SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
IT: Networking Vocab
Start Test
Study First
Subject
:
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A connecting device for a network that accepts messages and forwards them to the correct section of the network. Generally more intelligent than a hub and a switch.
Default Gateway
Backbone
router
802.2
2. A single computer that provides extensive multiuser access to network resources - such as shared files - shared disks - and shared printers.
hot site
microwave
Server
Nonbroadcast Point-to-Multipoint Transmission
3. A high-capacity communications medium that joins networks on the same floor in a building - on different floors - and across long distances.
backbone
port 143
Extended Network Prefix
intrusion prevention
4. Several ethernet nodes can be connected and can monitor traffic or access media simultaneously
Private Network
multiple access
fully distributed control strategy
latency
5. ICMP
SMTP
Frequency Modulation
diffraction
Internet Control Message Protocol
6. WAN transmission technologies that contains a segment that relied on 10GBase-EW standard
TCP port 23
multiprotocol label switching
SONET
NNTP
7. Each node passively listens for then accepts data
Point-to-Point Tunneling Protocol
fault tolerance
baseband
passive topology
8. EMI interference induced on one cable by signals traveling on a nearby cable
protocol
Half-Duplex
SONET
Alien Cross Talk
9. Why are web pages viewed using HTTP?
wide area network (WAN)
802.11b
To stop the Hamburgerler from stealing all of Ronnie McDonalds burgers
impedance
10. Is a secure form of HTTP
beaconing
digital adv
HTTPS
driver
11. Layer 3 Troubleshooting
DNAT (Dynamic Network Address Translation)
Hertz
Firewall Filtering
IP address within the assigned network
12. Communications for continuous burst of data controlled by a clock signal that starts each burst.
star topology
ICS (Internet Connection Sharing)
synchronous communications
Address Resolution Protocol
13. # of times that waves amplitude cycles - hertz
frequency
Classful Addressing
AM
NFS
14. The oldest type of network design with - this topology consist fo multiple nodes attached to a central hub - switch - or router.
Presention Layer (Layer 6)
star topology
Network Behavior Analysis
Internet Engineering Task Force (IETE)
15. Type of interference caused by signals traveling on nearby wire pairs infringing on another pair's signal
Cross Talk
bus topology
medium
Optical Time Domain Reflectometer
16. The process of wrapping one layer's PDU with protocol information so that it can be interpreted by a lower layer. For example - Data Link layer protocols encapsulate Network layer packets in frames.
To stop the Hamburgerler from stealing all of Ronnie McDonalds burgers
encapsulate
Application Layer
presentation layer
17. A coaxial connector uses a twist and lock style - may be used with Rg-6 and RG-59
BNC connector
Core
cyclic redundancy check (CRC)
Data Terminal Equipment
18. FM
Physical
Subscriber connector
Correct subnet mask
Frequency Modulation
19. Application Layer
OSI Layer 7
HTTPS
switch
bridge
20. A device that must be located at each end of a leased line.
Data Link Layer
Correct default gateway
CSU/DSU
SYN (syncronization)
21. Measure of a signal's strength
active scanning
event viewer
Amplitude
latency
22. Layer 2
Data Link
bandwidth
Trivial File Transfer Protocol (TFTP)
communications services
23. Event that triggers alarm when no actual attack is in progress
the more twist
multiplexing
IANA
false attack stimulus
24. Secure Shell
FDM
SSH
ssl
twisted-pair cable
25. Network time protocol
Fiber Distributed Data Interface (FDDI)
Full Duplex NIC Communication
Baseband
NTP
26. LDAP
15 hops
butt set
Lightweight Directory Access Protocol
crossover cable
27. LC - ST - SC - or MT RJ
twisted shielded pair
host
Password Authentication Protocol
fiber optic connector
28. 1) A computer (mainframe - minicomputer - server - or workstation) that has an operating system enabling multiple computers to access it at the same time for files - data - and services. Programs and information may be processed at the host - or they
Attenuation
International Organization for Standardization (ISO)
demilitarized zone
Host
29. Associates a MAC address with a given IP address - reverse ARP
RARP
port 110
public switched telephone network (PSTN)
Crossover Cable
30. Power loss - the amount of signal that is lost as it travels though the communication medium from the source (transmitting node) to the receiving node.
mtr (my traceroute)
Attenuation
Internet Message Access Protocol version 4
POP (Post Office Protocol)
31. A service on a node
Alien Cross Talk
Loose network cable connection
ports
CIDR block
32. First part of the datagram - which consists of general information about the size of the packet - the protocol that was used to send it - and the IP address of both the source computer and its destination.
802.11g
analog adv
LDAP
header
33. Network File System
Internet Group Multicast Protocol
NFS
SCP
Secure File Transfer Protocol (SFTP)
34. The general topic of how on one computer - two adjacent layers in a networking architectural model work together - with the lower layer proving services to the higher layer.
Encapsulation
Port 20
Adjacent Layer Interaction
point to multipoint
35. More variable - convey greater subtleties with less energy
OSI
Star topology
PSTN
analog adv
36. A transmission method that has distinct signal levels to represent binary zeroes or ones - such as +5 volts and 0 volts.
digital
broadband
Radio Frequency Interference
the higher the frequency
37. A network on which any computer can communicate with other networked computers on an equal (peer) basis without going through an intermediary - such as a server. Peer-to-peer networking enables each computer to offer and access shared resources - suc
Peer-to-peer network
802.2
Frequency Division Multiplexing
TIA (Telecommications Industry Association)
38. Any device connected to a network - such as a microcomputer - mainframe - midrange computer - network equipment - or printer. Also called a station.
Node
Frequency Modulation
Repeater
802.11
39. Name Of Layer 4
HTTP
Organizational Unit
Transport
coax cable connector
40. Type of sensor deployed in such a way that the network traffic it is monitoring must pass through it.
inline sensor
TIA (Telecommications Industry Association)
fixing attenuation
Data Link
41. A network topology in which all of the nodes are connected to a central line or bus
Firewall configured correctly
SMF
bus topology
Remote Access Service
42. The <html> - <head> and <body> tags are all examples of ________ tags
Structure
Zero Configuration
connection
asynchronous comunications
43. The most widely-used protocol that manages notes posted on usenet newsgroups
Secure Shell (SSH)
Network News Transport Protocol (NNTP)
802.3af
API (application program interface)
44. A type of fiber optic cable connector that uses a mechanism similar to the BNC connectors used by Thinnet
protocol and services
VLAN
Entrance Facilities
Straight tip connector
45. F type (like TV cable) or BNC (crimped)
OSI Layer 2
Network
OSI
coax cable connector
46. Hardware device located at the ISP side of ADSL connections.
DSLAM
application protocol verification
intrusion
Internet Protocol version 4
47. Also called the star-bus hybrid topology - a network design that combines the logial comunications of a bus with the physical layout of a star.
stp
TFTP
802.44
star-wired bus topology
48. Data circuit-terminating equipment. multiplexer or modem
DCE
Remote Authentication Dial-In User Service
network-based IDPS (NIDPS)
BNC connector
49. A device used to connect thicknet cable with a transceiver. A vampire bypasses the need to serve the cable - because the vampire tap has a metal tooth that pierces through the outside cable insulation (like a vampire) and connects with the copper wir
vampire tap
analog signal
message and circuit
10Base-T
50. The process of connecting to a wireless network
S-HTTP
Application Layer (Layer 7)
association
Twister Pair Cable