SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
IT: Networking Vocab
Start Test
Study First
Subject
:
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. CIFS
Apple File Protocol
Default Gateway
stp
Common Internet File System
2. (fix) if analog an amplifier or if digital with repeater
RFI
fixing attenuation
star topology
headened
3. Equivalent to OSI Layer 3 Network
intrusion correction
transceiver
TCP/IP Vs. OSI: Internet
Internet
4. Nondata info that must accompany data for it to be properly routed. addition to data
logical address
DB-9 connector
overhead
ppp
5. Allows for secure interactive control of remote systems
Secure Shell (SSH
Physical
intrusion reaction
POP3 (Post Office Protocol - version 3)
6. Strategy in which all IDPS control functions are implemented and managed in a central location
centralized control strategy
step-index multimode fiber-optic cable
Quality of Service
Modem
7. 128-191
DTE
network class B
SMTP server name
protocol and services
8. A Data Link sublayer that examines addressing information contained in a network frame and controls how devices share communications on the same network.
POP3 (Post Office Protocol - version 3)
media access control (MAC)
VPN
SSL
9. Network Layer
Core
Packets
FHSS
802.11g
10. Form of transmission that allows multiple signals to travel simultaneously over one medium
SONET
encryption
Multiplexing
DTE
11. A network design consisting of a continuous path for data with no logical beginning or ending point - and thus no terminators.
Ring topology
phase
Network layer
Baseband
12. A app. loaded on a server included with Windows OS that enables remote access
RAS
Ring topology
NIC (Network Interface Card)
Network File System (NFS)
13. Time division multiplexing
reassembly
Challenge Handshake Authentication Protocol
client
TDM
14. Attacker who utilizes tactics designed to trip the organization's IDPS - essentially causing the organization to conduct its own DoS attack - but overreacting to an actual - but insignificant - attack.
baseband
IDPS terrorist
MMF
Client Software
15. Transport Layer
OSI Layer 4
star-wired ring topology
Organizational Unit
ISO (International Organization for Standardization)
16. Anything - hardware or software - that monitors transmission of packets of digital information that attempt to pass the perimeter of a network
Inter Message Access Protocol (IMAP)
DHCP
firewall
Organizational Unit
17. The medium that carries multiple signals simultaneously
Bend Radius
backbone
broadband
connectivity device
18. Cause by length - loss of signals as it travels farther away
attenuation
bus topology
synchronous communications
2.4-GHz band
19. Translates data to a format the receiving node understands - such as from EBCDIC to ASCII - Performs data encryption - Performs data compression
PPP
Topology
Presention Layer (Layer 6)
Institute of Electrical and Electronics Engineers (IEEE)
20. Method of data modulation in which the frequency of the carrier signal is modified by the application of the data signal
Frequency Modulation
flow control
Internet
Round Trip Time
21. Process by which attacker changes the format and/or timing of their activities to avoid being detected by the IDPS
evasion
leased line
intrusion detection
network class C
22. IDPS that reviews log files from servers - network devices - and other IDPSs for signatures indicating an attack or intrusion
alert or alarm
Microbrowser
log file monitor (LFM) IDPS
digital adv
23. Netscape and Microsoft have implemented HTTPS to protect data transported via their Web browsers.
Hypertext Transfer Protocol Secure (HTTPS)
port 143
Application Layer (Layer 7)
Thin Eterhnet/10 Base 2
24. Device that processes signals; multiplexer or modem
noise
Bandwidth
Data Circuit-Terminating Equipment
Adjacent Layer Interaction
25. Public switched telephone network
pstn
honey pot
baseband
bus topology
26. Supplying electrical power through ethernet
RADIUS
transmission media
Cable Plant
power over ethernet
27. Tools in order to connect a new RJ45
Conduit
crimping tool and wore stripper
TDMA
Presentation layer
28. Frequency modulation-frequency of signal is modified
FM
Dense Wavelength Division Multiplexing
FDDI
stateful firewall
29. Point to point protocol
ppp
POP3 (Post Office Protocol - version 3)
Kroner
simplex
30. Enables network managers to continuously monitor network activity
Management Information Base
Simple Network Management Protocol (SNMP)
protocol stack verification
Regeneration
31. Data Link sublayer that manages flow control
internetwork
Amplitude Modulation
LLC
Class E Network
32. More variable - convey greater subtleties with less energy
Fast Ethernet (characteristics)
analog adv
802.2
radio frequency interference (RFI)
33. User watching an episode of TV show over the internet is what kind of communication
Frequency Division Multiplexing
footprinting
point to multipoint
physical layer
34. Packet one node sends to request a connection with another; 1st of three-step process of establishing a connection
access services
electromagnetic interference (EMI)
SYN (syncronization)
Baseband
35. IDPS that uses profiles to detect anomalous protocol behavior
BNC connector
IP address within the assigned network
reassembly
stateful protocol analysis (SPA) IDPS
36. Packet a node sends to acknowledge that it received a SYN request for connection; 2nd of three-step connection process
Data Link Layer
Internet Connection Sharing
public network
SYN-ACK (synchronization-acknowledgment)
37. Form of transmission in which signals are modulated as radiofrequency analog pulses with different frequency ranges; does not involve binary coding
Broadband
router
FHSS
Simple Network Management protocol (SNMP)
38. A shell protocol that enables systems to use various authenticaion mechanisms.
API (application program interface)
logical address
Dynamic Host Configuration protocol (DHCP)
EAP
39. Dynamic Host Configuration Protocol
whois
PSTN
Telnet
DHCP
40. CSU
DHCP
FDM
Channel Service Unit
bandwidth
41. Layer 7
transceiver
Application Layer (Layer 7)
Application
route
42. Which protocol allows the transfer of a file from one computer to another over the network?
File Transfer Protocol
carrier sense
10BASE5 Limit
plenum area
43. A TCP/IP utility that allows you to look up the DNS host name of a network node by specifying its IP address - or vice versa. This is useful for verifying that a hos is configured correctly and for troubleshooting DNS resolution problems
geosynchronous
nslookup
Point-to-Multipoint
Crosstalk
44. An algorithm used to verify the accuracy of data contained in a data frame.
Network
certification value may be lessened due to the number of people obtaining them
CRC (cyclic redundancy check)
session
45. Signals traveling on one wire infringes on the signal traveling over an adjacent wire
cross talk
access services
point to multipoint
radio frequency interference (RFI)
46. A type of multimode fiber-optic cable that reflects the light-based signals like a mirror within the cable - resulting in different signals arriving at different times and with an increased likeihood of distortion over longer cable runs.
step-index multimode fiber-optic cable
synchronous communications
Internet Control Message Protocol (ICMP
perimeter
47. The most commonly used form of Post office protocol.
ICANN (Internet Corporation for Assigned Names and Numbers)
intrusion prevention system (IPS)
POP3 (Post Office Protocol - version 3)
network access method
48. First set of six characters that make up the MAC address and that are unique to a particular manufacturer
File Transfere Protocol - (FTP)
statistical multiplexing
Network File System (NFS)
block ID
49. Documented agreement containing technical specifications or other precise criteria used as guidelines to ensure that materials - products - processes - and services suit their intended purpose
mtr (my traceroute)
Class E Network
standard
Internet Engineering Task Force (IETE)
50. Data Link Layer
Frequency
Structure
Mac Addressing
intrusion detection