SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
IT: Networking Vocab
Start Test
Study First
Subject
:
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Large diameter. led/light is generated at different angles. high throughput - high noise resistance - excellent security - and long distances
EIA/TIA
MMF
Session layer
ASCII
2. UDP
ITU
User Datagram Protocol
802.3
Domain Name System (DNS)
3. Is usde to communicate time synchronization information between systemson a network
message and circuit
stateful protocol analysis (SPA) IDPS
Network Time Protocol (NTP)
Port 20
4. Four twisted wire pairs rated for 100 Mhz.
signal
Category 5
overhead
TCP/IP Architecture Layer 4
5. (metropolitan area network) used with a handful of buildings and larger then a LAN - connects two or more Lans
NetWare Core Protocol
MAN
protocol stack verification
Internet
6. The IEEE stanard for error and flow control in data frames.
block ID
802.2
Analog
flow control
7. The organized research of the Internet addresses owned or controlled by a target organization.
collision detection
footprinting
point to multipoint
datagram
8. NLM
NetWare Loadable Module
Network
Access Control List
authentication
9. A flexible communications cable that contains pairs of insulated copper wires that are twisted together for reduction of EMI and RFI and covered with an outer insulating jacket.
soft skills
cat 5
FHSS
twisted-pair cable
10. Core TCP/IP protocol that operates in the Network layer and provided information about how and where data should be delivered; subprotocol that enables TCP/IP to inernetwork
Encapsulation
Amplitude Modulation
multiple access
IP (Internet Protocol)
11. Set of routines that make up part of a software application
API (application program interface)
SSL
sequencing
cat 5
12. Similar to FTP. lets you transfer files between a host and an FTP server
TDMA
link quality monitoring
Trivial File Transfer Protocol (TFTP)
SIP
13. The fact that wireless signals follow a number of paths to their destination
Faulty network cable
Class B Network
installing cable
multipath
14. Teflon-coated cable that is used in plenum area because it does not emit a toxic vapor when burned
Light Weight Directory access protocol (LDAP
plenum cables
Round Trip Time
Twister Pair Cable
15. Works closely with IP in providing error and control information - by allowing hosts to exchange packet status information to help move the packets along the internetwork
Adjacent Layer Interaction
checksum
1000base-lx
Internet Control Message Protocol (ICMP
16. Process of grouping almost identical alarms occurring at almost same time into single higher-level alarm
Transport Layer Security (TSL)
Telnet
Kroner
alarm clustering and compaction
17. Transport Layer
RS-232
OSI Layer 4
Connectors
SSID
18. Distinct communication path between two or more nodes; may be separated logically or physically
Channel
MultiMode Fiber
terminators
packet filtering - application proxy
19. Which protocol allows users to send emails?
SMTP
footprinting
Correct subnet mask
EMI
20. Interference that may be generated by broadcast signals from radio or TV towers
802.11
Radio Frequency Interference
peer-to-peer network
Physical
21. The pattern used to install a network medium
Physical
topology
Management Information Base
ANSI
22. Nondata info that must accompany data for it to be properly routed. addition to data
RealVNC
phase
inline sensor
overhead
23. A protocol data unit that has been transfered between OSI layers and then stripped of control information and transfere instructions.
Physical
MMF
service data unit (SDU)
rollover cable
24. A type of point-to-point digital WAN connection that uses standard phone lines to provide high-speed comm.
flow control
DSL
ASCII
802.3af
25. The act of hacking into a hacker's system to find out as much as possible about the hacker
back hack
OSI Layer 2
encryption
Remote Terminal Emulation (Telnet)
26. Aka main cross-connect - first point of interconnection between an organization's LAN or WAN and a service provider's facility
MAN
Main Distribution Frame
packet
reassembly
27. The ability to send or receive signals on a medium - but not at the same time.
half duplex
router
IP address within the assigned network
Internet Engineering Task Force (IETE)
28. Amplitude modulation-amplitude of signal is modified
PSTN
AM
hub
Internet Protocol Security
29. The number of times a signal's amplitude changes over a fixed period of time - expressed in cycles per second - Hz
butt set
Alien Cross Talk
10Base-T
Frequency
30. Network layer device
router
Category 1
false negative
RIP
31. Device with little - if any - of it's own processing or disk capacity; depends on a host to supply it with applications and data-processing services
IMAP4 (Internet Message Access Protocol - version 4)
DB-25 connector
terminal
star wired ring
32. The process of attracting attention to a system by placing tantalizing information in key locations.
enticement
fading
Cable Plant
bus topology
33. The NIC and network equipment are set up so that they have the capacity to send and receive simultaneously. which is possible because od buffering at the NIC.
Full Duplex NIC Communication
phase
Point-to-Point
Amplitude Modulation
34. A combination of techniques used to detect an intrusion and then to trace it back to its source
OSI Layer 5
trap and trace
SLIP
entrance facilities
35. A TCP/IP troubleshooting utility that uses ICMP to trace the path from one networked node to another - identifying all intermediate hops between the two nodes. Traceroute is useful for determining router or subnet connectivity problems. On Windows-ba
Subnetmask
To stop the Hamburgerler from stealing all of Ronnie McDonalds burgers
traceroute (tracert)
directional antennas
36. MDI
Media Dependent Interface
intrusion correction
Organizational Unit
NTP
37. IANA
OSI Layer 2
TCP/IP Vs. Netware: Transport & Internet
Internet Assigned Numbers Authority
TCP/IP Transport Layer Encapsulation
38. The physical layout of a computer network
virtual circuit
communications services
topology
Management Information Base
39. The IEEE standard for Ethernet networking devices and data handling (using the CSMA/CD access method)
WAN
Faulty network cable
802.3
MTU (maximum transmission unit)
40. Which layer in the OSI is responsible for routing and controling the flow of packets around the network?
Fast Ethernet
Hyper Text Transfer Protocol (HTTP)
Thin Eterhnet/10 Base 2
Network Layer
41. A technique for connecting to a network at a remote location using Internet as the medium.
VPN
Point-to-Point Tunneling Protocol
Presentation
MAC
42. Ppp over ethernet
link dead phase
ICS host
cat 5
pppoe
43. A type of address translation in which each private IP address is correlated with its own Internet-recognized IP address.
Application Layer
the more twist
Localhost
SNAT (Static Network Address Translation)
44. Source emits a RTS (request to send) signal to the access point - and the access point replies with CTS (clear to send) for the source to begin its transmission
site policy awareness
RTS/CTS
MMF
1550bytes
45. Service that supports email
MMF
enterprise network
communications services
POP (Post Office Protocol)
46. This phase determines how often systems should send each other quality statistics.
802.11n
Internet Control Message Protocol
hybrid fiber / coax (HFC) cable
link quality monitoring
47. Network news transfer protocol
NNTP
Frequency Division Multiple Access (FDMA)
Remote Access Service
EAPoL
48. IPv6 addressing - multicast group
LLC
voltage
802.3
FF02
49. Hub/repeaters
Session Layer
Conduit
physical layer device
f type connector
50. Is associated with unix/linux networks
Secure Copy
CIDR (Classless Interdomain Routing)
802.16
Attenuation