SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
IT: Networking Vocab
Start Test
Study First
Subject
:
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. QoS technique enables packet switches technologies to travel over traditionally circuit switched connections
duplex
MAC (Media Access Control) sublayer
ITU (International Telecommunication Union)
MPLS
2. A command-line utility that combines the functionality of the tracert and ping commands (similar to UNIX's mtr command) and comes with Windows XP - Vista - and Windows Server 2003 and Server 2008
pathping
TCP/IP Architecture Layer 3
Presentation
subnetting purpose
3. Institute of Electrical and Electronics Engineers
IEEE
broadband
Presentation
TCP/UDP
4. Frequency Division Multiple Access
Remote Access Service
POP3 (Post Office Protocol - version 3)
FDMA
Crossover Cable
5. A network design consisting of a continuous path for data with no logical beginning or ending point - and thus no terminators.
Line Printer Remote
Serial
Ring topology
Segments
6. UN agency that regulates international telecommunications and provides developing countries with technical expertise and equipment to advance their technological bases
TCP/IP
entrance facilities
Simple Network Management Protocol
ITU (International Telecommunication Union)
7. A service used via the Application layer to recognize and access other layers
redirector
SSID
Secure Copy
directional antennas
8. A cable that consists of a single cable sheath containing a combination of fibers and copper cable.
hybrid fiber / coax (HFC) cable
TCP/IP Architecture Layer 1
intrusion detection system (IDS)
Transport
9. Strategy in which all control functions are applied at the physical location of each IDPS component
t1 connection
Internet
fully distributed control strategy
Institute of Electrical and Electronics Engineers (IEEE)
10. A 32 bit number that - when combined with a device's IP address - indicates the kind of supernet to which the device belongs.
ARP
connectionless
LLC
supernet mask
11. Trivial File Transfer Protocol
RARP
FDMA
TFTP
digital
12. RJ 45
twisted pair connector
client/server
SMTP (Simple Mail transfer Protocol)
bandwidth
13. An IDPS that resides on particular computer or server (the host) and monitors activity only on that system. Also known as system integrity verifiers.
Patch Panel
TDMA
honey pot
host-based IDPS (HIPDS)
14. On a network using the MIcrosoft Internet Connections Sharing service - the computer whose Internet connection other computers share. The ICS host must contain two network interfaces: one that connects to the Internet and one that connects to the LAN
ICS host
American Standard Code for Information Interchange (ASCII)
Internet Assigned Numbers Authority
IEEE
15. Total amount of communication cable that make up a network.
cable plant
telephone connector
IPSec
digital adv
16. A computer that provides client stations with access to files and printers as shared resources to a computer network
server
15 hops
Data Link (Layer 2)
computer network
17. The more resistant to cross talk (STP)
signal bounce
addressing
the more twist
grade-index multimode fiber-optic cable
18. Network news transfer protocol
IP Address
router
NNTP
tuning
19. Internet corporation for assigned names and numbers
port 69
ICAN
Transmission Control Protocol
Analog
20. PPPoE
LLC (Logical Link Control) sublayer
Port 23
Point-to-Point Protocol over Ethernet
Static IP Addressing
21. End-user device - such as a workstation - terminal - or console
Data Terminal Equipment
Secure Copy
Thin Eterhnet/10 Base 2
Metropolitan area network (MAN)
22. Brief delay in processing - length of cable can contribute to this
latency
Network
Noise
Attenuation
23. A device used to connect thicknet cable with a transceiver. A vampire bypasses the need to serve the cable - because the vampire tap has a metal tooth that pierces through the outside cable insulation (like a vampire) and connects with the copper wir
star topology
Remote Authentication Dial-In User Service
Optical Time Domain Reflectometer
vampire tap
24. Which layer in the OSI network model is responsible for providing a set of interfaces for applications to obtain access to networked services?
Application Layer
Dense Wavelength Division Multiplexing
TIA (Telecommications Industry Association)
Simple Network Management Protocol
25. A term used to refer to data within the Network layer of the OSI model.
IP Addressing
Node
datagram
Binary
26. Transport Layer
simplex
TCP/UDP
EIA/TIA
Presentation
27. Contains information that a wireless node needs to associate with an ap
port 123
twisted pair connector
beacon frame
Primary Domain Controller
28. LC - ST - SC - or MT RJ
Data Service Unit
Topology
fiber optic connector
ISO (International Organization for Standardization)
29. A series of interconnected computers - printing devices - and other computer equipment that share hardware and software resources. The services area usually is limited to a given office - floor - or building.
voltage
f type connector
local area network (LAN)
connectivity device
30. Unlicensed band with 11 channels
baseband
Transport
2.4-GHz band
Presentation
31. Used by web browser and web servers to exchange files
routing
Byte
inline sensor
Hyper Text Transfer Protocol (HTTP)
32. RAS
Data Link
protocol
Remote Access Service
telnet
33. Which layer is responsible for putting data into frames as well as providing error checking data?
datagram
Data Link Layer
confidence value
stateless firewall
34. Allows clients to communicate in different floors
Network Layer (Layer 3)
switch
Decapsulation
Open Shortest Path First
35. A network topology in which all of the nodes are connected to a central line or bus
bus topology
ICANN (Internet Corporation for Assigned Names and Numbers)
padded cell
association
36. Which address is split in to four 8-bit parts called octets?
Category 5e
DHCP
IP Address
CIDR (Classless Interdomain Routing)
37. A computer on a network that requests services or resources from another computer on a network
workstation
tracepath
ISP (Internet service provider)
Transport
38. Distinct communication path between two or more nodes; may be separated logically or physically
fully distributed control strategy
Channel
Lightweight Directory Access Protocol
Structure
39. Control frame that indicates to the rest of the network that a particular node has the right to transmit data
CHAP
token
NFS
Domain Name Service
40. A data-link protocol used for remote networking that can exchange IP addresses - carry data by multiple network layer protocols - and support different app. protocols.
demilitarized zone
PPP
Remote Access Service
File Transfere Protocol - (FTP)
41. Traces path from one network node to another - identifying all intermediate hops b/w two nodes
tracert
Application Layer (Layer 7)
Point-to-Point Tunneling Protocol
Category 3
42. Rules and configuration guidelines governing implementation and operation of IDPSs within an organization
SDU
DNAT
IEEE 802.12 Standard
site policy
43. A coaxial connector uses a twist and lock style - may be used with Rg-6 and RG-59
Application
Network Behavior Analysis
FDMA
BNC connector
44. Layer 1 Troubleshooting
Loose network cable connection
horizontal cabling
computer network
Local Connector
45. Unwanted signals from sources near network cabling - such as motors and power lines
IGMP
frequency
Data Link
Noise
46. Pipeline used to contain and protect cabling; usually made from metal
Conduit
MAC
attenuation
EAPoL
47. Media access control
active scanning
Single Mode Fiber
MultiStation Access Unit
MAC
48. LPD
MS-CHAP
Access Control List
Line Printer Daemon
Protocol
49. Cabling that transmit data using light waves. Higher bandwidth than other types of cabling.
statistical multiplexing
DHCP
fiber optics
SCP
50. Prevents broadcast storms by enabling switches to calculate paths that avoid potential loops and artificially block the links that would complete a loop
TFTP
STP
RARP
protocol and services