SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
IT: Networking Vocab
Start Test
Study First
Subject
:
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. IEEE standard for Ethernet devices and data handling
nslookup
802.3
message and circuit
intrusion correction
2. Strategy that combines the best of the other two strategies; while individual agents still analyze and respond to local threats - their reporting to a hierarchical central facility enables the organization to detect widespread attacks
digital signal
Unshielded twisted pair
802.11
partially distributed control strategy
3. User friendly web addresses are translated into IP addresses by the...
SLIP
Domain Name Service
Overhead
Secure Copy
4. NNTP
plenum cables
coaxial cable
ICANN (Internet Corporation for Assigned Names and Numbers)
Network News Transport Protocol
5. Refers to the IEEE 802.3z and IEEE 802.3ab standard for Ethernet communications speed up to 1 Gbps.
tracert
flow control
Gigabit Ethernet
site policy
6. Trivial file transfer protocol
TFTP
Amplitude Modulation
Application
back door
7. Which layer in the OSI is responsible for routing and controling the flow of packets around the network?
Transmission Protocol (TCP)
Modem
cabeloco
Network Layer
8. This layer in the OSI network model manages log on procedures and password recognition.
Session Layer
Core Gateway
logical address
multiple access
9. A computer that has its own CPU and may be used as a stand-alone computer for word processing - spreadsheet creation - or other software applications. It also may be used to access another computer such as another workstation or server via a network.
Workstation
802.3
TCP/IP Architecture Layer 2
TCP/IP
10. An organization composed of more than 100 representatives from industry and government who together determine standards for the electronics industry in addition to other fields - such as chemical and nuclear engineering.
ANSI (American National Standards Institute)
hub
backbone
centralized control strategy
11. Data circuit-terminating equipment. multiplexer or modem
STP
public network
FF02
DCE
12. Four twisted wire pairs with three twists per foot. This type can handle transmissions up to 16 MHz. Now limited to telecommunication equipment
Time Division Multiple Access (TDMA)
DSL
Category 3
GBIC
13. Rules and configuration guidelines governing implementation and operation of IDPSs within an organization
digital signal
DSL
site policy
Network
14. Data Link sublayer that manages flow control
LLC
tracepath
Repeaters
Point-to-Point
15. In TCP - a term used to describe a TCP header and its encapsulated data (also called an L4PDU). Also in TCP - the process of accepting a large chunk of data from the application layer and breaking it into smaller pieces that fit into TCP segments. In
fragmentation
hybrid fiber / coax (HFC) cable
Segment
Transport
16. Which protocol is responsible for splitting data into packets and adding a header to each one?
signature-based (knowledge-based - misuse-detection) IDPS
Transmission Control Protocol
Post Office Protocol 3 (POP3)
hub
17. The wave splits into secondary waves
Braiding
Transport Layer Security (TSL)
diffraction
10base-t
18. Simple Network Management Protocol
Internet Information Services
SNMP
::1
Telnet
19. Each node passively listens for then accepts data
passive topology
Domain Name System (DNS)
EMI
SNMP
20. Is a protocol designed for managing complex networks
Alternate Mark Inversion
Simple Network Management protocol (SNMP)
Internet Key Exchange
CRC (cyclic redundancy check)
21. IPv6 addressing - multicast group
OSI Layer 3
WAN
FF02
802.11g
22. Any device connected to a network - such as a microcomputer - mainframe - midrange computer - network equipment - or printer. Also called a station.
Node
intrusion detection/prevention system (IDPS)
Ethernet
WAN Connectivity
23. Signals composed ot pulses that can have a value of only 1 or 0
grade-index multimode fiber-optic cable
Kerberos
MPLS
Digital
24. Unlicensed band with 11 channels
PING
2.4-GHz band
carrier sense
back door
25. Requires CSU/DSU-the connection point for a t1 live at customers site
802.16
Frequency Division Multiple Access (FDMA)
t1 connection
switch
26. A fiber-optic data transport method capable of a 100-Mbps transfer rate using a dual ring topology; largely supplanted today by faster Ethernet method.
log file monitor (LFM) IDPS
fragmentation
Class C Network
Fiber Distributed Data Interface (FDDI)
27. As defined by the EIA/TIA-568 standard - cabling that connects workstations and servers in the work area.
twisted-pair cable
horizontal cabling
omnidirectional antenna
SMF
28. On a computer that receives data over a network - the process in which the device interprets the lower-layer headers and - when finished with each header - removes the header - revealing the next-higher-layer PDU.
Class C Network
Transport layer
physical layer device
Decapsulation
29. Layer 1 Troubleshooting
CIDR block
ASCII
File Transfer Protocol
Device power off
30. Device that connects network segments and directs data based on information in the data packet
Independent Computer Architecture
router
network class C
DSL
31. MIB
cabeloco
CRC (cyclic redundancy check)
Secure Sockets Layer (SSL)
Management Information Base
32. These reside on a computer or appliance connected to network segment and monitor network traffic
IEEE
shielded twisted-paired (STP) cable
network-based IDPS (NIDPS)
grade-index multimode fiber-optic cable
33. Data Link Layer
Transport
NIC (Network Interface Card)
LLC (Logical Link Control) sublayer
OSI Layer 2
34. A service used via the Application layer to recognize and access other layers
redirector
IGMP
TCP/UDP
Common Internet File System
35. Internet society
ISOC
network interface card (NIC)
ANSI (American National Standards Institute)
radio frequency interference (RFI)
36. Aversion of the traceroute utility found on some Linux distributions.
association
tracepath
port 53
RIP
37. Occurs when attacker attempts to gain entry or disrupt normal operations of information systems - almost always with intent to do harm
Electrical Signaling
intrusion
local area network (LAN)
logical link control (LLC)
38. Short reach. only multimode-max length is 500. baseband transmission. 1000 mpbs.
1000base-sx
ARP
802.11n
Simple Mail Transfer Protocol (SMTP)
39. Service that supports email
BGP
Amplitude
Transmission media
communications services
40. Which protocol allows users to recieve emails?
ISDN
POP3
Hypertext Transfer Protocol Secure (HTTPS)
SDU
41. LPD
CRC (cyclic redundancy check)
Line Printer Daemon
SMTP
frame
42. Session initiation protocol-performed on VoIP - determines location of endpoints - and establishes sessions between endpoints
SIP
alert or alarm
multiplexing
IPSec
43. Layer 3 Troubleshooting
AM
Data Link
IP address within the assigned network
Networking Model
44. All wires are reversed
SNMP
rollover cable
Class E Network
EIA (Electronics Industries Alliance)
45. An established guideline that specifies how networked data is formatted into a packet or frame - how it is transmitted - and how it is interpreted at the receiving end.
port 22
IGMP
Protocol
Port Numbers
46. An established guidline that specifies how networked data is formatted into packet or frame - how it is transmitted - and how it is interpreted at the receiving end.
protocol
User Datagram Protocol (UDP)
Baseband
Basic Rate Interface
47. FDM
Ethernet
phishing
Multiplexer
Frequency Division Multiplexing
48. A TCP/IP troubleshooting utility that provides information about NetBIOs names and their addresses. If you know the NetBIOs name of a workstation - you can use nbtstat to determine its IP address
flow control
FDM
nbtstat
Gateway Services for NetWare
49. What type of browser is designed for use on small handheld devices such as palmtop computers and iPhones?
Microbrowser
Challenge Handshake Authentication Protocol
MAC sublayer
token
50. A network that any user can access with no restrictions. the most familiar example of a public network is the Internet
link quality monitoring
active scanning
User Datagram Protocol
public network