1511 Flashcards

1
Q

At what OSI layer are virtual circuits established, maintained and terminated?

A

Transport (layer 4)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which of the following is an example of a video compression standard?
A. Motion Picture Experts Group-4 (MPEG-4)
B. Joint Photographic Experts Group (JPEG)
C. File Transfer Protocol (FTP)
D. G.711

A

Motion Picture Experts Group-4 (MPEG-4)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

In the OSI model, a layer will communicate with what other layers?

A

Layer above, layer below, peer layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What data communications protocol uses characters or “handshaking” to control the link and represent information?

A

Binary synchronous protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

In binary-synchronous protocol, which characters establishes and maintains character synchronization prior to the message block and during transmission?

A

SYN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which data communication protocol is based on bits and the position of the bits?

A

Bit-oriented

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which data communications protocol is a transmission code that supports a variety of link types and technologies?

A

Synchronous Date Link Control (SDLC)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which network layer protocol matches a known IP address for a destination device to a MAC address?

A

Address Resolution Protocol (ARP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which network layer protocol provides messaging that can help with troubleshooting?

A

Internet Control Message Protocol (ICMP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which transport layer protocol provides reliable data delivery services?

A

Transmission Control Protocol (TCP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which application layer protocol is used to synchronize the clocks of computers on a network?

A

Network Time Protocol (NTP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which network Class has the most addresses for hosts?

A

Class A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

How many subnet bits are required to support 90 subnets on a Class B network?

A

7

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

IPv6 addresses are represented by…

A

8 groups of hexadecimal numbers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q
Teredo has four tunneling components. Which one is not one of them?
A. Host-specific relay
B. Client
C. Server
D. Agent
A

Agent

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Which device has multiport connectivity that directs data between nodes on a network?

A

Router

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Which routing protocol do internet backbones used?

A

Border Gateway Protocol (BGP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Which router port is used for initial configuration?

A

Console

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

When configuring a router, you control access to privileged EXEC mode by configuring which password?

A

Enable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

On a router’s serial interface connection, what provides the timing signal for the communications link?

A

Data communications equipment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

VPNs allow the AF to extend network resources across a/an…

A

public network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Which topology defines the way in which devices communicate and data is transmitted throughout the network?

A

Logical

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Which topology has the stations connected in the form of a circle?

A

Ring

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Which topology combines two or more different physical topologies in a single network?

A

Hybrid

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Which device subdivides a network into smaller logical pieces, or segments?

A

Switch

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

The time it takes a switch to figure out where to forward a data unit is called its…

A

Latency

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q
Which of the following is not a distinct layer of the hierarchical network design?
A. Core
B. Access
C. Transport
D. Distribution
A

Transport

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

How many broadcast domains forms a VLAN?

A

One

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

What allows transportation of all active VLANs between switches using a single physical link?

A

VLAN trunks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

What will minimize EtherChannel configuration problems?

A

Configure all interfaces to operate at the same speed and duplex modes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

Which IEEE specification is lease susceptible to interference caused by household appliances and medical devices?

A

802.11a

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

Which wireless design phase accounts for the amount of users on the network, the training required for the users and the security and integrity requirements of the network data?

A

Planning

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

What identifier differentiates one wireless local area network (WLAN) from another?

A

Service Set Identifier (SSID)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

A Management Information Base (MIB) is a collection of information that is organized…

A

Hierarchically

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

Simple Network Management Protocol (SNMP) is a tool used by network administrators to manage network performance, investigate and solve network problems and help plan for…

A

Future growth

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

Which physical security action can you take to ensure network equipment supports the widest range of security services?

A

Configure the equipment with the maximum amount of memory possible

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

In general, you should deny direct dial-in access to a network device by disabling which port?

A

Auxiliary

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

Individual pulses within a digital signal are…

A

bits

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

What is most commonly used in data systems to express signaling speed?

A

Bits per second

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

Which option is a characteristic of synchronous data operations?

A

All data bits are the same length in time

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

A digital signal that contains synchronizing bits within the signal stream describes…

A

synchronous operation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

How many voltage levels does a binary signal have?

A

2

43
Q

In what type of digital signal does the signal level move to one of the discrete signal levels, but returns to the zero level after a predetermined time?

A

Return-to-zero

44
Q

Digital coding techniques such as binary with eight-zero substitution (B8ZS) are becoming more popular because they are designed to…

A

Provide error-free signaling

45
Q

Which statement best describes a binary with eight-zero substitution (B8ZS) signal?

A

Bipolar violations are intentionally inserted into a data signal to break up long strings of zeros

46
Q

How many bits are in the extended superframe format (ESF) sequence?

A

24

47
Q

The signaling equipment has three types of communications signals that functions to…

A

Control and process calls

48
Q

Which communications control signal uses a two-frequency dialing combination?

A

Tone

49
Q

In common associated signaling (CAS), what is the seventh bit in frames 6 and 12 used for?

A

Bit robbing

50
Q

How is supervisory signaling information transferred in common channel signaling (CCS)?

A

Separate network channel

51
Q

Which common channel signaling (CCS) mode does the transfer of messages relating to signaling between two points occur directly over links interconnecting the signaling points?

A

Associated

52
Q

What is the process, or result of the process, of modifying (varying) one or more characteristics of a carrier signal in accordance with an instantaneous characteristic of an information signal?

A

Modulation

53
Q

The signal components that occur as bands above and below a carrier are called…

A

Sidebands

54
Q

To prevent frequency modulation (FM) radio stations from interfering with each other, the FCC has set limits that allow each station to cause its oscillator frequency to deviate no more than…

A

75kHz

55
Q

Which form of modulation is insensitive to signal variations?

A

Binary-phase shift keying

56
Q

The form of pulse modulation in which a discrete pulse is varied within a range of positions is known as…

A

Pulse-position

57
Q

Which type of pulse modulation is lease affected by noise?

A

Pulse-code

58
Q

Which form of multiplexing is very susceptible to signal deterioration?

A

Frequency-division

59
Q

What are the two major types of frame structures?

A

CCITT and low speed

60
Q

The method for multiplexing the T1 multiplexer uses is…

A

Time division

61
Q

Which wave-division multiplexing technology uses uncooled lasers to reduce cost?

A

Coarse wave division multiplexing

62
Q

To create a better timing environment in communications networks, external timing distribution occurs through…

A

station clocks

63
Q

What do GPS satellites use to provide very precise time to GPS receivers?

A

Atomic clock

64
Q

Which stratum level is a GPS timing source?

A

Level 1

65
Q

Which agency has responsibility for a circuit end-to-end?

A

Circuit Control Office (CCO)

66
Q

Who is responsible for all circuits within their facility up to the designated demarcation point and provides troubleshooting assistance at the direction of the Global NetOps Support Center (GNSC)?

A

Node side coordinator

67
Q

Which agency is the preferred transport provider for Internet and commercial satellite connections used for voice, video and/or data services on DOD networks?

A

DISA (Defense Information Systems Agency)

68
Q

What web application is used to order telecommunications products and services from the Defense Information Systems Agency (DISA)?

A

DISA Direct Order Entry (DDOE)

69
Q

What document is the authority for the operations and maintenance agencies to procure specific devices and ancillary equipment necessary for the installation or operation of the circuit?

A

Telecommunications service order (TSO)

70
Q

Which DD form do you use for an official narrative log that is often used to brief unit commanders?

A

DD form 1753

71
Q

Which DD from is used as the primary source of information when preparing DOD Information Network (DODIN) status reports?

A

DD form 1443

72
Q

Which test results do you record on the reverse/back side of the DD form 1697-Analog?

A

Frequency response and envelope delay

73
Q

If the circuit files are lost or destroyed, what document are Technical Control Facilities required to obtain?

A

The latest telecommunications service order (TSO) that reflects the current end-to-end circuit configuration

74
Q

Within how many normal duty hours of completion action on the Telecommunications Service Order (TSO) must the circuit control office (CCO) submit an in-effect report?

A

72

75
Q

What report must be sent if the circuit does not meet all required parameters and the Telecommunications Service Order (TSO) issuing authority advises that the circuit is accepted for service?

A

Exception report

76
Q

Trend analysis is a program that ensures circuits meet management thresholds on what basis?

A

Monthly

77
Q

IF a circuit fails its management threshold, what test might be performed?

A

Quality control

78
Q

Which publication lists the methods used to identify systems, links, trunks and circuits?

A

Defense Information Systems Agency Circular (DISAC) 310-65-1

79
Q

Which office or system confirms a restoration priority?

A

National Communications Systems (NCS)

80
Q

When you must restore user service by rerouting, what is the second type of circuit you preempt?

A

Circuits with 00 RP codes

81
Q

Combined distribution frames encompass the functions of a main distribution frame and…

A

An intermediate distribution frame

82
Q

Who determines if PMIs are accomplished when commercial manuals or publications are not available?

A

Flight Commander

83
Q

When a telephone network is circuit switched, each call…

A

has a dedicated circuit created by the switch

84
Q

In Integrated Services Digital Network (ISDN), the “B” channel carries…

A

User traffic

85
Q

The three cornerstones of voice network systems security are…

A

Availability, Confidentiality, Integrity

86
Q

The vulnerabilities of voice and data converged networks were highlighted in a report released by the…

A

President’s National Security Telecommunications Advisory Committee

87
Q

What should security policies encompass to help mitigate the threat of convergence?

A

Both voice and data networks

88
Q

What provides the enterprise wide visibility into telecom resource utilization, phone network usage and incidents of toll fraud?

A

Enterprise Telephony Network system

89
Q

During the initial research for voice system security, who recognized that the most common security threats could be addressed by voice protection system?

A

The Air Force Information Warfare Battle Lab

90
Q
Which is not a component of the voice protection system architecture?
A. Server
B. Firewall
C. Software
D. Appliance
A

Firewall

91
Q

Where are voice protection system servers installed?

A

Integrated Network and Security Center (INOSC)

92
Q

Which is not a characteristic and capability of a voice protection system?
A. Securing communications
B. Enabling of real-time notifications
C. Centralizing yet distributing management
D. Detecting and blocking all inbound and outbound modem connections

A

Centralizing yet distributing management

93
Q

What are attempts to gain access to a switch system by posing as an authorized user?

A

Masquerades

94
Q

How many serial data interface ports does the Meridian Option 11C Small System Controller have?

A

3

95
Q

What is the maximum number of ports that a Meridian System Logic-100 (MSL-100) supports?

A

30,000

96
Q

Which elements make up the control component of the SuperNode central control?

A

CM and system load module (SLM)

97
Q

What link is used to connect the Digital Multiplex System (DMS)-core to the DMS-bus?

A

DS-512

98
Q

What Digital Multiplex System (DMS)-100 system contains subsystems for test routing, fault detection, fault analysis and error reporting?

A

Maintenance and administration position

99
Q

The primary reason you should measure the voltage across faulty terminal protectors before removing and replacing them is to…

A

Ensure dangerous voltages are not present on the line

100
Q

Where do incoming (unswitched) circuits transmitted to the ENET enter the NT9X35A cross-point card?

A

Vertical Bus

101
Q

Which Digital Multiplex System (DMS)-100 database facility is responsible for creating and maintaining tables of data in a controlled manner?

A

Table control

102
Q

Which Digital Multiplex System (DMS)-100 database facility provides for storing data modifications orders (DMO) and for retrieving them at a specified time for execution?

A

Pending order file

103
Q

Which Digital Multiplex System (DMS)-100 database facility provides facilities for preserving data modifications orders (DMO) on tape or disk so that data tables can be restored if the system fails?

A

Journal File