SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
IT: Networking Vocab
Start Test
Study First
Subject
:
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. SSID
back door
port 143
Service Set Identifier
FDM
2. RAS
modem
Remote Access Service
Network interface card (NIC)
SCP
3. Loop back address for IPv6
IANA (Internet Assigned Numbers Authority)
::1
communications media
Mesh topology
4. A type of subnet that is created using bits that normally would be reserved for network class information by moving the subnet boundary to the left.
802.16
PDU
power budget
supernet
5. Twist wire so you don't get interference on the memory
Frequency Division Multiple Access (FDMA)
Full Duplex NIC Communication
LAN
fixing cross talk
6. Aversion of the traceroute utility found on some Linux distributions.
tracepath
ARP
telephone connector
ITU
7. Time division multiplexing
TDM
certification value may be lessened due to the number of people obtaining them
HTTPS
WAN Connectivity
8. The Application layer TCP/IP subprotocol responsible for moving messages from one e-mail server to another.
Transport Layer (Layer 4)
SMTP (Simple Mail transfer Protocol)
Subscriber connector
protocol data unit (PDU)
9. An enclosed area - such as a false floor - or ceiling - in which pressure from air or gas can be greater than the pressure outside the enclosed area - particularly during a fire. Plenum area in buildings often extend to multiple rooms or extend throu
SSL
plenum area
1550bytes
MAC (Media Access Control) sublayer
10. Multimode fiber
802.11n
Topology
NetWare Directory Services
MMF
11. The pattern used to install a network medium
Berkeley Internet Name Domain
topology
802.5
full mesh
12. Attachment Unit Interface Cable equipped with 15 pin connectors
255.255.0.0
ISDN
66 Block
AUI
13. Also called the star-wired bus topology - a network design that combines the logial comunications of a bus with the physical layout of a star.
fiber optics
10base-t
fully distributed control strategy
star-bus hybrid topology
14. Layer 1
LAN
multiple access
Physical
TCP/IP Internet Layer Encapsulation
15. Unshielded twisted pair
utp
IP (Internet Protocol)
ICMP
half duplex
16. Network Layer
topology
Service Set Identifier
Routing
NIC (Network Interface Card)
17. IGMP
Internet Group Multicast Protocol
Alternate Mark Inversion
IMAP4 (Internet Message Access Protocol - version 4)
RTT
18. UDP
communications media
255.255.255.252
star-wired ring topology
User Datagram Protocol
19. IANA
digital signal
ITU
Internet Assigned Numbers Authority
TCP/IP Vs. OSI: Transport
20. RJ 11
telephone connector
SMTP
geosynchronous
802.3
21. Radio frequency interference. interference caused by radio.
intrusion reaction
site policy awareness
host
RFI
22. Signals travel in both directions but only one at a time
transmit
half duplex
footprinting
fault tolerance
23. A form of fiber-optic cable that supports only one signal transmission at a time and that is used mainly for long- distance communication.
single-mode fiber-optic cable
plenum area
connection oriented
TDMA
24. Type of transmission in which signals may travel in both directions over a medium simultaneously; also called duplex
Full-Duplex
ICANN (Internet Corporation for Assigned Names and Numbers)
geosynchronous
IEEE 802.12 Standard
25. 12 digits - A-F/0-9
MAC address
10BASE2 Limit
Network
routing
26. Transport Layer
Mechanical Transfer-Registered Jack
Error Handling
leased line
phase
27. Decreasing the size of data units when moving data from a network that can handle larger units to one that can handle only smaller units
segmentation
Unshielded twisted-pair (UTP) cable
Thin Eterhnet/10 Base 2
protocol
28. The general topic of how on one computer - two adjacent layers in a networking architectural model work together - with the lower layer proving services to the higher layer.
Telnet
Firewall configured correctly
Adjacent Layer Interaction
Line Printer Remote
29. An adapter board designed to connect a workstation - server - or other network device to a network medium.
Demultiplexer
horizontal cabling
network interface card (NIC)
Topology
30. Network Layer
Packets
Category 3
Populated Segment
Network layer
31. Name Of Layer 7
Application
Time Division Multiple Access (TDMA)
standby UPS
Internet
32. A logical process of combining bits. In ANDing - a bit with a value of 1 plus another bit with a value of 1 results in a 1. A bit with a value of 0 plus any other bit results in a 0.
Kroner
File Transfer Protocol
router
ANDing
33. The process of enclosing data for transmission
token ring
transport layer
encapsulation
FM
34. The distinct units of data that are exchanged between nodes on a network
data packets
intrusion reaction
Line Printer Remote
Internet
35. Application layer protocol used to access information stored in a directory
Session
Frame
LDAP
site policy
36. A cable that consists of a single cable sheath containing a combination of fibers and copper cable.
partially distributed control strategy
hybrid fiber / coax (HFC) cable
Protocol
BOOTP
37. The IEEE 802.3ae standard for Ethernet communications at 10 Gbps
Bit
10 Gigabit Ethernet
802.2
radiation pattern
38. Rules determining the format and transmission of data
Class D Network
protocol
IMAP (Internet Message Access Protocol)
TCP/IP Vs. OSI: Transport
39. IKE
ethernet
Internet Key Exchange
2.4-GHz band
Session
40. Technology that uses standard telephone wires and allows transmission of voice and data information. Slower than ADSL.
To stop the Hamburgerler from stealing all of Ronnie McDonalds burgers
Radio Frequency Interference
ISDN
Secure Shell
41. The utility that allows you to query ICANN's DNS registration database and find information about a domain.
Application
Internet Protocol version 4
PSTN
whois
42. Running system for a while to track types of false positives it generates and then adjusting IDPS alarm classifications
API (application program interface)
alarm filtering
fractionalizing
Internet Protocol Security
43. IEEE standard describing specifications for wireless transmissions
IP Address
session layer
Session Layer
802.11
44. Most common cabling used in networking. Usually connects nodes to the main network.
802.11a
ethernet
HTTPS
Port 20
45. Routers work here
Post Office Protocol
Network
metropolitan area network (MAN)
Post Office Protocol 3 (POP3)
46. FDDI
modem
Dynamic Host Configuration protocol (DHCP)
(fiddy) Fiber Distributed Data Interface
Data Link
47. A unit of data formatted for transmission over a network that contains control and other information that corresponds to the OSI Networklayer; also called Layer 3.
packet
intrusion detection/prevention system (IDPS)
ESS
10BASE5 Limit
48. POP3 - post office protocol 3
Modulation
port 110
802.11n
Decapsulation
49. Plain old telephone service
back hack
POTS
false negative
port 53
50. Which protocol allows the transfer of a file from one computer to another over the network?
firmware
File Transfer Protocol
Amplitude Modulation
TCP/IP Architecture Layer 4