| Term 
 
        | What Air Force instruction series covers communications and information? |  | Definition 
 | 
        |  | 
        
        | Term 
 
        | What Air Force publication establishes policy on how C4 systems are acquired, operated, and maintained? |  | Definition 
 | 
        |  | 
        
        | Term 
 
        | What Air Force publication indentifies responsibilities for supporting critical Air Force communications and information networks, primarily through network control centers? |  | Definition 
 | 
        |  | 
        
        | Term 
 
        | What Air Force publication provides the policy and procedures for certifying network professionals who manage and operate government-provided information systems on Air Force networks? |  | Definition 
 | 
        |  | 
        
        | Term 
 
        | What organization does communication and information services entering and exiting the base or site fall under the operational control of? |  | Definition 
 
        | (c) Base network control center |  | 
        |  | 
        
        | Term 
 
        | What function within the Network Control Center provides technical assistance to the unit functional system administrators and workgroup managers? |  | Definition 
 
        | (d) Network administration |  | 
        |  | 
        
        | Term 
 
        | Whose network area of responsibility starts at the user's terminal and ends at the server, but does not include the network backbone infrastructure components? |  | Definition 
 
        | (b) Unit functional systems administrator |  | 
        |  | 
        
        | Term 
 
        | What AFI set the policies that unit client support administrators must comply with? |  | Definition 
 | 
        |  | 
        
        | Term 
 
        | What Network Control Center function responds to detected security incidents, network faults (errors), and user reported outages at the time of help desk referral? |  | Definition 
 | 
        |  | 
        
        | Term 
 
        | What Network Control Center function is the central point of contact for network distribution and maintenance/update of an Air Force Computer Emergency Response Team and automated systems security and antivirus software? |  | Definition 
 
        | (d) Configuration management |  | 
        |  | 
        
        | Term 
 
        | Performance management can be broken into which two seperate fuctional categories |  | Definition 
 
        | (a) Monitoring and Tuning |  | 
        |  | 
        
        | Term 
 
        | To determine the level of network service provided to the users, you will make a measurement of the total response time |  | Definition 
 
        | (d) rejection rate and availability of the network |  | 
        |  | 
        
        | Term 
 
        | What Network Control Center function  increases network reliability by giving the network manager tools to detect problems and initiate recovery procedures? |  | Definition 
 | 
        |  | 
        
        | Term 
 
        | What does Network Security work to ensure about a network? |  | Definition 
 
        | (a) Availability, confidentiality, and integrity of data |  | 
        |  | 
        
        | Term 
 
        | Which of the following are jobs performed by a help desk technician on a daily basis? |  | Definition 
 
        | (b) Network monitoring, account unlocks, and account creations |  | 
        |  | 
        
        | Term 
 
        | Within the Network Control Center, what function is initially responsible for taking trouble calls, deciding what type problem has occurred, and what to do about the problem? |  | Definition 
 | 
        |  | 
        
        | Term 
 
        | What is the most important skill you can develop as a help desk operator? |  | Definition 
 | 
        |  | 
        
        | Term 
 
        | What software is used to open trouble tickets for customer trouble calls? |  | Definition 
 | 
        |  | 
        
        | Term 
 
        | What is a set of subnets that are connected with routers? |  | Definition 
 | 
        |  | 
        
        | Term 
 
        | What is a set of systems/nodes on a local segment that can be off of a switch or a router? |  | Definition 
 | 
        |  | 
        
        | Term 
 
        | What type of network environments consist of computer systems from different vendors that run different operating systems and communication protocols? |  | Definition 
 
        | (d) Heterogeneous Network |  | 
        |  | 
        
        | Term 
 
        | What type of network is made up of components from the same vendor or compatible equipment that all run under the same operation system or network operation system? |  | Definition 
 | 
        |  | 
        
        | Term 
 
        | What type of communications network serves users within a confined geographical area? |  | Definition 
 
        | (a) Local area network (LAN) |  | 
        |  | 
        
        | Term 
 
        | What type of communications network links geographically dispersed offices in other cities or around the globe? |  | Definition 
 | 
        |  | 
        
        | Term 
 
        | How many users are in a peer-to-peer network? |  | Definition 
 | 
        |  | 
        
        | Term 
 
        | How many users are in a single-server network? |  | Definition 
 | 
        |  | 
        
        | Term 
 
        | How many users are in a multi-server high-speed backbone network? |  | Definition 
 | 
        |  | 
        
        | Term 
 
        | In most cases the frequencies used by wireless networks are in what frequency band? |  | Definition 
 
        | (d) Industrial, scientific, and medical (ISM) |  | 
        |  | 
        
        | Term 
 
        | What is the distorting and/or weakening of a signal as it traverses the media called? |  | Definition 
 | 
        |  | 
        
        | Term 
 
        | What is the measurement of data transferred through the medium between network connections? |  | Definition 
 | 
        |  | 
        
        | Term 
 
        | What is a form of communication that transmits information as a serial stream of bits or bytes? |  | Definition 
 
        | (a) Asynchrounous communication |  | 
        |  | 
        
        | Term 
 
        | Which of the following categories of twisted-pair cable has the highest throughput? |  | Definition 
 | 
        |  | 
        
        | Term 
 
        | A fiber optic network uses a laser of light-emitting diode to send a signal through what portion of the cable? |  | Definition 
 | 
        |  | 
        
        | Term 
 
        | Light signals in fiber optic cables can travel distances in excess of how many miles before they need to be boosted? |  | Definition 
 | 
        |  | 
        
        | Term 
 
        | What type of optic fiber is used to span extremely long distances? |  | Definition 
 | 
        |  | 
        
        | Term 
 
        | What type of optic fiber is designed for the local area network environment and light is typically generated with a light emitting diode? |  | Definition 
 | 
        |  | 
        
        | Term 
 
        | What are the principal advantages of fiber optics with present day transmission technology? |  | Definition 
 
        | (a) Sturdiness and security |  | 
        |  | 
        
        | Term 
 
        | What network topology consists of a single central cable to which all computers and other devices connect? |  | Definition 
 | 
        |  | 
        
        | Term 
 
        | What is the greatest risk to a bus network? |  | Definition 
 
        | (c) The bus itself becoming inoperable |  | 
        |  | 
        
        | Term 
 
        | On what network topology can multiple transmit frames co-exist? |  | Definition 
 
        | (d) Fiber Distributed Data Interface (FDDI) |  | 
        |  | 
        
        | Term 
 
        | What is the major Department of Defense contribution to networking? |  | Definition 
 
        | (d) The Transmission Control Protocol/Internet Protocol (TCP/IP) Suite |  | 
        |  | 
        
        | Term 
 
        | What is the set of rules that define how communications are to take place in a network, including the format, timing, sequences, and error checking and correction? |  | Definition 
 | 
        |  | 
        
        | Term 
 
        | What layer of the Open Systems Interconnection (OSI) reference model is really a set of rules regarding the hardware used to transmit data? |  | Definition 
 | 
        |  | 
        
        | Term 
 
        | What layer of the Open Systems Interconnection (OSI) reference model provides the grammer by which machines converse with each other and serves as a vehicle for informations transmission? |  | Definition 
 | 
        |  | 
        
        | Term 
 
        | What layer of the Open Systems Interconnection (OSI) reference model prevent a fast computer from overwhelming a slow terminal? |  | Definition 
 | 
        |  | 
        
        | Term 
 
        | A feature which involves the periodic insertion of points into data from which any recovery necessary can be started is known as what? |  | Definition 
 | 
        |  | 
        
        | Term 
 
        | What layer of the Open Systems Interconnection (OSI) reference model is concerned with network security, file transfers, and formatting functions? |  | Definition 
 | 
        |  | 
        
        | Term 
 
        | The IEEE 802.3 standard describes a local area network using what kind of topology? |  | Definition 
 | 
        |  | 
        
        | Term 
 
        | What protocol is used by the IEEE 802.3 standard to avoid collisions on the network? |  | Definition 
 
        | (d) Carrier Sense Multiple Access/Collision Detection (CSMA/CD) |  | 
        |  | 
        
        | Term 
 
        | What does a station specifically send when it sends a general request through the network asking any station to respond to receive the token? |  | Definition 
 
        | (d) Solicit successor frame |  | 
        |  | 
        
        | Term 
 
        | The IEEE 802.5 standard was developed to cover what local area network topolgy? |  | Definition 
 | 
        |  | 
        
        | Term 
 
        | Why can a token rign network cover greater distance than a token bus network without a loss of signal? |  | Definition 
 
        | (b) Because each workstation repeats the signal |  | 
        |  | 
        
        | Term 
 
        | What X series protocol is a Message Handling System (MHS) standard, that defines the structure of a store-and-forward e-mail message handling system? |  | Definition 
 | 
        |  | 
        
        | Term 
 
        | ***Deleted Question (Rewritten the question should read as follows)*** What X series protocol is a Directory Services specification that provides standards and guidelines for representing, accessing, and using information stored in a directory?
 |  | Definition 
 | 
        |  | 
        
        | Term 
 
        | Which protocol of TCP/IP provides connectionless datagram "network access" layer? |  | Definition 
 
        | (a) Internet protocol (IP) |  | 
        |  | 
        
        | Term 
 
        | Which protocol of TCP/IP is a connection oriented, reliable, host-to-host transport protocol? |  | Definition 
 
        | (b) Transmission control protocol (TCP) |  | 
        |  | 
        
        | Term 
 
        | What makes it possible for implementers to produce new Network File System (NFS) systems without having to reconstruct their own system's internal data representation formats to suit NFS? |  | Definition 
 
        | (c) eXternal data representation |  | 
        |  | 
        
        | Term 
 
        | As information passes down through the protocol layers, what is the packet that is formed called? |  | Definition 
 
        | (c) Protocol data unit (PDU) |  | 
        |  | 
        
        | Term 
 
        | What is the only layer in the OSI reference model that simply transmits the completed frame? |  | Definition 
 | 
        |  | 
        
        | Term 
 
        | What layer in the OSI reference model adds a trailer to the packet? |  | Definition 
 | 
        |  | 
        
        | Term 
 
        | In the Ethernet environment, what is the minimum number of octets in a frame so it can be sent and received? |  | Definition 
 | 
        |  | 
        
        | Term 
 
        | What is used to identify network nodes on a physically connected network? |  | Definition 
 
        | (a) Media access control (MAC) address |  | 
        |  | 
        
        | Term 
 
        | What is the binary equivalent to the dotted decimal number 96? |  | Definition 
 | 
        |  | 
        
        | Term 
 
        | How many octets in the standard Internet Protocol (IP) address broken down into? |  | Definition 
 | 
        |  | 
        
        | Term 
 
        | What type of mask is used within a network that uses the same amount of bits for masking for all subnetworks? |  | Definition 
 
        | (b) Standard  ***answer is not in the book, but its the only one that makes sense *** |  | 
        |  | 
        
        | Term 
 
        | What communications device converts binary electrical signals into acoustic signals for transmission over telephone lines? |  | Definition 
 | 
        |  | 
        
        | Term 
 
        | What communications device is used for converting analog signal to digital for transmission on digital lines? |  | Definition 
 | 
        |  | 
        
        | Term 
 
        | What Network Interface Card module drives the signal onto and from the physical medium? |  | Definition 
 | 
        |  | 
        
        | Term 
 
        | What Network Interface Card module converts information into a coded data stream? |  | Definition 
 | 
        |  | 
        
        | Term 
 
        | What Network Interface Card module temporarily holds data for processing to or from the network? |  | Definition 
 | 
        |  | 
        
        | Term 
 
        | What network component serves as a central connecting point and is used to extend the physical media by repeating the signal it receives in one port out to all the other ports indiscriminately? |  | Definition 
 | 
        |  | 
        
        | Term 
 
        | What type of hub has special capabilities for configurations and or management? |  | Definition 
 | 
        |  | 
        
        | Term 
 
        | What network condition usually begins slowly and (if not stopped) gradually grows in severity until all traffic flow on the network is effectively stopped? |  | Definition 
 | 
        |  | 
        
        | Term 
 
        | What is a group of devices connected to the same physical media such that if two devices access the media at the same time, the result is a collision of the two signals? |  | Definition 
 | 
        |  | 
        
        | Term 
 
        | The purpose of a network repeater is that it |  | Definition 
 
        | (b) regenerates any signal received |  | 
        |  | 
        
        | Term 
 
        | What is a local area network connection device with two or more ports that forward frames from on LAN segment to another? |  | Definition 
 | 
        |  | 
        
        | Term 
 
        | What are the four basic function of a bridge? |  | Definition 
 
        | (a) Listen, learn, filter, forward |  | 
        |  | 
        
        | Term 
 
        | Bridging loops are created when |  | Definition 
 
        | (b) there is more than one path to the destination |  | 
        |  | 
        
        | Term 
 
        | What is used to logically eliminate loops within a network? |  | Definition 
 
        | (d) Spanning Tree Algorithm |  | 
        |  | 
        
        | Term 
 
        | The bridge in a network with the highest priority (the lowest number) is called the |  | Definition 
 | 
        |  | 
        
        | Term 
 
        | Switching conducted at the layer 2 category is based soley upon what information? |  | Definition 
 
        | (a) The Media Access Control address |  | 
        |  | 
        
        | Term 
 
        | Switching conducted at the layer 3 category is based upon what information? |  | Definition 
 | 
        |  | 
        
        | Term 
 
        | What type of switch is limited in its applications to small workgroups where throughput is an issue but where potential network errors will not upset the network? |  | Definition 
 | 
        |  | 
        
        | Term 
 
        | What type of switch reads the first 64 bytes before forwarding the frame? |  | Definition 
 | 
        |  | 
        
        | Term 
 
        | What is the technology called that allows NICs to determine the type of ethernet signal transmitted by a device at the other end and adjust its speed to the highest common speed between the two devices? |  | Definition 
 | 
        |  | 
        
        | Term 
 
        | What is a logical grouping of end stations, independent of physical location, with a common set of requirements called? |  | Definition 
 
        | (d) Virtual local area network (VLAN) |  | 
        |  | 
        
        | Term 
 
        | What is the most common method of defining VLAN membership? |  | Definition 
 | 
        |  | 
        
        | Term 
 
        | At what level of the OSI model does a router work? |  | Definition 
 | 
        |  | 
        
        | Term 
 
        | What is the primary device used for connecting these networks, both within and between networks? |  | Definition 
 | 
        |  | 
        
        | Term 
 
        | The function performed by a router to move information from one router to another according to decided path determination is |  | Definition 
 | 
        |  | 
        
        | Term 
 
        | What type of routing is the establishment of routes by the network administrator that changes only when done manually? |  | Definition 
 | 
        |  | 
        
        | Term 
 
        | What type of routing involves the use of routing protocols that adjust real-time to chaning network circumstances? |  | Definition 
 | 
        |  | 
        
        | Term 
 
        | In what Dynamic Routing protocol must packets go the complete distance before discovering the destination is unreachable? |  | Definition 
 | 
        |  | 
        
        | Term 
 
        | What routing metric is generally based upon the bit-error rate of the link? |  | Definition 
 | 
        |  | 
        
        | Term 
 
        | What prevents a router from sending route information back to the router form which it came? |  | Definition 
 | 
        |  | 
        
        | Term 
 
        | What acts as a translator between two workstations or networks that use different operating systems, communication protocols, and data format structures? |  | Definition 
 | 
        |  | 
        
        | Term 
 
        | Where is the backup copy of the Cisco Internet Operating System configuration information stored in the internetworking device? |  | Definition 
 
        | (b) Nonvolatile random access memory (NVRAM) |  | 
        |  | 
        
        | Term 
 
        | What are the network connections through which network traffic enters and exits a router called? |  | Definition 
 | 
        |  | 
        
        | Term 
 
        | What prompt is displayed when in the user Exec mode on a router? |  | Definition 
 | 
        |  | 
        
        | Term 
 
        | What prompt is displayed when in the Privileged Exec mode on a router? |  | Definition 
 | 
        |  | 
        
        | Term 
 
        | From what level can all other command modes be accessed? |  | Definition 
 
        | (c) Priviliged Exec level |  | 
        |  | 
        
        | Term 
 
        | From what mode is the banner motd command used in? |  | Definition 
 
        | (c) Global configuration mode |  | 
        |  | 
        
        | Term 
 
        | What command is used to restrict assess to the Privileged Exec mode? |  | Definition 
 | 
        |  | 
        
        | Term 
 
        | What command interface configuration command is used to activate an interface? |  | Definition 
 | 
        |  | 
        
        | Term 
 
        | To view the current configuration of a router, what command is used from the privileged exec mode? |  | Definition 
 | 
        |  | 
        
        | Term 
 
        | What command is used to change the bootup values within ROM monitor mode? |  | Definition 
 | 
        |  | 
        
        | Term 
 
        | What filters network traffic by controlling whether routed packets are forwarded or blocked at the router's interface? |  | Definition 
 | 
        |  | 
        
        | Term 
 
        | What to all access lists end with? |  | Definition 
 | 
        |  | 
        
        | Term 
 
        | Router access lists must be applied to |  | Definition 
 | 
        |  | 
        
        | Term 
 
        | What does a standard access list use to filter packets? |  | Definition 
 
        | (b) Source Internet Protocol address |  | 
        |  | 
        
        | Term 
 
        | What is the range of numbers that represent standard access lists? |  | Definition 
 | 
        |  | 
        
        | Term 
 
        | What kind of server is set aside to perform a specific task or function all the time? |  | Definition 
 | 
        |  | 
        
        | Term 
 
        | What network type normally utilizes non-dedicated servers? |  | Definition 
 | 
        |  | 
        
        | Term 
 
        | What is required due to the differences between the physical speed of the print device and the processing speed of the workstation generating the print job. |  | Definition 
 | 
        |  | 
        
        | Term 
 
        | What frees the computer's attention so the user can continue working while waiting for a document to print? |  | Definition 
 | 
        |  | 
        
        | Term 
 
        | What type of server is a bundle of application software designed to significantly improve network efficiency and productivity? |  | Definition 
 
        | (c) Network Management System (NMS) |  | 
        |  | 
        
        | Term 
 
        | What two types of environments are network operating systems implemented upon? |  | Definition 
 
        | (d) Peer-to-peer and client server |  | 
        |  | 
        
        | Term 
 
        | Within the Windows environment, what is the central repository for the entire software and hardware configuration settings in a computer running the Windows based NT operating system? |  | Definition 
 | 
        |  | 
        
        | Term 
 
        | What is a set of keys, subkeys, and values from the registry stored in its own file location called? |  | Definition 
 | 
        |  | 
        
        | Term 
 
        | Data in which root-key determines which drivers and sevices will load during the boot process? |  | Definition 
 | 
        |  | 
        
        | Term 
 
        | What is a set of statistical measurments made over a period of time that characterizes network performance? |  | Definition 
 | 
        |  | 
        
        | Term 
 
        | What is a detailed analysis of the performance of a specific application or a specific network element? |  | Definition 
 | 
        |  | 
        
        | Term 
 
        | What network performance criteria is the most significant statistic to be collected and calculated? |  | Definition 
 | 
        |  | 
        
        | Term 
 
        | The measurement of traffic volume actually being carried by the network, typically expressed in kilobytes per second is |  | Definition 
 | 
        |  |