SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
IT: Networking Vocab
Start Test
Study First
Subject
:
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Data only
goodput
physical media
noise
broadcast frame or broadcast packet
2. Layer 5 through 7 Troubleshooting
bus topology
A Protocol
Session layer
configured with correct sending and receiving email server information
3. The combination of an IP address's network ID and subnet information. By interpreting the address's extended network prefix - a device can determine the subnet to which an address belongs.
white/orange and orange
Quality of Service
Extended Network Prefix
UDP
4. Protocol that encapsulates data for transmission over VPNs
Transport Layer
L2TP
Port Numbers
ARP
5. Contains information that a wireless node needs to associate with an ap
TCP/IP Vs. Netware: Network Access
beacon frame
WINS
rj-11
6. LDAP
802.44
Application
Lightweight Directory Access Protocol
L2TP
7. The most commonly used form of Post office protocol.
ISOC
WDM
intrusion reaction
POP3 (Post Office Protocol - version 3)
8. Also called the star-bus hybrid topology - a network design that combines the logial comunications of a bus with the physical layout of a star.
RTT
Kerberos
2.4-GHz band
star-wired bus topology
9. Maximum arc into which you can loop a cable before you will cause data transmission errors
Bend Radius
star-wired ring topology
Category 5e
MMF
10. The organized research of the Internet addresses owned or controlled by a target organization.
Institute of Electrical and Electronics Engineers (IEEE)
footprinting
Trivial File Transfer Protocol (TFTP)
site policy awareness
11. Name Of Layer 6
Presentation
Core
honey net
RFI
12. Integrated digital network
FTP
Transport
OSI Layer 1
isdn
13. MMF
MultiMode Fiber
multimeter
Telnet
Optical Time Domain Reflectometer
14. Functions at the network layer that add logical addresses and properly route data
packet
Integrated Services Digital Network
Multiplexer
protocol and services
15. Signal interference caused by electrical devices that emit radio waves at the same frequency used by network signal transmissions.
station
fractionalizing
radio frequency interference (RFI)
Terminator
16. A logical grouping of information that includes the network layer header and encapsulated data - but specifically does not include any headers and trailers below the network layer.
Packet
connectionless
demand priority
Network Behavior Analysis
17. The cableing or radio waves used to connect one network computer to another - or one network to another - and transport data between them.
IEEE
communications media
OSI
Simple Mail Transfer Protocol (SMTP)
18. Wireless standard
FHSS
Data Link
802.11
Adjacent Layer Interaction
19. A term used to refer to data within the Data-link layer of the OSI model.
frame
tracepath
Mac Addressing
packet filtering - application proxy
20. Rules and configuration guidelines governing implementation and operation of IDPSs within an organization
site policy
baseband
ANSI
MAN
21. Computers connected together within a limited geographical area
802.5
Logical Link Control
Core
LAN
22. An 8-bit character-coding method consisting of 96 uppercase and lowercase characters and numbers - plus 32 nonprinting characters.
MAC address
Physical Layer (Layer 1)
Institute of Electrical and Electronics Engineers (IEEE)
American Standard Code for Information Interchange (ASCII)
23. Tracks running and graphing data from any workstations. should ensure that new routers and switches can support it in order to easily automate network management
Dynamic Host Configuration protocol (DHCP)
Institute of Electrical and Electronics Engineers
SNMP
Asymmetric Digital Subscriber Line
24. A device that converts an analog to digital signal and vice versa
data packets
Data Terminal Equipment
modem
ANSI
25. Equivalent to OSI Layer 3 Network
backbone
switch
TCP/IP Vs. OSI: Internet
pathping
26. A specialized UN agency that provides developing countries with technical expertise and equipment
ITU
plain old telephone service (POTS)
standby UPS
Institute of Electrical and Electronics Engineers
27. Enables sharing remote drivers - Enables sharing remote printers - Handles e-mail messages - Provides file transfer services - Provides file management services - Provides terminal emulation
message and circuit
Application Layer (Layer 7)
addressing
link quality monitoring
28. Not-for-profit agency that manages distribution of IP addresses; ARIN for Americas and Sub-Saharan Africa - APNIC for Asia-Pacific - RIPE for Europe and North Africa
LC connector
terminal
FDMA
RIR (Regional Internet Registry)
29. AMI
NNTP
Class C Network
analog
Alternate Mark Inversion
30. Technique for formatting signals in which one property of a carrier wave is modified by the addition of a data signal during transmission
NetBIOs
Kroner
Repeaters
Modulation
31. When pulses that represent bits follow one another along a single transmission
Application Layer
802.2
serial
Ethernet
32. LC
Protocol Data Unit
IP Addressing
Local Connector
EIA
33. The process of enclosing data for transmission
Session Layer (Layer 5)
Backup Domain Controller
Transport
encapsulation
34. The physical layout of the cable and wireless network devices and the logical path followed by network frames and packets sent on the cable or by wireless transmissions
topology
WAN Connectivity
supernet mask
NTP
35. 7th layer; protocols enable software programs to negotiate formatting - procedural - security - synchronization - and other requirements with the network
impedance
token ring
SMTP
Application layer
36. Unit of data at any layer of the OSI model
Point-to-Point
PDU (protocol data unit)
EAP
Frequency
37. A unit of data formatted for transmission over a network that contains control and other information that corresponds to the OSI Networklayer; also called Layer 3.
MAC (Media Access Control) sublayer
Near End Cross Talk
RAS
packet
38. RADIUS
mtr (my traceroute)
Remote Authentication Dial-In User Service
demilitarized zone
DSSS
39. SMTP - simple mail transfer protocol
American Wire Gauge
port 25
L2TP
NAT (Network Address Translation)
40. Local area network
Punch-Down Block
transport layer
LAN
demand priority
41. A 32 bit number that - when combined with a device's IP address - indicates the kind of supernet to which the device belongs.
Post Office Protocol 3 (POP3)
supernet mask
POP3
Category 6
42. Carrier sense multiple access w collision detection (network access method) ethernet
Authentication Header
router
CSMA/CD
access services
43. Application that will allow you to configure the workstation to tally these errors and send you and email message every time a problem occured
Subnetmask
connectivity device
Inter Message Access Protocol (IMAP)
event viewer
44. This layer in the OSI transforms bits into electromagnetic signals.
Logical Link Control
Physical Layer
tracert
802.11
45. Controls how applications access network
passive topology
Application
butt set
Data Link
46. MDI
Presentation
802.2
Media Dependent Interface
butt set
47. Basic error correction and detection
Data Link
standby UPS
Asymmetric Digital Subscriber Line
Post Office Protocol version 3
48. Measure of frequency equivalent to the number of amplitude cycles per second
star-bus hybrid topology
Network
LAN
Hertz
49. A device used to connect thicknet cable with a transceiver. A vampire bypasses the need to serve the cable - because the vampire tap has a metal tooth that pierces through the outside cable insulation (like a vampire) and connects with the copper wir
Repeater
Remote Desktop Protocol
multipath
vampire tap
50. Term that describes current anti-intrusion technologies
SDU
Half-Duplex
intrusion detection/prevention system (IDPS)
SMTP (Simple Mail transfer Protocol)