SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
IT: Networking Vocab
Start Test
Study First
Subject
:
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Layer 4
Line Printer Remote
Transport
RTS/CTS
Regeneration
2. Measure of strength
radio frequency interference (RFI)
IDPS terrorist
fiber optics
amplitude
3. The sender transmits the data to the destination without establishment of a connection.
connectionless
NetBIOs
Presentation
TCP/IP Transport Layer Encapsulation
4. OSPF
signature-based (knowledge-based - misuse-detection) IDPS
intrusion prevention
telnet
Open Shortest Path First
5. The cabling or radio waves used to connect one network computer to another - or one network to another - and transport data between them. - Means by which a communications signal is carried from one system to another (for example - twisted-pair wire
Transmission media
DNS
route
white/orange and orange
6. Data changed since the previous fill or incremental backup
node
fiber-optic cables
Repeaters
incremental backup
7. Network Layer
DSL
Time Division Multiple Access (TDMA)
IP Addressing
802.16
8. Layer 1
network layer
intrusion detection system (IDS)
Physical
port 25
9. Requires CSU/DSU-the connection point for a t1 live at customers site
throughput
FDM
Frequency
t1 connection
10. Hackers sending emails to make it look like its legit and its actually dangerous to the workstation
modem
slip
phishing
2.4-GHz band
11. In TCP - a term used to describe a TCP header and its encapsulated data (also called an L4PDU). Also in TCP - the process of accepting a large chunk of data from the application layer and breaking it into smaller pieces that fit into TCP segments. In
Frequency Modulation
Industrial - Scientific - and Medical
Segment
route
12. Process in which an NIDPS inspects the higher-order protocols (HTTP - FTP - Telnet) are examined for unexpected packet behavior or improper use
stateful firewall
wide area network (WAN)
application protocol verification
Broadcast
13. Hubs and switches work here
client/server
Data Link
Ethernet
kereberos
14. FHSS
the more twist
entrapment
MAN
Frequency Hopping Spread Spectrum
15. Network File System
Open Shortest Path First
multipath
NFS
wavelength
16. FTP-Data - file transfer data
ISDN
Port 20
goodput
FM
17. Secure sockets layer-encyrpts TCP/IP transmission including web forms- en route b/w the client server using public key encryption technology
DTE
S-HTTP
10BASE5 Limit
ssl
18. An advantage of networks
Management Information Base
ICANN (Internet Corporation for Assigned Names and Numbers)
SSID
networks enable users to share resources
19. The <html> - <head> and <body> tags are all examples of ________ tags
Structure
LAN
NIC
telephone connector
20. Backbone: A high-capacity communications medium that joins networks on the same floor in a building - on different floors - and across long distances.
FDM
nslookup
A Protocol
Backbone
21. Type of transmission in which signals may travel in both directions over a medium simultaneously; also called duplex
bandwidth
PPP
802.11a
Full-Duplex
22. Any end device on the network (for example: computers - printers - copy machines...)
intrusion detection/prevention system (IDPS)
node
Main Distribution Frame
analog dis
23. In CIDR notation - the number of bits used for an extended network prefix. For example - the CIDR block for 199.34.89.0/22 is /22
stateless firewall
terminator
Punch-Down Block
CIDR block
24. Unix command at shell prompt to send a file to printer
t1 connection
Internet Protocol version 4
lpr filename
Hyper text transfer protocol
25. Does not operate at the application layer
ARP
network monitor
RS 232
bandwidth
26. Connection for data exchange between two parties
flow control
signal
session
Network
27. 7th layer; protocols enable software programs to negotiate formatting - procedural - security - synchronization - and other requirements with the network
Straight tip connector
OSI Layer 5
DCE
Application layer
28. Form of transmission that allows multiple signals to travel simultaneously over one medium
Connectors
Multiplexing
Alien Cross Talk
NIC drivers
29. Algorithm used to verify the accuracy of data contained in a data frame
CRC (cyclic redundancy check)
Multiplexer
Unshielded twisted pair
(fiddy) Fiber Distributed Data Interface
30. Developed by ISO and ANSI - a model that providees a framework for networked hardware and software communication based on seven layers.
Routing
Crosstalk
Open System Interconnection (OSI) referance model
Half Duplex NIC Communication
31. Method of controlling how network nodes access communication channels - ex highway
network access method
Repeater
Baseband
Layer 2 Tunneling Protocol
32. (fix) if analog an amplifier or if digital with repeater
network layer
fixing attenuation
Error Handling
Remote Terminal Emulation (Telnet)
33. A data communications technique that transmits a packet directly from the sending node - though a switch - and to the receiving node - without passing though other network nodes.
Transport Layer (Layer 4)
station
demand priority
MMF
34. Presentation Layer
protocol
NIC
Firewall Filtering
OSI Layer 6
35. Which protocol is responsible for routing packets around the network?
terminal
POP3 (Post Office Protocol - version 3)
modem
Internet Protocol
36. Strategy that combines the best of the other two strategies; while individual agents still analyze and respond to local threats - their reporting to a hierarchical central facility enables the organization to detect widespread attacks
RAS
partially distributed control strategy
diffraction
logical address
37. Long reach. multimode max length is 550 meters. single mode max length is 5000. 1000 mpbs. baseband transmission
1000base-lx
Secure Shell
802.11a
IGMP
38. A series of interconnected computers - printing devices - and other computer equipment that share hardware and software resources. The services area usually is limited to a given office - floor - or building.
Channel Service Unit
local area network (LAN)
SMTP (Simple Mail transfer Protocol)
Secure Shell (SSH
39. A logical communication path established by the OSI Network layer for sending and receiving data.
carrier sense
Class D Network
ppp
virtual circuit
40. Authentication prtocol that does not issue a challenge or require 3rd party verification of the computer requestiing authentication
kereberos
EAP
fiber optic connector
butt set
41. Data Link Layer
Mac Addressing
Network Time Protocol (NTP)
traceroute (tracert)
Kroner
42. Institute of electrical and electronics engineers
Telnet
Trivial File Transfer Protocol (TFTP)
workstation
IEEE
43. Each node passively listens for then accepts data
TDMA
pathping
route
passive topology
44. It enables the sending node to obtain the MAC address of the intended recipient before packets are sent.
enterprise network
Address Resolution Protocol (ARP)
baseband
Attenuation
45. Teflon-coated cable that is used in plenum area because it does not emit a toxic vapor when burned
plenum cables
ring topology
Digital
communications media
46. On a cable-TV WAN - a central receiving point for signals from various sources - including satellite - major cable sources - and local tevevision sources.
SIP
headened
802.11n
Firewall Filtering
47. Term that describes current anti-intrusion technologies
intrusion detection/prevention system (IDPS)
Port Numbers
power over ethernet
802.5
48. Data transmission that involves one transmitter and one receiver
Point-to-Point
packet
port 22
ARP
49. The IEEE standard for Ethernet networking devices and data handling (using the CSMA/CD access method)
Independent Computer Architecture
fixing cross talk
802.3
Serial
50. Extended service set: a group of access points
ESS
Secure Copy
configured with correct sending and receiving email server information
topology