Z3d152 02 1511 (Volume 2 Edit Code 1511)

Reviewed by Editorial Team
The ProProfs editorial team is comprised of experienced subject matter experts. They've collectively created over 10,000 quizzes and lessons, serving over 100 million users. Our team includes in-house content moderators and subject matter experts, as well as a global network of rigorously trained contributors. All adhere to our comprehensive editorial guidelines, ensuring the delivery of high-quality content.
Learn about Our Editorial Process
| By Davidedpg10
D
Davidedpg10
Community Contributor
Quizzes Created: 1 | Total Attempts: 198
| Attempts: 198
SettingsSettings
Please wait...
  • 1/124 Questions

    (203) In binary-synchronous protocol, which characters establishes and maintains character synchronization prior to the message block and during transmission?

    • SEQ.
    • SYN.
    • STX.
    • EST.
Please wait...
3D152 Quizzes & Trivia
About This Quiz

Z3D152 02 1511, Edit Code 02
AFSC 3D152

Volume 2, most up to date since I was unable to locate one at the time (5/11/2016)


Quiz Preview

  • 2. 

    (204) Which Application layer protocol is used to synchronize the clocks of computers on a network?

    • Simple Network Management Protocol (SNMP).

    • Dynamic Host Configuration Protocol (DHCP).

    • Network Time Protocol (NTP).

    • Packet Internet Groper (PING).

    Correct Answer
    A. Network Time Protocol (NTP).
    Explanation
    The Network Time Protocol (NTP) is used to synchronize the clocks of computers on a network. NTP is a protocol that allows computers to accurately synchronize their time with a reference time source, such as a time server. By synchronizing the clocks, NTP ensures that all computers on the network have the same time, which is essential for various network operations and applications that rely on accurate timekeeping. SNMP, DHCP, and PING are not specifically designed for clock synchronization and serve different purposes in network communication.

    Rate this question:

  • 3. 

    (206) Internet protocol version 6 (IPv6) addresses are represented by

    • 8 groups of dotted decimal numbers.

    • 8 groups of hexadecimal numbers.

    • 4 dotted decimal numbers.

    • 128 decimal numbers.

    Correct Answer
    A. 8 groups of hexadecimal numbers.
    Explanation
    IPv6 addresses are represented by 8 groups of hexadecimal numbers. Each group is separated by a colon. This is different from IPv4 addresses, which are represented by 4 groups of decimal numbers separated by periods. IPv6 was introduced to replace IPv4 due to the limited number of available addresses, and the use of hexadecimal numbers allows for a much larger address space.

    Rate this question:

  • 4. 

    (210) Which topology has the stations connected in the form of a circle?

    • Bus

    • Ring

    • Star

    • Hybrid

    Correct Answer
    A. Ring
    Explanation
    A ring topology has the stations connected in the form of a circle. In this topology, each station is connected to exactly two other stations, forming a closed loop. Data travels in only one direction around the ring, passing through each station until it reaches its destination. This topology provides equal access to all stations and is reliable as data can still flow even if one station fails.

    Rate this question:

  • 5. 

    (210) Which topology combines two or more different physical topologies in a single network?

    • Bus

    • Ring

    • Star

    • Hybrid

    Correct Answer
    A. Hybrid
    Explanation
    A hybrid topology combines two or more different physical topologies in a single network. This means that it can have multiple types of connections, such as a combination of bus, ring, and star topologies. This allows for flexibility and scalability in the network, as different types of connections can be used based on the specific needs and requirements.

    Rate this question:

  • 6. 

    (211) What allows transportation of all active Virtual LANs (VLAN) between switches using a single physical link?

    • VLAN Trunks

    • VLAN Frames

    • VLAN Links

    • VLAN Ports

    Correct Answer
    A. VLAN Trunks
    Explanation
    VLAN trunks allow transportation of all active VLANs between switches using a single physical link. Trunks are configured on the switch ports to carry traffic from multiple VLANs, allowing them to be transmitted over the same physical link. This enables efficient use of network resources and simplifies network management by reducing the number of physical connections required for each VLAN.

    Rate this question:

  • 7. 

    (212) What identifier differentiates one wireless local area network (WLAN) from another?

    • Hostname

    • Network Name

    • Service Set Identifier (SSID)

    • Virtual LAN Identifier (VLAN ID)

    Correct Answer
    A. Service Set Identifier (SSID)
    Explanation
    The Service Set Identifier (SSID) is the correct answer because it is a unique identifier that distinguishes one wireless local area network (WLAN) from another. The SSID is a case-sensitive alphanumeric string that is set by the network administrator and is used by wireless devices to connect to a specific WLAN. It allows devices to identify and connect to the correct network among multiple available networks in the vicinity. The SSID is broadcasted by the wireless access point, and users can select the desired network by choosing the corresponding SSID from the available options.

    Rate this question:

  • 8. 

    (213) A Management Information Base (MIB) is a collection of information that is organized

    • Alphabetically

    • Hierarchically

    • Numerically

    • Objectively

    Correct Answer
    A. Hierarchically
    Explanation
    A Management Information Base (MIB) is a collection of information that is organized hierarchically. This means that the information is arranged in a structured manner, with different levels of hierarchy or levels of importance. This allows for easy navigation and retrieval of information, as it follows a logical and systematic order. By organizing the information hierarchically, it becomes easier to understand and manage the data within the MIB.

    Rate this question:

  • 9. 

    (239) The three cornerstones of voice network system security are availability,

    • Circumvention, and confidentiality.

    • Circumvention, and disclosure.

    • Confidentiality, and integrity.

    • Disclosure, and integrity.

    Correct Answer
    A. Confidentiality, and integrity.
    Explanation
    The correct answer is confidentiality and integrity. Availability refers to the ability of the network system to be accessible and functioning properly. Circumvention refers to the act of bypassing or evading security measures, which is not a cornerstone of network system security. Disclosure refers to the act of making information known to others, which is not a cornerstone of network system security either. Confidentiality refers to protecting sensitive information from unauthorized access, and integrity refers to maintaining the accuracy and consistency of data. These two principles are essential for ensuring the security of a voice network system.

    Rate this question:

  • 10. 

    (240) What should security policies encompass to help mitigate the threat of convergence?

    • Data networks only.

    • Voice networks only.

    • Both voice and data networks

    • Neither voice nor data networks.

    Correct Answer
    A. Both voice and data networks
    Explanation
    Security policies should encompass both voice and data networks to help mitigate the threat of convergence. Convergence refers to the integration of voice and data networks, which increases the potential attack surface for cyber threats. By including both voice and data networks in security policies, organizations can ensure comprehensive protection against potential vulnerabilities, breaches, and unauthorized access. This approach helps to address the unique security requirements and risks associated with converged networks, safeguarding both communication channels effectively.

    Rate this question:

  • 11. 

    (240) What are attempts to gain access to a switch system by posing as an authorized user?

    • Toll fraud

    • War dialing

    • Masquerades

    • Denial of service

    Correct Answer
    A. Masquerades
    Explanation
    Masquerades refers to the attempts made by an individual to gain access to a switch system by pretending to be an authorized user. This involves impersonating someone who has legitimate access to the system in order to bypass security measures and gain unauthorized access. This can be done through various means such as using stolen credentials or exploiting vulnerabilities in the system. Masquerades are a common tactic used by hackers and attackers to gain unauthorized access to sensitive information or disrupt the functioning of a network.

    Rate this question:

  • 12. 

    (242) The primary reason you should measure the voltage across faulty terminal protectors before removing and replacing them is to

    • Verify the circuit is not in use.

    • Prevent interruptions to critical circuits

    • Ensure dangerous voltages are not present on the line.

    • Avoid activating alarm circuits on the voice network system

    Correct Answer
    A. Ensure dangerous voltages are not present on the line.
    Explanation
    Measuring the voltage across faulty terminal protectors before removing and replacing them is important to ensure that dangerous voltages are not present on the line. This is crucial for safety reasons as working with circuits that have dangerous voltages can pose a risk to the technician. By measuring the voltage, one can determine if it is safe to proceed with the replacement without the risk of electric shock or other hazards.

    Rate this question:

  • 13. 

    (249) In an Intrusion Detection System (IDS), what must a line of detection detect?

    • Walking, running, rolling, crawling or jumping through the line of detection.

    • Walking, running, rolling, crawling or jumping outside the line of detection.

    • Potential for intruder to bypass the system.

    • Possibility of equipment failures

    Correct Answer
    A. Walking, running, rolling, crawling or jumping through the line of detection.
    Explanation
    The correct answer is "Walking, running, rolling, crawling or jumping through the line of detection." In an Intrusion Detection System (IDS), the line of detection refers to the area or boundary that the system monitors for any unauthorized activity. Therefore, the line of detection should be able to detect any movement or activity that occurs within it, such as walking, running, rolling, crawling, or jumping. This ensures that any intrusion attempt is promptly identified and can trigger appropriate security measures.

    Rate this question:

  • 14. 

    249) In an Intrusion Detection System (IDS), what is the main purpose of a boundary fence?

    • Facilitate the detection of intruders.

    • Keep wildlife out of the perimeter detection zone.

    • Provide security forces personnel a safe place to work

    • To present a physical and psychological deterrent to unauthorized entry

    Correct Answer
    A. To present a physical and psychological deterrent to unauthorized entry
    Explanation
    The main purpose of a boundary fence in an Intrusion Detection System (IDS) is to present a physical and psychological deterrent to unauthorized entry. The fence acts as a physical barrier that makes it difficult for intruders to gain access to the protected area. Additionally, the presence of a fence can psychologically deter potential intruders by signaling that the area is secure and protected. This helps to prevent unauthorized entry and enhance the overall security of the system.

    Rate this question:

  • 15. 

    (251) Which interior intrusion detection system (IIDS) sensor uses heat radiation to detect intruders?

    • Ultrasonic.

    • Microwave.

    • Passive infrared.

    • Dual-phenomenology.

    Correct Answer
    A. Passive infrared.
    Explanation
    Passive infrared sensors use heat radiation to detect intruders. These sensors are designed to detect changes in infrared energy patterns in their surroundings. When an intruder enters the monitored area, their body heat emits infrared energy, which is detected by the sensor. This detection triggers an alarm or alert, indicating the presence of an intruder. Unlike ultrasonic and microwave sensors, which use sound waves and microwave radiation respectively, passive infrared sensors specifically rely on heat radiation for intrusion detection. Dual-phenomenology sensors combine multiple detection methods, but in this case, the correct answer is passive infrared.

    Rate this question:

  • 16. 

    Which of the following is an example of a video compression standard?

    • Motion Picture Experts Group–4 (MPEG–4).

    • Joint Photographic Experts Group (JPEG).

    • Transfer Protocol (FTP).

    • G.711.

    Correct Answer
    A. Motion Picture Experts Group–4 (MPEG–4).
    Explanation
    MPEG-4 is an example of a video compression standard. It is a widely used format for compressing audio and video files, allowing for efficient storage and transmission. MPEG-4 supports high-quality video and audio, as well as advanced features such as interactive content and streaming. It is commonly used for online streaming, video conferencing, and multimedia applications.

    Rate this question:

  • 17. 

    Which data communication protocol is based on bits and the position of the bits?

    • Character-oriented

    • Bit-oriented.

    • Network.

    • Routing.

    Correct Answer
    A. Bit-oriented.
    Explanation
    Bit-oriented data communication protocol is based on the individual bits and their positions. It focuses on the structure and arrangement of the bits to transmit and receive data. This protocol ensures that the bits are correctly encoded, synchronized, and interpreted, making it suitable for efficient and reliable data transmission. Character-oriented protocols, on the other hand, are based on characters or groups of characters, rather than individual bits. Network and routing are not directly related to the concept of data communication protocols based on bits and positions.

    Rate this question:

  • 18. 

    (208) Which router port is used for initial configuration?

    • Auxiliary.

    • Console.

    • Ethernet.

    • Telnet.

    Correct Answer
    A. Console.
    Explanation
    The console port on a router is used for initial configuration. This port allows direct access to the router's command-line interface (CLI) using a console cable. By connecting a computer to the console port, network administrators can configure the router's settings, such as IP addresses, passwords, and routing protocols, before the router is connected to the network. The console port provides a reliable and secure method for initial configuration and troubleshooting purposes.

    Rate this question:

  • 19. 

    (208) When configuring a router, you control access to privileged EXEC mode by configuring which password?

    • Line Console

    • Line VTY

    • Enable

    • Secret

    Correct Answer
    A. Enable
    Explanation
    When configuring a router, the password used to control access to privileged EXEC mode is the "Enable" password. This password is set in order to restrict unauthorized access to the router's privileged mode, which allows for more advanced configuration and management tasks. By setting a strong "Enable" password, network administrators can ensure that only authorized individuals are able to access and make changes to the router's settings.

    Rate this question:

  • 20. 

    (210) Which topology defines the way in which devices communicate and data is transmitted throughout the network?

    • Physical

    • Logical

    • Hybrid

    • Star

    Correct Answer
    A. Logical
    Explanation
    Logical topology refers to the way in which devices communicate and data is transmitted throughout the network. It focuses on the logical connections between devices, rather than the physical layout of the network. This includes defining how devices are connected, the paths that data takes, and the protocols used for communication. The logical topology can be different from the physical topology, as devices may be physically connected in a different way than how they communicate. Therefore, logical topology is the correct answer to the question.

    Rate this question:

  • 21. 

    (211) Which of the following will minimize EtherChannel configuration problems?

    • Disable all the interfaces after creating the EtherChannel.

    • Configure all interfaces to operate at the same speed and duplex mode.

    • Configure all interfaces for the same parameters as the last port configured.

    • Assign all interfaces in the EtherChannel to a different Virtual LAN (VLAN).

    Correct Answer
    A. Configure all interfaces to operate at the same speed and duplex mode.
    Explanation
    Configuring all interfaces to operate at the same speed and duplex mode will minimize EtherChannel configuration problems. This ensures that all interfaces in the EtherChannel have consistent settings, preventing any mismatch or compatibility issues that could lead to configuration problems. By having the same speed and duplex mode, the interfaces can effectively communicate and work together as a bundle, improving overall performance and reducing the likelihood of errors or conflicts.

    Rate this question:

  • 22. 

    (214) Which physical security action can you take to ensure network equipment supports the widest range of security services?

    • Configure the equipment with the maximum amount of memory possible.

    • Configure the equipment to use a line console password.

    • Power cycle the equipment at the end of the duty day.

    • Configure the equipment using setup mode.

    Correct Answer
    A. Configure the equipment with the maximum amount of memory possible.
    Explanation
    By configuring the equipment with the maximum amount of memory possible, it allows for better performance and the ability to support a wider range of security services. With more memory, the equipment can handle more processes and store more data, which is essential for implementing and running various security services effectively. This ensures that the network equipment is capable of meeting the demands of different security measures, enhancing the overall security of the network.

    Rate this question:

  • 23. 

    (218) Which statement best describes a binary with eight-zero substitution (B8ZS) signal?

    • The information is transmitted in three different voltage levels.

    • A logic one is transmitted as positive voltage if the previous logic one was negative.

    • The level always returns to zero for 50 percent of the bit cycle after every transition.

    • Bipolar violations are intentionally inserted into a data signal to break up long strings of zeros.

    Correct Answer
    A. Bipolar violations are intentionally inserted into a data signal to break up long strings of zeros.
    Explanation
    B8ZS stands for Binary with Eight-Zero Substitution. In this signaling technique, bipolar violations are intentionally inserted into the data signal to break up long strings of zeros. This is done to ensure that the receiving end can accurately detect and interpret the data. By inserting these violations, the signal maintains a balance between positive and negative voltages, preventing the loss of synchronization and ensuring reliable transmission.

    Rate this question:

  • 24. 

    (227) What do Global Positioning System (GPS) satellites use to provide very precise time to GPS receivers?

    • Crystal oscillator

    • Internal timing.

    • Atomic clock.

    • Station clock.

    Correct Answer
    A. Atomic clock.
    Explanation
    Global Positioning System (GPS) satellites use atomic clocks to provide very precise time to GPS receivers. Atomic clocks are highly accurate timekeeping devices that use the vibrations of atoms to measure time. These clocks are able to maintain accuracy within nanoseconds, which is crucial for GPS systems to calculate accurate positions. Crystal oscillators, internal timing, and station clocks may be used for other purposes within the GPS system, but they do not provide the same level of precision as atomic clocks.

    Rate this question:

  • 25. 

    (237) When a telephone network is circuit switched, each call

    • Is broadcast over multiple paths between switches.

    • Is packetized and transmitted in circuitous bursts.

    • Has a dedicated circuit created by the switch.

    • Has a dedicated trunk created by the switch .

    Correct Answer
    A. Has a dedicated circuit created by the switch.
    Explanation
    In a circuit-switched telephone network, each call is assigned a dedicated circuit created by the switch. This means that a direct path is established between the calling and receiving parties, and this path remains dedicated to that call for the duration of the conversation. This ensures that the call quality remains consistent and there is no interference from other calls.

    Rate this question:

  • 26. 

    (250) The basic configuration of the entry control facility includes a

    • Gatehouse, personnel entry gate, inspection equipment and vehicle entrapment area.

    • Security forces entry gate, inspection equipment, backup generator and gatehouse.

    • Location for security personnel to perform shift change and receive their weapon.

    • Gatehouse, vehicle parking area and personnel entry gate.

    Correct Answer
    A. Gatehouse, personnel entry gate, inspection equipment and vehicle entrapment area.
    Explanation
    The basic configuration of the entry control facility includes a gatehouse, personnel entry gate, inspection equipment, and vehicle entrapment area. This configuration is necessary to ensure proper security measures at the entry point. The gatehouse serves as a control center where security personnel can monitor and control access to the facility. The personnel entry gate is where individuals enter and exit the facility, and it is important to have proper control and documentation of personnel movements. Inspection equipment is essential for screening and checking individuals and their belongings for any prohibited items. Lastly, the vehicle entrapment area is designed to detain and inspect vehicles entering the facility, ensuring that they do not pose any security threats.

    Rate this question:

  • 27. 

    (202) In the Open System Interconnect (OSI) model, a layer will communicate with three other OSI layers. Which one is not one of those layers?

    • Layer above.

    • Layer below.

    • Lowest layer.

    • Peer layer.

    Correct Answer
    A. Lowest layer.
    Explanation
    In the Open System Interconnect (OSI) model, each layer communicates with three other layers. The layer above communicates with the layer below, the layer below communicates with the layer above, and the layer communicates with its peer layer. However, the lowest layer does not have a layer below it, so it does not communicate with a lower layer. Therefore, the lowest layer is not one of the layers that a layer in the OSI model communicates with.

    Rate this question:

  • 28. 

    (205) Which network Class has the most addresses for hosts?

    • A

    • B

    • C

    • D

    Correct Answer
    A. A
    Explanation
    Class A network has the most addresses for hosts. Class A networks have a very large network portion and a small host portion, allowing for a large number of hosts to be connected to the network. The first octet of a Class A network is reserved for the network portion, while the remaining three octets are used for the host portion. This allows for a maximum of 16,777,214 hosts to be connected to a Class A network.

    Rate this question:

  • 29. 

    (207) Which device has multiport connectivity that directs data between nodes on a network?

    • Bridge.

    • Router.

    • Gateway.

    • Repeater.

    Correct Answer
    A. Router.
    Explanation
    A router is a device that has multiport connectivity and is responsible for directing data between nodes on a network. It analyzes the data packets and determines the most efficient path for them to reach their destination. Unlike bridges, gateways, and repeaters, routers operate at the network layer of the OSI model and can connect multiple networks together. Therefore, a router is the correct answer for this question.

    Rate this question:

  • 30. 

    (207) Which routing protocol do internet backbones use?

    • Border Gateway Protocol (BGP).

    • Open Shortest Path First (OSPF).

    • Routing Information Protocol (RIP).

    • Enhanced Interior Gateway Routing Protocol (EIGRP).

    Correct Answer
    A. Border Gateway Protocol (BGP).
    Explanation
    Internet backbones use Border Gateway Protocol (BGP) as their routing protocol. BGP is designed to exchange routing information between autonomous systems (AS) on the internet. It allows routers in different ASes to communicate and make routing decisions based on various factors such as network policies, path preferences, and network reachability. BGP is widely used by internet service providers and large organizations to ensure efficient and reliable routing across the internet backbone.

    Rate this question:

  • 31. 

    (211) The time it takes a switch to figure out where to forward a data unit is called its

    • Lag

    • Hop

    • Latency

    • Time Zone

    Correct Answer
    A. Latency
    Explanation
    Latency refers to the time it takes for a switch to determine the appropriate destination for a data unit. It represents the delay or time lag in the forwarding process. Unlike lag, which typically refers to a delay or slowness in general, latency specifically relates to the time it takes for the switch to make a decision on where to send the data. Hop refers to the number of devices a data unit must pass through to reach its destination, and time zone is unrelated to the switch's forwarding process.

    Rate this question:

  • 32. 

    (212) Which wireless design phase accounts for the amount of users on the network, the training required for the users and the security and integrity requirements of the network data?

    • Planning

    • Securing

    • Deployment

    • Management

    Correct Answer
    A. Planning
    Explanation
    The correct answer is Planning. During the planning phase of wireless design, various factors are taken into consideration, including the number of users on the network, the training required for these users, and the security and integrity requirements of the network data. This phase involves analyzing the requirements and objectives of the wireless network and developing a detailed plan to meet these requirements effectively.

    Rate this question:

  • 33. 

    (213) Simple Network Management Protocol (SNMP) is a tool used by network administrators to manage network performance, investigate and solve network problems and help plan for

    • Future growth.

    • Network security.

    • Remote monitoring.

    • Network contingencies.

    Correct Answer
    A. Future growth.
    Explanation
    SNMP is a tool that allows network administrators to monitor and manage network performance, troubleshoot issues, and plan for future growth. It provides a framework for collecting and organizing information about devices on the network, allowing administrators to track performance metrics and make informed decisions about network expansion and upgrades. While SNMP can also be used for network security, remote monitoring, and network contingencies, the primary focus is on managing network performance and planning for future growth.

    Rate this question:

  • 34. 

    (215) What is most commonly used in data systems to express signaling speed?

    • Baud rate

    • Interface speed

    • Bits per second

    • Baud per second

    Correct Answer
    A. Bits per second
    Explanation
    In data systems, the most commonly used term to express signaling speed is "bits per second." This term refers to the number of bits that can be transmitted or processed in one second. It is a measure of the data transfer rate and is used to determine the speed at which information can be transmitted or received in a data system. Baud rate, interface speed, and baud per second are not as commonly used or accurate in expressing signaling speed as bits per second.

    Rate this question:

  • 35. 

    (216) Which option is a characteristic of synchronous data operation?

    • Timing pulses are transmitted within the signal stream.

    • Start and stop pulses control data transmission.

    • System timing is not of critical importance.

    • All data bits are the same length in time.

    Correct Answer
    A. All data bits are the same length in time.
    Explanation
    In synchronous data operation, all data bits are the same length in time. This means that each bit in the data stream is transmitted for the same duration, ensuring that the receiver can accurately interpret the data. This characteristic allows for precise synchronization between the sender and receiver, as they both operate on the same timing. By maintaining consistent bit lengths, the receiver can easily distinguish between different bits and decode the transmitted information accurately.

    Rate this question:

  • 36. 

    (222) The signal components that occur as bands above and below a carrier are called

    • Sidebands

    • Sine waves

    • Frequency translators

    • Modulating frequencies

    Correct Answer
    A. Sidebands
    Explanation
    Sidebands are the signal components that occur as bands above and below a carrier. In modulation, the carrier wave is modified by adding or subtracting frequencies, resulting in the creation of sidebands. These sidebands contain the information that is being transmitted. Therefore, the correct answer is sidebands.

    Rate this question:

  • 37. 

    (240) What provides enterprise wide visibility into telecom resource utilization, phone network usage and incidents of toll fraud?

    • Public Switched Telephone Network system.

    • Enterprise Telephony Management system.

    • Voice over Internet protocol system.

    • Time Division Multiplexing system

    Correct Answer
    A. Enterprise Telephony Management system.
    Explanation
    The Enterprise Telephony Management system provides enterprise-wide visibility into telecom resource utilization, phone network usage, and incidents of toll fraud. This system allows organizations to monitor and manage their telephony infrastructure, including phone lines, extensions, and call data. It provides detailed reports and analytics to help identify patterns of resource utilization and detect any fraudulent activities. By having this visibility, organizations can optimize their telecom resources, improve network performance, and prevent unauthorized use or toll fraud incidents.

    Rate this question:

  • 38. 

    (247) What does the GVG–110 video switcher serial interface allow?

    • Remote microprocessor control.

    • Remote control of switcher transitions.

    • Serial interface programming with the switcher effects memory.

    • Remote control of all switcher functions by a personal computer.

    Correct Answer
    A. Remote control of all switcher functions by a personal computer.
    Explanation
    The GVG-110 video switcher serial interface allows for remote control of all switcher functions by a personal computer. This means that the switcher can be controlled and operated from a computer, allowing for more flexibility and convenience in managing and controlling the switcher's functions. This feature enables the user to remotely control all aspects of the switcher, such as switching between different video sources, adjusting settings, and managing transitions, all from the comfort of a computer.

    Rate this question:

  • 39. 

    (252) What type alarm occurs if the sensor post cover in vertical taut-wire sensor (VTWS) is removed?

    • None

    • Tamper

    • Intruder

    • Equipment fault

    Correct Answer
    A. Tamper
    Explanation
    If the sensor post cover in a vertical taut-wire sensor (VTWS) is removed, it would trigger a tamper alarm. This alarm is activated when there is any unauthorized interference or tampering with the sensor. Removing the cover would indicate that someone has tampered with the sensor, potentially compromising its functionality or security.

    Rate this question:

  • 40. 

    (204) Which network layer protocol matches a known Internet protocol (IP) address for a destination device to a Media Access Control (MAC) address?

    • IP

    • Address Resolution Protocol (ARP).

    • Reverse Address Resolution Protocol (RARP).

    • Internet Control Message Protocol (ICMP).

    Correct Answer
    A. Address Resolution Protocol (ARP).
    Explanation
    The correct answer is Address Resolution Protocol (ARP). ARP is a network layer protocol that matches an IP address to a MAC address. It is used to find the MAC address of a device on the same network when only the IP address is known. When a device wants to send data to another device on the same network, it needs to know the MAC address of the destination device. ARP resolves this by broadcasting a request asking "Who has this IP address?" and the device with the matching IP address responds with its MAC address.

    Rate this question:

  • 41. 

    (205) How many subnet bits are required to support 90 subnets on a Class B network?

    • Three

    • Five

    • Seven

    • Nine

    Correct Answer
    A. Seven
    Explanation
    To support 90 subnets on a Class B network, seven subnet bits are required. In a Class B network, the default subnet mask is 255.255.0.0, which provides for 16,384 possible subnets. However, since only 90 subnets are needed, additional subnet bits need to be borrowed to create enough subnets. By borrowing seven subnet bits, it creates a total of 128 subnets (2^7) which is more than enough to support the required 90 subnets. Therefore, the correct answer is seven.

    Rate this question:

  • 42. 

    (209) Virtual Private Networks (VPNs) allow the AF to extend network resources across a/an

    • Department of Defense network.

    • Air Force network.

    • Local area network.

    • A public network.

    Correct Answer
    A. A public network.
    Explanation
    Virtual Private Networks (VPNs) allow the AF (Air Force) to extend network resources across a public network. This means that the AF can securely access and utilize network resources from anywhere, even when connected to an untrusted or public network. VPNs provide encryption and authentication mechanisms to ensure the confidentiality and integrity of the data transmitted over the public network, making it a suitable option for extending network resources.

    Rate this question:

  • 43. 

    (211) Which device subdivides a network into smaller logical pieces, or segments?

    • Switch

    • Firewall

    • Gateway

    • Repeater

    Correct Answer
    A. Switch
    Explanation
    A switch is a device that subdivides a network into smaller logical pieces, or segments. It operates at the data link layer of the OSI model and uses MAC addresses to forward data packets only to the intended recipient. By connecting multiple devices to different ports on a switch, it allows for efficient communication within a network by creating separate collision domains and increasing available bandwidth. Unlike a repeater, which simply amplifies and regenerates signals, a switch provides more advanced functionality and intelligence in managing network traffic. Firewalls and gateways, on the other hand, are designed for network security and routing purposes respectively.

    Rate this question:

  • 44. 

    (211) How many broadcast domains forms a Virtual LAN (VLAN)?

    • 1

    • 2

    • 3

    • 4

    Correct Answer
    A. 1
    Explanation
    A Virtual LAN (VLAN) is a logical grouping of devices in a network that behave as if they are on their own separate network. Each VLAN creates a separate broadcast domain, meaning that broadcast traffic is contained within that VLAN and does not spread to other VLANs. Therefore, a VLAN forms its own broadcast domain, and as per the given answer, only one broadcast domain is formed by a VLAN.

    Rate this question:

  • 45. 

    (217) In what type of digital signal does the signal level move to one of the discrete signal levels, but returns to the zero level after a predetermined time?

    • Non-return-to-zero (NRZ) level.

    • NRZ mark.

    • NRZ space.

    • Return-to-zero.

    Correct Answer
    A. Return-to-zero.
    Explanation
    In a return-to-zero (RZ) digital signal, the signal level moves to one of the discrete signal levels (either high or low) and then returns to the zero level after a predetermined time. This means that the signal alternates between the two levels, with each level representing a binary value. This type of signal is commonly used in digital communication systems to transmit data.

    Rate this question:

  • 46. 

    (220) The signaling equipment has three types of communications signals that functions to

    • Process switch addressing.

    • Control digit translations

    • Control and process calls

    • Provide a clear signal.

    Correct Answer
    A. Control and process calls
    Explanation
    The signaling equipment has three types of communications signals that control and process calls. This means that the signals are responsible for managing and handling telephone calls, ensuring that they are properly routed and connected. The signals play a crucial role in initiating, maintaining, and terminating calls, allowing for effective communication between callers.

    Rate this question:

  • 47. 

    (226) Which wave-division multiplexing technology uses uncooled lasers to reduce cost?

    • Wave-division multiplexing.

    • Coarse wave division multiplexing.

    • Dense wave division multiplexing.

    • Long wave division multiplexing.

    Correct Answer
    A. Coarse wave division multiplexing.
    Explanation
    Coarse wave division multiplexing (CWDM) is a wave-division multiplexing technology that uses uncooled lasers to reduce cost. Unlike dense wave division multiplexing (DWDM), which requires expensive cooled lasers, CWDM utilizes uncooled lasers that do not require additional cooling mechanisms, making it a more cost-effective solution.

    Rate this question:

  • 48. 

    (227) Which stratum level is a Global Positioning System (GPS) timing source?

    • 1

    • 2

    • 3

    • 4

    Correct Answer
    A. 1
    Explanation
    A Global Positioning System (GPS) timing source is a highly accurate time reference used for synchronization purposes. It is commonly used in various applications such as telecommunications, financial transactions, and scientific research. In the context of stratum levels, a GPS timing source is considered to be at stratum level 1. This is because it receives time directly from atomic clocks and is highly reliable and accurate. Stratum level 1 devices are typically primary reference clocks and serve as the ultimate time source for other devices in the network.

    Rate this question:

  • 49. 

    (230) Which DD form is used as the primary source of information when preparing DOD Information Network (DODIN) status reports?

    • 1441

    • 1443

    • 1445

    • 1753

    Correct Answer
    A. 1443
    Explanation
    DD Form 1443 is used as the primary source of information when preparing DOD Information Network (DODIN) status reports. This form is specifically designed for reporting DODIN operational status and provides a standardized format for collecting and reporting relevant information. It ensures consistency and accuracy in reporting DODIN status, allowing for effective communication and decision-making regarding the network's operational readiness and any issues that may arise.

    Rate this question:

Quiz Review Timeline (Updated): Mar 20, 2023 +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 20, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • May 11, 2016
    Quiz Created by
    Davidedpg10
Back to Top Back to top
Advertisement
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.