SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
IT: Networking Vocab
Start Test
Study First
Subject
:
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A system of computers - print devices - network devices - and computer software linked by communications cabling or radio waves.
cable plant
TCP/IP Network Access Layer Encapsulation
SSH
Computer network
2. Amount of data that can be transmitted over media or wireless at a time.
host
entrapment
CSMACD
bandwidth
3. Dynamic host configuration protocol
Internet Protocol
DHCP
Dynamic Host Configuration Protocol (DHCP)
Firewall Filtering
4. Also called the star-ring hybrid - topology - a network design in which the logic communication are in a ring - but the phyical layout of the network star.
star-wired ring topology
Half Duplex NIC Communication
LLC
Full-Duplex
5. ICA
protocol
social engineering
Independent Computer Architecture
Transport
6. Provides service that ensure accurate and timely delivery of network communications between two hosts
Routing
Transmission Protocol (TCP)
physical layer device
cross talk
7. A app. loaded on a server included with Windows OS that enables remote access
standby UPS
LDAP
bandwidth
RAS
8. Event that triggers alarms and causes an IDPS to react as if a real attack is in progress
broadband
true attack stimulus
SNAT (Static Network Address Translation)
Line Printer Remote
9. Lower sublayer of the Data Link layer; appends the physical address of the destination computer onto the fram
LC connector
Internet Control Message Protocol (ICMP
MAC (Media Access Control) sublayer
128 - 64 - 32 - 16 - 8 - 4 - 2 - 1
10. Device used to regenerate a signal
Bit
Repeater
port 123
WAN
11. Pipeline used to contain and protect cabling; usually made from metal
Conduit
ppptp
crossover cable
PPP
12. Connector used with single mode and multimode fiber optic cable
TCP/IP Architecture Layer 1
Gateway Services for NetWare
LC connector
fragmentation
13. A boundary between two zones of trust
perimeter
carrier sense
ASCII
Secure Copy Protocol
14. A standard for encoding and interpreting binary files - images - video - and non-ASCII character sets within an e-mail message.
IP address within the assigned network
fixing noise
Broadcast
MIME (Multipurpose Internet Mail Extensions)
15. PPTP
Point-to-Point Tunneling Protocol
To stop the Hamburgerler from stealing all of Ronnie McDonalds burgers
Localhost
CSMA/CD
16. Pointing in a direction
Network Layer
directional antennas
Classful Addressing
Analog
17. A versatile - chainable serial-bus technology that connects up to 127 devices at speeds of 1.5 Mbps and 12 Mbps as well as 480 Mbps.
Universal serial bus
MAN
BSS
Network Time Protocol
18. File Transfere Protocol
grade-index multimode fiber-optic cable
Gigabit Ethernet (non-fiber characteristics)
FTP
Network File System (NFS)
19. Ensures that messages being transmitted on the internet are private and tamper proof
Secure File Transfer Protocol
Transport Layer Security (TSL)
Mail Exchanger
10BASE5 Limit
20. Small network 192-223
LC connector
Class C Network
CSMA/CA
IEEE 802.12 Standard
21. BSD
Berkeley Software Distribution
active scanning
passive topology
SONET
22. Hypertext Transfer Protocol Secure
SONET
HTTPS
coaxial cable
FDMA
23. Networking technology developed at Xerox in the 70s and improved by Digital Equipment Corp - Inel - and Xerox. Most common form of network transmission - follows IEEE 802.3 standard
Electromagnetic Interference
Ethernet
Data Link Layer
phishing
24. Communications for continuous burst of data controlled by a clock signal that starts each burst.
ANSI
Remote Terminal Emulation (Telnet)
encapsulate
synchronous communications
25. Decoy systems designed to lure potential attackers away from critical systems
ssl
Crosstalk
MAC address
honey pot
26. Packet
TCP/IP Internet Layer Encapsulation
Session Layer
media
Application
27. The scheme for assigning a unique identifying number to every node on a network
packet filtering - application proxy
virtual circuit
addressing
DB-9 connector
28. What does POP3 stand for?
Post Office Protocol
fiber-optic cables
Internet Message Access Protocol version 4
Berkeley Internet Name Domain
29. HDLC
255.255.0.0
binary
WAN
High-Level Data Link Control
30. Round time trip. time it takes for packet to get from sender to receiver and back
node
RTT
Port Numbers
Coaxial Cable
31. Name Of Layer 1
fiber optics
Physical
incremental backup
NIC
32. Guarantees that a server continually has power even if a buildings electrical service is interrupted - continuous voltage to a device by switching virtually instantaneously to the battery when it detects loss of power
STP
standby UPS
FDM
header
33. First set of six characters that make up the MAC address and that are unique to a particular manufacturer
block ID
NIC drivers
power budget
device ID
34. Panel of data receptors into which twisted pair wire is inserted to complete a circuit
OSI Layer 7
reassembly
Ferrule
Punch-Down Block
35. Used on many UNIX/LINUX systems to provide authentication security for TCP/IP applications such as Telnet and FTP
Secure Shell (SSH)
star topology
standard connector
Internet Protocol
36. The seventh layer of the OSI model. Application layer protocols enable software programs to negotiate formatting - procedural - security - synchronization - and other requirements with the network.
Gateway Services for NetWare
entrance facilities
Application Layer
Zero Configuration
37. An established guidline that specifies how networked data is formatted into packet or frame - how it is transmitted - and how it is interpreted at the receiving end.
TDM
protocol
802.2
Zero Configuration
38. The part of a network to which segments and significant shared devices connect
Primary Rate Interface
Single Mode Fiber
TCP/IP Vs. OSI: Transport
backbone
39. Internet corporation for assigned names and numbers
Same Layer Interaction
ICAN
transmission media
Application
40. Amplitude - frequency (Hz) - wavelength - wavy line
analog signal
Internet Protocol
Main Distribution Frame
Serial
41. Layer 1 Troubleshooting
66 Block
Faulty network cable
Telnet
site policy awareness
42. NAT
Mechanical Transfer-Registered Jack
LDAP
OSI
Network Address Translation
43. Communications arrangement in which a single transmitter issues signals to multiple - defined recipients
sequencing
Nonbroadcast Point-to-Multipoint Transmission
Trivial File Transfer Protocol (TFTP)
intrusion reaction
44. MDIX
Media Dependent Interface Crossover
crimping tool and wore stripper
MAC address
Multiplexing
45. The _____________ allows computers to 'talk' to themselves on a different port.
Localhost
WAN
binary
site policy awareness
46. Ethernet cable - high resistance to noise - networks are RG 6
coaxial cable
LLC
alarm filtering
255.255.255.252
47. DSU
Data Service Unit
Fault tolerance
WDM
Presentation Layer
48. The process of attracting attention to a system by placing tantalizing information in key locations.
rj-45
Hubs
enticement
Berkeley Internet Name Domain
49. Layer 1 Troubleshooting
Loose network cable connection
VLAN
TCP port 23
File Transfer Protocol (FTP)
50. A wireless station listens on all channels for a bacon frame from an access point
ICS (Internet Connection Sharing)
Management Information Base
passive scanning
Ethernet