SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
IT: Networking Vocab
Start Test
Study First
Subject
:
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. The physical layout of a computer network
Network News Transport Protocol
Loose network cable connection
2.4-GHz band
topology
2. RDP
Secure Shell (SSH)
reassembly
Remote Desktop Protocol
API (application program interface)
3. A connector used to terminate coaxial cable used for transmitting television and broadband cable signals
Repeater
slip
TCP/IP Vs. Netware: Transport & Internet
f type connector
4. Radio frequency interference. interference caused by radio.
TCP/IP protocol failure
perimeter
standard
RFI
5. Scrambles information into an alternative form that requires a key or password to decrypt the information.
packet filtering - application proxy
certification value may be lessened due to the number of people obtaining them
social engineering
encryption
6. Transport Layer
PSTN
flow control
TCP/UDP
Ethernet
7. The oldest type of network design - this topology consists of multiple nodes attached to a central hub - switch - or router.
digital signal
Star topology
centralized control strategy
routing
8. Associates a MAC address with a given IP address - reverse ARP
beaconing
dedicated lines
255.255.255.252
RARP
9. The process of wrapping one layer's PDU with protocol information so that it can be interpreted by a lower layer. For example - Data Link layer protocols encapsulate Network layer packets in frames.
collision detection
encapsulate
10Gbase-t
TCP/IP Transport Layer Encapsulation
10. Internet control message protocol
Institute of Electrical and Electronics Engineers
driver signing
EMI
ICMP
11. A network owned and maintained by an organization -such as a campus network operated by a college.
bayonet nut connector (BNC)
private network
step-index multimode fiber-optic cable
FDDI
12. Error detection and correction
TCP/IP Architecture Layer 2
Transport
Improperly configured switch
Network Time Protocol (NTP)
13. SNMP
TFTP
DSL
Simple Network Management Protocol
alarm filtering
14. Crimp into pins 1 and 2 of RJ 45 connector
white/orange and orange
MTU (maximum transmission unit)
1000base-t
802.11b
15. A standard method or format for communication between networked devices
Internetwork Packet Exchange
TDM
Connectors
protocol
16. ISM
addressing
Industrial - Scientific - and Medical
route
Secure Copy Protocol
17. Rules and configuration guidelines governing implementation and operation of IDPSs within an organization
Internet Group Multicast Protocol
Internet Protocol
wavelength
site policy
18. Is a secure form of HTTP
HTTPS
TCP/IP
twisted shielded pair
statistical multiplexing
19. POP3 - post office protocol 3
port 110
MAC address
SNAT (Static Network Address Translation)
alarm clustering and compaction
20. IPv4
Demultiplexer
Firewall configured correctly
Internet Protocol version 4
supernet
21. A TCP/IP troubleshooting utility that uses ICMP to trace the path from one networked node to another - identifying all intermediate hops between the two nodes. Traceroute is useful for determining router or subnet connectivity problems. On Windows-ba
half duplex
traceroute (tracert)
tuning
Data Link
22. Satellite used for broadband internet access
GBIC
Subnetmask
topology
geosynchronous
23. Follow TIA/EIA 568 specifications
Carrier Sense Multiple Access / Collision Detection
NIC (Network Interface Card)
Static IP Addressing
installing cable
24. Layer 3
Peer-to-peer network
Challenge-Response Authentication Mechanism - Message Digest 5
Network
EMI
25. A private network that functions like a tunnel through a larger network
stateful protocol analysis (SPA) IDPS
Fault tolerance
Virtual private network (VPN)
FF02
26. Frequency modulation-frequency of signal is modified
Attenuation
presentation layer
FM
overhead
27. Device that acts as a wireless switch so that nodes can connect wirelessly to a network.
fingerprinting
Shielded Twised Pair
diffraction
access point
28. An IDPS that resides on particular computer or server (the host) and monitors activity only on that system. Also known as system integrity verifiers.
host-based IDPS (HIPDS)
hot site
fiber optic cable
Data Link Layer
29. An international body that establishes communications and networking standards - and that is particularly known for its contributions to network protocol standards.
Category 5e
International Organization for Standardization (ISO)
physical layer device
Physical
30. Frequency division multiplexing
Media Dependent Interface
Data Link
FDM
MIME (Multipurpose Internet Mail Extensions)
31. The NIC and network equipment are set up so they cannot send and receive at the same time
Layer 2 Tunneling Protocol
CRC (cyclic redundancy check)
Half Duplex NIC Communication
Service Set Identifier
32. IEEE 802.3 Media Access Control (MAC) sublayer of the data link layer
multiple access
Frame
802.3
To stop the Hamburgerler from stealing all of Ronnie McDonalds burgers
33. Speed: 10 Mbps - Alternative Name: 10BASE-T - IEEE Standard: IEEE 802.3 - Cable Type: Copper - max length 100 meters
Data Link Layer
EIA
Broadcast
Ethernet (characteristics)
34. Activities finalize restoration of operations to a normal state and seek to identify source and method of intrusion to ensure same type of attack cannot occur again
dedicated lines
TCP/IP Vs. OSI: Application
SNMP
intrusion correction
35. MAU
Multistation Access Unit
Structure
Point-to-Point Protocol over Ethernet
installing cable
36. Secure Hypertext Transfer Protocol
TCP/IP Vs. OSI: Internet
TDM
S-HTTP
lpr filename
37. Network-max segment length-100 meters
API (application program interface)
public switched telephone network (PSTN)
subnetting purpose
10Base-T
38. Default subnet mask for 154.13.44.87
ethernet
network address
255.255.0.0
star topology
39. Layer 4 Troubleshooting
Firewall configured correctly
ISP (Internet service provider)
dig (domain information groper)
Latency
40. Plain old telephone service
HTTP
POTS
ethernet
Berkeley Software Distribution
41. An 8-bit character-coding method consisting of 96 uppercase and lowercase characters and numbers - plus 32 nonprinting characters.
SLIP
baseband
Binary
American Standard Code for Information Interchange (ASCII)
42. An internetwork is two or more computer networks connected together.
ISO
UDP
internetwork
Open System Interconnection (OSI) referance model
43. 128 -64 -32 -16 -8 -4 -2 -1
Hypertext Transfer Protocol Secure (HTTPS)
sequencing
radio frequency interference (RFI)
binary
44. A unit of data transmitted on a network that contains control and address information corresponding to the OSI Data Link layer - or Layer 2.
LAN
frame
Same Layer Interaction
connection oriented
45. Routing protocol most likely used to replace a router for that handles traffic to and from the companies connection to its NSP
BGP
coax cable connector
Core Gateway
802.11g
46. Four twisted wire pairs rated for 250 MHz.
Kroner
stateful firewall
Point-to-Point Protocol
Category 6
47. Transport Layer
TFTP
Firewall Filtering
switch
frame
48. Process of adjusting IDPS to maximize efficiency in detecting true positives - while minimizing false positives and false negatives
tuning
RTS/CTS
802.3af
Session
49. The sender transmits the data to the destination without establishment of a connection.
802.5
connectionless
intrusion correction
Core Gateway
50. Transport Layer
bandwidth
star topology
Presentation
Flow Control