Test your basic knowledge |

IT: Networking Vocab

Subject : it-skills
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. RADIUS






2. The most commonly used form of Post office protocol.






3. The NIC and network equipment are set up so that they have the capacity to send and receive simultaneously. which is possible because od buffering at the NIC.






4. Signals travel both directions simultaneously






5. Crimp into pins 1 and 2 of RJ 45 connector






6. FTP is an application that enables the transfer of data from one remote device to another - using TCP/IP






7. The IEEE standard for token ring networking devices and data handling.






8. Vulnerability created in a system by a virus or worm which allows the attacker to access the system at will with special privileges.






9. GPO






10. SSH






11. Satellite used for broadband internet access






12. Also called coax - a network cable medium that consists of a copper core - surrounded by insulation.






13. A value or means of identifying a service on a network node - such as socket or port 103 for standerdized e-mail services in the TCP protocol.






14. Ensures that messages being transmitted on the internet are private and tamper proof






15. Slow wireless standard 11-18 throughput






16. IRC






17. File Transfere Protocol






18. Network news transfer protocol






19. A connector that is used for thin coax cable and that has a boyonet-like shell.






20. IEEE 802.2 Logical Link Control (LLC) sublayer of the data link layer






21. SMF






22. A network design consisting of a continuous path for data with no logical beginning or ending point - and thus no terminators.






23. Gives each node unique address






24. 2nd layer; bridges the networking media with the Network layer. Primary function is to divide the data it receives from the Network layer into frames to be transmitted by the Physical layer






25. Control frame that indicates to the rest of the network that a particular node has the right to transmit data






26. Algorithm used to verify the accuracy of data contained in a data frame






27. Useful for troubleshooting a network connectivity problem from workstation to another workstation






28. Initiates the communication link - Makes sure the communication link is maintained - Determines which node transmits at any point in time - such as which one transmits first - Disconnectd when a communication session is over - Translates node address






29. Address Resolution Protocol






30. The process of validating a user.






31. A network design built by running cable from one PC of file server to the next - like links in a chain.






32. The number of times a signal's amplitude changes over a fixed period of time - expressed in cycles per second - Hz






33. It enables the sending node to obtain the MAC address of the intended recipient before packets are sent.






34. Synchronises data exchange






35. A permanent telephone connection between 2 locations that provide a predetermined amount of bandwidth at all times






36. Layer 5






37. 6th layer; protocols translate between Application and Network layers; data are formatted so that the network can understand - with the format varying according to the type of network; manages data encryption and decryption - such as scrambling of sy






38. Each node passively listens for then accepts data






39. Provides service that ensure accurate and timely delivery of network communications between two hosts






40. Used with single mode or multi mode fiber optic cable






41. A single computer that provides extensive multiuser access to network resources - such as shared files - shared disks - and shared printers.






42. A series of interconnected computers - printing devices - and other computer equipment that shares hardware and software resources. The service area usually is limited to a given office area - floor - or building.






43. Network cable that contains pairs of insulated wires that are twisted together and surrounded by a shielding material for added EMI and RFI protection - all inside a protective jacket.






44. The part of a network to which segments and significant shared devices connect






45. 2nd set of characteristics that make up a device's MAC address. Added at the factory and is based on the device's model and manufacture date






46. Device typically used to create a VLAN






47. MAC address






48. Process of breaking large packets into smaller packets.






49. This layer in the OSI network model manages log on procedures and password recognition.






50. Failure of an IDPS to react to an actual attack event