1.
(201) What Air Force instruction series covers communications and information?
Correct Answer
D. 33.
Explanation
Air Force instruction series 33 covers communications and information.
2.
(201) What Air Force publication establishes policy on how C4 systems are aquired, operated, and maintained?
Correct Answer
A. AFPD 33-1
Explanation
AFPD 33-1 is the correct answer because it is the Air Force publication that specifically establishes policy on how C4 systems are acquired, operated, and maintained. The other options, AFPD 33-2, AFPD 33-202, and AFPD 33-204, may cover different topics or aspects of C4 systems, but they do not specifically address the policy for acquiring, operating, and maintaining these systems. Therefore, AFPD 33-1 is the most appropriate choice.
3.
(201) What Air Force publication identifies responsibilities for supporting critical Air Force communications and information networks, primarily through network control centers?
Correct Answer
C. AFI 33-115 Volume 1
Explanation
AFI 33-115 Volume 1 is the correct answer because it is an Air Force publication that specifically identifies responsibilities for supporting critical Air Force communications and information networks. It primarily does this through network control centers. AFPD 33-1 and AFPD 33-2 are not the correct answers as they do not focus on the responsibilities for supporting critical Air Force communications and information networks. Similarly, AFI 33-115 Volume 2 is not the correct answer as it does not specifically address the responsibilities for supporting critical Air Force communications and information networks.
4.
(201) What Air Force publication provides the policy and procedures for certifying network professionals who manage and operate government-provided information systems on Air Force networks?
Correct Answer
D. AFI 33-115 Volume 2
Explanation
AFI 33-115 Volume 2 is the correct answer because it provides the policy and procedures for certifying network professionals who manage and operate government-provided information systems on Air Force networks. AFPD 33-1 and AFPD 33-2 are Air Force policy directives that may provide broader guidance but do not specifically address the certification of network professionals. AFI 33-115 Volume 1 may provide some information on the topic but Volume 2 is the specific publication that focuses on the certification process.
5.
(202) What organization does communication and information services entering and exiting the base or site fall under the operational control of?
Correct Answer
C. Base network control center
Explanation
The correct answer is the Base network control center. This organization is responsible for the operational control of communication and information services entering and exiting the base or site. They oversee and manage the network infrastructure, ensuring the security and smooth functioning of communication systems within the base.
6.
(202) What function within the network control center provides technical assistance to the unit functional system administrators and workgroup managers?
Correct Answer
D. Network administration
Explanation
The function within the network control center that provides technical assistance to the unit functional system administrators and workgroup managers is network administration. This role is responsible for managing and maintaining the network infrastructure, ensuring its smooth operation, and providing support to the administrators and managers in resolving any technical issues or concerns they may have.
7.
(202) Whose network area of responsibility starts at the user's terminal and ends at the server, but does not include the network backbone infrastructure components?
Correct Answer
B. Unit functional systems administrator
Explanation
The Unit functional systems administrator is responsible for the network area that starts at the user's terminal and ends at the server. They are in charge of managing and supporting the functional systems within this network, but they do not have responsibility for the network backbone infrastructure components. This means that they are not involved in the administration and control of the overall network infrastructure, but rather focus on the systems and services that directly impact the users and servers.
8.
(202) What Air Force Instruction sets the policies that unit client support administrators must comply with?
Correct Answer
A. 33-115
Explanation
Air Force Instruction 33-115 sets the policies that unit client support administrators must comply with.
9.
(202) What network control center function responds to detected security incidents, network faults(errors), and user reported outages at the timeof help desk referral?
Correct Answer
B. Network management
Explanation
Network management is the correct answer because it involves the monitoring and control of a network's performance and resources. This includes responding to security incidents, network faults, and user reported outages. Network management ensures that the network is running smoothly, and any issues are addressed promptly to minimize disruptions and maintain the network's functionality.
10.
(202) What network control center function is the central point of contact for network distribution and maintenance/update of an Air Force Computer Emergency response team and automated systems security and antivirus software?
Correct Answer
D. Configuration management
Explanation
Configuration management is the correct answer because it refers to the function that is responsible for the distribution, maintenance, and update of network distribution and automated systems security and antivirus software. This function acts as the central point of contact for an Air Force Computer Emergency Response Team (AFCERT) and ensures that the network is properly configured and secured against potential threats.
11.
(202) Performance management can be broken into which two separate functional categories?
Correct Answer
A. Monitoring and tuning
Explanation
Performance management involves the process of monitoring and optimizing the performance of a system or process. Monitoring refers to the continuous tracking and measurement of performance metrics to identify any issues or deviations from desired performance levels. Tuning, on the other hand, involves making adjustments and optimizations to improve the performance based on the insights gained from monitoring. Therefore, monitoring and tuning are the two separate functional categories of performance management.
12.
(202) To determine the level of network service provided to the users, you will make a measurement of the total response time
Correct Answer
D. Rejection rate and availability of the network
Explanation
To determine the level of network service provided to the users, measuring the rejection rate and availability of the network is important. The rejection rate indicates the number of requests that are denied or not processed by the network, which can be an indicator of the network's capacity or efficiency. Availability refers to the percentage of time that the network is operational and accessible to users. By considering both rejection rate and availability, one can assess the network's performance and its ability to handle user requests effectively. Average bandwidth alone does not provide a comprehensive understanding of the network service, and systems failure rate is not directly related to the level of network service provided.
13.
(202) What network control center function increases network reliability by giving the network manager tools to detect problems and initiate recovery procedures?
Correct Answer
A. Fault management
Explanation
Fault management is the correct answer because it refers to the function that increases network reliability by providing the network manager with tools to detect problems and initiate recovery procedures. This involves monitoring the network for any faults or errors, identifying the root cause of the issue, and taking necessary actions to resolve it. By effectively managing faults, network downtime can be minimized, ensuring the smooth operation of the network and improving its overall reliability.
14.
(202) What does network security work to ensure about a network?
Correct Answer
A. Availability, confidentiality, and data integrity
Explanation
Network security works to ensure the availability, confidentiality, and data integrity of a network. Availability refers to the network being accessible and operational for authorized users. Confidentiality ensures that sensitive information is only accessible to authorized individuals. Data integrity ensures that data remains accurate and unaltered during transmission and storage.
15.
(203) Which of the following jobs are performed by a help desk technician on a daily basis?
Correct Answer
B. Network monitoring, account unlocks, and account creations
Explanation
A help desk technician performs network monitoring on a daily basis to ensure the smooth functioning of the network and identify any issues or abnormalities. They also handle account unlocks, which involves assisting users in regaining access to their accounts after they have been locked due to various reasons such as incorrect passwords. Additionally, they are responsible for account creations, which involves setting up new user accounts and granting appropriate access privileges. These tasks are part of the regular responsibilities of a help desk technician in order to provide technical support and maintain the efficiency of the system.
16.
(203) Within the NCC, what function is initially responsible for taking trouble calls, deciding what type of problem has occurred, and what to do about the problem?
Correct Answer
A. Help desk
Explanation
The help desk is initially responsible for taking trouble calls, deciding what type of problem has occurred, and determining the appropriate course of action. They are the first point of contact for users who are experiencing issues or have questions about the network. The help desk staff assesses the problem, identifies its nature, and provides guidance or escalates the issue to the appropriate department for further resolution.
17.
(203) What is one of the most important communication skills you can develop as a help desk operator?
Correct Answer
C. Listening
Explanation
Listening is one of the most important communication skills that a help desk operator can develop. As a help desk operator, it is crucial to actively listen to the concerns and issues raised by the customers. By listening attentively, the operator can fully understand the problem and provide appropriate solutions. Additionally, listening allows the operator to show empathy and build rapport with the customers, which can enhance the overall customer experience and satisfaction.
18.
(203) What software is used to open trouble tickets for customer trouble calls?
Correct Answer
B. Remedy
Explanation
Remedy is the software used to open trouble tickets for customer trouble calls. This software is specifically designed for managing and tracking customer issues and incidents. It allows customer service representatives to log and track customer complaints, assign them to appropriate teams or individuals, and monitor the progress until the issue is resolved. Remedy provides a centralized platform for efficient communication and problem resolution, ensuring smooth customer support operations.
19.
(204) What is a set of subnets that are connected with routers?
Correct Answer
A. Internetwork
Explanation
An internetwork is a set of subnets that are connected with routers. Routers are used to connect different subnets and enable communication between them. Therefore, an internetwork refers to a network that consists of multiple interconnected subnets, allowing for data to be routed between them.
20.
(204) What is a set of systems/nodes on a local segment that can be off of a switch or router?
Correct Answer
B. Intranetwork
Explanation
An intranetwork refers to a set of systems or nodes that are connected on a local segment, which can be either a switch or a router. This network is private and is only accessible to authorized users within an organization. It allows for the sharing of resources, such as files and printers, and facilitates communication and collaboration among employees. Unlike an internetwork, which connects multiple networks together, an intranetwork is confined to a specific local area.
21.
(204) What type of network environments consist of computer systems from different vendors that run different operating systems and communication protocols?
Correct Answer
D. Heterogeneous network
Explanation
A heterogeneous network consists of computer systems from different vendors that run different operating systems and communication protocols. In this type of network environment, there is a mix of hardware and software from various manufacturers and developers. This can present challenges in terms of compatibility and interoperability between different systems. However, it also allows for greater flexibility and diversity in terms of technology choices and capabilities.
22.
(204) What type of network is made up of components from the same vendor or compatible equipment that all run under the same operating system or network operating system?
Correct Answer
C. Homogeneous network
Explanation
A homogeneous network is a type of network that is made up of components from the same vendor or compatible equipment, all running under the same operating system or network operating system. This means that all the devices and software in the network are designed to work seamlessly together, resulting in a more efficient and reliable network infrastructure. This type of network simplifies management and troubleshooting processes as there is a uniformity in the hardware and software used.
23.
(204) What type of communications network serves users within a confined geographical area?
Correct Answer
A. Local area network
Explanation
A local area network (LAN) is a type of communications network that serves users within a confined geographical area, such as a home, office, or campus. It is designed to connect computers and devices in close proximity to each other, allowing for the sharing of resources, such as files, printers, and internet access. LANs typically have high data transfer rates and low latency, making them ideal for local communication needs.
24.
(204) What type of communications network links geographically dispersed offices in other cities or around the globe?
Correct Answer
C. Wide area network
Explanation
A wide area network (WAN) is a type of communications network that connects geographically dispersed offices in different cities or even around the world. Unlike a local area network (LAN) or metropolitan area network (MAN), which are limited to a specific location or region, a WAN allows for long-distance connectivity and enables organizations to share resources, data, and applications across multiple locations. An enterprise network refers to the overall network infrastructure of an organization, which can include both LANs and WANs.
25.
(204) How many users are in a peer-to-peer network?
Correct Answer
A. 2 to 10
Explanation
A peer-to-peer network is a decentralized network where all devices are equal and can act as both clients and servers. In such a network, the number of users can vary, but typically it ranges from 2 to 10. This limited number of users ensures efficient communication and sharing of resources among the peers.
26.
(204) How many users are in a single-server network?
Correct Answer
B. 10 to 50
Explanation
A single-server network typically refers to a network where all users are connected to a central server. The given answer range of 10 to 50 suggests that in a single-server network, there are typically between 10 and 50 users. This range indicates that the network is relatively small in scale, with a moderate number of users relying on the central server for their network services and resources.
27.
(204) How many users are in a multi-server high-speed backbone network?
Correct Answer
D. 250 to 1000
Explanation
A multi-server high-speed backbone network is designed to handle large amounts of traffic and connect multiple users. The range of 250 to 1000 users suggests that this network can support a significant number of users, making it suitable for medium to large organizations or institutions. This range indicates that the network has the capacity to handle a substantial user base while maintaining efficient data transfer and high-speed connectivity.
28.
(204) In most cases the frequencies used by wireless networks are in what frequency band?
Correct Answer
D. Industrial, scientific, and medical (ISM)
Explanation
Wireless networks typically use frequencies in the Industrial, Scientific, and Medical (ISM) frequency band. This band is specifically designated for non-communication purposes such as scientific research, industrial equipment, and medical devices. It is commonly used for Wi-Fi networks, Bluetooth devices, and other wireless technologies. The television band, very high frequency (VHF), and ultra high frequency (UHF) are not typically used for wireless networks.
29.
(205) What is the distorting and/or weakening of a signal as it traverses the media called?
Correct Answer
A. Attenuation
Explanation
Attenuation refers to the process of reducing the strength or intensity of a signal as it travels through a medium. This can occur due to various factors such as distance, interference, or the characteristics of the medium itself. Attenuation can result in a loss of signal quality, clarity, or strength, making it appear weaker or distorted at the receiving end. Impedance, resistance, and inductive coupling are all related concepts but do not specifically refer to the distorting or weakening of a signal as it traverses the media.
30.
(205) What is a measurement of data transferred through the medium between network connections?
Correct Answer
C. Throughput
Explanation
Throughput refers to the amount of data that can be transferred through a network connection within a given period of time. It measures the efficiency and speed of data transfer between devices connected in a network. A higher throughput indicates a faster and more efficient transmission of data, while a lower throughput suggests slower data transfer. Therefore, throughput is the measurement of data transferred through the medium between network connections.
31.
(205) What is a form of communication that transmits information as a serial stream of bits or bytes?
Correct Answer
A. Asynchronous communication
Explanation
Asynchronous communication is a form of communication that transmits information as a serial stream of bits or bytes. In this type of communication, data is sent without the need for a synchronized clock signal. Instead, each data packet is accompanied by start and stop bits, allowing the receiver to interpret the data at its own pace. This method is commonly used in computer networks and telecommunications systems where devices may operate at different speeds or have varying response times.
32.
(205) Which of the following categories of twisted-pair cable has the highest throughput?
Correct Answer
D. Cat 5
Explanation
Cat 5 twisted-pair cable has the highest throughput among the given options. This is because Cat 5 cable has a higher bandwidth compared to Cat 2, Cat 3, and Cat 4 cables. It is capable of supporting data transfer rates of up to 1000 Mbps (1 Gbps). Cat 5 cable is commonly used for Ethernet networks and is suitable for various applications, including video streaming, online gaming, and large file transfers.
33.
(206) A fiber optic network uses a laser or light-emitting diode to send a signal through what portion of the cable?
Correct Answer
A. Core
Explanation
A fiber optic network uses a laser or light-emitting diode to send a signal through the core of the cable. The core is the innermost part of the cable and is responsible for transmitting the light signals. The cladding, buffer, and kevlar are other components of the cable that provide protection and support, but they do not directly transmit the signal.
34.
(206) Light signals in fiber optic cables can travel distances in excess of how many miles before they need to be boosted?
Correct Answer
C. 100
Explanation
Light signals in fiber optic cables can travel distances in excess of 100 miles before they need to be boosted. This is because fiber optic cables use total internal reflection to guide the light signals along the cable without significant loss of signal strength. The light signals bounce off the walls of the cable, allowing them to travel long distances without the need for boosting or amplification. This makes fiber optic cables ideal for long-distance communication and data transmission.
35.
(206) What type of fiber optic is used to span extremely long distances?
Correct Answer
D. Single mode
Explanation
Single mode fiber optic is used to span extremely long distances. This type of fiber optic has a smaller core size, allowing light to travel in a straight line, minimizing signal loss and allowing for longer distances. It is designed to carry a single mode of light, which means that only one wavelength of light is transmitted, resulting in a higher bandwidth and longer transmission distances compared to multi-mode fiber optic.
36.
(206) What type of fiber optic is designed for the local area network environment and light is typically generated with a light emitting diode?
Correct Answer
C. Multi mode
Explanation
Multi mode fiber optic is designed for the local area network environment and light is typically generated with a light emitting diode. Multi mode fiber optic cables have a larger core diameter compared to single mode fiber optic cables, allowing multiple modes or paths for light to travel through. This makes multi mode fiber optic suitable for short-distance communication within a local area network. The use of a light emitting diode as the light source in multi mode fiber optic is cost-effective and suitable for shorter distances.
37.
(206) What are the principal advantages of fiber optics with present day transmission technology?
Correct Answer
A. Sturdiness and security
Explanation
Fiber optics have the principal advantages of sturdiness and security in present day transmission technology. The durability of fiber optic cables makes them resistant to physical damage, such as interference from weather conditions or electromagnetic interference. Additionally, fiber optics provide enhanced security as they are difficult to tap into or intercept, making them more secure for transmitting sensitive data.
38.
(207) What network topology consists of a single central cable to which all computers and other devices connect?
Correct Answer
B. Bus
Explanation
A network topology that consists of a single central cable to which all computers and other devices connect is called a bus topology. In this type of network, all devices are connected to a single cable, known as the bus or backbone. Data is transmitted along the bus, and each device listens for the data intended for it. If a device wants to transmit data, it sends it onto the bus, and all devices receive the data, but only the intended recipient processes it.
39.
(207) What is the greatest risk to a bus network?
Correct Answer
C. The bus itself becoming inoperable
Explanation
The greatest risk to a bus network is the bus itself becoming inoperable. If the bus malfunctions or breaks down, it can disrupt the entire network, causing delays and inconvenience for passengers. This can lead to loss of revenue and negative impact on the overall efficiency of the bus network. Therefore, ensuring the proper functioning and maintenance of the buses is crucial to minimize the risk of network disruptions.
40.
(207) On what network topology can multiple transmit frames co-exist?
Correct Answer
D. Fiber distributed data interface
Explanation
Fiber distributed data interface (FDDI) is a network topology that allows multiple transmit frames to co-exist. FDDI uses a dual ring topology, where data is transmitted in both directions simultaneously. This allows for high-speed and reliable communication between multiple devices on the network. The use of fiber optic cables in FDDI also ensures fast data transmission over long distances without any loss or interference. Therefore, FDDI is the correct answer for the given question.
41.
(208) What is the major Department of Defense contribution to networking?
Correct Answer
D. The transmission control protocol/internet protocol (TCP/IP) suite
Explanation
The major Department of Defense contribution to networking is the transmission control protocol/internet protocol (TCP/IP) suite. TCP/IP is a set of protocols that allows computers to communicate over a network. It provides a standardized way for data to be transmitted and received, ensuring that information can flow smoothly between different devices and networks. TCP/IP is the foundation of the internet and is used by virtually all modern computer networks.
42.
(208) What is the set of rules that define how communications are to take place in a network, including the format, timing, sequences, and error checking and correction?
Correct Answer
B. A protocol
Explanation
A protocol is a set of rules that governs how communications are conducted in a network. It specifies the format, timing, sequences, error checking, and correction methods to ensure reliable and efficient data transmission. By following a protocol, devices in a network can communicate with each other effectively and understand how to interpret and respond to data packets.
43.
(208) What layer of the OSI reference model is really a set of rules regarding the hardware used to transmit data?
Correct Answer
A. pHysical
Explanation
The physical layer of the OSI reference model is responsible for defining the hardware and electrical specifications required to transmit data. It deals with the physical connection between devices and includes aspects such as cables, connectors, and signaling. This layer ensures that the data is transmitted in the form of electrical or optical signals over the physical medium.
44.
(208) What layer of the Open Systems Interconnection reference model provides the grammar by which machines converse with each other and serves as a vehicle for information transmission?
Correct Answer
B. Data link
Explanation
The data link layer of the Open Systems Interconnection reference model provides the grammar by which machines converse with each other and serves as a vehicle for information transmission. This layer is responsible for the reliable transmission of data frames between nodes on a network, ensuring error-free and efficient communication. It handles tasks such as framing, error detection and correction, flow control, and access control.
45.
(208) What layer of the OSI model prevents a fast computer from overwhelming a slow terminal?
Correct Answer
D. Transport
Explanation
The transport layer of the OSI model is responsible for ensuring reliable and efficient communication between end systems. It prevents a fast computer from overwhelming a slow terminal by implementing flow control mechanisms. These mechanisms regulate the amount of data that can be sent from the fast computer to the slow terminal, preventing congestion and ensuring that the slow terminal can process the data at its own pace.
46.
(208) A feature which involves the periodic insertion of points into data from which any recovery necessary can be started is known as what?
Correct Answer
A. Checkpointing
Explanation
Checkpointing is a feature that involves the periodic insertion of points into data from which any recovery necessary can be started. It allows for the creation of restore points in a system, enabling the system to recover from errors or failures by reverting back to a previous checkpoint. This feature is commonly used in computer systems and databases to ensure data integrity and provide a mechanism for fault tolerance.
47.
(208) Which layer of the OSI model is concerned with network security, file transfers, and formatting functions?
Correct Answer
D. Presentation
Explanation
The presentation layer of the OSI model is responsible for ensuring that data is properly formatted, encrypted, and decrypted for transmission between different systems. It handles tasks such as data compression, encryption, and decryption, as well as converting data from one format to another. While network security and file transfers can involve multiple layers of the OSI model, the presentation layer specifically deals with the formatting and security aspects of data transmission.
48.
(209) The IEEE 802.3 standard describes a local area network using what kind of topology?
Correct Answer
A. Bus
Explanation
The IEEE 802.3 standard describes a local area network using a bus topology. In a bus topology, all devices are connected to a single cable called the bus. Data is transmitted in both directions on the bus, and all devices on the network can see and receive the transmitted data. This type of topology is simple and cost-effective, but it can be prone to collisions and network congestion.
49.
(209) What protocol is used by the IEEE 802.3 standard to avoid collisions on the network?
Correct Answer
D. Carrier sense multiple access/collision detection CSMA/CD
Explanation
The correct answer is carrier sense multiple access/collision detection (CSMA/CD). CSMA/CD is a protocol used by the IEEE 802.3 standard to avoid collisions on the network. It works by having devices on the network listen for traffic before transmitting data. If a device detects that the network is busy, it waits for a random amount of time before attempting to transmit again. This helps to prevent collisions and ensures that data is transmitted smoothly on the network.
50.
(209) What does a station specifically send when it sends a general request through the network asking any station to respond to receive the token?
Correct Answer
D. Solicit successor frame
Explanation
A station specifically sends a "solicit successor frame" when it sends a general request through the network asking any station to respond to receive the token.