SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
IT: Networking Vocab
Start Test
Study First
Subject
:
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. RADIUS
Internet Information Services
network class C
Remote Authentication Dial-In User Service
dedicated lines
2. The most commonly used form of Post office protocol.
WAN
vampire tap
POP3 (Post Office Protocol - version 3)
Local area network (LAN)
3. The NIC and network equipment are set up so that they have the capacity to send and receive simultaneously. which is possible because od buffering at the NIC.
bandwidth
Full Duplex NIC Communication
MAU
port 53
4. Signals travel both directions simultaneously
routing
Network
duplex
NIC
5. Crimp into pins 1 and 2 of RJ 45 connector
15 hops
Address Resolution Protocol (ARP)
PDU (protocol data unit)
white/orange and orange
6. FTP is an application that enables the transfer of data from one remote device to another - using TCP/IP
File Transfere Protocol - (FTP)
transmission media
Ethernet
MAU
7. The IEEE standard for token ring networking devices and data handling.
baseband
Ferrule
802.5
Internet Message Access Protocol version 4
8. Vulnerability created in a system by a virus or worm which allows the attacker to access the system at will with special privileges.
back door
asymmetrical transmission
fiber optic cable
Telnet
9. GPO
Post Office Protocol 3 (POP3)
Group Policy Object
Packets
Physical
10. SSH
access point
Radio Waves
directional antennas
Secure Shell
11. Satellite used for broadband internet access
topology
Carrier Sense Multiple Access / Collision Detection
geosynchronous
API (application program interface)
12. Also called coax - a network cable medium that consists of a copper core - surrounded by insulation.
Radio Frequency Interference
Incorrect device drivers
headened
coaxial cable
13. A value or means of identifying a service on a network node - such as socket or port 103 for standerdized e-mail services in the TCP protocol.
socket
Subnetmask
Open System Interconnection (OSI) referance model
reassembly
14. Ensures that messages being transmitted on the internet are private and tamper proof
Transport Layer Security (TSL)
Attenuation
Noise
link dead phase
15. Slow wireless standard 11-18 throughput
PSTN
802.11a
Bus topology
Domain Controller
16. IRC
Data Link Layer
port 143
Line Printer Daemon
Internet Relay Chat
17. File Transfere Protocol
Presentation
PPP
FTP
Inter Message Access Protocol (IMAP)
18. Network news transfer protocol
NNTP
packet
Media Dependent Interface Crossover
Class B Network
19. A connector that is used for thin coax cable and that has a boyonet-like shell.
T-Carrier Level 1
bayonet nut connector (BNC)
Ethernet (characteristics)
Presentation
20. IEEE 802.2 Logical Link Control (LLC) sublayer of the data link layer
RTT
802.2
TCP/IP Vs. Netware: Application
MAC address
21. SMF
Single Mode Fiber
DNS
intranet
TFTP
22. A network design consisting of a continuous path for data with no logical beginning or ending point - and thus no terminators.
Optical Loss
Frequency Hopping Spread Spectrum
Telnet
Ring topology
23. Gives each node unique address
Transport
soft skills
Network File System (NFS)
CRC (cyclic redundancy check)
24. 2nd layer; bridges the networking media with the Network layer. Primary function is to divide the data it receives from the Network layer into frames to be transmitted by the Physical layer
Data Link
device address
Data Terminal Equipment
Data Link layer
25. Control frame that indicates to the rest of the network that a particular node has the right to transmit data
LC connector
cyclic redundancy check (CRC)
Simple Mail Transfer Protocol (SMTP)
token
26. Algorithm used to verify the accuracy of data contained in a data frame
OSI
CRC (cyclic redundancy check)
udp
throughput
27. Useful for troubleshooting a network connectivity problem from workstation to another workstation
crossover cable
ethernet
66 Block
star-wired bus topology
28. Initiates the communication link - Makes sure the communication link is maintained - Determines which node transmits at any point in time - such as which one transmits first - Disconnectd when a communication session is over - Translates node address
Synchronous Optical Network
intrusion prevention
Session Layer (Layer 5)
media
29. Address Resolution Protocol
ARP
TCP/IP Vs. Netware: Transport & Internet
bus topology
CSU/DSU
30. The process of validating a user.
token
Institute of Electrical and Electronics Engineers (IEEE)
authentication
beacon frame
31. A network design built by running cable from one PC of file server to the next - like links in a chain.
POTS
bus topology
modem
fault tolerance
32. The number of times a signal's amplitude changes over a fixed period of time - expressed in cycles per second - Hz
Frequency
Data Terminal Equipment
IPSec
back hack
33. It enables the sending node to obtain the MAC address of the intended recipient before packets are sent.
NetWare Core Protocol
geosynchronous
Address Resolution Protocol (ARP)
vampire tap
34. Synchronises data exchange
intrusion
Internet Protocol
Session
rj-11
35. A permanent telephone connection between 2 locations that provide a predetermined amount of bandwidth at all times
Dynamic Host Configuration protocol (DHCP)
client
Data Link (Layer 2)
leased line
36. Layer 5
Session
Twister Pair Cable
presentation layer
ITU
37. 6th layer; protocols translate between Application and Network layers; data are formatted so that the network can understand - with the format varying according to the type of network; manages data encryption and decryption - such as scrambling of sy
connectionless
intrusion
digital dis
Presentation layer
38. Each node passively listens for then accepts data
PDU (protocol data unit)
passive topology
netstat
authentication
39. Provides service that ensure accurate and timely delivery of network communications between two hosts
star-ring hybrid topology
bandwidth
PDU
Transmission Protocol (TCP)
40. Used with single mode or multi mode fiber optic cable
SFP
Multistation Access Unit
Demarcation Point
standard connector
41. A single computer that provides extensive multiuser access to network resources - such as shared files - shared disks - and shared printers.
SMTP
Server
cat 5
social engineering
42. A series of interconnected computers - printing devices - and other computer equipment that shares hardware and software resources. The service area usually is limited to a given office area - floor - or building.
VPN
Local area network (LAN)
POTS
FDM
43. Network cable that contains pairs of insulated wires that are twisted together and surrounded by a shielding material for added EMI and RFI protection - all inside a protective jacket.
ANSI
SONET
shielded twisted-paired (STP) cable
cross talk
44. The part of a network to which segments and significant shared devices connect
FCS (frame check sequence)
reflection
backbone
evasion
45. 2nd set of characteristics that make up a device's MAC address. Added at the factory and is based on the device's model and manufacture date
1000base-t
CHAP
device ID
Microbrowser
46. Device typically used to create a VLAN
standard
public network
Secure Sockets Layer (SSL)
switch
47. MAC address
FTP
PSTN
physical address
IETE
48. Process of breaking large packets into smaller packets.
fragmentation
Flow Control
TCP/IP Vs. OSI: Network Access
site policy
49. This layer in the OSI network model manages log on procedures and password recognition.
node
fiber optic cable
switch
Session Layer
50. Failure of an IDPS to react to an actual attack event
FF02
false negative
DSL
Presentation layer