SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
IT: Networking Vocab
Start Test
Study First
Subject
:
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Helps you identify percentage of traffic that compromises broadcasts
ISO
PSTN
ARP
network monitor
2. WAN transmission technologies that contains a segment that relied on 10GBase-EW standard
SONET
Channel
Media Converter
WAN
3. A network whose access is restricted to only clients or machines with proper credentials.
Gateway Services for NetWare
Secure File Transfer Protocol
Private Network
ICANN (Internet Corporation for Assigned Names and Numbers)
4. Compresses
pathping
Ethernet
Presentation
ISO
5. Name Of Layer 4
Straight tip connector
ring topology
Remote Access Service
Transport
6. Specify clients configurations to adhere to this subnet
standby UPS
MS-CHAP
topology
255.255.255.252
7. Data transmission that involves one transmitter and one receiver
CD-ROM File System
Repeater
Point-to-Point
EMI
8. Open Systems Interconnection model is standard description or reference model for how messages should be transmitted between any 2 points in a telecommunications network.
port 110
switch
Network News Transport Protocol
OSI
9. Set of protocols that specify how wireless networks works. Most common are currently B and G. N is an emerging standard.
802.11
analog signal
intranet
Network layer
10. Layer 2 Troubleshooting
Institute of Electrical and Electronics Engineers (IEEE)
network monitor
Incorrect device drivers
Optical Time Domain Reflectometer
11. Wrapping one layer's PDU with protocol information so that it can be interpreted by a lower layer
802.3
encapsulate
OSI Layer 7
Class E Network
12. The most popular type of network for medium- and large-scale organizations
client/server
RS 232
Serial Line Internet Protocol
FHSS
13. Address resolution protocol
host-based IDPS (HIPDS)
ARP
ESS
SMTP
14. Network Layer
Internet Group Membership Protocol (IGMP)
IP Addressing
Network
alien cross talk
15. An adapter board designed to connect a workstation - server - or other network device to a network medium.
star wired bus
frame
network interface card (NIC)
Transport
16. Fiber Distributed Data Interface
Network
network class B
FDDI
(fiddy) Fiber Distributed Data Interface
17. A generic term referring to the header defined by some layer of a networking model - and the data encapsulated by the header ( and possibly trailer) of that layer - but specifically not including an lower-layer headers and trailers.
alarm clustering and compaction
fixing noise
coaxial cable
Protocol Data Unit
18. A network that links multiple LANs in a large city or metropolitan region.
Metropolitan area network (MAN)
fixing noise
link establishment phase
virture privat network (VPN)
19. A 32 bit number that - when combined with a device's IP address - indicates the kind of supernet to which the device belongs.
Class A Network
ISOC
Data Link
supernet mask
20. NLM
link dead phase
Computer network
IP (Internet Protocol)
NetWare Loadable Module
21. Multiplexing technique use over single-mode or multimode fiber-optic cable in which each signal is assigned a different wavelength for its carrier wave; little space exists between carrier waves
Dense Wavelength Division Multiplexing
binary
CRC
IP Addressing
22. Which layer in the OSI network model is responsible for providing a set of interfaces for applications to obtain access to networked services?
certification value may be lessened due to the number of people obtaining them
Application Layer
nslookup
fiber-optic cables
23. Style of data transmission in which the pulses that represent bits follow one another along a single transmission line; sequentially issued
Serial
nslookup
SLIP
1000base-lx
24. Trivial File Transfer Protocol
Metropolitan area network (MAN)
TFTP
Media Converter
TIA (Telecommications Industry Association)
25. Layer 5
analog
Server
Category 3
Session
26. Device similar to a burglar alarm in that it detects a violation and activates an alarm.
Encrypting File System
extranet
OSI Layer 5
intrusion detection system (IDS)
27. RAS
Remote Access Service
Service Set Identifier
Connectors
Network
28. Receives a signal on one end - interprets it as 0 & 1 - then generates a new clean signal on the other end.
Noise
Node
Repeater
SFP
29. Requires many pulses to transmit same info that an analog can transmit in a wave
To stop the Hamburgerler from stealing all of Ronnie McDonalds burgers
10BASE2 Limit
digital dis
Port 20
30. Works closely with IP in providing error and control information - by allowing hosts to exchange packet status information to help move the packets along the internetwork
SCP
telephone connector
Internet Control Message Protocol (ICMP
10 Gigabit Ethernet
31. After typing ping 127.0.0.1 - it tells you the test failed
IGMP
ANSI (American National Standards Institute)
Logical Link Control
TCP/IP protocol failure
32. Network time protocol
binary
CRC
ACK (acknowledgement)
NTP
33. Event that triggers alarm when no actual attack is in progress
analog dis
false attack stimulus
fragmentation
Service Set Identifier
34. An established guidline that specifies how networked data is formatted into packet or frame - how it is transmitted - and how it is interpreted at the receiving end.
AUI
configured with correct sending and receiving email server information
protocol
Crossover Cable
35. What is an agreed set of rules that two parties agree on in order to communicate with each other commanly known as?
A Protocol
broadband
Class A Network
intrusion correction
36. POP3 - post office protocol 3
Time Division Multiple Access (TDMA)
Domain Name
statistical anomaly-based (stat - behavior-based) IDPS
port 110
37. Which protocol allows users to recieve emails?
CD-ROM File System
passive scanning
POP3
ICS (Internet Connection Sharing)
38. L2F
Layer 2 Forwarding
PPP
driver
Apple File Protocol
39. Decoy systems designed to lure potential attackers away from critical systems
Transport Layer Security (TSL)
network-based IDPS (NIDPS)
Frequency Division Multiple Access (FDMA)
honey pot
40. The physical layout of a computer network
Fiber Distributed Data Interface (FDDI)
topology
bandwidth
NetWare Loadable Module
41. Response generated atTransport layer confirming to sender that its frame was received; 3rd step in establishing a connection
connectivity device
NIC (Network Interface Card)
ACK (acknowledgement)
bayonet nut connector (BNC)
42. Connectivity device - data link layer (2) - reads header info to forward packets according to MAC addresses
SSID
standard
bridge
Node
43. Allows an attached computer to act as a dumb terminal - with data processing taking place on the TCP/IP host computer
Peer-to-peer network
Remote Terminal Emulation (Telnet)
Presentation
IDPS terrorist
44. Individual insulated wire pairs - less expensive then STP - less resistant to noise
protocol
UTP
crossover cable
EAP
45. A drawback of certification
ITU
certification value may be lessened due to the number of people obtaining them
Network Layer (Layer 3)
Latency
46. (fix) if analog shield twisted pairs or if digital with a repeater
fixing noise
fiber optic cable
Hyper Text Transfer Protocol (HTTP)
Secure Sockets Layer (SSL)
47. A computer that has its own CPU and may be used as a stand-alone computer for word processing - spreadsheet genation - or other software applications. It also may be used to access another computer such as another workstation or server via a network.
802.11g
workstation
Presention Layer (Layer 6)
Incorrect cable type
48. MT-RJ
Mechanical Transfer-Registered Jack
switch
Braiding
Post Office Protocol 3 (POP3)
49. Each computer is connected to a central device
ethernet
Internetwork Packet Exchange
star topology
ports
50. The process of enclosing data for transmission
LAN
Network layer
encapsulation
topology