SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
IT: Networking Vocab
Start Test
Study First
Subject
:
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A protocol data unit that has been transfered between OSI layers and then stripped of control information and transfere instructions.
Terminator
star wired bus
service data unit (SDU)
Application
2. The oldest type of network design with - this topology consist fo multiple nodes attached to a central hub - switch - or router.
star topology
ISDN
Half-Duplex
Shielded Twised Pair
3. Is part of theTCP/IP protcol suite and used to retrive e-mail from a remote server to a local client over a TCP/IP connection
Block ID
FCS (frame check sequence)
NetWare Directory Services
Post Office Protocol 3 (POP3)
4. The combination of an IP address's network ID and subnet information. By interpreting the address's extended network prefix - a device can determine the subnet to which an address belongs.
TCP/IP Network Access Layer Encapsulation
driver signing
Extended Network Prefix
presentation layer
5. CSU
Phase
ASCII
TDM
Channel Service Unit
6. Hackers sending emails to make it look like its legit and its actually dangerous to the workstation
single-mode fiber-optic cable
Network
phishing
coax cable connector
7. Multiplexing based on priority
Network interface card (NIC)
broadband
Domain Name System (DNS)
statistical multiplexing
8. Physical layer. 10 giga bit throughput. baseband transmission. twisted pair. max length is 100 meters. cat 6 or 7.
Cladding
virture privat network (VPN)
RFI
10Gbase-t
9. A app. loaded on a server included with Windows OS that enables remote access
Secure Sockets Layer (SSL)
star-wired ring topology
RTT
RAS
10. A data encryption technique employed between a server and a client - such as between a client's browser and an Internet server.
rollover cable
802.3
Secure Sockets Layer (SSL)
Extended Network Prefix
11. A network that any user can access with no restrictions. the most familiar example of a public network is the Internet
metropolitan area network (MAN)
medium
public network
TFTP
12. Works closely with IP in providing error and control information - by allowing hosts to exchange packet status information to help move the packets along the internetwork
Service Set Identifier
Localhost
Internet Control Message Protocol (ICMP
hot site
13. CSMA / CD
Ferrule
IGMP
Application
Carrier Sense Multiple Access / Collision Detection
14. Glass/plastic - light pulses high throughput - resistant to noise - most expensive cable
mtr (my traceroute)
Internetwork Packet Exchange
fiber optic cable
Repeater
15. Telecommunications industry association
multimeter
TIA
PDU (protocol data unit)
International Organization for Standardization (ISO)
16. Small Form Plug-gables - Plugs in to an interface on a switch
RARP
Media Dependent Interface Crossover
packet
SFP
17. A cable that consists of a single cable sheath containing a combination of fibers and copper cable.
hybrid fiber / coax (HFC) cable
FHSS
Ethernet
NNTP
18. Virture privat network
network class a
Presentation Layer
VPN
MAC address
19. Data changed since the previous fill or incremental backup
link dead phase
incremental backup
HTTP
Crossover Cable
20. Doesn't use frame headers - uses cells
POP3 (Post Office Protocol - version 3)
10BASE2 Limit
Node
ATM
21. A connecting device for a network that accepts messages and forwards them to the correct section of the network. Generally more intelligent than a hub and a switch.
router
alarm clustering and compaction
Dynamic Host Configuration Protocol (DHCP)
Port Numbers
22. An International organization of scientists - engineers - technicians - and educators that play a leading role in developing standards for network cabling and data transmissions.
headened
Institute of Electrical and Electronics Engineers (IEEE)
frequency
Mac Addressing
23. User watching an episode of TV show over the internet is what kind of communication
Improperly configured switch
LAN
point to multipoint
Plenum
24. Routing protocol most likely used to replace a router for that handles traffic to and from the companies connection to its NSP
BGP
Lightweight Directory Access Protocol
multimeter
Fiber Distributed Data Interface (FDDI)
25. International Organization for Standardization
Port 20
ISO
Loose network cable connection
phishing
26. Data only
goodput
impedance
Baseband
Point-to-Point Protocol
27. A type of cable used in network wiring and is usually shielded - which means that it is more immune to interference then unshielded cables
10Gbase-t
router
OSI Layer 2
Coaxial Cable
28. Also called the star-wired bus topology - a network design that combines the logial comunications of a bus with the physical layout of a star.
star-bus hybrid topology
network access method
fading
segmentation
29. Medium network 128-191
logical link control (LLC)
OSI Layer 1
Class B Network
CD-ROM File System
30. Ppp tunneling protocol
Quality of Service
Physical
diffraction
ppptp
31. Pulses of precise - positive voltages and zero voltages (binary)
1000base-lx
digital signal
IANA
Transport
32. Representatives from electronics manufacturers across the US that sets standards for electronic equipment and lobbies for legislation favorable to the growth of the computer and electronics industries
Channel Service Unit
Entrance Facilities
IGMP
EIA (Electronics Industries Alliance)
33. Delay between the transmission of a signal and its receipt
RIP
backbone
Latency
connectionless
34. Measure of the difference between the highest and lowest frequencies that a medium can transmit
Group Policy Object
MMF
Transport
Bandwidth
35. An international organization of scientists - engineers - technicians - and educators that plays a leading role in developing standards for network cabling and data transmissions.
Local area network (LAN)
ring topology
Institute of Electrical and Electronics Engineers (IEEE)
Bit-Error Rate Test
36. Wall-mounted panel of data receptors into which cross-connect patch cables from the punch-down block are inserted
Patch Panel
message and circuit
Electromagnetic Interference
Network News Transport Protocol (NNTP)
37. Internet Engineering Task Force
Domain Controller
IETE
phase
firewall
38. Layer 2
radiation pattern
Transmission Control Protocol
TCP/IP
Data Link
39. Which layer is responsible for putting data into frames as well as providing error checking data?
Data Link Layer
butt set
RADIUS
rj-11
40. Is a protocol designed for managing complex networks
MTU (maximum transmission unit)
the higher the frequency
Simple Network Management protocol (SNMP)
coax cable connector
41. Algorithm used to verify the accuracy of data contained in a data frame
CRC (cyclic redundancy check)
ppptp
Point-to-Point Protocol over Ethernet
Physical
42. Divides channel into different time slots and assigns data to nodes who are attached to time slots
IP Address
FDMA
TDM
VPN
43. Area above the ceiling tile or below the subfloor in a building
entrance facilities
network interface card (NIC)
fragmentation
Plenum
44. A fiber-optic data transport method capable of a 100-Mbps transfer rate using a dual ring topology; largely supplanted today by faster Ethernet method.
Fiber Distributed Data Interface (FDDI)
RIR (Regional Internet Registry)
power over ethernet
star wired bus
45. QoS technique enables packet switches technologies to travel over traditionally circuit switched connections
Session Layer (Layer 5)
PING
ITU
MPLS
46. A type of point-to-point digital WAN connection that uses standard phone lines to provide high-speed comm.
10BASE2 Limit
SFP
DSL
CRC (cyclic redundancy check)
47. A combination of techniques used to detect an intrusion and then to trace it back to its source
STP
collision
ESS
trap and trace
48. CDFS
CD-ROM File System
Data Link
Packet
Gigabit Ethernet
49. Connection for data exchange between two parties
back door
session
Internet Information Services
satellite
50. Port used during a domain name lookup
port 53
TFTP
Device power unplugged
Fault tolerance