CDC 3DX5X Vol2 Ure2

Reviewed by Editorial Team
The ProProfs editorial team is comprised of experienced subject matter experts. They've collectively created over 10,000 quizzes and lessons, serving over 100 million users. Our team includes in-house content moderators and subject matter experts, as well as a global network of rigorously trained contributors. All adhere to our comprehensive editorial guidelines, ensuring the delivery of high-quality content.
Learn about Our Editorial Process
| By Jayhuiz23
J
Jayhuiz23
Community Contributor
Quizzes Created: 11 | Total Attempts: 1,312
| Attempts: 57 | Questions: 42
Please wait...
Question 1 / 42
0 %
0/100
Score 0/100
1. (212) What layer of the open system interconnection model do routers operate?

Explanation

Routers operate at Layer 3 of the Open System Interconnection (OSI) model, also known as the network layer. Layer 3 is responsible for logical addressing and routing of data packets across different networks. Routers use IP addresses to determine the best path for forwarding packets from one network to another. By operating at Layer 3, routers can connect multiple networks together and enable communication between devices on different networks.

Submit
Please wait...
About This Quiz
CDC 3DX5X Vol2 Ure2 - Quiz

CDC 3dX5X Vol2 URE2 quiz assesses knowledge on computing, memory types, transmission mediums, and wireless technology. It is designed for Air Force personnel to enhance skills in central... see moreprocessing units, data retention, and communication systems, ensuring readiness and proficiency in technical operations. see less

2. (207) An optical communications system is comprised of a?

Explanation

The correct answer is transmitter, cable, and receiver. In an optical communications system, the transmitter is responsible for converting electrical signals into optical signals, the cable is used to transmit the optical signals, and the receiver is responsible for converting the optical signals back into electrical signals. The logic analyzer and protocol analyzer are not essential components of an optical communications system.

Submit
3. (207) The ability to move about without being tethered by wires in wireless technology is called?

Explanation

The term "mobility" refers to the ability to move freely without being restricted by wires in wireless technology. This includes the ability to use devices such as smartphones, laptops, and tablets without the need for physical connections. It allows for flexibility and convenience in accessing and using wireless networks and devices.

Submit
4. (207) What organization developed several wireless standards to meet the demands of security, speed, and flexibility of today's wireless networks?

Explanation

The Institute of Electrical Electronics Engineers (IEEE) developed several wireless standards to meet the demands of security, speed, and flexibility of today's wireless networks. These standards ensure that wireless networks are reliable, efficient, and secure, allowing for seamless communication and connectivity. The IEEE is a renowned organization in the field of electrical engineering and is responsible for developing various technological standards.

Submit
5. (217) What was the first disk operating system developed to operate on a wide range of computer systems?

Explanation

UNIX was the first disk operating system developed to operate on a wide range of computer systems. It was created in the 1960s at Bell Labs by a group of programmers led by Ken Thompson. UNIX was designed to be portable and flexible, allowing it to run on different hardware architectures. This made it a popular choice for universities, research institutions, and eventually commercial enterprises. Its success and widespread adoption laid the foundation for the development of modern operating systems.

Submit
6. (211) What is the method called when the entire frame is received and placed into the buffer, an error check is performed, and the frame is sent to the proper port for delivery?

Explanation

Store-and-Forward is the method where the entire frame is received and stored in the buffer. It then performs an error check to ensure the integrity of the frame before sending it to the appropriate port for delivery. This method ensures that the frame is error-free before forwarding it, preventing any corrupted or incomplete frames from being sent.

Submit
7. (212) What do routing algorithms initialize and maintain to aid the process of path determination?

Explanation

Routing algorithms initialize and maintain routing tables to aid the process of path determination. Routing tables contain information about the network topology, including the available routes, their associated costs, and the next hop to reach each destination. By consulting the routing table, the algorithm can determine the best path for forwarding packets to their destination based on factors such as shortest or fastest routes. Routing tables are crucial for efficient and accurate routing in computer networks.

Submit
8. (213) What encryption device may you rarely see due to its lower maximum data rate?

Explanation

The TSEC/KIV-7 encryption device may rarely be seen due to its lower maximum data rate. This suggests that the device is not commonly used or encountered because it is not able to handle high data rates efficiently.

Submit
9. (213) The classification of a fill device is

Explanation

When a key is loaded into a fill device, it becomes classified. The classification of the fill device is determined by the classification of the loaded key. This means that the fill device will hold the same classification as the key that has been loaded into it.

Submit
10. (215) What are two anti-virus programs that the Air Force uses?

Explanation

The Air Force uses Norton and McAfee as their two anti-virus programs. These programs are widely recognized and trusted in the cybersecurity industry for their effectiveness in detecting and preventing malware and other threats. By using both Norton and McAfee, the Air Force can ensure comprehensive protection for their systems and networks, reducing the risk of cyber attacks and maintaining the security of their operations.

Submit
11. (207) Which of the following is not one of the three advantages to using wireless technology?

Explanation

Wireless technology offers several advantages, including ease of installation, lower cost, and mobility. However, safety is not one of these advantages. While wireless technology can provide convenience and flexibility, it may also pose certain security risks, such as unauthorized access or data breaches. Therefore, safety is not considered a direct advantage of using wireless technology.

Submit
12. (207) Which of the following is not one the four security threats to Wireless Local Area Network?

Explanation

Direct Connections is not one of the four security threats to Wireless Local Area Network. Rogue Access Points refer to unauthorized access points that are set up by individuals with malicious intent. War Drivers are individuals who drive around with a wireless device to detect and exploit vulnerabilities in wireless networks. Hackers are individuals who attempt to gain unauthorized access to computer systems. However, Direct Connections do not pose a specific security threat to Wireless Local Area Network as they refer to physical connections made between devices, rather than wireless connections.

Submit
13. (215) Applications are software programs designed to perform what type of tasks?

Explanation

Applications are software programs designed to perform specific tasks. Unlike general software programs that have a wide range of functionalities, applications are created with a particular purpose or set of tasks in mind. They are tailored to meet specific needs and provide focused solutions.

Submit
14. (207) What is the type of memory that retains data after power is removed or lost?  

Explanation

Nonvolatile memory is a type of memory that retains data even after power is removed or lost. Unlike volatile memory, which loses its data when power is turned off, nonvolatile memory is designed to store information permanently. This type of memory is commonly used in devices like flash drives, solid-state drives (SSDs), and memory cards, where data needs to be preserved even when the device is not powered.

Submit
15. (207) Who is an authorized client that may unknowingly or maliciously help outside parties gain access to a network?

Explanation

An employee is an authorized client who may unknowingly or maliciously help outside parties gain access to a network. As an authorized user, employees have access to sensitive information and systems within an organization. They may unintentionally compromise network security by falling victim to phishing attacks, using weak passwords, or unknowingly downloading malware. Alternatively, disgruntled or malicious employees may intentionally assist external parties in gaining unauthorized access to the network, either for personal gain or to harm the organization. Therefore, employees pose a significant risk to network security if not properly trained and monitored.

Submit
16. (207) The computing part of the computer is the central processing unit, also called the?

Explanation

The microprocessor is the correct answer because it is the computing part of the computer that houses the central processing unit (CPU). The CPU is responsible for executing instructions and performing calculations in a computer system. The microprocessor is a small chip that contains the control unit, arithmetic logic unit, and other components necessary for processing data. It is often referred to as the "brain" of the computer as it carries out all the necessary computations and operations.

Submit
17. (210) What rule establishes the percent of data that should be local to a segment and the percentage of data that should be destined to traverse a bridge to the other segment?

Explanation

The 80/20 rule establishes that 80% of the data should be local to a segment, meaning it stays within that segment, while 20% of the data should be destined to traverse a bridge to the other segment. This rule helps to determine the optimal distribution of data between segments and ensures efficient communication and data transfer between them.

Submit
18. (210) This type of bridge is used to convert one Data Link layer protocol to another.

Explanation

A translational bridge is used to convert one Data Link layer protocol to another. It acts as a mediator between two different protocols, allowing them to communicate with each other seamlessly. This type of bridge translates the data frames from one protocol into a format that is compatible with the other protocol, enabling data transmission between different networks or devices using different protocols.

Submit
19. (212) Which of these is an example of an Exterior Gateway Protocol?

Explanation

Border Gateway Protocol (BGP) is an example of an Exterior Gateway Protocol (EGP). BGP is used to exchange routing information between different autonomous systems (AS) on the internet. It is responsible for routing packets between different networks and determines the best path for data transmission. BGP is widely used by internet service providers (ISPs) and large organizations to connect their networks and exchange routing information with other networks. Unlike Interior Gateway Protocols (IGPs) like Open Shortest Path First (OSPF) and Routing Information Protocol (RIP), which are used within a single network, BGP is specifically designed for inter-domain routing.

Submit
20. (215) The path between the operating system and virtually all hardware not on the computer's motherboard goes through a special program called a?

Explanation

The correct answer is "driver". A driver is a special program that acts as a bridge between the operating system and hardware devices that are not on the computer's motherboard. It allows the operating system to communicate and control these external hardware devices effectively.

Submit
21. (207) Which landline transmission medium is the primary carrier of voice communications?

Explanation

Twisted pair is the primary carrier of voice communications in landline transmission. Twisted pair refers to a pair of copper wires that are twisted together, which helps to reduce interference and improve signal quality. This type of transmission medium is commonly used for telephone lines and is capable of carrying voice signals effectively over long distances. Fiber optic, coaxial, and twinax cables are also used in landline transmission, but twisted pair is specifically designed for voice communication.

Submit
22. (208) How many peripherals can a Universal Serial Bus handle at once?

Explanation

A Universal Serial Bus (USB) can handle up to 127 peripherals at once. The USB is a widely used interface for connecting various devices to a computer. It uses a tiered star topology, where multiple devices can be connected through hubs. Each hub can support multiple devices, and up to 7 hubs can be connected in a chain. With each hub supporting multiple devices, the total number of peripherals that can be connected to a USB is limited to 127.

Submit
23. (210) What is a Data Link layer network device that logically separates a single network into two segments or collision domains in Ethernet networks?

Explanation

A bridge is a Data Link layer network device that logically separates a single network into two segments or collision domains in Ethernet networks. It operates by examining the destination MAC address of incoming frames and forwarding them only to the appropriate segment, effectively reducing collisions and improving network performance. Unlike a hub, which simply broadcasts all incoming frames to all connected devices, a bridge intelligently filters and forwards frames based on their destination. A switch is a more advanced version of a bridge, providing multiple ports and additional features. A router, on the other hand, operates at the Network layer and is responsible for routing packets between different networks.

Submit
24. (212) Dynamic routing automatically calculates the best path between how many nodes?

Explanation

Dynamic routing automatically calculates the best path between two nodes. It analyzes various factors such as network congestion, link quality, and shortest distance to determine the optimal route for data transmission. By continuously updating and adapting to network changes, dynamic routing protocols ensure efficient and reliable communication between two specific nodes. Therefore, the correct answer is 2.

Submit
25. (214) Analog modems are used over the voice band range of

Explanation

Analog modems are used over the voice band range of 20Hz to 20 KHz. This frequency range is commonly used for transmitting voice signals over telephone lines. Analog modems convert digital data into analog signals that can be transmitted over the voice band range. This range allows for efficient and reliable transmission of data through the telephone network.

Submit
26. (216) One of the Windows Server Editions operating systems provides support for high-end, high traffic applications servers. Which Operating system is it?

Explanation

The correct answer is Datacenter Edition. This edition of Windows Server is specifically designed to provide support for high-end, high-traffic application servers. It offers advanced features and capabilities that are necessary for handling the demands of such servers. The Datacenter Edition is optimized for scalability, reliability, and performance, making it the ideal choice for organizations that require a robust operating system to run their critical applications.

Submit
27. (217) What directory is always identified by the slash symbol (/) and is in the "a" partition?

Explanation

The directory that is always identified by the slash symbol (/) and is in the "a" partition is the root directory. The root directory is the top-level directory in a file system hierarchy and serves as the starting point for navigating the file system. It contains all other directories and files in the system.

Submit
28. (209) What do you apply across Liquid Crystal Display material to change the alignment and light polarizing property?

Explanation

Voltage is applied across Liquid Crystal Display (LCD) material to change its alignment and light polarizing property. The application of voltage causes the liquid crystals to align in a specific direction, which in turn affects the polarization of light passing through the material. By adjusting the voltage, the alignment of liquid crystals can be controlled, resulting in changes in the polarization of light and therefore the appearance of the display.

Submit
29. (211) What forwarding method is also known as runtless switching?

Explanation

Fragment-free forwarding method is also known as runtless switching because it examines the first 64 bytes of a frame to ensure that it is not a runt (a frame smaller than the minimum size). This method helps to prevent collisions and improve network performance by reducing the chances of forwarding corrupt or incomplete frames.

Submit
30. (213) What encryption device is capable of loading up to 500 keys?

Explanation

The AN/CYZ–10 /DTD is the correct answer because it is an encryption device that is capable of loading up to 500 keys. The other options, AN/CYZ–20 /DTD, Secure DTD1000 System, and Secure DTD2000 System, are not mentioned to have the capability of loading up to 500 keys.

Submit
31. (214) The main function of the Data Service Unit is to

Explanation

The Data Service Unit (DSU) is responsible for adapting the digital data stream generated by the customer equipment to the signaling standards of the telephone carrier equipment. This means that the DSU ensures compatibility between the different equipment used by the customer and the telephone carrier. It converts the data stream into a format that can be transmitted over the transmission line, allowing for seamless communication between the customer and the carrier. The other options mentioned, such as buffering and data flow control, managing timing errors and signal regeneration, and providing electrical termination, are not the main functions of the DSU.

Submit
32. (215) Which one is not a category of the operating system's task categories?

Explanation

The correct answer is "Troubleshoot interface." This is not a category of the operating system's task categories. The operating system is responsible for managing various tasks such as user interface, memory management, and processor management. However, troubleshooting is not a specific category of tasks performed by the operating system.

Submit
33. (207) What two main components make up the central processing unit?

Explanation

The central processing unit (CPU) is made up of two main components: the control unit and the arithmetic logic unit (ALU). The control unit is responsible for coordinating and controlling the operations of the CPU, while the ALU performs arithmetic and logical operations, such as addition, subtraction, and comparison. Together, these two components work together to execute instructions and process data within the computer system.

Submit
34. (213) What encryption device is certified to secure all classification levels and categories and is able to encrypt trunk-level high-speed circuits?

Explanation

The TSEC/KIV-19 encryption device is certified to secure all classification levels and categories and is capable of encrypting trunk-level high-speed circuits.

Submit
35. (216) Which system provides support for features such as Windows System Resource Manager and Metadirectory Services?

Explanation

Enterprise Edition is the correct answer because it provides support for features such as Windows System Resource Manager and Metadirectory Services. These features are typically required in larger organizations that need advanced resource management and directory services capabilities. Standard Edition and Datacenter Edition may not have these features or may have limited support for them. AERO is not a relevant system in this context.

Submit
36. (217) What is the name of the standard all-purpose shell most commonly used?

Explanation

The correct answer is Bourne Shell. Bourne Shell is the name of the standard all-purpose shell that is most commonly used. It was developed by Stephen Bourne and is the default shell for Unix-like operating systems. It provides a command-line interface for users to interact with the operating system and execute commands. Bourne Shell is known for its simplicity and compatibility with various Unix systems.

Submit
37. (208) How many devices can connect to a FireWire bus?

Explanation

A FireWire bus can support up to 63 devices. FireWire is a high-speed serial bus interface primarily used for connecting devices such as external hard drives, cameras, and audio interfaces to a computer. The specific number of devices that can be connected is determined by the bus's addressing scheme, which allows for a maximum of 63 unique addresses. Therefore, the correct answer is 63.

Submit
38. (215) The core operating-system function is the management of the computer system which resides with the?

Explanation

The correct answer is "kernel". The kernel is the core operating-system function that manages the computer system. It is responsible for managing memory, processes, and system resources. The kernel acts as a bridge between the hardware and software, allowing applications to interact with the computer's hardware. It also handles tasks such as file management, device drivers, and input/output operations.

Submit
39. (216) Windows operating systems traditionally function in one of two network models. Which model does not operate using centralized user accounts?

Explanation

Windows operating systems traditionally function in one of two network models: workgroup and domain. In a workgroup model, each computer operates independently and does not rely on a centralized user account system. Instead, each computer has its own user accounts and passwords. This means that user accounts need to be created individually on each computer, and there is no central management or control over user accounts. In contrast, in a domain model, user accounts are managed centrally through a domain controller, allowing for easier management and control of user accounts across multiple computers. Active Directory is a service used in the domain model for managing and organizing user accounts and resources.

Submit
40. 217) Which pathnames begin at the current working directory?

Explanation

Relative pathnames begin at the current working directory. Unlike absolute pathnames, which start from the root directory, relative pathnames are specified in relation to the current directory. They provide a shorter and more concise way to navigate through directories and access files within the current working directory.

Submit
41. (214) A modem is a device that modulates

Explanation

A modem is a device that modulates digital data onto an analog carrier for transmission over an analog medium. This means that the modem takes the digital data from a computer or other digital device and converts it into analog signals that can be transmitted over traditional phone lines or other analog communication channels. The analog carrier refers to the medium through which the signals are transmitted, such as telephone lines. This allows for the transmission of digital information over analog networks.

Submit
42. (215) Software is generally divided into

Explanation

This answer is correct because it accurately identifies the three main categories of software: systems software, operating systems software, and applications software. Systems software refers to software that manages and controls the computer hardware, such as operating systems and utility programs. Operating systems software specifically refers to the software that manages and controls the computer's hardware and software resources. Applications software refers to software that is designed for specific tasks or applications, such as word processors, spreadsheets, and graphic design programs. Therefore, the answer correctly identifies all three categories of software.

Submit
View My Results

Quiz Review Timeline (Updated): Jun 18, 2024 +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Jun 18, 2024
    Quiz Edited by
    ProProfs Editorial Team
  • Apr 23, 2013
    Quiz Created by
    Jayhuiz23
Cancel
  • All
    All (42)
  • Unanswered
    Unanswered ()
  • Answered
    Answered ()
(212) What layer of the open system interconnection model do routers...
(207) An optical communications system is comprised of a?
(207) The ability to move about without being tethered by wires in...
(207) What organization developed several wireless standards to meet...
(217) What was the first disk operating system developed to operate on...
(211) What is the method called when the entire frame is received and...
(212) What do routing algorithms initialize and maintain to aid the...
(213) What encryption device may you rarely see due to its lower...
(213) The classification of a fill device is
(215) What are two anti-virus programs that the Air Force uses?
(207) Which of the following is not one of the three advantages to...
(207) Which of the following is not one the four security threats to...
(215) Applications are software programs designed to perform what type...
(207) What is the type of memory that retains data after power is...
(207) Who is an authorized client that may unknowingly or maliciously...
(207) The computing part of the computer is the central processing...
(210) What rule establishes the percent of data that should be local...
(210) This type of bridge is used to convert one Data Link layer...
(212) Which of these is an example of an Exterior Gateway Protocol?
(215) The path between the operating system and virtually all hardware...
(207) Which landline transmission medium is the primary carrier of...
(208) How many peripherals can a Universal Serial Bus handle at once?
(210) What is a Data Link layer network device that logically...
(212) Dynamic routing automatically calculates the best path between...
(214) Analog modems are used over the voice band range of
(216) One of the Windows Server Editions operating systems provides...
(217) What directory is always identified by the slash symbol (/) and...
(209) What do you apply across Liquid Crystal Display material to...
(211) What forwarding method is also known as runtless switching?
(213) What encryption device is capable of loading up to 500 keys?
(214) The main function of the Data Service Unit is to
(215) Which one is not a category of the operating system's task...
(207) What two main components make up the central processing unit?
(213) What encryption device is certified to secure all classification...
(216) Which system provides support for features such as Windows...
(217) What is the name of the standard all-purpose shell most commonly...
(208) How many devices can connect to a FireWire bus?
(215) The core operating-system function is the management of the...
(216) Windows operating systems traditionally function in one of two...
217) Which pathnames begin at the current working directory?
(214) A modem is a device that modulates
(215) Software is generally divided into
Alert!

Advertisement