SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
IT: Networking Vocab
Start Test
Study First
Subject
:
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Establishes maintains and terminates connections
FTP
Session
public switched telephone network (PSTN)
RS 232
2. Frequency modulation-frequency of signal is modified
fixing noise
Simple Network Management Protocol
Lightweight Directory Access Protocol
FM
3. Institute of electrical and electronics engineers
Open Shortest Path First
Broadband
IEEE
POTS
4. Running system for a while to track types of false positives it generates and then adjusting IDPS alarm classifications
ethernet
alarm filtering
star-wired bus topology
point to multipoint
5. Used to resolve NetBIOS names w IP address
WINS
PSTN
broadcast storm
Frequency Division Multiplexing
6. Consists of single cable that connects all nodes on a network without intervening connectivity devices - inexpensive - hard to find source of error - not very fault tolerant - data is transmitted in one direction in the ring.
Category 6
Network Layer
bus topology
driver
7. The _____________ allows certain bits of the IP address to be ignored when checking to see if an IP address matches the destination network address.
Address Resolution Protocol
supernet
Data Link
Subnetmask
8. ICMP
IDPS terrorist
GBIC
TDM
Internet Control Message Protocol
9. An established guideline that specifies how networked data is formatted into a packet or frame - how it is transmitted - and how it is interpreted at the receiving end.
Layer 2 Forwarding
Internet Relay Chat
(fiddy) Fiber Distributed Data Interface
Protocol
10. A type of fiber optic connector. These connectors are square shaped and have release mechanisms to prevent the cable from accidentally being unplugged
Subscriber connector
Frequency Hopping Spread Spectrum
routing
STP
11. Four twisted wire pairs rated for 100 Mhz - but capable of handling the disturbance on eash pair that's caused by transmitting on all four pairs at the same time.
incremental backup
NTP
Category 5e
Transport
12. Describes a theoretical representation of what happens between two nodes communicating on a network
OSI model
Hubs
Application
Presentation layer
13. A single physical/non-physical medium for connecting computers
medium
attenuation
ANDing
CRC
14. A type of point-to-point digital WAN connection that uses standard phone lines to provide high-speed comm.
host-based IDPS (HIPDS)
DSL
virture privat network (VPN)
IP Address
15. IDPS that uses profiles to detect anomalous protocol behavior
stateful protocol analysis (SPA) IDPS
connectivity device
data packets
Network File System
16. Secure Hypertext Transfer Protocol
Network layer
IANA (Internet Assigned Numbers Authority)
DHCP
S-HTTP
17. 2nd set of characteristics that make up a device's MAC address. Added at the factory and is based on the device's model and manufacture date
device ID
Packets
Transport Layer Security (TSL)
TCP/IP Vs. Netware: Application
18. Uses frame headers
local area network (LAN)
cable plant
ethernet
TCP/IP Architecture Layer 2
19. Brief delay in processing - length of cable can contribute to this
logical link control (LLC)
latency
broadband
datagram
20. Type of protocol useful when data must be transferred quickly
Demultiplexer
connectionless
Network interface card (NIC)
Application Layer
21. Crimp into pins 1 and 2 of RJ 45 connector
server
American Wire Gauge
TCP/IP Vs. Netware: Network Access
white/orange and orange
22. Method of data modulation in which the frequency of the carrier signal is modified by the application of the data signal
Frequency Modulation
rollover cable
ARP
transmit
23. IPX
Internet
beaconing
Internetwork Packet Exchange
LDAP
24. Application Layer
Mail Exchanger
intrusion detection
Client Software
network access method
25. Transport layer protocol that services a request without requiring a verified session and without guaranteeing delivery data
connectionless
honey net
Authentication Header
Faulty network cable
26. Data Link Layer
traceroute (tracert)
Ethernet
Thin Eterhnet/10 Base 2
half duplex
27. Also called the physical or MAC address - the hexadecimal number permanently assigned to a network interface and used by the MAC sublayer within the DATA Link layer (Layer 2).
TFTP
Impedance
half duplex
device address
28. MMF
Internet Protocol version 4
MultiMode Fiber
connectionless
driver signing
29. String used to identify an access point - configure on your new access points to match the settings on existing access points
SSID
Domain Controller
NIC (Network Interface Card)
Synchronous Optical Network
30. Name Of Layer 3
signal bounce
GBIC
Network
data packets
31. A variation of CHAP designed by Microsoft
star wired bus
802.44
MS-CHAP
Virtual Private Network
32. Device that enables networks or segments using different media to interconnect and exchange signals
bus topology
Media Converter
inline sensor
Boot Protocol /Bootstrap Protocol
33. A network design consisting of a continuous path for data with no logical beginning or ending point - and thus no terminators.
encapsulate
router
ring topology
Application
34. Braided metal shielding used to insulate some types of coaxial cable
Plenum
OSI (Open Systems Interconnection) model
Braiding
Repeater
35. A fiber-optic data transport method capable of a 100-Mbps transfer rate using a dual ring topology; largely supplanted today by faster Ethernet method.
logical address
token ring
Fiber Distributed Data Interface (FDDI)
Network File System (NFS)
36. An algorithm used to verify the accuracy of data contained in a data frame.
File Transfere Protocol - (FTP)
network layer
CRC (cyclic redundancy check)
Internet
37. Digital - one signal one channel at a time (half duplexing) ex. ethernet
802.11
baseband
BSS
Telnet
38. Data circuit-terminating equipment. multiplexer or modem
full mesh
enticement
CSU/DSU
DCE
39. MDI
802.3
SNMP
POP3
Media Dependent Interface
40. Signal interference caused by electrical devices that emit radio waves at the same frequency used by network signal transmissions.
radio frequency interference (RFI)
Peer-to-peer network
social engineering
Ethernet
41. A service on a node
link quality monitoring
ports
Extended Network Prefix
carrier sense
42. Modulation technique in which the amplitude of the carrier signal is modified by the application of a data signal
ISDN
RS 232
MultiStation Access Unit
Amplitude Modulation
43. RAS
signature-based (knowledge-based - misuse-detection) IDPS
hot site
Straight tip connector
Remote Access Service
44. What type of browser is designed for use on small handheld devices such as palmtop computers and iPhones?
Unshielded twisted-pair (UTP) cable
segmentation
Internet Information Services
Microbrowser
45. Http - Hypertext transfer protocol
Bandwidth
port 80
Private Network
Common Internet File System
46. 12-character string that uniquely identifies a network node - hard coded into the NIC by the manufacturer; composed ot the block ID and device ID
fat pipe
fault tolerance
MAC address
2.4-GHz band
47. Virtually local area network-device-switch
VLAN
analog
(fiddy) Fiber Distributed Data Interface
power over ethernet
48. Also called the star-ring hybrid - topology - a network design in which the logic communication are in a ring - but the phyical layout of the network star.
star-wired ring topology
SSH
Topology
1000base-t
49. Frequency Division Multiple Access
bus topology
Physical Layer
port 25
FDMA
50. Bootstrap Protocol
Secure Shell (SSH)
router
BOOTP
802.11