SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
IT: Networking Vocab
Start Test
Study First
Subject
:
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Simple Network Management Protocol
virture privat network (VPN)
SNMP
Block ID
inline sensor
2. ISDN
Remote Authentication Dial-In User Service
Integrated Services Digital Network
centralized control strategy
Presentation
3. Produces guidelines for how network cable should be installed in commercial buildings
carrier sense
TCP/IP Architecture Layer 3
User Datagram Protocol (UDP)
EIA/TIA
4. Used to resolve NetBIOS names w IP address
WINS
grade-index multimode fiber-optic cable
Noise
ACK (acknowledgement)
5. This layer in the OSI network model breaks up the files into packets to allow them to be sent around the network.
Transport Layer
social engineering
OSI Layer 7
broadcast storm
6. Network time protocol
Session
electromagnetic interference (EMI)
port 80
NTP
7. Direct-sequence spread spectrum: signal bits are distributed over a frequency band
Alternate Mark Inversion
ASCII
DSSS
virtual circuit
8. Media access control
MAC
hot site
1000base-sx
Digital
9. Transport layer protocol that services a request without requiring a verified session and without guaranteeing delivery data
Data Link
802.11
connectionless
ESS
10. Extended service set: a group of access points
ESS
Host
scattering
rj-45
11. Layer 5 through 7 Troubleshooting
plenum area
configured with correct sending and receiving email server information
step-index multimode fiber-optic cable
Secure File Transfer Protocol (SFTP)
12. Signals composed ot pulses that can have a value of only 1 or 0
Near End Cross Talk
Network interface card (NIC)
Digital
fiber optic cable
13. Segment
fractionalizing
Bit
TCP/IP Transport Layer Encapsulation
Ring topology
14. A transmission method that has distinct signal levels to represent binary zeroes or ones - such as +5 volts and 0 volts.
128 - 64 - 32 - 16 - 8 - 4 - 2 - 1
NetBIOs
digital
CRC
15. The process of validating a user.
authentication
Device power off
Presentation
High-Level Data Link Control
16. Public switched telephone network
firmware
analog adv
pstn
Password Authentication Protocol
17. Is a TCP/IP service that converts a computer or domain name to an IP address or that converts an IP address to a computer or domain name.
Hypertext Transfer Protocol (HTTP)
FDM
Domain Name System (DNS)
ANDing
18. User friendly web addresses are translated into IP addresses by the...
ANDing
Overhead
Domain Name Service
plain old telephone service (POTS)
19. International telecommunication Union
beacon frame
Category 5
frame
ITU
20. Maximum arc into which you can loop a cable before you will cause data transmission errors
Presentation Layer
Bend Radius
ICANN (Internet Corporation for Assigned Names and Numbers)
TDM
21. IRC
Backbone
Internet Relay Chat
isdn
Extended Network Prefix
22. Is used to enable IP address to be assigned automatically by a DHCP server on a network.
token ring
plenum area
beacon frame
Dynamic Host Configuration Protocol (DHCP)
23. A service on a node
10Base-T
ports
modifying the file-sharing controls
Data Link
24. Multimode fiber
A Protocol
MMF
Classful Addressing
protocol
25. IEEE standard for Ethernet devices and data handling
OSI
carrier sense
802.3
port 69
26. 12-character string that uniquely identifies a network node - hard coded into the NIC by the manufacturer; composed ot the block ID and device ID
MAC address
stateless firewall
latency
HTTP
27. Subgroup of EIA that focuses on standards for information technology - wireless - satellite - fiber optics - and telephone equipment; best known for network cable installation guidelines (TIA/EIA 568-B Series)
TIA (Telecommications Industry Association)
ICANN (Internet Corporation for Assigned Names and Numbers)
CSU/DSU
honey pot
28. Bootstrap Protocol
BOOTP
connectionless
Ethernet
pathping
29. What type of browser is designed for use on small handheld devices such as palmtop computers and iPhones?
Service Set Identifier
utp
SMTP server name
Microbrowser
30. The wave splits into secondary waves
Hypertext Transfer Protocol (HTTP)
port 53
Amplitude
diffraction
31. A single physical/non-physical medium for connecting computers
IP Addressing
Class E Network
virture privat network (VPN)
medium
32. Max size of data units on Ethernet networks
1550bytes
fragmentation
AM
alarm filtering
33. A combination of techniques used to detect an intrusion and then to trace it back to its source
driver
Internet Assigned Numbers Authority
Internet Group Membership Protocol (IGMP)
trap and trace
34. Network Layer
device ID
Transport
FF02
Routing
35. Is usde to communicate time synchronization information between systemson a network
port 80
flow control
Network Time Protocol (NTP)
Amplitude
36. The physical layout of a computer network
topology
Presentation
subnetting purpose
stateless firewall
37. Method of controlling how network nodes access communication channels - ex highway
User Datagram Protocol
network access method
802.11b
ISO (International Organization for Standardization)
38. Controls the transport of data between systems
OSI (Open Systems Interconnection) model
Time Division Multiple Access (TDMA)
HTTPS
Transport
39. A permanent telephone connection between 2 locations that provide a predetermined amount of bandwidth at all times
802.5
leased line
CIDR (Classless Interdomain Routing)
site policy
40. Transport Layer
node
Challenge Handshake Authentication Protocol
OSI Layer 4
true attack stimulus
41. The pattern used to install a network medium
Network Behavior Analysis
topology
802.11
AM
42. Any end device on the network (for example: computers - printers - copy machines...)
phase
Physical Layer
Point-to-Point Protocol over Ethernet
node
43. Rules determining the format and transmission of data
fiber optic connector
protocol
Alien Cross Talk
Point-to-Point Protocol over Ethernet
44. Guarantees that a server continually has power even if a buildings electrical service is interrupted - continuous voltage to a device by switching virtually instantaneously to the battery when it detects loss of power
standby UPS
802.16
TFTP
frame
45. Nondata information that mus accompany data in order for a signal to be properly routed and interpreted by the network
Correct default gateway
Overhead
NetWare Loadable Module
Network Switching
46. A type of subnet that is created using bits that normally would be reserved for network class information by moving the subnet boundary to the left.
physical layer
Crosstalk
MAU
supernet
47. SCP
Network News Transport Protocol (NNTP)
Secure Copy Protocol
HTTP
IEEE
48. Standard analog telephone system
PSTN
Hyper Text Transfer Protocol (HTTP)
VPN
impedance
49. Gives each node unique address
Secure File Transfer Protocol (SFTP)
Domain Name
baseband
Transport
50. It enables the sending node to obtain the MAC address of the intended recipient before packets are sent.
binary
Mesh topology
Serial
Address Resolution Protocol (ARP)