SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
IT: Networking Vocab
Start Test
Study First
Subject
:
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Pointing in a direction
ANSI
MultiStation Access Unit
POP3 (Post Office Protocol - version 3)
directional antennas
2. Firewall packet inspection that examines the data contained in a packet as well as the state of the connection between internal and external computers.
Synchronous Optical Network
protocol data unit (PDU)
Encrypting File System
stateful firewall
3. Brief delay in processing - length of cable can contribute to this
protocol and services
Thin Eterhnet/10 Base 2
latency
POP3
4. A type of transmission in which there are several transmission channels on a communications medium - allowing more than one node to transmit at the same time.
Access Control List
protocol stack verification
Data Circuit-Terminating Equipment
broadband
5. Is a challenge respone authentication protocol
Data Link
Secure File Transfer Protocol
Half Duplex NIC Communication
CHAP
6. Fiber-optic cable used on a network backbone for high-speed communications - such as between floors of a building.
communications media
fat pipe
IP Address
latency
7. Transport Layer
Backbone
Line Printer Remote
TCP/IP Architecture Layer 3
Server
8. Is used to allow searching and updating of a directory service
public network
ATM
WAN Connectivity
Light Weight Directory access protocol (LDAP
9. Electronics industries Alliance
Asymmetric Digital Subscriber Line
twisted pair connector
PSTN
EIA
10. On a computer that receives data over a network - the process in which the device interprets the lower-layer headers and - when finished with each header - removes the header - revealing the next-higher-layer PDU.
Class E Network
OSI model
Decapsulation
hub
11. The transmission capacity of a communications medium - which is typically measured in bits per second (for data transmissions) or hertz (for data - voice - and video transmissions) - and which is determined by the maximum minus the minimum transmissi
A Protocol
the more twist
tunneling
bandwidth
12. Data terminal equipment - little independent data processing capability. ex. workstation
WAN
WAN
voltage
DTE
13. Theoretical. difference b/w highest and lowest frequency.
255.255.0.0
connection
network
bandwidth
14. Twist wire so you don't get interference on the memory
fixing cross talk
802.2
Attenuation
binary
15. Physical layer. 10 giga bit throughput. baseband transmission. twisted pair. max length is 100 meters. cat 6 or 7.
10Gbase-t
TFTP
digital
Hypertext Transfer Protocol Secure (HTTPS)
16. Unique identifying number for a network node; follows a hierarchical addressing scheme; can be assigned through OS software; added to data packets and interpreted by protocols at the Network layer
passive scanning
network address
Noise
flow control
17. Physical Layer
stateless firewall
telnet
cp connection
OSI Layer 1
18. LPR
802.11n
Bit
Line Printer Remote
DB-9 connector
19. MAC address
physical address
subnetting purpose
fading
network class C
20. Most common cabling used in networking. Usually connects nodes to the main network.
Application
MAC sublayer
ethernet
intrusion detection system (IDS)
21. A cable TV company - such as Comcast Broadband.
access services
alarm clustering and compaction
transceiver
cabeloco
22. 7th layer; protocols enable software programs to negotiate formatting - procedural - security - synchronization - and other requirements with the network
Routing
Internet Protocol
Application layer
the more twist
23. LC
Bits
IANA
TCP/IP
Local Connector
24. Prevents broadcast storms by enabling switches to calculate paths that avoid potential loops and artificially block the links that would complete a loop
STP
CSMA/CD
broadcast frame or broadcast packet
MTU (maximum transmission unit)
25. Voltage is varied and imprecise - more susceptible
analog dis
authentication
Data Circuit-Terminating Equipment
File Transfer Protocol
26. Several ethernet nodes can be connected and can monitor traffic or access media simultaneously
Transmission media
multiple access
driver
Zero Configuration
27. Sequences packets in correct order
addressing
directional antennas
Transport
crossover cable
28. (metropolitan area network) used with a handful of buildings and larger then a LAN - connects two or more Lans
MIME (Multipurpose Internet Mail Extensions)
Optical Loss
Data Link
MAN
29. A group of two or more computer systems linked together.
entrapment
bandwidth
network
Gateway Services for NetWare
30. The medium that carries multiple signals simultaneously
broadband
Institute of Electrical and Electronics Engineers
802.11
Universal serial bus
31. OSPF
Open Shortest Path First
media
TCP/UDP
Secure Copy
32. Round time trip. time it takes for packet to get from sender to receiver and back
full mesh
ring topology
Class E Network
RTT
33. Signals composed ot pulses that can have a value of only 1 or 0
POTS
Hubs
network
Digital
34. Provides strung security for HTTP- transpored information - but it is only used by some vendor's application
Secure Hypertext Transfer Protocol (S-HTTP)
false positive
metropolitan area network (MAN)
where NICs operate
35. Attacker who utilizes tactics designed to trip the organization's IDPS - essentially causing the organization to conduct its own DoS attack - but overreacting to an actual - but insignificant - attack.
Active Directory
Data Link (Layer 2)
IDPS terrorist
802.3
36. Name Of Layer 3
ICS (Internet Connection Sharing)
Network
NIC
Carrier Sense Multiple Access with Collision Detection (CSMACD)
37. NNTP
802.2
station
Network News Transport Protocol
Frame
38. Activities finalize restoration of operations to a normal state and seek to identify source and method of intrusion to ensure same type of attack cannot occur again
host
Latency
intrusion correction
Challenge Handshake Authentication Protocol
39. Indication a system has just been attacked or is under attack
alert or alarm
High-Level Data Link Control
twisted-pair cable
cable plant
40. Not individually insulated but shielded. use when there is noise.
STP
802.2
Modulation
Ring topology
41. Stop signals after they have reached the end of the wire
Class A
terminators
IPSec
step-index multimode fiber-optic cable
42. A technique in which IP address used on a private network are assigned a public IP address by a gateway when accessing a public network.
ACK (acknowledgement)
slip
NAT (Network Address Translation)
inline sensor
43. Layer 6
bus topology
802.11a
Core
Presentation
44. Narrow core - light travels in one path - longest distance - more expensive then MMF
encapsulation
100base-tx
SMF
trap and trace
45. Hardware address of the network interface card
bandwidth
pathping
MAC
PSTN
46. Type of sensor deployed in such a way that the network traffic it is monitoring must pass through it.
PING
128 - 64 - 32 - 16 - 8 - 4 - 2 - 1
Frequency Modulation
inline sensor
47. Degradation of a light signal on a fiber-optic network
headened
Attenuation
Optical Loss
To stop the Hamburgerler from stealing all of Ronnie McDonalds burgers
48. Services that allow remote users to connect to the network
frame
access services
Line Printer Remote
ethernet
49. IEEE 802.3 Media Access Control (MAC) sublayer of the data link layer
802.3
ISOC (Internet Society)
thin client computing
EAP
50. FDDI
(fiddy) Fiber Distributed Data Interface
10base-t
Straight tip connector
Dynamic Host Configuration Protocol (DHCP)