SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
IT: Networking Vocab
Start Test
Study First
Subject
:
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. In CIDR notation - the number of bits used for an extended network prefix. For example - the CIDR block for 199.34.89.0/22 is /22
packet filtering - application proxy
Class A Network
CIDR block
cabeloco
2. An IP addressing convention that adheres to network class distinctions - in which the first 8 bits of a Class A address - the first 16 bits of a Class B address - and the first 24 bits of a Class C address are used for network Information
Broadcast
Single mode fiber
Classful Addressing
OSI Layer 2
3. A gateway that operates on the Internet backbone.
Core Gateway
cp connection
FDMA
Frames
4. Security for https://
SSL
route
t1 connection
CSMA/CD
5. The part of a network to which segments and significant shared devices connect
supernet
backbone
MAN
multiprotocol label switching
6. Secure Shell
Address Resolution Protocol
SSH
UTP
binary
7. PPTP
serial
Point-to-Point Tunneling Protocol
bandwidth
Internet Group Multicast Protocol
8. Carrier sense multiple access with collision detection
CSMA/CD
peer-to-peer network
FHSS
narrowband
9. String used to identify an access point - configure on your new access points to match the settings on existing access points
802.2
SSID
MAC address
stateful firewall
10. IDPS that examines network traffic in search of patterns that match known signatures
Secure Hypertext Transfer Protocol (S-HTTP)
Organizational Unit
WDM
signature-based (knowledge-based - misuse-detection) IDPS
11. Term that describes current anti-intrusion technologies
HTTPS
Class A
intrusion detection/prevention system (IDPS)
NetBIOs
12. Faster networking and inexpensive - flexible - easy to install
LAN
A Protocol
Independent Computer Architecture
twisted shielded pair
13. The Application layer TCP/IP subprotocol responsible for moving messages from one e-mail server to another.
SMTP (Simple Mail transfer Protocol)
NIC drivers
WDM
SNMP
14. The gateway that first interprets a device's outbound requests - and then interprets its inbound requests to and from other subnets.
TCP/IP
ethernet
Default Gateway
File Transfer Protocol
15. A combination of techniques used to detect an intrusion and then to trace it back to its source
Network News Transport Protocol
ITU
trap and trace
port 25
16. Synchronises data exchange
Session
SMTP
DNAT (Dynamic Network Address Translation)
Telnet
17. SMTP - simple mail transfer protocol
dig (domain information groper)
port 25
installing cable
SSID
18. LDAP
collision detection
Class C Network
Trivial File Transfer Protocol (TFTP)
Lightweight Directory Access Protocol
19. Generates signals as changes in voltage at the NIC
physical layer
entrapment
IMAP4 (Internet Message Access Protocol - version 4)
partially distributed control strategy
20. A connecting device for a network that accepts messages and forwards them to the correct section of the network. Generally more intelligent than a hub and a switch.
Transmission Control Protocol
Wide area network (WAN
router
Presentation
21. Name Of Layer 6
Presentation
log file monitor (LFM) IDPS
Point-to-Point Tunneling Protocol
Primary Domain Controller
22. File Transfere Protocol
FTP
Port 20
enticement
packet
23. Layer 2
Industrial - Scientific - and Medical
Nonbroadcast Point-to-Multipoint Transmission
Data Link
Core
24. Attachment Unit Interface Cable equipped with 15 pin connectors
Network Time Protocol (NTP)
255.255.0.0
AUI
A Protocol
25. Provides th transfer medium (such as cable) - Translates data into a transmission signal appropriate to the transfer medium - Sends the signal along the transfer medium - Includes the pyical layout of the network - Monitors for transmission error - D
node
IETE
Physical Layer (Layer 1)
intrusion detection
26. A type of fiber optic cable connector that uses a mechanism similar to the BNC connectors used by Thinnet
Straight tip connector
CSMA/CD
Data Circuit-Terminating Equipment
RealVNC
27. Process of retransmitting a digital signal; repeats the pure signal without the noise
Transport Layer (Layer 4)
PING
Regeneration
Network Behavior Analysis
28. Alert or alarm that occurs in the absence of an actual attack
fragmentation
access services
false positive
backbone
29. Fiber optic - enables one fiber optic connection to carry multiple light signals simultaneously
WDM
Radio Frequency Interference
Populated Segment
fault tolerance
30. Translates data to a format the receiving node understands - such as from EBCDIC to ASCII - Performs data encryption - Performs data compression
Data Link
communications media
subnetting purpose
Presention Layer (Layer 6)
31. A type of cabling that includes pairs of copper conductors - twisted around each other - inside a metal or foil shield. This type of medium can support faster speeds than unshielded wiring
Shielded Twised Pair
TCP/IP Transport Layer Encapsulation
Optical Time Domain Reflectometer
network class a
32. ARP
Amplitude Modulation
Address Resolution Protocol
IP Addressing
IP Address
33. Http - Hypertext transfer protocol
ISP (Internet service provider)
port 80
GBIC
DB-9 connector
34. A single physical/non-physical medium for connecting computers
802.11a
route
Gigabit Ethernet (non-fiber characteristics)
medium
35. Short reach. only multimode-max length is 500. baseband transmission. 1000 mpbs.
the more twist
binary
1000base-sx
TCP/IP Vs. OSI: Application
36. Point of division between a telecommunications service carrier's network and a building's internal network
baseband
Cross Talk
UTP
Demarcation Point
37. A type of fiber optic connector. These connectors are square shaped and have release mechanisms to prevent the cable from accidentally being unplugged
Single mode fiber
goodput
Subscriber connector
Packet
38. Services that handle hardware diagnoses and failure alerts
Media Converter
management services
multimeter
LAN
39. Small Form Plug-gables - Plugs in to an interface on a switch
SFP
Line Printer Daemon
Media Dependent Interface
binary
40. A utility for viewing or modifying a host's routing table
connectionless
route
OSI Layer 2
honey pot
41. Virtually local area network-device-switch
Basic Rate Interface
Network Information Service
VLAN
Address Resolution Protocol (ARP)
42. A frame (or packet) sent to all nodes on the network.
Data Link
Data Service Unit
broadcast frame or broadcast packet
multiplexing
43. NTP
attenuation
Network Time Protocol
LAN
STP
44. SNMP
Data Link
Simple Network Management Protocol
Independent Computer Architecture
Class C Network
45. The more resistant to cross talk (STP)
Packet
FM
Internet
the more twist
46. Also called the star-ring hybrid - topology - a network design in which the logic communication are in a ring - but the phyical layout of the network star.
star-wired ring topology
Data Link
fiber optic cable
cp connection
47. What is the currency of Denmark?
Kroner
TCP/IP Network Access Layer Encapsulation
SONET
event viewer
48. A mail retrieval protocol that improves on the shortcomings of POP. The single biggest advantage IMAP4 has relative to POP is that it allows users to store messages on the mail server - rather than always having to download them to a local machine.
IMAP (Internet Message Access Protocol)
EMI
Punch-Down Block
header
49. Network configuration that allows selected outside organizations to access internal information systems.
MIME (Multipurpose Internet Mail Extensions)
MAC sublayer
extranet
Category 3
50. Device that can detect intrusion and launch an active response
TCP/IP Vs. OSI: Application
Application Layer
intrusion prevention system (IPS)
passive scanning