1.
What does AFPD 33-1 Establish policy on?
Correct Answer
C. Establishes policy on how command, control, communications and computer (C4) systems are acquired, operated, and maintained.
Explanation
The correct answer is "Establishes policy on how command, control, communications and computer (C4) systems are acquired, operated, and maintained." This answer accurately describes the purpose of AFPD 33-1, which is to establish policy guidelines for the acquisition, operation, and maintenance of command, control, communications, and computer systems. It outlines the standardized management practices for planning and implementing these systems and the base-level infrastructure.
2.
What Air Force Instruction sets the policies that unit client support administrators must comply with?
Correct Answer
A. 33-115
Explanation
Air Force Instruction 33-115 sets the policies that unit client support administrators must comply with.
3.
What Air Force publication provides the policy and procedures for certifying network professionals who manage and operate government-provided information systems on Air Force networks?
Correct Answer
D. AFI 33-115 Volume 2
Explanation
AFI 33-115 Volume 2 is the correct answer because it provides the policy and procedures for certifying network professionals who manage and operate government-provided information systems on Air Force networks. This publication outlines the requirements and guidelines for certification, ensuring that network professionals have the necessary skills and knowledge to effectively and securely manage Air Force networks.
4.
What function within the Network Control Center provides technical assitance to the unit functional system administrators and workgroup managers?
Correct Answer
D. Network Administration
Explanation
The function within the Network Control Center that provides technical assistance to the unit functional system administrators and workgroup managers is Network Administration. This function is responsible for managing and maintaining the network infrastructure, ensuring its smooth operation, and providing support to the system administrators and workgroup managers in troubleshooting and resolving technical issues.
5.
What organization does communication and information services entering and exiting the base or site fall under the operational control of?
Correct Answer
C. Base Network Control Center
Explanation
The correct answer is the Base Network Control Center. This organization is responsible for managing and controlling the communication and information services entering and exiting the base or site. They ensure that the network is secure and properly functioning, and they have operational control over the communication and information services within the base.
6.
What Air Force publication establishes policy on how C4 systems are acquired, operated, and maintained?
Correct Answer
A. AFPD 33-1
Explanation
AFPD 33-1 is the correct answer because it is the Air Force publication that establishes policy on how C4 systems are acquired, operated, and maintained. This publication provides guidance and direction for the acquisition, operation, and maintenance of C4 systems within the Air Force. It outlines the policies and procedures that must be followed to ensure the effective and efficient use of C4 systems in support of Air Force missions.
7.
What Air Force publication identifies responsibilites for supporting critical Air Force communications and information networks primarily through network control centers?
Correct Answer
C. AFI 33-115, Volume 1
Explanation
AFI 33-115, Volume 1 is the correct answer because it is the Air Force publication that identifies responsibilities for supporting critical Air Force communications and information networks primarily through network control centers. This publication provides guidance on the roles and responsibilities of personnel involved in managing and maintaining these networks, ensuring their availability and security. It outlines the procedures and protocols to be followed in order to effectively support and manage Air Force communications and information networks.
8.
What Network Control Center function responds to detected security incidents, network faults (errors), and user reported outages at the time of help desk refferal?
Correct Answer
B. Network management
Explanation
Network management is the correct answer because it involves the monitoring and control of a network's performance, security, and overall operations. This includes responding to security incidents, network faults, and user reported outages. Network administrators are responsible for managing and maintaining the network infrastructure, ensuring its smooth operation, and addressing any issues that may arise. Configuration management focuses on managing and maintaining the network's hardware and software configurations, while information protection operations deal with protecting sensitive information and data.
9.
What position is the first line of help customers contact to resolve problems?
Correct Answer
D. Workgroup Manager
Explanation
The first line of help customers contact to resolve problems is the Workgroup Manager.
10.
What is one of the most important communication skills you can develop as a help desk operator?
Correct Answer
C. Listening
Explanation
Listening is one of the most important communication skills that a help desk operator can develop. It is crucial for a help desk operator to actively listen to the customer's concerns and questions in order to fully understand their needs and provide appropriate solutions. By actively listening, the operator can gather all the necessary information, ask relevant questions, and ensure effective communication with the customer. This skill helps in building trust, resolving issues efficiently, and providing excellent customer service.
11.
What Air Force instruction series covers communications and information?
Correct Answer
D. 33
Explanation
Air Force instruction series 33 covers communications and information.
12.
What does Network Security work to ensure about a network?
Correct Answer
A. Availability, confidentiality, and integrity of data
Explanation
Network security works to ensure the availability, confidentiality, and integrity of data. This means that the network is protected against unauthorized access or disruptions, the data is kept confidential and only accessible to authorized users, and the data is accurate and not tampered with.
13.
What NCC function increases network reliability by giving the network manager tools to detect problems and initate recovery procedures?
Correct Answer
A. Fault management
Explanation
Fault management is the correct answer because it refers to the function that helps increase network reliability by providing tools to detect problems and initiate recovery procedures. This involves monitoring the network for any faults or errors, identifying the root cause of the problem, and taking appropriate actions to resolve it. By effectively managing faults, network managers can minimize downtime and ensure that the network operates smoothly and reliably.
14.
 Whose network area of responsibility starts at the user's terminal and ends at the server, but does not include the network backbone infrastructure components?
Correct Answer
B. Unit functional systems administrator
Explanation
The correct answer is Unit functional systems administrator. The network area of responsibility for a Unit functional systems administrator starts at the user's terminal and ends at the server, meaning they are responsible for managing and supporting the systems and applications used by individual users within the network. However, their responsibility does not extend to the network backbone infrastructure components, which are typically managed by the Network Control Center network administration team.
15.
What NCC function is the central point of contact for network distribution and maintenance update of an Air Force Computer Emergency Response Team and automated systems security and antivirus software?
Correct Answer
D. Configuration management
Explanation
Configuration management is the correct answer because it involves the central point of contact for network distribution and maintenance update of an Air Force Computer Emergency Response Team and automated systems security and antivirus software. Configuration management ensures that all systems and software are properly configured and up to date, which is crucial for network security and maintenance. This function is responsible for managing and controlling changes to the network and its components to ensure smooth operation and minimize security risks.
16.
Performance management can be broken into which two separate functional categories?
Correct Answer
A. Monitoring and tuning
Explanation
Performance management involves monitoring and optimizing the performance of systems or processes. Monitoring refers to the continuous collection and analysis of performance data to identify any issues or areas for improvement. Tuning, on the other hand, involves making adjustments or optimizations based on the insights gained from monitoring. Therefore, the correct answer is "Monitoring and tuning."
17.
Which of the following are jobs performed by a help desk technician on a daily basis?
Correct Answer
B. Network Monitoring, accounts unlocks, and account creations
Explanation
A help desk technician performs the job of network monitoring to ensure the smooth functioning of the network and identify any issues or abnormalities. They also handle account unlocks, which involves resetting passwords or unlocking user accounts that may be locked due to incorrect login attempts. Additionally, they are responsible for account creations, which involves setting up new user accounts or granting access to new employees. These tasks are part of the daily routine of a help desk technician to ensure the efficient operation of the network and provide support to users.
18.
What type of network environments consist of of computer systems from different vendors that run different operation systems and communication protocols?
Correct Answer
D. Heterogeneous network
Explanation
A heterogeneous network refers to a network environment where computer systems from different vendors are connected, running different operating systems and communication protocols. In this type of network, there is a mix of hardware and software components that may not be compatible or interoperable. This can pose challenges in terms of system integration, data sharing, and communication between different systems.
19.
Within the NCC, what function is intially responsible for taking trouble calls, deciding what type of problem has occured, and what to do about the problem?
Correct Answer
A. Help Desk
Explanation
The help desk is initially responsible for taking trouble calls, deciding what type of problem has occurred, and determining the appropriate course of action to resolve the issue. They serve as the first point of contact for users experiencing technical difficulties and are trained to troubleshoot and provide solutions or escalate the problem to the appropriate team for further assistance. The help desk plays a crucial role in ensuring efficient and effective problem resolution within the NCC.
20.
To determine the level of network service provided to the users, you will make a measurement of the total response time.
Correct Answer
D. Rejection rate and availability of the network
Explanation
The rejection rate and availability of the network are important factors in determining the level of network service provided to the users. The rejection rate refers to the rate at which requests or connections are denied or rejected by the network. A high rejection rate indicates that the network is unable to handle the demand from users, leading to a poor level of service. On the other hand, availability refers to the percentage of time that the network is operational and accessible to users. A high availability indicates that the network is reliable and provides a good level of service. Therefore, by measuring the rejection rate and availability, one can assess the level of network service provided to the users.
21.
What is a set of subnets that are connected with routers?
Correct Answer
A. Internetwork
Explanation
An internetwork is a set of subnets that are connected with routers. Routers are used to connect different subnets together, allowing for communication between devices in different subnets. This creates a larger network that spans across multiple locations or networks.
22.
What software is used to open trouble tickets for customer trouble calls?
Correct Answer
B. Remedy
Explanation
Remedy is the software used to open trouble tickets for customer trouble calls. It is a widely used ticketing system that allows customer support teams to efficiently track and manage customer issues. Remedy provides a centralized platform for logging, prioritizing, and resolving customer complaints or inquiries. It helps streamline the troubleshooting process and ensures that customer problems are addressed in a timely manner. Microsoft Access, The C+ database, and Filit are not specifically designed for ticket management and are not commonly used for this purpose.
23.
What type of network is made up of components from the same vendor or compatible equipment that all run under the same operating system or network operating system?
Correct Answer
C. Homogeneous network
Explanation
A homogeneous network is made up of components from the same vendor or compatible equipment that all run under the same operating system or network operating system. This means that all the devices and equipment in the network are from the same manufacturer or are compatible with each other, creating a seamless and integrated network environment. This type of network can be easier to manage and troubleshoot since all the components are designed to work together.
24.
What type of communications network serves users within a confined geographical areas?
Correct Answer
A. Local area network
Explanation
A local area network (LAN) is a type of communications network that serves users within a confined geographical area. It is typically used within a single building or a group of nearby buildings, such as a home, office, or school. LANs are designed to provide fast and reliable communication between devices, such as computers, printers, and servers, within the local area. They are commonly used for sharing resources, such as files and printers, and for enabling communication and collaboration between users.
25.
What is a set of systems nodes on a local segment that can be off of a switch or a router?
Correct Answer
B. Intranetwork
Explanation
An intranetwork refers to a set of system nodes on a local segment that can be connected to either a switch or a router. It is a private network that is limited to a specific organization or company and is used for internal communication and data sharing. Unlike an internetwork, which refers to the connection of multiple networks, an intranetwork focuses on the internal connectivity within a single network.
26.
What is the distorting and or weakening of a signal as it traverses the media called?
Correct Answer
A. Attentuation
Explanation
Attenuation refers to the distortion and weakening of a signal as it travels through a medium. This can occur due to various factors such as distance, interference, or impedance mismatches. Attenuation is a common phenomenon in communication systems and can result in a loss of signal strength, degradation of signal quality, or reduced throughput. It is important to consider attenuation when designing and implementing communication networks to ensure reliable and efficient signal transmission.
27.
In most cases the frequencies used by wireless networks are in what frequency band?
Correct Answer
D. Industrial scientific and medical (ISM)
Explanation
Wireless networks generally use frequencies in the Industrial Scientific and Medical (ISM) band. This band is specifically designated for non-communication purposes such as industrial, scientific, and medical applications. It is a popular choice for wireless networks because it is unlicensed, meaning anyone can use it without needing to obtain a license. Additionally, the ISM band offers a good balance between signal range and data transmission capabilities.
28.
Which of the following categories of twisted-pair cable has the highest throughput?
Correct Answer
D. Cat 5
Explanation
Cat 5 twisted-pair cable has the highest throughput compared to Cat 2, Cat 3, and Cat 4. This is because Cat 5 cable has a higher bandwidth capacity and can support higher data transfer rates. Cat 5 cable is capable of transmitting data at speeds up to 1000 Mbps, making it suitable for high-speed internet connections and network applications that require fast data transmission.
29.
How many users are in a peer-to-peer network?
Correct Answer
A. 2-10
Explanation
A peer-to-peer network is a decentralized network where all devices or nodes are considered equal and can act as both clients and servers. In such a network, the number of users typically ranges from 2 to 10. This range is common for small-scale peer-to-peer networks where a limited number of devices are connected and sharing resources or files among themselves.
30.
How many users are in a single-server network?
Correct Answer
B. 10-50
Explanation
In a single-server network, the number of users can range from 10 to 50. This means that there can be a minimum of 10 users and a maximum of 50 users in this type of network configuration.
31.
What type of communications network links geographically dispersed offices in other cities or around the globe?
Correct Answer
C. Wide area network
Explanation
A wide area network (WAN) is a type of communications network that connects geographically dispersed offices in other cities or around the globe. Unlike local area networks (LANs) and metropolitan area networks (MANs), which are limited to a specific geographic area, WANs cover larger areas and allow for long-distance communication. An enterprise network refers to a network within a single organization, so it is not the correct answer for linking dispersed offices. Therefore, the correct answer is wide area network.
32.
Light signals in fiber optic cables can travel distances in excess of how many miles before they need to be boosted?
Correct Answer
C. 100
Explanation
Light signals in fiber optic cables can travel distances in excess of 100 miles before they need to be boosted. This is because fiber optic cables use total internal reflection to transmit light signals, which minimizes signal loss and allows for long-distance transmission without the need for boosting the signal.
33.
A fiber optic network uses a laser or light-emitting diode to send a signal through what portion of the cable?
Correct Answer
A. Core
Explanation
A fiber optic network uses a laser or light-emitting diode to send a signal through the core of the cable. The core is the innermost part of the cable and is responsible for carrying the light signal. The buffer is a protective layer around the core, the kevlar provides strength and protection, and the cladding is a reflective layer that helps keep the light signal within the core. However, it is the core that actually carries the signal.
34.
What is a measurement of data transferred through the medium between network connections
Correct Answer
C. Throughput
Explanation
Throughput is a measurement of the amount of data that can be transferred through a network connection within a given time period. It represents the actual data transfer rate and is often measured in bits per second (bps) or bytes per second (Bps). Throughput is influenced by factors such as network congestion, latency, and the capacity of the network connection. It is an important metric in evaluating the performance and efficiency of a network connection.
35.
What is a form of communication that transmits information as a serial stream of bits or bytes?
Correct Answer
A. Asynchronous communication
Explanation
Asynchronous communication is a form of communication that transmits information as a serial stream of bits or bytes. In asynchronous communication, data is transmitted one bit at a time, with each bit being accompanied by start and stop bits to indicate the beginning and end of a data unit. This type of communication is commonly used in computer networks and telecommunications systems, where it allows for efficient and reliable transmission of data over long distances. Unlike synchronous communication, which transmits data in a continuous stream without start and stop bits, asynchronous communication is more flexible and can handle variations in timing between the sender and receiver.
36.
What is the greatest risk to a bus network
Correct Answer
C. The bus itself becoming inoperable
Explanation
The greatest risk to a bus network is the bus itself becoming inoperable. This means that if the bus, which serves as the main communication pathway for devices connected to the network, stops functioning, the entire network will be affected. This can lead to a disruption in communication and data transfer between devices, resulting in a loss of productivity and efficiency. It is crucial to ensure the proper maintenance and functioning of the bus to prevent such risks.
37.
On what network topology, can muliple transmit frames co-exist
Correct Answer
D. Fiber Distributed Data Interface
Explanation
Fiber Distributed Data Interface (FDDI) is a network topology that allows multiple transmit frames to co-exist. FDDI is a high-speed networking technology that uses optical fiber cables to transmit data. It is designed to provide high bandwidth and reliability, making it suitable for environments where multiple frames need to be transmitted simultaneously without interference.
38.
What type of optic fiber is used to span extremely long distances
Correct Answer
D. Single mode
Explanation
Single mode optic fiber is used to span extremely long distances because it has a smaller core diameter compared to multi mode fiber. This allows for a single pathway for the light to travel through, reducing the amount of dispersion and scattering that occurs over long distances. The smaller core also allows for higher transmission speeds and less signal loss, making it ideal for long-distance communication.
39.
What are the principal advantages of fiber optics with present day transmission technology?
Correct Answer
A. Sturdiness and security
Explanation
Fiber optics offer the principal advantages of sturdiness and security with present-day transmission technology. The durability of fiber optic cables makes them resistant to physical damage and environmental factors such as temperature and moisture. This ensures that the transmission remains reliable and uninterrupted. Additionally, fiber optics provide enhanced security as they are difficult to tap into or intercept, making them ideal for transmitting sensitive information.
40.
What network topology consists of a single central cable to which all computers and other devices connect?
Correct Answer
B. Bus
Explanation
A network topology that consists of a single central cable to which all computers and other devices connect is known as a Bus topology. In this type of network, all devices share the same communication medium, which is the central cable. Each device is connected to the cable through a connector called a tap. When a device wants to communicate with another device, it sends the data onto the bus, and all devices on the network receive the data. This topology is simple and cost-effective, but it can be prone to collisions and network congestion.
41.
What layer of the OSI model is really a set of rules regarding the hardwareused to transmit data?
Correct Answer
A. pHysical
Explanation
The correct answer is Physical because the physical layer of the OSI model is responsible for the actual transmission of data over the physical medium. It defines the electrical, mechanical, and procedural characteristics of the physical connection between devices. This layer deals with the physical aspects such as cables, connectors, and network interface cards, and it ensures that the data is transmitted reliably from one device to another.
42.
What is the major DoD contribution to networking?
Correct Answer
D. The Transmission Control Protocol Internet Protocol Suite
Explanation
The major DoD contribution to networking is the Transmission Control Protocol Internet Protocol Suite. This suite is a set of protocols that allows for the transmission of data over networks. It includes protocols such as TCP, which ensures reliable delivery of data, and IP, which handles the routing of data packets. The TCP/IP suite is widely used in computer networks, including the internet, and has become the de facto standard for networking.
43.
What layer of the OSI model prevents a fast computer from overwhelming a slow terminal?
Correct Answer
D. Transport
Explanation
The Transport layer of the OSI model prevents a fast computer from overwhelming a slow terminal by regulating the flow of data between them. It ensures that the amount of data sent by the fast computer is controlled and paced to match the slower terminal's processing capabilities. This prevents the slow terminal from being overloaded with too much data at once, allowing for a more efficient and balanced communication between the two devices.
44.
How many users are in a multi-server high-speed backbone network
Correct Answer
D. 250-1000
Explanation
A multi-server high-speed backbone network typically supports a large number of users due to its high capacity and scalability. The range of 250-1000 users suggests that this network can accommodate a significant number of users, making it suitable for medium to large organizations or institutions. This range indicates that the network is designed to handle a substantial amount of traffic and provide efficient connectivity for a diverse user base.
45.
What type of optic fiber is designed for the local area network environment and light is typically generated with a light emitting diode?
Correct Answer
C. Multi mode
Explanation
Multi mode optic fiber is designed for the local area network environment and is typically used with a light emitting diode (LED) as the light source. Multi mode fiber allows multiple modes or paths for the light to travel through the fiber, which results in a larger core size and higher light dispersion. This makes it suitable for short distance transmissions within a local area network.
46.
What layer of the OSI model provides the grammar by which machines converse with each other and serves as a vehicle for information transmission?
Correct Answer
B. Data link
Explanation
The data link layer of the OSI model provides the grammar by which machines converse with each other and serves as a vehicle for information transmission. This layer is responsible for the reliable transmission of data frames between nodes over a physical network. It ensures error-free transmission and handles flow control, error detection, and correction. The data link layer also defines protocols for addressing and accessing the physical network.
47.
Which layer of the OSI model is concerned with network security, file transfers, and formatting functions?
Correct Answer
D. Presentation
Explanation
The Presentation layer of the OSI model is responsible for network security, file transfers, and formatting functions. This layer is responsible for the formatting and encryption of data to be transmitted over the network. It ensures that the data is in a format that can be understood by the receiving device and also handles any necessary encryption or decryption of the data for security purposes. Additionally, the Presentation layer is responsible for the compression and decompression of data, as well as any necessary data conversion between different formats.
48.
A feature which involves the periodic insertion of points into data from which any recovery necessary can be started is known as what?
Correct Answer
A. Checkpointing
Explanation
Checkpointing is a feature that involves the periodic insertion of points into data from which any recovery necessary can be started. It is a technique used in computing systems to ensure fault tolerance and recovery. By creating checkpoints at regular intervals, the system can save the current state of the data and use it as a starting point for recovery in case of failures or errors. This allows for efficient and reliable error recognition and recovery, making checkpointing the correct answer for this question.
49.
The IEEE 802.3 standard describes a local area network using what kind of topology
Correct Answer
A. Bus
Explanation
The correct answer is Bus. The IEEE 802.3 standard describes a local area network that uses a bus topology. In a bus topology, all devices are connected to a single communication line, called a bus. Data is transmitted on the bus and all devices receive the data, but only the intended recipient processes it. This type of topology is commonly used in Ethernet networks.
50.
What does a station specifically send when it sends a general request through the network asking any station to respond to receive the token?
Correct Answer
D. Solicit successor frame
Explanation
A station specifically sends a "Solicit successor frame" when it sends a general request through the network asking any station to respond to receive the token.