SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
IT: Networking Vocab
Start Test
Study First
Subject
:
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. What early protocol allows users to access machines remotley that has no security implemented within it?
10BASE5 Limit
pstn
Fast Ethernet
Telnet
2. 1) A computer (mainframe - minicomputer - server - or workstation) that has an operating system enabling multiple computers to access it at the same time for files - data - and services. Programs and information may be processed at the host - or they
ISO
DHCP
standard connector
Host
3. Session initiation protocol-performed on VoIP - determines location of endpoints - and establishes sessions between endpoints
packet
TIA (Telecommications Industry Association)
SIP
FDMA
4. An IDPS that resides on particular computer or server (the host) and monitors activity only on that system. Also known as system integrity verifiers.
host-based IDPS (HIPDS)
Topology
802.5
station
5. FDM
Frequency Division Multiplexing
site policy
Trivial File Transfer Protocol (TFTP)
DSL
6. A type of point-to-point digital WAN connection that uses standard phone lines to provide high-speed comm.
DSL
the more twist
router
PDU
7. Process of adjusting IDPS to maximize efficiency in detecting true positives - while minimizing false positives and false negatives
MAN
Segments
tuning
Internet Group Membership Protocol (IGMP)
8. Generates signals as changes in voltage at the NIC
serial
WAN Connectivity
physical layer
IANA (Internet Assigned Numbers Authority)
9. Prevents broadcast storms by enabling switches to calculate paths that avoid potential loops and artificially block the links that would complete a loop
Transport
MAU
Straight tip connector
STP
10. Process in which an NIDPS look for invalid data packets - packets that are malformed under the rules of the TCP/IP protocol
protocol stack verification
Optical Time Domain Reflectometer
port 22
Radio Waves
11. The process of validating a user.
latency
MAN
authentication
social engineering
12. A device used to connect thicknet cable with a transceiver. A vampire bypasses the need to serve the cable - because the vampire tap has a metal tooth that pierces through the outside cable insulation (like a vampire) and connects with the copper wir
port 80
Alien Cross Talk
Application layer
vampire tap
13. For fiber-optic cable communications - the difference between the transmitted power and the receiver sensitivity - as measured in decibels. It is the minimum transmitter power and receiver sensitivity needed for a signal to be sent and received fully
fragmentation
Gigabit Ethernet (fiber characteristics)
DSLAM
power budget
14. Time division multiplexing
OSI Layer 5
TDM
Network News Transport Protocol (NNTP)
255.255.0.0
15. Amount of data that can be transmitted over media or wireless at a time.
VLAN
narrowband
bandwidth
Gigabit Ethernet (non-fiber characteristics)
16. A protocol data unit that has been transfered between OSI layers and then stripped of control information and transfere instructions.
PDU
service data unit (SDU)
Repeater
presentation layer
17. A computer that accesses another computer - such as a workstation that accesses a shared file on another workstation - server - or mainframe. The client may use the accessed computer (host) to process data - or may process accessed data using its own
Bend Radius
802.11g
Client
honey pot
18. A type of transmission in which there are several transmission channels on a communications medium - allowing more than one node to transmit at the same time.
FDMA
broadband
Data Link
connectionless
19. Standard analog telephone system
ARP
device address
PSTN
Application
20. AM
API (application program interface)
Category 5e
Amplitude Modulation
IMAP4 (Internet Message Access Protocol - version 4)
21. SONET
switch
Synchronous Optical Network
Hypertext Transfer Protocol (HTTP)
OSI Layer 6
22. IDPS that uses profiles to detect anomalous protocol behavior
ATM
Decapsulation
stateful protocol analysis (SPA) IDPS
message and circuit
23. Also called the star-wired bus topology - a network design that combines the logial comunications of a bus with the physical layout of a star.
Internet Control Message Protocol (ICMP
star-bus hybrid topology
beacon frame
Session layer
24. The process of checking a communication medium - such as cable - for a voltage level - signal transition - or light - indicating the presence of a data-carrying signal.
carrier sense
connectionless
Internet Control Message Protocol
Internet Message Access Protocol version 4
25. Network device that makes high-level application connections on behalf of internal hosts and other machines
alarm clustering and compaction
proxy server
authentication
carrier sense
26. Device with little - if any - of it's own processing or disk capacity; depends on a host to supply it with applications and data-processing services
ethernet
Institute of Electrical and Electronics Engineers (IEEE)
terminal
Internet Information Services
27. To make more efficient use of limited numbers of legitimate IP addressing
Server
subnetting purpose
alert or alarm
RAS
28. IEEE standard for Ethernet devices and data handling
OSI
standard connector
partially distributed control strategy
802.3
29. The general topic of how on one computer - two adjacent layers in a networking architectural model work together - with the lower layer proving services to the higher layer.
entrance facilities
Adjacent Layer Interaction
Frequency Division Multiplexing
fixing noise
30. Four twisted wire pairs with three twists per foot. This type can handle transmissions up to 16 MHz. Now limited to telecommunication equipment
Presention Layer (Layer 6)
Domain Controller
Category 3
MIME (Multipurpose Internet Mail Extensions)
31. Backbone: A high-capacity communications medium that joins networks on the same floor in a building - on different floors - and across long distances.
ISDN
reassembly
Backbone
satellite
32. File Transfere Protocol
MAC address
Address Resolution Protocol
Layer 2 Forwarding
FTP
33. 6th layer; protocols translate between Application and Network layers; data are formatted so that the network can understand - with the format varying according to the type of network; manages data encryption and decryption - such as scrambling of sy
IDPS terrorist
analog adv
Channel Service Unit
Presentation layer
34. Process of directing a datagram from its source through an internetwork to its destination using the most efficient path.
Impedance
1000base-sx
intrusion prevention system (IPS)
routing
35. A versatile - chainable serial-bus technology that connects up to 127 devices at speeds of 1.5 Mbps and 12 Mbps as well as 480 Mbps.
MAC address
OSI
Universal serial bus
Nonbroadcast Point-to-Multipoint Transmission
36. Uses multiple frequencies to transmit signal
ethernet
spread-spectrum
PSTN
CD-ROM File System
37. Provides Internet access and/or other services such as email and Web hosting
ISP (Internet service provider)
twisted pair connector
connectionless
Session
38. FDDI
Frequency Division Multiple Access (FDMA)
(fiddy) Fiber Distributed Data Interface
Serial Line Internet Protocol
Connectors
39. The transmission capacity of a communications medium - which is typically measured in bits per second (for data transmissions) or hertz (for data - voice - and video transmissions) - and which is determined by the maximum minus the minimum transmissi
subnetting purpose
Network Layer
public switched telephone network (PSTN)
bandwidth
40. Frame
soft skills
thin client computing
TCP/IP Network Access Layer Encapsulation
Kerberos
41. Physical layout of a star topology and also ring logical topology
star wired ring
EIA/TIA
ICS (Internet Connection Sharing)
CIDR (Classless Interdomain Routing)
42. As defined by the EIA/TIA-568 standard - cable that runs between network equipment rooms - floors - and buildings.
coaxial cable
Physical
backbone cabling
Time Division Multiple Access (TDMA)
43. Process by which attacker changes the format and/or timing of their activities to avoid being detected by the IDPS
social engineering
evasion
plenum cables
128 - 64 - 32 - 16 - 8 - 4 - 2 - 1
44. Measure of a signal's strength
TCP/IP Vs. OSI: Transport
Amplitude
API (application program interface)
router
45. NDS
Application Layer (Layer 7)
Bandwidth
ESS
NetWare Directory Services
46. Open source program that allows you too remotely take over another workstation and walk through support process
Entrance Facilities
WAN Connectivity
encapsulate
RealVNC
47. Technology that uses standard telephone wires and allows transmission of voice and data information. Slower than ADSL.
application protocol verification
ISDN
Default Gateway
authentication
48. Data Link Layer
bandwidth
OSI
WAN Connectivity
Optical Time Domain Reflectometer
49. A specially configured connection on a network device that is capable of viewing all the traffic that moves through the entire device.
Punch-Down Block
Hypertext Transfer Protocol (HTTP)
monitoring port (SPAN port)
digital dis
50. Application Layer
geosynchronous
Session layer
TCP/IP Architecture Layer 4
SSH