SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
IT: Networking Vocab
Start Test
Study First
Subject
:
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A connecting device for a network that accepts messages and passes them on to other parts of the network. Generally more intelligent than a hub.
Device power off
switch
Remote Terminal Emulation (Telnet)
Secure Copy
2. A specialized UN agency that provides developing countries with technical expertise and equipment
ISOC
ITU
reassembly
Secure Copy Protocol
3. Uses multiple frequencies to transmit signal
spread-spectrum
10base-t
fully distributed control strategy
Session
4. A shell protocol that enables systems to use various authenticaion mechanisms.
Data Link
IDPS terrorist
EAP
device address
5. QoS
stateful firewall
OSI Reference to TCP
Quality of Service
TCP/IP Vs. Netware: Network Access
6. Most common cabling used in networking. Usually connects nodes to the main network.
ethernet
Full-Duplex
IMAP4 (Internet Message Access Protocol - version 4)
802.3
7. A cable TV company - such as Comcast Broadband.
RADIUS
cabeloco
Presentation
intrusion detection
8. International Organization for Standardization
bandwidth
ISO
session
FHSS
9. Multiple signals travel simultaneously - medium is separated into multiple channels
Transport Layer (Layer 4)
Category 5
nslookup
multiplexing
10. A private computer network with resources accessible only to internal members.
802.2
centralized control strategy
intranet
802.3af
11. Professional organization with 90 chapters around the world that helps to establish technical standards for the internet
ASCII
FDM
false negative
ISOC (Internet Society)
12. A connector that is used for thin coax cable and that has a boyonet-like shell.
Gateway Services for NetWare
Industrial - Scientific - and Medical
bayonet nut connector (BNC)
Data Link (Layer 2)
13. An authentication protocol that uses public key technology to provide users with secured access to network resources.
Berkeley Internet Name Domain
perimeter
Kerberos
ITU
14. OTDR
network class a
Optical Time Domain Reflectometer
EAPoL
AUI
15. A TCP/IP troubleshooting utility that provides information about NetBIOs names and their addresses. If you know the NetBIOs name of a workstation - you can use nbtstat to determine its IP address
Bit
nbtstat
switch
Secure Copy Protocol
16. A technique in which IP address used on a private network are assigned a public IP address by a gateway when accessing a public network.
full mesh
Broadband
encapsulate
NAT (Network Address Translation)
17. What early protocol allows users to access machines remotley that has no security implemented within it?
Physical Layer (Layer 1)
Application
Terminator
Telnet
18. Term that describes current anti-intrusion technologies
protocol
intrusion detection/prevention system (IDPS)
radio frequency interference (RFI)
stateful firewall
19. Large diameter. led/light is generated at different angles. high throughput - high noise resistance - excellent security - and long distances
vampire tap
MMF
1000base-sx
Backbone
20. Ensures that messages being transmitted on the internet are private and tamper proof
Class A
Transport Layer Security (TSL)
ACK (acknowledgement)
alert or alarm
21. Hard-to-define skills such as dependability
application protocol verification
ATU-R
soft skills
Conduit
22. BERT
Bit-Error Rate Test
tracert
Block ID
BSS
23. A route discovery and analysis utility that comes with UNIX and Linux operating systems. Mtr combines with functions of the ping and traceroute commands and delivers an easily readable chart as its output
mtr (my traceroute)
Kroner
Application
Hertz
24. Signals traveling on one wire infringes on the signal traveling over an adjacent wire
public switched telephone network (PSTN)
SLIP
cross talk
router
25. Device that separates broadcast domain
physical media
802.44
host
switch
26. Services that handle hardware diagnoses and failure alerts
management services
star topology
FF02
OSI
27. A coaxial connector uses a twist and lock style - may be used with Rg-6 and RG-59
Frequency Division Multiplexing
Trivial File Transfer Protocol (TFTP)
metropolitan area network (MAN)
BNC connector
28. Session Layer
fiber optic connector
NetWare Core Protocol
intrusion correction
OSI Layer 5
29. Transmission control Protocol/Internet protocol
ISO (International Organization for Standardization)
TCP/IP
SNAT (Static Network Address Translation)
amplitude
30. A protocol that runs in the Dession and Transport layers of the OSI model and associates NetBIOS names with workstations. NetBIOS alone is not routable because it does not contain Network Layer information. However - when encapsulated in another prot
Class B Network
Repeater
CRC
NetBIOs
31. Tool used to determine whether a customers line is obtaining dial tone from the CO
Zero Configuration
PAP
butt set
Domain Name
32. Layer 5 through 7 Troubleshooting
OSI Layer 7
Internet Protocol Security
configured with correct sending and receiving email server information
MAC address
33. IEEE standard for Ethernet devices and data handling
CSMACD
SSH
802.3
IGMP
34. Defines the physical characteristics of the network
TCP/IP Transport Layer Encapsulation
Physical
MAN
Layer 2 Tunneling Protocol
35. The wave bounces back when encountering an object
reflection
broadcast frame or broadcast packet
intrusion reaction
Cladding
36. Institute of electrical and electronics engineers
Trivial File Transfer Protocol (TFTP)
IEEE
Transport
SYN-ACK (synchronization-acknowledgment)
37. A network that links multiple LAN's in large city or metropolitan region.
subnetting purpose
DSLAM
metropolitan area network (MAN)
ISOC (Internet Society)
38. Using part of a leased line
plain old telephone service (POTS)
cyclic redundancy check (CRC)
fractionalizing
Correct subnet mask
39. A drawback of certification
supernet
bayonet nut connector (BNC)
asynchronous comunications
certification value may be lessened due to the number of people obtaining them
40. PPPoE
802.2
Point-to-Point Protocol over Ethernet
Demarcation Point
100base-tx
41. Cross talk that occurs between wire pairs near the source of a signal
baseband
Near End Cross Talk
server
Frequency
42. A resistor that is connected to the end of a segment on a bus network - so that data-carrying signals are absorbed at the point where the segment stops. Absorbing the signals ensures they are not reflected back onto the cable after they reach the end
checksum
Broadband
Terminator
Network Layer
43. A logical process of combining bits. In ANDing - a bit with a value of 1 plus another bit with a value of 1 results in a 1. A bit with a value of 0 plus any other bit results in a 0.
Amplitude Modulation
ANDing
Backbone
802.2
44. Network interface card
IMAP4 (Internet Message Access Protocol - version 4)
backbone
Regeneration
NIC
45. Method of data modulation in which the frequency of the carrier signal is modified by the application of the data signal
Frequency Modulation
ATU-R
terminator
Network Information Service
46. An internetwork is two or more computer networks connected together.
Kerberos
S-HTTP
BOOTP
internetwork
47. Communications arrangement in which a single transmitter issues signals to multiple - defined recipients
supernet
backbone
Nonbroadcast Point-to-Multipoint Transmission
CRC (cyclic redundancy check)
48. What is an agreed set of rules that two parties agree on in order to communicate with each other commanly known as?
Amplitude
Internet Message Access Protocol version 4
A Protocol
255.255.0.0
49. RSA
inline sensor
Rivest - Shamir - Adelman
Fault tolerance
Challenge-Response Authentication Mechanism - Message Digest 5
50. Manages end-to-end delivery of data
transport layer
Optical Loss
Post Office Protocol 3 (POP3)
scattering
Sorry!:) No result found.
Can you answer 50 questions in 15 minutes?
Let me suggest you:
Browse all subjects
Browse all tests
Most popular tests
Major Subjects
Tests & Exams
AP
CLEP
DSST
GRE
SAT
GMAT
Certifications
CISSP go to https://www.isc2.org/
PMP
ITIL
RHCE
MCTS
More...
IT Skills
Android Programming
Data Modeling
Objective C Programming
Basic Python Programming
Adobe Illustrator
More...
Business Skills
Advertising Techniques
Business Accounting Basics
Business Strategy
Human Resource Management
Marketing Basics
More...
Soft Skills
Body Language
People Skills
Public Speaking
Persuasion
Job Hunting And Resumes
More...
Vocabulary
GRE Vocab
SAT Vocab
TOEFL Essential Vocab
Basic English Words For All
Global Words You Should Know
Business English
More...
Languages
AP German Vocab
AP Latin Vocab
SAT Subject Test: French
Italian Survival
Norwegian Survival
More...
Engineering
Audio Engineering
Computer Science Engineering
Aerospace Engineering
Chemical Engineering
Structural Engineering
More...
Health Sciences
Basic Nursing Skills
Health Science Language Fundamentals
Veterinary Technology Medical Language
Cardiology
Clinical Surgery
More...
English
Grammar Fundamentals
Literary And Rhetorical Vocab
Elements Of Style Vocab
Introduction To English Major
Complete Advanced Sentences
Literature
Homonyms
More...
Math
Algebra Formulas
Basic Arithmetic: Measurements
Metric Conversions
Geometric Properties
Important Math Facts
Number Sense Vocab
Business Math
More...
Other Major Subjects
Science
Economics
History
Law
Performing-arts
Cooking
Logic & Reasoning
Trivia
Browse all subjects
Browse all tests
Most popular tests