SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
IT: Networking Vocab
Start Test
Study First
Subject
:
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Ensures outgoing traffic can traverse public networks by replacing each outgoing packets source addresss field w valid IP address
fragmentation
Port 23
IP gateway in NAT
Post Office Protocol
2. Allows you and eight coworkers to share a single internet routable IP address
RADIUS
A Protocol
255.255.0.0
DNAT
3. Service that supports email
IP Address
flow control
communications services
RARP
4. The shorter the wavelength
ssl
Secure Copy Protocol
the higher the frequency
Amplitude
5. CDFS
telephone connector
star-bus hybrid topology
Internet Protocol version 4
CD-ROM File System
6. Four twisted wire pairs rated for 250 MHz.
certification value may be lessened due to the number of people obtaining them
Category 6
A Protocol
Application Layer (Layer 7)
7. Offers one way for a computer to access another computer over the network or over the Internet. For example - an IBM programmer can use Telnet on a Windows XP or Red Hat Enterprise Linux computer to access a mainframe though the Internet
TCP/IP Architecture Layer 3
802.11a
Telnet
NNTP
8. Type of interference that may be caused by motors - power lines - televisions - copiers - etc
Point-to-Point Tunneling Protocol
Category 3
reassembly
Electromagnetic Interference
9. SNMP
Simple Network Management Protocol
802.3
Presentation
pstn
10. Slow wireless standard 11-18 throughput
802.11
Internet Relay Chat
baseband
802.11a
11. Only two wire pairs are reversed
Trivial File Transfer Protocol (TFTP)
ppp
crossover cable
false negative
12. OU
802.3
Organizational Unit
bus topology
virture privat network (VPN)
13. A private network that functions like a tunnel through a larger network
TIA (Telecommications Industry Association)
header
802.11n
Virtual private network (VPN)
14. GSNW
Virtual Private Network
Gateway Services for NetWare
phishing
FDM
15. Type of transmission in which signlas may travel in both directions over a medium - but only in one direction at a time
MAN
AUI
Half-Duplex
LC connector
16. CSU
Channel Service Unit
Cladding
FHSS
monitoring port (SPAN port)
17. Which protocol is responsible for routing packets around the network?
bridge
Internet Protocol
Shielded Twised Pair
Telnet
18. Hardware that constitutes the enterprise-wide cabling system
Cable Plant
Remote Authentication Dial-In User Service
electromagnetic interference (EMI)
OSI Reference to TCP
19. Physical Layer
OSI Layer 1
MultiMode Fiber
stateful protocol analysis (SPA) IDPS
Analog
20. The 100BaseVG/100VG-AnyLAN approach abandon the CSMA/CD transmission technique for one called demand priorTity.
IEEE 802.12 Standard
beaconing
Half Duplex NIC Communication
Gigabit Interface Converter
21. File Transfere Protocol
phase
network class C
Post Office Protocol version 3
FTP
22. A type of transmission in which the entire channel capacity of the communications medium (such as cable) is used by one data signal - enabling only one node to transmit at a time.
baseband
fiber optic cable
terminators
false attack stimulus
23. Private connection from a LAN to an internet service provider.
dedicated lines
Bandwidth
Braiding
MTU (maximum transmission unit)
24. Modulation technique in which the amplitude of the carrier signal is modified by the application of a data signal
Amplitude Modulation
DNAT
ASCII
SMTP server name
25. A network on which any computer can communicate with other networked computers on an equal (peer) basic without going though an intermediary - such as a server. Peer-to-Peer networking enables each computer to offer and access shared resoures - such
SYN (syncronization)
digital
peer-to-peer network
f type connector
26. A route discovery and analysis utility that comes with UNIX and Linux operating systems. Mtr combines with functions of the ping and traceroute commands and delivers an easily readable chart as its output
WAN Connectivity
ANSI
mtr (my traceroute)
PING
27. Layer 4
full duplex
Transport
half duplex
Demarcation Point
28. A network design consisting of a continuous path for data with no logical beginning or ending point - and thus no terminators.
demand priority
ring topology
Class E Network
Digital
29. This phase begins and end a PPP session.
link dead phase
Hubs
social engineering
PSTN
30. IDPS's ability to dynamically modify its configuration in response to environmental activity
site policy awareness
Client
tunneling
Application Layer
31. Point to point protocol
Logical Link Control
Application
OSI
ppp
32. An established guideline that specifies how networked data is formatted into a packet or frame - how it is transmitted - and how it is interpreted at the receiving end.
Telnet
Protocol
Physical
GBIC
33. Follow TIA/EIA 568 specifications
installing cable
standard
Device power unplugged
PSTN
34. Provides Internet access and/or other services such as email and Web hosting
ISP (Internet service provider)
Mac Addressing
Organizational Unit
Wide area network (WAN
35. Event that triggers alarms and causes an IDPS to react as if a real attack is in progress
SYN (syncronization)
true attack stimulus
MAC
session
36. Type of sensor deployed in such a way that the network traffic it is monitoring must pass through it.
star-wired ring topology
binary
inline sensor
Asynchronous Transfer Mode
37. A command-line utility that combines the functionality of the tracert and ping commands (similar to UNIX's mtr command) and comes with Windows XP - Vista - and Windows Server 2003 and Server 2008
Cladding
local area network (LAN)
Data Link (Layer 2)
pathping
38. Developed by ISO and ANSI - a model that providees a framework for networked hardware and software communication based on seven layers.
Session
Open System Interconnection (OSI) referance model
802.11
FCS (frame check sequence)
39. Each node passively listens for then accepts data
passive topology
Baseband
RARP
TCP/IP Vs. OSI: Internet
40. MX
Mail Exchanger
signal bounce
WDM
VLAN
41. RDP
WAN
Remote Desktop Protocol
installing cable
radio frequency interference (RFI)
42. The utility that allows you to query ICANN's DNS registration database and find information about a domain.
whois
Binary
American Wire Gauge
Correct default gateway
43. A TCP/IP utility that queries the DNS database and provides information about a host given its IP address or vice versa. Dig is similar to the nslookup utility - but provides more information - even in its simplest form - than nslookup can.
transceiver
802.3
dig (domain information groper)
network monitor
44. The distinct units of data that are exchanged between nodes on a network
Firewall configured correctly
ISDN
data packets
Wide area network (WAN
45. Data Link Layer
switch
Mac Addressing
intranet
honey pot
46. Synchronises data exchange
Media Dependent Interface Crossover
broadband
medium
Session
47. Application layer protocol used to access information stored in a directory
Network News Transport Protocol (NNTP)
entrance facilities
VPN
LDAP
48. Power loss - the amount of signal that is lost as it travels though the communication medium from the source (transmitting node) to the receiving node.
Attenuation
multiprotocol label switching
802.3
Dynamic Host Configuration protocol (DHCP)
49. PRI
Primary Rate Interface
Berkeley Internet Name Domain
API (application program interface)
Internet Information Services
50. IDPS that examines network traffic in search of patterns that match known signatures
signature-based (knowledge-based - misuse-detection) IDPS
SMTP (Simple Mail transfer Protocol)
Frequency Hopping Spread Spectrum
Error Handling