SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
IT: Networking Vocab
Start Test
Study First
Subject
:
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Telecommunications industry association
TIA
port 123
Secure Copy
Management Information Base
2. Speed: 1000 Mbps - Altenative name: 1000BASE-T - IEEE Standard: IEEE 802.3ab - Cable type: copper max length 100m
Data Link
LLC
Gigabit Ethernet (non-fiber characteristics)
Ring topology
3. Cause by length - loss of signals as it travels farther away
OSI Layer 6
attenuation
binary
DHCP
4. Collection of honey pots connecting several honey pot systems on a subnet
honey net
Star topology
physical address
ANDing
5. Layer 3 Troubleshooting
honey pot
Correct default gateway
VPN
A Protocol
6. A set of routines that make up part of a software application
802.2
packet
API (application program interface)
binary
7. Multiplexing based on priority
statistical multiplexing
router
Class A
Boot Protocol /Bootstrap Protocol
8. Uses multiple frequencies to transmit signal
FTP
Broadcast
soft skills
spread-spectrum
9. The pattern used to install a network medium
topology
fixing cross talk
S-HTTP
transport layer
10. Network Access Layer
TCP/IP Architecture Layer 1
Service Set Identifier
Correct default gateway
Institute of Electrical and Electronics Engineers (IEEE)
11. Fiber Distributed Data Interface
FDDI
Multiplexer
Amplitude
association
12. To make more efficient use of limited numbers of legitimate IP addressing
Internet Relay Chat
Domain Name System (DNS)
incremental backup
subnetting purpose
13. The _____________ allows certain bits of the IP address to be ignored when checking to see if an IP address matches the destination network address.
Subnetmask
Primary Domain Controller
Modulation
Internet Control Message Protocol (ICMP
14. Panel of data receptors into which twisted pair wire is inserted to complete a circuit
Hypertext Transfer Protocol (HTTP)
Punch-Down Block
port 25
port 53
15. Unit of data that results from subdividing a larger protocol data unit
SNMP
segment
stateful firewall
port 25
16. Physical layer. 1 gpbs throughput. baseband transmission. max length is 100 meters. cat 5e or higher utp. twisted pair.
Presentation
serial
1000base-t
nslookup
17. A boundary between two zones of trust
Round Trip Time
pppoe
Internet Protocol
perimeter
18. Style of data transmission in which the pulses that represent bits follow one another along a single transmission line; sequentially issued
Serial
Internet Information Services
connectionless
Universal serial bus
19. International Organization for Standardization
ISO
SMF
centralized control strategy
POP3
20. Firewall packet inspection that examines the data contained in a packet as well as the state of the connection between internal and external computers.
RTS/CTS
Multimode fiber
stateful firewall
directional antennas
21. Transport Layer
public switched telephone network (PSTN)
rollover cable
American Wire Gauge
TCP/UDP
22. Slow wireless standard 11-18 throughput
RS-232
Cladding
802.11a
802.11
23. LC - ST - SC - or MT RJ
CSMA/CD
Virtual private network (VPN)
Secure Shell (SSH)
fiber optic connector
24. Network time protocol
fixing noise
Protocol Data Unit
utp
NTP
25. Documented agreement containing technical specifications or other precise criteria used as guidelines to ensure that materials - products - processes - and services suit their intended purpose
Gigabit Ethernet (fiber characteristics)
NIC drivers
standard
block ID
26. A remote connection where the client computer is a low-end computer that communicates with a terminal server.
IGMP
Application
Network Layer
thin client computing
27. The least secure authentication method
Kroner
PAP
twisted shielded pair
route
28. Theoretical. difference b/w highest and lowest frequency.
bandwidth
Local Connector
hub
Session Layer (Layer 5)
29. A technique in which IP address used on a private network are assigned a public IP address by a gateway when accessing a public network.
NAT (Network Address Translation)
bandwidth
ring topology
ACK (acknowledgement)
30. A type of transmission in which there are several transmission channels on a communications medium - allowing more than one node to transmit at the same time.
IP Address
fault tolerance
voltage
broadband
31. 4th layer; protocols ensure that data are transferred from point A to point B reliably and without errors; services include flow control - acknowledgment - error correction - segmentation - reassembly - and sequencing
Transport layer
protocol data unit (PDU)
microwave
Data Service Unit
32. Honey pot that has been protected so it cannot be easily compromised
ARP
padded cell
ACK (acknowledgement)
Physical
33. Hardware address of the network interface card
MAC
network class B
bandwidth
twisted pair connector
34. Network cable that contains pairs of insulated wires that are twisted together and surrounded by a shielding material for added EMI and RFI protection - all inside a protective jacket.
shielded twisted-paired (STP) cable
network class a
IP address within the assigned network
hybrid fiber / coax (HFC) cable
35. 500 meters - 10Mbps
10BASE5 Limit
Fast Ethernet (characteristics)
Unshielded twisted pair
SMTP
36. A worldwide network network of interconnected LANs - and MANs - that uses the TCP/IP protocol to enable people to share e-mail messages and computer files and to access a vast array of infromation.
DSSS
Internet
incremental backup
MultiStation Access Unit
37. Communications that occur in discrete units where the start of a unit is signaled by a start bit at the front and the end of the unit is signaled by a stop bit at the back.
asynchronous comunications
Media Dependent Interface
digital adv
Internet Connection Sharing
38. Network layer device
logical address
Data Link
intrusion prevention system (IPS)
router
39. Each computer is connected to a central device
Transport Layer Security (TSL)
star topology
Category 1
Secure File Transfer Protocol
40. For fiber-optic cable communications - the difference between the transmitted power and the receiver sensitivity - as measured in decibels. It is the minimum transmitter power and receiver sensitivity needed for a signal to be sent and received fully
ring topology
power budget
IP Addressing
Protocol Data Unit
41. Unshielded twisted pair
Industrial - Scientific - and Medical
utp
coax cable connector
medium
42. Signals travel in one direction
PSTN
simplex
Error Handling
NetWare Loadable Module
43. Core TCP/IP protocol that operates in the Network layer and provided information about how and where data should be delivered; subprotocol that enables TCP/IP to inernetwork
Application
IP (Internet Protocol)
Ethernet
Carrier Sense Multiple Access with Collision Detection (CSMACD)
44. Which layer in the OSI network model is responsible for providing a set of interfaces for applications to obtain access to networked services?
back hack
Application Layer
Post Office Protocol 3 (POP3)
spread-spectrum
45. A versatile - chainable serial-bus technology that connects up to 127 devices at speeds of 1.5 Mbps and 12 Mbps as well as 480 Mbps.
collision detection
Amplifier
Encapsulation
Universal serial bus
46. Indication a system has just been attacked or is under attack
packet
EMI
Domain Name System (DNS)
alert or alarm
47. This phase determines how often systems should send each other quality statistics.
intranet
Independent Computer Architecture
reassembly
link quality monitoring
48. Attacker who utilizes tactics designed to trip the organization's IDPS - essentially causing the organization to conduct its own DoS attack - but overreacting to an actual - but insignificant - attack.
IDPS terrorist
back door
vampire tap
workstation
49. A form of fiber-optic cable that supports only one signal transmission at a time and that is used mainly for long- distance communication.
single-mode fiber-optic cable
802.44
IPSec
intrusion detection/prevention system (IDPS)
50. Is a secure form of HTTP
Internet
port 53
Workstation
HTTPS