SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
IT: Networking Vocab
Start Test
Study First
Subject
:
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Carrier sense multiple access w collision detection (network access method) ethernet
CSMA/CD
carrier sense
workstation
spread-spectrum
2. The wave splits into secondary waves
Network layer
telephone connector
diffraction
Network File System (NFS)
3. NTP - network time protocol
port 123
Data Link layer
Hubs
ppptp
4. Allows clients to communicate in different floors
switch
S-HTTP
MMF
whois
5. Hubs and switches work here
SSH
Data Link
ppp
evasion
6. A TCP/IP utility that queries the DNS database and provides information about a host given its IP address or vice versa. Dig is similar to the nslookup utility - but provides more information - even in its simplest form - than nslookup can.
Data Link
Computer network
dig (domain information groper)
802.3
7. A private computer network with resources accessible only to internal members.
Transport
horizontal cabling
baseband
intranet
8. Supplying electrical power through ethernet
A Protocol
fixing attenuation
Network News Transport Protocol
power over ethernet
9. IMAP - internet message access protocol
shielded twisted-paired (STP) cable
port 143
BGP
peer-to-peer network
10. A type of cable used in network wiring and is usually shielded - which means that it is more immune to interference then unshielded cables
Coaxial Cable
switch
roaming
segmentation
11. ATM
Ethernet
Networking Model
SSH
Asynchronous Transfer Mode
12. The placement of data from a higher-layer protocol behind the header (and in some cases - between a header and trailer) of the next-lower-layer protocol. For example - an IP packet could be encapsulated in an Ethernet header and trailer before being
social engineering
15 hops
Encapsulation
reassembly
13. Dynamic host configuration protocol
High-Level Data Link Control
HTTP (Hypertext Transfer Protocol)
CIDR (Classless Interdomain Routing)
DHCP
14. A network design consisting of a continuous path for data with no logical beginning or ending point - and thus no terminators.
BOOTP
AUI
Trivial File Transfer Protocol (TFTP)
ring topology
15. Knows which VLAN a stream of data belongs to by reading a tad added to each frames header
switch
whois
Trivial File Transfer Protocol (TFTP)
internetwork
16. Controls how applications access network
Application
UTP
protocol
amplitude
17. Layer 3 Troubleshooting
netstat
LAN
port 69
Correct default gateway
18. Internet corporation for assigned names and numbers
Domain Name
Internet Engineering Task Force (IETE)
ICAN
VLAN
19. Device that boosts - or strengthens - and analog signal
connectivity device
Amplifier
LLC
Secure Sockets Layer (SSL)
20. Standard rating that indicates the diameter of a wire
Amplitude Modulation
American Wire Gauge
Coaxial Cable
DNS
21. Initiates the communication link - Makes sure the communication link is maintained - Determines which node transmits at any point in time - such as which one transmits first - Disconnectd when a communication session is over - Translates node address
Session Layer (Layer 5)
ppp
Presentation
TCP/IP Transport Layer Encapsulation
22. ADSL
Asymmetric Digital Subscriber Line
Common Internet File System
port 123
POP (Post Office Protocol)
23. Ensures reliablity of packet transmissions from node to node - Ensures that data is sent and received in the same order - Provides acknowledgement when a packet is received - Monitors for packet transmission errors and resends bad packets - Breaks la
alert or alarm
Transport Layer (Layer 4)
ITU (International Telecommunication Union)
broadcast storm
24. Strength of digital signal
10BASE5 Limit
voltage
Mail Exchanger
BSS
25. The scheme for assigning a unique identifying number to every node on a network
ring topology
Dense Wavelength Division Multiplexing
MAC address
addressing
26. Fiber Distributed Data Interface
TIA (Telecommications Industry Association)
connectivity device
FDDI
Frequency Modulation
27. HTTPS - Secure implementation of HTTP
port 443
baseband
802.5
Institute of Electrical and Electronics Engineers (IEEE)
28. An International organization of scientists - engineers - technicians - and educators that play a leading role in developing standards for network cabling and data transmissions.
demilitarized zone
IANA
Logical Link Control
Institute of Electrical and Electronics Engineers (IEEE)
29. Network File System
physical media
NFS
route
RFI
30. International Organization for Standardization
goodput
site policy
ISO
5-4-3 rule
31. Assigning a placeholder to each piece of a block of data to allow the receiving node's Transport layer to reassemble the data in the correct order
Internet Group Multicast Protocol
Network Address Translation
sequencing
collision
32. VPN
Frequency Division Multiplexing
Virtual Private Network
DNS
stateless firewall
33. A transmitter concentrates the signal energy at a single frequency or in a very small range of frequencies
Amplitude Modulation
narrowband
SYN (syncronization)
Independent Computer Architecture
34. The actual data - any communication that encodes a message
Electromagnetic Interference
modem
signal
metropolitan area network (MAN)
35. A TCP/IP troubleshooting utility that provides information about NetBIOs names and their addresses. If you know the NetBIOs name of a workstation - you can use nbtstat to determine its IP address
WAN
lpr filename
nbtstat
PAP
36. The sender transmits the data to the destination without establishment of a connection.
Category 5e
100base-tx
connectionless
RealVNC
37. Saturation of network bandwidth caused by excessive traffic - as when a large number of computers or devices attemp to transmit simultaneously - or when computers or devices presist in transmitting repeatedly.
broadcast storm
network class B
EIA
Computer network
38. A protocol that runs in the Dession and Transport layers of the OSI model and associates NetBIOS names with workstations. NetBIOS alone is not routable because it does not contain Network Layer information. However - when encapsulated in another prot
narrowband
Microbrowser
NetBIOs
fault tolerance
39. LC - ST - SC - or MT RJ
fiber optic connector
ESS
metropolitan area network (MAN)
LLC (Logical Link Control) sublayer
40. Gigabit Interface Converter - Plugs in to an interface on a switch
GBIC
telephone connector
EMI
mesh topology
41. A common way of sharing resources on a peer-to-peer network
Ethernet (characteristics)
Full Duplex NIC Communication
DSL
modifying the file-sharing controls
42. Trivial File Transfer Protocol
Ferrule
DSL
Data Link
TFTP
43. NLM
intranet
NetWare Loadable Module
access point
OSI
44. Service that supports email
communications services
Braiding
lpr filename
alert or alarm
45. A standard method or format for communication between networked devices
switch
2.4-GHz band
centralized control strategy
protocol
46. Area above the ceiling tile or below the subfloor in a building
spread-spectrum
reassembly
TCP/IP Vs. OSI: Application
Plenum
47. Standards organizations representing 157 countries headquartered in Geneva. Goal is to establish international standards to facilitate global exchange of information and barrier-free trade
NFS
ISO (International Organization for Standardization)
physical media
Peer-to-peer network
48. Panel of data receptors into which twisted pair wire is inserted to complete a circuit
Punch-Down Block
Mesh topology
packet
Network
49. Similar to FTP. lets you transfer files between a host and an FTP server
Trivial File Transfer Protocol (TFTP)
beacon frame
scattering
POP3
50. Hackers sending emails to make it look like its legit and its actually dangerous to the workstation
CRC (cyclic redundancy check)
OSI Reference to TCP
phishing
Shielded Twised Pair