SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
IT: Networking Vocab
Start Test
Study First
Subject
:
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. User watching an episode of TV show over the internet is what kind of communication
point to multipoint
Secure Hypertext Transfer Protocol (S-HTTP)
Point-to-Point
DNS
2. Zeroconf
Zero Configuration
Telnet
frequency
TCP/IP Architecture Layer 2
3. Faster wireless standard 20-25
802.11g
terminators
SMF
packet
4. Transport Layer
TCP/IP Architecture Layer 3
twisted pair connector
centralized control strategy
Category 5
5. Hardware device typically used to connect multiple LANs
star wired ring
Transport
HTTP
router
6. Layer 3 Troubleshooting
IP address within the assigned network
installing cable
Synchronous Optical Network
inline sensor
7. Modulation technique in which the amplitude of the carrier signal is modified by the application of a data signal
DSLAM
Amplitude Modulation
intrusion
DNS
8. Large networks 1-126
topology
255.255.0.0
Class A Network
amplitude
9. Slow wireless standard 11-18 throughput
802.11a
Local area network (LAN)
Media Dependent Interface
leased line
10. This layer in the OSI network model breaks up the files into packets to allow them to be sent around the network.
pppoe
SSL
Integrated Services Digital Network
Transport Layer
11. BERT
WINS
telephone connector
Bit-Error Rate Test
OSI Layer 6
12. LPD
ICS (Internet Connection Sharing)
MAN
Line Printer Daemon
Network
13. Ensures reliablity of packet transmissions from node to node - Ensures that data is sent and received in the same order - Provides acknowledgement when a packet is received - Monitors for packet transmission errors and resends bad packets - Breaks la
Transport Layer (Layer 4)
T-Carrier Level 1
802.3
Common Internet File System
14. IMAP - internet message access protocol
OSI Layer 1
Internet Protocol version 4
Network News Transport Protocol
port 143
15. IEEE 802.3 Media Access Control (MAC) sublayer of the data link layer
Transport
roaming
802.3
half duplex
16. Device that enables networks or segments using different media to interconnect and exchange signals
10BASE2 Limit
monitoring port (SPAN port)
Error Handling
Media Converter
17. Secure Shell
Network News Transport Protocol
SSH
SONET
omnidirectional antenna
18. Name Of Layer 3
Multiplexing
RARP
Network
encapsulate
19. A permanent telephone connection between 2 locations that provide a predetermined amount of bandwidth at all times
Crossover Cable
Data Link
Serial Line Internet Protocol
leased line
20. A private network that functions like a tunnel though a large network-such as the Internet or an enterprise network-that is restricted to designated member clients only.
Faulty network cable
protocol
virture privat network (VPN)
CSU/DSU
21. A network on which any computer can communicate with other networked computers on an equal (peer) basic without going though an intermediary - such as a server. Peer-to-Peer networking enables each computer to offer and access shared resoures - such
cabeloco
Session
peer-to-peer network
bus topology
22. Frequency Division Multiple Access
Firewall configured correctly
FDMA
monitoring port (SPAN port)
FM
23. Developed by ISO and ANSI - a model that providees a framework for networked hardware and software communication based on seven layers.
Broadcast
Open System Interconnection (OSI) referance model
centralized control strategy
ISDN
24. Secure CoPy-utility that allows you to copy files securely from host to another
DB-9 connector
SCP
Network News Transport Protocol (NNTP)
Secure Sockets Layer (SSL)
25. Protocol data unit
port 22
network monitor
PDU
RTT
26. Ppp tunneling protocol
diffraction
router
ppptp
network class a
27. Wireless standard
Virtual Private Network
driver
white/orange and orange
802.11
28. Power loss - the amount of signal that is lost as it travels though the communication medium from the source (transmitting node) to the receiving node.
Transmission media
Attenuation
Thin Eterhnet/10 Base 2
NFS
29. SSH - secure shell
Domain Name System (DNS)
Punch-Down Block
port 22
Open System Interconnection (OSI) referance model
30. A type of point-to-point digital WAN connection that uses standard phone lines to provide high-speed comm.
standby UPS
supernet mask
Hypertext Transfer Protocol (HTTP)
DSL
31. A process in which a digital signature is placed in a driver. The digital signature helps ensure that the driver is tested and is compatible with the operating system and device for which it is written.
driver signing
Analog
Virtual Private Network
ITU
32. The process of validating a user.
authentication
TCP/IP Architecture Layer 3
Connectors
Alternate Mark Inversion
33. The capacity to send and receive signals at the same time on the same medium.
Management Information Base
full duplex
Core
5-4-3 rule
34. Is an e mail retival protocol designed to enabel users to access their e-mail from various locations
Point-to-Multipoint
10Gbase-t
Inter Message Access Protocol (IMAP)
diffraction
35. Telnet
Remote Access Service
Authentication Header
Port 23
port 53
36. Large diameter. led/light is generated at different angles. high throughput - high noise resistance - excellent security - and long distances
MMF
Data Link
Network Layer (Layer 3)
Bandwidth
37. A computer on a network that requests services or resources from another computer on a network
fixing noise
workstation
Authentication Header
frequency
38. What early protocol allows users to access machines remotley that has no security implemented within it?
Physical Layer (Layer 1)
Telnet
multiple access
Byte
39. RSA
Rivest - Shamir - Adelman
diffraction
Node
Management Information Base
40. MAC Protocols
Fast Ethernet
TCP/IP Vs. Netware: Network Access
modem
Transport
41. Hardware that constitutes the enterprise-wide cabling system
RIP
Data Link
Cable Plant
Transport
42. IP
Single mode fiber
driver
authentication
Internet Protocol
43. FTP is an application that enables the transfer of data from one remote device to another - using TCP/IP
File Transfere Protocol - (FTP)
traceroute (tracert)
data packets
bandwidth
44. The _____________ allows certain bits of the IP address to be ignored when checking to see if an IP address matches the destination network address.
binary
Subnetmask
Demarcation Point
noise
45. Application layer protocol that formulates and interprets requests between Web clients and servers
HTTP (Hypertext Transfer Protocol)
signal
Frequency Division Multiplexing
Authentication Header
46. LPR
PDU
1550bytes
File Transfer Protocol (FTP)
Line Printer Remote
47. Prevents two nodes transmitting at the same time
Data Link
fiber-optic cables
Serial Line Internet Protocol
Radio Frequency Interference
48. What does POP3 stand for?
Radio Waves
Private Network
Post Office Protocol
Error Handling
49. Encompasses actions an organization takes when intrusion is detected
certification value may be lessened due to the number of people obtaining them
Half-Duplex
intrusion reaction
WAN
50. 1000 representatives from industry and gov't who determine standards for electronics - chemical and nuclear engineering - health and safety - and construction
reassembly
ANSI (American National Standards Institute)
File Transfer Protocol
token