SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
IT: Networking Vocab
Start Test
Study First
Subject
:
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. The wave bounces back when encountering an object
network class a
IP Address
66 Block
reflection
2. 7th layer; protocols enable software programs to negotiate formatting - procedural - security - synchronization - and other requirements with the network
BOOTP
Application layer
Frames
Presentation Layer
3. Method of data modulation in which the frequency of the carrier signal is modified by the application of the data signal
Full Duplex NIC Communication
ARP
::1
Frequency Modulation
4. Alert or alarm that occurs in the absence of an actual attack
Straight tip connector
MAC address
802.2
false positive
5. Basic error checking and correction
Data Link
TIA
traceroute (tracert)
Braiding
6. Assigning a unique frequency band to each communication
802.2
FDM
SMF
CSMA/CD
7. Single mode fiber
SMF
local area network (LAN)
bandwidth
device address
8. Several ethernet nodes can be connected and can monitor traffic or access media simultaneously
enticement
Mac Addressing
Transmission Protocol (TCP)
multiple access
9. Network news transfer protocol
NNTP
addressing
star topology
host-based IDPS (HIPDS)
10. HTTP - SMTP - POP3 - VoIP
TCP/IP Vs. Netware: Application
cable plant
beaconing
Ring topology
11. Value placed upon an IDPS's ability to detect/identify certain attacks correctly
white/orange and orange
confidence value
American Wire Gauge
transmit
12. Event that triggers alarm when no actual attack is in progress
Device power unplugged
ITU
false attack stimulus
WDM
13. Area above the ceiling tile or below the subfloor in a building
Subscriber connector
padded cell
modem
Plenum
14. Application Layer
goodput
128 - 64 - 32 - 16 - 8 - 4 - 2 - 1
OSI Layer 7
hybrid fiber / coax (HFC) cable
15. Which protocol is responsible for routing packets around the network?
Remote Authentication Dial-In User Service
BSS
Internet Protocol
Half Duplex NIC Communication
16. VPN
route
Transmission media
Encrypting File System
Virtual Private Network
17. Aversion of the traceroute utility found on some Linux distributions.
configured with correct sending and receiving email server information
tracepath
T-Carrier Level 1
twisted shielded pair
18. Contains information that a wireless node needs to associate with an ap
ITU
crossover cable
Canonical Name
beacon frame
19. Internet society
scattering
Domain Controller
ISOC
BGP
20. A specialized device that allows multiple networks or segments to connect and exchange data
Patch Panel
connectivity device
Point-to-Point Tunneling Protocol
Simple Mail Transfer Protocol (SMTP)
21. Netscape and Microsoft have implemented HTTPS to protect data transported via their Web browsers.
Frequency Hopping Spread Spectrum
Hypertext Transfer Protocol Secure (HTTPS)
headened
Remote Access Service
22. A single physical/non-physical medium for connecting computers
Class D Network
medium
Punch-Down Block
SMTP (Simple Mail transfer Protocol)
23. Layer 1 Troubleshooting
Server
intrusion
Incorrect cable type
Full Duplex NIC Communication
24. Bus topology: A network design built by running cable from one PC or file server to the next - like links in a chain.
IETE
step-index multimode fiber-optic cable
Bus topology
overhead
25. International Organization for Standardization
Physical
ISO
broadcast frame or broadcast packet
electromagnetic interference (EMI)
26. Brief delay in processing - length of cable can contribute to this
frame
Serial Line Internet Protocol
latency
media access control (MAC)
27. The cableing or radio waves used to connect one network computer to another - or one network to another - and transport data between them.
BNC connector
SSID
Asymmetric Digital Subscriber Line
communications media
28. Which class of IP address would be allocated to a very large company?
Class A
session layer
diffraction
ISOC
29. Why are web pages viewed using HTTP?
crimping tool and wore stripper
footprinting
Adjacent Layer Interaction
To stop the Hamburgerler from stealing all of Ronnie McDonalds burgers
30. American national standards institute
ANSI
SMTP
Braiding
Virtual Private Network
31. Consists of activities that deter intrusion
whois
intrusion prevention
Class A Network
Workstation
32. Network time protocol
NTP
stateful protocol analysis (SPA) IDPS
5-4-3 rule
Primary Rate Interface
33. Network layer device
Ferrule
router
CRC (cyclic redundancy check)
EMI
34. A situation in which two or more packets are detected at the same time on an Ethernet network.
NetBIOs
coaxial cable
Repeaters
collision
35. LPR
Internet
Full-Duplex
switch
Line Printer Remote
36. Device that receives and retransmits microwave data signals
Remote Desktop Protocol
satellite
Network File System
electromagnetic interference (EMI)
37. Internet Layer
IGMP
OSI Layer 7
signal
TCP/IP Architecture Layer 2
38. Process of breaking large packets into smaller packets.
fragmentation
route
Punch-Down Block
CSU/DSU
39. A unit of data formatted for transmission over a network that contains control and other information that corresponds to the OSI Networklayer; also called Layer 3.
IP Address
packet
extranet
plenum area
40. An IP addressing and subnetting method in which network and host information is manipulated without adhering to the limitations imposed by traditional network class distinctions. CIDR is also known as classless routing or supernetting. Older routing
header
false negative
CIDR (Classless Interdomain Routing)
public network
41. A service used via the Application layer to recognize and access other layers
redirector
ATU-R
Application
Gigabit Ethernet
42. Determines standards for the electronics industry and other fields - such as chemical and nuclear engineering - health and safety - and construction
ANSI
Physical Layer (Layer 1)
NetWare Directory Services
Main Distribution Frame
43. Packet
TCP/IP Internet Layer Encapsulation
Kerberos
Secure Sockets Layer (SSL)
SNAT (Static Network Address Translation)
44. A network design in which every node is connected to every other note - achieving fault tolerance.
ITU
mesh topology
1550bytes
Device power unplugged
45. Services that allow remote users to connect to the network
access services
Presentation
voltage
electromagnetic interference (EMI)
46. Time Division Multiple Access
TDMA
the higher the frequency
confidence value
full duplex
47. A term used to refer to data within the Data-link layer of the OSI model.
Class D Network
Modulation
slip
frame
48. What does POP3 stand for?
host
802.5
Post Office Protocol
Internet
49. Restructuring data units that have been segmented
reassembly
Class B Network
FTP
device ID
50. Asynchronous digital subscriber line. Method of providing internet service that uses the standard phone line - but transmits data at a different frequency than voice. Faster than ISDN.
TFTP
fixing noise
ADSL
Class E Network