Test your basic knowledge |

IT: Networking Vocab

Subject : it-skills
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. CIFS






2. (fix) if analog an amplifier or if digital with repeater






3. Equivalent to OSI Layer 3 Network






4. Nondata info that must accompany data for it to be properly routed. addition to data






5. Allows for secure interactive control of remote systems






6. Strategy in which all IDPS control functions are implemented and managed in a central location






7. 128-191






8. A Data Link sublayer that examines addressing information contained in a network frame and controls how devices share communications on the same network.






9. Network Layer






10. Form of transmission that allows multiple signals to travel simultaneously over one medium






11. A network design consisting of a continuous path for data with no logical beginning or ending point - and thus no terminators.






12. A app. loaded on a server included with Windows OS that enables remote access






13. Time division multiplexing






14. Attacker who utilizes tactics designed to trip the organization's IDPS - essentially causing the organization to conduct its own DoS attack - but overreacting to an actual - but insignificant - attack.






15. Transport Layer






16. Anything - hardware or software - that monitors transmission of packets of digital information that attempt to pass the perimeter of a network






17. The medium that carries multiple signals simultaneously






18. Cause by length - loss of signals as it travels farther away






19. Translates data to a format the receiving node understands - such as from EBCDIC to ASCII - Performs data encryption - Performs data compression






20. Method of data modulation in which the frequency of the carrier signal is modified by the application of the data signal






21. Process by which attacker changes the format and/or timing of their activities to avoid being detected by the IDPS






22. IDPS that reviews log files from servers - network devices - and other IDPSs for signatures indicating an attack or intrusion






23. Netscape and Microsoft have implemented HTTPS to protect data transported via their Web browsers.






24. Device that processes signals; multiplexer or modem






25. Public switched telephone network






26. Supplying electrical power through ethernet






27. Tools in order to connect a new RJ45






28. Frequency modulation-frequency of signal is modified






29. Point to point protocol






30. Enables network managers to continuously monitor network activity






31. Data Link sublayer that manages flow control






32. More variable - convey greater subtleties with less energy






33. User watching an episode of TV show over the internet is what kind of communication






34. Packet one node sends to request a connection with another; 1st of three-step process of establishing a connection






35. IDPS that uses profiles to detect anomalous protocol behavior






36. Packet a node sends to acknowledge that it received a SYN request for connection; 2nd of three-step connection process






37. Form of transmission in which signals are modulated as radiofrequency analog pulses with different frequency ranges; does not involve binary coding






38. A shell protocol that enables systems to use various authenticaion mechanisms.






39. Dynamic Host Configuration Protocol






40. CSU






41. Layer 7






42. Which protocol allows the transfer of a file from one computer to another over the network?






43. A TCP/IP utility that allows you to look up the DNS host name of a network node by specifying its IP address - or vice versa. This is useful for verifying that a hos is configured correctly and for troubleshooting DNS resolution problems






44. An algorithm used to verify the accuracy of data contained in a data frame.






45. Signals traveling on one wire infringes on the signal traveling over an adjacent wire






46. A type of multimode fiber-optic cable that reflects the light-based signals like a mirror within the cable - resulting in different signals arriving at different times and with an increased likeihood of distortion over longer cable runs.






47. The most commonly used form of Post office protocol.






48. First set of six characters that make up the MAC address and that are unique to a particular manufacturer






49. Documented agreement containing technical specifications or other precise criteria used as guidelines to ensure that materials - products - processes - and services suit their intended purpose






50. Data Link Layer