SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
IT: Networking Vocab
Start Test
Study First
Subject
:
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Is associated with unix/linux networks
Secure Copy
workstation
Encrypting File System
GBIC
2. Network device that makes high-level application connections on behalf of internal hosts and other machines
port 143
router
collision detection
proxy server
3. This layer in the OSI transforms bits into electromagnetic signals.
soft skills
Physical Layer
Session
OSI Layer 7
4. Which protocol is responsible for splitting data into packets and adding a header to each one?
network class a
Transmission Control Protocol
alarm filtering
Secure Copy Protocol
5. Only two wire pairs are reversed
crossover cable
Application
ICS (Internet Connection Sharing)
OSI Layer 7
6. Protocol used to transfer mail between a send mail server and microsoft exchange server
SMTP server name
POP3
Bits
workstation
7. Type of transmission in which signlas may travel in both directions over a medium - but only in one direction at a time
Internet
Half-Duplex
Firewall configured correctly
AUI
8. This phase determines how often systems should send each other quality statistics.
link quality monitoring
ADSL
plain old telephone service (POTS)
RARP
9. Layer 4
Transport
access services
Secure Sockets Layer (SSL)
broadband
10. IEEE 802.3 Media Access Control (MAC) sublayer of the data link layer
amplitude
Category 6
Layer 2 Tunneling Protocol
802.3
11. Physical layout of a star topology and also ring logical topology
Internet Connection Sharing
API (application program interface)
multimeter
star wired ring
12. An established guideline that specifies how networked data is formatted into a packet or frame - how it is transmitted - and how it is interpreted at the receiving end.
Protocol
tracepath
logical address
MAN
13. A TCP/IP troubleshooting utility that provides information about NetBIOs names and their addresses. If you know the NetBIOs name of a workstation - you can use nbtstat to determine its IP address
TCP/IP Vs. Netware: Network Access
nbtstat
Data Link
LLC (Logical Link Control) sublayer
14. Which layer in the OSI network model is responsible for providing a set of interfaces for applications to obtain access to networked services?
Half Duplex NIC Communication
Fast Ethernet (characteristics)
Application Layer
Basic Rate Interface
15. Change in signal strength as a result of reflection - scattering - or diffraction
fading
Twister Pair Cable
Modem
bayonet nut connector (BNC)
16. Ppp over ethernet
twisted shielded pair
virtual circuit
Class A Network
pppoe
17. A transmission method that has distinct signal levels to represent binary zeroes or ones - such as +5 volts and 0 volts.
packet filtering - application proxy
Session Layer
digital
session
18. Package for data that includes not only the data - or 'payload -' but also the sender's and recipient's addressing and control information. Generated at the Data Link layer and issued to the Physical layer
frame
directional antennas
BSS
intrusion detection system (IDS)
19. LLC
Hypertext Transfer Protocol Secure (HTTPS)
Dynamic Host Configuration Protocol (DHCP)
Category 5
Logical Link Control
20. Allows clients to communicate in different floors
Data Link
geosynchronous
switch
Protocol
21. MPLS
physical address
wavelength
multiprotocol label switching
intrusion detection
22. Functions at the network layer that add logical addresses and properly route data
Kerberos
POTS
protocol and services
Multiplexer
23. MAC Protocols
Transmission Control Protocol
amplitude
TCP/IP Vs. Netware: Network Access
Bit-Error Rate Test
24. A series of interconnected computers - printing devices - and other computer equipment that shares hardware and software resources. The service area usually is limited to a given office area - floor - or building.
SIP
public network
Local area network (LAN)
Computer network
25. Device that separates a medium into multiple channels and issues signals to each of those subchannels
plain old telephone service (POTS)
port 22
Multiplexer
Network
26. In CIDR notation - the number of bits used for an extended network prefix. For example - the CIDR block for 199.34.89.0/22 is /22
Gigabit Ethernet (fiber characteristics)
Network Layer
Extended Network Prefix
CIDR block
27. CNAME
standard
EIA
Class E Network
Canonical Name
28. RAS
alarm clustering and compaction
Remote Access Service
802.16
simplex
29. A standard method or format for communication between networked devices
roaming
Segments
plenum area
protocol
30. Name Of Layer 4
full duplex
Transport
Optical Loss
Faulty network cable
31. Basic service set: a group of stations that share an access point
BSS
twisted pair connector
Transport layer
port 69
32. A process in which a digital signature is placed in a driver. The digital signature helps ensure that the driver is tested and is compatible with the operating system and device for which it is written.
driver signing
Network Time Protocol
backbone cabling
OSI Layer 6
33. FHSS
Twister Pair Cable
Category 5e
Management Information Base
Frequency Hopping Spread Spectrum
34. A type of fiber optic connector. These connectors are square shaped and have release mechanisms to prevent the cable from accidentally being unplugged
passive scanning
Subscriber connector
Simple Mail Transfer Protocol (SMTP)
Carrier Sense Multiple Access with Collision Detection (CSMACD)
35. A type of transmission that can vary continuously - as in a wave pattern with positive and negative voltage levels.
ppptp
CD-ROM File System
analog
Internet Information Services
36. Is a challenge respone authentication protocol
802.16
CHAP
radio frequency interference (RFI)
port 123
37. Unit of data that results from subdividing a larger protocol data unit
Frequency Hopping Spread Spectrum
Service Set Identifier
protocol
segment
38. A connector used to terminate coaxial cable used for transmitting television and broadband cable signals
f type connector
transmit
Firewall Filtering
WAN
39. Enables the establishment of a Web connection - but it also provides for the exchange of resources - for example - displaying AOL's Web page in your brower.
Hypertext Transfer Protocol (HTTP)
shielded twisted-paired (STP) cable
100base-tx
telephone connector
40. Type of transmission in which signals may travel in both directions over a medium simultaneously; also called duplex
Bend Radius
Full-Duplex
firewall
diffraction
41. An Application layer protocol used to retrieve messages from a mail server. When a client retrieves mail via POP - messages previously stored on the mail server are downloaded to the client's workstation - and then deleted from the mail server.
serial
Repeater
log file monitor (LFM) IDPS
POP (Post Office Protocol)
42. Point of division between a telecommunications service carrier's network and a building's internal network
fault tolerance
redirector
Demarcation Point
step-index multimode fiber-optic cable
43. A set of routines that make up part of a software application
10 Gigabit Ethernet
API (application program interface)
ADSL
Password Authentication Protocol
44. Connectivity device - data link layer (2) - reads header info to forward packets according to MAC addresses
WAN
telnet
digital signal
bridge
45. Is an e mail retival protocol designed to enabel users to access their e-mail from various locations
Common Internet File System
asymmetrical transmission
Presention Layer (Layer 6)
Inter Message Access Protocol (IMAP)
46. Transport protocol and TCP/IP port that uses telnet utility use
TCP port 23
netstat
EAP
To stop the Hamburgerler from stealing all of Ronnie McDonalds burgers
47. Supplying electrical power through ethernet
sequencing
power over ethernet
Primary Rate Interface
back hack
48. Signals traveling on one wire infringes on the signal traveling over an adjacent wire
physical layer device
incremental backup
Block ID
cross talk
49. F type (like TV cable) or BNC (crimped)
coax cable connector
Plenum
fully distributed control strategy
802.44
50. (WIde area network) Carry networks longer distances than Lans
twisted shielded pair
WAN
encapsulate
Network