SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
IT: Networking Vocab
Start Test
Study First
Subject
:
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A data communications technique that transmits a packet directly from the sending node - though a switch - and to the receiving node - without passing though other network nodes.
demand priority
Institute of Electrical and Electronics Engineers (IEEE)
roaming
fixing cross talk
2. Data Link Layer
Alien Cross Talk
Mac Addressing
Category 3
TCP/IP Architecture Layer 1
3. A network on which any computer can communicate with other networked computers on an equal (peer) basic without going though an intermediary - such as a server. Peer-to-Peer networking enables each computer to offer and access shared resoures - such
Simple Mail Transfer Protocol (SMTP)
peer-to-peer network
Domain Name
multiprotocol label switching
4. Connectivity device - data link layer (2) - reads header info to forward packets according to MAC addresses
ICMP
public switched telephone network (PSTN)
bridge
Mesh topology
5. On a cable-TV WAN - a central receiving point for signals from various sources - including satellite - major cable sources - and local tevevision sources.
ICS host
802.11g
IP address within the assigned network
headened
6. Small network 192-223
Domain Name
narrowband
Class C Network
Port Numbers
7. Strategy that combines the best of the other two strategies; while individual agents still analyze and respond to local threats - their reporting to a hierarchical central facility enables the organization to detect widespread attacks
RIP
partially distributed control strategy
evasion
ADSL
8. Describes the relative strength over a three dimensional area of an antenna
EAPoL
radiation pattern
Subnetmask
Phase
9. A resistor that is connected to the end of a segment on a bus network - so that data-carrying signals are absorbed at the point where the segment stop. Aborbing the signals ensures they are not reflected back onto the cable after they reach the end-t
proxy server
routing
terminator
PDU (protocol data unit)
10. ACL
Gigabit Interface Converter
Secure Shell (SSH)
Access Control List
connectionless
11. A device that can transmit and receive - such as transmitting and receiving signals on a communication cable
DB-25 connector
transceiver
intrusion detection
authentication
12. Loop back address for IPv6
::1
workstation
Peer-to-peer network
Simple Mail Transfer Protocol (SMTP)
13. Method of error checking that determines if the contents of an arriving data unit match the contents of the data unit sent by the source
backbone
checksum
NetWare Directory Services
IGMP
14. Helps you identify percentage of traffic that compromises broadcasts
digital signal
network monitor
OSI
soft skills
15. Offers one way for a computer to access another computer over the network or over the Internet. For example - an IBM programmer can use Telnet on a Windows XP or Red Hat Enterprise Linux computer to access a mainframe though the Internet
Telnet
File Transfer Protocol
fingerprinting
logical link control (LLC)
16. IEEE standard for Ethernet devices and data handling
802.3
TCP/IP Network Access Layer Encapsulation
power budget
10Gbase-t
17. Controls how applications access network
phishing
Presentation layer
Application
padded cell
18. A type of point-to-point digital WAN connection that uses standard phone lines to provide high-speed comm.
Client Software
OSI Layer 6
Network
DSL
19. Institute of Electrical and Electronics Engineers
IEEE
honey pot
fiber optic connector
Secure Copy Protocol
20. Network interface card
IGMP
frame
traceroute (tracert)
NIC
21. Device that receives and retransmits microwave data signals
satellite
Nonbroadcast Point-to-Multipoint Transmission
File Transfere Protocol - (FTP)
fixing cross talk
22. LPD
WAN
Frames
Media Dependent Interface Crossover
Line Printer Daemon
23. A thin coaxial cable usually RG-58
::1
Thin Eterhnet/10 Base 2
client/server
node
24. Used by web browser and web servers to exchange files
digital dis
peer-to-peer network
Hyper Text Transfer Protocol (HTTP)
tracert
25. Direct-sequence spread spectrum: signal bits are distributed over a frequency band
DSSS
FTP
Broadband
Presention Layer (Layer 6)
26. A remote connection where the client computer is a low-end computer that communicates with a terminal server.
Hypertext Transfer Protocol (HTTP)
thin client computing
Channel Service Unit
Data Circuit-Terminating Equipment
27. Network-max segment length-100 meters
Ring topology
15 hops
10Base-T
PSTN
28. ICS
Internet Connection Sharing
Ethernet
bus topology
IP (Internet Protocol)
29. Trivial File Transfer Protocol
Line Printer Remote
HTTP
LLC
TFTP
30. Hardware device typically used to connect multiple LANs
router
ITU (International Telecommunication Union)
Networking Model
telnet
31. Also called the star-wired ring topology - a network design in which the logic communication are in a ring - but the phyical layout of the network star.
star-ring hybrid topology
standby UPS
IANA (Internet Assigned Numbers Authority)
router
32. Max number of hops a packet can take b/w its source and destination using RIP on a LAN
network class a
15 hops
Physical
Firewall configured correctly
33. TFTP is a TCP/IP file transfer protocol that is designed for task such as the transfer of data to enable a diskless workstation to boot using files trasmitted from a server
attenuation
Protocol Data Unit
Trivial File Transfer Protocol (TFTP)
Cross Talk
34. The seventh layer of the OSI model. Application layer protocols enable software programs to negotiate formatting - procedural - security - synchronization - and other requirements with the network.
Application Layer
protocol and services
physical media
MultiStation Access Unit
35. SSH
telnet
Secure Shell
802.11n
Point-to-Point Protocol over Ethernet
36. IEEE standard describing specifications for wireless transmissions
802.11
Session Layer
TCP/IP Transport Layer Encapsulation
BOOTP
37. Regular voice-grade telephone service.
Data Link
1550bytes
File Transfer Protocol
plain old telephone service (POTS)
38. Each node passively listens for then accepts data
Full Duplex NIC Communication
cabeloco
switch
passive topology
39. Method of data modulation in which the frequency of the carrier signal is modified by the application of the data signal
grade-index multimode fiber-optic cable
Frequency Modulation
Demultiplexer
TFTP
40. Application Layer
router
monitoring port (SPAN port)
OSI Layer 7
multiprotocol label switching
41. Assigning a placeholder to each piece of a block of data to allow the receiving node's Transport layer to reassemble the data in the correct order
EAP
sequencing
DTE
ATM
42. Layer 1
Physical
IDPS terrorist
router
TCP/IP Vs. OSI: Application
43. A Data Link sublayer that examines addressing information contained in a network frame and controls how devices share communications on the same network.
IMAP4 (Internet Message Access Protocol - version 4)
media access control (MAC)
TCP/UDP
TDM
44. Knows which VLAN a stream of data belongs to by reading a tad added to each frames header
server
switch
Application Layer
TCP/IP Vs. Netware: Application
45. Is used to enable IP address to be assigned automatically by a DHCP server on a network.
network class B
10Gbase-t
Primary Domain Controller
Dynamic Host Configuration Protocol (DHCP)
46. Connection for data exchange between two parties
session
ppp
host-based IDPS (HIPDS)
firewall
47. Process by which attacker changes the format and/or timing of their activities to avoid being detected by the IDPS
PDU (protocol data unit)
fading
evasion
Connectors
48. Serial internet protocol
connectionless
Integrated Services Digital Network
reassembly
slip
49. System founded on using 1s and 0s to encode information
Transport
802.11b
Binary
Transport Layer
50. Strength of digital signal
WAN
Adjacent Layer Interaction
voltage
Data Link (Layer 2)