Test your basic knowledge |

IT: Networking Vocab

Subject : it-skills
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. The ability to send or receive signals on a medium - but not at the same time.






2. Provides th transfer medium (such as cable) - Translates data into a transmission signal appropriate to the transfer medium - Sends the signal along the transfer medium - Includes the pyical layout of the network - Monitors for transmission error - D






3. Each computer is connected to a central device






4. One transmitter issues signals to multiple receivers; receivers may be undefined or defined






5. The process of reconstructing segmented data






6. Wrapping one layer's PDU with protocol information so that it can be interpreted by a lower layer






7. Layer 4






8. Defines host IP in packet headers






9. LPR






10. Layer 1 Troubleshooting






11. A app. loaded on a server included with Windows OS that enables remote access






12. Virture privat network






13. Loop back address for IPv6






14. Wall-mounted panel of data receptors into which cross-connect patch cables from the punch-down block are inserted






15. Direct-sequence spread spectrum: signal bits are distributed over a frequency band






16. Routers work here






17. Assigning a unique frequency band to each communication






18. The combination of an IP address's network ID and subnet information. By interpreting the address's extended network prefix - a device can determine the subnet to which an address belongs.






19. A combination of techniques used to detect an intrusion and then to trace it back to its source






20. Network interface card






21. IEEE standard for wireless networking






22. An adapter board designed to connect a workstation - server - or other network device to a network medium.






23. Occurs when attacker attempts to gain entry or disrupt normal operations of information systems - almost always with intent to do harm






24. File Transfere Protocol






25. An error detection method that calculates a value for the total size of the information fields contained in a frame. The value is inserted near the end of a frame by the Data Link layer on the sending node - and checked by the Data Link layer on the






26. Method of error checking that determines if the contents of an arriving data unit match the contents of the data unit sent by the source






27. Allows clients to communicate in different floors






28. Type of interference caused by signals traveling on nearby wire pairs infringing on another pair's signal






29. Uses light to communicate a signal; the light is dispersed on numerous paths as it travels through the core and is reflected back. Provides high bandwidth at high speeds over medium distances up to about 3000 feet






30. RJ 11






31. A network design built by running cable from one PC of file server to the next - like links in a chain.






32. IS designed for the exchange of electronic mail between networked systems -such as between mail servers over a TCP/IP network






33. Individual insulated wire pairs - less expensive then STP - less resistant to noise






34. Layer 1 Troubleshooting






35. Response generated atTransport layer confirming to sender that its frame was received; 3rd step in establishing a connection






36. IKE






37. CNAME






38. Multiplexing technique use over single-mode or multimode fiber-optic cable in which each signal is assigned a different wavelength for its carrier wave; little space exists between carrier waves






39. Strength of digital signal






40. Running system for a while to track types of false positives it generates and then adjusting IDPS alarm classifications






41. WAN transmission technologies that contains a segment that relied on 10GBase-EW standard






42. Strategy in which all IDPS control functions are implemented and managed in a central location






43. Package for data that includes not only the data - or 'payload -' but also the sender's and recipient's addressing and control information. Generated at the Data Link layer and issued to the Physical layer






44. CHAP






45. Glass/plastic - light pulses high throughput - resistant to noise - most expensive cable






46. Time Division Multiple Access






47. FTP - file transfer- control






48. IGMP






49. Services that allow remote users to connect to the network






50. Application Layer