Z3d152 Volume 2

124 Questions | Attempts: 308
Share

SettingsSettingsSettings
Z3d152 Volume 2 - Quiz

UREs from Z3D152 Volume 2 Edit Code 2


Questions and Answers
  • 1. 

    At what Open System Interconnect (OSI) layer are virtual circuits established, maintained, and terminated?

    • A.

      Network

    • B.

      Physical

    • C.

      Data Link

    • D.

      Transport

    Correct Answer
    D. Transport
  • 2. 

    Which of the following is an example of a video compression standard?

    • A.

      Motion Picture Experts Group-4 (MPEG-4)

    • B.

      Joint Photographic Experts Group (JPEG)

    • C.

      File Transfer Protocol (FTP)

    • D.

      G.711

    Correct Answer
    A. Motion Picture Experts Group-4 (MPEG-4)
  • 3. 

    In the Open System Interconnect (OSI) model, a layer will communicate with three other OSI layers. Which one is not one of those layers?

    • A.

      Layer above.

    • B.

      Layer below.

    • C.

      Lowest layer.

    • D.

      Peer layer.

    Correct Answer
    C. Lowest layer.
  • 4. 

    What data communication protocol uses characters or "handshaking" to control the link and represent information?

    • A.

      Asynchronous protocol.

    • B.

      Binary synchronous protocol.

    • C.

      Synchronous Data Link Control (SDLC)

    • D.

      High-Level Data Link Control (HDLC)

    Correct Answer
    B. Binary synchronous protocol.
  • 5. 

    In binary synchronous protocol, which characters establish and maintain character synchronization prior to the message block and during transmission?

    • A.

      SEQ

    • B.

      SYN

    • C.

      STX

    • D.

      EST

    Correct Answer
    B. SYN
  • 6. 

    Which data communication protocol is based on bits and the position of the bits?

    • A.

      Character-oriented

    • B.

      Bit-oriented

    • C.

      Network

    • D.

      Routing

    Correct Answer
    B. Bit-oriented
  • 7. 

    Which data communication protocol is a transmission code that supports a variety of link types and topologies?

    • A.

      Asynchronous protocol

    • B.

      Binary synchronous protocol

    • C.

      Synchronous Data Link Control (SDLC)

    • D.

      High-Level Data Link Control (HDLC)

    Correct Answer
    C. Synchronous Data Link Control (SDLC)
  • 8. 

    Which network layer protocol matches a known Internet Protocol (IP) address for a destination device to a Media Access Control (MAC) address?

    • A.

      IP

    • B.

      Address Resolution Protocol (ARP)

    • C.

      Reverse Address Resolution Protocol (RARP)

    • D.

      Internet Control Message Protocol (ICMP)

    Correct Answer
    B. Address Resolution Protocol (ARP)
  • 9. 

    Which network layer protocol provides messaging that can help with troubleshooting?

    • A.

      Internet Protocol (IP)

    • B.

      Address Resolution Protocol (ARP)

    • C.

      Reverse Address Resolution Protocol (RARP)

    • D.

      Internet Control Message Protocol (ICMP)

    Correct Answer
    D. Internet Control Message Protocol (ICMP)
  • 10. 

    Which transport layer protocol provides reliable data delivery services?

    • A.

      Internet Protocol (IP)

    • B.

      User Datagram Protocol (UDP)

    • C.

      Transmission Control Protocol (TCP)

    • D.

      Internet Control Message Protocol (ICMP)

    Correct Answer
    C. Transmission Control Protocol (TCP)
  • 11. 

    Which application layer protocol is used to synchronize the clocks of computers on a network?

    • A.

      Simple Network Management Protocol (SNMP)

    • B.

      Dynamic Host Configuration Protocol (DHCP)

    • C.

      Network Time Protocol (NTP)

    • D.

      Packet Internet Groper (PING)

    Correct Answer
    C. Network Time Protocol (NTP)
  • 12. 

    Which network Class has the most addresses for hosts?

    • A.

      A

    • B.

      B

    • C.

      C

    • D.

      D

    Correct Answer
    A. A
  • 13. 

    How many subnet bits are required to support 90 subnets on a Class B network?

    • A.

      Three

    • B.

      Five

    • C.

      Seven

    • D.

      Nine

    Correct Answer
    C. Seven
  • 14. 

    Internet Protocol version 6 (IPv6) addresses are represented by...

    • A.

      8 groups of dotted decimal numbers.

    • B.

      8 groups of hexadecimal numbers.

    • C.

      4 dotted decimal numbers.

    • D.

      128 decimal numbers.

    Correct Answer
    B. 8 groups of hexadecimal numbers.
  • 15. 

    Teredo has four tunneling components. Which one is not one of them?

    • A.

      Host-specific relay

    • B.

      Client

    • C.

      Server

    • D.

      Agent

    Correct Answer
    D. Agent
  • 16. 

    Which device has multiport connectivity that directs data between nodes on a network?

    • A.

      Bridge

    • B.

      Router

    • C.

      Gateway

    • D.

      Repeater

    Correct Answer
    B. Router
  • 17. 

    Which routing protocol do internet backbones use?

    • A.

      Border Gateway Protocol (BGP)

    • B.

      Open Shortest Path First (OSPF)

    • C.

      Routing Information Protocol (RIP)

    • D.

      Enhanced Interior Gateway Routing Protocol (EIGRP)

    Correct Answer
    A. Border Gateway Protocol (BGP)
  • 18. 

    Which router port is used for initial configuration?

    • A.

      Auxiliary

    • B.

      Console

    • C.

      Ethernet

    • D.

      Telnet

    Correct Answer
    B. Console
  • 19. 

    When configuring a router, you control access to privileged EXEC mode by configuring which password?

    • A.

      Line console

    • B.

      Line vty

    • C.

      Enable

    • D.

      Secret

    Correct Answer
    C. Enable
  • 20. 

    On a router's serial interface connection, what provides the timing signal for the communication link?

    • A.

      Data communications equipment

    • B.

      Data terminal equipment

    • C.

      Internal oscillator

    • D.

      Atomic clock

    Correct Answer
    A. Data communications equipment
  • 21. 

    Virtual Private Networks (VPNs) allow the AF to extend network resources acrss a/an...

    • A.

      Department of Defense network

    • B.

      Air Force network

    • C.

      Local area network

    • D.

      Public network

    Correct Answer
    D. Public network
  • 22. 

    Which topology defines the way in which devices communicate and data is transmitted throughout the network?

    • A.

      Physical

    • B.

      Logical

    • C.

      Hybrid

    • D.

      Star

    Correct Answer
    B. Logical
  • 23. 

    Which topology has the stations connected in the form of a circle?

    • A.

      Bus

    • B.

      Ring

    • C.

      Star

    • D.

      Hybrid

    Correct Answer
    B. Ring
  • 24. 

    Which topology combines two or more different physical topologies in a single network?

    • A.

      Bus

    • B.

      Ring

    • C.

      Star

    • D.

      Hybrid

    Correct Answer
    D. Hybrid
  • 25. 

    Which device subdivides a network into smaller logical pieces, or segments?

    • A.

      Switch

    • B.

      Firewall

    • C.

      Gateway

    • D.

      Repeater

    Correct Answer
    A. Switch
  • 26. 

    The time it takes a switch to figure out where to forward a data unit is called its...

    • A.

      Lag.

    • B.

      Hop.

    • C.

      Latency.

    • D.

      Time zone.

    Correct Answer
    C. Latency.
  • 27. 

    Which of the following is not a distinct layer of hierarchical network design?

    • A.

      Core

    • B.

      Access

    • C.

      Transport

    • D.

      Distribution

    Correct Answer
    C. Transport
  • 28. 

    How many broadcast domains forms a Virtual LAN (VLAN)?

    • A.

      1

    • B.

      2

    • C.

      3

    • D.

      4

    Correct Answer
    A. 1
  • 29. 

    What allows transportation of all active Virtual LANs (VLAN) between switches using a single physical link?

    • A.

      VLAN trunks

    • B.

      VLAN frames

    • C.

      VLAN links

    • D.

      VLAN ports

    Correct Answer
    A. VLAN trunks
  • 30. 

    Which of the following will minimize EtherChannel configuration problems?

    • A.

      Disable all the interfaces after creating the EtherChannel

    • B.

      Configure all interfaces to operate at the same speed and duplex mode

    • C.

      Configure all interfaces for the same parameters as the last port configured

    • D.

      Assign all interfaces in the EtherChannel to a different Virtual LAN (VLAN)

    Correct Answer
    B. Configure all interfaces to operate at the same speed and duplex mode
  • 31. 

    Which Institute of Electrical Electronics Engineers (IEEE) specification is least susceptible to interference caused by household appliances and medical devices?

    • A.

      802.11a

    • B.

      802.11b

    • C.

      802.11g

    • D.

      802.11r

    Correct Answer
    A. 802.11a
  • 32. 

    Which wireless design phase accounts for the amount of users on the network, the training required for the users and the security and integrity requirements of the network data?

    • A.

      Planning

    • B.

      Securing

    • C.

      Deployment

    • D.

      Management

    Correct Answer
    A. Planning
  • 33. 

    What identifier differentiates one wireless local area network (WLAN) from another?

    • A.

      Hostname

    • B.

      Network name

    • C.

      Service Set Identifier (SSID)

    • D.

      Virtual LAN Identifier (VLAN ID)

    Correct Answer
    C. Service Set Identifier (SSID)
  • 34. 

    A Management Information Base (MIB) is a collection of information that is organized...

    • A.

      Alphabetically

    • B.

      Hierarchically

    • C.

      Numerically

    • D.

      Objectively

    Correct Answer
    B. Hierarchically
  • 35. 

    Simple Network Management Protocol (SNMP) is a tool used by network administrators to manage network performance, investigate and solve network problems and help plan for...

    • A.

      Future growth.

    • B.

      Network security.

    • C.

      Remote monitoring.

    • D.

      Network contingencies.

    Correct Answer
    A. Future growth.
  • 36. 

    Which physical security action can you take to ensure network equipment supports the widest range of security services?

    • A.

      Configure the equipment with the maximum amount of memory possible

    • B.

      Configure the equipment to use a line console password

    • C.

      Power cycle the equipment at the end of the day

    • D.

      Configure the equipment using setup mode

    Correct Answer
    A. Configure the equipment with the maximum amount of memory possible
  • 37. 

    In general, you should deny direct dial-in access to a network device by disabling which port?

    • A.

      Console

    • B.

      Auxiliary

    • C.

      Interface

    • D.

      Virtual terminal

    Correct Answer
    B. Auxiliary
  • 38. 

    Individual pulses within a digital signal are...

    • A.

      Bits.

    • B.

      Bytes.

    • C.

      Codes.

    • D.

      Blocks.

    Correct Answer
    A. Bits.
  • 39. 

    What is most commonly used in data systems to express signaling speed?

    • A.

      Baud rate

    • B.

      Interface speed

    • C.

      Bits per second

    • D.

      Baud per second

    Correct Answer
    C. Bits per second
  • 40. 

    Which option is a characteristic of synchronous data operation?

    • A.

      Timing pulses are transmitted within the signal stream

    • B.

      Start and stop pulses control data transmission

    • C.

      System timing is not of critical importance

    • D.

      All data bits are the same length in time

    Correct Answer
    D. All data bits are the same length in time
  • 41. 

    A digital signal that contains synchronizing bits within the signal stream describes...

    • A.

      Synchronous operation.

    • B.

      Asynchronous operation.

    • C.

      Synchronous and/or isochronous operation

    • D.

      Asynchronous and/or synchronous operation

    Correct Answer
    B. Asynchronous operation.
  • 42. 

    How many voltage levels does a binary signal have?

    • A.

      1

    • B.

      2

    • C.

      3

    • D.

      4

    Correct Answer
    B. 2
  • 43. 

    In what type of digital signal does the signal level move to one of the discrete signal levels, but returns to the zero level after a predetermined time?

    • A.

      Non-return-to-zero (NRZ) level

    • B.

      NRZ mark

    • C.

      NRZ space

    • D.

      Return-to-zero

    Correct Answer
    D. Return-to-zero
  • 44. 

    Digital coding techniques such as binary with eight-zero substitution (B8ZS) are becoming more popular because they are designed to...

    • A.

      Provide error-free signaling.

    • B.

      Operate at higher data rates.

    • C.

      Eliminate bipolar violations.

    • D.

      Maintain ones density standards.

    Correct Answer
    D. Maintain ones density standards.
  • 45. 

    Which statement best describes a binary with eight-zero substitution (B8ZS) signal?

    • A.

      The information is transmitted in three different voltage levels.

    • B.

      A logic one is transmitted as positive voltage if the previous logic one was negative.

    • C.

      The level always returns to zero for 50 percent of the bit cycle after every transition.

    • D.

      Bipolar violations are intentionally inserted into a data signal to break up long strings of zeros.

    Correct Answer
    D. Bipolar violations are intentionally inserted into a data signal to break up long strings of zeros.
  • 46. 

    How many framing bits are in the extended superframe format (ESF) framing sequence?

    • A.

      8

    • B.

      12

    • C.

      24

    • D.

      48

    Correct Answer
    C. 24
  • 47. 

    The signaling equipment has three types of communications signals that function to...

    • A.

      Process witch addressing.

    • B.

      Control digit translations.

    • C.

      Control and process calls.

    • D.

      Provide a clear signal.

    Correct Answer
    C. Control and process calls.
  • 48. 

    Which communications control signal uses a two-frequency dialing combination?

    • A.

      Pulse

    • B.

      Tone

    • C.

      Digit

    • D.

      Address

    Correct Answer
    B. Tone
  • 49. 

    In common associated signaling (CAS), what is the seventh bit in frames 6 and 12 used for?

    • A.

      Bit robbing

    • B.

      Bit stuffing

    • C.

      Frame correction

    • D.

      Frame enhancement

    Correct Answer
    A. Bit robbing
  • 50. 

    How is supervisory signaling information transferred in common channel signaling (CCS)?

    • A.

      Bit robbing

    • B.

      Bit stuffing

    • C.

      Frame correction

    • D.

      Separate network channel

    Correct Answer
    D. Separate network channel

Quiz Review Timeline +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Aug 07, 2017
    Quiz Edited by
    ProProfs Editorial Team
  • Jul 20, 2017
    Quiz Created by
    Sab428
Back to Top Back to top
Advertisement
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.