Test your basic knowledge |

IT: Networking Vocab

Subject : it-skills
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A poplar alternative to FTP is NFS software offered by Sun Microsystems - which uses Sun's remotr procedure call specification via TCP port 111.






2. Metropolitan area network






3. A gateway that operates on the Internet backbone.






4. A permanent telephone connection between 2 locations that provide a predetermined amount of bandwidth at all times






5. Wide area network






6. Pointing in a direction






7. 1-126






8. Cross talk that occurs between wire pairs near the source of a signal






9. A systematic survey of all of the target organization's Internet addresses that is conducted to identify network services offered by hosts in that range






10. A logical grouping of information that includes the network layer header and encapsulated data - but specifically does not include any headers and trailers below the network layer.






11. File Transfere Protocol






12. WAN transmission technologies that contains a segment that relied on 10GBase-EW standard






13. UDP






14. Eight bits of information; in a digital signaling system - one byte carries one piece of information






15. Where demarc is located if an organization follows structured cabling standards






16. Transport Layer






17. IPSec






18. A device used to connect thicknet cable with a transceiver. A vampire bypasses the need to serve the cable - because the vampire tap has a metal tooth that pierces through the outside cable insulation (like a vampire) and connects with the copper wir






19. ACL






20. Serves as a translator; manages data encryption






21. Rules and configuration guidelines governing implementation and operation of IDPSs within an organization






22. The way nodes responds to a collision






23. Process in which an NIDPS look for invalid data packets - packets that are malformed under the rules of the TCP/IP protocol






24. A network design in which every node is connected to every other note - achieving fault tolerance.






25. One transmitter issues signals to multiple receivers; receivers may be undefined or defined






26. A medium that carries 1 signal






27. Network layer service that subdivides segments it receives from the Transport layer into smaller packets






28. Encompasses actions an organization takes when intrusion is detected






29. MAU






30. The action of luring an individual into committing a crime.






31. Cyclic redundancy check






32. International telecommunication Union






33. MDIX






34. Device used to regenerate a signal






35. An 8-bit character-coding method consisting of 96 uppercase and lowercase characters and numbers - plus 32 nonprinting characters.






36. Wireless standard






37. Accurate alarm events that do not pose significant threat to information security






38. Signals travel in one direction






39. (fix) if analog an amplifier or if digital with repeater






40. Any end device on the network (for example: computers - printers - copy machines...)






41. Dynamic Host Configuration Protocol






42. Used to resolve NetBIOS names w IP address






43. ICMP






44. Enables the establishment of a Web connection - but it also provides for the exchange of resources - for example - displaying AOL's Web page in your brower.






45. Unshielded twisted pair






46. Braided metal shielding used to insulate some types of coaxial cable






47. An authentication protocol that uses public key technology to provide users with secured access to network resources.






48. A private network that functions like a tunnel though a large network-such as the Internet or an enterprise network-that is restricted to designated member clients only.






49. Network Layer






50. Wrapping one layer's PDU with protocol information so that it can be interpreted by a lower layer