SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
IT: Networking Vocab
Start Test
Study First
Subject
:
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Is an e mail retival protocol designed to enabel users to access their e-mail from various locations
TDM
Inter Message Access Protocol (IMAP)
Hyper text transfer protocol
RTT
2. Controls the transport of data between systems
SMTP
Transport
Open System Interconnection (OSI) referance model
carrier sense
3. A type of cabling that includes pairs of copper conductors - twisted around each other - inside a metal or foil shield. This type of medium can support faster speeds than unshielded wiring
Shielded Twised Pair
Firewall configured correctly
power budget
intrusion detection/prevention system (IDPS)
4. Algorithm used to verify the accuracy of data contained in a data frame
event viewer
service data unit (SDU)
802.11
CRC (cyclic redundancy check)
5. Layer 4 Troubleshooting
Broadband
Firewall configured correctly
NetWare Core Protocol
Star topology
6. Is used to allow searching and updating of a directory service
Light Weight Directory access protocol (LDAP
Device power off
EIA
fixing noise
7. A data-link protocol used for remote networking that can exchange IP addresses - carry data by multiple network layer protocols - and support different app. protocols.
network class a
Internet Key Exchange
PPP
Class E Network
8. RADIUS
false negative
Simple Network Management protocol (SNMP)
step-index multimode fiber-optic cable
Remote Authentication Dial-In User Service
9. Supplying electrical power through ethernet
power over ethernet
fractionalizing
LLC (Logical Link Control) sublayer
Zero Configuration
10. The process of validating a user.
Encapsulation
authentication
node
bridge
11. It enables the sending node to obtain the MAC address of the intended recipient before packets are sent.
Address Resolution Protocol (ARP)
star wired ring
Remote Desktop Protocol
TCP/IP Architecture Layer 3
12. Secures messages being transmitted on the internet - uses RSA for authentication and encyption.
POTS
Secure Sockets Layer (SSL)
PAT (Port Address Translation)
Network News Transport Protocol (NNTP)
13. A device that must be located at each end of a leased line.
CSU/DSU
Internet Group Multicast Protocol
network layer
lpr filename
14. The seventh layer of the OSI model. Application layer protocols enable software programs to negotiate formatting - procedural - security - synchronization - and other requirements with the network.
Application Layer
Trivial File Transfer Protocol (TFTP)
NetWare Core Protocol
switch
15. Ethernet communications at speeds up to 100 Mbps as defined under the IEEE 802.3u standard.
bridge
EAPoL
false attack stimulus
Fast Ethernet
16. Layer 3
Round Trip Time
Network Time Protocol (NTP)
Network
Data Link
17. Application layer protocol that formulates and interprets requests between Web clients and servers
HTTP (Hypertext Transfer Protocol)
binary
Network
Dynamic Host Configuration Protocol (DHCP)
18. The distinct units of data that are exchanged between nodes on a network
throughput
point to multipoint
data packets
Topology
19. Speed: 10 Mbps - Alternative Name: 10BASE-T - IEEE Standard: IEEE 802.3 - Cable Type: Copper - max length 100 meters
cat 5
Ethernet (characteristics)
Multistation Access Unit
wavelength
20. AH
bus topology
10base-t
Time Division Multiple Access (TDMA)
Authentication Header
21. IRC
Transport
whois
Media Dependent Interface Crossover
Internet Relay Chat
22. Form of transmission in which signals are modulated as radiofrequency analog pulses with different frequency ranges; does not involve binary coding
Domain Controller
Broadband
link dead phase
bandwidth
23. The transmission capacity of a communications medium - which is typically measured in bits per second (for data transmissions) or hertz (for data - voice - and video transmissions) - and which is determined by the maximum minus the minimum transmissi
NNTP
bandwidth
LLC
telephone connector
24. Hypertext Transfer Protocol
FTP
HTTP
mtr (my traceroute)
RFI
25. A connector that is used for thin coax cable and that has a boyonet-like shell.
bayonet nut connector (BNC)
DSL
network class a
Primary Rate Interface
26. A logical communication path established by the OSI Network layer for sending and receiving data.
SMTP
hybrid fiber / coax (HFC) cable
POP3
virtual circuit
27. QoS technique enables packet switches technologies to travel over traditionally circuit switched connections
DSL
Transport
Terminator
MPLS
28. The process of reconstructing segmented data
Frequency Division Multiplexing
Baseband
reassembly
DSSS
29. Is a method for automatically assigning address and other configuration parameters to network hosts.
TCP/IP Vs. Netware: Application
port 80
Dynamic Host Configuration protocol (DHCP)
DTE
30. Network cable that contains pairs of insulated wires that are twisted together and surrounded by a shielding material for added EMI and RFI protection - all inside a protective jacket.
shielded twisted-paired (STP) cable
wavelength
server
CRC (cyclic redundancy check)
31. A type of fiber optic connector. These connectors are square shaped and have release mechanisms to prevent the cable from accidentally being unplugged
terminators
Subscriber connector
Telnet
Carrier Sense Multiple Access / Collision Detection
32. Which protocol provides the user with many functions of the world wide web?
Hyper text transfer protocol
MultiMode Fiber
Correct subnet mask
Domain Controller
33. Authentication prtocol that does not issue a challenge or require 3rd party verification of the computer requestiing authentication
kereberos
message and circuit
BNC connector
Internet Protocol Security
34. Device that boosts - or strengthens - and analog signal
Dynamic Host Configuration Protocol (DHCP)
Amplifier
DHCP
255.255.0.0
35. Glass/plastic - light pulses high throughput - resistant to noise - most expensive cable
STP
electromagnetic interference (EMI)
BOOTP
fiber optic cable
36. Method of error checking that determines if the contents of an arriving data unit match the contents of the data unit sent by the source
checksum
Hypertext Transfer Protocol Secure (HTTPS)
media access control (MAC)
reflection
37. Cross talk that occurs between wire pairs near the source of a signal
SMF
Near End Cross Talk
isdn
Frame
38. Physical Layer
Frequency Division Multiplexing
Twister Pair Cable
Trivial File Transfer Protocol (TFTP)
Remote Access Service
39. More reliable then analog - noise doesn't affect as much - more efficient - fewer errors
segment
SMTP (Simple Mail transfer Protocol)
Hyper Text Transfer Protocol (HTTP)
digital adv
40. Several ethernet nodes can be connected and can monitor traffic or access media simultaneously
intrusion prevention system (IPS)
Berkeley Internet Name Domain
multiple access
ICS (Internet Connection Sharing)
41. A boundary between two zones of trust
perimeter
padded cell
ethernet
stateful firewall
42. QoS
Quality of Service
network class C
overhead
fault tolerance
43. In TCP - a term used to describe a TCP header and its encapsulated data (also called an L4PDU). Also in TCP - the process of accepting a large chunk of data from the application layer and breaking it into smaller pieces that fit into TCP segments. In
Segment
Transport
FTP
Organizational Unit
44. 12-character string that uniquely identifies a network node - hard coded into the NIC by the manufacturer; composed ot the block ID and device ID
MAC address
POP3 (Post Office Protocol - version 3)
802.3
carrier sense
45. IEEE standard for wireless networking
FTP
modifying the file-sharing controls
802.44
Physical Layer
46. CHAP
Challenge Handshake Authentication Protocol
Amplitude Modulation
hot site
Device power unplugged
47. Network Layer
IP Addressing
asymmetrical transmission
HTTP
evasion
48. NFS
bandwidth
radio frequency interference (RFI)
Network File System
LLC
49. Satellite used for broadband internet access
Physical
geosynchronous
WDM
Address Resolution Protocol (ARP)
50. Data Link Layer
Network Switching
NIC
NIC (Network Interface Card)
WAN Connectivity