Test your basic knowledge |

IT: Networking Vocab

Subject : it-skills
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. AMI






2. Distinct communication path between two or more nodes; may be separated logically or physically






3. Enables network managers to continuously monitor network activity






4. SNMP






5. 5 segments b/w two nodes - 4 repeating devices - and 3 segments connected by two repeating devices






6. Failure of an IDPS to react to an actual attack event






7. Used on many UNIX/LINUX systems to provide authentication security for TCP/IP applications such as Telnet and FTP






8. Radio frequency interference






9. The cableing or radio waves used to connect one network computer to another - or one network to another - and transport data between them.






10. Set of protocols that specify how wireless networks works. Most common are currently B and G. N is an emerging standard.






11. Is a host-to-host protocol like TCP - however it does not include mechanisms for ensuring timely delivery






12. Produces guidelines for how network cable should be installed in commercial buildings






13. Moving from one BSS to another without losing connectivity






14. Data only






15. LPR






16. Trivial file transfer protocol






17. Activities finalize restoration of operations to a normal state and seek to identify source and method of intrusion to ensure same type of attack cannot occur again






18. The most popular type of network for medium- and large-scale organizations






19. Authentication prtocol that does not issue a challenge or require 3rd party verification of the computer requestiing authentication






20. Small network 192-223






21. A specially configured connection on a network device that is capable of viewing all the traffic that moves through the entire device.






22. Method of gauging the appropriate rate of data transmission based on how fast he recipient can accept data






23. Is a system that is distributed throughout the internetwork to provide address/name resolution.






24. An adapter board designed to connect a workstation - server - or other network device to a network medium.






25. Time division multiplexing






26. Unix command at shell prompt to send a file to printer






27. A device that converts an analog to digital signal and vice versa






28. Short tube within a fiber-optic cable connector that encircles the fiber strand and keeps in properly aligned






29. Internet assigned numbers authority






30. Basic service set: a group of stations that share an access point






31. Transport Layer






32. Intelligently direct data between networks based on addressing - patterns of usage - and availability of network segments






33. Protocol data unit. An OSI term to refer generically to a grouping of information by a particular layer of the OSI model. More specifically - an LxPDU would imply the data and headers as defined by Layer x.






34. Also called the star-ring hybrid - topology - a network design in which the logic communication are in a ring - but the phyical layout of the network star.






35. A process that ensures one device does not send information faster than it can be received by another device.






36. Physical layer. 1 gpbs throughput. baseband transmission. max length is 100 meters. cat 5e or higher utp. twisted pair.






37. Multiplexing technique use over single-mode or multimode fiber-optic cable in which each signal is assigned a different wavelength for its carrier wave; little space exists between carrier waves






38. Networking technology developed at Xerox in the 70s and improved by Digital Equipment Corp - Inel - and Xerox. Most common form of network transmission - follows IEEE 802.3 standard






39. Application layer protocol that formulates and interprets requests between Web clients and servers






40. The process in which an attacker obtains confidential information by contacting employees and deceiving them into giving up passwords - IP addresses - server names - and so on.






41. Different upload/download speeds.






42. Port used during a domain name lookup






43. A service on a node






44. What does POP3 stand for?






45. Reverse address resolution protocol






46. Where demarc is located if an organization follows structured cabling standards






47. GSNW






48. Reflection in multiple different directions of a signal






49. Round time trip. time it takes for packet to get from sender to receiver and back






50. An IP addressing convention that adheres to network class distinctions - in which the first 8 bits of a Class A address - the first 16 bits of a Class B address - and the first 24 bits of a Class C address are used for network Information