Air Force Mentor Logo


Exams (Home) | AFMentor | AFWriting | Bookmark | E-Mail Page | Search

3C051 EOC Exam

Volume 4

1.  At what layers of the OSI model do switches work?

     a.  Physical and network.
     b.  Data link and physical.
     c.  Network and transport.
     d.  Data link and network.

2.  What network type normally utilizes nondedicated servers?

     a.  Peer to peer.
     b.  Single-server.
     c.  Multi-server high-speed backbone.
     d.  Multi-server.

3.  What NCC function remotely performs the functions and duties of a DCS Primary Systems Control Facility, a patch and test facility and a DCS switching center when it is technically and economically feasible?

     a.  Configuration management.
     b.  Information protection operations.
     c.  Network administration.
     d.  Network management.

4.  Which protocol is designed for remote file access from workstations to a file server over a LAN?

     a.  NFS
     b.  IP
     c.  TCP
     d.  UDP

5.  What is a set of systems/nodes on a local segment that can be off of a switch or a router?

     a.  Intranetwork.
     b.  Internetwork.
     c.  Heterogeneous network.
     d.  Homogeneous network.

6.  What layer of the OSI reference model is really a set of rules regarding the hardware used to transmit data?

     a.  Data Link layer.
     b.  Network layer
     c.  Physical layer.
     d.  Transport layer.

7.  What command is used to restrict access to the Privileged Exec mode?

     a.  Enable password.
     b.  Password.
     c.  Virtual terminal password.
     d.  Console password.

8.  What communications device is used for converting analog signals to digital for transmission on digital lines?

     a.  Codecs
     b.  Hub
     c.  Hub
     d.  Modem

9.  Within the Windows environment what is the central repository for the entire software and hardware configuration settings in a computer running the Windows NT operating system?

     a.  WINNT/dev directory.
     b.  Systems32.
     c.  WINNT/config directory.
     d.  Registry.

10.  What network condition usually begins slowly and (if not stopped) gradually grows in severity until all traffic flow on the network is effectively stopped?

       a.  Hub port noise.
       b.  Jabber.
       c.  Broadcast storm.
       d.  Random squitter.

11.  What is the function performed by a router for determining the optimal path/route to the destination?

       a.  Short path.
       b.  Path determination.
       c.  Quick route.
       d.  Route determination.

12.  What error-detection method is based on a transformation of the bit values in a data packet or frame?

       a.  Odd parity error check.
       b.  Cyclic Redundancy check.
       c.  Even parity error check.
       d.  Checksum error check.

13.  What form of communication allows data to travel both ways but only one way at a time?

       a.  Half-duplex.
       b.  Asynchronous
       c.  Duplex.
       d.  Synchronous

14.  What command is used to change the bootup values within ROM monitor mode?

       a.  config.
       b.  confreg.
       c.  enable config.
       d.  enable confreg.

15.  What network topology consists of a single central cable to which all computers and other devices connect?

       a.  Bus
       b.  Star.
       c.  Mesh.
       d.  Ring

16.  What type of optic fiber is used to span extremely long distances?

       a.  Single mode.
       b.  Duplex
       c.  Multi-mode.
       d.  Half-duplex

17.  A feature which involves the periodic insertion of points into data from which any recovery necessary can be started is known as

       a.  formatting function
       b.  data transfers.
       c.  checkpointing.
       d.  error recognition and recovery

18.  Within the NCC, what function is initially responsible for taking trouble calls, deciding what type of problem has occurred, and what to do about the problem?

       a.  Network management.
       b.  Help desk.
       c.  Specific area of support.
       d.  Information protection operations.

19.  What type of switch reads the first 64 bytes before forwarding the frame?

       a.  Fragment free.
       b.  Cut through
       c.  Store and forward.
       d.  Dynamic route.

20.  Data in which root-key contains the system default setting (system default profile) used when the CTRL+ALT+DEL logon screen is displayed?

       c.  HKEY_LOCAL_MACHlNE.
       d.  HKEY_USERS.

21.  What organizations are implementing WAN/LAN to meet an increasing need for lateral coordination versus the traditional vertical processes?

       a.  Special operations and combat support units.
       b.  AFCA and ACC.
       c.  Mobility and engineering & installation units.
       d.  C2, intelligence, and combat support communities.

22.  What are the connections between layers in the OSI reference model called?

       a.  SAPs.
       b.  UDP
       c.  TCP.
       d.  XDR.

23.  What type of switch is designed for enterprise wide applications, where error checking and throughput are of concern?

       a.  Fragment free.
       b.  Cut through.
       c.  Store and forward.
       d.  Dynamic route.

24.  What does a station specifically send when it sends a general request through the network asking any station to respond in order to receive the token?

       a.  Solicit successor frame.
       b.  Tapped approach.
       c.  Who follows frame.
       d.  Broadcast address.

25.  What do standard access lists use to filter packets?

       a.  Routing protocols.
       b.  UP address.
       c.  Application port number.
       d.  IP address.

26.  Which protocol of TCP/IP is a connection oriented, reliable, host-to-host transport protocol?

       a.  IP
       b.  TCP
       c.  NFS
       d.  UDP

27.  Why can token ring network cover a greater distance than a token bus network without loss of signal?

       a.  Because they require significantly more cable.
       b.  Because they can use wire centers.
       c.  Because each workstation repeats the signal.
       d.  Because each workstation creates less signal distortion.

28.  What routing stability feature is used to prevent regular update messages from inappropriately reinstating a route that has gone bad?

       a.  Excess transfer.
       b.  Split horizons
       c.  Poison reverse
       d.  Hold downs.

29.  What NCC function remotely tests subscriber equipment, end-to-end circuits, and networks to verify the services provided and that input/output signals meet standards?

       a.  Network management.
       b.  Performance management.
       c.  Security management.
       d.  Configuration management.

30.  What is the dotted decimal equivalent to the binary number 11111000?

       a.  124
       b.  56
       c.  96
       d.  248

31.  What category of twisted-pair cable has the highest throughput?

       a.  Cat 5.
       b.  Cat 2.
       c.  Cat 4.
       d.  Cat 3.

32.  What is the range of numbers that represent standard access lists?

       a.  1-99.
       b.  1-40.
       c.  100-199.
       d.  50-99.

33.  What network component serves as a central connecting point and is used to extend the physical media by repeating the signal it receives in one port out to all the other ports indiscriminately?

       a.  Router.
       b.  Codecs.
       c.  Modem.
       d.  Hub

34.  What Air Force publication establishes policy on how C4 systems are acquired, operated and maintained?

       a.  AFI 33-204.
       b.  AFPD 33-2.
       c.  AFI 33-202.
       d.  AFPD 33-l.

35.  What X series protocol is an MHS standard, that defines the structure of a store-and-forward e-mail message handling system?

       a.  X. 50.
       b.  X.25.
       c.  X.400.
       d.  X.500.

36.  One the most important communications skills you can develop as a help desk operator is

       a.  speaking.
       b.  listening.
       c.  writing.
       d.  briefing.

37.  At what level of the OSI models does a router work?

       a.  Network.
       b.  Physical.
       c.  Transport.
       d.  Data link.

38.  From what mode is the banner command used?

       a.  User Exec.
       b.  Global configuration mode.
       c.  Privileged Exec.
       d.  Router configuration mode.

39.  What protocol is used by the IEEE 802.3 standard to avoid collisions on the network?

       a.  CSMA/CD.
       b.  UDP
       c.  TCP/IP
       d.  NFS

40.  What do we call a set of rules that define how communications are to take place in a network, including the format, timing, sequences, and error checking and correction?

       a.  A network operating system.
       b.  protocol.
       c.  A standard.
       d.  A baseline.

41.  What are the network connections through which network traffic enters and exits a router called?

       a.  Interfaces.
       b.  Serial interface
       c.  Console and auxiliary ports.
       d.  Switching ports.

42.  What is the binary equivalent to the dotted decimal number 96?

       a.  01100110
       b.  01100000.
       c.  01100100.
       d.  10000001.

43.  What type of server is a bundle of application software designed to significantly improve network efficiency and productivity?

       a.  NMS.
       b.  Application.
       c.  DHCP.
       d.  DNS.

44.  What type of routing is the establishment of routes by the network administrator that changes only when done manually?

       a.  Manual routing.
       b.  Static routing.
       c.  Dynamic routing.
       d.  Group source routing.

45.  What NCC function increases network reliability by giving the network manager tools to detect problems and initiate recovery procedures?

       a.  Performance management.
       b.  Network management.
       c.  Fault management.
       d.  Configuration management.

46.  What Air Force publication identifies responsibilities for supporting critical Air Force communications and information networks, primarily through NCC?

       a.  AFI 33-115 Vol 2.
       b.  AFPD 33-l.
       c.  AFPD 33-2.
       d.  AFI 33-115 Vol 1.

47.  What is the range of numbers that represent IP access lists?

       a.  50-99.
       b.  1-40.
       c.  1-99.
       d.  100-199.

48.  Light signals in fiber optic cables can travel distances in excess of how many miles before they need to be boosted?

       a.  50
       b.  25
       c.  100
       d.  125

49.  What filters network traffic by controlling whether routed packets are forwarded or blocked at a router's interface?

       a.  Router protocols.
       b.  Password filters.
       c.  User passwords.
       d.  Access control lists.

50.  The IEEE 802.3 standard describes a LAN using what kind of topology?

       a.  Token ring.
       b.  Star.
       c.  Token bus.
       d.  Bus

51.  What is used to logically eliminate loops within a network?

       a.  STA
       b.  TCP
       c.  IP
       d.  RIP.

52.  What network interface card module temporarily holds data for processing to or from the network?

       a.  Encode/decode module.
       b.  Frame buffering module.
       c.  Transmit/receive module.
       d.  MAC layer processing module.

53.  What prevents a router from sending route information back to the router from which it came?

       a.  Hold downs.
       b.  Split horizons.
       c.  Poison reverse
       d.  Excess transfer.

54.  What type of communications network links geographically dispersed offices in other cities or around the globe?

       a.  WAN
       b.  MAN
       c.  EN
       d.  LAN

55.  What are the four basic functions of a bridge?

       a.  Listen, direct, filter, forward.
       b.  Listen, learn, filter, forward.
       c.  Detect, direct, filter, forward.
       d.  Listen, learn, detect, direct.

56.  What type of mask is used within a network that uses the same amount of bits for masking for all subnetworks?

       a.  Variable length subnet mask.
       b.  Subnet mask.
       c.  Abbreviated mask.
       d.  Standard mask.

57.  What does Network Security work to ensure about a network?

       a.  Availability, confidentiality and integrity of data.
       b.  Availability, confidentiality and backup of data.
       c.  Confidentiality, integrity and backup of data.
       d.  Availability, integrity and backup of data.

58.  What software is utilized to open trouble tickets for customer trouble calls?

       a.  C+ database.
       b.  Microsoft Access.
       c.  Remedy.
       d.  Fileit.

59.  What makes it possible for implementers to produce new NFS systems without having to reconstruct their own system's internal data representation formats to suit NFS?

       a.  RPC
       b.  XDR
       c.  UDP
       d.  TCP

60.  The IEEE 802.5 standard was developed to cover what LAN topology?

       a.  Token bus
       b.  Bus
       c.  Ring
       d.  Token ring.

61.  What is the major DoD contribution to networking?

       a.  The FTP utility.
       b.  The Ada programming language.
       c.  The TCP/IP protocol suite.
       d.  The OSI reference model.

62.  How many users are in a multi-server network?

       a.  2-10.
       b.  50-250.
       c.  10-50.
       d.  250-1000.

63.  What network interface card module converts information into a coded data stream?

       a.  Transmit/receive module.
       b.  Frame buffering module.
       c.  Encode/decode module.
       d.  MAC layer processing module.

64.  How are technicians given customer jobs that must be fixed?

       a.  C+ database.
       b.  Microsoft Access.
       c.  Fileit Notifier.
       d.  Remedy Notifier.

65.  Where is the backup copy of the Cisco IOS configuration information stored in the internetworking device?

       a.  Flash memory
       b.  NVRAM.
       c.  ROM
       d.  RAM/DRAM.

66.  Into how many octets is the standard internet protocol broken down?

       a.  2
       b.  4
       c.  6
       d.  8

67.  What is the primary device used for connecting these networks, both within and between networks?

       a.  Bridge
       b.  Router
       c.  Switch
       d.  Modem.

68.  What do we call a set of subnets that are connected with routers?

       a.  Homogeneous network.
       b.  Intranetwork.
       c.  Internetwork.
       d.  Heterogeneous network.

69.  What acts as a translator between two workstations or networks that use different operating systems, communication protocols, and data format structures?

       a.  Router.
       b.  Switch
       c.  Bridge
       d.  Gateway.

70.  To view the current configuration of a router, what command is used from privileged exec mode?

       a.  show running.
       b.  show router.
       c.  show nvram.
       d.  show config.

71.  What two types of environments are network operating systems implemented upon?

       a.  Client server and multi-server.
       b.  Peer to peer and multi-server.
       c.  Single-server and multi-server.
       d.  Peer to peer and client server.

72.  When are bridging loops created?

       a.  When there is more than one path to the destination.
       b.  When there is only one path to the destination
       c.  When the destination is unreachable by multiple paths.
       d.  When the destination is unreachable by only one path.

73.  What is the greatest risk to a bus network?

       a.  The bus itself becoming inoperable.
       b.  The bus network server.
       c.  The middle node connected to the bus.
       d.  Security is easily breached.

74.  What is the purpose of a network repeater?

       a.  It regenerates any signal received.
       b.  It internally routes the signal.
       c.  It amplifies and routes the signal.
       d.  It amplifies the network signal.

75.  What are Router access lists applied to?

       a.  switches.
       b.  Ports
       c.  interfaces.
       d.  proxy servers.

76.  Where is the Cisco IOS running configuration information for the internetworking device contained?

       a.  NVRAM.
       b.  Flash memory.
       c.  ROM.
       d.  RAM/DRAM.

77.  What network interface card module drives the signal onto and from the physical medium?

       a.  MAC layer processing module.
       b.  Encode/decode module.
       c.  Frame buffering module.
       d.  Transmit/receive module.

78.  What is defined as the data throughput expressed as a percentage of the maximum traffic handling capacity of the transmission medium?

       a.  Traffic congestion.
       b.  Network response time.
       c.  Percentage utilization.
       d.  Data throughput.

79.  What type of switch is limited in its applications to small workgroups where throughput is an issue but where potential network errors won't upset the network?

       a.  Cut through.
       b.  Fragment free.
       c.  Store and forward.
       d.  Dynamic route.

80.  What is the one tool that all networking protocols and standards are measured against?

       a.  The OSI reference model.
       b.  ECSA
       c.  ANSI
       d.  ITU

81.  What frees the computer's attention so the user can continue working while waiting for a document to print?

       a.  Timing devices.
       b.  Print queues.
       c.  Print spooling.
       d.  Print holding folders.

82.  The goal of what NCC function is to measure network utilization parameters so individual or group usage on the network can be regulated appropriately?

       a.  Accounting management.
       b.  Network management.
       c.  Configuration management.
       d.  Performance management.

83.  In which layer of the OSI model do you find database management programs and electronic mail?

       a.  Session
       b.  Application.
       c.  Transport
       d.  Presentation

84.  What is the technology called that allows NIC to determine the type of Ethernet signal transmitted by a device at the other end and adjust its speed to the highest common speed between the two devices?

       a.  Autodatasensing.
       b.  Autonegotiation.
       c.  Speed sensing.
       d.  Auto timing.

85.  What is required due to the differences between the physical speed of the print device and the processing speed of the workstation generating the print job?

       a.  Print queues.
       b.  File server.
       c.  Multi processor servers.
       d.  Timing devices.

86.  What is the only layer in the OSI reference model that simply transmits the completed frame?

       a.  Transport layer.
       b.  Data link layer.
       c.  Physical layer.
       d.  Network layer.

87.  What is measured to determine the level of network service provided to the users?

       a.  The total response time, average bandwidth, and availability of the network.
       b.  The total response time, rejection rate, and availability of the network.
       c.  The total response time, systems failure rate and average bandwidth.
       d.  The total response time, rejection rate and average bandwidth.

88.  Communication and information services entering and exiting the base or site fall under the operational control of

       a.  Base command post.
       b.  Base Security Services Information Assurance office.
       c.  Base Computer Security control office.
       d.  Base Network Control Center.

89.  How many network bits are in a Class "B" network internet protocol address?

       a.  24
       b.  8
       c.  10
       d.  14

90.  What is a logical grouping of end stations, independent of physical location, with a common set of requirements called?

       a.  VLAN
       b.  LAN.
       c.  PLAN
       d.  TAN

91.  What network topology most resembles how individual bases are configured around our Air Force?

       a.  Bus
       b.  Star
       c.  Hybrid
       d.  Ring

92.  Whose network area of responsibility starts at the user's terminal and ends at the server, but does not include the network backbone infrastructure components?

       a.  Unit workgroup manager.
       b.  Network Control Center network administration.
       c.  Control Center help desk.
       d.  Unit Functional Systems administrator.

93.  How many users are in a multi-server high-speed backbone network?

       a.  250-1000.
       b.  12-10.
       c.  50-250.
       d.  10-50.

94.  What type of routing involves the use of routing protocols that adjust real-time to changing network circumstances?

       a.  Manual routing.
       b.  Static routing.
       c.  Dynamic routing.
       d.  Group source routing.

95.  Within how many seconds must a router receive an update from another router, before it marks the routes served by the non-updating router as being unusable?

       a.  90
       b.  30
       c.  120
       d.  60

96.  In most cases the frequencies used by wireless networks are in what frequency band?

       a.  ISM
       b.  Television band.
       c.  UHF band.
       d.  VHF band.

97.  From what level can all other command modes be accessed?

       a.  Privileged Exec level.
       b.  User Exec level.
       c.  Global configuration level.
       d.  Console Exec level.

98.  What layer of the OSI reference model provides the grammar by which machines converse with each other and serves as a vehicle for information transmission?

       a.  Physical layer.
       b.  Data Link layer.
       c.  Network layer.
       d.  Transport layer.

99.  What layer in the OSI reference model adds a trailer to the packet?

       a.  Transport layer.
       b.  Data link layer.
       c.  Network layer.
       d.  Physical layer.

100.  What type of network is made up of components from the same vendor or compatible equipment that all run under the same operating system or network operating system?

       a.  Homogeneous network.
       b.  Internetwork.
       c.  Heterogeneous network.
       d.  Intranetwork

101.  What do we call the distorting and/or weakening of a signal as it traverses the media?

       a.  Attenuation.
       b.  Impedance
       c.  Inductive coupling.
       d.  Resistance

102.  Which layer of the OSI model is concerned with network security, file transfers, and formatting functions?

       a.  Transport
       b.  Session.
       c.  Presentation
       d.  Application

103.  In what dynamic routing protocol must packets go the complete distance before discovering the destination is unreachable?

       a.  Distance timing.
       b.  Link state.
       c.  Manual routing.
       d.  Distance vectoring.

104.  What layer of the OSI reference model prevents a fast computer from overwhelming a slow terminal?

       a.  Transport layer.
       b.  Physical layer.
       c.  Data Link layer.
       d.  Network layer.

105.  What routing metric is generally based upon the bit-error rate of the link?

       a.  Reliability.
       b.  Delay
       c.  Maximum transmission unit.
       d.  Path length

Click here for Answers

Click here to submit your information.
  Send a Comment and/or Suggestion

Page Added on: 17 January 2006

Copyright 2005 AFMENTOR. All rights reserved.
Revised: 02/27/06.