Test your basic knowledge |

IT: Networking Vocab

Subject : it-skills
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Physical Layer






2. A command-line utility that combines the functionality of the tracert and ping commands (similar to UNIX's mtr command) and comes with Windows XP - Vista - and Windows Server 2003 and Server 2008






3. UN agency that regulates international telecommunications and provides developing countries with technical expertise and equipment to advance their technological bases






4. A network design consisting of a continuous path for data with no logical beginning or ending point - and thus no terminators.






5. Bootstrap Protocol






6. FDM






7. Process of breaking large packets into smaller packets.






8. A situation in which two or more packets are detected at the same time on an Ethernet network.






9. The information transfered between layers in the same OSI stack






10. Speed: 1000 Mbps - Altenative name: 1000BASE-T - IEEE Standard: IEEE 802.3ab - Cable type: copper max length 100m






11. BSD






12. Serial internet protocol






13. Theoretical. difference b/w highest and lowest frequency.






14. An established guideline that specifies how networked data is formatted into a packet or frame - how it is transmitted - and how it is interpreted at the receiving end.






15. Device that modulates analog signals into digital signals for transmission over telephone lines - and demodulates digital signals into analog for the receiving end






16. A type of fiber optic connector. These connectors are square shaped and have release mechanisms to prevent the cable from accidentally being unplugged






17. Secure Sockets Layer






18. Used with single mode or multi mode fiber optic cable






19. Internet Layer






20. Ethernet LAN-all forms of Ethernet media and interface






21. A technique for connecting to a network at a remote location using Internet as the medium.






22. Multicast group 224-239






23. Also called the physical or MAC address - the hexadecimal number permanently assigned to a network interface and used by the MAC sublayer within the DATA Link layer (Layer 2).






24. Developed by ISO and ANSI - a model that providees a framework for networked hardware and software communication based on seven layers.






25. Application Layer






26. Useful for troubleshooting a network connectivity problem from workstation to another workstation






27. A network owned and maintained by an organization -such as a campus network operated by a college.






28. Describes the relative strength over a three dimensional area of an antenna






29. User watching an episode of TV show over the internet is what kind of communication






30. A combination of techniques used to detect an intrusion and then to trace it back to its source






31. Faster networking and inexpensive - flexible - easy to install






32. Form of transmission that allows multiple signals to travel simultaneously over one medium






33. Ethernet NICs listen on network and wait until they detect no other nodes transmitting data






34. Standard analog telephone system






35. American national standards institute






36. Techniques that employ hardware and software to province assurance against equipment failures - computer service interruptions - and data losses






37. Transforms data into a form network or applications will understand






38. Not individually insulated but shielded. use when there is noise.






39. A network whose access is restricted to only clients or machines with proper credentials.






40. Application Layer






41. IPX & SPX






42. Actual. how much data is transmitted during given time






43. This layer in the OSI network model manages log on procedures and password recognition.






44. A combination of LAN's - MAN's - or WAN's that provides computer users with an array of computer and network resources to complete different tasks.






45. Physical and Data Link layers






46. FHSS






47. Signal interference caused by magnetic force field generated by electrical devices such as motors.






48. Process by which attacker changes the format and/or timing of their activities to avoid being detected by the IDPS






49. Occurs when attacker attempts to gain entry or disrupt normal operations of information systems - almost always with intent to do harm






50. ICMP