SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
IT: Networking Vocab
Start Test
Study First
Subject
:
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Computers connected together within a limited geographical area
LAN
ITU (International Telecommunication Union)
802.11a
Straight tip connector
2. A transport system that uses the CSMA/CD access method for data transmission on a network. Typically it is implemented in a bus or star-bus hybrid topology.
Repeater
terminators
Ethernet
FDM
3. A service used via the Application layer to recognize and access other layers
redirector
port 110
Class C Network
Unshielded twisted-pair (UTP) cable
4. Serves as a translator; manages data encryption
host
Local area network (LAN)
presentation layer
802.3af
5. Distinct communication path between two or more nodes; may be separated logically or physically
Channel
throughput
Gigabit Ethernet
Category 6
6. Constructs data frames using the appropriate format for the network - reatea CRC information - Checks for errors using CRC information - Retransmits data if there is error - Initiates the communications link and makes sure it is not interrupted - thu
log file monitor (LFM) IDPS
f type connector
Data Link (Layer 2)
Broadband
7. Secure Hypertext Transfer Protocol
Common Internet File System
asymmetrical transmission
802.3
S-HTTP
8. Consists of activities that deter intrusion
IEEE 802.12 Standard
MTU (maximum transmission unit)
twisted-pair cable
intrusion prevention
9. The process of attracting attention to a system by placing tantalizing information in key locations.
RTT
Internet Control Message Protocol
Broadband
enticement
10. A service on a node
IGMP
leased line
checksum
ports
11. Network segment that contains end nodes - such as workstations
multiplexing
Category 3
Populated Segment
topology
12. Honey pot that has been protected so it cannot be easily compromised
Core
datagram
padded cell
throughput
13. A system of computers - printer devices - network devices - and computer software linked by communications cabling or radio waves.
HTTPS
public switched telephone network (PSTN)
computer network
Presentation layer
14. Representatives from electronics manufacturers across the US that sets standards for electronic equipment and lobbies for legislation favorable to the growth of the computer and electronics industries
Electrical Signaling
EIA (Electronics Industries Alliance)
EMI
Secure Hypertext Transfer Protocol (S-HTTP)
15. Services that handle hardware diagnoses and failure alerts
router
star wired bus
management services
CSU/DSU
16. Speed: 100 Mbps - Alternative name: 10BASE-TX - IEEE Standard: IEEE 802.3u - Cable Type: Copper - max length 100m
Fast Ethernet (characteristics)
Remote Access Service
(fiddy) Fiber Distributed Data Interface
star-wired ring topology
17. An authentication protocol that uses public key technology to provide users with secured access to network resources.
Kerberos
route
pathping
SMF
18. Hard-to-define skills such as dependability
soft skills
monitoring port (SPAN port)
cabeloco
Hubs
19. The capacity to send and receive signals at the same time on the same medium.
Error Handling
site policy
network access method
full duplex
20. Layer 1 Troubleshooting
modem
protocol stack verification
Loose network cable connection
TCP/IP Architecture Layer 1
21. An internetwork is two or more computer networks connected together.
Data Link
networks enable users to share resources
Bit-Error Rate Test
internetwork
22. Frequency hoping spread spectrum: a signal jumps between several different frequencies
route
FHSS
Application
MAC sublayer
23. The seventh layer of the OSI model. Application layer protocols enable software programs to negotiate formatting - procedural - security - synchronization - and other requirements with the network.
broadband
Node
Application Layer
Simple Mail Transfer Protocol (SMTP)
24. ACL
amplitude
Hubs
CIDR block
Access Control List
25. Hypertext Transfer Protocol Secure
TCP/UDP
isdn
Block ID
HTTPS
26. Wavelength division multiplexing
modem
Faulty network cable
WDM
EAPoL
27. Wide area network
Application
fiber optic connector
WAN
Main Distribution Frame
28. Wireless standard
IP Addressing
802.11
RARP
Unshielded twisted pair
29. A unit of data transmitted on a network that contains control and address information corresponding to the OSI Data Link layer - or Layer 2.
frame
Session
Near End Cross Talk
network layer
30. The actual data - any communication that encodes a message
voltage
NetBIOs
signal
Internet Protocol version 4
31. Institute of Electrical and Electronics Engineers
honey pot
stateless firewall
IEEE
Point-to-Point Protocol
32. Signals travel in one direction
Segments
transmit
simplex
Internet Control Message Protocol
33. Default subnet mask for 154.13.44.87
beaconing
255.255.0.0
padded cell
ISOC
34. Short reach. only multimode-max length is 500. baseband transmission. 1000 mpbs.
Firewall configured correctly
ICANN (Internet Corporation for Assigned Names and Numbers)
1000base-sx
Client Software
35. A drawback of certification
POP3 (Post Office Protocol - version 3)
VLAN
Primary Rate Interface
certification value may be lessened due to the number of people obtaining them
36. Ethernet LAN-all forms of Ethernet media and interface
IGMP
802.3
SMF
roaming
37. Performs name resolution
Session
Authentication Header
modem
OSI model
38. Netscape and Microsoft have implemented HTTPS to protect data transported via their Web browsers.
Hypertext Transfer Protocol Secure (HTTPS)
FTP
Universal serial bus
Presentation
39. Transport protocol and TCP/IP port that uses telnet utility use
fading
twisted-pair cable
FTP
TCP port 23
40. Network Access Layer
public network
TCP/IP Architecture Layer 1
Terminator
Simple Mail Transfer Protocol (SMTP)
41. A single physical/non-physical medium for connecting computers
fragmentation
encryption
medium
SMTP
42. ICA
whois
Gigabit Ethernet (fiber characteristics)
partially distributed control strategy
Independent Computer Architecture
43. Package for data that includes not only the data - or 'payload -' but also the sender's and recipient's addressing and control information. Generated at the Data Link layer and issued to the Physical layer
Fast Ethernet
TCP/IP Vs. Netware: Network Access
stateful protocol analysis (SPA) IDPS
frame
44. Crimp into pins 1 and 2 of RJ 45 connector
Optical Time Domain Reflectometer
white/orange and orange
fading
headened
45. Layer 5 through 7 Troubleshooting
analog dis
configured with correct sending and receiving email server information
Modulation
Secure Shell (SSH
46. A computer that accesses another computer - such as a workstation that accesses a shared file on another workstation - server - or mainframe. The client may use the accessed computer (host) to process data - or may process accessed data using its own
Presentation
OSI
socket
client
47. Amplitude - frequency (Hz) - wavelength - wavy line
analog signal
Data Circuit-Terminating Equipment
FHSS
extranet
48. PAP
bus topology
false positive
Password Authentication Protocol
MMF
49. In TCP - a term used to describe a TCP header and its encapsulated data (also called an L4PDU). Also in TCP - the process of accepting a large chunk of data from the application layer and breaking it into smaller pieces that fit into TCP segments. In
Segment
analog adv
Application Layer (Layer 7)
LAN
50. User friendly web addresses are translated into IP addresses by the...
twisted shielded pair
Domain Name Service
rj-45
International Organization for Standardization (ISO)