SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
IT: Networking Vocab
Start Test
Study First
Subject
:
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. QoS technique enables packet switches technologies to travel over traditionally circuit switched connections
Gigabit Ethernet (non-fiber characteristics)
MPLS
Gigabit Interface Converter
Simple Mail Transfer Protocol (SMTP)
2. Teflon-coated cable that is used in plenum area because it does not emit a toxic vapor when burned
PDU
bus topology
Secure Copy
plenum cables
3. Radio frequency interference. interference caused by radio.
Application
RFI
Demultiplexer
router
4. Hardware device located at the ISP side of ADSL connections.
broadband
Remote Authentication Dial-In User Service
switch
DSLAM
5. A service used via the Application layer to recognize and access other layers
redirector
IEEE
alarm clustering and compaction
Bus topology
6. An adapter board designed to connect a workstation - server - or other network device to a network medium.
Layer 2 Tunneling Protocol
Asynchronous Transfer Mode
Transmission Protocol (TCP)
network interface card (NIC)
7. Networking technology developed by IBM in the 80s; relies upon direct links between nodes and ring topology - using tokens to allow nodes to transmit data
Repeater
token ring
Berkeley Internet Name Domain
alert or alarm
8. Method of gauging the appropriate rate of data transmission based on how fast he recipient can accept data
flow control
Post Office Protocol 3 (POP3)
isdn
Domain Controller
9. Connection-less
udp
Half-Duplex
workstation
Secure Shell (SSH)
10. Application Layer
PSTN
BGP
DNAT (Dynamic Network Address Translation)
SMTP
11. AMI
Alternate Mark Inversion
RARP
Institute of Electrical and Electronics Engineers (IEEE)
passive scanning
12. RAS
Post Office Protocol 3 (POP3)
baseband
ITU (International Telecommunication Union)
Remote Access Service
13. Electromagnetic interference
Structure
Domain Name
EMI
Domain Name System (DNS)
14. Station transmits a probe that is then replied by the access point
Common Internet File System
modem
active scanning
Category 3
15. A technique for connecting to a network at a remote location using Internet as the medium.
Single mode fiber
VPN
NNTP
protocol
16. Used with single mode or multi mode fiber optic cable
standard connector
port 80
Integrated Services Digital Network
utp
17. Modulation technique in which the amplitude of the carrier signal is modified by the application of a data signal
Frame
PPP
modem
Amplitude Modulation
18. Works closely with IP in providing error and control information - by allowing hosts to exchange packet status information to help move the packets along the internetwork
false negative
Ring topology
Internet Control Message Protocol (ICMP
Port 20
19. L2TP
Core
OSI Layer 5
Wide area network (WAN
Layer 2 Tunneling Protocol
20. Indication a system has just been attacked or is under attack
Incorrect cable type
MAU
SSL
alert or alarm
21. Similar to FTP. lets you transfer files between a host and an FTP server
Trivial File Transfer Protocol (TFTP)
User Datagram Protocol
User Datagram Protocol (UDP)
Network Layer
22. A permanent telephone connection between 2 locations that provide a predetermined amount of bandwidth at all times
Peer-to-peer network
Open Shortest Path First
802.3
leased line
23. Experimentation 240-255
MAN
Class E Network
ITU
network access method
24. ICA
bandwidth
Network Layer (Layer 3)
beacon frame
Independent Computer Architecture
25. Traces path from one network node to another - identifying all intermediate hops b/w two nodes
tracert
backbone
baseband
communications services
26. A network transport control method used in Ethernet networks. It regulates transmission by sensing the presence of packet collisions.
false negative
Session
Carrier Sense Multiple Access with Collision Detection (CSMACD)
SNAT (Static Network Address Translation)
27. Extent to which a signal has weakened after traveling a given distance
Protocol Data Unit
MAC address
Attenuation
WAN
28. Communications for continuous burst of data controlled by a clock signal that starts each burst.
honey net
token
Network Layer (Layer 3)
synchronous communications
29. Equivalent to OSI Layer 3 Network
Half Duplex NIC Communication
TCP/IP Vs. OSI: Internet
Internet Group Membership Protocol (IGMP)
Data Terminal Equipment
30. File Transfere Protocol
rj-11
FTP
Transport
10BASE2 Limit
31. The physical layout of the cable and wireless network devices and the logical path followed by network frames and packets sent on the cable or by wireless transmissions
topology
communications services
coaxial cable
DHCP
32. Communications cable that has no shielding material between the pair of insulated wires twisted together and the cable's outside jacket.
Server
geosynchronous
Modulation
Unshielded twisted-pair (UTP) cable
33. Failure of an IDPS to react to an actual attack event
udp
client/server
EAPoL
false negative
34. Used on many UNIX/LINUX systems to provide authentication security for TCP/IP applications such as Telnet and FTP
Alien Cross Talk
Secure Shell (SSH)
CRC
Connectors
35. Resistance that contributes to controlling an electrical signal; measured in ohms
Asynchronous Transfer Mode
TCP port 23
Impedance
TCP/IP Architecture Layer 4
36. A generic term referring to the header defined by some layer of a networking model - and the data encapsulated by the header ( and possibly trailer) of that layer - but specifically not including an lower-layer headers and trailers.
RFI
IP gateway in NAT
Protocol Data Unit
media access control (MAC)
37. Technique for formatting signals in which one property of a carrier wave is modified by the addition of a data signal during transmission
route
Modulation
802.3af
route
38. Satellite used for broadband internet access
geosynchronous
User Datagram Protocol (UDP)
TCP/IP Network Access Layer Encapsulation
Networking Model
39. Ethernet NICs listen on network and wait until they detect no other nodes transmitting data
DNAT (Dynamic Network Address Translation)
carrier sense
Point-to-Point Protocol over Ethernet
Port Numbers
40. Multimode fiber
A Protocol
Star topology
MMF
OSI
41. Loop back address for IPv6
1000base-t
::1
SMTP server name
grade-index multimode fiber-optic cable
42. Feeding everybody in building
coaxial cable
port 25
Latency
omnidirectional antenna
43. Process of breaking large packets into smaller packets.
IP address within the assigned network
star topology
fragmentation
Address Resolution Protocol
44. BIND
amplitude
Physical
SYN-ACK (synchronization-acknowledgment)
Berkeley Internet Name Domain
45. Supplying electrical power through ethernet
power over ethernet
star-bus hybrid topology
Core
Serial
46. Which class of IP address would be allocated to a very large company?
Class A
Remote Authentication Dial-In User Service
network class a
FDM
47. Largest data unit a network will accept for transmission
fault tolerance
MTU (maximum transmission unit)
flow control
MMF
48. A form of address translation that uses Tcp port numbers to distinguish each client's transmission - thus allowing multiple clients to share a limited number of Internet-recognized IP addresses.
Application
fiber-optic cables
HTTPS
PAT (Port Address Translation)
49. Internet protocol security-defines encryption - authentication - and key management for TCP/IP transmission
IPSec
OSI
Client Software
POP3
50. Is a host-to-host protocol like TCP - however it does not include mechanisms for ensuring timely delivery
User Datagram Protocol (UDP)
A Protocol
IEEE 802.12 Standard
attenuation