Quiz About Air Force

124 Questions | Attempts: 85
Share
Please wait...
Question 1 / 124
0 %
0/100
Score 0/100
1. What Air Force instruction series covers communications and information?
Submit
Please wait...
About This Quiz
Air Force Quizzes & Trivia

23456789abcdefghijklmnopqrstuvwxyz

Personalize your quiz and earn a certificate with your name on it!
2. What Air Force publication establishes policy on how C4 systems are acquired, operated, and maintained?
Submit
3. What Air Force publication identifies responsibilities for supporting critical Air Force communications and information networks, primarily through network control centers?
Submit
4. What Air Force publication provides the policy and procedures for certifying network professionals who manage and operate government-provided information systems on Air Force networks?
Submit
5. What organization does communication and information services entering and exiting the base or site fall under the operational control of?
Submit
6. What function within the Network Control Center provides technical assistance to the unit functional system administrators and workgroup managers?
Submit
7. Whose network area of responsibility starts at the user's terminal and ends at the server, but does not include the network backbone infrastructure components?
Submit
8. What Air Force Instruction sets the policies that unit client support administrators must comply with?
Submit
9. What Network Control Center function responds to detected security incidents, network faults (errors), and user reported outages at the time of help desk referral?
Submit
10. What Network Control Center function is the central point of contact for network distribution and maintenance/update of an Air Force Computer Emergency Response Team and automated systems security and antivirus software?
Submit
11. Performance management can be broken into which two separate functional categories?
Submit
12. To determine the level of network service provided to the users, you will make a measurement of the total response time
Submit
13. What Network Control Center function increases network reliability by giving the network manager tools to detect problems and initiate recovery procedures?
Submit
14. What does Network Security work to ensure about a network?
Submit
15. Which of the following are jobs performed by a help desk technician on a daily basis?
Submit
16. Within the Network Control Center, what function is initially responsible for taking trouble calls, deciding what type of problem has occurred, and what to do about the problem?
Submit
17. What is one of the most important communications skills you can develop as a help desk operator?
Submit
18. What software is used to open trouble tickets for customer trouble calls?
Submit
19. What is a set of subnetsthat are connected with routers?
Submit
20. What is a set of systems/nodes on a local segment that can be off a switch or a router?
Submit
21. What type of network environments consist of computer systems from different vendors that run different operating systems and communication protocols?
Submit
22. What type of network is made up of components from the same vendor or compatible equipment that all run under the same operating system or network operating system?
Submit
23. What type of communications network serves users within a confined geographical area?
Submit
24. What type of communications network links geographically dispersed offices in other cities or around the globe?
Submit
25. How many users are in a peer-to-peer network?
Submit
26. How many users are in a single-server network?
Submit
27. How many users are in a multi-server high-speed backbone network?
Submit
28. In most cases, the frequencies used by wireless networks are in what frequency band?
Submit
29. What is the distorting and/or weakening of a signal as it traverses the media called?
Submit
30. What is a measurement of data transferred through the medium between network connections?
Submit
31. What is a form of communication that transmits information as a serial stream of bits or bytes?
Submit
32. Which of the following categories of twisted-pair cable has the highest throughput?
Submit
33. A fiber optic network uses a laser or light-emitting diode to send a signal through what portion of the cable?
Submit
34. Light signals in fibe optic cables can travel distances in excess of how many miles before they need to be boosted?
Submit
35. What type of optic fiber is used to span extremely long distances?
Submit
36. What type of optic fiber is designed for the local area network environment and light is typically generated with a light emitting diode?
Submit
37. What are the principal advantages of fiber optics with present day transmission technology?
Submit
38. What network topology consists of a single central cable to which all computers and other devices connect?
Submit
39. What is the greatest risk to a bus network?
Submit
40. On what network topology, can multiple transmit frames can co-exist?
Submit
41. What is the major Department of Defense contribution to networking?
Submit
42. What is a set of rules that define how communications are to take place in a network, including the format, timing, sequences, and error checking and correction?
Submit
43. What layer of the Open Systems Interconnection reference model is really a set of rules regarding the hardware used to transmit data?
Submit
44. What layer of the Open Systems Interconnection reference model provides the grammar by which machines converse with each other and serves as a vehicle for information transmission?
Submit
45. What layer of the Open Systems Interconnection reference model prevents a fast computer from overwhelming a slow terminal?
Submit
46. A feature which involves the periodic insertion of points into data from which any recovery necessary can be started is known as what?
Submit
47. Which layer of the Open Systems Interconnections model is concerned with network security, file transfers, and formatting functions?
Submit
48. The IEEE 802.3 standard describes a local area network using what kind of topology?
Submit
49. What protocol is used by the IEEE 802.3 standard to avoid collisions on the network?
Submit
50. What does a station specifically send when it sends a general request through the network asking any station to respond to receive the token?
Submit
51. The IEEE 802.5 standard was developed to cover what local area network topology?
Submit
52. Why can a token ring network cover a greater distance than a token bus network without loss of signal?
Submit
53. What X series protocol is a Message Handling System (MHS) standard, that defines the structure of a store-and-forward e-mail message handling system?
Submit
54. This question was taken out.
Submit
55. Which protocol of Transmission Control Protocol/Internet Protocol provides a connectionless datagram "network access" layer?
Submit
56. Which protocol of Transmission Control Protocol/Internet Protocol is a connection oriented, reliable, host-to-host transport protocol?
Submit
57. What makes it possible for implementers to produce new Network File System systems without having to reconstruct their own system's internal data representation formats to suit Network File System?
Submit
58. As information passes down through the protocol layers, what is the packet that is formed called?
Submit
59. What is the only layer in the Open Systems Interconnection reference model that simply transmits the completed frame?
Submit
60. What layer in the Open Systems Interconnection reference model adds a trailer to the packet?
Submit
61. In the Ethernet environment, what is the minimum number of octets in a frame so it can be sent and received?
Submit
62. What is used to identify network nodes on a physically connected network?
Submit
63. What is the binary equivalent to the dotted decimal number 96?
Submit
64. How many octets is the standard Internet Protocol broken down into?
Submit
65. What communications device converts binary electrical signals into acoustic signals for transmission over telephone lines?
Submit
66. What communications device is used for converting analog signals to digital for transmission on digital lines?
Submit
67. What Network Interface Card module drives the signal onto and from the physical medium?
Submit
68. What Network Interface Card module converts information into a coded data stream?
Submit
69. What Network Interface Card module temporarily holds data for processing to or from the network?
Submit
70. What network component serves as a central connecting point and is used to extend the physical media by repeating the signal it receives in one port out to all the other ports indiscriminately?
Submit
71. What type of hub has special capabilites for configurations and or management?
Submit
72. What network condition usually begins slowly and (if not stopped) gradually grows in severity until all traffic flow on the network is effectively stopped?
Submit
73. What is a group of devices connected to the same physical media such that if two devices access the media at the same time, the result is a collision of the two signals?
Submit
74. The purpose of a network repeater is that is?
Submit
75. What is a local area network connection device with two or more ports that forwards frames from one LAN segment to another?
Submit
76. What are the four basic functions of a bridge?
Submit
77. Bridging loops are created when
Submit
78. What is used to logically eliminate loops within a network?
Submit
79. The bridge in a network with the highest priority (the lowest number) is called the
Submit
80. Switching conducted at the layer 2 category is based soley upon what information?
Submit
81. Switching conducted at the layer 3 category is based  upon what information?
Submit
82. What type of switch is limited in its applications to small workgroups where throughput is an issue but where potential network errors will not upset the network?
Submit
83. What type of switch reads the first 64 bytes before forwarding the frame?
Submit
84. What is the technology called that allows Network Interface Card (NIC) to determine the type of Ethernet signal transmitted by a device at the other end and adjust its speed to the highest common speed between the two devices?
Submit
85. What is a logical grouping of end stations, independent of physical location, with a common set of requirements called?
Submit
86. What is the most common method of defining Virtual local area network membership?
Submit
87. At what level of the Open Systems Interconnection models does a router work?
Submit
88. What is the primary device used for connecting these networks, both within and between networks?
Submit
89. The function performed by a router to move information from one router to another according to decided path determinations is
Submit
90. What type of routing is the establishment of routes by the network administrator that changes only when done manually?
Submit
91. What type of routing involves the use of routing protocols that adjust real-time to changing network circumstances?
Submit
92. In what Dynamic Routing protocl must packets go the complete distance before discovering the destination is unreachable?
Submit
93. What routing metric is generally based upon the bit-error rate of the link?
Submit
94. What prevents a router from sending route information back to the router from which it came?
Submit
95. What acts as a translator between two workstaions or networks that use different operating systems, communication protocols, and data format structures?
Submit
96. Where is the backup copy of the Cisco Internet Operating System configuration information stored in the internetworking device?
Submit
97. What are the network connections through which network traffic enters and exits a router called?
Submit
98. What prompt is displayed when in the User Exec mode on a router?
Submit
99. What prompt is displayed when in the Privileged Exec mode on a router?
Submit
100. From what level can all other command modes be accessed?
Submit
101. From what mode is the banner motd command used in?
Submit
102. What command is used to restrict access to the Privileged Exec mode?
Submit
103. What command interface configuration command is used to activate an interface?
Submit
104. To view the current configuration of a router, what command is used from privileged exec mode?
Submit
105. What command is used to change the bootup values within ROM monitor mode?
Submit
106. What filters network traffic by controlling whether routed packets are forwarded or blocked at a router's interface?
Submit
107. What do all access lists end with?
Submit
108. Router access lists must be applied to
Submit
109. What does a standard access list use to filter packets?
Submit
110. What is the range of numbers that represent standard access lists?
Submit
111. What of server is set aside to perform a specific task or function all of the time?
Submit
112. What network type normally utilizes non-dedicated servers?
Submit
113. What is required due to the differences between the physical speed of the print device and the processing speed of the workstation generating the print job?
Submit
114. What frees the computer's attention so the user can continue working while waiting for a document to print?
Submit
115. What type of server is a bundle of application software designed to significantly improve network efficiency and productivity?
Submit
116. What two types of environments are network operating systems implemented upon?
Submit
117. Within the Windows environment, what is the central repository for the entire software and hardware configuration settings in a computer running the Windows based NT operating system?
Submit
118. What is a set of keys, subkeys, and values from the registry stored in its own file location called?
Submit
119. Data in which root-key determins which device drivers and services will load during the boot process?
Submit
120. What is a set of statistical measurements made over a period of time that characterizes network performance?
Submit
121. What is a detailed analysis of the performance of a specific application or a specific network element?
Submit
122. What network performance criteria is the most significant statistic to be collected and calculated?
Submit
123. The measurement of traffic volume actually being carried by the network, typically expressed in kilobytes per second is
Submit
124. What type of mask is used within a network that uses the same amount of bits for masking for all subnetworks?
Submit
View My Results

Quiz Review Timeline (Updated): Jun 8, 2016 +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Jun 08, 2016
    Quiz Edited by
    ProProfs Editorial Team
  • Mar 20, 2010
    Quiz Created by
    Joe34654
Cancel
  • All
    All (124)
  • Unanswered
    Unanswered ()
  • Answered
    Answered ()
What Air Force instruction series covers communications and...
What Air Force publication establishes policy on how C4 systems are...
What Air Force publication identifies responsibilities for supporting...
What Air Force publication provides the policy and procedures for...
What organization does communication and information services entering...
What function within the Network Control Center provides technical...
Whose network area of responsibility starts at the user's terminal and...
What Air Force Instruction sets the policies that unit client support...
What Network Control Center function responds to detected security...
What Network Control Center function is the central point of contact...
Performance management can be broken into which two separate...
To determine the level of network service provided to the users, you...
What Network Control Center function increases network reliability by...
What does Network Security work to ensure about a network?
Which of the following are jobs performed by a help desk technician on...
Within the Network Control Center, what function is initially...
What is one of the most important communications skills you can...
What software is used to open trouble tickets for customer trouble...
What is a set of subnetsthat are connected with routers?
What is a set of systems/nodes on a local segment that can be off a...
What type of network environments consist of computer systems from...
What type of network is made up of components from the same vendor or...
What type of communications network serves users within a confined...
What type of communications network links geographically dispersed...
How many users are in a peer-to-peer network?
How many users are in a single-server network?
How many users are in a multi-server high-speed backbone network?
In most cases, the frequencies used by wireless networks are in what...
What is the distorting and/or weakening of a signal as it traverses...
What is a measurement of data transferred through the medium between...
What is a form of communication that transmits information as a serial...
Which of the following categories of twisted-pair cable has the...
A fiber optic network uses a laser or light-emitting diode to send a...
Light signals in fibe optic cables can travel distances in excess of...
What type of optic fiber is used to span extremely long distances?
What type of optic fiber is designed for the local area network...
What are the principal advantages of fiber optics with present day...
What network topology consists of a single central cable to which all...
What is the greatest risk to a bus network?
On what network topology, can multiple transmit frames can co-exist?
What is the major Department of Defense contribution to networking?
What is a set of rules that define how communications are to take...
What layer of the Open Systems Interconnection reference model is...
What layer of the Open Systems Interconnection reference model...
What layer of the Open Systems Interconnection reference model...
A feature which involves the periodic insertion of points into data...
Which layer of the Open Systems Interconnections model is concerned...
The IEEE 802.3 standard describes a local area network using what kind...
What protocol is used by the IEEE 802.3 standard to avoid collisions...
What does a station specifically send when it sends a general request...
The IEEE 802.5 standard was developed to cover what local area network...
Why can a token ring network cover a greater distance than a...
What X series protocol is a Message Handling System (MHS)...
This question was taken out.
Which protocol of Transmission Control Protocol/Internet Protocol...
Which protocol of Transmission Control Protocol/Internet Protocol is...
What makes it possible for implementers to produce new Network File...
As information passes down through the protocol layers, what is the...
What is the only layer in the Open Systems Interconnection reference...
What layer in the Open Systems Interconnection reference model adds a...
In the Ethernet environment, what is the minimum number of octets in a...
What is used to identify network nodes on a physically connected...
What is the binary equivalent to the dotted decimal number 96?
How many octets is the standard Internet Protocol broken down into?
What communications device converts binary electrical signals into...
What communications device is used for converting analog signals to...
What Network Interface Card module drives the signal onto and from the...
What Network Interface Card module converts information into a coded...
What Network Interface Card module temporarily holds data for...
What network component serves as a central connecting point and is...
What type of hub has special capabilites for configurations and or...
What network condition usually begins slowly and (if not stopped)...
What is a group of devices connected to the same physical media such...
The purpose of a network repeater is that is?
What is a local area network connection device with two or more ports...
What are the four basic functions of a bridge?
Bridging loops are created when
What is used to logically eliminate loops within a network?
The bridge in a network with the highest priority (the lowest number)...
Switching conducted at the layer 2 category is based soley upon what...
Switching conducted at the layer 3 category is based  upon...
What type of switch is limited in its applications to small workgroups...
What type of switch reads the first 64 bytes before forwarding the...
What is the technology called that allows Network Interface Card (NIC)...
What is a logical grouping of end stations, independent of physical...
What is the most common method of defining Virtual local area network...
At what level of the Open Systems Interconnection models does a router...
What is the primary device used for connecting these networks, both...
The function performed by a router to move information from one router...
What type of routing is the establishment of routes by the network...
What type of routing involves the use of routing protocols that adjust...
In what Dynamic Routing protocl must packets go the complete distance...
What routing metric is generally based upon the bit-error rate of the...
What prevents a router from sending route information back to the...
What acts as a translator between two workstaions or networks that use...
Where is the backup copy of the Cisco Internet Operating System...
What are the network connections through which network traffic enters...
What prompt is displayed when in the User Exec mode on a router?
What prompt is displayed when in the Privileged Exec mode on a router?
From what level can all other command modes be accessed?
From what mode is the banner motd command used in?
What command is used to restrict access to the Privileged Exec mode?
What command interface configuration command is used to activate an...
To view the current configuration of a router, what command is used...
What command is used to change the bootup values within ROM monitor...
What filters network traffic by controlling whether routed packets are...
What do all access lists end with?
Router access lists must be applied to
What does a standard access list use to filter packets?
What is the range of numbers that represent standard access lists?
What of server is set aside to perform a specific task or function all...
What network type normally utilizes non-dedicated servers?
What is required due to the differences between the physical speed of...
What frees the computer's attention so the user can continue working...
What type of server is a bundle of application software designed to...
What two types of environments are network operating systems...
Within the Windows environment, what is the central repository for the...
What is a set of keys, subkeys, and values from the registry stored in...
Data in which root-key determins which device drivers and...
What is a set of statistical measurements made over a period of time...
What is a detailed analysis of the performance of a specific...
What network performance criteria is the most significant statistic to...
The measurement of traffic volume actually being carried by the...
What type of mask is used within a network that uses the same amount...
Alert!

Advertisement