Z3d152 Volume 2

124 Questions | Attempts: 308
Please wait...
Question 1 / 125
🏆 Rank #--
Score 0/100

1. Which application layer protocol is used to synchronize the clocks of computers on a network?

Submit
Please wait...
About This Quiz
Z3d152 Volume 2 - Quiz

UREs from Z3D152 Volume 2 Edit Code 2

2.

What first name or nickname would you like us to use?

You may optionally provide this to label your report, leaderboard, or certificate.

2. Which of the following is an example of a video compression standard?

Submit

3. Which topology defines the way in which devices communicate and data is transmitted throughout the network?

Submit

4. The three cornerstones of voice network system security are availability,

Submit

5. What should security policies encompass to help mitigate the threat of convergence?

Submit

6. Which topology has the stations connected in the form of a circle?

Submit

7. What are attempts to gain access to a switch system by posing as an authorized user?

Submit

8. What allows transportation of all active Virtual LANs (VLAN) between switches using a single physical link?

Submit

9. In binary synchronous protocol, which characters establish and maintain character synchronization prior to the message block and during transmission?

Submit

10. Which data communication protocol is based on bits and the position of the bits?

Submit

11. A Management Information Base (MIB) is a collection of information that is organized...

Submit

12. Simple Network Management Protocol (SNMP) is a tool used by network administrators to manage network performance, investigate and solve network problems and help plan for...

Submit

13. Internet Protocol version 6 (IPv6) addresses are represented by...

Submit

14. The primary reason you should measure the voltage across faulty terminal protectors before removing and replacing them is to...

Submit

15. Which routing protocol do internet backbones use?

Submit

16. In an Intrusion Detection System (IDS), what is the main purpose of a boundary fence?

Submit

17. Which agency is the perferred transport provider for Internet and commercial satellite connections used for voice, video and/or data services on DOD networks?

Submit

18. Which network Class has the most addresses for hosts?

Submit

19. What type of signal is sent to the fence protection system (FPS) signal processor when an alarm is detected?

Submit

20. Which statement best describes a binary with eight-zero substitution (B8ZS) signal?

Submit

21. What identifier differentiates one wireless local area network (WLAN) from another?

Submit

22. What is most commonly used in data systems to express signaling speed?

Submit

23. In common associated signaling (CAS), what is the seventh bit in frames 6 and 12 used for?

Submit

24. Which network layer protocol matches a known Internet Protocol (IP) address for a destination device to a Media Access Control (MAC) address?

Submit

25. Which device has multiport connectivity that directs data between nodes on a network?

Submit

26. Which interior intrusion detection system (IIDS) sensor uses heat radiation to detect intruders?

Submit

27. Which topology combines two or more different physical topologies in a single network?

Submit

28. Which device subdivides a network into smaller logical pieces, or segments?

Submit

29. In what type of digital signal does the signal level move to one of the discrete signal levels, but returns to the zero level after a predetermined time?

Submit

30. Individual pulses within a digital signal are...

Submit

31. Which transport layer protocol provides reliable data delivery services?

Submit

32. Virtual Private Networks (VPNs) allow the AF to extend network resources acrss a/an...

Submit

33. In an Intrusion Detection System (IDS), what must a line of detection detect?

Submit

34. Who determines if Preventative Maintenance Inspections (PMI) are accomplished when commercial manuals or publications are not available?

Submit

35. How many subnet bits are required to support 90 subnets on a Class B network?

Submit

36. Teredo has four tunneling components. Which one is not one of them?

Submit

37. Which router port is used for initial configuration?

Submit

38. If the circuit files are lost or destroyed, what document are Technical Control Facilities required to obtain?

Submit

39. Which physical security action can you take to ensure network equipment supports the widest range of security services?

Submit

40. Which network layer protocol provides messaging that can help with troubleshooting?

Submit

41. What web application is used to order telecommunications products and services from the Defense Information Systems Agency (DISA)?

Submit

42. What document is the authority for the operations and maintenance agencies to procure specific devices and ancillary equipment necessary for the installation or operation of the circuit?

Submit

43. Which Digital Multiplex System (DMS)-100 database facility is responsible for creating and maintaining tables of data in a controlled manner?

Submit

44. What type alarm a=occurs if the sensor post cover in vertical taut-wire sensor (VTWS) is removed?

Submit

45. Trend analysis is a program that ensures circuits meet management thresholds on what basis?

Submit

46. Which of the following will minimize EtherChannel configuration problems?

Submit

47. In the Open System Interconnect (OSI) model, a layer will communicate with three other OSI layers. Which one is not one of those layers?

Submit

48. What Digital Multiplex System (DMS)-100 system contains subsystems for test routing, fault detection, fault analysis, and error reporting?

Submit

49. In Integrated Services Digital Network (ISDN), the "B" channel carries...

Submit

50. What provides enterprise wide visibility into telecom resource utilization, phone network usage, and incidents of toll fraud?

Submit

51. The basic configuration of the entry control facility includes a...

Submit

52. How many broadcast domains forms a Virtual LAN (VLAN)?

Submit

53. Which wireless design phase accounts for the amount of users on the network, the training required for the users and the security and integrity requirements of the network data?

Submit

54. Which is not a component of the Voice Protection System (VPS) architecture?

Submit

55. What is the process, or result of the process, of modifying (varying) one of more characteristics of a carrier signal in accordance with an instantaneous characteristic of an information signal?

Submit

56. Which communications control signal uses a two-frequency dialing combination?

Submit

57. Which stratum level is a Global Positioning System (GPS) timing source?

Submit

58. What names are given to the shifted R-Y and B-Y signals, respectively?

Submit

59. Which option is a characteristic of synchronous data operation?

Submit

60. When configuring a router, you control access to privileged EXEC mode by configuring which password?

Submit

61. How many voltage levels does a binary signal have?

Submit

62. In general, you should deny direct dial-in access to a network device by disabling which port?

Submit

63. Which Institute of Electrical Electronics Engineers (IEEE) specification is least susceptible to interference caused by household appliances and medical devices?

Submit

64. When a telephone network is circuit switched, each call...

Submit

65. What report must be sent if the circuit does not meet all required parameters and the Telecommunications Service Order (TSO) issuing authority advises that the circuit is accepted for service?

Submit

66. The signal components that occur as bands above and below a carrier are called...

Submit

67. What do Global Positioning System (GPS) satellites use to provide very precise time to GPS receivers?

Submit

68. At what Open System Interconnect (OSI) layer are virtual circuits established, maintained, and terminated?

Submit

69. A digital signal that contains synchronizing bits within the signal stream describes...

Submit

70. What are the two major types of frame structures?

Submit

71. What is the maximum number of ports that a Meridian System Logic-100 (MSL-100) supports?

Submit

72. Which basic circuit in the video distribution amplifier consists of two transistors that form the upper leg of a totem pole circuit?

Submit

73. Combined distribution frames encompass the functions of a main distribution frame and...

Submit

74. Which DD Form is used a the primary source of information when preparing DOD Information Network (DODIN) status reports?

Explanation

DD Form 1443, Outage and Restoration Record

Submit

75. The time it takes a switch to figure out where to forward a data unit is called its...

Submit

76. Which is not a characteristic and capability of a voice protection system?

Submit

77. The method of multiplexing the T1 multiplexer uses is...

Submit

78. Which wave-division multiplexing technology uses uncooled lasers to reduce cost?

Submit

79. The signaling equipment has three types of communications signals that function to...

Submit

80. Within how many normal duty hours of completion action on the Telecommunications Service Order (TSO) must the circuit control office (CCO) submit an in-effect report?

Submit

81. Which interior intrusion detection system s designed to detect intruders attempting to enter a shelter, storage igloo, or building?

Submit

82. What link is used to connect the Digital Multiplex System (DMS)-core to the DMS-bus?

Submit

83. Which digital Multiplex System (DMS)-100 database facility provides facilities for storing data modifications orders (DMO) and for retrieving them at a specific time for execution?

Submit

84. To prevent frequency modulation (FM) radio stations from interfering with each other, the Federal Communications Commission (FCC) has set limits that allow each station to cause its oscillator frequency to deviate no more than

Submit

85. What does the GVG-110 video switcher serial interface allow?

Submit

86. Which form of modulation is insensitive to signal variations?

Submit

87. Which of the following is not a distinct layer of hierarchical network design?

Submit

88. If a circuit fails its management threshold, what test might be performed?

Submit

89. What is the maximum detection distance in meters of an Infrared Pulsed Intrusion Detection System (IPIDS)?

Submit

90. To create a better timing environment in communications networks, external timing distribution occurs through...

Submit

91. On a router's serial interface connection, what provides the timing signal for the communication link?

Submit

92. When you must restore user service by rerouting, what is the second type of circuit you preempt?

Submit

93. The vulnerabilities of voice and data converged networks were highlighted in a report released by the...

Submit

94. Which test results do you record on the reverse/back side of the DD Form 1697-Analog?

Submit

95. How many framing bits are in the extended superframe format (ESF) framing sequence?

Submit

96. Which common channel signaling (CCS) mode does the transfer of messages relating to signaling between two points occur directly over links interconnecting the signaling points?

Submit

97. Which elements make up the control component of the SuperNode central control?

Submit

98. What is the secondary mode of detection for the microwave fence sensor?

Submit

99. During the initial research for voice system security, who recognized that the most common security threats could be addressed by voice protection system?

Submit

100. What does the AN/GSS-39(V) system use to monitor the integrity of all sensor wiring to the control panel?

Submit

101. Which Digital Multiplex System (DMS)-100 database facility provides facilities for preserving data modifications orders (DMO) on tape or disk so that data tables can be restored if the systems fail?

Submit

102. Who is responsible for all circuits within their facility up to the designated demarcation point and provides troubleshooting assistance at the direction of the Global NetOps Support Center (GNSC)?

Submit

103. Which form of multiplexing is very susceptible to signal deterioration?

Submit

104. Where are voice protection system servers installed?

Submit

105. Which digital broadcast system was adopted by the United States as the standard?

Submit

106. Which publication lists the methods used to identify systems, links, trunks, and circuits?

Submit

107. Which agency has responsibility for a circuit end-to-end?

Submit

108. Which type of pulse modulation is least affected by noise?

Submit

109. What is the maximum length of the vertical taut-wire sensor (VTWS)?

Submit

110. How is supervisory signaling information transferred in common channel signaling (CCS)?

Submit

111. How many vertical taut-wire sensor (VTWS) sectors can be services per field distribution box (FDB)?

Submit

112. How many sensors does a taut-wire system in the Y taut-wire sensor (YTWS) configuration contain?

Submit

113. Where do incoming (unswitched) circuits transmitted to the ENET enter the NT9X35A cross-point card?

Submit

114. Which office or system confirms a restoration priority?

Submit

115. How many serial data interface ports does the Meridian Option 11C Small System Controller have?

Submit

116. Digital coding techniques such as binary with eight-zero substitution (B8ZS) are becoming more popular because they are designed to...

Submit

117. What data communication protocol uses characters or "handshaking" to control the link and represent information?

Submit

118. Which DD form do you use for an official narrative log that is used to brief unit commanders?

Explanation

DD Form 1753, Master Station Log

Submit

119. Which data communication protocol is a transmission code that supports a variety of link types and topologies?

Submit

120. The form of pulse modulation in which a discrete pulse is varied within a range of positions is known as...

Submit

121. What is the maximum length of the Y taut-wire sensor (YTWS)?

Submit

122. The GVG-110 video switcher effects key fills with...

Submit

123. How many selectable frequencies are obtainable with an SD80DC microwave sensor?

Submit

124. The total number of effects storage registers in the GVG-110 video switcher is...

Submit
×
Saved
Thank you for your feedback!
View My Results
Cancel
  • All
    All (124)
  • Unanswered
    Unanswered ()
  • Answered
    Answered ()
Which application layer protocol is used to synchronize the clocks of...
Which of the following is an example of a video compression standard?
Which topology defines the way in which devices communicate and data...
The three cornerstones of voice network system security are...
What should security policies encompass to help mitigate the threat of...
Which topology has the stations connected in the form of a circle?
What are attempts to gain access to a switch system by posing as an...
What allows transportation of all active Virtual LANs (VLAN) between...
In binary synchronous protocol, which characters establish and...
Which data communication protocol is based on bits and the position of...
A Management Information Base (MIB) is a collection of information...
Simple Network Management Protocol (SNMP) is a tool used by network...
Internet Protocol version 6 (IPv6) addresses are represented by...
The primary reason you should measure the voltage across...
Which routing protocol do internet backbones use?
In an Intrusion Detection System (IDS), what is the main purpose...
Which agency is the perferred transport provider for Internet and...
Which network Class has the most addresses for hosts?
What type of signal is sent to the fence protection system (FPS)...
Which statement best describes a binary with eight-zero substitution...
What identifier differentiates one wireless local area network (WLAN)...
What is most commonly used in data systems to express signaling...
In common associated signaling (CAS), what is the seventh bit in...
Which network layer protocol matches a known Internet Protocol (IP)...
Which device has multiport connectivity that directs data between...
Which interior intrusion detection system (IIDS) sensor uses heat...
Which topology combines two or more different physical topologies in a...
Which device subdivides a network into smaller logical pieces, or...
In what type of digital signal does the signal level move to one of...
Individual pulses within a digital signal are...
Which transport layer protocol provides reliable data delivery...
Virtual Private Networks (VPNs) allow the AF to extend network...
In an Intrusion Detection System (IDS), what must a line of detection...
Who determines if Preventative Maintenance Inspections (PMI) are...
How many subnet bits are required to support 90 subnets on a Class B...
Teredo has four tunneling components. Which one is not one...
Which router port is used for initial configuration?
If the circuit files are lost or destroyed, what document are...
Which physical security action can you take to ensure network...
Which network layer protocol provides messaging that can help with...
What web application is used to order telecommunications products and...
What document is the authority for the operations and maintenance...
Which Digital Multiplex System (DMS)-100 database facility is...
What type alarm a=occurs if the sensor post cover in vertical...
Trend analysis is a program that ensures circuits meet management...
Which of the following will minimize EtherChannel configuration...
In the Open System Interconnect (OSI) model, a layer will...
What Digital Multiplex System (DMS)-100 system contains subsystems for...
In Integrated Services Digital Network (ISDN), the "B"...
What provides enterprise wide visibility into telecom resource...
The basic configuration of the entry control facility...
How many broadcast domains forms a Virtual LAN (VLAN)?
Which wireless design phase accounts for the amount of users on the...
Which is not a component of the Voice Protection System (VPS)...
What is the process, or result of the process, of modifying (varying)...
Which communications control signal uses a two-frequency dialing...
Which stratum level is a Global Positioning System (GPS) timing...
What names are given to the shifted R-Y and B-Y signals, respectively?
Which option is a characteristic of synchronous data operation?
When configuring a router, you control access to privileged EXEC mode...
How many voltage levels does a binary signal have?
In general, you should deny direct dial-in access to a network device...
Which Institute of Electrical Electronics Engineers (IEEE)...
When a telephone network is circuit switched, each call...
What report must be sent if the circuit does not meet...
The signal components that occur as bands above and below a carrier...
What do Global Positioning System (GPS) satellites use to provide very...
At what Open System Interconnect (OSI) layer are virtual circuits...
A digital signal that contains synchronizing bits within the signal...
What are the two major types of frame structures?
What is the maximum number of ports that a Meridian System...
Which basic circuit in the video distribution amplifier consists...
Combined distribution frames encompass the functions of a main...
Which DD Form is used a the primary source of information...
The time it takes a switch to figure out where to forward a data unit...
Which is not a characteristic and capability of a voice...
The method of multiplexing the T1 multiplexer uses is...
Which wave-division multiplexing technology uses uncooled lasers to...
The signaling equipment has three types of communications signals that...
Within how many normal duty hours of completion action on...
Which interior intrusion detection system s designed to detect...
What link is used to connect the Digital Multiplex System (DMS)-core...
Which digital Multiplex System (DMS)-100 database facility provides...
To prevent frequency modulation (FM) radio stations from interfering...
What does the GVG-110 video switcher serial interface allow?
Which form of modulation is insensitive to signal variations?
Which of the following is not a distinct layer of...
If a circuit fails its management threshold, what test might...
What is the maximum detection distance in meters of an Infrared...
To create a better timing environment in communications networks,...
On a router's serial interface connection, what provides the...
When you must restore user service...
The vulnerabilities of voice and data converged networks were...
Which test results do you record on the reverse/back side of...
How many framing bits are in the extended superframe format (ESF)...
Which common channel signaling (CCS) mode does the transfer of...
Which elements make up the control component of the SuperNode central...
What is the secondary mode of detection for the microwave...
During the initial research for voice system security, who recognized...
What does the AN/GSS-39(V) system use to monitor the integrity of all...
Which Digital Multiplex System (DMS)-100 database facility provides...
Who is responsible for all circuits within their facility up to the...
Which form of multiplexing is very susceptible to signal...
Where are voice protection system servers installed?
Which digital broadcast system was adopted by the United States as the...
Which publication lists the methods used to identify systems, links,...
Which agency has responsibility for a circuit end-to-end?
Which type of pulse modulation is least affected by noise?
What is the maximum length of the vertical taut-wire sensor...
How is supervisory signaling information transferred in common channel...
How many vertical taut-wire sensor (VTWS) sectors can be services per...
How many sensors does a taut-wire system in the Y taut-wire sensor...
Where do incoming (unswitched) circuits transmitted to the ENET enter...
Which office or system confirms a restoration priority?
How many serial data interface ports does the Meridian Option 11C...
Digital coding techniques such as binary with eight-zero substitution...
What data communication protocol uses characters or...
Which DD form do you use for an official narrative log that is used to...
Which data communication protocol is a transmission code that supports...
The form of pulse modulation in which a discrete pulse is varied...
What is the maximum length of the Y taut-wire sensor (YTWS)?
The GVG-110 video switcher effects key fills with...
How many selectable frequencies are obtainable with an SD80DC...
The total number of effects storage registers in the GVG-110 video...
play-Mute sad happy unanswered_answer up-hover down-hover success oval cancel Check box square blue
Alert!