1511 Flashcards
At what OSI layer are virtual circuits established, maintained and terminated?
Transport (layer 4)
Which of the following is an example of a video compression standard?
A. Motion Picture Experts Group-4 (MPEG-4)
B. Joint Photographic Experts Group (JPEG)
C. File Transfer Protocol (FTP)
D. G.711
Motion Picture Experts Group-4 (MPEG-4)
In the OSI model, a layer will communicate with what other layers?
Layer above, layer below, peer layer
What data communications protocol uses characters or “handshaking” to control the link and represent information?
Binary synchronous protocol
In binary-synchronous protocol, which characters establishes and maintains character synchronization prior to the message block and during transmission?
SYN
Which data communication protocol is based on bits and the position of the bits?
Bit-oriented
Which data communications protocol is a transmission code that supports a variety of link types and technologies?
Synchronous Date Link Control (SDLC)
Which network layer protocol matches a known IP address for a destination device to a MAC address?
Address Resolution Protocol (ARP)
Which network layer protocol provides messaging that can help with troubleshooting?
Internet Control Message Protocol (ICMP)
Which transport layer protocol provides reliable data delivery services?
Transmission Control Protocol (TCP)
Which application layer protocol is used to synchronize the clocks of computers on a network?
Network Time Protocol (NTP)
Which network Class has the most addresses for hosts?
Class A
How many subnet bits are required to support 90 subnets on a Class B network?
7
IPv6 addresses are represented by…
8 groups of hexadecimal numbers
Teredo has four tunneling components. Which one is not one of them? A. Host-specific relay B. Client C. Server D. Agent
Agent
Which device has multiport connectivity that directs data between nodes on a network?
Router
Which routing protocol do internet backbones used?
Border Gateway Protocol (BGP)
Which router port is used for initial configuration?
Console
When configuring a router, you control access to privileged EXEC mode by configuring which password?
Enable
On a router’s serial interface connection, what provides the timing signal for the communications link?
Data communications equipment
VPNs allow the AF to extend network resources across a/an…
public network
Which topology defines the way in which devices communicate and data is transmitted throughout the network?
Logical
Which topology has the stations connected in the form of a circle?
Ring
Which topology combines two or more different physical topologies in a single network?
Hybrid
Which device subdivides a network into smaller logical pieces, or segments?
Switch
The time it takes a switch to figure out where to forward a data unit is called its…
Latency
Which of the following is not a distinct layer of the hierarchical network design? A. Core B. Access C. Transport D. Distribution
Transport
How many broadcast domains forms a VLAN?
One
What allows transportation of all active VLANs between switches using a single physical link?
VLAN trunks
What will minimize EtherChannel configuration problems?
Configure all interfaces to operate at the same speed and duplex modes
Which IEEE specification is lease susceptible to interference caused by household appliances and medical devices?
802.11a
Which wireless design phase accounts for the amount of users on the network, the training required for the users and the security and integrity requirements of the network data?
Planning
What identifier differentiates one wireless local area network (WLAN) from another?
Service Set Identifier (SSID)
A Management Information Base (MIB) is a collection of information that is organized…
Hierarchically
Simple Network Management Protocol (SNMP) is a tool used by network administrators to manage network performance, investigate and solve network problems and help plan for…
Future growth
Which physical security action can you take to ensure network equipment supports the widest range of security services?
Configure the equipment with the maximum amount of memory possible
In general, you should deny direct dial-in access to a network device by disabling which port?
Auxiliary
Individual pulses within a digital signal are…
bits
What is most commonly used in data systems to express signaling speed?
Bits per second
Which option is a characteristic of synchronous data operations?
All data bits are the same length in time
A digital signal that contains synchronizing bits within the signal stream describes…
synchronous operation
How many voltage levels does a binary signal have?
2
In what type of digital signal does the signal level move to one of the discrete signal levels, but returns to the zero level after a predetermined time?
Return-to-zero
Digital coding techniques such as binary with eight-zero substitution (B8ZS) are becoming more popular because they are designed to…
Provide error-free signaling
Which statement best describes a binary with eight-zero substitution (B8ZS) signal?
Bipolar violations are intentionally inserted into a data signal to break up long strings of zeros
How many bits are in the extended superframe format (ESF) sequence?
24
The signaling equipment has three types of communications signals that functions to…
Control and process calls
Which communications control signal uses a two-frequency dialing combination?
Tone
In common associated signaling (CAS), what is the seventh bit in frames 6 and 12 used for?
Bit robbing
How is supervisory signaling information transferred in common channel signaling (CCS)?
Separate network channel
Which common channel signaling (CCS) mode does the transfer of messages relating to signaling between two points occur directly over links interconnecting the signaling points?
Associated
What is the process, or result of the process, of modifying (varying) one or more characteristics of a carrier signal in accordance with an instantaneous characteristic of an information signal?
Modulation
The signal components that occur as bands above and below a carrier are called…
Sidebands
To prevent frequency modulation (FM) radio stations from interfering with each other, the FCC has set limits that allow each station to cause its oscillator frequency to deviate no more than…
75kHz
Which form of modulation is insensitive to signal variations?
Binary-phase shift keying
The form of pulse modulation in which a discrete pulse is varied within a range of positions is known as…
Pulse-position
Which type of pulse modulation is lease affected by noise?
Pulse-code
Which form of multiplexing is very susceptible to signal deterioration?
Frequency-division
What are the two major types of frame structures?
CCITT and low speed
The method for multiplexing the T1 multiplexer uses is…
Time division
Which wave-division multiplexing technology uses uncooled lasers to reduce cost?
Coarse wave division multiplexing
To create a better timing environment in communications networks, external timing distribution occurs through…
station clocks
What do GPS satellites use to provide very precise time to GPS receivers?
Atomic clock
Which stratum level is a GPS timing source?
Level 1
Which agency has responsibility for a circuit end-to-end?
Circuit Control Office (CCO)
Who is responsible for all circuits within their facility up to the designated demarcation point and provides troubleshooting assistance at the direction of the Global NetOps Support Center (GNSC)?
Node side coordinator
Which agency is the preferred transport provider for Internet and commercial satellite connections used for voice, video and/or data services on DOD networks?
DISA (Defense Information Systems Agency)
What web application is used to order telecommunications products and services from the Defense Information Systems Agency (DISA)?
DISA Direct Order Entry (DDOE)
What document is the authority for the operations and maintenance agencies to procure specific devices and ancillary equipment necessary for the installation or operation of the circuit?
Telecommunications service order (TSO)
Which DD form do you use for an official narrative log that is often used to brief unit commanders?
DD form 1753
Which DD from is used as the primary source of information when preparing DOD Information Network (DODIN) status reports?
DD form 1443
Which test results do you record on the reverse/back side of the DD form 1697-Analog?
Frequency response and envelope delay
If the circuit files are lost or destroyed, what document are Technical Control Facilities required to obtain?
The latest telecommunications service order (TSO) that reflects the current end-to-end circuit configuration
Within how many normal duty hours of completion action on the Telecommunications Service Order (TSO) must the circuit control office (CCO) submit an in-effect report?
72
What report must be sent if the circuit does not meet all required parameters and the Telecommunications Service Order (TSO) issuing authority advises that the circuit is accepted for service?
Exception report
Trend analysis is a program that ensures circuits meet management thresholds on what basis?
Monthly
IF a circuit fails its management threshold, what test might be performed?
Quality control
Which publication lists the methods used to identify systems, links, trunks and circuits?
Defense Information Systems Agency Circular (DISAC) 310-65-1
Which office or system confirms a restoration priority?
National Communications Systems (NCS)
When you must restore user service by rerouting, what is the second type of circuit you preempt?
Circuits with 00 RP codes
Combined distribution frames encompass the functions of a main distribution frame and…
An intermediate distribution frame
Who determines if PMIs are accomplished when commercial manuals or publications are not available?
Flight Commander
When a telephone network is circuit switched, each call…
has a dedicated circuit created by the switch
In Integrated Services Digital Network (ISDN), the “B” channel carries…
User traffic
The three cornerstones of voice network systems security are…
Availability, Confidentiality, Integrity
The vulnerabilities of voice and data converged networks were highlighted in a report released by the…
President’s National Security Telecommunications Advisory Committee
What should security policies encompass to help mitigate the threat of convergence?
Both voice and data networks
What provides the enterprise wide visibility into telecom resource utilization, phone network usage and incidents of toll fraud?
Enterprise Telephony Network system
During the initial research for voice system security, who recognized that the most common security threats could be addressed by voice protection system?
The Air Force Information Warfare Battle Lab
Which is not a component of the voice protection system architecture? A. Server B. Firewall C. Software D. Appliance
Firewall
Where are voice protection system servers installed?
Integrated Network and Security Center (INOSC)
Which is not a characteristic and capability of a voice protection system?
A. Securing communications
B. Enabling of real-time notifications
C. Centralizing yet distributing management
D. Detecting and blocking all inbound and outbound modem connections
Centralizing yet distributing management
What are attempts to gain access to a switch system by posing as an authorized user?
Masquerades
How many serial data interface ports does the Meridian Option 11C Small System Controller have?
3
What is the maximum number of ports that a Meridian System Logic-100 (MSL-100) supports?
30,000
Which elements make up the control component of the SuperNode central control?
CM and system load module (SLM)
What link is used to connect the Digital Multiplex System (DMS)-core to the DMS-bus?
DS-512
What Digital Multiplex System (DMS)-100 system contains subsystems for test routing, fault detection, fault analysis and error reporting?
Maintenance and administration position
The primary reason you should measure the voltage across faulty terminal protectors before removing and replacing them is to…
Ensure dangerous voltages are not present on the line
Where do incoming (unswitched) circuits transmitted to the ENET enter the NT9X35A cross-point card?
Vertical Bus
Which Digital Multiplex System (DMS)-100 database facility is responsible for creating and maintaining tables of data in a controlled manner?
Table control
Which Digital Multiplex System (DMS)-100 database facility provides for storing data modifications orders (DMO) and for retrieving them at a specified time for execution?
Pending order file
Which Digital Multiplex System (DMS)-100 database facility provides facilities for preserving data modifications orders (DMO) on tape or disk so that data tables can be restored if the system fails?
Journal File