Test your basic knowledge |

IT: Networking Vocab

Subject : it-skills
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Communications for continuous burst of data controlled by a clock signal that starts each burst.






2. A generic term referring to any set of protocols and standards collected into a comprehensive grouping that - when followed by the devices in a network - allows all the devices to communicate. Examples include TCP/IP and OSI.






3. Round time trip. time it takes for packet to get from sender to receiver and back






4. Total amount of communication cable that make up a network.






5. Does not operate at the application layer






6. Transforms data into a form network or applications will understand






7. Ensures reliablity of packet transmissions from node to node - Ensures that data is sent and received in the same order - Provides acknowledgement when a packet is received - Monitors for packet transmission errors and resends bad packets - Breaks la






8. Hard-to-define skills such as dependability






9. Produces guidelines for how network cable should be installed in commercial buildings






10. A technique in which IP address used on a private network are assigned a public IP address by a gateway when accessing a public network.






11. FDDI






12. Coordinates and maintains communications between two nodes on the network






13. ICS






14. MDIX






15. A worldwide network of interconnected LANs and MANs that uses the TCP/IP protocol to enable people to shares e-mail messages and computer files and to access a vast array of information.






16. Is a method for automatically assigning address and other configuration parameters to network hosts.






17. 5 segments b/w two nodes - 4 repeating devices - and 3 segments connected by two repeating devices






18. Techniques that employ hardware and software to provide assurance against equipment failures - computer service interruptions - and data loss.






19. Internet protocol security-defines encryption - authentication - and key management for TCP/IP transmission






20. Firewalls perform two basic security functions






21. GBIC






22. The fact that wireless signals follow a number of paths to their destination






23. Is a secure form of HTTP






24. A type of transmission in which there are several transmission channels on a communications medium - allowing more than one node to transmit at the same time.






25. Asynchronous digital subscriber line. Method of providing internet service that uses the standard phone line - but transmits data at a different frequency than voice. Faster than ISDN.






26. Standards organizations representing 157 countries headquartered in Geneva. Goal is to establish international standards to facilitate global exchange of information and barrier-free trade






27. Works closely with IP in providing error and control information - by allowing hosts to exchange packet status information to help move the packets along the internetwork






28. A cable TV company - such as Comcast Broadband.






29. Method of controlling how network nodes access communication channels - ex highway






30. Multiplexing based on priority






31. Intelligently direct data between networks based on addressing - patterns of usage - and availability of network segments






32. Scrambles information into an alternative form that requires a key or password to decrypt the information.






33. The number of times a signal's amplitude changes over a fixed period of time - expressed in cycles per second - Hz






34. IS designed for the exchange of electronic mail between networked systems -such as between mail servers over a TCP/IP network






35. Four twisted wire pairs with three twists per foot. This type can handle transmissions up to 16 MHz. Now limited to telecommunication equipment






36. ISDN






37. MIB






38. Guarantees that a server continually has power even if a buildings electrical service is interrupted - continuous voltage to a device by switching virtually instantaneously to the battery when it detects loss of power






39. The seventh layer of the OSI model. Application layer protocols enable software programs to negotiate formatting - procedural - security - synchronization - and other requirements with the network.






40. Delay between the transmission of a signal and its receipt






41. 7th layer; protocols enable software programs to negotiate formatting - procedural - security - synchronization - and other requirements with the network






42. Signals traveling on one wire infringes on the signal traveling over an adjacent wire






43. Open Systems Interconnection model is standard description or reference model for how messages should be transmitted between any 2 points in a telecommunications network.






44. The most commonly used form of Post office protocol.






45. Manages IP address allocation and the domain name system






46. Measure of a signal's strength






47. IPSec






48. Device that separates broadcast domain






49. Virture privat network






50. Which protocol is responsible for splitting data into packets and adding a header to each one?