:

  • 49. 

    What do you apply across Liquid Crystal Display material to change the alignment and light polarizing property?

    • A.

      Current.

    • B.

      Voltage

    • C.

      Resistance.

    • D.

      Inductance

    Correct Answer
    B. Voltage
    Explanation
    Voltage is applied across Liquid Crystal Display (LCD) material to change its alignment and light polarizing property. By applying voltage, the liquid crystals in the display can be aligned in a specific way, which affects the polarization of light passing through them. This alignment change allows the display to control the amount of light that passes through different areas, thus creating the desired image or text. Therefore, voltage is the correct answer as it directly influences the alignment and polarizing properties of the LCD material.

    Rate this question:

  • 50. 

    What is a Data Link layer network device that logically separates a single network into two segments or collision domains in Ethernet networks?

    • A.

      Hub

    • B.

      Bridge

    • C.

      Switch.

    • D.

      Router.

    Correct Answer
    B. Bridge
    Explanation
    A bridge is a Data Link layer network device that logically separates a single network into two segments or collision domains in Ethernet networks. It operates by examining the MAC addresses of the incoming frames and making forwarding decisions based on the destination address. By doing so, it can filter and control the flow of traffic between the segments, reducing collisions and improving network performance. Unlike a hub, which simply broadcasts all incoming traffic to all connected devices, a bridge selectively forwards traffic only to the intended destination, making it an efficient solution for dividing a network into separate segments.

    Rate this question:

Quiz Review Timeline +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 20, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Dec 08, 2011
    Quiz Created by
    Gtarrant
Back to Top Back to top
Advertisement
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.