SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
IT: Networking Vocab
Start Test
Study First
Subject
:
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Wavelength division multiplexing
FTP
switch
analog signal
WDM
2. Digital subscriber line- support multiple data and voice channels over a single line - extraordinary throughput though telephone lines
Kerberos
port 53
DSL
terminal
3. A private network that functions like a tunnel though a large network-such as the Internet or an enterprise network-that is restricted to designated member clients only.
Data Link Layer
port 69
virture privat network (VPN)
Bit
4. Which protocol allows users to recieve emails?
POP3
public network
255.255.0.0
Secure Sockets Layer (SSL)
5. Teflon-coated cable that is used in plenum area because it does not emit a toxic vapor when burned
fault tolerance
TCP/IP Transport Layer Encapsulation
Remote Access Service
plenum cables
6. A type of transmission in which there are several transmission channels on a communications medium - allowing more than one node to transmit at the same time.
stateless firewall
SMTP
broadband
Protocol
7. IDPS that examines network traffic in search of patterns that match known signatures
partially distributed control strategy
network address
omnidirectional antenna
signature-based (knowledge-based - misuse-detection) IDPS
8. The NIC and network equipment are set up so that they have the capacity to send and receive simultaneously. which is possible because od buffering at the NIC.
Subnetmask
Full Duplex NIC Communication
Domain Name Service
TCP/IP Vs. Netware: Transport & Internet
9. American national standards institute
fractionalizing
half duplex
Transport
ANSI
10. Application Layer
encapsulate
TCP/IP Architecture Layer 4
active scanning
bus topology
11. MDIX
Gigabit Ethernet (fiber characteristics)
Media Dependent Interface Crossover
Hertz
Trivial File Transfer Protocol (TFTP)
12. The combination of an IP address's network ID and subnet information. By interpreting the address's extended network prefix - a device can determine the subnet to which an address belongs.
link dead phase
IEEE
802.3
Extended Network Prefix
13. Uses frame headers
ethernet
terminator
intrusion detection system (IDS)
Hypertext Transfer Protocol (HTTP)
14. Hub/repeaters
Independent Computer Architecture
Transport
binary
physical layer device
15. Layer 3 Troubleshooting
cp connection
Correct default gateway
10BASE2 Limit
management services
16. The information transfered between layers in the same OSI stack
hot site
FDM
protocol data unit (PDU)
phishing
17. Why are web pages viewed using HTTP?
To stop the Hamburgerler from stealing all of Ronnie McDonalds burgers
false attack stimulus
HTTPS
Internet Group Membership Protocol (IGMP)
18. Wireless standard
FTP
802.11
intrusion prevention system (IPS)
amplitude
19. Manually specify on each workstation so that their users can pick up their internet email from the linux email server
connection
VPN
SMTP server name
Packets
20. Core TCP/IP protocol that operates in the Network layer and provided information about how and where data should be delivered; subprotocol that enables TCP/IP to inernetwork
IP (Internet Protocol)
reassembly
Optical Loss
protocol data unit (PDU)
21. An arm of the Internet Society (ISOC) that works on Internet-relateed technical issues.
Basic Rate Interface
diffraction
network class a
Internet Engineering Task Force (IETE)
22. Secure sockets layer-encyrpts TCP/IP transmission including web forms- en route b/w the client server using public key encryption technology
Simple Network Management protocol (SNMP)
Firewall Filtering
logical address
ssl
23. NIDPS system that examines network traffic in order to identify problems related to the flow of traffic. Most sensors are passive mode deployment only.
Industrial - Scientific - and Medical
Decapsulation
FF02
Network Behavior Analysis
24. A network on which any computer can communicate with other networked computers on an equal (peer) basic without going though an intermediary - such as a server. Peer-to-Peer networking enables each computer to offer and access shared resoures - such
RS-232
peer-to-peer network
User Datagram Protocol (UDP)
VLAN
25. Form of transmission that allows multiple signals to travel simultaneously over one medium
ISDN
fading
Multiplexing
logical link control (LLC)
26. A far-reaching system of networks that usually extends over approximately 48 kilometers (about 30 miles) and often reaches across states and continents.
Data Link
network interface card (NIC)
Wide area network (WAN
duplex
27. Max size of data units on Ethernet networks
fat pipe
simplex
Half-Duplex
1550bytes
28. Aversion of the traceroute utility found on some Linux distributions.
bandwidth
Frequency Division Multiple Access (FDMA)
tracepath
Near End Cross Talk
29. Networking technology developed by IBM in the 80s; relies upon direct links between nodes and ring topology - using tokens to allow nodes to transmit data
Fast Ethernet
logical link control (LLC)
Serial Line Internet Protocol
token ring
30. The cableing or radio waves used to connect one network computer to another - or one network to another - and transport data between them.
POP (Post Office Protocol)
incremental backup
statistical anomaly-based (stat - behavior-based) IDPS
communications media
31. Transport layer protocol that services a request without requiring a verified session and without guaranteeing delivery data
connectionless
Segment
Network layer
fragmentation
32. 128 -64 -32 -16 -8 -4 -2 -1
binary
Local area network (LAN)
IGMP
ppptp
33. Technique for formatting signals in which one property of a carrier wave is modified by the addition of a data signal during transmission
Ethernet
Modulation
demilitarized zone
TDM
34. POP3
binary
asynchronous comunications
Post Office Protocol version 3
802.2
35. Device that boosts - or strengthens - and analog signal
telephone connector
HTTPS
Amplifier
Frequency
36. Telnet
header
Port 23
Organizational Unit
intrusion prevention system (IPS)
37. Transport Layer
false negative
Decapsulation
International Organization for Standardization (ISO)
Firewall Filtering
38. The IEEE standard for token ring networking devices and data handling.
Point-to-Point Protocol over Ethernet
true attack stimulus
HTTPS
802.5
39. Network time protocol
connectionless
Remote Terminal Emulation (Telnet)
NTP
frame
40. SCP
Secure Copy Protocol
Incorrect device drivers
SMTP (Simple Mail transfer Protocol)
Half-Duplex
41. LLC
Logical Link Control
serial
Transport
workstation
42. A connector that is used for thin coax cable and that has a boyonet-like shell.
Telnet
bayonet nut connector (BNC)
Remote Access Service
redirector
43. IEEE standard for wireless networking
TCP port 23
routing
Hypertext Transfer Protocol (HTTP)
802.44
44. Restructuring data units that have been segmented
reassembly
bridge
Hyper text transfer protocol
LLC (Logical Link Control) sublayer
45. The most commonly used form of Internet Message Access Protocol.
IMAP4 (Internet Message Access Protocol - version 4)
evasion
encapsulation
serial
46. Satellite used for broadband internet access
geosynchronous
802.11g
binary
protocol stack verification
47. A generic term referring to the header defined by some layer of a networking model - and the data encapsulated by the header ( and possibly trailer) of that layer - but specifically not including an lower-layer headers and trailers.
headened
SIP
Protocol Data Unit
honey pot
48. HTTPS - Secure implementation of HTTP
port 443
the higher the frequency
Telnet
PDU
49. Device that connects network segments and directs data based on information in the data packet
overhead
router
presentation layer
DNAT
50. Transforms data into a form network or applications will understand
fully distributed control strategy
Secure File Transfer Protocol (SFTP)
Presentation
Simple Network Management Protocol (SNMP)