SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
IT: Networking Vocab
Start Test
Study First
Subject
:
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. The physical cables that link computers in a network
ppptp
physical media
Gigabit Interface Converter
installing cable
2. The transmission capacity of a communications medium - which is typically measured in bits per second (for data transmissions) or hertz (for data - voice - and video transmissions) - and which is determined by the maximum minus the minimum transmissi
topology
social engineering
bandwidth
Presentation
3. Ethernet communications at speeds up to 100 Mbps as defined under the IEEE 802.3u standard.
Fast Ethernet
Line Printer Daemon
OSI Reference to TCP
POTS
4. Also called the star-ring hybrid - topology - a network design in which the logic communication are in a ring - but the phyical layout of the network star.
signal
TCP/IP Architecture Layer 2
star-wired ring topology
connectionless
5. Wavelength division multiplexing
fat pipe
WDM
Internet Key Exchange
Internet Group Membership Protocol (IGMP)
6. Twist wire so you don't get interference on the memory
Application Layer
network class a
IEEE
fixing cross talk
7. Carrier Sense Multiple Access with Collision Detection
simplex
switch
802.11n
CSMACD
8. Cross talk with 2+ wires
alien cross talk
Challenge Handshake Authentication Protocol
plenum area
TCP port 23
9. Device that enables networks or segments using different media to interconnect and exchange signals
Braiding
Client
Media Converter
Broadband
10. Pointing in a direction
network monitor
fragmentation
WAN
directional antennas
11. ISM
WAN
Industrial - Scientific - and Medical
topology
Secure Hypertext Transfer Protocol (S-HTTP)
12. Wide area network
narrowband
WAN
ethernet
Shielded Twised Pair
13. Manages end-to-end delivery of data
RARP
transport layer
Post Office Protocol version 3
Hypertext Transfer Protocol (HTTP)
14. FTP-Data - file transfer data
SCP
Port 20
Mechanical Transfer-Registered Jack
Data Terminal Equipment
15. Cause by EMI/RFI - and other packets - interference on the signal
noise
router
Amplitude Modulation
supernet mask
16. Name Of Layer 3
HTTPS
Network
Data Link
certification value may be lessened due to the number of people obtaining them
17. A standard for encoding and interpreting binary files - images - video - and non-ASCII character sets within an e-mail message.
MIME (Multipurpose Internet Mail Extensions)
encapsulate
Remote Desktop Protocol
Electromagnetic Interference
18. Two twisted wire pairs. It's the oldes type and is only voice grade - it isn't rated for data communication.
full mesh
10Base-T
Category 1
Authentication Header
19. A connecting device for a network that accepts messages and broadcasts them out to the rest of the network.
hub
Radio Frequency Interference
headened
Full-Duplex
20. Change in signal strength as a result of reflection - scattering - or diffraction
Remote Access Service
MIME (Multipurpose Internet Mail Extensions)
PDU
fading
21. Style of data transmission in which the pulses that represent bits follow one another along a single transmission line; sequentially issued
Serial
802.3
step-index multimode fiber-optic cable
MAN
22. Strategy in which all control functions are applied at the physical location of each IDPS component
DHCP
fully distributed control strategy
Broadband
voltage
23. A value or means of identifying a service on a network node - such as socket or port 103 for standerdized e-mail services in the TCP protocol.
Hyper text transfer protocol
Full Duplex NIC Communication
UDP
socket
24. Device similar to a burglar alarm in that it detects a violation and activates an alarm.
802.11n
connectionless
extranet
intrusion detection system (IDS)
25. A connecting device for a network that accepts messages and forwards them to the correct section of the network. Generally more intelligent than a hub and a switch.
MMF
routing
Single mode fiber
router
26. A far-reaching system of networks that usually extends over approximately 48 kilometers (about 30 miles) and often reaches across states and continents.
ISDN
route
cp connection
Wide area network (WAN
27. A unit of data formatted for transmission over a network that contains control and other information that corresponds to the OSI Networklayer; also called Layer 3.
Post Office Protocol version 3
TCP/IP protocol failure
packet
Core
28. A very high speed - long distance media that consists of a single strand of fiber glass that carries the signals. Can transmit data 50 times further than multimode fiber at a faster rate
POP3
Point-to-Multipoint
analog signal
Single mode fiber
29. A TCP/IP utility that queries the DNS database and provides information about a host given its IP address or vice versa. Dig is similar to the nslookup utility - but provides more information - even in its simplest form - than nslookup can.
IP Addressing
dig (domain information groper)
ICS (Internet Connection Sharing)
RAS
30. Routing protocol has the poorest convergence time
RIP
STP
traceroute (tracert)
router
31. Signal interference caused by magnetic force field generated by electrical devices such as motors.
Network Address Translation
Mail Exchanger
Application
electromagnetic interference (EMI)
32. Requires many pulses to transmit same info that an analog can transmit in a wave
full mesh
digital dis
bayonet nut connector (BNC)
stateful protocol analysis (SPA) IDPS
33. BERT
Bit-Error Rate Test
FM
POP3
MAC address
34. Media access control
analog signal
MAC
shielded twisted-paired (STP) cable
tracert
35. Saturation of network bandwidth caused by excessive traffic - as when a large number of computers or devices attemp to transmit simultaneously - or when computers or devices presist in transmitting repeatedly.
broadcast storm
hot site
collision
coax cable connector
36. An IP addressing and subnetting method in which network and host information is manipulated without adhering to the limitations imposed by traditional network class distinctions. CIDR is also known as classless routing or supernetting. Older routing
Quality of Service
802.16
event viewer
CIDR (Classless Interdomain Routing)
37. Device that separates multiplexed signals once they are received and regenerates them in their original form
DTE
Demultiplexer
broadband
frequency
38. The _____________ allows certain bits of the IP address to be ignored when checking to see if an IP address matches the destination network address.
power over ethernet
15 hops
Subnetmask
Presentation Layer
39. 5th layer; establishes and maintains communication between two nodes on the network; 'traffic cop'
demilitarized zone
Session layer
partially distributed control strategy
baseband
40. (fix) if analog shield twisted pairs or if digital with a repeater
Transport
Data Circuit-Terminating Equipment
fixing noise
5-4-3 rule
41. Amount of data that can be transmitted over media or wireless at a time.
PSTN
passive scanning
bandwidth
Client
42. (WIde area network) Carry networks longer distances than Lans
Transport
SONET
WAN
DTE
43. A remote connection where the client computer is a low-end computer that communicates with a terminal server.
standard
collision
Category 1
thin client computing
44. 7th layer; protocols enable software programs to negotiate formatting - procedural - security - synchronization - and other requirements with the network
Application layer
SDU
Multiplexing
intrusion correction
45. Frequency Division Multiple Access
WAN
Rivest - Shamir - Adelman
topology
FDMA
46. A service on a node
ports
demand priority
ACK (acknowledgement)
Post Office Protocol 3 (POP3)
47. An advantage of networks
networks enable users to share resources
Presentation
network class B
GBIC
48. Event that triggers alarms and causes an IDPS to react as if a real attack is in progress
Impedance
fiber optics
true attack stimulus
Media Converter
49. Address resolution protocol
bandwidth
ARP
baseband
communications services
50. The most commonly used form of Post office protocol.
Network
star topology
centralized control strategy
POP3 (Post Office Protocol - version 3)