SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
IT: Networking Vocab
Start Test
Study First
Subject
:
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A connecting device for a network that accepts messages and forwards them to the correct section of the network. Generally more intelligent than a hub and a switch.
pathping
router
diffraction
fading
2. Max size of data units on Ethernet networks
butt set
1550bytes
Fast Ethernet
TCP port 23
3. Delay between the transmission of a signal and its receipt
EIA/TIA
server
Latency
port 143
4. SCP
MIME (Multipurpose Internet Mail Extensions)
Hyper Text Transfer Protocol (HTTP)
Demarcation Point
Secure Copy Protocol
5. Transport Layer
passive scanning
Port Numbers
Mac Addressing
coax cable connector
6. Device that can detect intrusion and launch an active response
port 53
intrusion prevention system (IPS)
narrowband
Classful Addressing
7. ACL
VPN
Data Link
Access Control List
OSI Layer 3
8. Application layer protocol used to access information stored in a directory
TCP/IP Architecture Layer 1
LDAP
Modem
File Transfer Protocol (FTP)
9. A group of two or more computer systems linked together.
fiber-optic cables
Telnet
network
private network
10. What does POP3 stand for?
FDM
Internet Protocol version 4
Post Office Protocol
reflection
11. An error detection method that calculates a value for the total size of the information fields contained in a frame. The value is inserted near the end of a frame by the Data Link layer on the sending node - and checked by the Data Link layer on the
cyclic redundancy check (CRC)
Transport
kereberos
Port Numbers
12. RJ 45
client/server
TIA (Telecommications Industry Association)
twisted pair connector
WAN
13. Event that triggers alarm when no actual attack is in progress
Flow Control
bandwidth
false attack stimulus
Block ID
14. Strategy in which all control functions are applied at the physical location of each IDPS component
TCP/IP Vs. OSI: Network Access
frame
FM
fully distributed control strategy
15. Computers - devices - and connectivity necessary to rebuild a network exist - and all have appropriated configured updated and connected to match your networks current state. most expensive disaster recovery contingency to maintain
alert or alarm
ATU-R
MAC
hot site
16. Manages IP address allocation and the domain name system
SMTP
IANA (Internet Assigned Numbers Authority)
baseband
noise
17. NAT
Network Address Translation
site policy
frame
honey net
18. A unit of data transmitted on a network that contains control and address information corresponding to the OSI Data Link layer - or Layer 2.
signature-based (knowledge-based - misuse-detection) IDPS
IP Addressing
port 21
frame
19. Works closely with IP in providing error and control information - by allowing hosts to exchange packet status information to help move the packets along the internetwork
Internet Control Message Protocol (ICMP
FTP
Logical Link Control
10BASE2 Limit
20. TCP is a Layer 4 protocol (Due to the close match or the OSI Transport Layer and TCP within the TCP/IP Transport Layer.
Session
ICMP
OSI Reference to TCP
topology
21. Station transmits a probe that is then replied by the access point
Access Control List
TCP/IP Vs. OSI: Network Access
redirector
active scanning
22. IEEE standard describing specifications for wireless transmissions
LLC
topology
Transport
802.11
23. Strategy that combines the best of the other two strategies; while individual agents still analyze and respond to local threats - their reporting to a hierarchical central facility enables the organization to detect widespread attacks
Alien Cross Talk
virtual circuit
ISO (International Organization for Standardization)
partially distributed control strategy
24. 128-191
alien cross talk
ATM
TCP/IP Network Access Layer Encapsulation
network class B
25. MAC address
physical address
STP
Plenum
Open Shortest Path First
26. The process of validating a user.
authentication
metropolitan area network (MAN)
SNAT (Static Network Address Translation)
Internet Protocol version 4
27. Connection-less
port 80
Primary Domain Controller
udp
ISP (Internet service provider)
28. Public switched telephone network
tracepath
pstn
Data Link
Packets
29. Device that boosts - or strengthens - and analog signal
application protocol verification
Secure Hypertext Transfer Protocol (S-HTTP)
Amplifier
2.4-GHz band
30. Manually specify on each workstation so that their users can pick up their internet email from the linux email server
DHCP
SMTP server name
multipath
Incorrect device drivers
31. MT-RJ
OSI Layer 2
Application
star-wired bus topology
Mechanical Transfer-Registered Jack
32. The _____________ allows certain bits of the IP address to be ignored when checking to see if an IP address matches the destination network address.
Subnetmask
MIME (Multipurpose Internet Mail Extensions)
IANA
802.11
33. A device that must be located at each end of a leased line.
CSU/DSU
leased line
nslookup
Subnetmask
34. Data Link Layer
Mac Addressing
VLAN
Internet Assigned Numbers Authority
NetWare Core Protocol
35. A transmitter concentrates the signal energy at a single frequency or in a very small range of frequencies
physical media
narrowband
BGP
point to multipoint
36. NTP - network time protocol
Berkeley Software Distribution
fiber optics
port 123
fingerprinting
37. Teflon-coated cable that is used in plenum area because it does not emit a toxic vapor when burned
plenum cables
Internet Protocol
International Organization for Standardization (ISO)
DNAT
38. Satellite used for broadband internet access
IEEE 802.12 Standard
geosynchronous
ethernet
Full Duplex NIC Communication
39. The 100BaseVG/100VG-AnyLAN approach abandon the CSMA/CD transmission technique for one called demand priorTity.
Network interface card (NIC)
IEEE 802.12 Standard
FCS (frame check sequence)
SNMP
40. Gigabit Interface Converter - Plugs in to an interface on a switch
Secure Copy Protocol
GBIC
Address Resolution Protocol
PDU (protocol data unit)
41. Basic error checking and correction
Client
Data Link
802.11b
full duplex
42. An enclosed area - such as a false floor - or ceiling - in which pressure from air or gas can be greater than the pressure outside the enclosed area - particularly during a fire. Plenum area in buildings often extend to multiple rooms or extend throu
plenum area
Amplitude
workstation
IP Addressing
43. (fix) if analog shield twisted pairs or if digital with a repeater
fixing noise
star wired ring
802.11a
SSL
44. A computer (mainframe - minicomputer - server - or workstation) that has an operating system enabling multiple computers to access it at the same time for files - data - and services.
Incorrect cable type
Data Link
topology
host
45. Translated network addresses into their physical counterparts
ethernet
IMAP4 (Internet Message Access Protocol - version 4)
network layer
protocol and services
46. Layer 1 Troubleshooting
power over ethernet
Faulty network cable
Presentation
Internet Engineering Task Force (IETE)
47. A technique for connecting to a network at a remote location using Internet as the medium.
VPN
port 25
1000base-t
SONET
48. A generic term for data being transmitted
packet
SSL
alert or alarm
Attenuation
49. On a network using the MIcrosoft Internet Connections Sharing service - the computer whose Internet connection other computers share. The ICS host must contain two network interfaces: one that connects to the Internet and one that connects to the LAN
configured with correct sending and receiving email server information
OSI Layer 6
RS 232
ICS host
50. Which protocol provides the user with many functions of the world wide web?
Hyper text transfer protocol
Institute of Electrical and Electronics Engineers (IEEE)
fixing attenuation
NetWare Loadable Module
Sorry!:) No result found.
Can you answer 50 questions in 15 minutes?
Let me suggest you:
Browse all subjects
Browse all tests
Most popular tests
Major Subjects
Tests & Exams
AP
CLEP
DSST
GRE
SAT
GMAT
Certifications
CISSP go to https://www.isc2.org/
PMP
ITIL
RHCE
MCTS
More...
IT Skills
Android Programming
Data Modeling
Objective C Programming
Basic Python Programming
Adobe Illustrator
More...
Business Skills
Advertising Techniques
Business Accounting Basics
Business Strategy
Human Resource Management
Marketing Basics
More...
Soft Skills
Body Language
People Skills
Public Speaking
Persuasion
Job Hunting And Resumes
More...
Vocabulary
GRE Vocab
SAT Vocab
TOEFL Essential Vocab
Basic English Words For All
Global Words You Should Know
Business English
More...
Languages
AP German Vocab
AP Latin Vocab
SAT Subject Test: French
Italian Survival
Norwegian Survival
More...
Engineering
Audio Engineering
Computer Science Engineering
Aerospace Engineering
Chemical Engineering
Structural Engineering
More...
Health Sciences
Basic Nursing Skills
Health Science Language Fundamentals
Veterinary Technology Medical Language
Cardiology
Clinical Surgery
More...
English
Grammar Fundamentals
Literary And Rhetorical Vocab
Elements Of Style Vocab
Introduction To English Major
Complete Advanced Sentences
Literature
Homonyms
More...
Math
Algebra Formulas
Basic Arithmetic: Measurements
Metric Conversions
Geometric Properties
Important Math Facts
Number Sense Vocab
Business Math
More...
Other Major Subjects
Science
Economics
History
Law
Performing-arts
Cooking
Logic & Reasoning
Trivia
Browse all subjects
Browse all tests
Most popular tests