SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
IT: Networking Vocab
Start Test
Study First
Subject
:
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Lower sublayer of the Data Link layer; appends the physical address of the destination computer onto the fram
Application Layer
fixing cross talk
Session layer
MAC (Media Access Control) sublayer
2. A termination unit also called a transceiver or DSL modem
LAN
medium
addressing
ATU-R
3. Translated network addresses into their physical counterparts
network layer
Post Office Protocol version 3
step-index multimode fiber-optic cable
Local area network (LAN)
4. Which protocol is responsible for splitting data into packets and adding a header to each one?
SSL
ADSL
twisted shielded pair
Transmission Control Protocol
5. A type of transmission in which there are several transmission channels on a communications medium - allowing more than one node to transmit at the same time.
broadband
port 123
access point
DSL
6. Source emits a RTS (request to send) signal to the access point - and the access point replies with CTS (clear to send) for the source to begin its transmission
RTS/CTS
DNS
TCP/IP Vs. OSI: Transport
baseband
7. Equivalent to OSI Layer 7 Application - Layer 6 Presentation - Layer 5 Session
Management Information Base
TCP/IP Vs. OSI: Application
serial
intrusion detection
8. Produces guidelines for how network cable should be installed in commercial buildings
Time Division Multiple Access (TDMA)
EIA/TIA
Baseband
Device power unplugged
9. Multimode fiber
VPN
crimping tool and wore stripper
MMF
Network Time Protocol
10. Hypertext Transfer Protocol Secure
logical link control (LLC)
duplex
Logical Link Control
HTTPS
11. Hardware device typically used to connect multiple LANs
router
MultiStation Access Unit
Port Numbers
Transport Layer (Layer 4)
12. Amplitude modulation-amplitude of signal is modified
TCP/IP Vs. Netware: Application
FF02
Local area network (LAN)
AM
13. Individual insulated wire pairs - less expensive then STP - less resistant to noise
UTP
subnetting purpose
plain old telephone service (POTS)
Network Information Service
14. A high-capacity communications medium that joins networks on the same floor in a building - on different floors - and across long distances.
Domain Name System (DNS)
headened
backbone
TCP/IP
15. A type of interference that occurs when two LAN cables run close to each other. If one cable is carrying a signal and the other isn't - the one carrying a signal will induce a 'ghost' signal in the other cable
IP address within the assigned network
Crosstalk
mesh topology
entrance facilities
16. The NIC and network equipment are set up so that they have the capacity to send and receive simultaneously. which is possible because od buffering at the NIC.
Core
Full Duplex NIC Communication
Domain Name Service
Round Trip Time
17. A connecting device for a network that accepts messages and passes them on to other parts of the network. Generally more intelligent than a hub.
route
Amplitude Modulation
switch
DHCP
18. Used to determine where patch cable for a specific server terminates on the patch panel - and checks for the presence of noise on a wire
EIA (Electronics Industries Alliance)
point to multipoint
multimeter
media access control (MAC)
19. A generic term referring to any set of protocols and standards collected into a comprehensive grouping that - when followed by the devices in a network - allows all the devices to communicate. Examples include TCP/IP and OSI.
Fault tolerance
passive scanning
transmission media
Networking Model
20. A private network that functions like a tunnel though a large network-such as the Internet or an enterprise network-that is restricted to designated member clients only.
virture privat network (VPN)
MAC (Media Access Control) sublayer
Network Switching
Network
21. RDP
User Datagram Protocol
Remote Desktop Protocol
presentation layer
Channel
22. Station transmits a probe that is then replied by the access point
proxy server
trap and trace
carrier sense
active scanning
23. Network interface card
EMI
port 53
NIC
Electromagnetic Interference
24. Software that is stored on a chip in a device - such as in a ROM - and that typically composes some type of system software
Frequency Division Multiplexing
firmware
Secure File Transfer Protocol (SFTP)
API (application program interface)
25. Form of transmission in which digital signals are sent through direct current pulses applied to a wire; can only send one signal at a time
CIDR (Classless Interdomain Routing)
port 21
cross talk
Baseband
26. The wave bounces back when encountering an object
application protocol verification
port 80
FTP
reflection
27. Connection-less
WDM
File Transfer Protocol (FTP)
udp
FTP
28. 3rd layer; protocols translate network addresses into their physical counterparts and decide how to route data from the sender to the receiver
DNS
Network layer
Device power off
segmentation
29. Zeroconf
Zero Configuration
EIA (Electronics Industries Alliance)
Asynchronous Transfer Mode
Shielded Twised Pair
30. Is a challenge respone authentication protocol
radio frequency interference (RFI)
SMTP server name
baseband
CHAP
31. A drawback of certification
cable plant
802.11b
certification value may be lessened due to the number of people obtaining them
incremental backup
32. Used to resolve NetBIOS names w IP address
WAN
WINS
American Standard Code for Information Interchange (ASCII)
serial
33. Follow TIA/EIA 568 specifications
standby UPS
Data Link
installing cable
Attenuation
34. The process of attracting attention to a system by placing tantalizing information in key locations.
DSLAM
impedance
TCP/IP Vs. OSI: Transport
enticement
35. Term that describes current anti-intrusion technologies
Media Dependent Interface
wavelength
OSI Layer 4
intrusion detection/prevention system (IDPS)
36. MAC Protocols
Network Time Protocol
Round Trip Time
Category 5e
TCP/IP Vs. Netware: Network Access
37. Event that triggers alarm when no actual attack is in progress
MAC address
node
Core
false attack stimulus
38. Also called coax - a network cable medium that consists of a copper core - surrounded by insulation.
Packet
BNC connector
coaxial cable
routing
39. Time Division Multiple Access
TDMA
intrusion
BGP
File Transfere Protocol - (FTP)
40. A logical grouping of information that includes the network layer header and encapsulated data - but specifically does not include any headers and trailers below the network layer.
Broadband
Packet
Institute of Electrical and Electronics Engineers (IEEE)
Internet Group Membership Protocol (IGMP)
41. The cableing or radio waves used to connect one network computer to another - or one network to another - and transport data between them.
communications media
Hubs
Time Division Multiple Access (TDMA)
Alternate Mark Inversion
42. Guarantees that a server continually has power even if a buildings electrical service is interrupted - continuous voltage to a device by switching virtually instantaneously to the battery when it detects loss of power
standby UPS
virtual circuit
single-mode fiber-optic cable
link establishment phase
43. SNMP
WDM
UDP
Internet Assigned Numbers Authority
Simple Network Management Protocol
44. The 100BaseVG/100VG-AnyLAN approach abandon the CSMA/CD transmission technique for one called demand priorTity.
Correct subnet mask
WINS
LDAP
IEEE 802.12 Standard
45. Tracks running and graphing data from any workstations. should ensure that new routers and switches can support it in order to easily automate network management
SNMP
centralized control strategy
255.255.0.0
cp connection
46. Doesn't use frame headers - uses cells
ATM
monitoring port (SPAN port)
Structure
American Standard Code for Information Interchange (ASCII)
47. SSID
AUI
fixing cross talk
Service Set Identifier
Gigabit Interface Converter
48. QoS technique enables packet switches technologies to travel over traditionally circuit switched connections
wavelength
bandwidth
MPLS
Carrier Sense Multiple Access / Collision Detection
49. Routers work here
Latency
node
Network
EIA/TIA
50. 1-126
TCP/IP Vs. OSI: Transport
network class a
MAU
Local Connector