SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
IT: Networking Vocab
Start Test
Study First
Subject
:
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Protocol used to transfer mail between a send mail server and microsoft exchange server
Block ID
OSI Layer 5
router
POP3
2. Integrated digital network
10BASE2 Limit
CIDR block
isdn
ports
3. Process in which an NIDPS look for invalid data packets - packets that are malformed under the rules of the TCP/IP protocol
ethernet
protocol stack verification
802.5
MAN
4. Analog - only one direction. radio frequency analog waves w differences in frequency. expensive - longer distance. ex. cable TV
Attenuation
footprinting
Presentation Layer
broadband
5. A cable TV company - such as Comcast Broadband.
port 443
Loose network cable connection
cabeloco
Mesh topology
6. Data only
logical link control (LLC)
goodput
IMAP4 (Internet Message Access Protocol - version 4)
the higher the frequency
7. RADIUS
Remote Authentication Dial-In User Service
FDM
RFI
social engineering
8. Modulation technique in which the amplitude of the carrier signal is modified by the application of a data signal
Ethernet (characteristics)
multiplexing
802.16
Amplitude Modulation
9. Frequency division multiplexing
FDM
Internet
crossover cable
Class B Network
10. A boundary between two zones of trust
Lightweight Directory Access Protocol
perimeter
Host
modem
11. CIFS
ISP (Internet service provider)
terminators
twisted shielded pair
Common Internet File System
12. IMAP - internet message access protocol
encapsulate
port 143
encapsulate
port 53
13. In CIDR notation - the number of bits used for an extended network prefix. For example - the CIDR block for 199.34.89.0/22 is /22
CIDR block
broadcast frame or broadcast packet
ISDN
Application
14. TFTP is a TCP/IP file transfer protocol that is designed for task such as the transfer of data to enable a diskless workstation to boot using files trasmitted from a server
RS 232
network-based IDPS (NIDPS)
Trivial File Transfer Protocol (TFTP)
MMF
15. Used by web browser and web servers to exchange files
STP
Hyper Text Transfer Protocol (HTTP)
MAC address
RADIUS
16. The capacity to send and receive signals at the same time on the same medium.
TFTP
full duplex
footprinting
Bits
17. Private connection from a LAN to an internet service provider.
coaxial cable
star topology
802.44
dedicated lines
18. A network on which any computer can communicate with other networked computers on an equal (peer) basis without going through an intermediary - such as a server. Peer-to-peer networking enables each computer to offer and access shared resources - suc
EMI
Network
Peer-to-peer network
intrusion reaction
19. Secure sockets layer-encyrpts TCP/IP transmission including web forms- en route b/w the client server using public key encryption technology
header
ssl
cabeloco
Organizational Unit
20. Method of trasmitting data from a satellite
microwave
physical address
cp connection
trap and trace
21. IDPS that examines network traffic in search of patterns that match known signatures
Internet
cross talk
signature-based (knowledge-based - misuse-detection) IDPS
Intermediate Distribution Frame
22. PPP
public network
Point-to-Point Protocol
Application layer
802.16
23. Lower sublayer of the Data Link layer; appends the physical address of the destination computer onto the fram
MAC (Media Access Control) sublayer
MAU
Kerberos
American Standard Code for Information Interchange (ASCII)
24. Failure of an IDPS to react to an actual attack event
Serial
analog adv
false negative
Mail Exchanger
25. EMI interference induced on one cable by signals traveling on a nearby cable
Simple Mail Transfer Protocol (SMTP)
Class E Network
Alien Cross Talk
802.3af
26. Application Layer
Conduit
ISP (Internet service provider)
SMTP
whois
27. F type (like TV cable) or BNC (crimped)
coax cable connector
ring topology
intrusion detection system (IDS)
packet filtering - application proxy
28. Basic service set: a group of stations that share an access point
IMAP4 (Internet Message Access Protocol - version 4)
Default Gateway
Internet Key Exchange
BSS
29. Routers work here
Network
10Gbase-t
token
mesh topology
30. Max size of data units on Ethernet networks
1550bytes
Secure Sockets Layer (SSL)
Line Printer Daemon
EIA (Electronics Industries Alliance)
31. Regular voice-grade telephone service.
client/server
Category 5
Internet Protocol
plain old telephone service (POTS)
32. CSU
CRC (cyclic redundancy check)
Regeneration
Channel Service Unit
port 443
33. A protocol data unit that has been transfered between OSI layers and then stripped of control information and transfere instructions.
packet filtering - application proxy
service data unit (SDU)
SIP
star-ring hybrid topology
34. A network owned and maintained by an organization -such as a campus network operated by a college.
Data Link
Simple Mail Transfer Protocol (SMTP)
private network
reflection
35. AMI
NNTP
bayonet nut connector (BNC)
Alternate Mark Inversion
application protocol verification
36. Open source program that allows you too remotely take over another workstation and walk through support process
IGMP
Session
RAS
RealVNC
37. Used to log on to a UNIX host
network class a
telnet
POP3 (Post Office Protocol - version 3)
fiber optic cable
38. Technique for formatting signals in which one property of a carrier wave is modified by the addition of a data signal during transmission
telephone connector
NetBIOs
MMF
Modulation
39. A drawback of certification
amplitude
certification value may be lessened due to the number of people obtaining them
Alien Cross Talk
port 21
40. Process of directing a datagram from its source through an internetwork to its destination using the most efficient path.
IP address within the assigned network
routing
Data Circuit-Terminating Equipment
ATM
41. Any device connected to a network - such as a microcomputer - mainframe - midrange computer - network equipment - or printer. Also called a station.
driver
node
packet filtering - application proxy
Address Resolution Protocol (ARP)
42. NTP - network time protocol
port 123
802.11g
Active Directory
management services
43. Which protocol is responsible for splitting data into packets and adding a header to each one?
Transmission Control Protocol
spread-spectrum
Data Link (Layer 2)
NFS
44. This layer in the OSI network model manages log on procedures and password recognition.
data packets
Session Layer
Internet Protocol
Hypertext Transfer Protocol Secure (HTTPS)
45. A technique for connecting to a network at a remote location using Internet as the medium.
Hyper text transfer protocol
LDAP
VPN
Ferrule
46. Useful for troubleshooting a network connectivity problem from workstation to another workstation
wide area network (WAN)
twisted pair connector
crossover cable
Network interface card (NIC)
47. A type of transmission in which the entire channel capacity of the communications medium (such as cable) is used by one data signal - enabling only one node to transmit at a time.
baseband
Data Link
Full-Duplex
CSMA/CD
48. A type of transmission that can vary continuously - as in a wave pattern with positive and negative voltage levels.
Kroner
802.11
Domain Name System (DNS)
analog
49. AH
Hubs
frame
ARP
Authentication Header
50. Subgroup of EIA that focuses on standards for information technology - wireless - satellite - fiber optics - and telephone equipment; best known for network cable installation guidelines (TIA/EIA 568-B Series)
monitoring port (SPAN port)
asynchronous comunications
TIA (Telecommications Industry Association)
ring topology