CDC 3DX5X (Edit Code 02) Volume 2, Unit 2

Reviewed by Editorial Team
The ProProfs editorial team is comprised of experienced subject matter experts. They've collectively created over 10,000 quizzes and lessons, serving over 100 million users. Our team includes in-house content moderators and subject matter experts, as well as a global network of rigorously trained contributors. All adhere to our comprehensive editorial guidelines, ensuring the delivery of high-quality content.
Learn about Our Editorial Process
| By David
D
David
Community Contributor
Quizzes Created: 8 | Total Attempts: 744
| Attempts: 113 | Questions: 39
Please wait...
Question 1 / 39
0 %
0/100
Score 0/100
1. (215) What device optically reads an image, printed text, or an object and converts it to a digital image?

Explanation

A scanner is a device that optically reads an image, printed text, or an object and converts it to a digital image. It uses a light source and a photosensitive element to capture the image and then converts it into a digital format that can be stored, manipulated, and displayed on a computer. Unlike a printer, which produces physical copies of digital images, a scanner takes physical copies and converts them into digital files. A monitor and camera lens are not devices specifically designed for converting physical images to digital format.

Submit
Please wait...
About This Quiz
CDC 3DX5X (Edit Code 02) Volume 2, Unit 2 - Quiz

This quiz, titled 'CDC 3DX5X (Edit Code 02) Volume 2, Unit 2', assesses knowledge on the OSI Model, focusing on functions of its layers, sub-layers like LLC and... see moreMAC, and network topologies. It's essential for learners aiming to understand network structures and data communication protocols. see less

2. (216) Which network provides a private tunnel through the Internet?

Explanation

A virtual private network (VPN) provides a private tunnel through the Internet. It allows users to securely connect to a remote network over the Internet by encrypting their data and routing it through a virtual tunnel. This ensures that the data remains private and protected from unauthorized access. VPNs are commonly used by individuals and organizations to access resources on a private network remotely while maintaining the security and privacy of their data.

Submit
3. (224) What characteristic is not an advantage of fiber optic cable?

Explanation

The characteristic of "Cost to install and train technicians" is not an advantage of fiber optic cable. Fiber optic cable installation and technician training can be expensive compared to other types of cables. However, fiber optic cables have other advantages such as electromagnetic immunity, low attenuation, and security.

Submit
4. (207) The logical link control (LLC) sub layer is a part of which Open Systems Interconnection (OSI) model layer?

Explanation

The logical link control (LLC) sub layer is a part of the Data Link layer in the OSI model. The Data Link layer is responsible for providing reliable and error-free transmission of data between adjacent network nodes. The LLC sub layer specifically handles flow control, error control, and framing of data packets. It ensures that data is properly encapsulated and delivered to the correct destination.

Submit
5. (208) What network topology is another name for a bus topology?

Explanation

Linear is another name for a bus topology. In a bus topology, all devices are connected to a single cable called the bus. The devices share the same communication medium and can transmit data in both directions. The linear topology refers to the physical arrangement of devices in a straight line along the bus. This topology is commonly used in Ethernet networks and is known for its simplicity and ease of installation.

Submit
6. (216) Which network is a group of computers and associated devices that share a common communications line and typically share the resources of a single processor or server within a small geographic area?

Explanation

A local area network (LAN) is a network of computers and devices that are connected together within a small geographic area, such as a home, office, or building. In a LAN, the computers and devices are connected to a common communications line, allowing them to share resources such as files, printers, and internet access. LANs are typically used in small-scale settings where the distance between devices is relatively short. Examples of LANs include home networks, office networks, and school networks.

Submit
7. (216) Which network uses Carrier Sense Multiple Access/ Collision Avoidance (CSMA/CA) to avoid collisions while transmitting data?

Explanation

Wireless local area network (WLAN) uses Carrier Sense Multiple Access/Collision Avoidance (CSMA/CA) to avoid collisions while transmitting data. CSMA/CA is a protocol used in wireless networks where devices listen to the wireless medium before transmitting data. If the medium is busy, the device waits for a random amount of time before attempting to transmit again, thus reducing the chances of collisions. This method is necessary in wireless networks where multiple devices share the same wireless channel and collisions can occur if multiple devices transmit at the same time.

Submit
8. (208) What negative effect could occur when star networks are interconnected?

Explanation

When star networks are interconnected, the central node acts as a hub for all the connected devices. If the central node fails, it will result in large portions of the network becoming isolated. This means that communication between those isolated portions and the rest of the network will be disrupted. Therefore, the negative effect of interconnecting star networks is that a failure in the central node can cause significant network isolation and communication breakdown.

Submit
9. (211) What portion of the Internet Protocol (IP) Data-gram (packet) allows IP to detect data-grams with corrupted headers and discard them?

Explanation

The correct answer is "Header Checksum". The Header Checksum portion in the IP Datagram allows IP to detect data-grams with corrupted headers and discard them. The Header Checksum is a 16-bit field that contains a checksum value calculated over the IP header. When a data-gram is received, the receiver recalculates the checksum and compares it with the value in the Header Checksum field. If the values do not match, it indicates that the header has been corrupted during transmission, and the data-gram is discarded to maintain data integrity.

Submit
10. (209) Which governing body is the authority for information technology (IT) communications within the Department of Defense (DOD) and every level of IT communication from the DOD information network to the war fighter under their scope of control?

Explanation

The Defense Information System Agency (DISA) is the correct answer because it is the governing body responsible for information technology (IT) communications within the Department of Defense (DOD). DISA oversees every level of IT communication from the DOD information network to the war fighter under their scope of control. DISA ensures the secure and reliable operation of the DOD's IT infrastructure and provides IT services and capabilities to support the DOD's mission.

Submit
11. (223) What type of encryption provides the greatest degree of protection since the information fully encodes all the way through the network to the users' own end terminals?

Explanation

End-to-end encryption provides the greatest degree of protection since it fully encodes the information from the network to the users' own end terminals. This means that the data is encrypted at the source and remains encrypted until it reaches the intended recipient, preventing any unauthorized access or interception along the way. This type of encryption ensures that only the sender and the recipient have access to the decrypted data, providing a high level of security and privacy.

Submit
12. (207) What layers make up the two categories of the seven layer of the Open Systems Interconnection (OSI) reference model.

Explanation

The correct answer is Data Transport and Application. The OSI reference model consists of seven layers: Physical, Data Link, Network, Transport, Session, Presentation, and Application. The Data Transport layer is responsible for reliable and efficient data transfer between network devices, while the Application layer provides services for user applications to access the network.

Submit
13. (219) Which device works as a transceiver that converts the electrical signal utilized in copper unshielded twisted pair (UTP) network cabling to light waves used for fiber optic cabling?

Explanation

A media converter is a device that converts the electrical signal used in copper unshielded twisted pair (UTP) network cabling to light waves used for fiber optic cabling. It allows for the seamless integration of different types of network media, such as copper and fiber, by converting the signals between them. This enables the transmission of data over longer distances and at higher speeds, making it an essential component in network infrastructure where copper and fiber optic cables are used together. A modem, switch, and router are all different types of networking devices that serve different purposes and do not perform the specific function of converting signals between copper and fiber optic cables.

Submit
14. (215) What is a peripheral device?

Explanation

A peripheral device is not a main component of a computer and can be either internal or external. This means that it is not essential for the basic functioning of a computer, but rather serves as an additional device that enhances the computer's capabilities. Peripheral devices can include items such as printers, scanners, keyboards, and mice, which can be connected to the computer either internally or externally to perform specific tasks.

Submit
15. (225) What UNIX system software interacts most closely with the hardware?

Explanation

The kernel is the UNIX system software that interacts most closely with the hardware. It is the core component of the operating system that manages the system's resources, such as memory, processes, and input/output devices. The kernel provides an interface between the hardware and the user programs, allowing them to access and utilize the system's resources efficiently. The shell, user programs, and dynamic-link library are all important components of the UNIX system, but they do not directly interact with the hardware like the kernel does.

Submit
16. (226) What Microsoft application is a software program that allows users to create a desktop database?

Explanation

Access is a Microsoft application that allows users to create a desktop database. It provides a user-friendly interface for designing and managing databases, enabling users to store, organize, and manipulate data efficiently. With Access, users can create tables, forms, queries, and reports to meet their specific database needs. It is widely used for small to medium-sized projects and is particularly popular among businesses and organizations for managing and analyzing data effectively.

Submit
17. (207) What functions do the seven layers of the Open Systems Interconnection (OSI) reference model specify?

Explanation

The seven layers of the Open Systems Interconnection (OSI) reference model specify different functions related to networking. The Network layer specifically deals with the routing and forwarding of data packets between different networks. It is responsible for establishing connections, addressing, and controlling the flow of data. This layer ensures that data is properly delivered from the source to the destination across multiple networks.

Submit
18. (217) What year did the Institue of Electrical and Electronics Engineers (IEEE) ratifies the use of gigabit Ethernet (GbE)?

Explanation

In 1999, the Institute of Electrical and Electronics Engineers (IEEE) ratified the use of gigabit Ethernet (GbE). This means that in 1999, the IEEE officially approved and standardized the use of GbE, which allowed for faster data transmission speeds over Ethernet networks.

Submit
19. (208) What topology offers centralized management of a network?

Explanation

The star topology offers centralized management of a network. In a star topology, all devices are connected to a central hub or switch, which acts as a central point of control and management for the network. This allows for easier monitoring, troubleshooting, and administration of the network, as all communication flows through the central hub. Additionally, if one device fails in a star topology, it does not affect the rest of the network, making it a reliable and manageable option for network management.

Submit
20. (226) What Microsoft application is a personal information manager?

Explanation

Outlook is a personal information manager developed by Microsoft. It is commonly used as an email client, but it also includes features such as a calendar, task manager, contact manager, and note-taking. Outlook allows users to organize and manage their personal information in one place, making it an effective tool for managing emails, appointments, tasks, and contacts.

Submit
21. (211) What class is reserved for multicast addressing?

Explanation

Class D address is reserved for multicast addressing. In IP addressing, multicast is a method of sending data packets to a group of devices simultaneously. Class D addresses range from 224.0.0.0 to 239.255.255.255 and are used for multicast group communication. These addresses are not assigned to specific devices but are used to identify a group of devices that are interested in receiving the multicast data.

Submit
22. (218) How many T1 Defense Switched Network (DSN) access circuits do Standardized Tactical Entry Point (STEP) terminals offer?

Explanation

Standardized Tactical Entry Point (STEP) terminals offer 7 T1 Defense Switched Network (DSN) access circuits.

Submit
23. (208) When used alone, the word "topology" often refers to a networks

Explanation

The word "topology" typically refers to the physical arrangement or structure of a network. This includes the layout of devices, cables, and connections in a network. It does not refer to the transport topology, which is related to how data is routed and delivered in a network. It also does not refer to the physical medium, which is the actual material used for data transmission. Finally, it does not refer to the logical topology, which describes how devices are logically connected in a network. Therefore, the correct answer is physical topology.

Submit
24. (216) Which network is a network that links local area networks (LAN) and Metropolitan area networks (MAN) by using long-distance communication links leased or purchased from a telecommunications company?

Explanation

A wide area network (WAN) is a network that connects local area networks (LAN) and metropolitan area networks (MAN) by using long-distance communication links leased or purchased from a telecommunications company. Unlike LANs and MANs, which cover smaller geographical areas, WANs cover larger areas and allow for the transmission of data over longer distances. This makes WANs suitable for connecting remote locations and facilitating communication between different LANs and MANs. Therefore, the correct answer is wide area network (WAN).

Submit
25. (207) What does the logical link control (LLC) sub layer of the data link layer manage?

Explanation

The logical link control (LLC) sub layer of the data link layer manages communications between devices over a single link of a network. This sub layer is responsible for error control, flow control, and framing of data packets. It ensures that data is properly transmitted and received between devices connected by a single link, providing a reliable and efficient communication channel.

Submit
26. (216) Which wireless local area network (WLAN) security method is best described as hiding a message in a service code?

Explanation

Encryption is the best described method for hiding a message in a service code. Encryption involves the process of converting plaintext into ciphertext, making it unreadable to anyone without the proper decryption key. By encrypting the message, it becomes hidden within the service code and can only be accessed by authorized individuals with the correct decryption key. This method ensures the security and confidentiality of the message being transmitted over the wireless local area network (WLAN).

Submit
27. (214) What speed is the maximum data transfer rate of USB 3.0 SuperSpeed (SS) transfer mode?

Explanation

The correct answer is Five GB/S. USB 3.0 SuperSpeed transfer mode has a maximum data transfer rate of 5 gigabits per second (GB/S). This means that it can transfer data at a speed of 5 billion bits per second, which is significantly faster than the previous USB 2.0 standard. This high speed allows for faster file transfers and improved performance when using USB 3.0 devices.

Submit
28. (221) What network routing protocols allow multiple autonomous systems to connect together?

Explanation

Exterior Gateway Protocol (EGP) is a network routing protocol that allows multiple autonomous systems to connect together. It is specifically designed for interconnecting different autonomous systems and exchanging routing information between them. EGP enables the exchange of routing information and the determination of the best path for data to travel between different autonomous systems, ensuring efficient and reliable communication across interconnected networks.

Submit
29. (211) Which classes allow for a maximum of 254 hosts per network?

Explanation

Class C addresses allow for a maximum of 254 hosts per network. In IPv4, the address space is divided into different classes based on the number of network and host bits. Class C addresses have a default subnet mask of 255.255.255.0, which means that there are 24 network bits and 8 host bits. With 8 host bits, we can have 2^8 - 2 = 254 usable host addresses per network. Class A and Class B addresses have more network bits and fewer host bits, resulting in larger networks but fewer available host addresses. Class D addresses are used for multicast and do not have a specific number of hosts per network.

Submit
30. (212) What range of numbers are those of well known port numbers?

Explanation

Well known port numbers range from 0 to 1023. These are the port numbers that are commonly used by well-known protocols such as HTTP (port 80), FTP (port 21), and SSH (port 22). These port numbers are reserved for specific services and are often used by popular applications and protocols.

Submit
31. (210) What is a Transmission Control Protocol (TCP) socket?

Explanation

A TCP socket is a combination of a port number and an IP address that is used by a process to request network services and is passed as an argument between layers. This means that when a process wants to communicate over a network, it uses a TCP socket to specify which port and IP address it wants to communicate with. The TCP socket acts as a unique identifier for the process and allows it to establish a connection and exchange data with another process on a different machine.

Submit
32. (207) What does the media access control (MAC) sub layer of the data link layer manage?

Explanation

The media access control (MAC) sub layer of the data link layer manages the protocol access to the physical network medium. This means that it governs how devices on a network access and use the physical medium, such as Ethernet cables or wireless frequencies, to send and receive data. The MAC sub layer ensures that devices take turns accessing the medium to avoid collisions and manage the flow of data.

Submit
33. (210) What action is the purpose of a slide window in Transmission Control Protocol (TCP)?

Explanation

A slide window in Transmission Control Protocol (TCP) is used to regulate the amount of information that can pass over a TCP connection before the receiving host must send an acknowledgement. This helps in controlling the flow of data and prevents network congestion by ensuring that transmitting devices do not overwhelm receiving devices with data.

Submit
34. (213) What action is the main purpose of system cache?

Explanation

The main purpose of system cache is to reduce central processing unit (CPU) access time to stored data. System cache stores frequently accessed data and instructions from the main memory, allowing the CPU to quickly retrieve this data without having to access the slower main memory. This helps to improve overall system performance by reducing the time it takes for the CPU to access the data it needs.

Submit
35. (213) What characteristic is the major difference between Random Access Memory (RAM) and Read Only Memory (ROM)?

Explanation

The major difference between Random Access Memory (RAM) and Read Only Memory (ROM) is that ROM is non-volatile, meaning that the data stored in ROM is retained even when the power is turned off. On the other hand, RAM is volatile, meaning that the data stored in RAM is lost when the power is turned off.

Submit
36. (211) What value is the maximum of an octet in Internet Protocol version 4 (IPv4)?

Explanation

In Internet Protocol version 4 (IPv4), an octet is a group of 8 bits. Each bit can have a value of either 0 or 1, giving a total of 256 possible combinations (2^8). However, since the values range from 0 to 255, the maximum value for an octet in IPv4 is 255.

Submit
37. (220) Describe a network bridge

Explanation

A network bridge is a Data Link layer network device or software set that logically separates a single network into multiple segments or collision domains in Ethernet networks. It allows for the division of a network into smaller parts, reducing network congestion and improving overall performance. By separating segments, a bridge prevents collisions and allows for better communication between devices within each segment. This helps to improve network efficiency and maintain data integrity.

Submit
38. (222) What network device provides a remote network with connectivity to a host network?

Explanation

A gateway is a network device that provides connectivity between different networks. It acts as an entry and exit point for data packets traveling between a remote network and a host network. It translates protocols, manages data flow, and ensures seamless communication between the two networks. Therefore, a gateway is the correct answer as it enables connectivity between a remote network and a host network.

Submit
39. (225) In general, how many operating system task categories are there?

Explanation

There are generally six operating system task categories.

Submit
View My Results

Quiz Review Timeline (Updated): Mar 15, 2024 +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 15, 2024
    Quiz Edited by
    ProProfs Editorial Team
  • Nov 09, 2016
    Quiz Created by
    David
Cancel
  • All
    All (39)
  • Unanswered
    Unanswered ()
  • Answered
    Answered ()
(215) What device optically reads an image, printed text, or an object...
(216) Which network provides a private tunnel through the Internet?
(224) What characteristic is not an advantage of fiber optic cable?
(207) The logical link control (LLC) sub layer is a part of which Open...
(208) What network topology is another name for a bus topology?
(216) Which network is a group of computers and associated devices...
(216) Which network uses Carrier Sense Multiple Access/ Collision...
(208) What negative effect could occur when star networks are...
(211) What portion of the Internet Protocol (IP) Data-gram (packet)...
(209) Which governing body is the authority for information technology...
(223) What type of encryption provides the greatest degree of...
(207) What layers make up the two categories of the seven layer of the...
(219) Which device works as a transceiver that converts the electrical...
(215) What is a peripheral device?
(225) What UNIX system software interacts most closely with the...
(226) What Microsoft application is a software program that allows...
(207) What functions do the seven layers of the Open Systems...
(217) What year did the Institue of Electrical and Electronics...
(208) What topology offers centralized management of a network?
(226) What Microsoft application is a personal information manager?
(211) What class is reserved for multicast addressing?
(218) How many T1 Defense Switched Network (DSN) access circuits do...
(208) When used alone, the word "topology" often refers to a...
(216) Which network is a network that links local area networks (LAN)...
(207) What does the logical link control (LLC) sub layer of the data...
(216) Which wireless local area network (WLAN) security method is best...
(214) What speed is the maximum data transfer rate of USB 3.0...
(221) What network routing protocols allow multiple autonomous systems...
(211) Which classes allow for a maximum of 254 hosts per network?
(212) What range of numbers are those of well known port numbers?
(210) What is a Transmission Control Protocol (TCP) socket?
(207) What does the media access control (MAC) sub layer of the data...
(210) What action is the purpose of a slide window in Transmission...
(213) What action is the main purpose of system cache?
(213) What characteristic is the major difference between Random...
(211) What value is the maximum of an octet in Internet Protocol...
(220) Describe a network bridge
(222) What network device provides a remote network with connectivity...
(225) In general, how many operating system task categories are there?
Alert!

Advertisement