SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
IT: Networking Vocab
Start Test
Study First
Subject
:
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. An authentication protocol that uses public key technology to provide users with secured access to network resources.
ISOC (Internet Society)
bus topology
Kerberos
802.2
2. A type of cabling that includes pairs of copper conductors - twisted around each other - inside a metal or foil shield. This type of medium can support faster speeds than unshielded wiring
TCP/IP Vs. Netware: Network Access
alarm filtering
Shielded Twised Pair
half duplex
3. Shielded twisted pair
OSI Layer 4
stp
Repeater
topology
4. Produces guidelines for how network cable should be installed in commercial buildings
IEEE (Institute of Electrical and Electronics Engineers)
Organizational Unit
EIA/TIA
the higher the frequency
5. The pattern used to install a network medium
Networking Model
topology
radio frequency interference (RFI)
Bandwidth
6. Communications cable that has no shielding material between the pair of insulated wires twisted together and the cable's outside jacket.
server
whois
Unshielded twisted-pair (UTP) cable
Media Dependent Interface
7. Unit of data at any layer of the OSI model
PDU (protocol data unit)
Cable Plant
Presentation Layer
reassembly
8. You may set up a web server on companys access server - allowing global connections - for employees to access
demilitarized zone
OSI model
proxy server
Internet Key Exchange
9. DC
Secure File Transfer Protocol (SFTP)
802.11
Static IP Addressing
Domain Controller
10. A computer that accesses another computer - such as a workstation that accesses a shared file on another workstation - server - or mainframe. The client may use the accessed computer (host) to process data - or may process accessed data using its own
Internet Group Multicast Protocol
Network File System (NFS)
Client
Lightweight Directory Access Protocol
11. Compatible with 802.11a - b - g 600-65 throughput
Segments
802.11n
RIR (Regional Internet Registry)
OSI Layer 5
12. Controls how applications access network
Integrated Services Digital Network
Application
CRC
Internet Protocol
13. Connects multiple LANs
POP3 (Post Office Protocol - version 3)
WAN
fully distributed control strategy
SSL
14. Every node on the network is connected through a central device like a switch - cannot be disabled by a single malfunction in a workstation - scalable - - popular - expensive - cable malfunction will only effect 2 workstations - more fault tolerant.
star topology
proxy server
BNC connector
EMI
15. This layer in the OSI network model manages log on procedures and password recognition.
NIC
EMI
encapsulate
Session Layer
16. Data Link Layer
BSS
Mac Addressing
Wide area network (WAN
SNMP
17. Ppp tunneling protocol
ppptp
POP3
Firewall Filtering
signature-based (knowledge-based - misuse-detection) IDPS
18. Secure CoPy-utility that allows you to copy files securely from host to another
::1
SCP
network class a
Dense Wavelength Division Multiplexing
19. Type of sensor deployed in such a way that the network traffic it is monitoring must pass through it.
honey net
CSMA/CA
inline sensor
Network News Transport Protocol
20. A private network that functions like a tunnel through a larger network
Virtual private network (VPN)
RTS/CTS
PPP
CRC (cyclic redundancy check)
21. Techniques that employ hardware and software to province assurance against equipment failures - computer service interruptions - and data losses
fault tolerance
Star topology
VPN
Secure Shell
22. Physical layout of a star topology and also ring logical topology
bus topology
broadcast frame or broadcast packet
star wired ring
Network Information Service
23. Type of punch-down block used to terminate telephone circuits; does not meet Cat 5 or better standards
66 Block
reassembly
port 69
reassembly
24. Application Layer
Structure
signal
Localhost
Client Software
25. Initiates the communication link - Makes sure the communication link is maintained - Determines which node transmits at any point in time - such as which one transmits first - Disconnectd when a communication session is over - Translates node address
mesh topology
Session Layer (Layer 5)
128 - 64 - 32 - 16 - 8 - 4 - 2 - 1
Transmission Protocol (TCP)
26. Gigabit Interface Converter - Plugs in to an interface on a switch
link dead phase
TFTP
MS-CHAP
GBIC
27. Public switched telephone network
Baseband
T-Carrier Level 1
PSTN
ring topology
28. Provides th transfer medium (such as cable) - Translates data into a transmission signal appropriate to the transfer medium - Sends the signal along the transfer medium - Includes the pyical layout of the network - Monitors for transmission error - D
Kerberos
multimeter
Physical Layer (Layer 1)
Network
29. A termination unit also called a transceiver or DSL modem
association
segmentation
ATU-R
High-Level Data Link Control
30. Any device connected to a network - such as a microcomputer - mainframe - midrange computer - network equipment - or printer. Also called a station.
phishing
node
ITU
Twister Pair Cable
31. Any device connected to a network - such as a microcomputer - mainframe - midrange computer - network equipment - or printer. Also called a station.
802.5
Localhost
encapsulate
Node
32. Communications cable that consists of one or more glass 0r plastic fiber cores inside a protective cladding material - covered by a plastic PVC outer jacket. Signal transmission along the inside fibers typically uses infrared light.
signal bounce
Secure Shell
fiber-optic cables
MAC
33. Address resolution protocol
Data Link
FDDI
SDU
ARP
34. Ethernet LAN-all forms of Ethernet media and interface
ARP
Plenum
POP3 (Post Office Protocol - version 3)
802.3
35. POE standard
::1
configured with correct sending and receiving email server information
SFP
802.3af
36. The device inside a computer that connect a computer to the network media
NIC
Internet
alert or alarm
scattering
37. Requires CSU/DSU-the connection point for a t1 live at customers site
t1 connection
intrusion
ATU-R
segmentation
38. MT-RJ
ITU
Mechanical Transfer-Registered Jack
true attack stimulus
Internet Connection Sharing
39. Name Of Layer 2
Category 5
Data Link
Host
Conduit
40. SNMP
Firewall Filtering
Private Network
Simple Network Management Protocol
Intermediate Distribution Frame
41. AM
mtr (my traceroute)
Password Authentication Protocol
Amplitude Modulation
link establishment phase
42. The <html> - <head> and <body> tags are all examples of ________ tags
Presention Layer (Layer 6)
Network
Structure
message and circuit
43. International society composed of engineering professionals - promotes development and education in the electrical engineering and computer fields
IP gateway in NAT
phase
directional antennas
IEEE (Institute of Electrical and Electronics Engineers)
44. Type of interference caused by signals traveling on nearby wire pairs infringing on another pair's signal
switch
Cross Talk
amplitude
encapsulation
45. (fix) if analog an amplifier or if digital with repeater
Incorrect device drivers
MAC sublayer
fixing attenuation
Binary
46. IEEE standard for Ethernet devices and data handling
multimeter
802.3
Open Shortest Path First
Trivial File Transfer Protocol (TFTP)
47. Each computer is connected to a central device
Application layer
Frame
radio frequency interference (RFI)
star topology
48. A type of address translation in which a limited pool of internet-valid IP addresses is shared by multiple private network hosts.
DNAT (Dynamic Network Address Translation)
NIC
standby UPS
ICS host
49. Electromagnetic interference. waves from electrical devices. ex. RFI
Data Circuit-Terminating Equipment
multiple access
Protocol
EMI
50. CDFS
CD-ROM File System
partially distributed control strategy
route
Point-to-Point