SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
IT: Networking Vocab
Start Test
Study First
Subject
:
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Upper sublayer in the Data Link layer. Provides a common interface and supplies reliability and flow control services
Internet Key Exchange
LLC (Logical Link Control) sublayer
Organizational Unit
Channel Service Unit
2. Wireless standard
Hyper text transfer protocol
flow control
802.11
Channel
3. Tracks running and graphing data from any workstations. should ensure that new routers and switches can support it in order to easily automate network management
SNMP
IP (Internet Protocol)
ARP
Media Dependent Interface
4. The wave splits into secondary waves
narrowband
Dense Wavelength Division Multiplexing
Firewall Filtering
diffraction
5. What does POP3 stand for?
diffraction
narrowband
Post Office Protocol
Default Gateway
6. Internet control message protocol
TCP/IP Architecture Layer 3
Core
ICMP
POP3 (Post Office Protocol - version 3)
7. Useful for troubleshooting a network connectivity problem from workstation to another workstation
connectionless
crossover cable
Network News Transport Protocol (NNTP)
Bandwidth
8. Physical Layer
port 22
Hubs
analog adv
ADSL
9. Signal that uses variable voltage to create continuous waves - resulting in an inexact transmission
star wired ring
Challenge Handshake Authentication Protocol
Analog
fading
10. PPP
Point-to-Point Protocol
Repeater
PDU (protocol data unit)
nslookup
11. Several ethernet nodes can be connected and can monitor traffic or access media simultaneously
multiple access
TDMA
Institute of Electrical and Electronics Engineers
Data Service Unit
12. Ensures that messages being transmitted on the internet are private and tamper proof
microwave
Transport Layer Security (TSL)
fiber optic cable
thin client computing
13. A network whose access is restricted to only clients or machines with proper credentials.
Private Network
Category 6
Attenuation
workstation
14. A set of routines that make up part of a software application
plenum cables
cat 5
API (application program interface)
collision
15. Max size of data units on Ethernet networks
switch
DTE
HTTP (Hypertext Transfer Protocol)
1550bytes
16. Process of breaking large packets into smaller packets.
digital dis
fragmentation
Adjacent Layer Interaction
PSTN
17. An app. that provides centralized authentication and authorization services for a network.
demand priority
rj-45
backbone cabling
RADIUS
18. A network design in which every node is connected to every other note - achieving fault tolerance.
noise
mesh topology
1000base-lx
traceroute (tracert)
19. A network owned and maintained by an organization -such as a campus network operated by a college.
private network
Frequency Division Multiplexing
Radio Waves
trap and trace
20. Carrier sense multiple access with collision detection
CSMA/CD
OSI Layer 6
BOOTP
headened
21. CNAME
Canonical Name
OSI Layer 5
Mesh topology
Network File System
22. Process in which an NIDPS inspects the higher-order protocols (HTTP - FTP - Telnet) are examined for unexpected packet behavior or improper use
TCP/IP protocol failure
udp
terminator
application protocol verification
23. Supplying electrical power through ethernet
SMTP (Simple Mail transfer Protocol)
satellite
modifying the file-sharing controls
power over ethernet
24. More variable - convey greater subtleties with less energy
analog adv
User Datagram Protocol (UDP)
Independent Computer Architecture
Populated Segment
25. Produces guidelines for how network cable should be installed in commercial buildings
Secure File Transfer Protocol
EIA/TIA
Optical Loss
phishing
26. A private network that functions like a tunnel though a large network-such as the Internet or an enterprise network-that is restricted to designated member clients only.
virture privat network (VPN)
66 Block
Asymmetric Digital Subscriber Line
Layer 2 Forwarding
27. Fiber Distributed Data Interface
FDDI
Multimode fiber
802.2
fingerprinting
28. 5th layer; establishes and maintains communication between two nodes on the network; 'traffic cop'
Session layer
Internet Protocol version 4
RTS/CTS
connectivity device
29. PAP
Password Authentication Protocol
frame
SSL
NTP
30. Cross talk that occurs between wire pairs near the source of a signal
Near End Cross Talk
entrapment
Modulation
Network
31. PRI
Local Connector
router
Secure Shell (SSH)
Primary Rate Interface
32. A network design consisting of a continuous path for data with no logical beginning or ending point - and thus no terminators.
ICS (Internet Connection Sharing)
ring topology
topology
Data Circuit-Terminating Equipment
33. Saturation of network bandwidth caused by excessive traffic - as when a large number of computers or devices attemp to transmit simultaneously - or when computers or devices presist in transmitting repeatedly.
Faulty network cable
broadcast storm
fingerprinting
modifying the file-sharing controls
34. A cable TV company - such as Comcast Broadband.
cabeloco
vampire tap
Microbrowser
Network File System
35. Network File System
Same Layer Interaction
NFS
cp connection
Quality of Service
36. Equivalent to OSI Layer 4 Transport
Punch-Down Block
Application Layer
TCP/IP Vs. OSI: Transport
EMI
37. A transmission method that has distinct signal levels to represent binary zeroes or ones - such as +5 volts and 0 volts.
FM
digital
port 25
Remote Access Service
38. Compatible with 802.11a - b - g 600-65 throughput
802.11n
10base-t
Time Division Multiple Access (TDMA)
session
39. A type of transmission that can vary continuously - as in a wave pattern with positive and negative voltage levels.
network layer
2.4-GHz band
analog
Network
40. Segment
backbone
directional antennas
10base-t
TCP/IP Transport Layer Encapsulation
41. As defined by the EIA/TIA-568 standard - cable that runs between network equipment rooms - floors - and buildings.
backbone cabling
ISO (International Organization for Standardization)
Electromagnetic Interference
digital dis
42. Is usde to communicate time synchronization information between systemson a network
Canonical Name
plain old telephone service (POTS)
Transport Layer Security (TSL)
Network Time Protocol (NTP)
43. Public switched telephone network
intrusion detection system (IDS)
IMAP (Internet Message Access Protocol)
Local Connector
pstn
44. 4th layer; protocols ensure that data are transferred from point A to point B reliably and without errors; services include flow control - acknowledgment - error correction - segmentation - reassembly - and sequencing
TCP/IP Architecture Layer 3
nslookup
2.4-GHz band
Transport layer
45. NDS
1000base-t
Frequency Division Multiplexing
NetWare Directory Services
carrier sense
46. Technology that uses standard telephone wires and allows transmission of voice and data information. Slower than ADSL.
ISDN
Plenum
TCP/IP Internet Layer Encapsulation
Class A
47. Transport protocol and TCP/IP port that uses telnet utility use
TCP port 23
Bits
fragmentation
link quality monitoring
48. Internet group management protocol
Transport Layer Security (TSL)
communications media
bus topology
IGMP
49. MX
encapsulate
communications media
Channel Service Unit
Mail Exchanger
50. Signal interference caused by electrical devices that emit radio waves at the same frequency used by network signal transmissions.
Transmission Control Protocol
EAPoL
radio frequency interference (RFI)
Gigabit Ethernet (fiber characteristics)