SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
IT: Networking Vocab
Start Test
Study First
Subject
:
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Synchronises data exchange
Session
latency
Bend Radius
router
2. Saturation of network bandwidth caused by excessive traffic - as when a large number of computers or devices attemp to transmit simultaneously - or when computers or devices presist in transmitting repeatedly.
broadcast storm
IGMP
demilitarized zone
NIC
3. Most common cabling used in networking. Usually connects nodes to the main network.
A Protocol
Regeneration
OSI Layer 3
ethernet
4. Domain Name System
DNS
Presentation
Transport
back door
5. Measure of a signal's strength
back hack
Domain Controller
Frequency Modulation
Amplitude
6. Form of transmission in which digital signals are sent through direct current pulses applied to a wire; can only send one signal at a time
Baseband
certification value may be lessened due to the number of people obtaining them
RIR (Regional Internet Registry)
Network interface card (NIC)
7. Junction point between the MDF and concentrations of fewer connections; those that terminate in a telecommunications closet
network class B
transmission media
Intermediate Distribution Frame
link quality monitoring
8. Each node is connected to the two nearest nodes so that the entire network forms a circle - active - twisted pair of fiber optic - single malfunction in workstation can disable entire network - not flexible or scalbe
ADSL
ring topology
fiber optic cable
fragmentation
9. The process of enclosing data for transmission
switch
encapsulation
ARP
slip
10. NCP
Internetwork Packet Exchange
Data Link
host
NetWare Core Protocol
11. Ethernet NICs listen on network and wait until they detect no other nodes transmitting data
carrier sense
SSL
plain old telephone service (POTS)
Session
12. Is associated with unix/linux networks
Mechanical Transfer-Registered Jack
signal
port 443
Secure Copy
13. Translated network addresses into their physical counterparts
network layer
Telnet
FDM
Data Link (Layer 2)
14. A network on which any computer can communicate with other networked computers on an equal (peer) basis without going through an intermediary - such as a server. Peer-to-peer networking enables each computer to offer and access shared resources - suc
Peer-to-peer network
ring topology
TCP/IP
connection oriented
15. The way nodes responds to a collision
collision detection
AM
Physical
block ID
16. Enables the establishment of a Web connection - but it also provides for the exchange of resources - for example - displaying AOL's Web page in your brower.
transceiver
Hypertext Transfer Protocol (HTTP)
Basic Rate Interface
OSI Layer 4
17. Running system for a while to track types of false positives it generates and then adjusting IDPS alarm classifications
Presention Layer (Layer 6)
1000base-sx
fixing attenuation
alarm filtering
18. Signals traveling on one wire infringes on the signal traveling over an adjacent wire
cross talk
Application layer
star topology
plain old telephone service (POTS)
19. Cross talk with 2+ wires
star topology
alien cross talk
Remote Desktop Protocol
CRC (cyclic redundancy check)
20. Coordinates and maintains communications between two nodes on the network
session layer
Internet Protocol Security
802.3af
partially distributed control strategy
21. Progress of a wave over a time in a relationship
RADIUS
event viewer
IEEE
phase
22. Which protocol is responsible for routing packets around the network?
Mesh topology
intrusion detection system (IDS)
Internet Protocol
Application Layer
23. A set of routines that make up part of a software application
Quality of Service
stateful firewall
statistical multiplexing
API (application program interface)
24. A computer that has its own CPU and may be used as a stand-alone computer for word processing - spreadsheet creation - or other software applications. It also may be used to access another computer such as another workstation or server via a network.
Workstation
carrier sense
TFTP
Remote Access Service
25. A technique in which IP address used on a private network are assigned a public IP address by a gateway when accessing a public network.
Secure Shell (SSH
connectionless
NAT (Network Address Translation)
plain old telephone service (POTS)
26. Layer 1 Troubleshooting
grade-index multimode fiber-optic cable
Dense Wavelength Division Multiplexing
driver
Faulty network cable
27. Area above the ceiling tile or below the subfloor in a building
Multistation Access Unit
Encrypting File System
Plenum
Core Gateway
28. Serial internet protocol
slip
Organizational Unit
radiation pattern
Line Printer Remote
29. MDIX
Media Dependent Interface Crossover
telnet
OSI
CIDR (Classless Interdomain Routing)
30. Compatible with 802.11a - b - g 600-65 throughput
RFI
MMF
802.11n
subnetting purpose
31. Twist wire so you don't get interference on the memory
EAPoL
DNS
Media Dependent Interface
fixing cross talk
32. Also called the physical or MAC address - the hexadecimal number permanently assigned to a network interface and used by the MAC sublayer within the DATA Link layer (Layer 2).
Hyper text transfer protocol
Kerberos
device address
plenum area
33. BootP
digital adv
radiation pattern
Boot Protocol /Bootstrap Protocol
broadband
34. Asynchronous digital subscriber line. Method of providing internet service that uses the standard phone line - but transmits data at a different frequency than voice. Faster than ISDN.
EAP
ADSL
TIA
ISDN
35. Failure of an IDPS to react to an actual attack event
dig (domain information groper)
false negative
ARP
S-HTTP
36. Protocol used to transfer mail between a send mail server and microsoft exchange server
DSL
Default Gateway
EIA
POP3
37. Basic error checking and correction
802.11n
RARP
Data Link
frame
38. GSNW
Gateway Services for NetWare
incremental backup
TCP/UDP
Rivest - Shamir - Adelman
39. GPO
Digital
Loose network cable connection
Group Policy Object
pstn
40. Network layer device
router
power budget
tuning
vampire tap
41. Application layer protocol that formulates and interprets requests between Web clients and servers
HTTP (Hypertext Transfer Protocol)
Workstation
RFI
Internet Information Services
42. Documented agreement containing technical specifications or other precise criteria used as guidelines to ensure that materials - products - processes - and services suit their intended purpose
Single mode fiber
port 25
Secure Copy
standard
43. Data Link Layer
802.3
Network Switching
MAC sublayer
Channel
44. The more resistant to cross talk (STP)
Light Weight Directory access protocol (LDAP
Post Office Protocol 3 (POP3)
Repeater
the more twist
45. Equivalent to OSI Layer 3 Network
CD-ROM File System
1550bytes
Application Layer
TCP/IP Vs. OSI: Internet
46. Is a system that is distributed throughout the internetwork to provide address/name resolution.
OSI
Network Time Protocol (NTP)
WAN Connectivity
Domain Name System (DNS)
47. Is a method for automatically assigning address and other configuration parameters to network hosts.
SCP
Dynamic Host Configuration protocol (DHCP)
ARP
analog adv
48. Twisted pair cable consisting of a number of twisted pairs of copper wire with a simple plastic casing. Because - no shielding is used in this cable - it is very susceptible to EMI - RFI - and other types of interference
Lightweight Directory Access Protocol
SYN-ACK (synchronization-acknowledgment)
Network
Unshielded twisted pair
49. Transport Layer
Port Numbers
transport layer
Physical
Password Authentication Protocol
50. What is the term used when every host on the network has a fixed IP address?
802.3
Network
Static IP Addressing
Mesh topology