CDC 3DX5X Vol 2 UREs: Networking And Security Sample Test

Approved & Edited by ProProfs Editorial Team
The editorial team at ProProfs Quizzes consists of a select group of subject experts, trivia writers, and quiz masters who have authored over 10,000 quizzes taken by more than 100 million users. This team includes our in-house seasoned quiz moderators and subject matter experts. Our editorial experts, spread across the world, are rigorously trained using our comprehensive guidelines to ensure that you receive the highest quality quizzes.
Learn about Our Editorial Process
| By Youdontlovecdc
Y
Youdontlovecdc
Community Contributor
Quizzes Created: 1 | Total Attempts: 171
Questions: 124 | Attempts: 171

SettingsSettingsSettings
CDC 3DX5X Vol 2 UREs: Networking And Security Sample Test - Quiz

.


Questions and Answers
  • 1. 

    What layer of the Open System Interconnect model defines the electrical, mechanical,procedural, and functional specifications for links between communicating network systems?

    • A.

      Physical

    • B.

      Data Link

    • C.

      Network

    • D.

      Transport

    Correct Answer
    A. pHysical
    Explanation
    The Physical layer of the OSI model is responsible for defining the electrical, mechanical, procedural, and functional specifications for links between communicating network systems. This layer deals with the physical transmission of data, including the physical media, connectors, and signaling. It ensures that the bits sent over the network are properly encoded, transmitted, and received.

    Rate this question:

  • 2. 

    The Institute of Electrical and Electronics Engineers divide the Open System Interconnect Data Link Layers into what two sublayers? 

    • A.

      High Level Data Link Control and Synchronous Data Link Control

    • B.

      Logical Link Control and Media Access Control

    • C.

      Distance Vector and Link State

    • D.

      RS-232 and RS-530

    Correct Answer
    B. Logical Link Control and Media Access Control
    Explanation
    The correct answer is Logical Link Control and Media Access Control. The Open System Interconnect (OSI) Data Link Layer is divided into these two sublayers. The Logical Link Control (LLC) sublayer handles the flow control and error checking of data packets, ensuring reliable transmission. The Media Access Control (MAC) sublayer manages the access to the physical media, such as Ethernet or Wi-Fi, and handles issues like collision detection and media arbitration. These two sublayers work together to provide a reliable and efficient data link between network devices.

    Rate this question:

  • 3. 

    At what Open System Interconnect layer do network switches and bridges operate?

    • A.

      Network

    • B.

      Physical

    • C.

      Data Link

    • D.

      Transport

    Correct Answer
    C. Data Link
    Explanation
    Network switches and bridges operate at the Data Link layer of the Open System Interconnect (OSI) model. This layer is responsible for the reliable transfer of data between adjacent network nodes and ensures error-free transmission over the physical network. Switches and bridges use MAC addresses to forward data packets within a local area network (LAN) or between different LANs. They operate by examining the MAC address of incoming packets and forwarding them to the appropriate destination based on the MAC address table.

    Rate this question:

  • 4. 

    At what Open System Interconnect layer do routers operate?

    • A.

      Network

    • B.

      Physical

    • C.

      Data Link

    • D.

      Transport

    Correct Answer
    A. Network
    Explanation
    Routers operate at the Network layer of the Open System Interconnect (OSI) model. The Network layer is responsible for routing data packets across different networks. Routers use IP addresses to determine the best path for forwarding packets from one network to another. They examine the destination IP address of a packet and make decisions based on routing tables to ensure efficient and accurate delivery of data. Therefore, routers play a crucial role in network communication by connecting multiple networks and facilitating the transfer of data between them.

    Rate this question:

  • 5. 

    At what Open System Interconnect layer are common data compression and encryption schemes used? 

    • A.

      Application

    • B.

      Session

    • C.

      Presentation

    • D.

      Transport

    Correct Answer
    C. Presentation
    Explanation
    Common data compression and encryption schemes are used at the Presentation layer of the Open System Interconnect (OSI) model. The Presentation layer is responsible for formatting, encrypting, and compressing data to be sent across the network. It ensures that the data is in a format that can be understood by the receiving system. Therefore, at this layer, data compression and encryption techniques are applied to optimize the transmission and secure the data being transmitted.

    Rate this question:

  • 6. 

    What Open System Interconnect layer is closest to the end user?

    • A.

      Application

    • B.

      Session

    • C.

      Presentation

    • D.

      Transport

    Correct Answer
    A. Application
    Explanation
    The Open System Interconnect (OSI) model is a conceptual framework that standardizes the functions of a communication system into seven different layers. The layer closest to the end user is the Application layer. This layer provides services directly to the user, such as email, web browsing, and file transfer. It interacts with software applications and ensures that the user's requests are properly communicated to the underlying layers of the OSI model for further processing and transmission.

    Rate this question:

  • 7. 

    What is a formal set of rules and conventions that govern how computers exchangeinformation over a network medium? 

    • A.

      Specification

    • B.

      Standard

    • C.

      Etiquette

    • D.

      Protocol

    Correct Answer
    D. Protocol
    Explanation
    A protocol is a formal set of rules and conventions that govern how computers exchange information over a network medium. It defines the format, timing, sequencing, and error control of data transmission. Protocols ensure that communication between devices is reliable, efficient, and standardized. They define the roles and responsibilities of both the sender and receiver, ensuring that data is transmitted and received correctly.

    Rate this question:

  • 8. 

    What topology defines the layout of a network’s devices and media?

    • A.

      Physical

    • B.

      Logical

    • C.

      Star

    • D.

      Hybrid

    Correct Answer
    A. pHysical
    Explanation
    The correct answer is "Physical." The physical topology refers to the physical arrangement of devices and media in a network. It defines how the devices are connected and the layout of the cables and other physical components. This includes the placement of routers, switches, servers, and other network devices, as well as the type of cables used to connect them. The physical topology is important for determining the overall structure and organization of a network.

    Rate this question:

  • 9. 

    What topology defines the way in which devices communicate, and data is transmitted,throughout the network?

    • A.

      Physical

    • B.

      Logical

    • C.

      Star

    • D.

      Hybrid

    Correct Answer
    B. Logical
    Explanation
    Logical topology refers to the way in which devices communicate and data is transmitted throughout the network based on logical connections. It defines the flow of data and the paths it takes, regardless of the physical layout of the network. This includes protocols, addressing schemes, and the logical relationships between devices. Unlike physical topology, which focuses on the physical arrangement of devices and cables, logical topology deals with the abstract representation of the network's structure. Therefore, logical topology is the correct answer as it specifically addresses the communication and data transmission aspect of network design.

    Rate this question:

  • 10. 

    What topology consists of devices connected to a common, shared cable?

    • A.

      Bus

    • B.

      Ring

    • C.

      Star

    • D.

      Hybrid

    Correct Answer
    A. Bus
    Explanation
    Bus topology consists of devices connected to a common, shared cable. In this topology, all devices are connected to a single cable called the bus. Each device on the network listens to the bus to determine if the transmitted data is intended for it. If a device wants to transmit data, it sends the data onto the bus, and all devices on the network receive the data. This type of topology is simple to install and cost-effective, but if the main cable fails, the entire network can be affected.

    Rate this question:

  • 11. 

    What topology consists of cable segments from each computer connected to a centralized component? 

    • A.

      Bus

    • B.

      Ring

    • C.

      Star

    • D.

      Hybrid

    Correct Answer
    C. Star
    Explanation
    A star topology consists of cable segments from each computer connected to a centralized component, usually a switch or hub. In this topology, all communication between the computers is routed through this central component, which helps to manage and control the flow of data. This arrangement provides a high level of reliability, as if one computer or cable segment fails, it does not affect the rest of the network. Additionally, it allows for easy scalability, as new computers can be added to the network simply by connecting them to the central component.

    Rate this question:

  • 12. 

    What topology combines two or more different physical topologies in a single network?

    • A.

      Bus

    • B.

      Ring

    • C.

      Star

    • D.

      Hybrid

    Correct Answer
    D. Hybrid
    Explanation
    A hybrid topology combines two or more different physical topologies in a single network. This means that a network can have a combination of bus, ring, star, or other topologies. The advantage of a hybrid topology is that it can provide flexibility and scalability, allowing for the customization of the network to meet specific needs. It can also provide redundancy and fault tolerance, as multiple topologies can be used to ensure network connectivity even if one part of the network fails.

    Rate this question:

  • 13. 

    Which network protocol has the Department of Defense chosen as its standard to govern theflow of information?

    • A.

      AppleTalk

    • B.

      NetBIOS Extended User Interface

    • C.

      Transport Control Protocol/Internet Protocol

    • D.

      Internetwork Packet Exchange/ Sequenced Packet Exchange

    Correct Answer
    C. Transport Control Protocol/Internet Protocol
    Explanation
    The Department of Defense has chosen the Transport Control Protocol/Internet Protocol (TCP/IP) as its standard network protocol to govern the flow of information. TCP/IP is a set of protocols that allows for the reliable transmission of data over networks, including the internet. It is widely used and provides a standardized method for communication between devices and networks, making it an ideal choice for the Department of Defense to ensure interoperability and security in their information flow.

    Rate this question:

  • 14. 

    What Transmission Control Protocol/Internet Protocol network layer protocol provides the service of matching a known IP address for a destination device to a Media Access Control address?

    • A.

      Internet Protocol

    • B.

      Address Resolution Protocol

    • C.

      Reverse Address Resolution Protocol

    • D.

      Internet Control Message Protocol

    Correct Answer
    B. Address Resolution Protocol
    Explanation
    The Address Resolution Protocol (ARP) is the correct answer because it is the network layer protocol that provides the service of matching a known IP address for a destination device to a Media Access Control (MAC) address. ARP is used to resolve the IP address to the corresponding MAC address so that data can be properly transmitted over the network.

    Rate this question:

  • 15. 

    What Transmission Control Protocol/Internet Protocol network layer protocol provides the IP   address for a device that knows its own MAC address ?

    • A.

      Internet Protocol

    • B.

      Address Resolution Protocol

    • C.

      Reverse Address Resolution Protocol

    • D.

      Internet Control Message Protocol

    Correct Answer
    C. Reverse Address Resolution Protocol
    Explanation
    The Reverse Address Resolution Protocol (RARP) is used to obtain an IP address when the device already knows its own MAC address. RARP allows a device to send a broadcast request on the network, asking for its IP address to be assigned based on its MAC address. This is useful in situations where a device does not have a configured IP address and needs to obtain one dynamically.

    Rate this question:

  • 16. 

    What Transmission Control Protocol/Internet Protocol network layer protocol provides messaging that can help with troubleshooting? 

    • A.

      Internet Protocol

    • B.

      Address Resolution Protocol

    • C.

      Reverse Address Resolution Protocol

    • D.

      Internet Control Message Protocol

    Correct Answer
    D. Internet Control Message Protocol
    Explanation
    The Internet Control Message Protocol (ICMP) is a network layer protocol that provides messaging capabilities to assist with troubleshooting. ICMP messages are used to report errors, provide diagnostic information, and test network connectivity. It is commonly used by network administrators and tools such as ping and traceroute to identify and resolve network issues.

    Rate this question:

  • 17. 

    What Transmission Control Protocol/Internet Protocol transport layer protocol provides reliable data delivery services?

    • A.

      Internet Protocol

    • B.

      User Datagram Protocol

    • C.

      Transmission Control Protocol

    • D.

      Internet Control Message Protocol

    Correct Answer
    C. Transmission Control Protocol
    Explanation
    The correct answer is Transmission Control Protocol. TCP is a transport layer protocol that provides reliable data delivery services. It ensures that data packets are delivered in the correct order and without errors by using acknowledgments, retransmissions, and flow control mechanisms. TCP also provides congestion control to prevent network congestion and ensure efficient data transmission.

    Rate this question:

  • 18. 

    What application within Transmission Control Protocol/Internet Protocol is used to send and receive files via TCP?

    • A.

      File Transfer Protocol

    • B.

      Trivial File Transfer Protocol

    • C.

      Simple Mail Transfer Protocol

    • D.

      HyperText Transfer Protocol

    Correct Answer
    A. File Transfer Protocol
    Explanation
    The correct answer is File Transfer Protocol (FTP). FTP is a standard network protocol used to transfer files from one host to another over a TCP-based network, such as the internet. It provides a simple and reliable way to send and receive files between computers. FTP uses a client-server architecture, where one computer acts as the server, hosting the files, and another computer acts as the client, requesting and downloading the files. FTP is widely used for uploading website files, downloading software updates, and sharing large files over the internet.

    Rate this question:

  • 19. 

    What type of network connects networks that are typically separated by geographical distances between cities, states, countries, or around the world? 

    • A.

      Local Area Network

    • B.

      Wide Area Network

    • C.

      Virtual Private Network

    • D.

      Metropolitan Area Network

    Correct Answer
    B. Wide Area Network
    Explanation
    A Wide Area Network (WAN) is a type of network that connects networks that are typically separated by geographical distances between cities, states, countries, or around the world. Unlike a Local Area Network (LAN) that connects devices within a limited area like a home or office, a WAN enables communication over larger distances. A Virtual Private Network (VPN) is a secure connection that allows users to access a private network over a public network like the internet. A Metropolitan Area Network (MAN) connects networks within a specific metropolitan area.

    Rate this question:

  • 20. 

    What type of network makes use of tunneling and security protocols to enables a group of two or more computer systems to communicate over the public Internet?

    • A.

      Local Area Network

    • B.

      Wide Area Network

    • C.

      Virtual Private Network

    • D.

      Metropolitan Area Network

    Correct Answer
    C. Virtual Private Network
    Explanation
    A Virtual Private Network (VPN) is a type of network that uses tunneling and security protocols to allow a group of computer systems to communicate over the public Internet. It creates a secure and encrypted connection between these systems, ensuring that the data transmitted over the network is protected from unauthorized access. VPNs are commonly used by businesses and individuals to establish secure connections over public networks, such as the Internet, allowing remote access to resources and ensuring the privacy and security of communication.

    Rate this question:

  • 21. 

    Which is a common port that contains Hyper Text Transfer Protocol servers and proxies?

    • A.

      Port 80

    • B.

      Port 110

    • C.

      Port 443

    • D.

      Port 8080

    Correct Answer
    D. Port 8080
    Explanation
    Port 8080 is a common port that contains Hyper Text Transfer Protocol (HTTP) servers and proxies. While Port 80 is the default port for HTTP, Port 8080 is often used as an alternative port for HTTP servers and proxies. It allows for additional flexibility and can be used to run multiple web servers on the same machine. This port is commonly used for testing and development purposes as well.

    Rate this question:

  • 22. 

    How many bits are in an IPv4 address?

    • A.

      16 bits

    • B.

      32 bits

    • C.

      64 bits

    • D.

      128 bits

    Correct Answer
    B. 32 bits
    Explanation
    An IPv4 address is a 32-bit address, which means it consists of 32 binary digits or bits. This allows for a total of 2^32 or approximately 4.3 billion unique addresses. Each bit can be either a 0 or a 1, allowing for a wide range of possible combinations and therefore a large number of unique addresses.

    Rate this question:

  • 23. 

    Instead of using binary, how are IPv4 addresses expressed to be more user-friendly?

    • A.

      Colon Hexadecimal Format

    • B.

      Dotted Decimal Notation

    • C.

      Hexadecimal

    • D.

      Octal

    Correct Answer
    B. Dotted Decimal Notation
    Explanation
    IPv4 addresses are expressed in dotted decimal notation to make them more user-friendly. In this format, the address is divided into four parts, each representing a byte of the address, and separated by periods. Each byte is expressed in decimal form, ranging from 0 to 255. This format is easier for users to read and understand compared to binary or hexadecimal formats, which are more commonly used in computer systems.

    Rate this question:

  • 24. 

    Using a range of 1–126 in the first octet of an IPv4 address, what class does it belong to?

    • A.

      Class A

    • B.

      Class B

    • C.

      Class C

    • D.

      Class D

    Correct Answer
    A. Class A
    Explanation
    An IPv4 address with a first octet in the range of 1-126 belongs to Class A. Class A addresses are used for large networks, as they have a very large number of available IP addresses. The first octet in a Class A address represents the network portion of the address, while the remaining three octets represent the host portion.

    Rate this question:

  • 25. 

    What IPv4 class address is used for networks with about 250 nodes?

    • A.

      Class C

    • B.

      Class D

    • C.

      Class E

    • D.

      Class F

    Correct Answer
    A. Class C
    Explanation
    Class C IPv4 addresses are used for networks with about 250 nodes. Class C addresses have a range of 192.0.0.0 to 223.255.255.255, and they provide a maximum of 254 usable host addresses per network. This makes them suitable for small to medium-sized networks, such as small businesses or home networks. Class D addresses are used for multicast addresses, Class E addresses are reserved for experimental purposes, and Class F addresses are reserved for future use.

    Rate this question:

  • 26. 

    What IPv4 class address is used for multicast addressing?

    • A.

      Class C

    • B.

      Class D

    • C.

      Class E

    • D.

      Class F

    Correct Answer
    B. Class D
    Explanation
    Class D is the correct answer because it is the IPv4 class address used for multicast addressing. Multicast addressing allows a single packet to be sent to multiple destinations simultaneously. Class D addresses range from 224.0.0.0 to 239.255.255.255, and they are reserved for multicast groups. These addresses are used for applications such as video streaming, online gaming, and audio conferencing, where data needs to be sent to multiple recipients at the same time.

    Rate this question:

  • 27. 

    What IPv4 reserved address is used for loop back?

    • A.

      0.0.0.0

    • B.

      127.0.0.1

    • C.

      207.55.157.255

    • D.

      255.255.255.255

    Correct Answer
    B. 127.0.0.1
    Explanation
    The IPv4 reserved address used for loop back is 127.0.0.1. This address is commonly known as the loopback address and is used to test network connectivity on a local machine. When a packet is sent to this address, it is looped back to the same machine without being sent over the network. This allows for testing and troubleshooting network applications without the need for an actual network connection.

    Rate this question:

  • 28. 

    What is a mechanism that allows a network device to divide an IP address into a network and host number?

    • A.

      Subnet mask

    • B.

      Broadcast

    • C.

      Multicast

    • D.

      Subnet

    Correct Answer
    A. Subnet mask
    Explanation
    A subnet mask is a mechanism that allows a network device to divide an IP address into a network and host number. It is used to determine which part of the IP address represents the network and which part represents the host. By applying the subnet mask to the IP address, the device can determine the network address and perform routing and communication within the network.

    Rate this question:

  • 29. 

    What is the default classful subnet mask on class B networks?

    • A.

      255.255.0.0

    • B.

      255.255.240.0

    • C.

      255.255.255.0

    • D.

      255.255.255.224

    Correct Answer
    A. 255.255.0.0
    Explanation
    The default classful subnet mask for class B networks is 255.255.0.0. In classful networking, the IP address is divided into three parts: network, subnet, and host. Class B networks have a default subnet mask of 255.255.0.0, which means that the first two octets are used for the network portion and the last two octets are used for the host portion. This allows for a maximum of 65,534 hosts on each network.

    Rate this question:

  • 30. 

    What method borrows bits from the host field of an IP address to create a subnet?

    • A.

      Classful Subnet Masking

    • B.

      Classless Inter-Domain Routing

    • C.

      Virtual Private Networking

    • D.

      Virtual Local Area Networking

    Correct Answer
    B. Classless Inter-Domain Routing
    Explanation
    Classless Inter-Domain Routing (CIDR) is the method that borrows bits from the host field of an IP address to create a subnet. CIDR allows for more flexibility in subnetting by allowing the allocation of variable-length subnet masks, unlike Classful Subnet Masking which uses fixed-length subnet masks. Virtual Private Networking (VPN) and Virtual Local Area Networking (VLAN) are unrelated to subnetting and do not involve borrowing bits from the host field of an IP address.

    Rate this question:

  • 31. 

    Instead of using binary, how are IPv6 addresses expressed to be more user-friendly?

    • A.

      Colon Hexadecimal Format

    • B.

      Dotted Decimal Notation

    • C.

      Hexadecimal

    • D.

      Octal

    Correct Answer
    A. Colon Hexadecimal Format
    Explanation
    IPv6 addresses are expressed in the colon hexadecimal format to make them more user-friendly. In this format, the address is divided into eight groups of four hexadecimal digits separated by colons. This format allows for a larger address space compared to IPv4 and is easier for users to read and remember. Additionally, it eliminates the need for long strings of zeros, as consecutive zeros within a group can be replaced with a double colon (::). This simplifies the representation of IPv6 addresses and makes them more manageable for users.

    Rate this question:

  • 32. 

    What notation is expressed in leading zero compression for IPv6?

    • A.

      1234:1234:0:0:1234:0:0:1234

    • B.

      10AB::3:0:1234:5678

    • C.

      255.255.255.255

    • D.

      127.0.0.1

    Correct Answer
    A. 1234:1234:0:0:1234:0:0:1234
    Explanation
    The given answer, 1234:1234:0:0:1234:0:0:1234, is expressed in leading zero compression notation for IPv6. This notation allows consecutive sets of zeros to be replaced with a double colon (::), reducing the length of the IPv6 address. In this case, the two sets of consecutive zeros, 0:0 and 0:0, are compressed into ::, resulting in the given answer.

    Rate this question:

  • 33. 

    What notation is expressed in zero compression for IPv6? 

    • A.

      1234:1234:0:0:1234:0:0:1234

    • B.

      10AB::3:0:1234:5678

    • C.

      255.255.255.255

    • D.

      127.0.0.1

    Correct Answer
    B. 10AB::3:0:1234:5678
    Explanation
    The correct answer is "10AB::3:0:1234:5678". This notation represents zero compression for IPv6. In IPv6, consecutive blocks of zeros can be compressed by using double colons "::". This allows for a more concise representation of the IPv6 address. In the given answer, "::" is used to represent the consecutive blocks of zeros between "10AB" and "3", and between "3" and "1234:5678".

    Rate this question:

  • 34. 

    What Unicast address scope operates within a network segment, and will not originate from,or be destined to, an interface that requires a router to direct traffic?

    • A.

      Site-local

    • B.

      Link-local

    • C.

      Aggregatable Local

    • D.

      Aggregatable Global

    Correct Answer
    B. Link-local
    Explanation
    Link-local addresses are used for communication within a single network segment and do not require a router for directing traffic. These addresses are automatically assigned to interfaces and are only valid within the local network. They are typically used for neighbor discovery, address autoconfiguration, and other local network protocols. Link-local addresses cannot be routed outside the local network and are not globally unique.

    Rate this question:

  • 35. 

    What Unicast address scope is designed to be private, internally routable addresses that do not route outside the site?

    • A.

      Site-local

    • B.

      Link-local

    • C.

      Aggregatable Local

    • D.

      Aggregatable Global

    Correct Answer
    A. Site-local
    Explanation
    Site-local addresses are designed to be private, internally routable addresses that do not route outside the site. These addresses are used within a specific site or organization and are not meant to be globally unique. They provide a way for devices within the same site to communicate with each other without the need for global routing. Site-local addresses were deprecated in favor of Unique Local Addresses (ULA) in IPv6, but they were commonly used in IPv4 networks.

    Rate this question:

  • 36. 

    What Unicast address scope is publicly accessible with the Network ID portion of the address broken up into different areas allowing for hierarchical design and allocation? 

    • A.

      Site-local

    • B.

      Link-local

    • C.

      Aggregatable Local

    • D.

      Aggregatable Global

    Correct Answer
    D. Aggregatable Global
    Explanation
    Aggregatable Global is the correct answer because it refers to a unicast address scope that is publicly accessible and allows for hierarchical design and allocation. This means that the Network ID portion of the address can be broken up into different areas, enabling efficient routing and management of IP addresses on a global scale.

    Rate this question:

  • 37. 

    The computing part of the computer is the central processing unit, also called the

    • A.

      Control unit

    • B.

      Minicomputer

    • C.

      Microprocessor

    • D.

      Arithmetic logic unit

    Correct Answer
    C. Microprocessor
    Explanation
    The correct answer is microprocessor. The microprocessor is the computing part of the computer that performs all the necessary calculations and logical operations. It is responsible for executing instructions, managing data, and controlling the overall operation of the computer system. The control unit, arithmetic logic unit, and minicomputer are all components of a computer system, but the microprocessor specifically refers to the integrated circuit that contains the CPU.

    Rate this question:

  • 38. 

    What two main components make up the central processing unit?

    • A.

      Control unit and read-only memory

    • B.

      Control unit and arithmetic logic unit

    • C.

      Arithmetic logic unit and read-only memory

    • D.

      Arithmetic logic unit and random access memory

    Correct Answer
    B. Control unit and arithmetic logic unit
    Explanation
    The central processing unit (CPU) is composed of two main components: the control unit and the arithmetic logic unit (ALU). The control unit is responsible for managing and coordinating the operations of the CPU, including fetching instructions, decoding them, and executing them. The ALU, on the other hand, performs arithmetic and logical operations, such as addition, subtraction, and comparison. Together, these two components form the core of the CPU and are essential for carrying out the processing and execution of instructions in a computer system.

    Rate this question:

  • 39. 

    What is the type of memory that retains data after power is removed or lost?

    • A.

      Volatile

    • B.

      Nonvolatile

    • C.

      Secured

    • D.

      Unsecured

    Correct Answer
    B. Nonvolatile
    Explanation
    Nonvolatile memory is the type of memory that retains data even after power is removed or lost. Unlike volatile memory, which requires a constant power supply to maintain data, nonvolatile memory can retain information even when power is not available. This type of memory is commonly used in devices like solid-state drives (SSDs), flash drives, and ROM (Read-Only Memory) chips. It allows for long-term storage of data without the risk of losing it due to power failure or shutdown.

    Rate this question:

  • 40. 

    Which landline transmission medium is the primary carrier of voice communications

    • A.

      Twisted pair cable

    • B.

      Fiber optic cable

    • C.

      Coaxial cable

    • D.

      Twinax cable

    Correct Answer
    A. Twisted pair cable
    Explanation
    Twisted pair cable is the primary carrier of voice communications because it is a cost-effective and widely used transmission medium for telephone systems. It consists of two insulated copper wires twisted together, which helps to reduce electromagnetic interference. The twisted pair cable is capable of transmitting voice signals over long distances without significant loss or degradation of quality. It is also easy to install and maintain, making it a popular choice for landline telephone networks.

    Rate this question:

  • 41. 

    An optical communications system is comprised of a

    • A.

      Transmitter, cable, and receiver

    • B.

      Transmitter, cable, and logic analyzer

    • C.

      Transmitter, transmission medium, and logic analyzer

    • D.

      Transmitter, transmission medium and protocol analyzer

    Correct Answer
    A. Transmitter, cable, and receiver
    Explanation
    An optical communications system requires a transmitter to convert electrical signals into optical signals, a cable or transmission medium to carry the optical signals, and a receiver to convert the optical signals back into electrical signals. The logic analyzer and protocol analyzer mentioned in the other options are not essential components of an optical communications system.

    Rate this question:

  • 42. 

    Which of the following is not one of the three advantages to using wireless technology?

    • A.

      Ease of installation

    • B.

      Lower Cost

    • C.

      Safety

    • D.

      Mobility

    Correct Answer
    C. Safety
    Explanation
    Wireless technology offers several advantages, including ease of installation, lower cost, and mobility. However, safety is not one of these advantages. While wireless technology can provide convenience and flexibility, it also comes with certain risks, such as potential interference, security vulnerabilities, and health concerns related to electromagnetic radiation. Therefore, safety cannot be considered as one of the advantages of using wireless technology.

    Rate this question:

  • 43. 

    The ability to move about without being tethered by wires in wireless technology is called

    • A.

      Mobility

    • B.

      Ease of installations

    • C.

      War driving

    • D.

      Motion capture technology

    Correct Answer
    A. Mobility
    Explanation
    The correct answer is "mobility" because wireless technology allows devices to move freely without the need for physical connections or wires. This enables users to access and use technology while on the go, providing them with the freedom to move around without being restricted by cables.

    Rate this question:

  • 44. 

    Which of the following is not one the four security threats to Wireless Local Area Network?

    • A.

      Rogue Access Points

    • B.

      Direct Connections

    • C.

      War Drivers

    • D.

      Hackers

    Correct Answer
    B. Direct Connections
    Explanation
    Direct Connections is not one of the four security threats to Wireless Local Area Network. Rogue Access Points, War Drivers, and Hackers are all considered security threats to WLAN. Rogue Access Points refer to unauthorized access points that are set up by individuals without permission, which can lead to unauthorized access to the network. War Drivers are individuals who drive around looking for vulnerable wireless networks to exploit. Hackers are individuals who attempt to gain unauthorized access to a network for malicious purposes. However, Direct Connections do not pose a specific security threat to WLAN as they are typically used for legitimate purposes such as connecting devices directly to a router or modem.

    Rate this question:

  • 45. 

    Who is an authorized client that may unknowingly or maliciously help outside parties gain access to a network?

    • A.

      Auditor

    • B.

      Employee

    • C.

      War Driver

    • D.

      Hacker

    Correct Answer
    B. Employee
    Explanation
    An employee is an authorized client who may unknowingly or maliciously help outside parties gain access to a network. As an authorized user, an employee has access to sensitive information and can potentially misuse their privileges to compromise the network security. They may unknowingly fall victim to social engineering tactics or intentionally collaborate with external parties to breach the network defenses. Therefore, it is crucial for organizations to implement strong security measures, employee training, and monitoring systems to prevent such unauthorized activities and protect the network from potential threats.

    Rate this question:

  • 46. 

    What organization developed several wireless standards to meet the demands of security,speed, and flexibility of today’s wireless networks?

    • A.

      Institute of Electrical Electronics Engineers

    • B.

      International Organization for Standardization

    • C.

      Internet assigned numbers authority

    • D.

      National Science Foundation network

    Correct Answer
    A. Institute of Electrical Electronics Engineers
    Explanation
    The Institute of Electrical Electronics Engineers (IEEE) developed several wireless standards to meet the demands of security, speed, and flexibility of today's wireless networks. These standards ensure that wireless networks are reliable, efficient, and interoperable. The IEEE is a renowned organization in the field of electrical engineering and is responsible for developing various technical standards across different industries, including wireless communication.

    Rate this question:

  • 47. 

    How many peripherals can a Universal Serial Bus handle at once? 

    • A.

      127

    • B.

      128

    • C.

      227

    • D.

      228

    Correct Answer
    A. 127
    Explanation
    A Universal Serial Bus (USB) can handle up to 127 peripherals at once. This is because USB uses a 7-bit addressing system, allowing for a maximum of 127 unique addresses for connected devices. Each peripheral connected to the USB is assigned a unique address, and the USB controller can communicate with all these devices simultaneously. Therefore, the correct answer is 127.

    Rate this question:

  • 48. 

    How many devices can connect to a FireWire bus? 

    • A.

      63

    • B.

      64

    • C.

      65

    • D.

      66

    Correct Answer
    A. 63
    Explanation
    A FireWire bus can support up to 63 devices connected to it. This is because the FireWire standard allows for a maximum of 63 devices to be connected in a daisy-chain configuration. Each device on the FireWire bus has a unique identifier, allowing them to communicate with the computer independently. Therefore, the correct answer is 63.

    Rate this question:

  • 49. 

    What do you apply across Liquid Crystal Display material to change the alignment and lightpolarizing property? 

    • A.

      Current

    • B.

      Voltage

    • C.

      Resistance

    • D.

      Inductance

    Correct Answer
    B. Voltage
    Explanation
    To change the alignment and light polarizing property of Liquid Crystal Display (LCD) material, voltage is applied. Voltage is used to control the orientation of the liquid crystal molecules, which affects the alignment and polarization of light passing through the LCD material. By applying different voltages, the liquid crystal molecules can be aligned in different directions, allowing control over the transmission or blocking of light, thus enabling the display of different colors and images on the LCD screen.

    Rate this question:

  • 50. 

    What is a Data Link layer network device that logically separates a single network into two segments or collision domains in Ethernet networks?

    • A.

      Hub

    • B.

      Bridge

    • C.

      Switch

    • D.

      Router

    Correct Answer
    B. Bridge
    Explanation
    A bridge is a Data Link layer network device that logically separates a single network into two segments or collision domains in Ethernet networks. It operates by examining the MAC addresses of the incoming frames and forwarding them only to the appropriate segment, based on the destination MAC address. This helps to reduce collisions and improve network performance by isolating traffic within each segment. Unlike a hub, which simply broadcasts all incoming frames to all connected devices, a bridge selectively forwards frames, making it a more efficient option for segmenting networks.

    Rate this question:

Quiz Review Timeline +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 19, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Feb 04, 2015
    Quiz Created by
    Youdontlovecdc
Back to Top Back to top
Advertisement