SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
IT: Networking Vocab
Start Test
Study First
Subject
:
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Layer 3 Troubleshooting
Frequency Modulation
back hack
Correct default gateway
overhead
2. Bus topology: A network design built by running cable from one PC or file server to the next - like links in a chain.
RS 232
Bus topology
SIP
Full Duplex NIC Communication
3. Most resistant to EMI
fiber optic cable
Physical
UTP
Cable Plant
4. Package for data that includes not only the data - or 'payload -' but also the sender's and recipient's addressing and control information. Generated at the Data Link layer and issued to the Physical layer
padded cell
frame
switch
DNAT
5. Layer 3 Troubleshooting
star-bus hybrid topology
Internet
slip
Correct subnet mask
6. A device used to connect thicknet cable with a transceiver. A vampire bypasses the need to serve the cable - because the vampire tap has a metal tooth that pierces through the outside cable insulation (like a vampire) and connects with the copper wir
connectivity device
vampire tap
token ring
IP Address
7. Uses light to communicate a signal; the light is dispersed on numerous paths as it travels through the core and is reflected back. Provides high bandwidth at high speeds over medium distances up to about 3000 feet
802.2
Multimode fiber
Application Layer
digital adv
8. Http - Hypertext transfer protocol
Logical Link Control
port 25
LLC
port 80
9. Name Of Layer 1
Physical
bus topology
management services
coax cable connector
10. Network Layer
RADIUS
OSI Layer 3
10BASE5 Limit
Lightweight Directory Access Protocol
11. Hypertext Transfer Protocol Secure
Transport
HTTPS
intrusion detection
MAC
12. Has 25 pins also commonly used with serial communication that conforms to the rs-232 standard
fiber optics
Channel
DB-25 connector
network-based IDPS (NIDPS)
13. More reliable then analog - noise doesn't affect as much - more efficient - fewer errors
router
SMTP
digital adv
coaxial cable
14. The process of attracting attention to a system by placing tantalizing information in key locations.
enticement
carrier sense
CSMACD
netstat
15. IKE
Internet Key Exchange
Phase
backbone
analog signal
16. Routers use it to identify nodes belonging to a multicast group
CSMA/CD
IGMP
Gigabit Interface Converter
ring topology
17. Frame
TCP/IP Network Access Layer Encapsulation
where NICs operate
statistical anomaly-based (stat - behavior-based) IDPS
SFP
18. Activities finalize restoration of operations to a normal state and seek to identify source and method of intrusion to ensure same type of attack cannot occur again
intrusion correction
Encrypting File System
phase
workstation
19. A far-reaching system of networks that usually extends over approximately 48 kilometers (about 30 miles) and often reaches across states and continents.
Active Directory
wide area network (WAN)
public network
footprinting
20. A TCP/Ip troubleshooting utility that displays statistics and the state of current TCP/IP connections. It also displays ports - which can signal whether services are using the correct ports.
Modulation
OSI Layer 1
netstat
fiber optic cable
21. A poplar alternative to FTP is NFS software offered by Sun Microsystems - which uses Sun's remotr procedure call specification via TCP port 111.
Network File System (NFS)
Network Time Protocol
TCP/IP Transport Layer Encapsulation
Media Dependent Interface Crossover
22. American national standards institute
ANSI
Berkeley Software Distribution
DB-25 connector
802.16
23. A term used to refer to data within the Network layer of the OSI model.
Multiplexer
Network Address Translation
Simple Mail Transfer Protocol (SMTP)
datagram
24. Method of controlling how network nodes access communication channels - ex highway
connectionless
MAC sublayer
Straight tip connector
network access method
25. An advantage of networks
networks enable users to share resources
network class a
router
bayonet nut connector (BNC)
26. Form of transmission in which signals are modulated as radiofrequency analog pulses with different frequency ranges; does not involve binary coding
kereberos
topology
Broadband
enticement
27. Event that triggers alarms and causes an IDPS to react as if a real attack is in progress
true attack stimulus
Repeater
coaxial cable
CSMA/CA
28. Process of breaking large packets into smaller packets.
directional antennas
Host
Session layer
fragmentation
29. Application Layer
fading
TCP/IP Architecture Layer 4
RIP
bandwidth
30. L2TP
HTTP
Layer 2 Tunneling Protocol
node
ICANN (Internet Corporation for Assigned Names and Numbers)
31. Documented agreement containing technical specifications or other precise criteria used as guidelines to ensure that materials - products - processes - and services suit their intended purpose
power over ethernet
::1
analog signal
standard
32. Hard-to-define skills such as dependability
IETE
ACK (acknowledgement)
soft skills
RIR (Regional Internet Registry)
33. A high-capacity communications medium that joins networks on the same floor in a building - on different floors - and across long distances.
Transport
Repeater
BNC connector
backbone
34. FDM
Frequency Division Multiplexing
bus topology
Inter Message Access Protocol (IMAP)
addressing
35. Capability for a component or system to continue functioning despite damage or malfunction
fault tolerance
OSI Layer 5
Data Circuit-Terminating Equipment
cat 5
36. Electronics industries Alliance
EIA
Virtual private network (VPN)
ISOC
ANSI
37. What early protocol allows users to access machines remotley that has no security implemented within it?
SMTP
Telnet
ANSI
Frequency Modulation
38. Several ethernet nodes can be connected and can monitor traffic or access media simultaneously
multiple access
router
Conduit
Internet Protocol Security
39. Measure of the difference between the highest and lowest frequencies that a medium can transmit
Bandwidth
server
SIP
Frequency Division Multiple Access (FDMA)
40. Physical layout of a star topology and also ring logical topology
Mechanical Transfer-Registered Jack
private network
Internet Control Message Protocol
star wired ring
41. Equals a single pulse in the digital encoding system
modem
1000base-t
LLC
Bit
42. Ethernet cable - high resistance to noise - networks are RG 6
Line Printer Remote
Challenge Handshake Authentication Protocol
802.11
coaxial cable
43. User friendly web addresses are translated into IP addresses by the...
switch
DNAT (Dynamic Network Address Translation)
transmission media
Domain Name Service
44. Computers connected together within a limited geographical area
demand priority
LAN
router
Application Layer (Layer 7)
45. Four twisted wire pairs rated for 250 MHz.
ESS
Frequency Division Multiplexing
Transport Layer Security (TSL)
Category 6
46. Theoretical. difference b/w highest and lowest frequency.
bandwidth
Static IP Addressing
Workstation
network address
47. EFS
multiprotocol label switching
Encrypting File System
reassembly
Network News Transport Protocol (NNTP)
48. Lower sublayer of the Data Link layer; appends the physical address of the destination computer onto the fram
MAC (Media Access Control) sublayer
Demultiplexer
Computer network
Optical Time Domain Reflectometer
49. The sender transmits the data to the destination without establishment of a connection.
connectionless
ports
NIC
Device power off
50. Techniques that employ hardware and software to provide assurance against equipment failures - computer service interruptions - and data loss.
Fault tolerance
TCP/IP Vs. OSI: Application
port 25
WAN