Z3d152 Volume 2 Quiz

Reviewed by Editorial Team
The ProProfs editorial team is comprised of experienced subject matter experts. They've collectively created over 10,000 quizzes and lessons, serving over 100 million users. Our team includes in-house content moderators and subject matter experts, as well as a global network of rigorously trained contributors. All adhere to our comprehensive editorial guidelines, ensuring the delivery of high-quality content.
Learn about Our Editorial Process
| By Tyler_holzworth
T
Tyler_holzworth
Community Contributor
Quizzes Created: 1 | Total Attempts: 298
| Attempts: 298
SettingsSettings
Please wait...
  • 1/124 Questions

    Which topology has the stations connected in the form of a circle?

    • Bus
    • Ring
    • Star
    • Hybrid
Please wait...
About This Quiz

The Z3D152 Volume 2 Quiz assesses knowledge in data communication, focusing on OSI model layers, video compression standards, and communication protocols. It is designed for learners interested in networking and data communication technologies.

Data Communication Quizzes & Trivia

Quiz Preview

  • 2. 

    Which topology combines two or more different physical topologies in a single network?

    • Bus

    • Ring

    • Star

    • Hybrid

    Correct Answer
    A. Hybrid
    Explanation
    A hybrid topology combines two or more different physical topologies in a single network. This means that it can have a combination of bus, ring, star, or any other topologies. In a hybrid topology, different sections of the network may use different topologies depending on the requirements of that section. This allows for flexibility and scalability in the network design, as different topologies can be used to optimize different parts of the network.

    Rate this question:

  • 3. 

    The three cornerstones of voice network system security are availability,

    • Circumvention, and confidentiality

    • Circumvention, and disclosure

    • Confidentiality, and integrity

    • Disclosure, and integrity

    Correct Answer
    A. Confidentiality, and integrity
    Explanation
    Confidentiality refers to keeping information private and preventing unauthorized access. Integrity refers to ensuring that data is accurate, complete, and unaltered. These two cornerstones are essential for maintaining the security of a voice network system. By ensuring confidentiality, sensitive information such as conversations and user data is protected from unauthorized individuals. Integrity ensures that the data transmitted over the network is not tampered with or modified in any way, ensuring its accuracy and reliability. Together, confidentiality and integrity provide a strong foundation for securing a voice network system.

    Rate this question:

  • 4. 

    Which data communication protocol is based on bits and the position of the bits?

    • Character-oriented

    • Bit-oriented

    • Network

    • Routing

    Correct Answer
    A. Bit-oriented
    Explanation
    Bit-oriented is the correct answer because this data communication protocol is based on bits and the position of the bits. In bit-oriented protocols, the data is transmitted and interpreted bit by bit, with specific bit patterns indicating the start and end of a message. These protocols focus on the individual bits rather than grouping them into characters or packets. This approach allows for more precise control and synchronization in data transmission.

    Rate this question:

  • 5. 

    Internet protocol version 6 (IPv6) addresses are represented by

    • 8 groups of dotted decimal numbers

    • 8 groups of hexadecimal numbers

    • 4 dotted decimal numbers

    • 128 decimal numbers

    Correct Answer
    A. 8 groups of hexadecimal numbers
    Explanation
    IPv6 addresses are represented by 8 groups of hexadecimal numbers. This is because IPv6 uses a 128-bit address space, which is much larger than the 32-bit address space used by IPv4. Hexadecimal notation allows for more compact representation of the large address space, as each group represents 16 bits. Each group is separated by a colon, resulting in a total of 8 groups in an IPv6 address.

    Rate this question:

  • 6. 

    Which topology defines the way in which devices communicate and data is transmitted throughout the network?

    • Physical

    • Logical

    • Hybrid

    • Star

    Correct Answer
    A. Logical
    Explanation
    Logical topology defines the way in which devices communicate and data is transmitted throughout the network. It describes how the network appears to the devices that use it, regardless of the physical layout. Logical topology determines how data flows between devices and how they communicate with each other, regardless of the physical connections. This includes protocols, addressing schemes, and the paths that data takes from one device to another.

    Rate this question:

  • 7. 

    A Management Information Base (MIB) is a collection of information that is organized

    • Alphabetically

    • Hierarchically

    • Numerically

    • Objectively

    Correct Answer
    A. Hierarchically
    Explanation
    A Management Information Base (MIB) is a collection of information that is organized hierarchically. This means that the information is structured in a hierarchical manner, with higher-level categories or groups containing lower-level subcategories or individual objects. This hierarchical organization helps in organizing and managing the information effectively, allowing for easy navigation and retrieval of specific information within the MIB.

    Rate this question:

  • 8. 

    In what type of digital signal does the signal level move to one of the discrete signal levels, but returns to the zero level after a predetermined time?

    • Non-return-to-zero (NRZ) level.

    • NRZ mark.

    • NRZ space.

    • Return-to-zero.

    Correct Answer
    A. Return-to-zero.
    Explanation
    In a return-to-zero (RZ) digital signal, the signal level moves to one of the discrete signal levels (usually a high or low level) and then returns to the zero level after a predetermined time. This means that the signal alternates between the two levels and includes zero level transitions, which helps in clock synchronization and signal recovery. In contrast, non-return-to-zero (NRZ) signals do not return to the zero level during a bit interval.

    Rate this question:

  • 9. 

    Which of the following is an example of a video compression standard?

    • Motion Picture Experts Group-4 (MPEG-4)

    • Joint Photographic Experts Group (JPEG).

    • File Transfer Protocol (FTP)

    • G.711

    Correct Answer
    A. Motion Picture Experts Group-4 (MPEG-4)
    Explanation
    Motion Picture Experts Group-4 (MPEG-4) is an example of a video compression standard. It is a widely used format for video compression and is known for its ability to provide high-quality video while maintaining relatively small file sizes. MPEG-4 allows for efficient compression by using various techniques such as motion compensation, transform coding, and entropy coding. It is commonly used for streaming video over the internet, video conferencing, and multimedia applications.

    Rate this question:

  • 10. 

    In binary-synchronous protocol, which characters establishes and maintains character synchronization prior to the message block and during transmission?

    • SEQ

    • SYN

    • STX

    • EST

    Correct Answer
    A. SYN
    Explanation
    In binary-synchronous protocol, the character "SYN" is used to establish and maintain character synchronization prior to the message block and during transmission. This means that the "SYN" character is responsible for ensuring that the sender and receiver are in sync and can properly interpret the transmitted data. It helps in avoiding any errors or misinterpretations that may occur during transmission.

    Rate this question:

  • 11. 

    Which network layer protocol matches a known Internet protocol (IP) address for a destination device to a Media Access Control (MAC) address?

    • IP

    • Address Resolution Protocol (ARP)

    • Reverse Address Resolution Protocol (RARP)

    • Internet Control Message Protocol (ICMP)

    Correct Answer
    A. Address Resolution Protocol (ARP)
    Explanation
    The correct answer is Address Resolution Protocol (ARP). ARP is a network layer protocol that is used to match a known IP address for a destination device to its corresponding MAC address. This is necessary because IP addresses are used for routing packets across networks, while MAC addresses are used for communication within a local network. ARP allows devices to discover and store the MAC address of a device on the same network, enabling them to communicate directly.

    Rate this question:

  • 12. 

    Which device subdivides a network into smaller logical pieces, or segments?

    • Switch

    • Firewall

    • Gateway

    • Repeater

    Correct Answer
    A. Switch
    Explanation
    A switch is a device that subdivides a network into smaller logical pieces or segments. It operates at the data link layer of the OSI model and uses MAC addresses to forward data packets to the appropriate destination. By creating separate segments, a switch improves network performance and reduces collisions. It allows for efficient communication between devices within the same segment while preventing unnecessary traffic from congesting the entire network. Therefore, a switch is the correct device to subdivide a network into smaller logical pieces.

    Rate this question:

  • 13. 

    The time it takes a switch to figure out where to forward a data unit is called its

    • Lag

    • Hop

    • Latency

    • Time zone

    Correct Answer
    A. Latency
    Explanation
    Latency refers to the time it takes for a switch to determine the appropriate destination for a data unit. It is the delay caused by the switch in processing and forwarding the data. The term "lag" refers to a delay or interruption in data transmission, but it does not specifically relate to the switch's decision-making process. "Hop" refers to the number of devices a data unit passes through before reaching its destination, not the time it takes for the switch to make a forwarding decision. "Time zone" is unrelated to the switch's processing time.

    Rate this question:

  • 14. 

    What is most commonly used in data systems to express signaling speed?

    • Baud rate

    • Interface speed

    • Bits per second

    • Baud Per second

    Correct Answer
    A. Bits per second
    Explanation
    Bits per second is the most commonly used term in data systems to express signaling speed. Baud rate refers to the number of signal changes per second, while interface speed is a more general term. Baud per second is not a recognized term. Therefore, bits per second is the correct answer as it directly represents the number of bits transmitted or received per second in a data system.

    Rate this question:

  • 15. 

    What should security policies encompass to help mitigate the threat of convergence?

    • Data networks only

    • Voice networks only

    • Both voice and data networks

    • Neither voice nor data networks

    Correct Answer
    A. Both voice and data networks
    Explanation
    Security policies should encompass both voice and data networks to help mitigate the threat of convergence. Convergence refers to the integration of different communication technologies, such as voice and data, onto a single network. By including both voice and data networks in security policies, organizations can ensure that measures are in place to protect against potential threats and vulnerabilities that may arise from the convergence of these networks. This can include implementing firewalls, encryption, access controls, and monitoring systems to safeguard against unauthorized access, data breaches, and other security risks.

    Rate this question:

  • 16. 

    In the Open System Interconnect (OSI) model, a layer will communicate with three other OSI layers. Which one is not one of those layers?

    • Layer above

    • Layer below

    • Lowest layer

    • Peer layer

    Correct Answer
    A. Lowest layer
    Explanation
    The OSI model consists of seven layers, each responsible for a specific set of functions. In this context, the "lowest layer" refers to the Physical layer, which is responsible for the actual transmission and reception of data over a physical medium. The other layers mentioned in the question - layer above, layer below, and peer layer - are all valid layers in the OSI model.

    Rate this question:

  • 17. 

    Which Application layer protocol is used to synchronize the clocks of computers on a network?

    • Simple Network Management Protocol (SNMP).

    • Dynamic Host Configuration Protocol (DHCP)

    • Network Time Protocol (NTP)

    • Packet Internet Grouper (PING)

    Correct Answer
    A. Network Time Protocol (NTP)
    Explanation
    Network Time Protocol (NTP) is used to synchronize the clocks of computers on a network. It is designed to keep all the devices on a network in sync by exchanging time information between them. NTP uses a hierarchical structure with primary time servers at the top, which are connected to secondary servers, and so on. This protocol ensures that all devices on the network have accurate and synchronized time, which is crucial for various applications and services that rely on time synchronization, such as authentication, logging, and coordination of distributed systems.

    Rate this question:

  • 18. 

    Which router port is used for initial configuration?

    • Auxiliary

    • Console

    • Ethernet

    • Telnet

    Correct Answer
    A. Console
    Explanation
    The correct answer is Console. The console port on a router is used for the initial configuration. It is a physical port that allows direct access to the router's command-line interface (CLI) through a console cable. This port is typically used for initial setup, troubleshooting, and password recovery. The console port provides a direct, physical connection to the router, allowing administrators to configure the router without the need for network connectivity.

    Rate this question:

  • 19. 

    Virtual Private Networks (VPNs) allow the AF to extend network resources across a/an

    • Department of Defense Network

    • Air Force Network

    • Local area network

    • A public network

    Correct Answer
    A. A public network
    Explanation
    Virtual Private Networks (VPNs) allow the Air Force (AF) to extend network resources across a public network. This means that the AF can securely connect to and access its network resources from any location, even when connected to an untrusted or public network such as the internet. VPNs use encryption and other security measures to ensure that data transmitted over the public network remains private and secure. This allows the AF to maintain the confidentiality and integrity of its network communications while still being able to access resources remotely.

    Rate this question:

  • 20. 

    What allows transportation of all active Virtual LANs (VLAN) between switches using a single physical link?

    • VLAN trunks

    • VLAN frames

    • VLAN links

    • VLAN ports

    Correct Answer
    A. VLAN trunks
    Explanation
    VLAN trunks allow the transportation of all active VLANs between switches using a single physical link. A VLAN trunk is a connection that carries multiple VLANs over a single link, allowing for efficient use of network resources. It enables switches to differentiate between different VLANs by adding a VLAN tag to the Ethernet frame, ensuring that the correct VLAN information is maintained throughout the network. This allows for the consolidation of VLAN traffic onto a single link, simplifying network design and management.

    Rate this question:

  • 21. 

    What identifier differentiates one wireless local area network (WLAN) from another?

    • Hostname

    • Network name

    • Service Set Identifier (SSID)

    • Virtual LAN Identifier (VLAN ID)

    Correct Answer
    A. Service Set Identifier (SSID)
    Explanation
    The Service Set Identifier (SSID) is the correct answer because it is a unique name that differentiates one wireless local area network (WLAN) from another. The SSID is broadcasted by the wireless access point and is used by devices to identify and connect to a specific WLAN. The hostname is a label assigned to a device on a network, the network name is a general term that refers to the name of a network, and the Virtual LAN Identifier (VLAN ID) is used to differentiate between different virtual LANs within a network.

    Rate this question:

  • 22. 

    Which statement best describes a binary with eight-zero substitution (B8ZS) signal?

    • The information is transmitted in three different voltage levels.

    • A logic one is transmitted as positive voltage if the previous logic one was negative.

    • The level always returns to zero for 50 percent of the bit cycle after every transition.

    • Bipolar violations are intentionally inserted into a data signal to break up long strings of zeros.

    Correct Answer
    A. Bipolar violations are intentionally inserted into a data signal to break up long strings of zeros.
    Explanation
    B8ZS is a line coding technique used in telecommunications to ensure the accuracy of data transmission. It intentionally inserts bipolar violations into a data signal to break up long strings of zeros. This is done to prevent synchronization issues and maintain the integrity of the transmitted data. By inserting these violations, the receiver can easily differentiate between consecutive zeros and ensure reliable decoding of the information being transmitted.

    Rate this question:

  • 23. 

    Which agency is the preferred transport provider for Internet and commercial satellite connections used for voice, video and/or data services on DOD networks?

    • Commercial providers.

    • National Security Agency (NSA).

    • Air Force Space Command (AFSPC).

    • Defense Information Systems Agency (DISA).

    Correct Answer
    A. Defense Information Systems Agency (DISA).
    Explanation
    The preferred transport provider for Internet and commercial satellite connections used for voice, video, and/or data services on DOD networks is the Defense Information Systems Agency (DISA). DISA is responsible for providing secure and reliable communication and information systems to support the military's operations. They work closely with commercial providers to ensure that the DOD networks have the necessary connectivity and services. The National Security Agency (NSA) is primarily responsible for intelligence and cybersecurity, while the Air Force Space Command (AFSPC) focuses on space and cyberspace operations.

    Rate this question:

  • 24. 

    What are attempts to gain access to a switch system by posing as an authorized user?

    • Toll fraud

    • War Dialing

    • Masquerades

    • Denial of service

    Correct Answer
    A. Masquerades
    Explanation
    Masquerades refer to attempts to gain access to a switch system by posing as an authorized user. This involves disguising oneself as someone with legitimate access privileges in order to bypass security measures and gain unauthorized entry. It is a form of social engineering where the attacker impersonates an authorized user to deceive the system and gain access to sensitive information or perform malicious activities.

    Rate this question:

  • 25. 

    What type alarm occurs if the sensor post cover in vertical taut-wire sensor (VTWS) is removed?

    • None

    • Tamper

    • Intruder

    • Equipment Fault

    Correct Answer
    A. Tamper
    Explanation
    If the sensor post cover in a vertical taut-wire sensor (VTWS) is removed, it would trigger a tamper alarm. This alarm is designed to alert the system that there has been an unauthorized attempt to tamper with or disable the sensor. Removing the cover of the sensor post would be considered tampering with the equipment, hence the tamper alarm would be activated.

    Rate this question:

  • 26. 

    Which Network layer protocol provides messaging that can help with troubleshooting?

    • Internet Protocol (IP)

    • Address Resolution Protocol (ARP)

    • Reverse Address Resolution Protocol (RARP)

    • Internet Control Message Protocol (ICMP)

    Correct Answer
    A. Internet Control Message Protocol (ICMP)
    Explanation
    ICMP is a network layer protocol that provides messaging for troubleshooting purposes. It is used by network devices to send error messages and operational information, allowing network administrators to identify and resolve issues within the network. ICMP messages include error reporting, network congestion notifications, and network testing tools such as ping. Therefore, ICMP is the correct answer as it facilitates troubleshooting by providing essential information about network connectivity and performance.

    Rate this question:

  • 27. 

    Which Transport layer protocol provides reliable data delivery services?

    • Internet Protocol (IP)

    • User Datagram Protocol (UDP)

    • Transmission Control Protocol (TCP)

    • Internet Control Message Protocol (ICMP)

    Correct Answer
    A. Transmission Control Protocol (TCP)
    Explanation
    Transmission Control Protocol (TCP) is the correct answer because it provides reliable data delivery services. TCP ensures that data is delivered in the correct order and without errors by using acknowledgments, retransmissions, and flow control mechanisms. It establishes a connection between the sender and receiver, breaks the data into packets, and reassembles them at the destination. TCP also implements error detection and correction techniques to ensure reliable delivery of data.

    Rate this question:

  • 28. 

    Which routing protocol do internet backbones use?

    • Border Gateway Protocol (BGP).

    • Open Shortest Path First (OSPF).

    • Routing Information Protocol (RIP).

    • Enhanced Interior Gateway Routing Protocol (EIGRP).

    Correct Answer
    A. Border Gateway Protocol (BGP).
    Explanation
    Internet backbones use the Border Gateway Protocol (BGP) as their routing protocol. BGP is specifically designed for large-scale networks and is used to exchange routing information between autonomous systems (AS). It allows internet service providers (ISPs) to determine the most efficient paths for data to travel across the internet, ensuring reliable and efficient routing. BGP is the protocol of choice for internet backbone networks due to its scalability, robustness, and ability to handle complex routing policies.

    Rate this question:

  • 29. 

    When configuring a router, you control access to privileged EXEC mode by configuring which password?

    • Line console

    • Line vty

    • Enable

    • Secret

    Correct Answer
    A. Enable
    Explanation
    When configuring a router, access to privileged EXEC mode can be controlled by configuring the "Enable" password. This password is used to secure the router's privileged EXEC mode, which provides access to advanced configuration and management commands. By setting an "Enable" password, only authorized users will be able to enter privileged mode and make changes to the router's configuration.

    Rate this question:

  • 30. 

    How many voltage levels does a binary signal have?

    • 1

    • 2

    • 3

    • 4

    Correct Answer
    A. 2
    Explanation
    A binary signal has two voltage levels. In digital communication, a binary signal represents information using only two distinct values, typically represented as 0 and 1. These values are usually represented by different voltage levels, where one voltage level represents a logical low (0) and the other represents a logical high (1).

    Rate this question:

  • 31. 

    The primary reason you should measure the voltage across faulty terminal protectors before removing and replacing them is to

    • Verify the circuit is not in use

    • Prevent interruptions to

    • Ensure dangerous voltages are not present on the line

    • Avoid activating alarm circuits on the voice network system

    Correct Answer
    A. Ensure dangerous voltages are not present on the line
    Explanation
    Measuring the voltage across faulty terminal protectors before removing and replacing them is important to ensure that dangerous voltages are not present on the line. This is crucial for the safety of the person performing the task as well as to prevent any potential damage to the equipment or circuit. By measuring the voltage, one can determine if it is safe to proceed with the replacement without risking electrical shocks or other hazards.

    Rate this question:

  • 32. 

    In an Intrusion Detection System (IDS) what is the main purpose of a boundary fence?

    • Facilitate the detection of intruders

    • Keep wildlife out of the perimeter detection zone

    • Provide security forces personnel a safe place to work

    • To present a physical and psychological deterrent to unauthorized entry

    Correct Answer
    A. To present a physical and psychological deterrent to unauthorized entry
    Explanation
    The main purpose of a boundary fence in an Intrusion Detection System (IDS) is to present a physical and psychological deterrent to unauthorized entry. The fence acts as a barrier that makes it difficult for intruders to enter the protected area, and it also serves as a visual indication that the area is secure. By creating a physical obstacle and conveying a sense of security, the fence discourages unauthorized individuals from attempting to breach the perimeter. This helps to prevent potential intrusions and enhances the overall effectiveness of the IDS.

    Rate this question:

  • 33. 

    The basic configuration of the entry control facility includes a 

    • Gatehouse, personnel entry gate, inspection equipment and vehicle entrapment area

    • Security forces entry gate, inspection equipment, backup generator and gatehouse

    • Location for security personnel to perform shift change and receive their weapon

    • Gatehouse, vehicle parking area and personnel entry gate

    Correct Answer
    A. Gatehouse, personnel entry gate, inspection equipment and vehicle entrapment area
    Explanation
    The basic configuration of the entry control facility includes a gatehouse, personnel entry gate, inspection equipment, and vehicle entrapment area. This setup ensures that there is a designated area for security personnel to monitor and control access to the facility. The gatehouse serves as a central control point where personnel can verify the identity of individuals entering the facility. The personnel entry gate is where individuals are allowed to enter after their identity has been verified. Inspection equipment is necessary to check for any prohibited items or potential threats. The vehicle entrapment area provides a secure space for vehicles to be inspected before entering the facility.

    Rate this question:

  • 34. 

    Which network Class has the most addresses for hosts?

    • A

    • B

    • C

    • D

    Correct Answer
    A. A
    Explanation
    Class A networks have the most addresses for hosts because they use the first octet of the IP address to identify the network, leaving the remaining three octets for host addresses. This allows for a large number of possible host addresses, making Class A networks suitable for large organizations or ISPs that require a large number of hosts on their network.

    Rate this question:

  • 35. 

    How many bits are in the extended superframe format (ESF) framing sequence?

    • 8

    • 12

    • 24

    • 48

    Correct Answer
    A. 24
    Explanation
    The extended superframe format (ESF) framing sequence consists of 24 bits.

    Rate this question:

  • 36. 

    The signal components that occur as bands above and below a carrier are called

    • Sidebands

    • Sine waves

    • Frequency translators

    • Modulating frequencies

    Correct Answer
    A. Sidebands
    Explanation
    Sidebands are the signal components that occur as bands above and below a carrier. They are created during the process of modulation, where the modulating frequencies are combined with the carrier signal. These sidebands contain the information that is being transmitted and are essential for the successful demodulation and recovery of the original signal.

    Rate this question:

  • 37. 

    Trend analysis is a program that ensures circuits meet management thresholds on what basis?

    • Daily

    • Weekly

    • Monthly

    • Annual

    Correct Answer
    A. Monthly
    Explanation
    Trend analysis is a program that ensures circuits meet management thresholds on a monthly basis. This means that the program analyzes data and trends over a monthly period to determine if circuits are meeting the required thresholds set by management. It allows for a more comprehensive and detailed analysis of performance over time, compared to daily, weekly, or annual analysis.

    Rate this question:

  • 38. 

    How many subnet bits are required to support 90 subnets on a Class B network?

    • Three

    • Five

    • Seven

    • Nine

    Correct Answer
    A. Seven
    Explanation
    To support 90 subnets on a Class B network, seven subnet bits are required. This is because with each additional subnet bit, the number of subnets doubles. Starting with a Class B network, which has 16 bits for the network portion, adding seven subnet bits would give us a total of 23 bits for the network portion. This allows for 2^7 (128) subnets, which is more than enough to support 90 subnets.

    Rate this question:

  • 39. 

    In an Intrusion Detection System (IDS) what must a line of detection detect?

    • Walking, running, rolling, crawling or jumping through the line of detection

    • Walking, running, rolling, crawling outside the line of detection

    • Potential for intruder to bypass the system

    • Possibility of equipment failures

    Correct Answer
    A. Walking, running, rolling, crawling or jumping through the line of detection
    Explanation
    The line of detection in an Intrusion Detection System (IDS) must be able to detect any movement, whether it is walking, running, rolling, crawling, or jumping, through the line of detection. This means that the system should be able to identify any physical intrusion or unauthorized access attempts that occur within the designated area of detection.

    Rate this question:

  • 40. 

    Simple Network Management Protocol (SNMP) is a tool used by network administrators to manage network performance, investigate and solve network problems and help plan for

    • Future growth

    • Network security

    • Remote monitoring

    • Network contingencies

    Correct Answer
    A. Future growth
    Explanation
    SNMP is a tool used by network administrators to manage network performance, investigate and solve network problems, and help plan for future growth. By monitoring network devices and collecting data, SNMP allows administrators to identify areas where the network may need to be expanded or upgraded to accommodate future demands. This helps ensure that the network can handle increased traffic, new devices, and additional users as the organization grows.

    Rate this question:

  • 41. 

    In general, you should deny direct dial-in access to a network device by disabling which port?

    • Console

    • Auxiliary

    • Interface

    • Virtual Terminal

    Correct Answer
    A. Auxiliary
    Explanation
    The correct answer is "Auxiliary." The auxiliary port on a network device is typically used for out-of-band management, allowing administrators to remotely access and configure the device. By denying direct dial-in access to the auxiliary port, you can enhance security by preventing unauthorized access to the device. Disabling the console port would prevent local access to the device, disabling the interface would impact network connectivity, and disabling the virtual terminal would prevent remote access via Telnet or SSH.

    Rate this question:

  • 42. 

    Which device has multiport connectivity that directs data between nodes on a network?

    • Bridge

    • Router

    • Gateway

    • Repeater

    Correct Answer
    A. Router
    Explanation
    A router is a device that has multiport connectivity and is responsible for directing data between nodes on a network. It acts as a central hub, receiving data packets from multiple devices and determining the most efficient path for the data to reach its destination. Routers operate at the network layer of the OSI model and use IP addresses to forward data between different networks. Unlike bridges, gateways, and repeaters, routers have the ability to make intelligent decisions based on network protocols and routing tables, making them the correct answer for this question.

    Rate this question:

  • 43. 

    What do Global Positioning System (GPS) satellites use to provide very precise time to GPS receivers?

    • Crystal Oscillator

    • Internal timing

    • Atomic clock

    • Station clock

    Correct Answer
    A. Atomic clock
    Explanation
    GPS satellites use atomic clocks to provide very precise time to GPS receivers. Atomic clocks are extremely accurate timekeeping devices that use the vibrations of atoms to measure time. They are based on the principle that certain atoms, such as cesium or rubidium, oscillate at a very specific frequency when exposed to electromagnetic radiation. By measuring these vibrations, atomic clocks can provide highly accurate time measurements. This precision is essential for GPS satellites to accurately calculate the position of GPS receivers on Earth.

    Rate this question:

  • 44. 

    If the circuit files are lost or destroyed, what document are Technical Control Facilities required to obtain?

    • The latest telecommunications service order (TSO) that reflects the current end-to-end circuit configuration.

    • The original TSO and the original circuit test data.

    • The latest TSO and the latest circuit test data.

    • The original TSO that established the circuit.

    Correct Answer
    A. The latest telecommunications service order (TSO) that reflects the current end-to-end circuit configuration.
    Explanation
    Technical Control Facilities are required to obtain the latest telecommunications service order (TSO) that reflects the current end-to-end circuit configuration in case the circuit files are lost or destroyed. This document is important as it provides information about the circuit's configuration, allowing the Technical Control Facilities to recreate and restore the circuit accurately. The TSO serves as a reference for understanding the circuit's specifications and requirements. By obtaining the latest TSO, the Technical Control Facilities can ensure that the circuit is reestablished correctly and functions as intended.

    Rate this question:

  • 45. 

    Within how many normal duty hours of completion action on the Telecommunications Service Order (TSO) must the circuit control office (CCO) submit an in-effect report?

    • 72

    • 48

    • 24

    • 12

    Correct Answer
    A. 72
    Explanation
    Within 72 normal duty hours of completion action on the Telecommunications Service Order (TSO), the circuit control office (CCO) must submit an in-effect report. This report is necessary to provide an update on the status and effectiveness of the TSO. It ensures that the necessary documentation is completed in a timely manner and allows for proper tracking and monitoring of the telecommunications services.

    Rate this question:

  • 46. 

    Combined distribution frames encompass the functions of a main distribution frame and

    • An intermediate distribution frame.

    • A black distribution frame.

    • A red distribution frame.

    • A mid distribution frame.

    Correct Answer
    A. An intermediate distribution frame.
    Explanation
    Combined distribution frames encompass the functions of a main distribution frame and an intermediate distribution frame. This means that they serve as a central point for connecting multiple communication lines and distributing them to various locations. The main distribution frame handles the incoming lines, while the intermediate distribution frame handles the distribution of these lines to different areas or departments within a building or facility. Therefore, the correct answer is an intermediate distribution frame.

    Rate this question:

  • 47. 

    Which physical security action can you take to ensure network equipment supports the widest range of security services?

    • Configure the equipment with the maximum amount of memory possible.

    • Configure the equipment to use a line console password.

    • Power cycle the equipment at the end of the duty day.

    • Configure the equipment using setup mode.

    Correct Answer
    A. Configure the equipment with the maximum amount of memory possible.
    Explanation
    By configuring the network equipment with the maximum amount of memory possible, it ensures that the equipment can handle a wide range of security services. Memory plays a crucial role in the performance and functionality of network devices, allowing them to process and store data efficiently. With more memory, the equipment can support various security services simultaneously, such as encryption, authentication, and intrusion detection systems. This enables the network to be more secure by providing a robust defense against potential threats and vulnerabilities.

    Rate this question:

  • 48. 

    In common associated signaling (CAS), what is the seventh bit in frames 6 and 12 used for?

    • Bit robbing

    • Bit stuffing

    • Frame correction

    • Frame enhancement

    Correct Answer
    A. Bit robbing
    Explanation
    The seventh bit in frames 6 and 12 in common associated signaling (CAS) is used for bit robbing. Bit robbing is a technique used to steal one bit from each frame to carry signaling information. This allows for additional signaling information to be transmitted without the need for extra frames, maximizing the efficiency of the signaling system.

    Rate this question:

  • 49. 

    What is the process, or result of the process, of modifying (varying) one or more characteristics of a carrier signal in accordance with an instantaneous characteristic of an information signal?

    • Modulation

    • Multiplexing

    • Quantization

    • Synthesizing

    Correct Answer
    A. Modulation
    Explanation
    Modulation is the process of modifying one or more characteristics of a carrier signal in accordance with an instantaneous characteristic of an information signal. It involves altering the amplitude, frequency, or phase of the carrier signal to encode the information signal. This allows the information to be transmitted over a medium such as air or a cable. Modulation is commonly used in various communication systems, including radio, television, and telecommunications, to ensure efficient and accurate transmission of data.

    Rate this question:

Quiz Review Timeline (Updated): Mar 20, 2023 +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 20, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Mar 23, 2016
    Quiz Created by
    Tyler_holzworth
Back to Top Back to top
Advertisement
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.