CDC 3DX5X Vol2 Ure2

42 Questions | Total Attempts: 36

SettingsSettingsSettings
Please wait...
3DX5X Quizzes & Trivia

Please use a study aid only.


Questions and Answers
  • 1. 
    (207) The computing part of the computer is the central processing unit, also called the?
    • A. 

      Control unit

    • B. 

      Minicomputer

    • C. 

      Microprocessor

    • D. 

      Arithmetic logic unit

  • 2. 
    (207) What two main components make up the central processing unit?
    • A. 

      Control unit and read-only memory.

    • B. 

      Control unit and arithmetic logic unit.

    • C. 

      Arithmetic logic unit and read-only memory.

    • D. 

      Arithmetic logic unit and random access memory.

  • 3. 
    (207) What is the type of memory that retains data after power is removed or lost?  
    • A. 

      Volatile

    • B. 

      Nonvolatile

    • C. 

      Secured

    • D. 

      Unsecured

  • 4. 
    (207) Which landline transmission medium is the primary carrier of voice communications?
    • A. 

      Twisted pair

    • B. 

      Fiber optic

    • C. 

      Coaxial

    • D. 

      Twinax

  • 5. 
    (207) An optical communications system is comprised of a?
    • A. 

      Transmitter, cable, and receiver.

    • B. 

      Transmitter, cable, and logic analyzer.

    • C. 

      Transmitter, transmission medium, and logic analyzer.

    • D. 

      Transmitter, transmission medium, and protocol analyzer.

  • 6. 
    (207) Which of the following is not one of the three advantages to using wireless technology?
    • A. 

      Ease of installation

    • B. 

      Lower cost

    • C. 

      Safety

    • D. 

      Mobility

  • 7. 
    (207) The ability to move about without being tethered by wires in wireless technology is called?
    • A. 

      Mobility

    • B. 

      Ease of installations

    • C. 

      War driving

    • D. 

      Motion capture technology

  • 8. 
    (207) Which of the following is not one the four security threats to Wireless Local Area Network?
    • A. 

      Rogue Access Points

    • B. 

      Direct Connections

    • C. 

      War Drivers

    • D. 

      Hackers

  • 9. 
    (207) Who is an authorized client that may unknowingly or maliciously help outside parties gain access to a network?
    • A. 

      Auditor

    • B. 

      Employee

    • C. 

      War Driver

    • D. 

      Hacker

  • 10. 
    (207) What organization developed several wireless standards to meet the demands of security, speed, and flexibility of today’s wireless networks?
    • A. 

      Institute of Electrical Electronics Engineers.

    • B. 

      International Organization for Standardization.

    • C. 

      Internet assigned numbers authority.

    • D. 

      National Science Foundation network.

  • 11. 
    (208) How many peripherals can a Universal Serial Bus handle at once?
    • A. 

      127

    • B. 

      128

    • C. 

      227

    • D. 

      228

  • 12. 
    (208) How many devices can connect to a FireWire bus?
    • A. 

      63

    • B. 

      64

    • C. 

      65

    • D. 

      66

  • 13. 
    (209) What do you apply across Liquid Crystal Display material to change the alignment and light polarizing property?
    • A. 

      Current

    • B. 

      Voltage

    • C. 

      Resistance

    • D. 

      Inductance

  • 14. 
    (210) What is a Data Link layer network device that logically separates a single network into two segments or collision domains in Ethernet networks?
    • A. 

      Hub

    • B. 

      Bridge

    • C. 

      Switch

    • D. 

      Router

  • 15. 
    (210) What rule establishes the percent of data that should be local to a segment and the percentage of data that should be destined to traverse a bridge to the other segment?
    • A. 

      90/10 rule

    • B. 

      80/20 rule

    • C. 

      70/30 rule

    • D. 

      60/40 rule

  • 16. 
    (210) This type of bridge is used to convert one Data Link layer protocol to another.
    • A. 

      Cross route

    • B. 

      Transparent

    • C. 

      Translational

    • D. 

      Source route

  • 17. 
    (211) What is the method called when the entire frame is received and placed into the buffer, an error check is performed, and the frame is sent to the proper port for delivery?
    • A. 

      Store-and-Forward

    • B. 

      Cross-over

    • C. 

      Fragment-Free

    • D. 

      Adaptive

  • 18. 
    (211) What forwarding method is also known as runtless switching?
    • A. 

      Store-and-forward

    • B. 

      Cut-through

    • C. 

      Fragment-free

    • D. 

      Adaptive

  • 19. 
    (212) What layer of the open system interconnection model do routers operate?
    • A. 

      Layer 2

    • B. 

      Layer 3

    • C. 

      Layer 4

    • D. 

      Layer 5

  • 20. 
    (212) What do routing algorithms initialize and maintain to aid the process of path determination?
    • A. 

      Routing times

    • B. 

      Routing tables

    • C. 

      Longest routes

    • D. 

      Shortest routes

  • 21. 
    (212) Which of these is an example of an Exterior Gateway Protocol?
    • A. 

      Open shortest path first

    • B. 

      Border Gateway Protocol

    • C. 

      Routing Information Protocol

    • D. 

      Enhanced Gateway Routing Protocol

  • 22. 
    (212) Dynamic routing automatically calculates the best path between how many nodes?
    • A. 

      2

    • B. 

      3

    • C. 

      4

    • D. 

      5

  • 23. 
    (213) What encryption device may you rarely see due to its lower maximum data rate?
    • A. 

      TSEC/KIV-7

    • B. 

      TSEC/KIV-19

    • C. 

      TSEC/KG-84

    • D. 

      TSEC/KG-194

  • 24. 
    (213) What encryption device is certified to secure all classification levels and categories and is able to encrypt trunk-level high-speed circuits?
    • A. 

      TSEC/KIV-7

    • B. 

      TSEC/KIV-7HS

    • C. 

      TSEC/KIV-7HSA

    • D. 

      TSEC/KIV-19

  • 25. 
    (213) What encryption device is capable of loading up to 500 keys?
    • A. 

      AN/CYZ–10 /DTD.

    • B. 

      AN/CYZ–20 /DTD.

    • C. 

      Secure DTD1000 System.

    • D. 

      Secure DTD2000 System.

Back to Top Back to top