CDC 3D151 Comprehensive Review

100 Questions

Settings
Please wait...
3D151 Quizzes & Trivia

This is a comprehensive review of the 3D151 Client Systems Journeyman CDCs (3D151 01 1105, Edit Code 01). Answers are verified 100% correct from CDCs. This test encompasses all URE questions from all three volumes. In this test 100 out of the 286 possible questions will be displayed in random order along with the answers in random order, with only one being correct. Minimum passing score for this test is 65%, just like the EOC. Good Luck.


Questions and Answers
  • 1. 
    What entails how we communicate and manage data?
    • A. 

      Information systems.

    • B. 

      Satellite systems.

    • C. 

      Airfield systems.

    • D. 

      Power systems.

  • 2. 
    What part of client systems includes the the physical aspect of computers, telecommunications, and other devices, to include the interconnect devices?
    • A. 

      Programs.

    • B. 

      Processes.

    • C. 

      Hardware.

    • D. 

      Paperwork.

  • 3. 
    What devices are mostly small, lightweight, and designed for mobile use?
    • A. 

      Software.

    • B. 

      Hardware.

    • C. 

      Computers.

    • D. 

      Handhelds.

  • 4. 
    Any hardware added to a computer that expands its capabilities is referred to as a/an
    • A. 

      Port.

    • B. 

      Peripheral.

    • C. 

      Interface.

    • D. 

      I/O device.

  • 5. 
    Which of the following is not one of the three types of interfaces?
    • A. 

      Graphical.

    • B. 

      Hardware.

    • C. 

      Software.

    • D. 

      User.

  • 6. 
    The transfer of eight bits of data simultaneously through eight separate lines in a single cable is a function of a
    • A. 

      Serial port.

    • B. 

      Parallel port.

    • C. 

      Switching port.

    • D. 

      Universal serial bus port.

  • 7. 
    What program translates commands between a device and the programs that use the device?
    • A. 

      Operating system.

    • B. 

      Memory.

    • C. 

      Driver.

    • D. 

      Port.

  • 8. 
    The term used to refer to the process of launching the OS is the
    • A. 

      Boot.

    • B. 

      Random access memory.

    • C. 

      Basic Input/Output System.

    • D. 

      Complimentary Metal-Oxide Semiconductor.

  • 9. 
    What program sets up the divisions of memory that hold the operating system, user information and applications?
    • A. 

      The Memory.

    • B. 

      The bootstrap loader.

    • C. 

      BIOS.

    • D. 

      CMOS.

  • 10. 
    What describes how a computer finds a specific byte it is looking for in memory?
    • A. 

      Processing.

    • B. 

      Programming.

    • C. 

      Memory addressing.

    • D. 

      Memory segmenting.

  • 11. 
    How many bits long are the addresses that computer instructions work with?
    • A. 

      8.

    • B. 

      16.

    • C. 

      24.

    • D. 

      32.

  • 12. 
    Which type of memory stores configuration information, and is used by the BIOS during system boot up?
    • A. 

      Complementary metal-oxide semiconductor memory.

    • B. 

      Programmable read only memory.

    • C. 

      Random access memory.

    • D. 

      Read only memory.

  • 13. 
    What type of memory is nonvolatile, considered permanent, and is also called firmware in reference to the data and instructions stored?
    • A. 

      RAM.

    • B. 

      ROM.

    • C. 

      Cache.

    • D. 

      CMOS.

  • 14. 
    This type of memory is blank and instructions can be placed on permanently.
    • A. 

      ROM.

    • B. 

      RAM.

    • C. 

      CMOS.

    • D. 

      PROM.

  • 15. 
    Which type of memory is used to duplicate frequently used information stored elsewhere or computer earlier, because the original data is time consuming to retrieve or to compute?
    • A. 

      RAM.

    • B. 

      ROM.

    • C. 

      Buffer.

    • D. 

      Cache.

  • 16. 
    Which term describes that data is whole or complete?
    • A. 

      Driver.

    • B. 

      Parity bit.

    • C. 

      Data integrity.

    • D. 

      Error correction.

  • 17. 
    Which is a very simple example of an error detecting code?
    • A. 

      Parity bit.

    • B. 

      Interrupt.

    • C. 

      Data integrity.

    • D. 

      Asynchronous.

  • 18. 
    What data integrity method is used in high-end personal computers and file servers?
    • A. 

      Parity.

    • B. 

      Polling.

    • C. 

      Nonparity.

    • D. 

      Error correction code memory.

  • 19. 
    Reading and storing a document on a hard disk or some other storage medium for processing at a more convenient time is called
    • A. 

      A driver.

    • B. 

      Spooling.

    • C. 

      An interrupt.

    • D. 

      A print queue.

  • 20. 
    A spooled print job be several times larger than the printed document size because of the
    • A. 

      Printer's language.

    • B. 

      Driver's language.

    • C. 

      Processor's language.

    • D. 

      Print server's language.

  • 21. 
    A static internet protocol address on a network printer during hardware configuration is used for
    • A. 

      Print job queuing.

    • B. 

      Print job locating.

    • C. 

      Print job spooling.

    • D. 

      Operating system configuration.

  • 22. 
    Printer hardware configuration via the web is done through
    • A. 

      Hypertext transfer protocol.

    • B. 

      Printer front panel controls.

    • C. 

      Hewlett Packard Jetadmin.

    • D. 

      Telnet.

  • 23. 
    What type of printer software configuration option requries a new port to be created?
    • A. 

      Telnet.

    • B. 

      Local printer.

    • C. 

      Driver printing.

    • D. 

      TCP/IP printing.

  • 24. 
    Which of these is not a prominent characteristic of an operating system?
    • A. 

      The operational environment.

    • B. 

      The way it processes.

    • C. 

      The user interface.

    • D. 

      Multitasking.

  • 25. 
    Which of the below is not a type of computer user interface?
    • A. 

      Application driven interface.

    • B. 

      Command driven interface.

    • C. 

      Graphical user interface.

    • D. 

      Menu driven interface.

  • 26. 
    Which hardware requirement is defined as the model and the clock speed of the CPU?
    • A. 

      Memory.

    • B. 

      Peripherals.

    • C. 

      Architecture.

    • D. 

      Processing power.

  • 27. 
    What should be done before anything else, once the operating system installation is complete?
    • A. 

      A reboot.

    • B. 

      Install drivers.

    • C. 

      Set a password.

    • D. 

      Install antivirus.

  • 28. 
    The specifications that should be met, if not exceeded, to ensure a computer is compatible as well as powerful enough to run an operating system without constant problems is for the computer to have the minimum
    • A. 

      Software.

    • B. 

      Hardware.

    • C. 

      Processors.

    • D. 

      Applications.

  • 29. 
    What are minor software updates or improvements called?
    • A. 

      Bundles.

    • B. 

      Patches.

    • C. 

      Databases.

    • D. 

      Processors.

  • 30. 
    What is the simplest and most efficient way to duplicate a computer's software, with no loss of files or configurations within the programs?
    • A. 

      WinZip.

    • B. 

      Norton Utilities.

    • C. 

      Bundled software.

    • D. 

      Imaging software.

  • 31. 
    How may byte sectors is a hard disk divided into?
    • A. 

      124.

    • B. 

      248.

    • C. 

      512.

    • D. 

      1024.

  • 32. 
    The first sector at the beginning of a hard drive is called the master
    • A. 

      Volume.

    • B. 

      Cylinder.

    • C. 

      Partition.

    • D. 

      Boot record.

  • 33. 
    A formatted disk partition that  is used for a particular file system is called
    • A. 

      Dynamic storage.

    • B. 

      Basic storage.

    • C. 

      A volume.

    • D. 

      A sector.

  • 34. 
    Which file system is the best choice for data storage if the server is a dedicated Windows server?
    • A. 

      NTFS.

    • B. 

      FATS.

    • C. 

      Neiter FATS nor NTFS.

    • D. 

      Either FATS or NTFS.

  • 35. 
    What physical structure component is a collection of Internet Protocol subnet ranges?
    • A. 

      Site.

    • B. 

      Namespace.

    • C. 

      Global catalog.

    • D. 

      Domain controller.

  • 36. 
    By default, the first domain controller in active direcotry services is a
    • A. 

      Forest.

    • B. 

      Namespace.

    • C. 

      Global catalog.

    • D. 

      Globally unique identifier.

  • 37. 
    Which of these is a disadvantage of client-server networks?
    • A. 

      A high level of security can be implemented at the server.

    • B. 

      Users are relieved of the burden of managing resources.

    • C. 

      Managing servers requires a dedicated staff.

    • D. 

      More powerful resources can be shared.

  • 38. 
    What type of remote network provides a private tunnel through public cloud (the Internet)?
    • A. 

      Virtual private network.

    • B. 

      Peer to peer.

    • C. 

      Broadband.

    • D. 

      Three tier.

  • 39. 
    What form of remote network access is often the only choice for rural or remote areas?
    • A. 

      Dial-up.

    • B. 

      Wireless.

    • C. 

      Broadband.

    • D. 

      Virtual private network.

  • 40. 
    What does Wi-Fi use to carry network signals to the network access point?
    • A. 

      Cable lines.

    • B. 

      Radio waves.

    • C. 

      Dedicated lines.

    • D. 

      Telephone lines.

  • 41. 
    What item below is not found in the Active Directory structure?
    • A. 

      Domains.

    • B. 

      Objects.

    • C. 

      Forests.

    • D. 

      Wi-Fi.

  • 42. 
    What is configured to provide or deny users access to service on a local computer on on the local network/domain?
    • A. 

      Profile.

    • B. 

      Domain.

    • C. 

      Account.

    • D. 

      Directory.

  • 43. 
    User accounts are uniquely identified by the
    • A. 

      ACL.

    • B. 

      SID.

    • C. 

      Permissions.

    • D. 

      Rights.

  • 44. 
    Groups in active directory are directory
    • A. 

      Trees.

    • B. 

      Units.

    • C. 

      Forests.

    • D. 

      Objects.

  • 45. 
    Members of this group have full control of the server or individual workstations and can assign user rights and access control permissions.
    • A. 

      Domain group accounts.

    • B. 

      Domain user accounts.

    • C. 

      Local Administarators.

    • D. 

      Local user.

  • 46. 
    Which item resides on a domain controller and provides access to network resources throughout the domain?
    • A. 

      Local groups.

    • B. 

      Domain groups.

    • C. 

      Local user accounts.

    • D. 

      Domain user accounts.

  • 47. 
    What is used to organize different types of accounts into manageable units?
    • A. 

      An object.

    • B. 

      An ACL.

    • C. 

      A group.

    • D. 

      A SID.

  • 48. 
    What is installed on a computer to act as the interface between the computer and network?
    • A. 

      NIC.

    • B. 

      Ethernet.

    • C. 

      Transceiver.

    • D. 

      Coaxial cable.

  • 49. 
    What is the unique identification number a network interface card (NIC) provides to a personal computer?
    • A. 

      MAC address.

    • B. 

      IEEE address.

    • C. 

      OUI address.

    • D. 

      SAS address.

  • 50. 
    How many connector interfaces does a network interface card (NIC) provide for network cables?
    • A. 

      One.

    • B. 

      Two.

    • C. 

      Three.

    • D. 

      Four.

  • 51. 
    What software activates the actual transmission and receipt of data over the network?
    • A. 

      Network interface card connector interfaces.

    • B. 

      Network interface drivers.

    • C. 

      Media Access Control.

    • D. 

      Open data interfaces.

  • 52. 
    Which information is not required when configuring Transmission Control Protocol/Internet Protocol (TCP/IP)?
    • A. 

      Domain name system server address.

    • B. 

      Media Access Control address.

    • C. 

      Internet protocol address.

    • D. 

      Administrator access.

  • 53. 
    What stores print jobs in a print queue until a printer becomes avalible?
    • A. 

      Print pool.

    • B. 

      Print farm.

    • C. 

      Print server.

    • D. 

      Distributive print.

  • 54. 
    Which is not a transmission medium for a wireless local area network?
    • A. 

      Microwaves.

    • B. 

      Fiber optics.

    • C. 

      Radio.

    • D. 

      Light.

  • 55. 
    On a network, what system manages network resources, allows other resources to be shared across the network, and provides the security necessary in a multi-user environment?
    • A. 

      NOS.

    • B. 

      NIC.

    • C. 

      Client.

    • D. 

      Server.

  • 56. 
    In a network environment, what may be responsible for all or some of the network operational tasks?
    • A. 

      Client.

    • B. 

      Server.

    • C. 

      Peripherals.

    • D. 

      Workstation.

  • 57. 
    What are the two major way to implement a client server network?
    • A. 

      First/last.

    • B. 

      High/low.

    • C. 

      Thick/thin.

    • D. 

      Client/workstation.

  • 58. 
    What access control uses segregation of duties and security screening for users?
    • A. 

      Administrative.

    • B. 

      Technical.

    • C. 

      Physical.

    • D. 

      Local.

  • 59. 
    The Public Key Infrastructure component that would be necessary if the private key of a key holder was comprised is referred to as the certificate
    • A. 

      Registration.

    • B. 

      Revocation.

    • C. 

      Authority.

    • D. 

      Key.

  • 60. 
    What is an electronic credit card-like device the established you credentials when doing business or other transactions on the Internet?
    • A. 

      Public key infrastructure client.

    • B. 

      Certificate authority key.

    • C. 

      Authentication key.

    • D. 

      Digital certificate.

  • 61. 
    How does a router send information to the internet on a wireless network?
    • A. 

      An Ethernet connection.

    • B. 

      Radio waves.

    • C. 

      An antenna.

    • D. 

      Wi-Fi.

  • 62. 
    What device receives information from the internet and translates it into radio signal and send it to the computer's wireless adapter?
    • A. 

      Network interface card.

    • B. 

      Ethernet.

    • C. 

      Router.

    • D. 

      Wi-Fi.

  • 63. 
    What piece of equiptment is a the core of most Wi-Fi networks?
    • A. 

      Client.

    • B. 

      Router.

    • C. 

      Network interface card.

    • D. 

      Intrusion detection system.

  • 64. 
    If the security feature is enabled on a wireless network, access points or routers perform additional checks, helping prevent network break-ins.
    • A. 

      Encryption.

    • B. 

      SSID.

    • C. 

      DHCP.

    • D. 

      MAC address filtering.

  • 65. 
    What drives faster processing speed and increases the power of may computers and communication devices?
    • A. 

      Microtechnology.

    • B. 

      Nanotechnology.

    • C. 

      Gigatechnology.

    • D. 

      Biotechnology.

  • 66. 
    How much power does a NAND drive requrie?
    • A. 

      Less than 4 watts.

    • B. 

      Less than 3 watts.

    • C. 

      Less than 2 watts.

    • D. 

      Less than 1 watt.

  • 67. 
    What technology involves the capture and storage of a distinctive, measurable characteristic, feature, or trait of an individual for later recognition by automated means?
    • A. 

      Microtechnology.

    • B. 

      Nanotechnology.

    • C. 

      Biometrics.

    • D. 

      Protocols.

  • 68. 
    Which is not a valid form of identity management?
    • A. 

      Iris.

    • B. 

      Hair.

    • C. 

      Palm.

    • D. 

      Voice.

  • 69. 
    What protocol provides an almost unlimited number of Internet Protocol addresses?
    • A. 

      TCP/IP.

    • B. 

      VIP.

    • C. 

      IPv6.

    • D. 

      IPv4.

  • 70. 
    Which is not a basic function of antivirus programs?
    • A. 

      Removal.

    • B. 

      Scanning.

    • C. 

      Detection.

    • D. 

      Vaccination.

  • 71. 
    Who centrally manages the Air Force server updates that keep you workstation antivirus software current?
    • A. 

      Enterprise Information Technology Service Desk.

    • B. 

      Air Force Network Operations Center.

    • C. 

      Workgroups.

    • D. 

      Clients.

  • 72. 
    Which patch will prevent exploitation and remove or mitigate a threat's capability to exploit a specific vulnerability in an asset, and is the primary method of fixing vulnerabilities in software?
    • A. 

      Security patch.

    • B. 

      Software patch.

    • C. 

      Prevention patch.

    • D. 

      Antivirus patch.

  • 73. 
    What item is a means by which Windows products are updated and kept current.?
    • A. 

      Security patches.

    • B. 

      Software packs.

    • C. 

      Security pack.

    • D. 

      Software fixes.

  • 74. 
    Which Air Force Instruction governs software use?
    • A. 

      33-110.

    • B. 

      33-112.

    • C. 

      33-114.

    • D. 

      33-116.

  • 75. 
    With a software license agreement, who has the full rights to the software and its further distribution and reproduction?
    • A. 

      Buyer.

    • B. 

      Publisher.

    • C. 

      US Air Force.

    • D. 

      US government.

  • 76. 
    What is an essential tool for any Client Systems Technician to find software approved for use on an AF network?
    • A. 

      Certification.

    • B. 

      Enterprise license.

    • C. 

      Enterprise Software Agreement.

    • D. 

      Evaluated/Approved Product List.

  • 77. 
    What is one of the best habits a Client Systems Technician can form in order to save time, effort and prevent mistakes?
    • A. 

      Working fast.

    • B. 

      Minimizing tools.

    • C. 

      Getting organized.

    • D. 

      Remembering everything.

  • 78. 
    Which logical troubleshooting step would include classifying the problem as hardware or software related?
    • A. 

      Isolate the problem.

    • B. 

      Define the problem.

    • C. 

      Reslove the problem.

    • D. 

      Confirm the resolution.

  • 79. 
    The most common hardware diagnostic tool is the
    • A. 

      Basic input/output system card.

    • B. 

      Power-on self test.

    • C. 

      Loopback plug.

    • D. 

      Patch panel.

  • 80. 
    In network troubleshooting, any event that has a negative effect on the service of the network is referred to as a
    • A. 

      Vulnerability.

    • B. 

      Problem.

    • C. 

      Fault.

    • D. 

      Bug.

  • 81. 
    The action that involves localization and identification of irregularities that cause a fault ot be registered is referred to as fault
    • A. 

      Diagnosis.

    • B. 

      Detection.

    • C. 

      Correction.

    • D. 

      Documentation.

  • 82. 
    Which item is not a good practice in helping with future troubleshooting?
    • A. 

      Remembering every step taken.

    • B. 

      Knowing your network.

    • C. 

      Documentation.

    • D. 

      Gathering facts.

  • 83. 
    Within how many bytes of a transmission should a network interface card sense a collision?
    • A. 

      16 bytes.

    • B. 

      32 bytes.

    • C. 

      64 bytes.

    • D. 

      128 bytes.

  • 84. 
    What function enables the higher layer protocol data units to fit into the lower layer PDU for transmission across the network?
    • A. 

      Frame relays.

    • B. 

      Fragmentation.

    • C. 

      Round trip delay.

    • D. 

      Asynchronous transfer mode.

  • 85. 
    Which is not a way in which round trip delay can be determined?
    • A. 

      Maximum delay.

    • B. 

      Minimum delay.

    • C. 

      Average delay.

    • D. 

      Total delay.

  • 86. 
    Which alarm category in the network management system indicates a warning?
    • A. 

      Red.

    • B. 

      Blue.

    • C. 

      Cyan.

    • D. 

      Orange.

  • 87. 
    Which type of network is oftem call the GigE network?
    • A. 

      1000 BaseT.

    • B. 

      1000 BaseG.

    • C. 

      10/100 BaseT.

    • D. 

      10/100 BaseG.

  • 88. 
    What percentage of all network problems occur at the data link and physical layers of the open systems interconnect reference model?
    • A. 

      15 percent.

    • B. 

      30 percent.

    • C. 

      45 percent.

    • D. 

      60 percent.

  • 89. 
    What piece of test equiptment can help verify connectivity and identify shorts, reversed, crossed or split pairs on a network?
    • A. 

      Time domain reflectometer.

    • B. 

      Wide-area network tester.

    • C. 

      Local-area network tester.

    • D. 

      Signal generator.

  • 90. 
    What tool can launch individual troubleshooting/configuration programs and other utilities having to do with network, video display, printers, sound, and email configuration on an operating system?
    • A. 

      Control Panel.

    • B. 

      Event Viewer.

    • C. 

      Device Manager.

    • D. 

      Disk Management.

  • 91. 
    Use which tool to list all installed device drivers and their status, find hardware components that are not functioning properly or two devices that are in conflict on an operating system (OS)?
    • A. 

      Event Viewer.

    • B. 

      Control Panel.

    • C. 

      Device Manager.

    • D. 

      Network Connections.

  • 92. 
    This operating system tool allows the viewing of the number of sent packets, status, total connection time, and speed of a network.
    • A. 

      Network Connections.

    • B. 

      Device Manager.

    • C. 

      Control Panel.

    • D. 

      Event Viewer.

  • 93. 
    Which fault isolation technique may entail checking the cable connections as well as re-seating devices and checking all switches and settings for devices?
    • A. 

      Check physical connections.

    • B. 

      Check hardware devices.

    • C. 

      Software check.

    • D. 

      Memory check.

  • 94. 
    When troubleshooting after a system failure, this step is a last resort effort when all other avenues have been exhausted. 
    • A. 

      Reboot the system.

    • B. 

      Reinstall application programs.

    • C. 

      Remove and replace the operating system.

    • D. 

      Remove and replace the CD/DVD-ROM drive.

  • 95. 
    This practice uses tapes, electronic vaulting, or mirrored disks and should be done regularly.
    • A. 

      Reconfiguration.

    • B. 

      Programming.

    • C. 

      Data backup.

    • D. 

      Reloading.

  • 96. 
    Which media has a storage capacity of a gigabyte (GB) - terabyte (TB), has a slow to moderate speed and is moderately expensive?
    • A. 

      Tape.

    • B. 

      Network.

    • C. 

      CD-ROM.

    • D. 

      DVD-ROM.

  • 97. 
    Which backup type does not clear archive flags once the backup job is complete?
    • A. 

      Full.

    • B. 

      Daily.

    • C. 

      Incremental.

    • D. 

      Differential.

  • 98. 
    Which cleaning process overwrites all addressable locations with binary zeros, then binary ones, and overwrites all addressable locations with any character on sealed disk drives, hard disks, and drives?
    • A. 

      Destroying.

    • B. 

      Sanitizing.

    • C. 

      Clearing.

    • D. 

      Erasing.

  • 99. 
    Which item is not an optical storage media?
    • A. 

      CD ROM.

    • B. 

      Core optical disk.

    • C. 

      Worm optical disk.

    • D. 

      Erasable optical disk.

  • 100. 
    This is an authorized method of cleaning and sanitizing many types of magnetic media.
    • A. 

      Erasing.

    • B. 

      Clearing.

    • C. 

      Wipeinfo.

    • D. 

      Overwrite.