Test your basic knowledge |

IT: Networking Vocab

Subject : it-skills
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. IEEE standard for Ethernet devices and data handling






2. Strategy that combines the best of the other two strategies; while individual agents still analyze and respond to local threats - their reporting to a hierarchical central facility enables the organization to detect widespread attacks






3. User friendly web addresses are translated into IP addresses by the...






4. NNTP






5. Refers to the IEEE 802.3z and IEEE 802.3ab standard for Ethernet communications speed up to 1 Gbps.






6. Trivial file transfer protocol






7. Which layer in the OSI is responsible for routing and controling the flow of packets around the network?






8. This layer in the OSI network model manages log on procedures and password recognition.






9. A computer that has its own CPU and may be used as a stand-alone computer for word processing - spreadsheet creation - or other software applications. It also may be used to access another computer such as another workstation or server via a network.






10. An organization composed of more than 100 representatives from industry and government who together determine standards for the electronics industry in addition to other fields - such as chemical and nuclear engineering.






11. Data circuit-terminating equipment. multiplexer or modem






12. Four twisted wire pairs with three twists per foot. This type can handle transmissions up to 16 MHz. Now limited to telecommunication equipment






13. Rules and configuration guidelines governing implementation and operation of IDPSs within an organization






14. Data Link sublayer that manages flow control






15. In TCP - a term used to describe a TCP header and its encapsulated data (also called an L4PDU). Also in TCP - the process of accepting a large chunk of data from the application layer and breaking it into smaller pieces that fit into TCP segments. In






16. Which protocol is responsible for splitting data into packets and adding a header to each one?






17. The wave splits into secondary waves






18. Simple Network Management Protocol






19. Each node passively listens for then accepts data






20. Is a protocol designed for managing complex networks






21. IPv6 addressing - multicast group






22. Any device connected to a network - such as a microcomputer - mainframe - midrange computer - network equipment - or printer. Also called a station.






23. Signals composed ot pulses that can have a value of only 1 or 0






24. Unlicensed band with 11 channels






25. Requires CSU/DSU-the connection point for a t1 live at customers site






26. A fiber-optic data transport method capable of a 100-Mbps transfer rate using a dual ring topology; largely supplanted today by faster Ethernet method.






27. As defined by the EIA/TIA-568 standard - cabling that connects workstations and servers in the work area.






28. On a computer that receives data over a network - the process in which the device interprets the lower-layer headers and - when finished with each header - removes the header - revealing the next-higher-layer PDU.






29. Layer 1 Troubleshooting






30. Device that connects network segments and directs data based on information in the data packet






31. MIB






32. These reside on a computer or appliance connected to network segment and monitor network traffic






33. Data Link Layer






34. A service used via the Application layer to recognize and access other layers






35. Internet society






36. Aversion of the traceroute utility found on some Linux distributions.






37. Occurs when attacker attempts to gain entry or disrupt normal operations of information systems - almost always with intent to do harm






38. Short reach. only multimode-max length is 500. baseband transmission. 1000 mpbs.






39. Service that supports email






40. Which protocol allows users to recieve emails?






41. LPD






42. Session initiation protocol-performed on VoIP - determines location of endpoints - and establishes sessions between endpoints






43. Layer 3 Troubleshooting






44. All wires are reversed






45. An established guideline that specifies how networked data is formatted into a packet or frame - how it is transmitted - and how it is interpreted at the receiving end.






46. An established guidline that specifies how networked data is formatted into packet or frame - how it is transmitted - and how it is interpreted at the receiving end.






47. FDM






48. A TCP/IP troubleshooting utility that provides information about NetBIOs names and their addresses. If you know the NetBIOs name of a workstation - you can use nbtstat to determine its IP address






49. What type of browser is designed for use on small handheld devices such as palmtop computers and iPhones?






50. A network that any user can access with no restrictions. the most familiar example of a public network is the Internet