SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
IT: Networking Vocab
Start Test
Study First
Subject
:
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Maintains and assigns IP addresses in the US
Category 5
DNAT (Dynamic Network Address Translation)
Demarcation Point
ICANN (Internet Corporation for Assigned Names and Numbers)
2. Only two wire pairs are reversed
association
crossover cable
RFI
Remote Access Service
3. The seventh layer of the OSI model. Application layer protocols enable software programs to negotiate formatting - procedural - security - synchronization - and other requirements with the network.
soft skills
duplex
Transport Layer
Application Layer
4. Public switched telephone network
pstn
tunneling
Microbrowser
SCP
5. Short tube within a fiber-optic cable connector that encircles the fiber strand and keeps in properly aligned
Ferrule
DNAT (Dynamic Network Address Translation)
ANSI (American National Standards Institute)
firewall
6. AFP
Apple File Protocol
service data unit (SDU)
RS 232
false negative
7. Network File System
Encapsulation
DNAT
802.16
NFS
8. Nondata info that must accompany data for it to be properly routed. addition to data
nbtstat
multimeter
pppoe
overhead
9. Not individually insulated but shielded. use when there is noise.
roaming
HTTP
STP
Remote Authentication Dial-In User Service
10. Twisted pair cable consisting of a number of twisted pairs of copper wire with a simple plastic casing. Because - no shielding is used in this cable - it is very susceptible to EMI - RFI - and other types of interference
Unshielded twisted pair
ACK (acknowledgement)
fractionalizing
Demarcation Point
11. Is a protocol for defining host groups.
WDM
intranet
NetWare Loadable Module
Internet Group Membership Protocol (IGMP)
12. Generates signals as changes in voltage at the NIC
Internet Protocol
workstation
TCP/IP Vs. Netware: Application
physical layer
13. Network Layer
Application layer
DNAT (Dynamic Network Address Translation)
Application Layer
Packets
14. The process of reconstructing segmented data
topology
multimeter
digital signal
reassembly
15. The combination of an IP address's network ID and subnet information. By interpreting the address's extended network prefix - a device can determine the subnet to which an address belongs.
Modulation
BSS
bandwidth
Extended Network Prefix
16. 4th layer; protocols ensure that data are transferred from point A to point B reliably and without errors; services include flow control - acknowledgment - error correction - segmentation - reassembly - and sequencing
FDM
Transport layer
SSH
Light Weight Directory access protocol (LDAP
17. ADSL
Class C Network
Asymmetric Digital Subscriber Line
Hypertext Transfer Protocol (HTTP)
Data Link
18. Internet corporation for assigned names and numbers
FDDI
goodput
ICAN
stateful firewall
19. Sequences packets in correct order
Layer 2 Forwarding
peer-to-peer network
HTTPS
Transport
20. Lowest or 1st layer; protocols generate and detect signals so as to transmit and receive data over a network medium - also set the data transmission rate and monitor data error rates - but do not provide error correction
Physical layer
fading
half duplex
Metropolitan area network (MAN)
21. 2nd set of characteristics that make up a device's MAC address. Added at the factory and is based on the device's model and manufacture date
topology
supernet
Round Trip Time
device ID
22. American national standards institute
ANSI
Backup Domain Controller
FDDI
Microbrowser
23. Core TCP/IP protocol that operates in the Network layer and provided information about how and where data should be delivered; subprotocol that enables TCP/IP to inernetwork
802.3
bus topology
IP (Internet Protocol)
Phase
24. Is a secure form of HTTP
Remote Access Service
802.11
HTTPS
PSTN
25. FDDI
Firewall Filtering
(fiddy) Fiber Distributed Data Interface
Application
RTS/CTS
26. Positive and zero. 1 and 0's.
Faulty network cable
Secure Shell (SSH)
media
binary
27. AD
traceroute (tracert)
Transport
Active Directory
ssl
28. Secure Hypertext Transfer Protocol
ICAN
coax cable connector
LLC
S-HTTP
29. Layer 3 Troubleshooting
stateful protocol analysis (SPA) IDPS
bus topology
Correct default gateway
Line Printer Remote
30. A situation in which two or more packets are detected at the same time on an Ethernet network.
TCP/IP Vs. OSI: Internet
collision
100base-tx
Class A Network
31. Large diameter. led/light is generated at different angles. high throughput - high noise resistance - excellent security - and long distances
RTS/CTS
MMF
multiplexing
Modem
32. Trivial file transfer protocol
TFTP
Bit
Physical
RADIUS
33. A series of interconnected computers - printing devices - and other computer equipment that shares hardware and software resources. The service area usually is limited to a given office area - floor - or building.
diffraction
MAC (Media Access Control) sublayer
Local area network (LAN)
binary
34. (local area network) network of computers and others that is confined to a relatively small space
LAN
port 21
WAN
backbone cabling
35. A specialized UN agency that provides developing countries with technical expertise and equipment
Line Printer Remote
protocol
ITU
Firewall Filtering
36. Physical Layer
Same Layer Interaction
firewall
Electrical Signaling
DNAT
37. An authentication protocol that uses public key technology to provide users with secured access to network resources.
Kerberos
connection
IEEE 802.12 Standard
Networking Model
38. Multicast group 224-239
Class D Network
noise
public switched telephone network (PSTN)
intrusion
39. Data transmission that involves one transmitter and one receiver
session
Point-to-Point
Classful Addressing
HTTP
40. Signals travel both directions simultaneously
duplex
Impedance
Digital
node
41. What is an agreed set of rules that two parties agree on in order to communicate with each other commanly known as?
High-Level Data Link Control
Data Link
A Protocol
IP Address
42. Unshielded twisted pair
cat 5
ISO
utp
Media Dependent Interface Crossover
43. Private connection from a LAN to an internet service provider.
backbone
Class A
dedicated lines
standard connector
44. Layer 2 Troubleshooting
Industrial - Scientific - and Medical
Incorrect device drivers
128 - 64 - 32 - 16 - 8 - 4 - 2 - 1
ANSI (American National Standards Institute)
45. Provides service that ensure accurate and timely delivery of network communications between two hosts
Backup Domain Controller
t1 connection
802.16
Transmission Protocol (TCP)
46. Application layer protocol used to access information stored in a directory
802.11
Application Layer
Transmission Control Protocol
LDAP
47. A utility for viewing or modifying a host's routing table
route
overhead
TCP/UDP
Demultiplexer
48. Is usde to communicate time synchronization information between systemson a network
spread-spectrum
t1 connection
Network Time Protocol (NTP)
protocol
49. 7th layer; protocols enable software programs to negotiate formatting - procedural - security - synchronization - and other requirements with the network
broadcast storm
Application layer
Data Terminal Equipment
Authentication Header
50. A type of transmission that can vary continuously - as in a wave pattern with positive and negative voltage levels.
false attack stimulus
RIP
analog
broadcast frame or broadcast packet