SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
IT: Networking Vocab
Start Test
Study First
Subject
:
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. More variable - convey greater subtleties with less energy
Backbone
analog adv
MAC address
TCP/IP Vs. OSI: Network Access
2. Which protocol allows users to send emails?
ANSI (American National Standards Institute)
SMTP
DSLAM
Transport
3. Decreasing the size of data units when moving data from a network that can handle larger units to one that can handle only smaller units
Bandwidth
Remote Terminal Emulation (Telnet)
SNMP
segmentation
4. Layer 7
Application
hybrid fiber / coax (HFC) cable
HTTPS
cabeloco
5. RDP
Remote Desktop Protocol
subnetting purpose
(fiddy) Fiber Distributed Data Interface
fixing noise
6. Signals on bus that would travel endlessly between two nodes
Internet Key Exchange
signal bounce
star-bus hybrid topology
beacon frame
7. All wires are reversed
Ethernet
rollover cable
grade-index multimode fiber-optic cable
Secure Shell (SSH
8. Data Link sublayer that manages flow control
LLC
alarm filtering
MMF
switch
9. Used by web browser and web servers to exchange files
Hyper Text Transfer Protocol (HTTP)
POP (Post Office Protocol)
Decapsulation
UDP
10. Strength of digital signal
Backup Domain Controller
Flow Control
voltage
MMF
11. These reside on a computer or appliance connected to network segment and monitor network traffic
fiber optic connector
Ferrule
network-based IDPS (NIDPS)
ANDing
12. It enables the sending node to obtain the MAC address of the intended recipient before packets are sent.
Point-to-Point Protocol over Ethernet
voltage
Address Resolution Protocol (ARP)
Amplifier
13. An International organization of scientists - engineers - technicians - and educators that play a leading role in developing standards for network cabling and data transmissions.
Institute of Electrical and Electronics Engineers (IEEE)
Punch-Down Block
TCP/IP Vs. OSI: Internet
802.3
14. A type of transmission in which the entire channel capacity of the communications medium (such as cable) is used by one data signal - enabling only one node to transmit at a time.
star-bus hybrid topology
Application Layer
MAC address
baseband
15. Institute of electrical and electronics engineers
directional antennas
IEEE
noise
token ring
16. IRC
Internet Relay Chat
rj-11
sequencing
Hypertext Transfer Protocol (HTTP)
17. Requires many pulses to transmit same info that an analog can transmit in a wave
tracepath
CRC (cyclic redundancy check)
digital dis
Bus topology
18. Twisted pair cable consisting of a number of twisted pairs of copper wire with a simple plastic casing. Because - no shielding is used in this cable - it is very susceptible to EMI - RFI - and other types of interference
protocol data unit (PDU)
Unshielded twisted pair
SMTP
Segment
19. UN agency that regulates international telecommunications and provides developing countries with technical expertise and equipment to advance their technological bases
Nonbroadcast Point-to-Multipoint Transmission
ITU (International Telecommunication Union)
Transport
SMF
20. A connector used to terminate coaxial cable used for transmitting television and broadband cable signals
f type connector
Single mode fiber
back hack
Client
21. Transport Layer
signal bounce
subnetting purpose
Port Numbers
Open System Interconnection (OSI) referance model
22. Provides services for applications
SONET
TCP/IP Transport Layer Encapsulation
Regeneration
Application
23. Enables network managers to continuously monitor network activity
Crosstalk
whois
Simple Network Management Protocol (SNMP)
Loose network cable connection
24. Layer 3 Troubleshooting
fixing noise
Secure Sockets Layer (SSL)
Correct default gateway
Transport Layer (Layer 4)
25. Any end device on the network (for example: computers - printers - copy machines...)
802.11b
node
OSI
TDMA
26. Method of controlling how network nodes access communication channels - ex highway
analog
white/orange and orange
network access method
session layer
27. Network Layer
digital
IP Addressing
intrusion detection system (IDS)
passive topology
28. A network owned and maintained by an organization -such as a campus network operated by a college.
private network
twisted pair connector
Binary
digital adv
29. IPSec
L2TP
Serial Line Internet Protocol
Internet Protocol Security
Port 20
30. BDC
NetWare Loadable Module
MAN
Backup Domain Controller
bus topology
31. An error detection method that calculates a value for the total size of the information fields contained in a frame. The value is inserted near the end of a frame by the Data Link layer on the sending node - and checked by the Data Link layer on the
Network Time Protocol (NTP)
Internet Control Message Protocol (ICMP
cyclic redundancy check (CRC)
ANSI (American National Standards Institute)
32. American national standards institute
Access Control List
Rivest - Shamir - Adelman
Challenge Handshake Authentication Protocol
ANSI
33. The process of reconstructing segmented data
Challenge-Response Authentication Mechanism - Message Digest 5
Improperly configured switch
Physical
reassembly
34. The transmission capacity of a communications medium - which is typically measured in bits per second (for data transmissions) or hertz (for data - voice - and video transmissions) - and which is determined by the maximum minus the minimum transmissi
bandwidth
digital dis
Data Service Unit
Decapsulation
35. Signal interference caused by electrical devices that emit radio waves at the same frequency used by network signal transmissions.
MAC address
false attack stimulus
radio frequency interference (RFI)
SMTP
36. ISM
Packet
Industrial - Scientific - and Medical
Crossover Cable
rollover cable
37. Speed: 1000 Mbps - Altenative name: 1000BASE-T - IEEE Standard: IEEE 802.3ab - Cable type: copper max length 100m
Point-to-Point
Transport
Gigabit Ethernet (non-fiber characteristics)
NetWare Loadable Module
38. Allows clients to communicate in different floors
communications media
switch
HTTP
Decapsulation
39. HDLC
client
Secure Copy Protocol
Internet Message Access Protocol version 4
High-Level Data Link Control
40. The process in which an attacker obtains confidential information by contacting employees and deceiving them into giving up passwords - IP addresses - server names - and so on.
Mac Addressing
User Datagram Protocol
alarm clustering and compaction
social engineering
41. Authentication prtocol that does not issue a challenge or require 3rd party verification of the computer requestiing authentication
star topology
CIDR block
kereberos
VLAN
42. TFTP is a TCP/IP file transfer protocol that is designed for task such as the transfer of data to enable a diskless workstation to boot using files trasmitted from a server
broadcast storm
protocol and services
NIC
Trivial File Transfer Protocol (TFTP)
43. Degradation of a light signal on a fiber-optic network
Optical Loss
Workstation
modifying the file-sharing controls
demilitarized zone
44. Provides a generic method of transferring files
FTP
reflection
Application layer
File Transfer Protocol (FTP)
45. Network layer device
rollover cable
router
WDM
reflection
46. Max size of data units on Ethernet networks
fault tolerance
1550bytes
Line Printer Daemon
plenum cables
47. Session Layer
twisted pair connector
OSI Layer 5
MAC sublayer
host-based IDPS (HIPDS)
48. NIS
Network Information Service
Network Time Protocol (NTP)
alert or alarm
File Transfer Protocol (FTP)
49. Network Layer
networks enable users to share resources
Crosstalk
IEEE (Institute of Electrical and Electronics Engineers)
OSI Layer 3
50. Device typically used to create a VLAN
bus topology
switch
Static IP Addressing
fault tolerance