Test your basic knowledge |

IT: Networking Vocab

Subject : it-skills
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Term that describes current anti-intrusion technologies






2. Honey pot that has been protected so it cannot be easily compromised






3. Specify clients configurations to adhere to this subnet






4. Delay between the transmission of a signal and its receipt






5. Process in which an NIDPS inspects the higher-order protocols (HTTP - FTP - Telnet) are examined for unexpected packet behavior or improper use






6. 5 segments b/w two nodes - 4 repeating devices - and 3 segments connected by two repeating devices






7. Unique identifying number for a network node; follows a hierarchical addressing scheme; can be assigned through OS software; added to data packets and interpreted by protocols at the Network layer






8. Zeroconf






9. NNTP






10. Network layer service that subdivides segments it receives from the Transport layer into smaller packets






11. PAP






12. The oldest type of network design - this topology consists of multiple nodes attached to a central hub - switch - or router.






13. Services that allow remote users to connect to the network






14. Can use WPA to improve the security of data in transit






15. Not-for-profit agency that manages distribution of IP addresses; ARIN for Americas and Sub-Saharan Africa - APNIC for Asia-Pacific - RIPE for Europe and North Africa






16. Measure of a signal's strength






17. Determines the network path on which to route packets - Help reduce network congestion - Establishes virtual circuits - Routes packets to other networks - resequencing packet transmissions when needed - Translates between protocols






18. The seventh layer of the OSI model. Application layer protocols enable software programs to negotiate formatting - procedural - security - synchronization - and other requirements with the network.






19. A utility for viewing or modifying a host's routing table






20. Serial internet protocol






21. Open source program that allows you too remotely take over another workstation and walk through support process






22. RDP






23. Packet one node sends to request a connection with another; 1st of three-step process of establishing a connection






24. SMF






25. Allows you and eight coworkers to share a single internet routable IP address






26. Port used during a domain name lookup






27. Round time trip. time it takes for packet to get from sender to receiver and back






28. Multiple physical/non-physical mediums for connecting computers






29. Faster networking and inexpensive - flexible - easy to install






30. Firewalls perform two basic security functions






31. On a cable-TV WAN - a central receiving point for signals from various sources - including satellite - major cable sources - and local tevevision sources.






32. A data communications technique that transmits a packet directly from the sending node - though a switch - and to the receiving node - without passing though other network nodes.






33. Saturation of network bandwidth caused by excessive traffic - as when a large number of computers or devices attemp to transmit simultaneously - or when computers or devices presist in transmitting repeatedly.






34. Ethernet NICs listen on network and wait until they detect no other nodes transmitting data






35. Name Of Layer 2






36. The number of times a signal's amplitude changes over a fixed period of time - expressed in cycles per second - Hz






37. Network Layer






38. The process of reconstructing segmented data






39. Layer 1 Troubleshooting






40. Requires many pulses to transmit same info that an analog can transmit in a wave






41. Secures messages being transmitted on the internet - uses RSA for authentication and encyption.






42. CIFS






43. A computer that has its own CPU and may be used as a stand-alone computer for word processing - spreadsheet creation - or other software applications. It also may be used to access another computer such as another workstation or server via a network.






44. Type of protocol useful when data must be transferred quickly






45. MMF






46. Ensures that messages being transmitted on the internet are private and tamper proof






47. PPPoE






48. Signals on bus that would travel endlessly between two nodes






49. Layer 6






50. Layer 1 Troubleshooting