Cyber Support Journeyman Vol 2

Approved & Edited by ProProfs Editorial Team
The editorial team at ProProfs Quizzes consists of a select group of subject experts, trivia writers, and quiz masters who have authored over 10,000 quizzes taken by more than 100 million users. This team includes our in-house seasoned quiz moderators and subject matter experts. Our editorial experts, spread across the world, are rigorously trained using our comprehensive guidelines to ensure that you receive the highest quality quizzes.
Learn about Our Editorial Process
| By Jessica_serres
J
Jessica_serres
Community Contributor
Quizzes Created: 1 | Total Attempts: 140
Questions: 17 | Attempts: 140

SettingsSettingsSettings
Cyber Support Journeyman Vol 2 - Quiz


3DXXX


Questions and Answers
  • 1. 

    What layer of the Open System Interconnect model defines the electrical, mechanical, procedural, and functional specifications for links between communication network systems?

    • A.

      Physical

    • B.

      Data Link

    • C.

      Network

    • D.

      Transport

    Correct Answer
    A. pHysical
    Explanation
    The physical layer of the Open System Interconnect model is responsible for defining the electrical, mechanical, procedural, and functional specifications for the links between communication network systems. This layer deals with the physical transmission of data and the physical characteristics of the network, such as cables, connectors, and signaling. It ensures that the data is properly transmitted over the network and provides the necessary hardware and software interfaces for communication between devices.

    Rate this question:

  • 2. 

    The computing part of the computer is the central processing unit, also called the

    • A.

      Control unit

    • B.

      Minicomputer

    • C.

      Microprocessor

    • D.

      Arithmetic logic unit

    Correct Answer
    C. Microprocessor
    Explanation
    The correct answer is microprocessor because it is the part of the computer that performs most of the processing inside the computer. It is responsible for executing instructions, performing calculations, and managing data flow between different parts of the computer. The microprocessor is often referred to as the "brain" of the computer as it controls and coordinates all the activities of the computer system.

    Rate this question:

  • 3. 

    What are two main componets make up the central processing unit?

    • A.

      Control unit and read-only memory

    • B.

      Control unit and arithmetic logic unit

    • C.

      Arithmetic logic unit and read-only memory

    • D.

      Arithmetic logic unit and random access memory

    Correct Answer
    B. Control unit and arithmetic logic unit
    Explanation
    The central processing unit (CPU) is composed of two main components: the control unit and the arithmetic logic unit (ALU). The control unit is responsible for managing and coordinating the operations of the CPU, including fetching instructions from memory, decoding them, and executing them. On the other hand, the ALU performs arithmetic and logical operations, such as addition, subtraction, and comparisons. Together, these two components form the core of the CPU, allowing it to carry out the instructions and perform calculations required by the computer system.

    Rate this question:

  • 4. 

    What is the type of memory that retains data after power is removed or lost?

    • A.

      Volatile

    • B.

      Nonvolatile

    • C.

      Secured

    • D.

      Unsecured

    Correct Answer
    B. Nonvolatile
    Explanation
    Nonvolatile memory is the type of memory that retains data even after power is removed or lost. This means that the data stored in nonvolatile memory remains intact and can be accessed again once power is restored. Unlike volatile memory, which loses its data when power is turned off, nonvolatile memory is designed to retain information for long periods of time, making it ideal for storing important data that needs to be preserved even in the absence of power.

    Rate this question:

  • 5. 

    Which landline transmission medium is the primary carier of voice communications?

    • A.

      Twisted pair cable

    • B.

      Fiber optic cable

    • C.

      Coaxial Cable

    • D.

      Twinax cable

    Correct Answer
    A. Twisted pair cable
    Explanation
    Twisted pair cable is the primary carrier of voice communications because it is a widely used transmission medium for telephone systems. It consists of two insulated copper wires twisted together, which helps to reduce interference and crosstalk. Twisted pair cable is cost-effective, easy to install, and can transmit voice signals over long distances without significant loss of quality. It is commonly used in residential and business telephone systems, making it the preferred choice for voice communication transmission.

    Rate this question:

  • 6. 

    An optical communications system is comprised of a

    • A.

      Transmitter, cable and receiver

    • B.

      Transmitter, cable, and logic analyzer

    • C.

      Transmitter, transmission medium, and logic analyzer

    • D.

      Transmitter, transmission medium, and protocol analyzer

    Correct Answer
    A. Transmitter, cable and receiver
    Explanation
    The correct answer is Transmitter, cable, and receiver. In an optical communications system, the transmitter is responsible for converting electrical signals into optical signals, which are then transmitted through a cable or fiber optic medium. The receiver at the other end of the cable receives the optical signals and converts them back into electrical signals. Therefore, the transmitter, cable, and receiver are the essential components of an optical communications system. The other options, such as logic analyzer and protocol analyzer, are not directly involved in the transmission and reception of optical signals.

    Rate this question:

  • 7. 

    Which of the following is not one of the three advantages to using wireless technology?

    • A.

      Ease of installaiton

    • B.

      Lower cost

    • C.

      Safety

    • D.

      Mobility

    Correct Answer
    C. Safety
    Explanation
    The given answer, "Safety," is not one of the three advantages to using wireless technology. The three advantages mentioned are ease of installation, lower cost, and mobility. Safety, although important, is not listed as one of the advantages.

    Rate this question:

  • 8. 

    The ability to move about without being tethered by wires in wireless technology is called

    • A.

      Mobility

    • B.

      Ease of installations

    • C.

      War driving

    • D.

      Motion capture technolgoy

    Correct Answer
    A. Mobility
    Explanation
    The term "mobility" refers to the ability to move freely without being restricted by wires in wireless technology. It indicates the convenience and freedom provided by wireless devices that allow users to move around while maintaining connectivity. This term encompasses the idea of being untethered and having the flexibility to move about with ease.

    Rate this question:

  • 9. 

    Which of the following is not one of the four security threats to Wireless Local Area Network?

    • A.

      Rogue Access Points

    • B.

      Direct Connections

    • C.

      War Drivers

    • D.

      Hackers

    Correct Answer
    B. Direct Connections
    Explanation
    Direct Connections are not one of the four security threats to Wireless Local Area Network. Rogue Access Points are unauthorized access points that can be used by attackers to gain access to the network. War Drivers are individuals who drive around searching for wireless networks to exploit. Hackers are individuals who attempt to gain unauthorized access to the network. However, Direct Connections refer to wired connections and are not specific to wireless networks, making them not a security threat in this context.

    Rate this question:

  • 10. 

    Who is an authorized client that may unknowingly or maliciously help outside parites gain access to a network?

    • A.

      Auditor

    • B.

      Employee

    • C.

      War Driver

    • D.

      Hacker

    Correct Answer
    B. Employee
    Explanation
    An employee is an authorized client who may unknowingly or maliciously help outside parties gain access to a network. As an authorized user, an employee has legitimate access to the network and can potentially misuse their privileges to compromise the security of the network. This can be done either unintentionally, through negligence or lack of awareness of security protocols, or intentionally, through malicious actions such as sharing sensitive information or installing malware. Therefore, an employee poses a significant risk to the network's security if their actions are not properly monitored and controlled.

    Rate this question:

  • 11. 

    What organization developed several wireless standards to meet  the demands of security, speed, and flexibility of today's wireless networks?

    • A.

      Institute of Electrical Elctronics Engineers

    • B.

      International Organization for Standardization

    • C.

      Internet assigned numbers authority

    • D.

      National Science Foundation network

    Correct Answer
    A. Institute of Electrical Elctronics Engineers
    Explanation
    The Institute of Electrical Electronics Engineers (IEEE) developed several wireless standards to meet the demands of security, speed, and flexibility of today's wireless networks. These standards include IEEE 802.11 (Wi-Fi), IEEE 802.15 (Bluetooth), and IEEE 802.16 (WiMAX). These standards ensure that wireless devices from different manufacturers can communicate with each other effectively and securely, promoting interoperability and advancing the development of wireless technology.

    Rate this question:

  • 12. 

    How many peripherals can a Universal Serial Bus handle at once?

    • A.

      127

    • B.

      128

    • C.

      227

    • D.

      228

    Correct Answer
    A. 127
    Explanation
    A Universal Serial Bus (USB) can handle up to 127 peripherals at once. This is because USB uses a 7-bit address field, allowing for a maximum of 127 unique addresses for connected devices. Each peripheral connected to the USB requires a unique address, and the remaining address (address 0) is reserved for the host controller. Therefore, the correct answer is 127.

    Rate this question:

  • 13. 

    How many devices can connect to FireWire bus?

    • A.

      63

    • B.

      64

    • C.

      65

    • D.

      66

    Correct Answer
    A. 63
    Explanation
    FireWire, also known as IEEE 1394, is a high-speed serial bus technology that allows multiple devices to be connected and communicate with each other. The maximum number of devices that can connect to a FireWire bus is 63. This limitation is due to the addressing scheme used by FireWire, which only allows for a maximum of 63 unique device addresses. Therefore, the correct answer is 63.

    Rate this question:

  • 14. 

    What do you apply across Liquid Crystal Display material to change the alignment and light polarizing property>

    • A.

      Current

    • B.

      Voltage

    • C.

      Resistance

    • D.

      Inductance

    Correct Answer
    B. Voltage
    Explanation
    Voltage is applied across Liquid Crystal Display (LCD) material to change the alignment and light polarizing property. This is because LCDs work on the principle of electrically controlling the alignment of liquid crystal molecules. By applying voltage, the orientation of the liquid crystal molecules can be altered, which in turn changes the polarizing property of light passing through the material. This allows the LCD to control the amount of light that is transmitted and create the desired display.

    Rate this question:

  • 15. 

    What is a Data Link layer network device that logically separates a single network into two segments or collision domains in Ethernet networks?

    • A.

      Hub

    • B.

      Bridge

    • C.

      Switch

    • D.

      Router

    Correct Answer
    B. Bridge
    Explanation
    A bridge is a Data Link layer network device that logically separates a single network into two segments or collision domains in Ethernet networks. It does this by examining the destination MAC address of each incoming frame and forwarding it only to the appropriate segment. This helps to reduce collisions and improve network performance by limiting the number of devices sharing the same network segment. Unlike a hub, which simply broadcasts all incoming frames to all connected devices, a bridge intelligently routes traffic to specific segments, making it a more efficient and scalable solution for network segmentation.

    Rate this question:

  • 16. 

    What rule establishes the percent of data that should be local to a segment and the percentage of data that should be destined to traverse a bridge to the other segment?

    • A.

      90/10 rule

    • B.

      80/20 rule

    • C.

      70/30 rule

    • D.

      60/40 rule

    Correct Answer
    B. 80/20 rule
    Explanation
    The 80/20 rule is a principle that suggests that 80% of the data should be local to a segment, while the remaining 20% should be destined to traverse a bridge to the other segment. This rule implies that the majority of the data should be stored and processed within the segment itself, reducing the need for communication between segments. By adhering to this rule, network efficiency and performance can be optimized, as local data processing is faster and requires less network bandwidth compared to data transmission between segments.

    Rate this question:

  • 17. 

    This type of bridge is used to convert one Data Link layer protocol to another

    • A.

      Cross route

    • B.

      Transparent

    • C.

      Translational

    • D.

      Source route

    Correct Answer
    C. Translational
    Explanation
    A translational bridge is used to convert one Data Link layer protocol to another. It acts as a mediator between two different protocols, allowing communication between devices that use different protocols. This type of bridge is responsible for translating the data frames from one protocol to another, ensuring compatibility and seamless communication between the devices.

    Rate this question:

Quiz Review Timeline +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Aug 07, 2024
    Quiz Edited by
    ProProfs Editorial Team
  • Jan 31, 2012
    Quiz Created by
    Jessica_serres
Back to Top Back to top
Advertisement
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.