SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
IT: Networking Vocab
Start Test
Study First
Subject
:
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A remote connection where the client computer is a low-end computer that communicates with a terminal server.
LLC
thin client computing
POP3
Session Layer (Layer 5)
2. String used to identify an access point - configure on your new access points to match the settings on existing access points
fixing cross talk
SSID
passive scanning
TDM
3. Communications cable that consists of one or more glass 0r plastic fiber cores inside a protective cladding material - covered by a plastic PVC outer jacket. Signal transmission along the inside fibers typically uses infrared light.
electromagnetic interference (EMI)
fiber-optic cables
Flow Control
hub
4. Long reach. multimode max length is 550 meters. single mode max length is 5000. 1000 mpbs. baseband transmission
1000base-lx
OSI Reference to TCP
Secure Shell
Secure Sockets Layer (SSL)
5. Default subnet mask for 154.13.44.87
confidence value
255.255.0.0
ATU-R
PSTN
6. Secure CoPy-utility that allows you to copy files securely from host to another
Frequency Modulation
802.5
Transport
SCP
7. Routers work here
Quality of Service
Network
MMF
NIC drivers
8. Ensures outgoing traffic can traverse public networks by replacing each outgoing packets source addresss field w valid IP address
demilitarized zone
site policy awareness
IP gateway in NAT
FDM
9. First part of the datagram - which consists of general information about the size of the packet - the protocol that was used to send it - and the IP address of both the source computer and its destination.
network monitor
802.3
header
connectionless
10. Control frame that indicates to the rest of the network that a particular node has the right to transmit data
switch
network access method
token
diffraction
11. ADSL
Asymmetric Digital Subscriber Line
Address Resolution Protocol (ARP)
authentication
twisted pair connector
12. A standard method or format for communication between networked devices
protocol
connectionless
NetWare Loadable Module
Private Network
13. A resistor that is connected to the end of a segment on a bus network - so that data-carrying signals are absorbed at the point where the segment stops. Absorbing the signals ensures they are not reflected back onto the cable after they reach the end
Terminator
Application Layer
ARP
fixing noise
14. IDPS that compares sampled network activity to established baseline
internetwork
statistical anomaly-based (stat - behavior-based) IDPS
Block ID
Basic Rate Interface
15. Used connecting a workstation to a routers console part
socket
RS 232
CD-ROM File System
star topology
16. Amplitude - frequency (Hz) - wavelength - wavy line
soft skills
10Base-T
analog signal
router
17. An error condition on a token ring network that indicates one or more nodes is not functioning.
port 80
Frequency Division Multiple Access (FDMA)
Class A Network
beaconing
18. An IDPS that resides on particular computer or server (the host) and monitors activity only on that system. Also known as system integrity verifiers.
phishing
Regeneration
host-based IDPS (HIPDS)
EAPoL
19. Is used to allow searching and updating of a directory service
Data Link
client
MIME (Multipurpose Internet Mail Extensions)
Light Weight Directory access protocol (LDAP
20. Event that triggers alarms and causes an IDPS to react as if a real attack is in progress
Kerberos
Transport
CRC (cyclic redundancy check)
true attack stimulus
21. Multiplexing technique use over single-mode or multimode fiber-optic cable in which each signal is assigned a different wavelength for its carrier wave; little space exists between carrier waves
TCP/IP Vs. Netware: Application
Challenge Handshake Authentication Protocol
Dense Wavelength Division Multiplexing
network layer
22. Progress of a wave over a time in a relationship
redirector
Secure Copy
digital signal
phase
23. Dynamic host configuration protocol
(fiddy) Fiber Distributed Data Interface
block ID
Network Time Protocol (NTP)
DHCP
24. IPX
router
whois
Line Printer Daemon
Internetwork Packet Exchange
25. ARP
Address Resolution Protocol
asynchronous comunications
Default Gateway
Network
26. Method of data modulation in which the frequency of the carrier signal is modified by the application of the data signal
Internet
ICANN (Internet Corporation for Assigned Names and Numbers)
computer network
Frequency Modulation
27. Which layer in the OSI network model is responsible for providing a set of interfaces for applications to obtain access to networked services?
workstation
Fast Ethernet
IMAP4 (Internet Message Access Protocol - version 4)
Application Layer
28. The device inside a computer that connect a computer to the network media
NIC
link quality monitoring
TCP/IP Architecture Layer 3
Physical Layer
29. Faster networking and inexpensive - flexible - easy to install
File Transfer Protocol (FTP)
twisted shielded pair
Attenuation
MultiStation Access Unit
30. Services that handle hardware diagnoses and failure alerts
management services
EMI
tracepath
Asynchronous Transfer Mode
31. A TCP/IP troubleshooting utility that uses ICMP to trace the path from one networked node to another - identifying all intermediate hops between the two nodes. Traceroute is useful for determining router or subnet connectivity problems. On Windows-ba
802.11
Access Control List
WINS
traceroute (tracert)
32. Provides strung security for HTTP- transpored information - but it is only used by some vendor's application
MIME (Multipurpose Internet Mail Extensions)
Secure Hypertext Transfer Protocol (S-HTTP)
Amplitude
whois
33. A technique for connecting to a network at a remote location using Internet as the medium.
VPN
digital dis
monitoring port (SPAN port)
Mechanical Transfer-Registered Jack
34. A medium that carries 1 signal
baseband
Kerberos
TFTP
intrusion detection system (IDS)
35. DNS - Domain name system
Terminator
TCP/IP Vs. OSI: Transport
port 53
Post Office Protocol
36. Layer 1 Troubleshooting
Noise
Loose network cable connection
ICANN (Internet Corporation for Assigned Names and Numbers)
server
37. When pulses that represent bits follow one another along a single transmission
media access control (MAC)
Trivial File Transfer Protocol (TFTP)
serial
true attack stimulus
38. Decreasing the size of data units when moving data from a network that can handle larger units to one that can handle only smaller units
Bandwidth
Class C Network
DB-25 connector
segmentation
39. The general topic of how on one computer - two adjacent layers in a networking architectural model work together - with the lower layer proving services to the higher layer.
Application Layer
Address Resolution Protocol (ARP)
IPSec
Adjacent Layer Interaction
40. The physical layout of the cable and wireless network devices and the logical path followed by network frames and packets sent on the cable or by wireless transmissions
Internet Information Services
fading
topology
centralized control strategy
41. Transforms data into a form network or applications will understand
fragmentation
Presentation
Media Dependent Interface
bandwidth
42. Layer 2 Troubleshooting
Improperly configured switch
Correct subnet mask
SCP
TCP/IP Vs. OSI: Application
43. A combination of techniques used to detect an intrusion and then to trace it back to its source
Network File System
trap and trace
Improperly configured switch
intranet
44. # of times that waves amplitude cycles - hertz
frame
TIA (Telecommications Industry Association)
frequency
Repeater
45. The process of connecting to a wireless network
association
active scanning
File Transfere Protocol - (FTP)
star wired bus
46. Any device connected to a network - such as a microcomputer - mainframe - midrange computer - network equipment - or printer. Also called a station.
node
event viewer
intrusion
ISOC
47. The Application layer TCP/IP subprotocol responsible for moving messages from one e-mail server to another.
route
Industrial - Scientific - and Medical
SMTP (Simple Mail transfer Protocol)
attenuation
48. Frequency hoping spread spectrum: a signal jumps between several different frequencies
FHSS
Point-to-Point Protocol
Presentation
T-Carrier Level 1
49. A device that must be located at each end of a leased line.
POP3
CSU/DSU
TCP/IP Vs. OSI: Network Access
Crossover Cable
50. All wires are reversed
rollover cable
Conduit
LAN
ANSI (American National Standards Institute)