Test your basic knowledge |

IT: Networking Vocab

Subject : it-skills
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Pointing in a direction






2. Firewall packet inspection that examines the data contained in a packet as well as the state of the connection between internal and external computers.






3. Brief delay in processing - length of cable can contribute to this






4. A type of transmission in which there are several transmission channels on a communications medium - allowing more than one node to transmit at the same time.






5. Is a challenge respone authentication protocol






6. Fiber-optic cable used on a network backbone for high-speed communications - such as between floors of a building.






7. Transport Layer






8. Is used to allow searching and updating of a directory service






9. Electronics industries Alliance






10. On a computer that receives data over a network - the process in which the device interprets the lower-layer headers and - when finished with each header - removes the header - revealing the next-higher-layer PDU.






11. The transmission capacity of a communications medium - which is typically measured in bits per second (for data transmissions) or hertz (for data - voice - and video transmissions) - and which is determined by the maximum minus the minimum transmissi






12. Data terminal equipment - little independent data processing capability. ex. workstation






13. Theoretical. difference b/w highest and lowest frequency.






14. Twist wire so you don't get interference on the memory






15. Physical layer. 10 giga bit throughput. baseband transmission. twisted pair. max length is 100 meters. cat 6 or 7.






16. Unique identifying number for a network node; follows a hierarchical addressing scheme; can be assigned through OS software; added to data packets and interpreted by protocols at the Network layer






17. Physical Layer






18. LPR






19. MAC address






20. Most common cabling used in networking. Usually connects nodes to the main network.






21. A cable TV company - such as Comcast Broadband.






22. 7th layer; protocols enable software programs to negotiate formatting - procedural - security - synchronization - and other requirements with the network






23. LC






24. Prevents broadcast storms by enabling switches to calculate paths that avoid potential loops and artificially block the links that would complete a loop






25. Voltage is varied and imprecise - more susceptible






26. Several ethernet nodes can be connected and can monitor traffic or access media simultaneously






27. Sequences packets in correct order






28. (metropolitan area network) used with a handful of buildings and larger then a LAN - connects two or more Lans






29. A group of two or more computer systems linked together.






30. The medium that carries multiple signals simultaneously






31. OSPF






32. Round time trip. time it takes for packet to get from sender to receiver and back






33. Signals composed ot pulses that can have a value of only 1 or 0






34. Provides strung security for HTTP- transpored information - but it is only used by some vendor's application






35. Attacker who utilizes tactics designed to trip the organization's IDPS - essentially causing the organization to conduct its own DoS attack - but overreacting to an actual - but insignificant - attack.






36. Name Of Layer 3






37. NNTP






38. Activities finalize restoration of operations to a normal state and seek to identify source and method of intrusion to ensure same type of attack cannot occur again






39. Indication a system has just been attacked or is under attack






40. Not individually insulated but shielded. use when there is noise.






41. Stop signals after they have reached the end of the wire






42. A technique in which IP address used on a private network are assigned a public IP address by a gateway when accessing a public network.






43. Layer 6






44. Narrow core - light travels in one path - longest distance - more expensive then MMF






45. Hardware address of the network interface card






46. Type of sensor deployed in such a way that the network traffic it is monitoring must pass through it.






47. Degradation of a light signal on a fiber-optic network






48. Services that allow remote users to connect to the network






49. IEEE 802.3 Media Access Control (MAC) sublayer of the data link layer






50. FDDI