CDC Z3D152 Part 2 Flashcards

1
Q

At what Open System Interconnection (OSI) layer are virtual circuits established, maintained and terminated?

A

Transport.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which of the following is an example of a video compression standard?

A

Motion Picture Experts Group-4 (MPEG-4).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

In the Open System Interconnect (OSI) model, a layer will communicate with three other OSI layers. Which one is not one of those layers?

A

Lowest layer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What data communication protocol uses characters or “handshaking” to control the link and represent information?

A

Binary synchronous protocol.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

In binary-synchronous protocol, which characters establishes and maintains character synchronization prior to the message block and during transmission?

A

SYN.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which data communication protocol is based on bits and the position of the bits?

A

Bit-oriented.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which data communication protocol is a transmission code that supports a variety of link types and topologies?

A

Synchronous Data Link Control (SDLC).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which network layer protocol matches a known Internet protocol (IP) address for a destination device to a Media Access Control (MAC) address?

A

Address Resolution Protocol (ARP).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which Network layer protocol provides messaging that can help with troubleshooting?

A

Internet Control Message Protocol (ICMP).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which Transport layer protocol provides reliable data delivery services?

A

Transmission Control Protocol (TCP).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which Application layer protocol is used to synchronize the clocks of computers on a network?

A

Network Time Protocol (NTP).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which network Class has the most addresses for hosts?

A

A.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

How many subnet bits are required to support 90 subnets on a Class B network?

A

Seven.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Internet protocol version 6 (IPv6) addresses are represented by

A

8 groups of hexadecimal numbers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Teredo has four tunneling components. Which one is not one of them?

A

Agent.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Which device has multiport connectivity that directs data between nodes on a network?

A

Router.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Which routing protocol do internet backbones use?

A

Border Gateway Protocol (BGP).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Which router port is used for initial configuration?

A

Console.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

When configuring a router, you control access to privileged EXEC mode by configuring which password?

A

Enable.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

On a router’s serial interface connection, what provides the timing signal for the communication link?

A

Data communications equipment.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Virtual Private Networks (VPNs) allow the AF to extend network resources across a/an

A

a public network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Which topology defines the way in which devices communicate and data is transmitted throughout the network?

A

Logical.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Which topology has the stations connected in the form of a circle?

A

Ring.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Which topology combines two or more different physical topologies in a single network?

A

Hybrid.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Which device subdivides a network into smaller logical pieces, or segments?

A

Switch.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

The time it takes a switch to figure out where to forward a data unit is called its

A

latency.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Which of the following is not a distinct layer of a hierarchical network design?

A

Transport.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

How many broadcast domains forms a Virtual LAN (VLAN)?

A

1.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

What allows transportation of all active Virtual LANs (VLAN) between switches using a single physical link?

A

VLAN trunks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

Which of the following will minimize EtherChannel configuration problems?

A

Configure all interfaces to operate at the same speed and duplex mode.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

Which Institute of Electrical Electronics Engineers (IEEE) specification is least susceptible to interference caused by household appliances and medical devices?

A

802.11a.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

Which wireless design phase accounts for the amount of users on the network, the training required for the users and the security and integrity requirements of the network data?

A

Planning.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

What identifier differentiates one wireless local area network (WLAN) from another?

A

Service Set Identifier (SSID).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

A Management Information Base (MIB) is a collection of information that is organized

A

hierarchically.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

Simple Network Management Protocol (SNMP) is a tool used by network administrators to manage network performance, investigate and solve network problems and help plan for

A

future growth.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

Which physical security action can you take to ensure network equipment supports the widest range of security services?

A

Configure the equipment with the maximum amount of memory possible.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

In general, you should deny direct dial-in access to a network device by disabling which port?

A

Auxiliary.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

Individual pulses within a digital signal are

A

bits.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

What is most commonly used in data systems to express signaling speed?

A

Bits per second.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

Which option is a characteristic of synchronous data operation?

A

All data bits are the same length in time.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

A digital signal that contains synchronizing bits within the signal stream describes

A

asynchronous operation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

How many voltage levels does a binary signal have?

A

2.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

In what type of digital signal does the signal level move to one of the discrete signal levels, but returns to the zero level after a predetermined time?

A

Return-to-zero.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

Digital coding techniques such as binary with eight-zero substitution (B8ZS) are becoming more popular because they are designed to

A

maintain ones density standards.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

Which statement best describes a binary with eight-zero substitution (B8ZS) signal?

A

Bipolar violations are intentionally inserted into a data signal to break up long strings of zeros.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q

How many bits are in the extended superframe format (ESF) framing sequence?

A

24.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
47
Q

The signaling equipment has three types of communications signals that functions to

A

control and process calls.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
48
Q

Which communications control signal uses a two-frequency dialing combination?

A

Tone.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
49
Q

In common associated signaling (CAS), what is the seventh bit in frames 6 and 12 used for?

A

Bit robbing.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
50
Q

Which common channel signaling (CCS) mode does the transfer of messages relating to signaling between two points occur directly over links interconnecting the signaling points?

A

Associated.

51
Q

What is the process, or result of the process, of modifying (varying) one or more characteristics of a carrier signal in accordance with an instantaneous characteristic of an information signal?

A

Modulation.

52
Q

The signal components that occur as bands above and below a carrier are called

A

sidebands.

53
Q

To prevent frequency modulation (FM) radio stations from interfering with each other, the Federal Communications Commission (FCC) has set limits that allow each station to cause its oscillator frequency to deviate no more than

A

75 kHz.

54
Q

Which form of modulation is insensitive to signal variations?

A

Binary-phase shift keying.

55
Q

The form of pulse modulation in which a discrete pulse is varied within a range of positions is known as

A

pulse-position.

56
Q

Which type of pulse modulation is least affected by noise?

A

Pulse-code.

57
Q

Which form of multiplexing is very susceptible to signal deterioration?

A

Frequency-division.

58
Q

What are the two major types of frame structures?

A

CCITT and low speed.

59
Q

The method of multiplexing the T1 multiplexer uses is

A

time division.

60
Q

Which wave-division multiplexing technology uses uncooled lasers to reduce cost?

A

Coarse wave division multiplexing.

61
Q

To create a better timing environment in communications networks, external timing distribution occurs through

A

station clocks.

62
Q

What do Global Positioning System (GPS) satellites use to provide very precise time to GPS receivers?

A

Atomic clock.

63
Q

Which stratum level is a Global Positioning System (GPS) timing source?

A

1

64
Q

Which agency has responsibility for a circuit end-to-end?

A

Circuit Control Office (CCO).

65
Q

Who is responsible for all circuits within their facility up to the designated demarcation point and provides troubleshooting assistance at the direction of the Global NetOps Support Center (GNSC)?

A

Node side coordinator.

66
Q

Which agency is the preferred transport provider for Internet and commercial satellite connections used for voice, video and/or data services on DOD networks?

A

Defense Information Systems Agency (DISA).

67
Q

What web application is used to order telecommunications products and services from the Defense Information Systems Agency (DISA)?

A

DISA Direct Order Entry (DDOE).

68
Q

What document is the authority for the operations and maintenance agencies to procure specific devices and ancillary equipment necessary for the installation or operation of the circuit?

A

Telecommunications service order.

69
Q

Which DD form do you use for an official narrative log that is often used to brief unit commanders?

A

1753.

70
Q

Which DD form is used as the primary source of information when preparing DOD Information Network (DODIN) status reports?

A

1443.

71
Q

Which test results do you record on the reverse/back side of the DD Form 1697-Analog?

A

Frequency response and envelope delay.

72
Q

If the circuit files are lost or destroyed, what document are Technical Control Facilities required to obtain?

A

The latest telecommunications service order (TSO) that reflects the current end-to-end circuit configuration.

73
Q

Within how many normal duty hours of completion action on the Telecommunications Service Order (TSO) must the circuit control office (CCO) submit an in-effect report?

A

72.

74
Q

What report must be sent if the circuit does not meet all required parameters and the Telecommunications Service Order (TSO) issuing authority advises that the circuit is accepted for service?

A

Exception.

75
Q

Trend analysis is a program that ensures circuits meet management thresholds on what basis?

A

Monthly.

76
Q

If a circuit fails its management threshold, what test might be performed?

A

Quality control.

77
Q

Which publication lists the methods used to identify systems, links, trunks and circuits?

A

DISAC 310-65-1.

78
Q

Which office or system confirms a restoration priority?

A

National Communications System (NCS).

79
Q

When you must restore user service by rerouting, what is the second type of circuit you preempt?

A

Nonactive on-call circuits.

80
Q

Combined distribution frames encompass the functions of a main distribution frame and

A

an intermediate distribution frame.

81
Q

Who determines if Preventative Maintenance Inspections (PMI) are accomplished when commercial manuals or publications are not available?

A

Flight commander.

82
Q

When a telephone network is circuit switched, each call

A

has a dedicated circuit created by the switch.

83
Q

In Integrated Services Digital Network (ISDN), the “B” channel carries

A

user traffic.

84
Q

The three cornerstones of voice network system security are availability,

A

confidentiality, and integrity.

85
Q

The vulnerabilities of voice and data converged networks were highlighted in a report released by the

A

President’s National Security Telecommunications Advisory Committee.

86
Q

What should security policies encompass to help mitigate the threat of convergence?

A

Both voice and data networks.

87
Q

What provides enterprise wide visibility into telecom resource utilization, phone network usage and incidents of toll fraud?

A

Enterprise Telephony Management system.

88
Q

During the initial research for voice system security, who recognized that the most common security threats could be addressed by voice protection system?

A

The Air Force Information Warfare Battle Lab.

89
Q

Which is not a component of the voice protection system architecture?

A

Firewall.

90
Q

Where are voice protection system servers installed?

A

Integrated Network and Security Center.

91
Q

Which is not a characteristic and capability of a voice protection system?

A

Centralizing yet distributing management.

92
Q

What are attempts to gain access to a switch system by posing as an authorized user?

A

Masquerades.

93
Q

How many serial data interface ports does the Meridian Option 11C Small System Controller have?

A

3

94
Q

What is the maximum number of ports that a Meridian System Logic-100 (MSL-100) supports?

A

30,000.

95
Q

Which elements make up the control component of the SuperNode central control?

A

CM and system load module (SLM).

96
Q

What link is used to connect the Digital Multiplex System (DMS)-core to the DMS-bus?

A

DS-512.

97
Q

What Digital Multiplex System (DMS)-100 system contains subsystems for test routing, fault detection, fault analysis and error reporting?

A

Maintenance and administration position.

98
Q

The primary reason you should measure the voltage across faulty terminal protectors before removing and replacing them is to

A

ensure dangerous voltages are not present on the line.

99
Q

Where do incoming (unswitched) circuits transmitted to the ENET enter the NT9X35A cross-point card?

A

Vertical bus (V-bus).

100
Q

Which Digital Multiplex System (DMS)-100 database facility is responsible for creating and maintaining tables of data in a controlled manner?

A

Table control.

101
Q

Which Digital Multiplex System (DMS)-100 database facility provides facilities for storing data modifications orders (DMO) and for retrieving them at a specified time for execution?

A

Pending order file.

102
Q

Which Digital Multiplex System (DMS)-100 database facility provides facilities for preserving data modifications orders (DMO) on tape or disk so that data tables can be restored if the system fails?

A

Journal file.

103
Q

What names are given to the shifted R-Y and B-Y signals, respectively?

A

I (in-phase) and Q (quadrature).

104
Q

Which digital broadcast system was adopted by the United States as the standard?

A

Advanced Television Systems Committee.

105
Q

The GVG-110 video switcher effects key fills with

A

key bus video or an internally-generated color matte signal.

106
Q

The total number of effects storage registers in the GVG-110 video switcher is

A

16.

107
Q

What does the GVG-110 video switcher serial interface allow?

A

Remote control of all switcher functions by a personal computer.

108
Q

Which basic circuit in the video distribution amplifier consists of two transistors that form the upper leg of a totem pole circuit?

A

Output driver.

109
Q

In an Intrusion Detection System (IDS), what must a line of detection detect?

A

Walking, running, rolling, crawling or jumping through the line of detection.

110
Q

In an Intrusion Detection System (IDS), what is the main purpose of a boundary fence?

A

To present a physical and psychological deterrent to unauthorized entry.

111
Q

The basic configuration of the entry control facility includes a

A

gatehouse, personnel entry gate, inspection equipment and vehicle entrapment area.

112
Q

Which interior intrusion detection system is designed to detect intruders attempting to enter a shelter, storage igloo or building?

A

AN/GSS-39.

113
Q

What does the AN/GSS-39(V) system use to monitor the integrity of all sensor wiring to the control panel?

A

End-of-line module.

114
Q

Which interior intrusion detection system (IIDS) sensor uses heat radiation to detect intruders?

A

Passive infrared.

115
Q

How many selectable frequencies are obtainable with a SD80DC microwave sensor?

A

10.

116
Q

What type of signal is sent to the fence protection system (FPS) signal processor when an alarm is detected?

A

Analog.

117
Q

How many sensors does a taut-wire system in the Y taut-wire sensor (YTWS) configuration contain?

A

12.

118
Q

How many vertical taut-wire sensor (VTWS) sectors can be serviced per field distribution box (FDB)?

A

2.

119
Q

What is the maximum length of the vertical taut-wire sensor (VTWS)?

A

328 feet.

120
Q

What is the maximum length of the Y taut-wire sensor (YTWS)?

A

200 feet.

121
Q

What type alarm occurs if the sensor post

cover in vertical taut-wire sensor (VTWS) is removed?

A

Tamper.

122
Q

What is the maximum detection distance in meters of an Infrared Pulsed Intrusion Detection System (IPIDS)?

A

80.

123
Q

What is the secondary mode of detection for the microwave fence sensor?

A

Multipath reflection.

124
Q

How is supervisory signaling information transferred in common channel signaling (CCS)?

A

Separate network channel.