Test your basic knowledge |

IT: Networking Vocab

Subject : it-skills
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. An International organization of scientists - engineers - technicians - and educators that play a leading role in developing standards for network cabling and data transmissions.






2. Four twisted wire pairs rated for 250 MHz.






3. A data link protocol used for remote networking that is rarely used today.






4. Physical layer standard for serial communications






5. Signals travel both directions simultaneously






6. Panel of data receptors into which twisted pair wire is inserted to complete a circuit






7. BDC






8. Twisted pair patch cable in which the termination locations of the transmit and receive wires on one end of the cable are reversed






9. A network that offers services to members of the public - such as network services offered by a telecommunications company or a cable TV company.






10. A series of interconnected computers - printing devices - and other computer equipment that shares hardware and software resources. The service area usually is limited to a given office area - floor - or building.






11. ICMP






12. Method of controlling how network nodes access communication channels - ex highway






13. The process of reconstructing segmented data






14. Multicast group 224-239






15. A network whose access is restricted to only clients or machines with proper credentials.






16. SSH - secure shell






17. Is part of theTCP/IP protcol suite and used to retrive e-mail from a remote server to a local client over a TCP/IP connection






18. Indication a system has just been attacked or is under attack






19. Basic error checking and correction






20. CRAM-MD5






21. 12 digits - A-F/0-9






22. Cause by length - loss of signals as it travels farther away






23. Also called the physical or MAC address - the hexadecimal number permanently assigned to a network interface and used by the MAC sublayer within the DATA Link layer (Layer 2).






24. ISM






25. Is a file transfer protocol that uses s ecure shell (SSH)






26. Unwanted signals from sources near network cabling - such as motors and power lines






27. A generic term referring to any set of protocols and standards collected into a comprehensive grouping that - when followed by the devices in a network - allows all the devices to communicate. Examples include TCP/IP and OSI.






28. Frequency modulation-frequency of signal is modified






29. L2F






30. Plain old telephone service






31. NLM






32. ISDN






33. Transport Layer






34. Knows which VLAN a stream of data belongs to by reading a tad added to each frames header






35. IEEE 802.3 Media Access Control (MAC) sublayer of the data link layer






36. Also called coax - a network cable medium that consists of a copper core - surrounded by insulation.






37. Internet Layer






38. Transport Layer






39. As defined by the EIA/TIA-568 standard - cabling that connects workstations and servers in the work area.






40. Connector used with single mode and multimode fiber optic cable






41. ICA






42. Translates data to a format the receiving node understands - such as from EBCDIC to ASCII - Performs data encryption - Performs data compression






43. Unix command at shell prompt to send a file to printer






44. User watching an episode of TV show over the internet is what kind of communication






45. RJ 11






46. Voltage is varied and imprecise - more susceptible






47. Ensures reliablity of packet transmissions from node to node - Ensures that data is sent and received in the same order - Provides acknowledgement when a packet is received - Monitors for packet transmission errors and resends bad packets - Breaks la






48. The process in which an attacker obtains confidential information by contacting employees and deceiving them into giving up passwords - IP addresses - server names - and so on.






49. The first set of six characters that make up the MAC address and that are unique to a particular manufacturer.






50. Private connection from a LAN to an internet service provider.