Test your basic knowledge |

IT: Networking Vocab

Subject : it-skills
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Consists of single cable that connects all nodes on a network without intervening connectivity devices - inexpensive - hard to find source of error - not very fault tolerant - data is transmitted in one direction in the ring.






2. NIS






3. A computer that accesses another computer - such as a workstation that accesses a shared file on another workstation - server - or mainframe. The client may use the accessed computer (host) to process data - or may process accessed data using its own






4. Is a challenge respone authentication protocol






5. Physical layer standard for serial communications






6. Data Link Layer






7. Restructuring data units that have been segmented






8. An established guideline that specifies how networked data is formatted into a packet or frame - how it is transmitted - and how it is interpreted at the receiving end.






9. IPv4






10. Can use WPA to improve the security of data in transit






11. 5 segments b/w two nodes - 4 repeating devices - and 3 segments connected by two repeating devices






12. Secure Shell






13. Layer 4






14. Provides service that ensure accurate and timely delivery of network communications between two hosts






15. Session Layer






16. Voltage is varied and imprecise - more susceptible






17. Application Layer






18. Signal interference caused by electrical devices that emit radio waves at the same frequency used by network signal transmissions.






19. A common way of sharing resources on a peer-to-peer network






20. A transport system that uses the CSMA/CD access method for data transmission on a network. Typically it is implemented in a bus or star-bus hybrid topology.






21. Ppp over ethernet






22. Network layer device






23. A command-line utility that combines the functionality of the tracert and ping commands (similar to UNIX's mtr command) and comes with Windows XP - Vista - and Windows Server 2003 and Server 2008






24. The IEEE standard for token ring networking devices and data handling.






25. Glass or plastic shield around the core of a fiber-optic cable; reflects light back to the core in patterns that vary depending on the transmission mode






26. On a computer that receives data over a network - the process in which the device interprets the lower-layer headers and - when finished with each header - removes the header - revealing the next-higher-layer PDU.






27. Provides FTP - HTTP - SMTP...






28. A form of fiber-optic cable that supports only one signal transmission at a time and that is used mainly for long- distance communication.






29. The act of hacking into a hacker's system to find out as much as possible about the hacker






30. Amplitude modulation-amplitude of signal is modified






31. BRI






32. Radio frequency interference






33. Each computer is connected to a central device






34. An adapter board designed to connect a workstation - server - or other network device to a network medium.






35. A group of two or more computer systems linked together.






36. Error detection and correction






37. Manages end-to-end delivery of data






38. The physical layout of cable and wireless network devices and the logical path followed by network frames or packets sent on the cable or by wireless transmissions.






39. Reflection in multiple different directions of a signal






40. Unix command at shell prompt to send a file to printer






41. Layer 1 Troubleshooting






42. Lower sublayer of the Data Link layer; appends the physical address of the destination computer onto the fram






43. Is an e mail retival protocol designed to enabel users to access their e-mail from various locations






44. A boundary between two zones of trust






45. Encompasses actions an organization takes when intrusion is detected






46. Alert or alarm that occurs in the absence of an actual attack






47. Algorithm used to verify the accuracy of data contained in a data frame






48. This phase determines how often systems should send each other quality statistics.






49. Equivalent to OSI Layer 3 Network






50. ADSL