VOLUME 2, SET 2 URE's Flashcards
(201) At what Open System Interconnection (OSI) layer are virtual circuits established, maintained
and terminated?
a. Network.
b. Physical.
c. Data link.
d. Transport.
d. Transport.
(201) Which of the following is an example of a video compression standard?
a. Motion Picture Experts Group–4 (MPEG–4).
b. Joint Photographic Experts Group (JPEG).
c. File Transfer Protocol (FTP).
d. G.711.
a. Motion Picture Experts Group–4 (MPEG–4).
(202) In the Open System Interconnect (OSI) model, a layer will communicate with three other OSI layers. Which one is not one of those layers?
a. Layer above.
b. Layer below.
c. Lowest layer.
d. Peer layer.
c. Lowest layer.
(203) What data communication protocol uses characters or “handshaking” to control the link and
represent information?
a. Asynchronous protocol.
b. Binary synchronous protocol.
c. Synchronous Data Link Control (SDLC).
d. High-Level Data Link Control (HDLC).q
b. Binary synchronous protocol.
(203) In binary-synchronous protocol, which characters establishes and maintains character synchronization prior to the message block and during transmission?
a. SEQ.
b. SYN.
c. STX.
d. EST.
b. SYN.
(203) Which data communication protocol is based on bits and the position of the bits?
a. Character-oriented.
b. Bit-oriented.
c. Network.
d. Routing
b. Bit-oriented.
(203) Which data communication protocol is a transmission code that supports a variety of link
types and topologies?
a. Asynchronous protocol.
b. Binary synchronous protocol.
c. Synchronous Data Link Control (SDLC).
d. High-Level Data Link Control (HDLC).
c. Synchronous Data Link Control (SDLC).
(204) Which network layer protocol matches a known Internet protocol (IP) address for a destination device to a Media Access Control (MAC) address?
a. IP.
b. Address Resolution Protocol (ARP).
c. Reverse Address Resolution Protocol (RARP).
d. Internet Control Message Protocol (ICMP).
b. Address Resolution Protocol (ARP).
(204) Which Network layer protocol provides messaging that can help with troubleshooting?
a. Internet protocol (IP).
b. Address Resolution Protocol (ARP).
c. Reverse Address Resolution Protocol (RARP).
d. Internet Control Message Protocol (ICMP).
d. Internet Control Message Protocol (ICMP).
(204) Which Transport layer protocol provides reliable data delivery services?
a. Internet Protocol (IP).
b. User Datagram Protocol (UDP).
c. Transmission Control Protocol (TCP).
d. Internet Control Message Protocol (ICMP).
c. Transmission Control Protocol (TCP).
(204) Which Application layer protocol is used to synchronize the clocks of computers on a
network?
a. Simple Network Management Protocol (SNMP).
b. Dynamic Host Configuration Protocol (DHCP).
c. Network Time Protocol (NTP).
d. Packet Internet Groper (PING).
c. Network Time Protocol (NTP).
(205) Which network Class has the most addresses for hosts?
a. A.
b. B.
c. C.
d. D.
a. A.
(205) How many subnet bits are required to support 90 subnets on a Class B network?
a. Three.
b. Five.
c. Seven.
d. Nine.
c. Seven.
(206) Internet protocol version 6 (IPv6) addresses are represented by
a. 8 groups of dotted decimal numbers.
b. 8 groups of hexadecimal numbers.
c. 4 dotted decimal numbers.
d. 128 decimal numbers.
b. 8 groups of hexadecimal numbers
(206) Teredo has four tunneling components. Which one is not one of them?
a. Host-specific relay.
b. Client.
c. Server.
d. Agent.
d. Agent.
(207) Which device has multiport connectivity that directs data between nodes on a network?
a. Bridge.
b. Router.
c. Gateway.
d. Repeater.
b. Router.
(207) Which routing protocol do internet backbones use?
a. Border Gateway Protocol (BGP).
b. Open Shortest Path First (OSPF).
c. Routing Information Protocol (RIP).
d. Enhanced Interior Gateway Routing Protocol (EIGRP).
a. Border Gateway Protocol (BGP).
(208) Which router port is used for initial configuration?
a. Auxiliary.
b. Console.
c. Ethernet.
d. Telnet.
b. Console.
(208) When configuring a router, you control access to privileged EXEC mode by configuring which password?
a. Line console.
b. Line vty.
c. Enable.
d. Secret.
c. Enable.
(208) On a router’s serial interface connection, what provides the timing signal for the communication link?
a. Data communications equipment.
b. Data terminal equipment.
c. Internal oscillator.
d. Atomic clock.
a. Data communications equipment.
(209) Virtual Private Networks (VPNs) allow the AF to extend network resources across a/an
a. Department of Defense network.
b. Air Force network.
c. local area network.
d. a public network.
d. a public network.
(210) Which topology defines the way in which devices communicate and data is transmitted throughout the network?
a. Physical.
b. Logical.
c. Hybrid.
d. Star.
b. Logical.
(210) Which topology has the stations connected in the form of a circle?
a. Bus.
b. Ring.
c. Star.
d. Hybrid.
b. Ring.
(210) Which topology combines two or more different physical topologies in a single network?
a. Bus.
b. Ring.
c. Star.
d. Hybrid.
d. Hybrid.
(211) Which device subdivides a network into smaller logical pieces, or segments?
a. Switch.
b. Firewall.
c. Gateway.
d. Repeater.
a. Switch.
(211) The time it takes a switch to figure out where to forward a data unit is called its
a. lag.
b. hop.
c. latency.
d. time zone.
c. latency.
(211) Which of the following is not a distinct layer of a hierarchical network design?
a. Core.
b. Access.
c. Transport.
d. Distribution.
c. Transport.
(211) How many broadcast domains forms a Virtual LAN (VLAN)?
a. 1.
b. 2.
c. 3.
d. 4.
a. 1.
(211) What allows transportation of all active Virtual LANs (VLAN) between switches using a
single physical link?
a. VLAN trunks.
b. VLAN frames.
c. VLAN links.
d. VLAN ports.
a. VLAN trunks.
(211) Which of the following will minimize EtherChannel configuration problems?
a. Disable all the interfaces after creating the EtherChannel.
b. Configure all interfaces to operate at the same speed and duplex mode.
c. Configure all interfaces for the same parameters as the last port configured.
d. Assign all interfaces in the EtherChannel to a different Virtual LAN (VLAN).
b. Configure all interfaces to operate at the same speed and duplex mode.
(212) Which Institute of Electrical Electronics Engineers (IEEE) specification is least susceptible
to interference caused by household appliances and medical devices?
a. 802.11a.
b. 802.11b.
c. 802.11g.
d. 802.11r.
a. 802.11a.
(212) Which wireless design phase accounts for the amount of users on the network, the training
required for the users and the security and integrity requirements of the network data?
a. Planning.
b. Securing.
c. Deployment.
d. Management.
a. Planning.
(212) What identifier differentiates one wireless local area network (WLAN) from another?
a. Hostname.
b. Network name.
c. Service Set Identifier (SSID).
d. Virtual LAN Identifier (VLAN ID).
c. Service Set Identifier (SSID).
(213) A Management Information Base (MIB) is a collection of information that is organized
a. alphabetically.
b. hierarchically.
c. numerically.
d. objectively.
b. hierarchically.
(213) Simple Network Management Protocol (SNMP) is a tool used by network administrators to
manage network performance, investigate and solve network problems and help plan for?
a. future growth.
b. network security.
c. remote monitoring.
d. network contingencies.
a. future growth.
(214) Which physical security action can you take to ensure network equipment supports the
widest range of security services?
a. Configure the equipment with the maximum amount of memory possible.
b. Configure the equipment to use a line console password.
c. Power cycle the equipment at the end of the duty day.
d. Configure the equipment using setup mode.
a. Configure the equipment with the maximum amount of memory possible.
(214) In general, you should deny direct dial-in access to a network device by disabling which
port?
a. Console.
b. Auxiliary.
c. Interface.
d. Virtual terminal.
b. Auxiliary.
(215) Individual pulses within a digital signal are
a. bits.
b. bytes.
c. codes.
d. blocks.
a. bits.
(215) What is most commonly used in data systems to express signaling speed?
a. Baud rate.
b. Interface speed.
c. Bits per second.
d. Baud per second.
c. Bits per second.
(216) Which option is a characteristic of synchronous data operation?
a. Timing pulses are transmitted within the signal stream.
b. Start and stop pulses control data transmission.
c. System timing is not of critical importance.
d. All data bits are the same length in time.
d. All data bits are the same length in time.
(216) A digital signal that contains synchronizing bits within the signal stream describes
a. synchronous operation.
b. asynchronous operation.
c. synchronous and/or isochronous operation.
d. asynchronous and/or synchronous operation.
b. asynchronous operation.
(217) How many voltage levels does a binary signal have?
a. 1.
b. 2.
c. 3.
d. 4.
b. 2.
(217) In what type of digital signal does the signal level move to one of the discrete signal levels, but returns to the zero level after a predetermined time?
a. Non-return-to-zero (NRZ) level.
b. NRZ mark.
c. NRZ space.
d. Return-to-zero.
d. Return-to-zero.
(218) Digital coding techniques such as binary with eight-zero substitution (B8ZS) are becoming more popular because they are designed to?
a. provide error-free signaling.
b. operate at higher data rates.
c. eliminate bipolar violations.
d. maintain ones density standards.
d. Maintain ones density standards.
(218) Which statement best describes a binary with eight-zero substitution (B8ZS) signal?
a. The information is transmitted in three different voltage levels.
b. A logic one is transmitted as positive voltage if the previous logic one was negative.
c. The level always returns to zero for 50 percent of the bit cycle after every transition.
d. Bipolar violations are intentionally inserted into a data signal to break up long strings of zeros.
d. Bipolar violations are intentionally inserted into a data signal to break up long strings of zeros.
(219) How many bits are in the extended superframe format (ESF) framing sequence?
a. 8.
b. 12.
c. 24.
d. 48.
c. 24
(220) The signaling equipment has three types of communications signals that functions to
a. process switch addressing.
b. control digit translations.
c. control and process calls.
d. provide a clear signal.
c. control and process calls.
(220) Which communications control signal uses a two-frequency dialing combination?
a. Pulse.
b. Tone.
c. Digit.
d. Address.
b. Tone.
(221) In common associated signaling (CAS), what is the seventh bit in frames 6 and 12 used for?
a. Bit robbing.
b. Bit stuffing.
c. Frame correction.
d. Frame enhancement.
a. Bit robbing.