1511 Flashcards

1
Q

At what OSI layer are virtual circuits established, maintained and terminated?

A

Transport (layer 4)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which of the following is an example of a video compression standard?
A. Motion Picture Experts Group-4 (MPEG-4)
B. Joint Photographic Experts Group (JPEG)
C. File Transfer Protocol (FTP)
D. G.711

A

Motion Picture Experts Group-4 (MPEG-4)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

In the OSI model, a layer will communicate with what other layers?

A

Layer above, layer below, peer layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What data communications protocol uses characters or “handshaking” to control the link and represent information?

A

Binary synchronous protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

In binary-synchronous protocol, which characters establishes and maintains character synchronization prior to the message block and during transmission?

A

SYN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which data communication protocol is based on bits and the position of the bits?

A

Bit-oriented

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which data communications protocol is a transmission code that supports a variety of link types and technologies?

A

Synchronous Date Link Control (SDLC)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which network layer protocol matches a known IP address for a destination device to a MAC address?

A

Address Resolution Protocol (ARP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which network layer protocol provides messaging that can help with troubleshooting?

A

Internet Control Message Protocol (ICMP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which transport layer protocol provides reliable data delivery services?

A

Transmission Control Protocol (TCP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which application layer protocol is used to synchronize the clocks of computers on a network?

A

Network Time Protocol (NTP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which network Class has the most addresses for hosts?

A

Class A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

How many subnet bits are required to support 90 subnets on a Class B network?

A

7

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

IPv6 addresses are represented by…

A

8 groups of hexadecimal numbers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q
Teredo has four tunneling components. Which one is not one of them?
A. Host-specific relay
B. Client
C. Server
D. Agent
A

Agent

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Which device has multiport connectivity that directs data between nodes on a network?

A

Router

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Which routing protocol do internet backbones used?

A

Border Gateway Protocol (BGP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Which router port is used for initial configuration?

A

Console

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

When configuring a router, you control access to privileged EXEC mode by configuring which password?

A

Enable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

On a router’s serial interface connection, what provides the timing signal for the communications link?

A

Data communications equipment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

VPNs allow the AF to extend network resources across a/an…

A

public network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Which topology defines the way in which devices communicate and data is transmitted throughout the network?

A

Logical

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Which topology has the stations connected in the form of a circle?

A

Ring

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Which topology combines two or more different physical topologies in a single network?

A

Hybrid

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Which device subdivides a network into smaller logical pieces, or segments?

A

Switch

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

The time it takes a switch to figure out where to forward a data unit is called its…

A

Latency

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q
Which of the following is not a distinct layer of the hierarchical network design?
A. Core
B. Access
C. Transport
D. Distribution
A

Transport

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

How many broadcast domains forms a VLAN?

A

One

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

What allows transportation of all active VLANs between switches using a single physical link?

A

VLAN trunks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

What will minimize EtherChannel configuration problems?

A

Configure all interfaces to operate at the same speed and duplex modes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

Which IEEE specification is lease susceptible to interference caused by household appliances and medical devices?

A

802.11a

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

Which wireless design phase accounts for the amount of users on the network, the training required for the users and the security and integrity requirements of the network data?

A

Planning

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

What identifier differentiates one wireless local area network (WLAN) from another?

A

Service Set Identifier (SSID)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

A Management Information Base (MIB) is a collection of information that is organized…

A

Hierarchically

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

Simple Network Management Protocol (SNMP) is a tool used by network administrators to manage network performance, investigate and solve network problems and help plan for…

A

Future growth

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

Which physical security action can you take to ensure network equipment supports the widest range of security services?

A

Configure the equipment with the maximum amount of memory possible

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

In general, you should deny direct dial-in access to a network device by disabling which port?

A

Auxiliary

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

Individual pulses within a digital signal are…

A

bits

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

What is most commonly used in data systems to express signaling speed?

A

Bits per second

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

Which option is a characteristic of synchronous data operations?

A

All data bits are the same length in time

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

A digital signal that contains synchronizing bits within the signal stream describes…

A

synchronous operation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

How many voltage levels does a binary signal have?

43
Q

In what type of digital signal does the signal level move to one of the discrete signal levels, but returns to the zero level after a predetermined time?

A

Return-to-zero

44
Q

Digital coding techniques such as binary with eight-zero substitution (B8ZS) are becoming more popular because they are designed to…

A

Provide error-free signaling

45
Q

Which statement best describes a binary with eight-zero substitution (B8ZS) signal?

A

Bipolar violations are intentionally inserted into a data signal to break up long strings of zeros

46
Q

How many bits are in the extended superframe format (ESF) sequence?

47
Q

The signaling equipment has three types of communications signals that functions to…

A

Control and process calls

48
Q

Which communications control signal uses a two-frequency dialing combination?

49
Q

In common associated signaling (CAS), what is the seventh bit in frames 6 and 12 used for?

A

Bit robbing

50
Q

How is supervisory signaling information transferred in common channel signaling (CCS)?

A

Separate network channel

51
Q

Which common channel signaling (CCS) mode does the transfer of messages relating to signaling between two points occur directly over links interconnecting the signaling points?

A

Associated

52
Q

What is the process, or result of the process, of modifying (varying) one or more characteristics of a carrier signal in accordance with an instantaneous characteristic of an information signal?

A

Modulation

53
Q

The signal components that occur as bands above and below a carrier are called…

54
Q

To prevent frequency modulation (FM) radio stations from interfering with each other, the FCC has set limits that allow each station to cause its oscillator frequency to deviate no more than…

55
Q

Which form of modulation is insensitive to signal variations?

A

Binary-phase shift keying

56
Q

The form of pulse modulation in which a discrete pulse is varied within a range of positions is known as…

A

Pulse-position

57
Q

Which type of pulse modulation is lease affected by noise?

A

Pulse-code

58
Q

Which form of multiplexing is very susceptible to signal deterioration?

A

Frequency-division

59
Q

What are the two major types of frame structures?

A

CCITT and low speed

60
Q

The method for multiplexing the T1 multiplexer uses is…

A

Time division

61
Q

Which wave-division multiplexing technology uses uncooled lasers to reduce cost?

A

Coarse wave division multiplexing

62
Q

To create a better timing environment in communications networks, external timing distribution occurs through…

A

station clocks

63
Q

What do GPS satellites use to provide very precise time to GPS receivers?

A

Atomic clock

64
Q

Which stratum level is a GPS timing source?

65
Q

Which agency has responsibility for a circuit end-to-end?

A

Circuit Control Office (CCO)

66
Q

Who is responsible for all circuits within their facility up to the designated demarcation point and provides troubleshooting assistance at the direction of the Global NetOps Support Center (GNSC)?

A

Node side coordinator

67
Q

Which agency is the preferred transport provider for Internet and commercial satellite connections used for voice, video and/or data services on DOD networks?

A

DISA (Defense Information Systems Agency)

68
Q

What web application is used to order telecommunications products and services from the Defense Information Systems Agency (DISA)?

A

DISA Direct Order Entry (DDOE)

69
Q

What document is the authority for the operations and maintenance agencies to procure specific devices and ancillary equipment necessary for the installation or operation of the circuit?

A

Telecommunications service order (TSO)

70
Q

Which DD form do you use for an official narrative log that is often used to brief unit commanders?

A

DD form 1753

71
Q

Which DD from is used as the primary source of information when preparing DOD Information Network (DODIN) status reports?

A

DD form 1443

72
Q

Which test results do you record on the reverse/back side of the DD form 1697-Analog?

A

Frequency response and envelope delay

73
Q

If the circuit files are lost or destroyed, what document are Technical Control Facilities required to obtain?

A

The latest telecommunications service order (TSO) that reflects the current end-to-end circuit configuration

74
Q

Within how many normal duty hours of completion action on the Telecommunications Service Order (TSO) must the circuit control office (CCO) submit an in-effect report?

75
Q

What report must be sent if the circuit does not meet all required parameters and the Telecommunications Service Order (TSO) issuing authority advises that the circuit is accepted for service?

A

Exception report

76
Q

Trend analysis is a program that ensures circuits meet management thresholds on what basis?

77
Q

IF a circuit fails its management threshold, what test might be performed?

A

Quality control

78
Q

Which publication lists the methods used to identify systems, links, trunks and circuits?

A

Defense Information Systems Agency Circular (DISAC) 310-65-1

79
Q

Which office or system confirms a restoration priority?

A

National Communications Systems (NCS)

80
Q

When you must restore user service by rerouting, what is the second type of circuit you preempt?

A

Circuits with 00 RP codes

81
Q

Combined distribution frames encompass the functions of a main distribution frame and…

A

An intermediate distribution frame

82
Q

Who determines if PMIs are accomplished when commercial manuals or publications are not available?

A

Flight Commander

83
Q

When a telephone network is circuit switched, each call…

A

has a dedicated circuit created by the switch

84
Q

In Integrated Services Digital Network (ISDN), the “B” channel carries…

A

User traffic

85
Q

The three cornerstones of voice network systems security are…

A

Availability, Confidentiality, Integrity

86
Q

The vulnerabilities of voice and data converged networks were highlighted in a report released by the…

A

President’s National Security Telecommunications Advisory Committee

87
Q

What should security policies encompass to help mitigate the threat of convergence?

A

Both voice and data networks

88
Q

What provides the enterprise wide visibility into telecom resource utilization, phone network usage and incidents of toll fraud?

A

Enterprise Telephony Network system

89
Q

During the initial research for voice system security, who recognized that the most common security threats could be addressed by voice protection system?

A

The Air Force Information Warfare Battle Lab

90
Q
Which is not a component of the voice protection system architecture?
A. Server
B. Firewall
C. Software
D. Appliance
91
Q

Where are voice protection system servers installed?

A

Integrated Network and Security Center (INOSC)

92
Q

Which is not a characteristic and capability of a voice protection system?
A. Securing communications
B. Enabling of real-time notifications
C. Centralizing yet distributing management
D. Detecting and blocking all inbound and outbound modem connections

A

Centralizing yet distributing management

93
Q

What are attempts to gain access to a switch system by posing as an authorized user?

A

Masquerades

94
Q

How many serial data interface ports does the Meridian Option 11C Small System Controller have?

95
Q

What is the maximum number of ports that a Meridian System Logic-100 (MSL-100) supports?

96
Q

Which elements make up the control component of the SuperNode central control?

A

CM and system load module (SLM)

97
Q

What link is used to connect the Digital Multiplex System (DMS)-core to the DMS-bus?

98
Q

What Digital Multiplex System (DMS)-100 system contains subsystems for test routing, fault detection, fault analysis and error reporting?

A

Maintenance and administration position

99
Q

The primary reason you should measure the voltage across faulty terminal protectors before removing and replacing them is to…

A

Ensure dangerous voltages are not present on the line

100
Q

Where do incoming (unswitched) circuits transmitted to the ENET enter the NT9X35A cross-point card?

A

Vertical Bus

101
Q

Which Digital Multiplex System (DMS)-100 database facility is responsible for creating and maintaining tables of data in a controlled manner?

A

Table control

102
Q

Which Digital Multiplex System (DMS)-100 database facility provides for storing data modifications orders (DMO) and for retrieving them at a specified time for execution?

A

Pending order file

103
Q

Which Digital Multiplex System (DMS)-100 database facility provides facilities for preserving data modifications orders (DMO) on tape or disk so that data tables can be restored if the system fails?

A

Journal File