SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
IT: Networking Vocab
Start Test
Study First
Subject
:
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Transport Layer
routing
coax cable connector
Error Handling
phase
2. Name Of Layer 2
communications services
Data Link
physical media
reassembly
3. Delay between the transmission of a signal and its receipt
Error Handling
Lightweight Directory Access Protocol
Latency
bus topology
4. MAC Protocols
bandwidth
TCP/IP Vs. Netware: Network Access
Logical Link Control
Network File System
5. Manually specify on each workstation so that their users can pick up their internet email from the linux email server
Internet
passive scanning
SMTP server name
Internet Protocol version 4
6. Algorithm used to verify the accuracy of data contained in a data frame
CRC (cyclic redundancy check)
duplex
DSLAM
Group Policy Object
7. F type (like TV cable) or BNC (crimped)
(fiddy) Fiber Distributed Data Interface
coax cable connector
token ring
TFTP
8. Type of sensor deployed in such a way that the network traffic it is monitoring must pass through it.
10BASE2 Limit
session layer
fiber optic connector
inline sensor
9. Rules determining the format and transmission of data
protocol
Twister Pair Cable
Challenge Handshake Authentication Protocol
network-based IDPS (NIDPS)
10. Assigning a unique frequency band to each communication
Transmission Control Protocol
simplex
FDM
Star topology
11. Dynamic host configuration protocol
reflection
WAN
DHCP
Encrypting File System
12. Transport Layer
fault tolerance
Port Numbers
cable plant
Institute of Electrical and Electronics Engineers (IEEE)
13. Developed by ISO and ANSI - a model that providees a framework for networked hardware and software communication based on seven layers.
Line Printer Daemon
Open System Interconnection (OSI) referance model
Session layer
lpr filename
14. Electronics industries Alliance
RS 232
routing
CIDR block
EIA
15. A network owned and maintained by an organization -such as a campus network operated by a college.
ACK (acknowledgement)
workstation
private network
10BASE2 Limit
16. Firewalls perform two basic security functions
monitoring port (SPAN port)
packet filtering - application proxy
fault tolerance
cross talk
17. ACL
Class C Network
Subscriber connector
Access Control List
public network
18. Max size of data units on Ethernet networks
Single mode fiber
ICANN (Internet Corporation for Assigned Names and Numbers)
1550bytes
Lightweight Directory Access Protocol
19. IEEE 802.2 Logical Link Control (LLC) sublayer of the data link layer
802.2
Half-Duplex
EIA (Electronics Industries Alliance)
802.3af
20. Shielded twisted pair
Internet
stp
802.11n
route
21. Physical Layer
FF02
FM
CSMA/CD
Repeaters
22. A frame (or packet) sent to all nodes on the network.
Ferrule
Remote Desktop Protocol
broadcast frame or broadcast packet
Independent Computer Architecture
23. The act of hacking into a hacker's system to find out as much as possible about the hacker
Network interface card (NIC)
Transmission media
ITU
back hack
24. Wrapping one layer's PDU with protocol information so that it can be interpreted by a lower layer
FDM
utp
encapsulate
analog dis
25. Simple Network Management Protocol
back hack
SNMP
CSMA/CA
Application
26. A switching method that enables multiple devices to communicate over the same commnications medium by creating time slots in which each device transmits.
Time Division Multiple Access (TDMA)
Open System Interconnection (OSI) referance model
router
SNMP
27. Multiple physical/non-physical mediums for connecting computers
simplex
Repeaters
Virtual private network (VPN)
media
28. Hypertext Transfer Protocol Secure
binary
OSI Layer 6
topology
HTTPS
29. Integrated digital network
Terminator
isdn
Network Address Translation
IGMP
30. Twisted pair patch cable in which the termination locations of the transmit and receive wires on one end of the cable are reversed
Mesh topology
Data Link
Data Link layer
Crossover Cable
31. L2F
cp connection
coax cable connector
Layer 2 Forwarding
Secure Shell (SSH
32. Largest data unit a network will accept for transmission
phishing
Conduit
MTU (maximum transmission unit)
Thin Eterhnet/10 Base 2
33. Twist wire so you don't get interference on the memory
rj-11
Terminator
fixing cross talk
CIDR block
34. SSH - secure shell
port 69
port 22
MIME (Multipurpose Internet Mail Extensions)
Internet Control Message Protocol (ICMP
35. Signals traveling on one wire infringes on the signal traveling over an adjacent wire
RS 232
kereberos
cross talk
EMI
36. Device used to regenerate a signal
802.11n
802.3
Repeater
Category 6
37. Protocol data unit
HTTP (Hypertext Transfer Protocol)
PDU
backbone
Application Layer
38. Amplitude - frequency (Hz) - wavelength - wavy line
SIP
analog signal
demand priority
HTTPS
39. A standard method or format for communication between networked devices
protocol
Access Control List
broadcast frame or broadcast packet
reflection
40. LC - ST - SC - or MT RJ
American Wire Gauge
Dense Wavelength Division Multiplexing
EAPoL
fiber optic connector
41. Max number of hops a packet can take b/w its source and destination using RIP on a LAN
15 hops
POP3 (Post Office Protocol - version 3)
Bit
star topology
42. Groups of workstations are star connect to connectivity devices and then networked via single bus - cover long distances - easy to interconnect - more expensive - ethernet
star wired bus
protocol
footprinting
traceroute (tracert)
43. EFS
fiber optic cable
Internet Control Message Protocol
Encrypting File System
Address Resolution Protocol (ARP)
44. Compresses
Broadband
Presentation
File Transfer Protocol
impedance
45. Layer 3 Troubleshooting
Internet Protocol Security
Correct default gateway
ESS
application protocol verification
46. Private connection from a LAN to an internet service provider.
Shielded Twised Pair
encapsulation
alarm filtering
dedicated lines
47. Small network 192-223
diffraction
STP
Class C Network
PING
48. The capacity to send and receive signals at the same time on the same medium.
single-mode fiber-optic cable
Improperly configured switch
Secure Copy
full duplex
49. The most commonly used form of Internet Message Access Protocol.
Internet Protocol Security
IMAP4 (Internet Message Access Protocol - version 4)
port 143
Network
50. Constructs data frames using the appropriate format for the network - reatea CRC information - Checks for errors using CRC information - Retransmits data if there is error - Initiates the communications link and makes sure it is not interrupted - thu
Protocol Data Unit
Data Link (Layer 2)
Network Layer (Layer 3)
intrusion detection