Test your basic knowledge |

IT: Networking Vocab

Subject : it-skills
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. What early protocol allows users to access machines remotley that has no security implemented within it?






2. 1) A computer (mainframe - minicomputer - server - or workstation) that has an operating system enabling multiple computers to access it at the same time for files - data - and services. Programs and information may be processed at the host - or they






3. Session initiation protocol-performed on VoIP - determines location of endpoints - and establishes sessions between endpoints






4. An IDPS that resides on particular computer or server (the host) and monitors activity only on that system. Also known as system integrity verifiers.






5. FDM






6. A type of point-to-point digital WAN connection that uses standard phone lines to provide high-speed comm.






7. Process of adjusting IDPS to maximize efficiency in detecting true positives - while minimizing false positives and false negatives






8. Generates signals as changes in voltage at the NIC






9. Prevents broadcast storms by enabling switches to calculate paths that avoid potential loops and artificially block the links that would complete a loop






10. Process in which an NIDPS look for invalid data packets - packets that are malformed under the rules of the TCP/IP protocol






11. The process of validating a user.






12. A device used to connect thicknet cable with a transceiver. A vampire bypasses the need to serve the cable - because the vampire tap has a metal tooth that pierces through the outside cable insulation (like a vampire) and connects with the copper wir






13. For fiber-optic cable communications - the difference between the transmitted power and the receiver sensitivity - as measured in decibels. It is the minimum transmitter power and receiver sensitivity needed for a signal to be sent and received fully






14. Time division multiplexing






15. Amount of data that can be transmitted over media or wireless at a time.






16. A protocol data unit that has been transfered between OSI layers and then stripped of control information and transfere instructions.






17. A computer that accesses another computer - such as a workstation that accesses a shared file on another workstation - server - or mainframe. The client may use the accessed computer (host) to process data - or may process accessed data using its own






18. A type of transmission in which there are several transmission channels on a communications medium - allowing more than one node to transmit at the same time.






19. Standard analog telephone system






20. AM






21. SONET






22. IDPS that uses profiles to detect anomalous protocol behavior






23. Also called the star-wired bus topology - a network design that combines the logial comunications of a bus with the physical layout of a star.






24. The process of checking a communication medium - such as cable - for a voltage level - signal transition - or light - indicating the presence of a data-carrying signal.






25. Network device that makes high-level application connections on behalf of internal hosts and other machines






26. Device with little - if any - of it's own processing or disk capacity; depends on a host to supply it with applications and data-processing services






27. To make more efficient use of limited numbers of legitimate IP addressing






28. IEEE standard for Ethernet devices and data handling






29. The general topic of how on one computer - two adjacent layers in a networking architectural model work together - with the lower layer proving services to the higher layer.






30. Four twisted wire pairs with three twists per foot. This type can handle transmissions up to 16 MHz. Now limited to telecommunication equipment






31. Backbone: A high-capacity communications medium that joins networks on the same floor in a building - on different floors - and across long distances.






32. File Transfere Protocol






33. 6th layer; protocols translate between Application and Network layers; data are formatted so that the network can understand - with the format varying according to the type of network; manages data encryption and decryption - such as scrambling of sy






34. Process of directing a datagram from its source through an internetwork to its destination using the most efficient path.






35. A versatile - chainable serial-bus technology that connects up to 127 devices at speeds of 1.5 Mbps and 12 Mbps as well as 480 Mbps.






36. Uses multiple frequencies to transmit signal






37. Provides Internet access and/or other services such as email and Web hosting






38. FDDI






39. The transmission capacity of a communications medium - which is typically measured in bits per second (for data transmissions) or hertz (for data - voice - and video transmissions) - and which is determined by the maximum minus the minimum transmissi






40. Frame






41. Physical layout of a star topology and also ring logical topology






42. As defined by the EIA/TIA-568 standard - cable that runs between network equipment rooms - floors - and buildings.






43. Process by which attacker changes the format and/or timing of their activities to avoid being detected by the IDPS






44. Measure of a signal's strength






45. NDS






46. Open source program that allows you too remotely take over another workstation and walk through support process






47. Technology that uses standard telephone wires and allows transmission of voice and data information. Slower than ADSL.






48. Data Link Layer






49. A specially configured connection on a network device that is capable of viewing all the traffic that moves through the entire device.






50. Application Layer