SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
IT: Networking Vocab
Start Test
Study First
Subject
:
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Which protocol provides the user with many functions of the world wide web?
CSMA/CD
port 25
Internet Relay Chat
Hyper text transfer protocol
2. Term that describes current anti-intrusion technologies
WAN Connectivity
Incorrect device drivers
intrusion detection/prevention system (IDPS)
WAN
3. Transport Layer
radio frequency interference (RFI)
OSI Layer 4
Telnet
sequencing
4. Transforms data into a form network or applications will understand
slip
File Transfere Protocol - (FTP)
enterprise network
Presentation
5. Value placed upon an IDPS's ability to detect/identify certain attacks correctly
TCP/IP Architecture Layer 1
Fiber Distributed Data Interface (FDDI)
confidence value
MMF
6. Routing protocol most likely used to replace a router for that handles traffic to and from the companies connection to its NSP
bandwidth
BGP
Transport Layer (Layer 4)
network address
7. Open source program that allows you too remotely take over another workstation and walk through support process
CSMA/CA
RealVNC
Loose network cable connection
switch
8. Translated network addresses into their physical counterparts
FDM
Secure File Transfer Protocol
Application
network layer
9. Data only
RADIUS
goodput
point to multipoint
encapsulation
10. Encompasses actions an organization takes when intrusion is detected
Static IP Addressing
Transport
intrusion reaction
Mac Addressing
11. CIFS
star wired bus
Asymmetric Digital Subscriber Line
Common Internet File System
Canonical Name
12. Internet assigned numbers authority
IEEE
IANA
Alternate Mark Inversion
connectivity device
13. Event that triggers alarm when no actual attack is in progress
Cable Plant
false attack stimulus
application protocol verification
Frequency Modulation
14. PPTP
Point-to-Point Tunneling Protocol
PDU (protocol data unit)
network-based IDPS (NIDPS)
ports
15. Allows for secure interactive control of remote systems
Secure Shell (SSH
Physical
PSTN
collision detection
16. Name Of Layer 5
Session
Metropolitan area network (MAN)
packet
pathping
17. A gateway that operates on the Internet backbone.
Core Gateway
802.5
HTTPS
Frames
18. SSID
ICAN
Basic Rate Interface
Service Set Identifier
Access Control List
19. Small Form Plug-gables - Plugs in to an interface on a switch
SFP
Half Duplex NIC Communication
multipath
SSL
20. A term referring to a data-link header and trailer - plus the data encapsulated between the header and trailer.
port 123
fiber optic cable
Frame
ethernet
21. A Data Link sublayer that examines addressing information contained in a network frame and controls how devices share communications on the same network.
link dead phase
phase
media access control (MAC)
SNMP
22. Wide area network
Same Layer Interaction
Simple Network Management Protocol (SNMP)
Data Service Unit
WAN
23. QoS technique enables packet switches technologies to travel over traditionally circuit switched connections
Client
MPLS
Password Authentication Protocol
Remote Terminal Emulation (Telnet)
24. IEEE 802.3 Media Access Control (MAC) sublayer of the data link layer
802.3
HTTPS
Cladding
TCP/IP Network Access Layer Encapsulation
25. Which layer in the OSI is responsible for routing and controling the flow of packets around the network?
simplex
carrier sense
Network Layer
terminal
26. Time Division Multiple Access
Point-to-Multipoint
TDMA
NTP
back hack
27. Is used to enable IP address to be assigned automatically by a DHCP server on a network.
DSLAM
Dynamic Host Configuration Protocol (DHCP)
twisted shielded pair
fragmentation
28. Standards organizations representing 157 countries headquartered in Geneva. Goal is to establish international standards to facilitate global exchange of information and barrier-free trade
Server
enticement
ISO (International Organization for Standardization)
Dynamic Host Configuration Protocol (DHCP)
29. Reflection in multiple different directions of a signal
Terminator
scattering
bayonet nut connector (BNC)
Mesh topology
30. Max number of hops a packet can take b/w its source and destination using RIP on a LAN
CSMA/CD
802.11
Nonbroadcast Point-to-Multipoint Transmission
15 hops
31. A network whose access is restricted to only clients or machines with proper credentials.
Connectors
encapsulate
Private Network
Quality of Service
32. This layer in the OSI network model manages log on procedures and password recognition.
port 53
narrowband
Session Layer
ethernet
33. A transmitter concentrates the signal energy at a single frequency or in a very small range of frequencies
slip
narrowband
ITU
OSI Reference to TCP
34. IP
omnidirectional antenna
User Datagram Protocol
Adjacent Layer Interaction
Internet Protocol
35. A standard method or format for communication between networked devices
statistical multiplexing
star topology
protocol
Populated Segment
36. Trivial file transfer protocol
logical address
Full Duplex NIC Communication
TFTP
OSI (Open Systems Interconnection) model
37. Establishes maintains and terminates connections
Session
MAC address
broadcast storm
IEEE (Institute of Electrical and Electronics Engineers)
38. MX
Mail Exchanger
Asymmetric Digital Subscriber Line
ANSI (American National Standards Institute)
RIR (Regional Internet Registry)
39. A computer that provides client stations with access to files and printers as shared resources to a computer network
server
Category 5e
FTP
Telnet
40. A command-line utility that combines the functionality of the tracert and ping commands (similar to UNIX's mtr command) and comes with Windows XP - Vista - and Windows Server 2003 and Server 2008
Point-to-Point Tunneling Protocol
Node
PSTN
pathping
41. Is used to allow searching and updating of a directory service
Simple Network Management Protocol
multiprotocol label switching
Light Weight Directory access protocol (LDAP
alien cross talk
42. An IP addressing convention that adheres to network class distinctions - in which the first 8 bits of a Class A address - the first 16 bits of a Class B address - and the first 24 bits of a Class C address are used for network Information
rj-11
Password Authentication Protocol
Cladding
Classful Addressing
43. Used to resolve NetBIOS names w IP address
WINS
supernet
intrusion prevention
extranet
44. Traces path from one network node to another - identifying all intermediate hops b/w two nodes
dig (domain information groper)
DNS
tracert
Flow Control
45. Determines the network path on which to route packets - Help reduce network congestion - Establishes virtual circuits - Routes packets to other networks - resequencing packet transmissions when needed - Translates between protocols
multimeter
Network Layer (Layer 3)
star wired bus
protocol
46. A series of interconnected computers - printing devices - and other computer equipment that share hardware and software resources. The services area usually is limited to a given office - floor - or building.
Modem
plenum cables
driver
local area network (LAN)
47. Equivalent to OSI Layer 4 Transport
CD-ROM File System
synchronous communications
Physical Layer (Layer 1)
TCP/IP Vs. OSI: Transport
48. Signals travel both directions simultaneously
duplex
fault tolerance
Transport
stateful firewall
49. CNAME
802.3
Canonical Name
Wide area network (WAN
Internet Group Multicast Protocol
50. A protocol that runs in the Dession and Transport layers of the OSI model and associates NetBIOS names with workstations. NetBIOS alone is not routable because it does not contain Network Layer information. However - when encapsulated in another prot
NetBIOs
partially distributed control strategy
Bits
Radio Waves