SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
IT: Networking Vocab
Start Test
Study First
Subject
:
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Any device connected to a network - such as a microcomputer - mainframe - midrange computer - network equipment - or printer. Also called a station.
modifying the file-sharing controls
node
tracepath
Device power unplugged
2. IKE
WDM
TCP/IP Vs. OSI: Transport
2.4-GHz band
Internet Key Exchange
3. A data encryption technique employed between a server and a client - such as between a client's browser and an Internet server.
Secure Sockets Layer (SSL)
Block ID
TFTP
centralized control strategy
4. Vulnerability created in a system by a virus or worm which allows the attacker to access the system at will with special privileges.
configured with correct sending and receiving email server information
back door
Light Weight Directory access protocol (LDAP
802.11
5. Security for https://
fiber optic connector
SSL
Gigabit Interface Converter
MTU (maximum transmission unit)
6. The total amount of opposition to the flow of current.
encapsulation
t1 connection
pppoe
impedance
7. Process of retransmitting a digital signal; repeats the pure signal without the noise
WINS
Node
Encrypting File System
Regeneration
8. Segment
Access Control List
Broadband
TCP/IP Transport Layer Encapsulation
DSSS
9. A situation in which two or more packets are detected at the same time on an Ethernet network.
Network File System (NFS)
electromagnetic interference (EMI)
tuning
collision
10. Hardware that constitutes the enterprise-wide cabling system
Cable Plant
802.16
IEEE 802.12 Standard
session
11. IDPS that uses profiles to detect anomalous protocol behavior
stateful protocol analysis (SPA) IDPS
Fast Ethernet (characteristics)
intrusion prevention
Alien Cross Talk
12. A app. loaded on a server included with Windows OS that enables remote access
RAS
802.3
EIA/TIA
attenuation
13. Divides channel into different time slots and assigns data to nodes who are attached to time slots
DHCP
Internet
TDM
DHCP
14. A computer on a network that requests services or resources from another computer on a network
white/orange and orange
workstation
Modulation
Multistation Access Unit
15. Short tube within a fiber-optic cable connector that encircles the fiber strand and keeps in properly aligned
connectionless
ATU-R
virtual circuit
Ferrule
16. Session Layer
OSI Layer 5
MAN
Primary Rate Interface
ppptp
17. After typing ping 127.0.0.1 - it tells you the test failed
TCP/IP protocol failure
network class C
LAN
router
18. Cabling that transmit data using light waves. Higher bandwidth than other types of cabling.
Data Link
public network
fiber optics
Simple Mail Transfer Protocol (SMTP)
19. A computer (mainframe - minicomputer - server - or workstation) that has an operating system enabling multiple computers to access it at the same time for files - data - and services.
802.44
Network
host
Mesh topology
20. FDM
Frequency Division Multiplexing
Transport
standard
LC connector
21. User friendly web addresses are translated into IP addresses by the...
token
Domain Name Service
EAPoL
CD-ROM File System
22. Physical layer. 10 giga bit throughput. baseband transmission. twisted pair. max length is 100 meters. cat 6 or 7.
PSTN
10Gbase-t
port 143
beaconing
23. Progress of a wave over a time in a relationship
router
phase
metropolitan area network (MAN)
scattering
24. The seventh layer of the OSI model. Application layer protocols enable software programs to negotiate formatting - procedural - security - synchronization - and other requirements with the network.
datagram
Application Layer
encryption
Phase
25. IEEE standard for Ethernet devices and data handling
Baseband
Network
1000base-lx
802.3
26. String used to identify an access point - configure on your new access points to match the settings on existing access points
Peer-to-peer network
WAN Connectivity
SSID
SNMP
27. Describes a theoretical representation of what happens between two nodes communicating on a network
media access control (MAC)
OSI model
presentation layer
Loose network cable connection
28. Which protocol is responsible for splitting data into packets and adding a header to each one?
Transmission Control Protocol
fractionalizing
Correct subnet mask
backbone
29. IPSec
Alternate Mark Inversion
Simple Network Management Protocol (SNMP)
Internet Protocol Security
host
30. Algorithm used to verify the accuracy of data contained in a data frame
CRC (cyclic redundancy check)
kereberos
analog signal
fragmentation
31. Provides Internet access and/or other services such as email and Web hosting
TCP/IP Architecture Layer 4
ISP (Internet service provider)
Category 1
fiber optic cable
32. Best fault tolerance
full mesh
OSI Layer 1
ITU
Session
33. A private network that functions like a tunnel through a larger network
DSL
IMAP4 (Internet Message Access Protocol - version 4)
Internet Group Multicast Protocol
Virtual private network (VPN)
34. A system of computers - print devices - network devices - and computer software linked by communications cabling or radio waves.
Transmission media
Telnet
Computer network
Binary
35. Assigning a unique frequency band to each communication
Channel
FDM
VPN
cp connection
36. Name Of Layer 2
VPN
Flow Control
Data Link
Simple Mail Transfer Protocol (SMTP)
37. Extent to which a signal has weakened after traveling a given distance
duplex
RTS/CTS
Attenuation
host
38. Network segment that contains end nodes - such as workstations
fingerprinting
port 53
Populated Segment
POP3
39. Http - Hypertext transfer protocol
RTT
ssl
port 80
passive topology
40. When pulses that represent bits follow one another along a single transmission
Service Set Identifier
serial
socket
alarm clustering and compaction
41. The placement of data from a higher-layer protocol behind the header (and in some cases - between a header and trailer) of the next-lower-layer protocol. For example - an IP packet could be encapsulated in an Ethernet header and trailer before being
Encapsulation
MAN
fiber optic cable
MPLS
42. Form of transmission in which signals are modulated as radiofrequency analog pulses with different frequency ranges; does not involve binary coding
NetWare Loadable Module
Broadband
intrusion detection/prevention system (IDPS)
Presentation
43. Can use WPA to improve the security of data in transit
incremental backup
TIA (Telecommications Industry Association)
802.11b
Topology
44. Ensures outgoing traffic can traverse public networks by replacing each outgoing packets source addresss field w valid IP address
IP gateway in NAT
IMAP4 (Internet Message Access Protocol - version 4)
Group Policy Object
OSI (Open Systems Interconnection) model
45. Aversion of the traceroute utility found on some Linux distributions.
tracepath
IP (Internet Protocol)
application protocol verification
Local area network (LAN)
46. Network cable that contains pairs of insulated wires that are twisted together and surrounded by a shielding material for added EMI and RFI protection - all inside a protective jacket.
Synchronous Optical Network
To stop the Hamburgerler from stealing all of Ronnie McDonalds burgers
TCP/IP Vs. Netware: Transport & Internet
shielded twisted-paired (STP) cable
47. Packet internet groper
PING
Session Layer (Layer 5)
fault tolerance
TCP/IP Vs. Netware: Application
48. Physical layer. 10 mpbs throughput. baseband transmission. max length is 100 meters. follows 5-4-3 rule. star topology. cat 3 or higher utp. twisted pair.
network monitor
A Protocol
HTTP (Hypertext Transfer Protocol)
10base-t
49. Electromagnetic interference. waves from electrical devices. ex. RFI
802.44
Transport Layer
EMI
NetWare Core Protocol
50. Source emits a RTS (request to send) signal to the access point - and the access point replies with CTS (clear to send) for the source to begin its transmission
connectionless
RTS/CTS
CIDR (Classless Interdomain Routing)
slip