3C051 Set 2 Volume 2 Practice Test

Approved & Edited by ProProfs Editorial Team
The editorial team at ProProfs Quizzes consists of a select group of subject experts, trivia writers, and quiz masters who have authored over 10,000 quizzes taken by more than 100 million users. This team includes our in-house seasoned quiz moderators and subject matter experts. Our editorial experts, spread across the world, are rigorously trained using our comprehensive guidelines to ensure that you receive the highest quality quizzes.
Learn about Our Editorial Process
| By A1cbecker
A
A1cbecker
Community Contributor
Quizzes Created: 3 | Total Attempts: 1,176
Questions: 126 | Attempts: 380

SettingsSettingsSettings
CDCs Quizzes & Trivia

URE/Short Answer questions from the 2nd volume of the 3C051 CDCs. . .


Questions and Answers
  • 1. 

    What does AFPD 33-1 Establish policy on?

    • A.

      Outlines standardized management practices and tells how to manage planning and implementation of comm and info systems and the base-level infrastructure

    • B.

      Identifies responsibilities for managment of commercial off-the-shelf (COTS) and Air Force-unique software acquired by the Air Force

    • C.

      Establishes policy on how command, control, communications and computer (C4) systems are acquired, operated, and maintained.

    • D.

      Establishes Air Force Computer Security (COMPUSEC) requirements for Information Assurance

    Correct Answer
    C. Establishes policy on how command, control, communications and computer (C4) systems are acquired, operated, and maintained.
    Explanation
    The correct answer is "Establishes policy on how command, control, communications and computer (C4) systems are acquired, operated, and maintained." This answer accurately describes the purpose of AFPD 33-1, which is to establish policy guidelines for the acquisition, operation, and maintenance of command, control, communications, and computer systems. It outlines the standardized management practices for planning and implementing these systems and the base-level infrastructure.

    Rate this question:

  • 2. 

    What Air Force Instruction sets the policies that unit client support administrators must comply with?

    • A.

      33-115

    • B.

      33-116

    • C.

      33-202

    • D.

      33-204

    Correct Answer
    A. 33-115
    Explanation
    Air Force Instruction 33-115 sets the policies that unit client support administrators must comply with.

    Rate this question:

  • 3. 

    What Air Force publication provides the policy and procedures for certifying network professionals who manage and operate government-provided information systems on Air Force networks?

    • A.

      AFPD 33-1

    • B.

      AFPD 33-2

    • C.

      AFI 33-115 Volume 1

    • D.

      AFI 33-115 Volume 2

    Correct Answer
    D. AFI 33-115 Volume 2
    Explanation
    AFI 33-115 Volume 2 is the correct answer because it provides the policy and procedures for certifying network professionals who manage and operate government-provided information systems on Air Force networks. This publication outlines the requirements and guidelines for certification, ensuring that network professionals have the necessary skills and knowledge to effectively and securely manage Air Force networks.

    Rate this question:

  • 4. 

    What function within the Network Control Center provides technical assitance to the unit functional system administrators and workgroup managers?

    • A.

      Network Security

    • B.

      Network Performance

    • C.

      Network Management

    • D.

      Network Administration

    Correct Answer
    D. Network Administration
    Explanation
    The function within the Network Control Center that provides technical assistance to the unit functional system administrators and workgroup managers is Network Administration. This function is responsible for managing and maintaining the network infrastructure, ensuring its smooth operation, and providing support to the system administrators and workgroup managers in troubleshooting and resolving technical issues.

    Rate this question:

  • 5. 

    What organization does communication and information services entering and exiting the base or site fall under the operational control of?

    • A.

      Base Security Services Information Assurance Office

    • B.

      Base Computer Security control office

    • C.

      Base Network Control Center

    • D.

      Base Command Post

    Correct Answer
    C. Base Network Control Center
    Explanation
    The correct answer is the Base Network Control Center. This organization is responsible for managing and controlling the communication and information services entering and exiting the base or site. They ensure that the network is secure and properly functioning, and they have operational control over the communication and information services within the base.

    Rate this question:

  • 6. 

    What Air Force publication establishes policy on how C4 systems are acquired, operated, and maintained?

    • A.

      AFPD 33-1

    • B.

      AFPD 33-2

    • C.

      AFI 33-202

    • D.

      AF 33-204

    Correct Answer
    A. AFPD 33-1
    Explanation
    AFPD 33-1 is the correct answer because it is the Air Force publication that establishes policy on how C4 systems are acquired, operated, and maintained. This publication provides guidance and direction for the acquisition, operation, and maintenance of C4 systems within the Air Force. It outlines the policies and procedures that must be followed to ensure the effective and efficient use of C4 systems in support of Air Force missions.

    Rate this question:

  • 7. 

    What Air Force publication identifies responsibilites for supporting critical Air Force communications and information networks primarily through network control centers?

    • A.

      AFPD 33-1

    • B.

      AFPD 33-2

    • C.

      AFI 33-115, Volume 1

    • D.

      AFI 33-115, Volume 2

    Correct Answer
    C. AFI 33-115, Volume 1
    Explanation
    AFI 33-115, Volume 1 is the correct answer because it is the Air Force publication that identifies responsibilities for supporting critical Air Force communications and information networks primarily through network control centers. This publication provides guidance on the roles and responsibilities of personnel involved in managing and maintaining these networks, ensuring their availability and security. It outlines the procedures and protocols to be followed in order to effectively support and manage Air Force communications and information networks.

    Rate this question:

  • 8. 

    What Network Control Center function responds to detected security incidents, network faults (errors), and user reported outages at the time of help desk refferal?

    • A.

      Network administration

    • B.

      Network management

    • C.

      Configuration management

    • D.

      Information protection operations

    Correct Answer
    B. Network management
    Explanation
    Network management is the correct answer because it involves the monitoring and control of a network's performance, security, and overall operations. This includes responding to security incidents, network faults, and user reported outages. Network administrators are responsible for managing and maintaining the network infrastructure, ensuring its smooth operation, and addressing any issues that may arise. Configuration management focuses on managing and maintaining the network's hardware and software configurations, while information protection operations deal with protecting sensitive information and data.

    Rate this question:

  • 9. 

    What position is the first line of help customers contact to resolve problems?

    • A.

      Network Control Center (NCC)

    • B.

      INSOC - West

    • C.

      Unit MAJCOM

    • D.

      Workgroup Manager

    Correct Answer
    D. Workgroup Manager
    Explanation
    The first line of help customers contact to resolve problems is the Workgroup Manager.

    Rate this question:

  • 10. 

    What is one of the most important communication skills you can develop as a help desk operator?

    • A.

      Speaking

    • B.

      Writing

    • C.

      Listening

    • D.

      Briefing

    Correct Answer
    C. Listening
    Explanation
    Listening is one of the most important communication skills that a help desk operator can develop. It is crucial for a help desk operator to actively listen to the customer's concerns and questions in order to fully understand their needs and provide appropriate solutions. By actively listening, the operator can gather all the necessary information, ask relevant questions, and ensure effective communication with the customer. This skill helps in building trust, resolving issues efficiently, and providing excellent customer service.

    Rate this question:

  • 11. 

    What Air Force instruction series covers communications and information?

    • A.

      30

    • B.

      31

    • C.

      32

    • D.

      33

    Correct Answer
    D. 33
    Explanation
    Air Force instruction series 33 covers communications and information.

    Rate this question:

  • 12. 

    What does Network Security work to ensure about a network?

    • A.

      Availability, confidentiality, and integrity of data

    • B.

      Availability, confidentiality, and backup of data

    • C.

      Availability, integrity, and backup of data

    • D.

      Confidentiality, intergrity, and backup of data

    Correct Answer
    A. Availability, confidentiality, and integrity of data
    Explanation
    Network security works to ensure the availability, confidentiality, and integrity of data. This means that the network is protected against unauthorized access or disruptions, the data is kept confidential and only accessible to authorized users, and the data is accurate and not tampered with.

    Rate this question:

  • 13. 

    What NCC function increases network reliability by giving the network manager tools to detect problems and initate recovery procedures?

    • A.

      Fault management

    • B.

      Network management

    • C.

      Performance management

    • D.

      Configuration management

    Correct Answer
    A. Fault management
    Explanation
    Fault management is the correct answer because it refers to the function that helps increase network reliability by providing tools to detect problems and initiate recovery procedures. This involves monitoring the network for any faults or errors, identifying the root cause of the problem, and taking appropriate actions to resolve it. By effectively managing faults, network managers can minimize downtime and ensure that the network operates smoothly and reliably.

    Rate this question:

  • 14. 

     Whose network area of responsibility starts at the user's terminal and ends at the server, but does not include the network backbone infrastructure components?

    • A.

      Unit client support administrator

    • B.

      Unit functional systems administrator

    • C.

      Network Control Center help desk

    • D.

      Network Control Center network administration

    Correct Answer
    B. Unit functional systems administrator
    Explanation
    The correct answer is Unit functional systems administrator. The network area of responsibility for a Unit functional systems administrator starts at the user's terminal and ends at the server, meaning they are responsible for managing and supporting the systems and applications used by individual users within the network. However, their responsibility does not extend to the network backbone infrastructure components, which are typically managed by the Network Control Center network administration team.

    Rate this question:

  • 15. 

    What NCC function is the central point of contact for network distribution and maintenance update of an Air Force Computer Emergency Response Team and automated systems security and antivirus software?

    • A.

      Network management

    • B.

      Security management

    • C.

      Network administration

    • D.

      Configuration management

    Correct Answer
    D. Configuration management
    Explanation
    Configuration management is the correct answer because it involves the central point of contact for network distribution and maintenance update of an Air Force Computer Emergency Response Team and automated systems security and antivirus software. Configuration management ensures that all systems and software are properly configured and up to date, which is crucial for network security and maintenance. This function is responsible for managing and controlling changes to the network and its components to ensure smooth operation and minimize security risks.

    Rate this question:

  • 16. 

    Performance management can be broken into which two separate functional categories?

    • A.

      Monitoring and tuning

    • B.

      Baselining and tuning

    • C.

      Baselining and monitoring

    • D.

      Inspecting and monitoring

    Correct Answer
    A. Monitoring and tuning
    Explanation
    Performance management involves monitoring and optimizing the performance of systems or processes. Monitoring refers to the continuous collection and analysis of performance data to identify any issues or areas for improvement. Tuning, on the other hand, involves making adjustments or optimizations based on the insights gained from monitoring. Therefore, the correct answer is "Monitoring and tuning."

    Rate this question:

  • 17. 

    Which of the following are jobs performed by a help desk technician on a daily basis?

    • A.

      Account unlocks, account creations, and router reconfiguration

    • B.

      Network Monitoring, accounts unlocks, and account creations

    • C.

      Network monitoring, account unlocks, router access lists

    • D.

      Operation system installations, account creations, and network minitoring

    Correct Answer
    B. Network Monitoring, accounts unlocks, and account creations
    Explanation
    A help desk technician performs the job of network monitoring to ensure the smooth functioning of the network and identify any issues or abnormalities. They also handle account unlocks, which involves resetting passwords or unlocking user accounts that may be locked due to incorrect login attempts. Additionally, they are responsible for account creations, which involves setting up new user accounts or granting access to new employees. These tasks are part of the daily routine of a help desk technician to ensure the efficient operation of the network and provide support to users.

    Rate this question:

  • 18. 

    What type of network environments consist of of computer systems from different vendors that run different operation systems and communication protocols?

    • A.

      Internetwork

    • B.

      Intranetwork

    • C.

      Homogeneous network

    • D.

      Heterogeneous network

    Correct Answer
    D. Heterogeneous network
    Explanation
    A heterogeneous network refers to a network environment where computer systems from different vendors are connected, running different operating systems and communication protocols. In this type of network, there is a mix of hardware and software components that may not be compatible or interoperable. This can pose challenges in terms of system integration, data sharing, and communication between different systems.

    Rate this question:

  • 19. 

    Within the NCC, what function is intially responsible for taking trouble calls, deciding what type of problem has occured, and what to do about the problem?

    • A.

      Help Desk

    • B.

      Network management

    • C.

      Specific area of support

    • D.

      Information protection operations

    Correct Answer
    A. Help Desk
    Explanation
    The help desk is initially responsible for taking trouble calls, deciding what type of problem has occurred, and determining the appropriate course of action to resolve the issue. They serve as the first point of contact for users experiencing technical difficulties and are trained to troubleshoot and provide solutions or escalate the problem to the appropriate team for further assistance. The help desk plays a crucial role in ensuring efficient and effective problem resolution within the NCC.

    Rate this question:

  • 20. 

    To determine the level of network service provided to the users, you will make a measurement of the total response time.

    • A.

      Average bandwidth and availability of the network

    • B.

      Rejection rate and average bandwidth

    • C.

      Systems failure rate and average bandwidth

    • D.

      Rejection rate and availability of the network

    Correct Answer
    D. Rejection rate and availability of the network
    Explanation
    The rejection rate and availability of the network are important factors in determining the level of network service provided to the users. The rejection rate refers to the rate at which requests or connections are denied or rejected by the network. A high rejection rate indicates that the network is unable to handle the demand from users, leading to a poor level of service. On the other hand, availability refers to the percentage of time that the network is operational and accessible to users. A high availability indicates that the network is reliable and provides a good level of service. Therefore, by measuring the rejection rate and availability, one can assess the level of network service provided to the users.

    Rate this question:

  • 21. 

    What is a set of subnets that are connected with routers?

    • A.

      Internetwork

    • B.

      Intranetwork

    • C.

      Homogeneous network

    • D.

      Heterogeneous network

    Correct Answer
    A. Internetwork
    Explanation
    An internetwork is a set of subnets that are connected with routers. Routers are used to connect different subnets together, allowing for communication between devices in different subnets. This creates a larger network that spans across multiple locations or networks.

    Rate this question:

  • 22. 

    What software is used to open trouble tickets for customer trouble calls?

    • A.

      Microsoft Access

    • B.

      Remedy

    • C.

      The C+ database

    • D.

      Filit

    Correct Answer
    B. Remedy
    Explanation
    Remedy is the software used to open trouble tickets for customer trouble calls. It is a widely used ticketing system that allows customer support teams to efficiently track and manage customer issues. Remedy provides a centralized platform for logging, prioritizing, and resolving customer complaints or inquiries. It helps streamline the troubleshooting process and ensures that customer problems are addressed in a timely manner. Microsoft Access, The C+ database, and Filit are not specifically designed for ticket management and are not commonly used for this purpose.

    Rate this question:

  • 23. 

    What type of network is made up of components from the same vendor or compatible equipment that all run under the same operating system or network operating system?

    • A.

      Internetwork

    • B.

      Intranetwork

    • C.

      Homogeneous network

    • D.

      Heterogeneous network

    Correct Answer
    C. Homogeneous network
    Explanation
    A homogeneous network is made up of components from the same vendor or compatible equipment that all run under the same operating system or network operating system. This means that all the devices and equipment in the network are from the same manufacturer or are compatible with each other, creating a seamless and integrated network environment. This type of network can be easier to manage and troubleshoot since all the components are designed to work together.

    Rate this question:

  • 24. 

    What type of communications network serves users within a confined geographical areas?

    • A.

      Local area network

    • B.

      Metropolitan area network

    • C.

      Wide area network

    • D.

      Enterprise network

    Correct Answer
    A. Local area network
    Explanation
    A local area network (LAN) is a type of communications network that serves users within a confined geographical area. It is typically used within a single building or a group of nearby buildings, such as a home, office, or school. LANs are designed to provide fast and reliable communication between devices, such as computers, printers, and servers, within the local area. They are commonly used for sharing resources, such as files and printers, and for enabling communication and collaboration between users.

    Rate this question:

  • 25. 

    What is a set of systems nodes on a local segment that can be off of a switch or a router?

    • A.

      Internetwork

    • B.

      Intranetwork

    • C.

      Homogeneous network

    • D.

      Heterogeneous network

    Correct Answer
    B. Intranetwork
    Explanation
    An intranetwork refers to a set of system nodes on a local segment that can be connected to either a switch or a router. It is a private network that is limited to a specific organization or company and is used for internal communication and data sharing. Unlike an internetwork, which refers to the connection of multiple networks, an intranetwork focuses on the internal connectivity within a single network.

    Rate this question:

  • 26. 

    What is the distorting and or weakening of a signal as it traverses the media called?

    • A.

      Attentuation

    • B.

      Impedance

    • C.

      Throughput

    • D.

      Inductive cabling

    Correct Answer
    A. Attentuation
    Explanation
    Attenuation refers to the distortion and weakening of a signal as it travels through a medium. This can occur due to various factors such as distance, interference, or impedance mismatches. Attenuation is a common phenomenon in communication systems and can result in a loss of signal strength, degradation of signal quality, or reduced throughput. It is important to consider attenuation when designing and implementing communication networks to ensure reliable and efficient signal transmission.

    Rate this question:

  • 27. 

    In most cases the frequencies used by wireless networks are in what frequency band?

    • A.

      Television band

    • B.

      Very high frequency (VHF) band

    • C.

      Ultra high frequency (UHF) band

    • D.

      Industrial scientific and medical (ISM)

    Correct Answer
    D. Industrial scientific and medical (ISM)
    Explanation
    Wireless networks generally use frequencies in the Industrial Scientific and Medical (ISM) band. This band is specifically designated for non-communication purposes such as industrial, scientific, and medical applications. It is a popular choice for wireless networks because it is unlicensed, meaning anyone can use it without needing to obtain a license. Additionally, the ISM band offers a good balance between signal range and data transmission capabilities.

    Rate this question:

  • 28. 

    Which of the following categories of twisted-pair cable has the highest throughput?

    • A.

      Cat 2

    • B.

      Cat 3

    • C.

      Cat 4

    • D.

      Cat 5

    Correct Answer
    D. Cat 5
    Explanation
    Cat 5 twisted-pair cable has the highest throughput compared to Cat 2, Cat 3, and Cat 4. This is because Cat 5 cable has a higher bandwidth capacity and can support higher data transfer rates. Cat 5 cable is capable of transmitting data at speeds up to 1000 Mbps, making it suitable for high-speed internet connections and network applications that require fast data transmission.

    Rate this question:

  • 29. 

    How many users are in a peer-to-peer network?

    • A.

      2-10

    • B.

      10-50

    • C.

      50-250

    • D.

      250-1000

    Correct Answer
    A. 2-10
    Explanation
    A peer-to-peer network is a decentralized network where all devices or nodes are considered equal and can act as both clients and servers. In such a network, the number of users typically ranges from 2 to 10. This range is common for small-scale peer-to-peer networks where a limited number of devices are connected and sharing resources or files among themselves.

    Rate this question:

  • 30. 

    How many users are in a single-server network?

    • A.

      2-10

    • B.

      10-50

    • C.

      50-250

    • D.

      250-1000

    Correct Answer
    B. 10-50
    Explanation
    In a single-server network, the number of users can range from 10 to 50. This means that there can be a minimum of 10 users and a maximum of 50 users in this type of network configuration.

    Rate this question:

  • 31. 

    What type of communications network links geographically dispersed offices in other cities or around the globe?

    • A.

      Local area network

    • B.

      Metropolitan area network

    • C.

      Wide area network

    • D.

      Enterprise network

    Correct Answer
    C. Wide area network
    Explanation
    A wide area network (WAN) is a type of communications network that connects geographically dispersed offices in other cities or around the globe. Unlike local area networks (LANs) and metropolitan area networks (MANs), which are limited to a specific geographic area, WANs cover larger areas and allow for long-distance communication. An enterprise network refers to a network within a single organization, so it is not the correct answer for linking dispersed offices. Therefore, the correct answer is wide area network.

    Rate this question:

  • 32. 

    Light signals in fiber optic cables can travel distances in excess of how many miles before they need to be boosted?

    • A.

      25

    • B.

      50

    • C.

      100

    • D.

      125

    Correct Answer
    C. 100
    Explanation
    Light signals in fiber optic cables can travel distances in excess of 100 miles before they need to be boosted. This is because fiber optic cables use total internal reflection to transmit light signals, which minimizes signal loss and allows for long-distance transmission without the need for boosting the signal.

    Rate this question:

  • 33. 

    A fiber optic network uses a laser or light-emitting diode to send a signal through what portion of the cable?

    • A.

      Core

    • B.

      Buffer

    • C.

      Kevlar

    • D.

      Cladding

    Correct Answer
    A. Core
    Explanation
    A fiber optic network uses a laser or light-emitting diode to send a signal through the core of the cable. The core is the innermost part of the cable and is responsible for carrying the light signal. The buffer is a protective layer around the core, the kevlar provides strength and protection, and the cladding is a reflective layer that helps keep the light signal within the core. However, it is the core that actually carries the signal.

    Rate this question:

  • 34. 

    What is a measurement of data transferred through the medium between network connections

    • A.

      Attenuation

    • B.

      Impedance

    • C.

      Throughput

    • D.

      Inductive coupling

    Correct Answer
    C. Throughput
    Explanation
    Throughput is a measurement of the amount of data that can be transferred through a network connection within a given time period. It represents the actual data transfer rate and is often measured in bits per second (bps) or bytes per second (Bps). Throughput is influenced by factors such as network congestion, latency, and the capacity of the network connection. It is an important metric in evaluating the performance and efficiency of a network connection.

    Rate this question:

  • 35. 

    What is a form of communication that transmits information as a serial stream of bits or bytes?

    • A.

      Asynchronous communication

    • B.

      Synchronous communication

    • C.

      Half-duplex communication

    • D.

      Duplex communication

    Correct Answer
    A. Asynchronous communication
    Explanation
    Asynchronous communication is a form of communication that transmits information as a serial stream of bits or bytes. In asynchronous communication, data is transmitted one bit at a time, with each bit being accompanied by start and stop bits to indicate the beginning and end of a data unit. This type of communication is commonly used in computer networks and telecommunications systems, where it allows for efficient and reliable transmission of data over long distances. Unlike synchronous communication, which transmits data in a continuous stream without start and stop bits, asynchronous communication is more flexible and can handle variations in timing between the sender and receiver.

    Rate this question:

  • 36. 

    What is the greatest risk to a bus network

    • A.

      The bus network server

    • B.

      Security is easily breached

    • C.

      The bus itself becoming inoperable

    • D.

      The middle node connected to the bus

    Correct Answer
    C. The bus itself becoming inoperable
    Explanation
    The greatest risk to a bus network is the bus itself becoming inoperable. This means that if the bus, which serves as the main communication pathway for devices connected to the network, stops functioning, the entire network will be affected. This can lead to a disruption in communication and data transfer between devices, resulting in a loss of productivity and efficiency. It is crucial to ensure the proper maintenance and functioning of the bus to prevent such risks.

    Rate this question:

  • 37. 

    On what network topology, can muliple transmit frames co-exist

    • A.

      Star

    • B.

      Bus

    • C.

      Hybrid

    • D.

      Fiber Distributed Data Interface

    Correct Answer
    D. Fiber Distributed Data Interface
    Explanation
    Fiber Distributed Data Interface (FDDI) is a network topology that allows multiple transmit frames to co-exist. FDDI is a high-speed networking technology that uses optical fiber cables to transmit data. It is designed to provide high bandwidth and reliability, making it suitable for environments where multiple frames need to be transmitted simultaneously without interference.

    Rate this question:

  • 38. 

    What type of optic fiber is used to span extremely long distances

    • A.

      Duplex

    • B.

      Half duplex

    • C.

      Multi mode

    • D.

      Single mode

    Correct Answer
    D. Single mode
    Explanation
    Single mode optic fiber is used to span extremely long distances because it has a smaller core diameter compared to multi mode fiber. This allows for a single pathway for the light to travel through, reducing the amount of dispersion and scattering that occurs over long distances. The smaller core also allows for higher transmission speeds and less signal loss, making it ideal for long-distance communication.

    Rate this question:

  • 39. 

    What are the principal advantages of fiber optics with present day transmission technology?

    • A.

      Sturdiness and security

    • B.

      Security and throughput

    • C.

      Sturdiness and media cost

    • D.

      Throughput and media cost

    Correct Answer
    A. Sturdiness and security
    Explanation
    Fiber optics offer the principal advantages of sturdiness and security with present-day transmission technology. The durability of fiber optic cables makes them resistant to physical damage and environmental factors such as temperature and moisture. This ensures that the transmission remains reliable and uninterrupted. Additionally, fiber optics provide enhanced security as they are difficult to tap into or intercept, making them ideal for transmitting sensitive information.

    Rate this question:

  • 40. 

    What network topology consists of a single central cable to which all computers and other devices connect?

    • A.

      Star

    • B.

      Bus

    • C.

      Ring

    • D.

      Mesh

    Correct Answer
    B. Bus
    Explanation
    A network topology that consists of a single central cable to which all computers and other devices connect is known as a Bus topology. In this type of network, all devices share the same communication medium, which is the central cable. Each device is connected to the cable through a connector called a tap. When a device wants to communicate with another device, it sends the data onto the bus, and all devices on the network receive the data. This topology is simple and cost-effective, but it can be prone to collisions and network congestion.

    Rate this question:

  • 41. 

    What layer of the OSI model is really a set of rules regarding the hardwareused to transmit data?

    • A.

      Physical

    • B.

      Data link

    • C.

      Network

    • D.

      Transport

    Correct Answer
    A. pHysical
    Explanation
    The correct answer is Physical because the physical layer of the OSI model is responsible for the actual transmission of data over the physical medium. It defines the electrical, mechanical, and procedural characteristics of the physical connection between devices. This layer deals with the physical aspects such as cables, connectors, and network interface cards, and it ensures that the data is transmitted reliably from one device to another.

    Rate this question:

  • 42. 

    What is the major DoD contribution to networking?

    • A.

      The Ada programming language

    • B.

      The Filer Transfer Protocol Untility

    • C.

      The Open Systems Interconnection Reference Model

    • D.

      The Transmission Control Protocol Internet Protocol Suite

    Correct Answer
    D. The Transmission Control Protocol Internet Protocol Suite
    Explanation
    The major DoD contribution to networking is the Transmission Control Protocol Internet Protocol Suite. This suite is a set of protocols that allows for the transmission of data over networks. It includes protocols such as TCP, which ensures reliable delivery of data, and IP, which handles the routing of data packets. The TCP/IP suite is widely used in computer networks, including the internet, and has become the de facto standard for networking.

    Rate this question:

  • 43. 

    What layer of the OSI model prevents a fast computer from overwhelming a slow terminal?

    • A.

      Physical

    • B.

      Data link

    • C.

      Network

    • D.

      Transport

    Correct Answer
    D. Transport
    Explanation
    The Transport layer of the OSI model prevents a fast computer from overwhelming a slow terminal by regulating the flow of data between them. It ensures that the amount of data sent by the fast computer is controlled and paced to match the slower terminal's processing capabilities. This prevents the slow terminal from being overloaded with too much data at once, allowing for a more efficient and balanced communication between the two devices.

    Rate this question:

  • 44. 

    How many users are in a multi-server high-speed backbone network

    • A.

      2-10

    • B.

      10-50

    • C.

      50-250

    • D.

      250-1000

    Correct Answer
    D. 250-1000
    Explanation
    A multi-server high-speed backbone network typically supports a large number of users due to its high capacity and scalability. The range of 250-1000 users suggests that this network can accommodate a significant number of users, making it suitable for medium to large organizations or institutions. This range indicates that the network is designed to handle a substantial amount of traffic and provide efficient connectivity for a diverse user base.

    Rate this question:

  • 45. 

    What type of optic fiber is designed for the local area network environment and light is typically generated with a light emitting diode?

    • A.

      Duplex

    • B.

      Half duplex

    • C.

      Multi mode

    • D.

      Single mode

    Correct Answer
    C. Multi mode
    Explanation
    Multi mode optic fiber is designed for the local area network environment and is typically used with a light emitting diode (LED) as the light source. Multi mode fiber allows multiple modes or paths for the light to travel through the fiber, which results in a larger core size and higher light dispersion. This makes it suitable for short distance transmissions within a local area network.

    Rate this question:

  • 46. 

    What layer of the OSI model provides the grammar by which machines converse with each other and serves as a vehicle for information transmission?

    • A.

      Physical

    • B.

      Data link

    • C.

      Network

    • D.

      Transport

    Correct Answer
    B. Data link
    Explanation
    The data link layer of the OSI model provides the grammar by which machines converse with each other and serves as a vehicle for information transmission. This layer is responsible for the reliable transmission of data frames between nodes over a physical network. It ensures error-free transmission and handles flow control, error detection, and correction. The data link layer also defines protocols for addressing and accessing the physical network.

    Rate this question:

  • 47. 

    Which layer of the OSI model is concerned with network security, file transfers, and formatting functions?

    • A.

      Session

    • B.

      Transport

    • C.

      Application

    • D.

      Presentation

    Correct Answer
    D. Presentation
    Explanation
    The Presentation layer of the OSI model is responsible for network security, file transfers, and formatting functions. This layer is responsible for the formatting and encryption of data to be transmitted over the network. It ensures that the data is in a format that can be understood by the receiving device and also handles any necessary encryption or decryption of the data for security purposes. Additionally, the Presentation layer is responsible for the compression and decompression of data, as well as any necessary data conversion between different formats.

    Rate this question:

  • 48. 

    A feature which involves the periodic insertion of points into data from which any recovery necessary can be started is known as what?

    • A.

      Checkpointing

    • B.

      Data transfers

    • C.

      Formatting function

    • D.

      Error recognition and recovery

    Correct Answer
    A. Checkpointing
    Explanation
    Checkpointing is a feature that involves the periodic insertion of points into data from which any recovery necessary can be started. It is a technique used in computing systems to ensure fault tolerance and recovery. By creating checkpoints at regular intervals, the system can save the current state of the data and use it as a starting point for recovery in case of failures or errors. This allows for efficient and reliable error recognition and recovery, making checkpointing the correct answer for this question.

    Rate this question:

  • 49. 

    The IEEE 802.3 standard describes a local area network using what kind of topology

    • A.

      Bus

    • B.

      Star

    • C.

      Token Bus

    • D.

      Token ring

    Correct Answer
    A. Bus
    Explanation
    The correct answer is Bus. The IEEE 802.3 standard describes a local area network that uses a bus topology. In a bus topology, all devices are connected to a single communication line, called a bus. Data is transmitted on the bus and all devices receive the data, but only the intended recipient processes it. This type of topology is commonly used in Ethernet networks.

    Rate this question:

  • 50. 

    What does a station specifically send when it sends a general request through the network asking any station to respond to receive the token?

    • A.

      Broadcast address

    • B.

      Tapped approach

    • C.

      Who follows frame

    • D.

      Solicit successor frame

    Correct Answer
    D. Solicit successor frame
    Explanation
    A station specifically sends a "Solicit successor frame" when it sends a general request through the network asking any station to respond to receive the token.

    Rate this question:

Quiz Review Timeline +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 20, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Apr 02, 2010
    Quiz Created by
    A1cbecker
Back to Top Back to top
Advertisement
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.