Cyber Support Journeyman Vol 2

17 Questions | Total Attempts: 117

SettingsSettingsSettings
Please wait...
Cyber Quizzes & Trivia

3DXXX


Related Topics
Questions and Answers
  • 1. 
    What layer of the Open System Interconnect model defines the electrical, mechanical, procedural, and functional specifications for links between communication network systems?
    • A. 

      Physical

    • B. 

      Data Link

    • C. 

      Network

    • D. 

      Transport

  • 2. 
    The computing part of the computer is the central processing unit, also called the
    • A. 

      Control unit

    • B. 

      Minicomputer

    • C. 

      Microprocessor

    • D. 

      Arithmetic logic unit

  • 3. 
    What are two main componets make up the central processing unit?
    • A. 

      Control unit and read-only memory

    • B. 

      Control unit and arithmetic logic unit

    • C. 

      Arithmetic logic unit and read-only memory

    • D. 

      Arithmetic logic unit and random access memory

  • 4. 
    What is the type of memory that retains data after power is removed or lost?
    • A. 

      Volatile

    • B. 

      Nonvolatile

    • C. 

      Secured

    • D. 

      Unsecured

  • 5. 
    Which landline transmission medium is the primary carier of voice communications?
    • A. 

      Twisted pair cable

    • B. 

      Fiber optic cable

    • C. 

      Coaxial Cable

    • D. 

      Twinax cable

  • 6. 
    An optical communications system is comprised of a
    • A. 

      Transmitter, cable and receiver

    • B. 

      Transmitter, cable, and logic analyzer

    • C. 

      Transmitter, transmission medium, and logic analyzer

    • D. 

      Transmitter, transmission medium, and protocol analyzer

  • 7. 
    Which of the following is not one of the three advantages to using wireless technology?
    • A. 

      Ease of installaiton

    • B. 

      Lower cost

    • C. 

      Safety

    • D. 

      Mobility

  • 8. 
    The ability to move about without being tethered by wires in wireless technology is called
    • A. 

      Mobility

    • B. 

      Ease of installations

    • C. 

      War driving

    • D. 

      Motion capture technolgoy

  • 9. 
    Which of the following is not one of the four security threats to Wireless Local Area Network?
    • A. 

      Rogue Access Points

    • B. 

      Direct Connections

    • C. 

      War Drivers

    • D. 

      Hackers

  • 10. 
    Who is an authorized client that may unknowingly or maliciously help outside parites gain access to a network?
    • A. 

      Auditor

    • B. 

      Employee

    • C. 

      War Driver

    • D. 

      Hacker

  • 11. 
    What organization developed several wireless standards to meet  the demands of security, speed, and flexibility of today's wireless networks?
    • A. 

      Institute of Electrical Elctronics Engineers

    • B. 

      International Organization for Standardization

    • C. 

      Internet assigned numbers authority

    • D. 

      National Science Foundation network

  • 12. 
    How many peripherals can a Universal Serial Bus handle at once?
    • A. 

      127

    • B. 

      128

    • C. 

      227

    • D. 

      228

  • 13. 
    How many devices can connect to FireWire bus?
    • A. 

      63

    • B. 

      64

    • C. 

      65

    • D. 

      66

  • 14. 
    What do you apply across Liquid Crystal Display material to change the alignment and light polarizing property>
    • A. 

      Current

    • B. 

      Voltage

    • C. 

      Resistance

    • D. 

      Inductance

  • 15. 
    What is a Data Link layer network device that logically separates a single network into two segments or collision domains in Ethernet networks?
    • A. 

      Hub

    • B. 

      Bridge

    • C. 

      Switch

    • D. 

      Router

  • 16. 
    What rule establishes the percent of data that should be local to a segment and the percentage of data that should be destined to traverse a bridge to the other segment?
    • A. 

      90/10 rule

    • B. 

      80/20 rule

    • C. 

      70/30 rule

    • D. 

      60/40 rule

  • 17. 
    This type of bridge is used to convert one Data Link layer protocol to another
    • A. 

      Cross route

    • B. 

      Transparent

    • C. 

      Translational

    • D. 

      Source route