CDC 3DX5X Vol 2 UREs: Networking And Security Sample Test

Reviewed by Editorial Team
The ProProfs editorial team is comprised of experienced subject matter experts. They've collectively created over 10,000 quizzes and lessons, serving over 100 million users. Our team includes in-house content moderators and subject matter experts, as well as a global network of rigorously trained contributors. All adhere to our comprehensive editorial guidelines, ensuring the delivery of high-quality content.
Learn about Our Editorial Process
| By Youdontlovecdc
Y
Youdontlovecdc
Community Contributor
Quizzes Created: 1 | Total Attempts: 172
| Attempts: 172
SettingsSettings
Please wait...
  • 1/124 Questions

    What layer of the Open System Interconnect model defines the electrical, mechanical,procedural, and functional specifications for links between communicating network systems?

    • Physical
    • Data Link
    • Network
    • Transport
Please wait...
About This Quiz

This sample test from CDC 3DX5X Vol 2 focuses on networking and security, assessing knowledge on OSI model layers, device functions, and data handling techniques. It's designed for learners aiming to enhance their understanding of network infrastructure and security protocols.

CDC 3DX5X Vol 2 UREs: Networking And Security Sample Test - Quiz

Quiz Preview

  • 2. 

    At what Open System Interconnect layer do routers operate?

    • Network

    • Physical

    • Data Link

    • Transport

    Correct Answer
    A. Network
    Explanation
    Routers operate at the Network layer of the Open System Interconnect (OSI) model. The Network layer is responsible for routing data packets across different networks. Routers use IP addresses to determine the best path for forwarding packets from one network to another. They examine the destination IP address of a packet and make decisions based on routing tables to ensure efficient and accurate delivery of data. Therefore, routers play a crucial role in network communication by connecting multiple networks and facilitating the transfer of data between them.

    Rate this question:

  • 3. 

    What is a formal set of rules and conventions that govern how computers exchangeinformation over a network medium? 

    • Specification

    • Standard

    • Etiquette

    • Protocol

    Correct Answer
    A. Protocol
    Explanation
    A protocol is a formal set of rules and conventions that govern how computers exchange information over a network medium. It defines the format, timing, sequencing, and error control of data transmission. Protocols ensure that communication between devices is reliable, efficient, and standardized. They define the roles and responsibilities of both the sender and receiver, ensuring that data is transmitted and received correctly.

    Rate this question:

  • 4. 

    What topology defines the way in which devices communicate, and data is transmitted,throughout the network?

    • Physical

    • Logical

    • Star

    • Hybrid

    Correct Answer
    A. Logical
    Explanation
    Logical topology refers to the way in which devices communicate and data is transmitted throughout the network based on logical connections. It defines the flow of data and the paths it takes, regardless of the physical layout of the network. This includes protocols, addressing schemes, and the logical relationships between devices. Unlike physical topology, which focuses on the physical arrangement of devices and cables, logical topology deals with the abstract representation of the network's structure. Therefore, logical topology is the correct answer as it specifically addresses the communication and data transmission aspect of network design.

    Rate this question:

  • 5. 

    What topology consists of devices connected to a common, shared cable?

    • Bus

    • Ring

    • Star

    • Hybrid

    Correct Answer
    A. Bus
    Explanation
    Bus topology consists of devices connected to a common, shared cable. In this topology, all devices are connected to a single cable called the bus. Each device on the network listens to the bus to determine if the transmitted data is intended for it. If a device wants to transmit data, it sends the data onto the bus, and all devices on the network receive the data. This type of topology is simple to install and cost-effective, but if the main cable fails, the entire network can be affected.

    Rate this question:

  • 6. 

    What topology consists of cable segments from each computer connected to a centralized component? 

    • Bus

    • Ring

    • Star

    • Hybrid

    Correct Answer
    A. Star
    Explanation
    A star topology consists of cable segments from each computer connected to a centralized component, usually a switch or hub. In this topology, all communication between the computers is routed through this central component, which helps to manage and control the flow of data. This arrangement provides a high level of reliability, as if one computer or cable segment fails, it does not affect the rest of the network. Additionally, it allows for easy scalability, as new computers can be added to the network simply by connecting them to the central component.

    Rate this question:

  • 7. 

    What topology combines two or more different physical topologies in a single network?

    • Bus

    • Ring

    • Star

    • Hybrid

    Correct Answer
    A. Hybrid
    Explanation
    A hybrid topology combines two or more different physical topologies in a single network. This means that a network can have a combination of bus, ring, star, or other topologies. The advantage of a hybrid topology is that it can provide flexibility and scalability, allowing for the customization of the network to meet specific needs. It can also provide redundancy and fault tolerance, as multiple topologies can be used to ensure network connectivity even if one part of the network fails.

    Rate this question:

  • 8. 

    Which network protocol has the Department of Defense chosen as its standard to govern theflow of information?

    • AppleTalk

    • NetBIOS Extended User Interface

    • Transport Control Protocol/Internet Protocol

    • Internetwork Packet Exchange/ Sequenced Packet Exchange

    Correct Answer
    A. Transport Control Protocol/Internet Protocol
    Explanation
    The Department of Defense has chosen the Transport Control Protocol/Internet Protocol (TCP/IP) as its standard network protocol to govern the flow of information. TCP/IP is a set of protocols that allows for the reliable transmission of data over networks, including the internet. It is widely used and provides a standardized method for communication between devices and networks, making it an ideal choice for the Department of Defense to ensure interoperability and security in their information flow.

    Rate this question:

  • 9. 

    Using a range of 1–126 in the first octet of an IPv4 address, what class does it belong to?

    • Class A

    • Class B

    • Class C

    • Class D

    Correct Answer
    A. Class A
    Explanation
    An IPv4 address with a first octet in the range of 1-126 belongs to Class A. Class A addresses are used for large networks, as they have a very large number of available IP addresses. The first octet in a Class A address represents the network portion of the address, while the remaining three octets represent the host portion.

    Rate this question:

  • 10. 

    What IPv4 reserved address is used for loop back?

    • 0.0.0.0

    • 127.0.0.1

    • 207.55.157.255

    • 255.255.255.255

    Correct Answer
    A. 127.0.0.1
    Explanation
    The IPv4 reserved address used for loop back is 127.0.0.1. This address is commonly known as the loopback address and is used to test network connectivity on a local machine. When a packet is sent to this address, it is looped back to the same machine without being sent over the network. This allows for testing and troubleshooting network applications without the need for an actual network connection.

    Rate this question:

  • 11. 

    The ability to move about without being tethered by wires in wireless technology is called

    • Mobility

    • Ease of installations

    • War driving

    • Motion capture technology

    Correct Answer
    A. Mobility
    Explanation
    The correct answer is "mobility" because wireless technology allows devices to move freely without the need for physical connections or wires. This enables users to access and use technology while on the go, providing them with the freedom to move around without being restricted by cables.

    Rate this question:

  • 12. 

    Which of the following is not one the four security threats to Wireless Local Area Network?

    • Rogue Access Points

    • Direct Connections

    • War Drivers

    • Hackers

    Correct Answer
    A. Direct Connections
    Explanation
    Direct Connections is not one of the four security threats to Wireless Local Area Network. Rogue Access Points, War Drivers, and Hackers are all considered security threats to WLAN. Rogue Access Points refer to unauthorized access points that are set up by individuals without permission, which can lead to unauthorized access to the network. War Drivers are individuals who drive around looking for vulnerable wireless networks to exploit. Hackers are individuals who attempt to gain unauthorized access to a network for malicious purposes. However, Direct Connections do not pose a specific security threat to WLAN as they are typically used for legitimate purposes such as connecting devices directly to a router or modem.

    Rate this question:

  • 13. 

    What organization developed several wireless standards to meet the demands of security,speed, and flexibility of today’s wireless networks?

    • Institute of Electrical Electronics Engineers

    • International Organization for Standardization

    • Internet assigned numbers authority

    • National Science Foundation network

    Correct Answer
    A. Institute of Electrical Electronics Engineers
    Explanation
    The Institute of Electrical Electronics Engineers (IEEE) developed several wireless standards to meet the demands of security, speed, and flexibility of today's wireless networks. These standards ensure that wireless networks are reliable, efficient, and interoperable. The IEEE is a renowned organization in the field of electrical engineering and is responsible for developing various technical standards across different industries, including wireless communication.

    Rate this question:

  • 14. 

    The classification of a fill device is

    • Classified when taken out of a safe

    • Classified as SECRET when the key has been unloaded

    • Unclassified when put back in the safe after a key has been loaded into it

    • Classified as soon as a key is loaded, and holds the classification of the loaded key

    Correct Answer
    A. Classified as soon as a key is loaded, and holds the classification of the loaded key
    Explanation
    When a fill device is loaded with a key, it becomes classified. The classification of the fill device is determined by the classification of the loaded key. This means that if a fill device is loaded with a key that is classified as SECRET, the fill device will also be classified as SECRET. The classification of the fill device remains the same until the key is unloaded. Once the key is unloaded, the fill device is no longer classified. Therefore, the correct answer is that a fill device is classified as soon as a key is loaded, and holds the classification of the loaded key.

    Rate this question:

  • 15. 

    What Open System Interconnect layer is closest to the end user?

    • Application

    • Session

    • Presentation

    • Transport

    Correct Answer
    A. Application
    Explanation
    The Open System Interconnect (OSI) model is a conceptual framework that standardizes the functions of a communication system into seven different layers. The layer closest to the end user is the Application layer. This layer provides services directly to the user, such as email, web browsing, and file transfer. It interacts with software applications and ensures that the user's requests are properly communicated to the underlying layers of the OSI model for further processing and transmission.

    Rate this question:

  • 16. 

    What Transmission Control Protocol/Internet Protocol network layer protocol provides the IP   address for a device that knows its own MAC address ?

    • Internet Protocol

    • Address Resolution Protocol

    • Reverse Address Resolution Protocol

    • Internet Control Message Protocol

    Correct Answer
    A. Reverse Address Resolution Protocol
    Explanation
    The Reverse Address Resolution Protocol (RARP) is used to obtain an IP address when the device already knows its own MAC address. RARP allows a device to send a broadcast request on the network, asking for its IP address to be assigned based on its MAC address. This is useful in situations where a device does not have a configured IP address and needs to obtain one dynamically.

    Rate this question:

  • 17. 

    What type of network connects networks that are typically separated by geographical distances between cities, states, countries, or around the world? 

    • Local Area Network

    • Wide Area Network

    • Virtual Private Network

    • Metropolitan Area Network

    Correct Answer
    A. Wide Area Network
    Explanation
    A Wide Area Network (WAN) is a type of network that connects networks that are typically separated by geographical distances between cities, states, countries, or around the world. Unlike a Local Area Network (LAN) that connects devices within a limited area like a home or office, a WAN enables communication over larger distances. A Virtual Private Network (VPN) is a secure connection that allows users to access a private network over a public network like the internet. A Metropolitan Area Network (MAN) connects networks within a specific metropolitan area.

    Rate this question:

  • 18. 

    What type of network makes use of tunneling and security protocols to enables a group of two or more computer systems to communicate over the public Internet?

    • Local Area Network

    • Wide Area Network

    • Virtual Private Network

    • Metropolitan Area Network

    Correct Answer
    A. Virtual Private Network
    Explanation
    A Virtual Private Network (VPN) is a type of network that uses tunneling and security protocols to allow a group of computer systems to communicate over the public Internet. It creates a secure and encrypted connection between these systems, ensuring that the data transmitted over the network is protected from unauthorized access. VPNs are commonly used by businesses and individuals to establish secure connections over public networks, such as the Internet, allowing remote access to resources and ensuring the privacy and security of communication.

    Rate this question:

  • 19. 

    Which is a common port that contains Hyper Text Transfer Protocol servers and proxies?

    • Port 80

    • Port 110

    • Port 443

    • Port 8080

    Correct Answer
    A. Port 8080
    Explanation
    Port 8080 is a common port that contains Hyper Text Transfer Protocol (HTTP) servers and proxies. While Port 80 is the default port for HTTP, Port 8080 is often used as an alternative port for HTTP servers and proxies. It allows for additional flexibility and can be used to run multiple web servers on the same machine. This port is commonly used for testing and development purposes as well.

    Rate this question:

  • 20. 

    What is the type of memory that retains data after power is removed or lost?

    • Volatile

    • Nonvolatile

    • Secured

    • Unsecured

    Correct Answer
    A. Nonvolatile
    Explanation
    Nonvolatile memory is the type of memory that retains data even after power is removed or lost. Unlike volatile memory, which requires a constant power supply to maintain data, nonvolatile memory can retain information even when power is not available. This type of memory is commonly used in devices like solid-state drives (SSDs), flash drives, and ROM (Read-Only Memory) chips. It allows for long-term storage of data without the risk of losing it due to power failure or shutdown.

    Rate this question:

  • 21. 

    Which landline transmission medium is the primary carrier of voice communications

    • Twisted pair cable

    • Fiber optic cable

    • Coaxial cable

    • Twinax cable

    Correct Answer
    A. Twisted pair cable
    Explanation
    Twisted pair cable is the primary carrier of voice communications because it is a cost-effective and widely used transmission medium for telephone systems. It consists of two insulated copper wires twisted together, which helps to reduce electromagnetic interference. The twisted pair cable is capable of transmitting voice signals over long distances without significant loss or degradation of quality. It is also easy to install and maintain, making it a popular choice for landline telephone networks.

    Rate this question:

  • 22. 

    What is the method called when the entire frame is received and placed into the buffer, an error check is performed, and the frame is sent to the proper port for delivery?

    • Store-and-forward

    • Cross-over

    • Fragment-free

    • Adaptive

    Correct Answer
    A. Store-and-forward
    Explanation
    Store-and-forward is the method where the entire frame is received and stored in the buffer before any further processing. An error check is then performed to ensure the integrity of the frame. Once the frame is error-free, it is sent to the appropriate port for delivery. This method ensures that only error-free frames are forwarded, reducing the chances of transmitting corrupt data.

    Rate this question:

  • 23. 

    Applications are software programs designed to perform what type of tasks ?

    • Specific

    • General

    • Special

    • Broad

    Correct Answer
    A. Specific
    Explanation
    Applications are software programs that are designed to perform specific tasks. Unlike general software programs, which have a wide range of functionalities, applications are focused on performing a particular function or set of functions. They are tailored to meet the specific needs of users and are typically designed to be user-friendly and intuitive. Whether it is a word processing application, a photo editing application, or a financial management application, each application is built with a specific purpose in mind, making it a specific task-oriented software program.

    Rate this question:

  • 24. 

    What are two anti-virus programs that the Air Force uses?

    • Norton and Horton

    • Horton and McAfee

    • Norton and McAfee

    • McAfee and Lotus Pro

    Correct Answer
    A. Norton and McAfee
    Explanation
    The Air Force uses Norton and McAfee as their two anti-virus programs. These programs are commonly used in various organizations and are known for their effectiveness in detecting and preventing malware and other security threats. By utilizing both Norton and McAfee, the Air Force can enhance their cybersecurity measures and ensure the protection of their systems and networks from potential attacks.

    Rate this question:

  • 25. 

    What was the first disk operating system developed to operate on a wide range of computer systems?

    • C-Plus

    • UNIX

    • Fortran

    • Windows

    Correct Answer
    A. UNIX
    Explanation
    UNIX was the first disk operating system developed to operate on a wide range of computer systems. It was designed to be portable and compatible with different hardware architectures, allowing it to be used on various computer systems. UNIX revolutionized the operating system landscape by introducing a multi-user and multitasking environment, providing a powerful and flexible platform for software development and system administration. Its open-source nature and widespread adoption have made UNIX a foundational operating system in the computing industry.

    Rate this question:

  • 26. 

    What directory is always identified by the slash symbol (/) and is in the "a" partition?

    • Root

    • User

    • Binary

    • Device

    Correct Answer
    A. Root
    Explanation
    The directory that is always identified by the slash symbol (/) and is in the "a" partition is the root directory. The root directory is the top-level directory in a file system hierarchy and serves as the starting point for navigating the file system. It contains all other directories and files in the system.

    Rate this question:

  • 27. 

    What concerns slowed the military's adoption of wireless network technology?

    • Speed and reliability

    • Security and reliability

    • Reliability and maintenance

    • Certification and interoperability

    Correct Answer
    A. Security and reliability
    Explanation
    The military's adoption of wireless network technology was slowed due to concerns regarding both security and reliability. Security was a major concern as the military needed to ensure that their wireless networks were secure from unauthorized access and potential cyber attacks. Reliability was also a concern as the military needed to ensure that the wireless networks would consistently provide a stable and uninterrupted connection, especially in critical situations. These concerns led to a cautious approach towards adopting wireless network technology in the military.

    Rate this question:

  • 28. 

    Which condition permits non-essential networks to be taken offline and substituted with alternate methods of communication?

    • INFOCON 2

    • INFOCON 3

    • INFOCON 4

    • INFOCON 5

    Correct Answer
    A. INFOCON 2
    Explanation
    INFOCON 2 is the condition that permits non-essential networks to be taken offline and substituted with alternate methods of communication. This level indicates an increased risk of attacks or vulnerabilities, and as a result, non-essential networks can be shut down to mitigate potential threats. This allows for a more secure environment and ensures that critical networks remain operational.

    Rate this question:

  • 29. 

    The Institute of Electrical and Electronics Engineers divide the Open System Interconnect Data Link Layers into what two sublayers? 

    • High Level Data Link Control and Synchronous Data Link Control

    • Logical Link Control and Media Access Control

    • Distance Vector and Link State

    • RS-232 and RS-530

    Correct Answer
    A. Logical Link Control and Media Access Control
    Explanation
    The correct answer is Logical Link Control and Media Access Control. The Open System Interconnect (OSI) Data Link Layer is divided into these two sublayers. The Logical Link Control (LLC) sublayer handles the flow control and error checking of data packets, ensuring reliable transmission. The Media Access Control (MAC) sublayer manages the access to the physical media, such as Ethernet or Wi-Fi, and handles issues like collision detection and media arbitration. These two sublayers work together to provide a reliable and efficient data link between network devices.

    Rate this question:

  • 30. 

    At what Open System Interconnect layer do network switches and bridges operate?

    • Network

    • Physical

    • Data Link

    • Transport

    Correct Answer
    A. Data Link
    Explanation
    Network switches and bridges operate at the Data Link layer of the Open System Interconnect (OSI) model. This layer is responsible for the reliable transfer of data between adjacent network nodes and ensures error-free transmission over the physical network. Switches and bridges use MAC addresses to forward data packets within a local area network (LAN) or between different LANs. They operate by examining the MAC address of incoming packets and forwarding them to the appropriate destination based on the MAC address table.

    Rate this question:

  • 31. 

    What topology defines the layout of a network’s devices and media?

    • Physical

    • Logical

    • Star

    • Hybrid

    Correct Answer
    A. Physical
    Explanation
    The correct answer is "Physical." The physical topology refers to the physical arrangement of devices and media in a network. It defines how the devices are connected and the layout of the cables and other physical components. This includes the placement of routers, switches, servers, and other network devices, as well as the type of cables used to connect them. The physical topology is important for determining the overall structure and organization of a network.

    Rate this question:

  • 32. 

    What Transmission Control Protocol/Internet Protocol network layer protocol provides messaging that can help with troubleshooting? 

    • Internet Protocol

    • Address Resolution Protocol

    • Reverse Address Resolution Protocol

    • Internet Control Message Protocol

    Correct Answer
    A. Internet Control Message Protocol
    Explanation
    The Internet Control Message Protocol (ICMP) is a network layer protocol that provides messaging capabilities to assist with troubleshooting. ICMP messages are used to report errors, provide diagnostic information, and test network connectivity. It is commonly used by network administrators and tools such as ping and traceroute to identify and resolve network issues.

    Rate this question:

  • 33. 

    What Transmission Control Protocol/Internet Protocol transport layer protocol provides reliable data delivery services?

    • Internet Protocol

    • User Datagram Protocol

    • Transmission Control Protocol

    • Internet Control Message Protocol

    Correct Answer
    A. Transmission Control Protocol
    Explanation
    The correct answer is Transmission Control Protocol. TCP is a transport layer protocol that provides reliable data delivery services. It ensures that data packets are delivered in the correct order and without errors by using acknowledgments, retransmissions, and flow control mechanisms. TCP also provides congestion control to prevent network congestion and ensure efficient data transmission.

    Rate this question:

  • 34. 

    How many bits are in an IPv4 address?

    • 16 bits

    • 32 bits

    • 64 bits

    • 128 bits

    Correct Answer
    A. 32 bits
    Explanation
    An IPv4 address is a 32-bit address, which means it consists of 32 binary digits or bits. This allows for a total of 2^32 or approximately 4.3 billion unique addresses. Each bit can be either a 0 or a 1, allowing for a wide range of possible combinations and therefore a large number of unique addresses.

    Rate this question:

  • 35. 

    What IPv4 class address is used for networks with about 250 nodes?

    • Class C

    • Class D

    • Class E

    • Class F

    Correct Answer
    A. Class C
    Explanation
    Class C IPv4 addresses are used for networks with about 250 nodes. Class C addresses have a range of 192.0.0.0 to 223.255.255.255, and they provide a maximum of 254 usable host addresses per network. This makes them suitable for small to medium-sized networks, such as small businesses or home networks. Class D addresses are used for multicast addresses, Class E addresses are reserved for experimental purposes, and Class F addresses are reserved for future use.

    Rate this question:

  • 36. 

    What IPv4 class address is used for multicast addressing?

    • Class C

    • Class D

    • Class E

    • Class F

    Correct Answer
    A. Class D
    Explanation
    Class D is the correct answer because it is the IPv4 class address used for multicast addressing. Multicast addressing allows a single packet to be sent to multiple destinations simultaneously. Class D addresses range from 224.0.0.0 to 239.255.255.255, and they are reserved for multicast groups. These addresses are used for applications such as video streaming, online gaming, and audio conferencing, where data needs to be sent to multiple recipients at the same time.

    Rate this question:

  • 37. 

    What is a mechanism that allows a network device to divide an IP address into a network and host number?

    • Subnet mask

    • Broadcast

    • Multicast

    • Subnet

    Correct Answer
    A. Subnet mask
    Explanation
    A subnet mask is a mechanism that allows a network device to divide an IP address into a network and host number. It is used to determine which part of the IP address represents the network and which part represents the host. By applying the subnet mask to the IP address, the device can determine the network address and perform routing and communication within the network.

    Rate this question:

  • 38. 

    What notation is expressed in zero compression for IPv6? 

    • 1234:1234:0:0:1234:0:0:1234

    • 10AB::3:0:1234:5678

    • 255.255.255.255

    • 127.0.0.1

    Correct Answer
    A. 10AB::3:0:1234:5678
    Explanation
    The correct answer is "10AB::3:0:1234:5678". This notation represents zero compression for IPv6. In IPv6, consecutive blocks of zeros can be compressed by using double colons "::". This allows for a more concise representation of the IPv6 address. In the given answer, "::" is used to represent the consecutive blocks of zeros between "10AB" and "3", and between "3" and "1234:5678".

    Rate this question:

  • 39. 

    Who is an authorized client that may unknowingly or maliciously help outside parties gain access to a network?

    • Auditor

    • Employee

    • War Driver

    • Hacker

    Correct Answer
    A. Employee
    Explanation
    An employee is an authorized client who may unknowingly or maliciously help outside parties gain access to a network. As an authorized user, an employee has access to sensitive information and can potentially misuse their privileges to compromise the network security. They may unknowingly fall victim to social engineering tactics or intentionally collaborate with external parties to breach the network defenses. Therefore, it is crucial for organizations to implement strong security measures, employee training, and monitoring systems to prevent such unauthorized activities and protect the network from potential threats.

    Rate this question:

  • 40. 

     This type of bridge is used to convert one Data Link layer protocol to another

    • Cross route

    • Transparent

    • Translational

    • Source route

    Correct Answer
    A. Translational
    Explanation
    A translational bridge is used to convert one Data Link layer protocol to another. This means that it can receive data using one protocol and then convert it into a different protocol before transmitting it to the destination. This type of bridge is commonly used in networks where different devices or systems use different protocols, allowing them to communicate with each other seamlessly.

    Rate this question:

  • 41. 

    What do routing algorithms initialize and maintain to aid the process of path determination? 

    • Routing times

    • Routing tables

    • Longest routes

    • Shortest routes

    Correct Answer
    A. Routing tables
    Explanation
    Routing algorithms initialize and maintain routing tables to aid the process of path determination. Routing tables contain information about the network topology, including the available routes, their associated costs, and next-hop addresses. By regularly updating and maintaining these tables, routing algorithms can make informed decisions about the best path to forward packets through the network. Routing tables help routers determine the shortest or most efficient routes to reach a destination, ensuring that data packets are delivered accurately and efficiently.

    Rate this question:

  • 42. 

    Which of these is an example of an Exterior Gateway Protocol?

    • Open Shortest Path First

    • Border Gateway Protocol

    • Routing Information Protocol

    • Enhanced Gateway Routing Protocol

    Correct Answer
    A. Border Gateway Protocol
    Explanation
    Border Gateway Protocol (BGP) is an example of an Exterior Gateway Protocol (EGP). BGP is used to exchange routing information between different autonomous systems (AS) on the internet. It is responsible for determining the best path for data packets to travel across different networks. BGP is widely used by internet service providers (ISPs) to establish and maintain routing tables, ensuring efficient and reliable data transmission between different networks. Therefore, BGP fits the criteria of an Exterior Gateway Protocol, making it the correct answer in this context.

    Rate this question:

  • 43. 

    Dynamic routing automatically calculates the best path between how many nodes?

    • 2

    • 3

    • 4

    • 5

    Correct Answer
    A. 2
    Explanation
    Dynamic routing automatically calculates the best path between two nodes. It analyzes the network topology, traffic conditions, and other factors to determine the most efficient route for data transmission. By dynamically adjusting the routing tables, dynamic routing protocols ensure that data is sent through the optimal path, improving network efficiency and reliability.

    Rate this question:

  • 44. 

    What encryption device is certified to secure all classification levels and categories and is able to encrypt trunk-level high-speed circuits? 

    • TSEC/KIV-7

    • TSEC/KIV-7HS

    • TSEC/KIV-7HSA

    • TSEC/KIV-19

    Correct Answer
    A. TSEC/KIV-19
    Explanation
    The TSEC/KIV-19 encryption device is certified to secure all classification levels and categories and is capable of encrypting trunk-level high-speed circuits.

    Rate this question:

  • 45. 

    What encryption device is capable of loading up to 500 keys?

    • AN/CYZ-10 /DTD

    • AN/CYZ-20 /DTD

    • Secure DTD1000 System

    • Secure DTD 2000 system

    Correct Answer
    A. AN/CYZ-10 /DTD
    Explanation
    The AN/CYZ-10 /DTD encryption device is capable of loading up to 500 keys.

    Rate this question:

  • 46. 

    The main function of the Data Service Unit is to

    • Provide buffering and data flow control

    • Manage timing errors and signal regeneration

    • Provide the proper electrical termination for the transmission line

    • Adapt the digital data stream produced by the customer equipment to the signaling standards of the telephone carrier equipment

    Correct Answer
    A. Adapt the digital data stream produced by the customer equipment to the signaling standards of the telephone carrier equipment
    Explanation
    The Data Service Unit (DSU) is responsible for adapting the digital data stream produced by the customer equipment to the signaling standards of the telephone carrier equipment. This means that the DSU converts the digital data into a format that can be understood and transmitted by the telephone carrier equipment. It ensures compatibility between the customer's equipment and the carrier's equipment, allowing for seamless communication between the two.

    Rate this question:

  • 47. 

    The path between the operating system and virtually all hardware not on the computer's motherboard goes through a special program called a

    • Director

    • Deliver

    • Driver

    • Sender

    Correct Answer
    A. Driver
    Explanation
    A driver is a special program that acts as a bridge between the operating system and hardware devices that are not located on the computer's motherboard. It allows the operating system to communicate and interact with these external hardware devices, enabling them to function properly. Without a driver, the operating system would not be able to control or access the hardware, making it essential for the proper functioning of the computer system.

    Rate this question:

  • 48. 

    Which system provides support for features such as Windows System Resource Manager and Metadirectory Services?

    • AERO

    • Enterprise Edition

    • Standard Edition

    • Datacenter Edition

    Correct Answer
    A. Enterprise Edition
    Explanation
    Enterprise Edition is the correct answer because it provides support for features such as Windows System Resource Manager and Metadirectory Services. These features are specifically designed to manage system resources and directory services in a large-scale enterprise environment. AERO, Standard Edition, and Datacenter Edition do not provide the same level of support for these features.

    Rate this question:

  • 49. 

    While you are using the Red Switch, what feature lets yo uknow that you have dialed the correct number at the proper level of security?

    • Recorded Voice Message

    • Punched computer cards

    • Liquid crystal display

    • Punched paper tape

    Correct Answer
    A. Liquid crystal display
    Explanation
    The liquid crystal display (LCD) is a feature that lets you know that you have dialed the correct number at the proper level of security while using the Red Switch. The LCD provides a visual representation of the dialed number and ensures that the correct number has been entered. It is a reliable and efficient way to confirm the accuracy of the dialed number and the level of security being accessed.

    Rate this question:

Quiz Review Timeline (Updated): Mar 19, 2023 +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 19, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Feb 04, 2015
    Quiz Created by
    Youdontlovecdc
Back to Top Back to top
Advertisement
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.