SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
IT: Networking Vocab
Start Test
Study First
Subject
:
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Bus topology: A network design built by running cable from one PC or file server to the next - like links in a chain.
RTS/CTS
Bus topology
soft skills
Boot Protocol /Bootstrap Protocol
2. Brief delay in processing - length of cable can contribute to this
latency
Presentation Layer
Post Office Protocol 3 (POP3)
crossover cable
3. Signals travel in both directions but only one at a time
Transport
Category 6
half duplex
Port 20
4. A series of interconnected computers - printing devices - and other computer equipment that shares hardware and software resources. The service area usually is limited to a given office area - floor - or building.
beaconing
Local area network (LAN)
SMTP (Simple Mail transfer Protocol)
reflection
5. Wide area network
event viewer
Kerberos
vampire tap
WAN
6. A protocol data unit that has been transfered between OSI layers and then stripped of control information and transfere instructions.
dedicated lines
transport layer
Session
service data unit (SDU)
7. 2nd layer; bridges the networking media with the Network layer. Primary function is to divide the data it receives from the Network layer into frames to be transmitted by the Physical layer
protocol
twisted-pair cable
local area network (LAN)
Data Link layer
8. An 8-bit character-coding method consisting of 96 uppercase and lowercase characters and numbers - plus 32 nonprinting characters.
star-wired bus topology
American Standard Code for Information Interchange (ASCII)
LAN
IP gateway in NAT
9. Each node passively listens for then accepts data
Local Connector
passive topology
enterprise network
Subnetmask
10. IRC
1550bytes
authentication
Internet Relay Chat
Mail Exchanger
11. The act of hacking into a hacker's system to find out as much as possible about the hacker
back hack
Network Address Translation
step-index multimode fiber-optic cable
5-4-3 rule
12. The means through which data is transmitted and received
reassembly
trap and trace
transmission media
TIA
13. A type of address translation in which each private IP address is correlated with its own Internet-recognized IP address.
fragmentation
SNAT (Static Network Address Translation)
Data Link
RIR (Regional Internet Registry)
14. Internet group management protocol
management services
IGMP
Network interface card (NIC)
IEEE
15. Is associated with unix/linux networks
ppptp
Network Time Protocol
OSI Reference to TCP
Secure Copy
16. Multiple physical/non-physical mediums for connecting computers
Media Converter
configured with correct sending and receiving email server information
media
point to multipoint
17. A worldwide network of interconnected LANs and MANs that uses the TCP/IP protocol to enable people to shares e-mail messages and computer files and to access a vast array of information.
Frequency Division Multiple Access (FDMA)
Internet
false positive
router
18. Device that boosts - or strengthens - and analog signal
port 69
TDMA
Amplifier
Application Layer (Layer 7)
19. SCP
Integrated Services Digital Network
soft skills
Secure Copy Protocol
HTTP (Hypertext Transfer Protocol)
20. A process in which a digital signature is placed in a driver. The digital signature helps ensure that the driver is tested and is compatible with the operating system and device for which it is written.
driver signing
network monitor
Entrance Facilities
station
21. Simple Mail Transfer Protocol
Regeneration
SMTP
broadband
Network
22. A gateway that operates on the Internet backbone.
twisted shielded pair
goodput
Core Gateway
Bit-Error Rate Test
23. What early protocol allows users to access machines remotley that has no security implemented within it?
Telnet
BNC connector
ppp
lpr filename
24. Can use WPA to improve the security of data in transit
Incorrect cable type
802.11b
TCP/IP Vs. Netware: Application
PPP
25. Compatible with 802.11a - b - g 600-65 throughput
RFI
To stop the Hamburgerler from stealing all of Ronnie McDonalds burgers
802.11n
ADSL
26. A mail retrieval protocol that improves on the shortcomings of POP. The single biggest advantage IMAP4 has relative to POP is that it allows users to store messages on the mail server - rather than always having to download them to a local machine.
POP3
IMAP (Internet Message Access Protocol)
switch
802.44
27. Device that processes signals; multiplexer or modem
FTP
Data Circuit-Terminating Equipment
Lightweight Directory Access Protocol
Post Office Protocol
28. Layer 3 Troubleshooting
TCP/IP protocol failure
Correct subnet mask
stp
PAT (Port Address Translation)
29. An international organization of scientists - engineers - technicians - and educators that plays a leading role in developing standards for network cabling and data transmissions.
Institute of Electrical and Electronics Engineers (IEEE)
Physical Layer (Layer 1)
TCP/IP Architecture Layer 4
Trivial File Transfer Protocol (TFTP)
30. PDC
SONET
Primary Domain Controller
PAT (Port Address Translation)
Data Link
31. The device inside a computer that connect a computer to the network media
DB-9 connector
checksum
signal
NIC
32. A specialized UN agency that provides developing countries with technical expertise and equipment
fault tolerance
Populated Segment
Internet
ITU
33. IEEE 802.2 Logical Link Control (LLC) sublayer of the data link layer
IPSec
Common Internet File System
ICAN
802.2
34. Strategy that combines the best of the other two strategies; while individual agents still analyze and respond to local threats - their reporting to a hierarchical central facility enables the organization to detect widespread attacks
partially distributed control strategy
Transport Layer
fault tolerance
protocol
35. Set of protocols that specify how wireless networks works. Most common are currently B and G. N is an emerging standard.
Transmission Control Protocol
802.11
tuning
OSI Layer 2
36. Refers to the IEEE 802.3z and IEEE 802.3ab standard for Ethernet communications speed up to 1 Gbps.
Gigabit Ethernet
Secure File Transfer Protocol (SFTP)
Kroner
Baseband
37. Internet control message protocol
reflection
Channel Service Unit
ICMP
802.3
38. HTTPS - Secure implementation of HTTP
EAPoL
Transport
Remote Terminal Emulation (Telnet)
port 443
39. A fixed number associated with a device's NIC
evasion
L2TP
IEEE
logical address
40. TCP is a Layer 4 protocol (Due to the close match or the OSI Transport Layer and TCP within the TCP/IP Transport Layer.
OSI Reference to TCP
Physical Layer (Layer 1)
flow control
Client
41. Crimp into pins 1 and 2 of RJ 45 connector
white/orange and orange
reassembly
RS 232
Internet
42. Hard-to-define skills such as dependability
soft skills
ppptp
RS 232
Single Mode Fiber
43. A data encryption technique employed between a server and a client - such as between a client's browser and an Internet server.
Secure Sockets Layer (SSL)
terminator
NIC
ISO
44. Vulnerability created in a system by a virus or worm which allows the attacker to access the system at will with special privileges.
back door
Network interface card (NIC)
FDM
coaxial cable
45. Unshielded twisted pair
utp
baseband
true attack stimulus
tracepath
46. Virture privat network
15 hops
VPN
star topology
Secure Shell (SSH
47. A TCP/IP utility that allows you to look up the DNS host name of a network node by specifying its IP address - or vice versa. This is useful for verifying that a hos is configured correctly and for troubleshooting DNS resolution problems
broadband
Domain Name Service
AM
nslookup
48. A private network that functions like a tunnel through a larger network
signal bounce
Virtual private network (VPN)
802.11n
encryption
49. Divides channel into different time slots and assigns data to nodes who are attached to time slots
link establishment phase
traceroute (tracert)
TCP/UDP
TDM
50. An advantage of networks
Serial
Physical layer
networks enable users to share resources
network class C