SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
IT: Networking Vocab
Start Test
Study First
Subject
:
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Translated network addresses into their physical counterparts
Logical Link Control
network layer
IDPS terrorist
overhead
2. A process that ensures one device does not send information faster than it can be received by another device.
stateless firewall
Data Terminal Equipment
flow control
modem
3. A standard for encoding and interpreting binary files - images - video - and non-ASCII character sets within an e-mail message.
Internet Group Membership Protocol (IGMP)
MIME (Multipurpose Internet Mail Extensions)
Mail Exchanger
Electromagnetic Interference
4. Device that modulates analog signals into digital signals for transmission over telephone lines - and demodulates digital signals into analog for the receiving end
routing
transmit
Modem
IEEE
5. Physical Layer
Internet Protocol
Hubs
DSL
Core
6. Provides th transfer medium (such as cable) - Translates data into a transmission signal appropriate to the transfer medium - Sends the signal along the transfer medium - Includes the pyical layout of the network - Monitors for transmission error - D
port 22
Physical Layer (Layer 1)
Improperly configured switch
Domain Name System (DNS)
7. Firewall packet inspection that examines the data contained in a packet as well as the state of the connection between internal and external computers.
802.11
Node
stateful firewall
Light Weight Directory access protocol (LDAP
8. Tool used to determine whether a customers line is obtaining dial tone from the CO
Node
beacon frame
Frames
butt set
9. TFTP is a TCP/IP file transfer protocol that is designed for task such as the transfer of data to enable a diskless workstation to boot using files trasmitted from a server
Data Link
RIR (Regional Internet Registry)
installing cable
Trivial File Transfer Protocol (TFTP)
10. 12 digits - A-F/0-9
frame
network address
MAC address
Application
11. Point or stage in a wave's progress over time
File Transfer Protocol
Network Time Protocol (NTP)
Kerberos
Phase
12. IKE
Network Time Protocol
Internet Key Exchange
physical address
Bit
13. Transport Layer
Basic Rate Interface
VLAN
10BASE2 Limit
Flow Control
14. Technique for formatting signals in which one property of a carrier wave is modified by the addition of a data signal during transmission
electromagnetic interference (EMI)
Modulation
Asynchronous Transfer Mode
fixing cross talk
15. An IP addressing convention that adheres to network class distinctions - in which the first 8 bits of a Class A address - the first 16 bits of a Class B address - and the first 24 bits of a Class C address are used for network Information
CSMA/CD
Classful Addressing
Alien Cross Talk
Presentation
16. A medium that carries 1 signal
baseband
Repeater
Amplitude
802.11b
17. Used by web browser and web servers to exchange files
point to multipoint
beacon frame
roaming
Hyper Text Transfer Protocol (HTTP)
18. Address Resolution Protocol
High-Level Data Link Control
demand priority
TIA
ARP
19. A TCP/IP utility that queries the DNS database and provides information about a host given its IP address or vice versa. Dig is similar to the nslookup utility - but provides more information - even in its simplest form - than nslookup can.
addressing
Cladding
router
dig (domain information groper)
20. MX
Mail Exchanger
Byte
ARP
DCE
21. F type (like TV cable) or BNC (crimped)
ssl
Digital
User Datagram Protocol
coax cable connector
22. Layer 1 Troubleshooting
Modulation
Intermediate Distribution Frame
social engineering
Faulty network cable
23. NFS
Terminator
Network File System
dedicated lines
CSMA/CD
24. Network device that makes high-level application connections on behalf of internal hosts and other machines
Data Link
proxy server
Point-to-Multipoint
BSS
25. String used to identify an access point - configure on your new access points to match the settings on existing access points
Internet Engineering Task Force (IETE)
analog signal
binary
SSID
26. Multiplexing based on priority
Ethernet
Broadcast
Network Switching
statistical multiplexing
27. A transmitter concentrates the signal energy at a single frequency or in a very small range of frequencies
narrowband
Application
t1 connection
Remote Desktop Protocol
28. Response generated atTransport layer confirming to sender that its frame was received; 3rd step in establishing a connection
1000base-t
ACK (acknowledgement)
Faulty network cable
port 21
29. BDC
IEEE (Institute of Electrical and Electronics Engineers)
Simple Network Management Protocol
Backup Domain Controller
reflection
30. Type of switching for multiple data packets make up the same transmission and use identical paths to reach the destination
Transport
message and circuit
Full-Duplex
the higher the frequency
31. A technique for transmitting data over a network by encapsulating it within another protocol.
NFS
kereberos
PING
tunneling
32. Contains information that a wireless node needs to associate with an ap
Attenuation
beacon frame
Common Internet File System
incremental backup
33. The more resistant to cross talk (STP)
protocol
Straight tip connector
the more twist
traceroute (tracert)
34. The capacity to send and receive signals at the same time on the same medium.
full duplex
modifying the file-sharing controls
twisted pair connector
ICMP
35. Point of division between a telecommunications service carrier's network and a building's internal network
Demarcation Point
MAC address
Byte
Network
36. Data terminal equipment - little independent data processing capability. ex. workstation
host
fragmentation
DTE
Ethernet
37. Data Link Layer
pathping
LLC
AM
NIC (Network Interface Card)
38. Transport protocol and TCP/IP port that uses telnet utility use
Byte
redirector
TCP port 23
fiber optic connector
39. What is an agreed set of rules that two parties agree on in order to communicate with each other commanly known as?
802.5
Institute of Electrical and Electronics Engineers (IEEE)
A Protocol
NetWare Directory Services
40. To make more efficient use of limited numbers of legitimate IP addressing
TCP/IP Vs. OSI: Network Access
IEEE
Star topology
subnetting purpose
41. QoS
Electrical Signaling
Quality of Service
Routing
Asynchronous Transfer Mode
42. Device that separates a medium into multiple channels and issues signals to each of those subchannels
Multiplexer
intrusion detection/prevention system (IDPS)
Electromagnetic Interference
Service Set Identifier
43. Which layer in the OSI is responsible for routing and controling the flow of packets around the network?
Network Layer
IMAP4 (Internet Message Access Protocol - version 4)
Phase
UDP
44. Layer 6
electromagnetic interference (EMI)
Extended Network Prefix
Fault tolerance
Presentation
45. An Application layer protocol used to retrieve messages from a mail server. When a client retrieves mail via POP - messages previously stored on the mail server are downloaded to the client's workstation - and then deleted from the mail server.
vampire tap
OSI Layer 3
POP (Post Office Protocol)
cross talk
46. The seventh layer of the OSI model. Application layer protocols enable software programs to negotiate formatting - procedural - security - synchronization - and other requirements with the network.
Session
PDU
Application Layer
CSMACD
47. Amplitude modulation-amplitude of signal is modified
firmware
AM
SCP
socket
48. Transmission that involves one transmitter and multiple - undefined receivers
Broadcast
Transport
Digital
VLAN
49. A network that links multiple LANs in a large city or metropolitan region.
Multiplexing
Metropolitan area network (MAN)
cp connection
ISOC
50. Accurate alarm events that do not pose significant threat to information security
private network
tracepath
Domain Name Service
noise