What is one of the most important communication skills you can develop...
Within the NCC, what function is intially responsible for taking...
What software is used to open trouble tickets for customer trouble...
What type of network is made up of components from the same vendor or...
Which of the following categories of twisted-pair cable has the...
A fiber optic network uses a laser or light-emitting diode to send a...
Why can a token ring network cover a greater distance than a token bus...
What server is set aside to perform a specific task or function all...
Which of the following are jobs performed by a help desk technician on...
What type of communications network serves users within a confined...
What is a set of systems nodes on a local segment that can be off of a...
What is the greatest risk to a bus network
What communications device converts binary electrical signals into...
What is a group of devices connected to the same physical media such...
The purpose of a network repeater is that it?
What type of network environments consist of of computer systems from...
A feature which involves the periodic insertion of points into data...
What type of routing involves the use of routing protocols that adjust...
What prompt is displayed when in Privileged Exec mode on a routeR?
What organization does communication and information services entering...
Performance management can be broken into which two separate...
What is a measurement of data transferred through the medium between...
What is used to logically eliminate loops within a network?
What is the range of numbers that represent standard access lists?
What is the distorting and or weakening of a signal as it traverses...
How many users are in a peer-to-peer network?
What type of communications network links geographically dispersed...
The bridge in a network with the highest priority (the lowest number)...
What acts as a translator between two workstations or networks that...
What is required due to the differences between the physical speed of...
What Air Force Instruction sets the policies that unit client support...
What does Network Security work to ensure about a network?
What protocol is used by the IEEE 802.3 standard to avoid collisions...
What is a set of rules that define how communications are to take...
What is used to identify network nodes on a physically connected...
What Air Force instruction series covers communications and...
Light signals in fiber optic cables can travel distances in excess of...
What type of optic fiber is used to span extremely long distances
What is the major DoD contribution to networking?
What network condition usually begins slowly and (if not stopped)...
What command is used to restrict access to Privileged Exec mode?
What Air Force publication establishes policy on how C4 systems are...
How many users are in a single-server network?
What is a form of communication that transmits information as a serial...
What is a logical grouping of end stations, independent of physical...
In what Dynamic Routing protocol must packets go the complete distance...
What are the network connections through which network traffic enters...
What filters network traffic by controlling whether routed packets are...
What does AFPD 33-1 Establish policy on?
What network topology consists of a single central cable to which all...
What X series protocol is a Message handling System (MHS) standard,...
What X series protocol is a Directory Services specification standard...
How many octets is the standard Internet Protocol broken down into?
What NIC module drives the signal onto and from the physical medium?
What is a set of subnets that are connected with routers?
In most cases the frequencies used by wireless networks are in what...
What layer of the OSI model is really a set of rules regarding the...
What is the technology called that allows NIC's to determine the type...
Data in which root-key determines which device drivers and services...
What network component serves as a central connecting point and is...
Bridging loops are created when...
The function performed by a router to move information from one router...
What command interface configuration command is used to activate an...
What is a set of keys, subkeys, and values from the registry stored in...
How many users are in a multi-server high-speed backbone network
What type of optic fiber is designed for the local area network...
What is the binary equivalent to the dotted decimal number 96?
What type of hub has special capabilities for configurations and or...
What prevents a router from sending route information back to the...
What do all access lists end with?
As information passes down through the protocol layers, what is the...
What makes it possible for implementers to produce new Network File...
What are the four basic functions of a bridge?
What is a detailed analysis of the performance of a specific...
What function within the Network Control Center provides technical...
What are the principal advantages of fiber optics with present day...
What NIC module converts information into a coded data stream?
What Air Force publication identifies responsibilites for supporting...
What type of routing is the establishment of routes by the network...
Where is the backup copy of the Cisco Internet Operating System...
What type of server is a bundle of application software designed to...
What network type normally utilizes non-dedicated servers?
Within the Windows enviroment, what is the central repository for the...
On what network topology, can muliple transmit frames co-exist
What layer of the OSI model provides the grammar by which machines...
From what level can all other command modes be accessed?
What routing metric is generally based upon the bit-error rate of the...
To determine the level of network service provided to the users, you...
What does a station specifically send when it sends a general request...
Which protocol of TCP/IP is a connection oriented, reliable,...
What NIC module temporarily holds data for processing to or from the...
What NCC function increases network reliability by giving the network...
What type of mask is used within a network that uses the same amount...
What is a local area network connection device with two or more ports...
What prompt is displayed when in the User Exec mode on a router?
What command is used to change the bootup values within ROM monitor...
The measurement of traffic volume actually being carried by the...
What Network Control Center function responds to detected security...
Whose network area of responsibility starts at the user's terminal...
Switching conducted at the layer 3 category is based upon what...
To view the current configuration of a router, what command is used...
What position is the first line of help customers contact to resolve...
What communications device is used for converting analog signals to...
At what level of the Open Systems Interconnection models does a router...
What is the most common method of defining Virtual local area network...
Router access lists must be applied to
What Air Force publication provides the policy and procedures for...
The IEEE 802.3 standard describes a local area network using what kind...
Switching conducted at the layer 2 category is based solely upon what...
From what mode is the banner motd command used in?
What type of switch is limited in its applications to small workgroups...
What is a set of statistical measurements made over a period of time...
What layer in the OSI model adds a trailer to the packet?
What frees the computer's attention so the user can continue working...
Which protocol of TCIP/IP provides a connectionless datagram "Network...
What is the primary device used for connecting these networks, both...
What does a standard access list use to filter packets?
The IEEE 802.5 standard was developed to cover what local network...
What type of switch reads the first 64 bytes before forwarding the...
What two types of enviroments are network operating systems...
What network performance criteria is the most significant statistic to...
What layer of the OSI model prevents a fast computer from overwhelming...
What is the only layer in the OSI model that simply transmits the...
Which layer of the OSI model is concerned with network security, file...
What NCC function is the central point of contact for network...
In the Ethernet environment, what is the minimum number of octets in a...