SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
IT: Networking Vocab
Start Test
Study First
Subject
:
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. An international body that establishes communications and networking standards - and that is particularly known for its contributions to network protocol standards.
Thin Eterhnet/10 Base 2
Modem
International Organization for Standardization (ISO)
reassembly
2. Which protocol provides the user with many functions of the world wide web?
Multimode fiber
SMTP
network layer
Hyper text transfer protocol
3. Divides channel into different time slots and assigns data to nodes who are attached to time slots
TDM
grade-index multimode fiber-optic cable
TCP/IP Vs. OSI: Application
port 22
4. The Application layer TCP/IP subprotocol responsible for moving messages from one e-mail server to another.
SMTP (Simple Mail transfer Protocol)
Domain Name Service
TCP/IP Architecture Layer 4
ICMP
5. ATM
Channel
fat pipe
Asynchronous Transfer Mode
point to multipoint
6. Four twisted wire pairs rated for 100 Mhz - but capable of handling the disturbance on eash pair that's caused by transmitting on all four pairs at the same time.
Transmission Control Protocol
MAC (Media Access Control) sublayer
fragmentation
Category 5e
7. PPPoE
proxy server
network interface card (NIC)
Point-to-Point Protocol over Ethernet
Session
8. Anything - hardware or software - that monitors transmission of packets of digital information that attempt to pass the perimeter of a network
Internet Group Multicast Protocol
firewall
TDM
Transport
9. Requires CSU/DSU-the connection point for a t1 live at customers site
t1 connection
Trivial File Transfer Protocol (TFTP)
Analog
Bit-Error Rate Test
10. Wrapping one layer's PDU with protocol information so that it can be interpreted by a lower layer
t1 connection
IANA
encapsulate
High-Level Data Link Control
11. Manages network communication - available on a CD-ROM for example - that is used to manage communications and how frames or packets are sent using a protocol.
NIC drivers
Encrypting File System
bridge
Improperly configured switch
12. The distinct units of data that are exchanged between nodes on a network
token ring
data packets
padded cell
physical layer
13. An adapter board designed to connect a workstation - server - or other network device to a network medium.
impedance
analog
Gigabit Ethernet (non-fiber characteristics)
Network interface card (NIC)
14. Network layer service that subdivides segments it receives from the Transport layer into smaller packets
protocol and services
Simple Network Management Protocol
stateless firewall
fragmentation
15. Pointing in a direction
directional antennas
HTTPS
TDMA
Secure File Transfer Protocol
16. Similar to bus topology - but the ends are connected
ring topology
certification value may be lessened due to the number of people obtaining them
presentation layer
digital adv
17. Internet protocol security-defines encryption - authentication - and key management for TCP/IP transmission
IPSec
carrier sense
certification value may be lessened due to the number of people obtaining them
IEEE
18. A connecting device for a network that accepts messages and passes them on to other parts of the network. Generally more intelligent than a hub.
analog signal
Repeater
broadcast storm
switch
19. Application layer protocol that formulates and interprets requests between Web clients and servers
port 53
half duplex
HTTP (Hypertext Transfer Protocol)
RARP
20. A termination unit also called a transceiver or DSL modem
SMF
ATU-R
Broadcast
amplitude
21. Allows clients to communicate in different floors
kereberos
ISO
2.4-GHz band
switch
22. Techniques that employ hardware and software to provide assurance against equipment failures - computer service interruptions - and data loss.
topology
Fault tolerance
stateful firewall
TCP/IP Vs. OSI: Transport
23. Is part of theTCP/IP protcol suite and used to retrive e-mail from a remote server to a local client over a TCP/IP connection
Ferrule
baseband
Port 20
Post Office Protocol 3 (POP3)
24. LC - ST - SC - or MT RJ
MAN
cyclic redundancy check (CRC)
fiber optic connector
Ethernet
25. Vulnerability created in a system by a virus or worm which allows the attacker to access the system at will with special privileges.
Common Internet File System
collision detection
back door
CSMACD
26. International Organization for Standardization
ISO
broadband
TCP/IP Architecture Layer 1
Authentication Header
27. Pulses of precise - positive voltages and zero voltages (binary)
digital signal
LAN
IP Address
RAS
28. A transmission method that has distinct signal levels to represent binary zeroes or ones - such as +5 volts and 0 volts.
UTP
internetwork
broadcast storm
digital
29. Measure of the difference between the highest and lowest frequencies that a medium can transmit
soft skills
TCP/IP
fading
Bandwidth
30. Secure Sockets Layer
SSL
media access control (MAC)
RTT
Conduit
31. LPR
DSSS
SNAT (Static Network Address Translation)
Line Printer Remote
Encapsulation
32. A data-link protocol used for remote networking that can exchange IP addresses - carry data by multiple network layer protocols - and support different app. protocols.
PPP
MAC
rollover cable
Domain Name System (DNS)
33. A worldwide network of interconnected LANs and MANs that uses the TCP/IP protocol to enable people to shares e-mail messages and computer files and to access a vast array of information.
Decapsulation
Internet
Frequency
ring topology
34. A computer that has its own CPU and may be used as a stand-alone computer for word processing - spreadsheet creation - or other software applications. It also may be used to access another computer such as another workstation or server via a network.
Workstation
trap and trace
Binary
intrusion correction
35. 2nd layer; bridges the networking media with the Network layer. Primary function is to divide the data it receives from the Network layer into frames to be transmitted by the Physical layer
token ring
Data Link layer
User Datagram Protocol (UDP)
LAN
36. Electromagnetic interference
roaming
EMI
star wired ring
host
37. The IEEE standard for Ethernet networking devices and data handling (using the CSMA/CD access method)
802.3
NAT (Network Address Translation)
SONET
Device power off
38. Layer 5
voltage
802.5
Session
Ethernet
39. A network that links multiple LANs in a large city or metropolitan region.
Metropolitan area network (MAN)
signature-based (knowledge-based - misuse-detection) IDPS
half duplex
transmission media
40. An app. that provides centralized authentication and authorization services for a network.
CRC (cyclic redundancy check)
MAC address
RADIUS
LAN
41. Which protocol allows users to recieve emails?
terminal
POP3
baseband
Amplifier
42. Value placed upon an IDPS's ability to detect/identify certain attacks correctly
OSI Layer 3
Alien Cross Talk
Secure Sockets Layer (SSL)
confidence value
43. Minimum cabling standard for PoE
headened
MultiMode Fiber
Transmission media
cat 5
44. Virture privat network
Encapsulation
VPN
Presentation
bus topology
45. Name Of Layer 7
broadband
Application
site policy awareness
driver
46. A series of interconnected computers - printing devices - and other computer equipment that share hardware and software resources. The services area usually is limited to a given office - floor - or building.
Network Address Translation
local area network (LAN)
star-wired ring topology
butt set
47. IDPS that compares sampled network activity to established baseline
statistical anomaly-based (stat - behavior-based) IDPS
Cable Plant
Network interface card (NIC)
directional antennas
48. Ensures reliablity of packet transmissions from node to node - Ensures that data is sent and received in the same order - Provides acknowledgement when a packet is received - Monitors for packet transmission errors and resends bad packets - Breaks la
Transport Layer (Layer 4)
kereberos
Plenum
Incorrect device drivers
49. A data encryption technique employed between a server and a client - such as between a client's browser and an Internet server.
Secure Sockets Layer (SSL)
STP
Trivial File Transfer Protocol (TFTP)
AM
50. AFP
Apple File Protocol
Primary Rate Interface
HTTPS
GBIC