Test your basic knowledge |

IT: Networking Vocab

Subject : it-skills
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Amount of data that can be transmitted over media or wireless at a time.






2. Type of multiplexing that assigns a unique frequncy band to each communications subchannel






3. Allows you and eight coworkers to share a single internet routable IP address






4. SFTP






5. Time Division Multiple Access






6. A TCP/Ip troubleshooting utility that displays statistics and the state of current TCP/IP connections. It also displays ports - which can signal whether services are using the correct ports.






7. IDPS that compares sampled network activity to established baseline






8. Internet Engineering Task Force






9. OSPF






10. Has 25 pins also commonly used with serial communication that conforms to the rs-232 standard






11. A connector that is used for thin coax cable and that has a boyonet-like shell.






12. Used to resolve NetBIOS names w IP address






13. What does POP3 stand for?






14. FTP-Data - file transfer data






15. Http - Hypertext transfer protocol






16. Source emits a RTS (request to send) signal to the access point - and the access point replies with CTS (clear to send) for the source to begin its transmission






17. A type of transmission in which the entire channel capacity of the communications medium (such as cable) is used by one data signal - enabling only one node to transmit at a time.






18. Is a protocol for defining host groups.






19. SCP






20. Event that triggers alarms and causes an IDPS to react as if a real attack is in progress






21. Activities finalize restoration of operations to a normal state and seek to identify source and method of intrusion to ensure same type of attack cannot occur again






22. BIND






23. Measure of strength






24. A computer that accesses another computer - such as a workstation that accesses a shared file on another workstation - server - or mainframe. The client may use the accessed computer (host) to process data - or may process accessed data using its own






25. Electromagnetic interference. waves from electrical devices. ex. RFI






26. Determines standards for the electronics industry and other fields - such as chemical and nuclear engineering - health and safety - and construction






27. A value or means of identifying a service on a network node - such as socket or port 103 for standerdized e-mail services in the TCP protocol.






28. MIB






29. Tool used to determine whether a customers line is obtaining dial tone from the CO






30. A service on a node






31. A 32 bit number that - when combined with a device's IP address - indicates the kind of supernet to which the device belongs.






32. Small network 192-223






33. Regular voice-grade telephone service.






34. AD






35. Long reach. multimode max length is 550 meters. single mode max length is 5000. 1000 mpbs. baseband transmission






36. Rules determining the format and transmission of data






37. Application Layer






38. A system of computers - print devices - network devices - and computer software linked by communications cabling or radio waves.






39. Physical layer. 100 mpbs throughout. baseband transmission. cat 5 or higher utp. max length is 100 meters. two wire twisted pair-full duplexing.






40. Functions at the network layer that add logical addresses and properly route data






41. Routes packets through network






42. A process that ensures one device does not send information faster than it can be received by another device.






43. Firewall packet inspection that examines the data contained in a packet as well as the state of the connection between internal and external computers.






44. Data changed since the previous fill or incremental backup






45. Frequency division multiplexing






46. Speed: 1000 Mbps - Altenative name: 1000BASE-T - IEEE Standard: IEEE 802.3ab - Cable type: copper max length 100m






47. Set of routines that make up part of a software application






48. Technology that uses standard telephone wires and allows transmission of voice and data information. Slower than ADSL.






49. Is a file transfer protocol that uses s ecure shell (SSH)






50. A logical process of combining bits. In ANDing - a bit with a value of 1 plus another bit with a value of 1 results in a 1. A bit with a value of 0 plus any other bit results in a 0.