(203) Which data communication protocol is based on bits and the...
(210) Which topology has the stations connected in the form of a...
(210) Which topology combines two or more different physical...
(201) Which of the following is an example of a video compression...
(204) Which Application layer protocol is used to synchronize the...
(211) Which device subdivides a network into smaller logical pieces,...
(239) The three cornerstones of voice network system security are...
(203) In binary-synchronous protocol, which characters establishes and...
(204) Which network layer protocol matches a known Internet protocol...
(205) Which network Class has the most addresses for hosts?
(206) Internet protocol version 6 (IPv6) addresses are represented by
(209) Virtual Private Networks (VPNs) allow the AF to extend network...
(210) Which topology defines the way in which devices communicate and...
(211) The time it takes a switch to figure out where to forward a data...
(211) What allows transportation of all active Virtual LANs (VLAN)...
(212) What identifier differentiates one wireless local area network...
(240) What should security policies encompass to help mitigate the...
(240) What are attempts to gain access to a switch system by posing as...
(249) In an Intrusion Detection System (IDS), what is the main purpose...
(204) Which Network layer protocol provides messaging that can help...
(208) Which router port is used for initial configuration?
(213) A Management Information Base (MIB) is a collection of...
(218) Which statement best describes a binary with eight-zero...
(229) Which agency is the preferred transport provider for Internet...
(249) In an Intrusion Detection System (IDS), what must a line of...
(251) Which interior intrusion detection system (IIDS) sensor uses...
(252) What type alarm occurs if the sensor post cover in vertical...
(204) Which Transport layer protocol provides reliable data delivery...
(208) When configuring a router, you control access to privileged EXEC...
(211) How many broadcast domains forms a Virtual LAN (VLAN)?
(217) In what type of digital signal does the signal level move to one...
(242) The primary reason you should measure the voltage across faulty...
(207) Which device has multiport connectivity that directs data...
(207) Which routing protocol do internet backbones use?
(215) Individual pulses within a digital signal are
(215) What is most commonly used in data systems to express signaling...
(217) How many voltage levels does a binary signal have?
(212) Which wireless design phase accounts for the amount of users on...
(232) Trend analysis is a program that ensures circuits meet...
(250) The basic configuration of the entry control facility includes a
(202) In the Open System Interconnect (OSI) model, a layer will...
(212) Which Institute of Electrical Electronics Engineers (IEEE)...
(214) Which physical security action can you take to ensure network...
(222) The signal components that occur as bands above and below a...
(205) How many subnet bits are required to support 90 subnets on a...
(211) Which of the following will minimize EtherChannel configuration...
(213) Simple Network Management Protocol (SNMP) is a tool used by...
(214) In general, you should deny direct dial-in access to a network...
(227) What do Global Positioning System (GPS) satellites use to...
(230) If the circuit files are lost or destroyed, what document are...
(236) Who determines if Preventative Maintenance Inspections (PMI) are...
(244) Which Digital Multiplex System (DMS)–100 database facility is...
(221) In common associated signaling (CAS), what is the seventh bit in...
(225) The method of multiplexing the T1 multiplexer uses is
(229) What web application is used to order telecommunications...
(235) Combined distribution frames encompass the functions of a main...
(206) Teredo has four tunneling components. Which one is not one of...
(216) Which option is a characteristic of synchronous data operation?
(222) What is the process, or result of the process, of modifying...
(222) To prevent frequency modulation (FM) radio stations from...
(231) What report must be sent if the circuit does not meet all...
(237) When a telephone network is circuit switched, each call
(240) What provides enterprise wide visibility into telecom resource...
(226) Which wave-division multiplexing technology uses uncooled lasers...
(227) Which stratum level is a Global Positioning System (GPS) timing...
(232) If a circuit fails its management threshold, what test might be...
(252) What type of signal is sent to the fence protection system (FPS)...
(225) What are the two major types of frame structures?
(231) Within how many normal duty hours of completion action on the...
(240) Which is not a component of the voice protection system...
(242) What is the maximum number of ports that a Meridian System...
(242) What Digital Multiplex System (DMS)–100 system contains...
(201) At what Open System Interconnection (OSI) layer are virtual...
(220) Which communications control signal uses a two-frequency dialing...
(224) Which form of multiplexing is very susceptible to signal...
(229) What document is the authority for the operations and...
(230) Which DD form do you use for an official narrative log that is...
(230) Which DD form is used as the primary source of information when...
(240) The vulnerabilities of voice and data converged networks were...
(240) Where are voice protection system servers installed?
(251) Which interior intrusion detection system is designed to detect...
(219) How many bits are in the extended superframe format (ESF)...
(247) What does the GVG–110 video switcher serial interface...
(248) Which basic circuit in the video distribution amplifier consists...
(252) What is the maximum detection distance in meters of an Infrared...
(216) A digital signal that contains synchronizing bits within the...
(220) The signaling equipment has three types of communications...
(238) In Integrated Services Digital Network (ISDN), the “B”...
(240) Which is not a characteristic and capability of a voice...
(243) Where do incoming (unswitched) circuits transmitted to the ENET...
(211) Which of the following is not a distinct layer of a hierarchical...
(221) Which common channel signaling (CCS) mode does the transfer of...
(227) To create a better timing environment in communications...
(242) What link is used to connect the Digital Multiplex System...
(246) Which digital broadcast system was adopted by the United States...
(252) What is the maximum length of the vertical taut-wire sensor...
(252) What is the secondary mode of detection for the microwave fence...
(223) Which type of pulse modulation is least affected by noise?
(245) What names are given to the shifted R–Y and B–Y signals,...
(223) The form of pulse modulation in which a discrete pulse is varied...
(228) Who is responsible for all circuits within their facility up to...
(230) Which test results do you record on the reverse/back side of the...
(234) When you must restore user service by rerouting, what is the...
(241) How many serial data interface ports does the Meridian Option...
(242) Which elements make up the control component of the SuperNode...
(244) Which Digital Multiplex System (DMS)–100 database facility...
(208) On a router’s serial interface connection, what provides the...
(218) Digital coding techniques such as binary with eight-zero...
(233) Which publication lists the methods used to identify systems,...
(240) During the initial research for voice system security, who...
(252) How many vertical taut-wire sensor (VTWS) sectors can be...
(228) Which agency has responsibility for a circuit end-to-end?
(223) Which form of modulation is insensitive to signal variations?
(244) Which Digital Multiplex System (DMS)–100 database facility...
(203) Which data communication protocol is a transmission code that...
(221) How is supervisory signaling information transferred in common...
(252) How many sensors does a taut-wire system in the Y taut-wire...
(252) What is the maximum length of the Y taut-wire sensor (YTWS)?
(251) What does the AN/GSS–39(V) system use to monitor the integrity...
(234) Which office or system confirms a restoration priority?
(247) The GVG–110 video switcher effects key fills with
(251) How many selectable frequencies are obtainable with a SD80DC...
(203) What data communication protocol uses characters or...
(247) The total number of effects storage registers in the GVG–110...