Test your basic knowledge |

IT: Networking Vocab

Subject : it-skills
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Unix command at shell prompt to send a file to printer






2. A group of two or more computer systems linked together.






3. Packet internet groper






4. 2nd set of characteristics that make up a device's MAC address. Added at the factory and is based on the device's model and manufacture date






5. Provides strung security for HTTP- transpored information - but it is only used by some vendor's application






6. HDLC






7. A remote connection where the client computer is a low-end computer that communicates with a terminal server.






8. Ppp over ethernet






9. Secure Sockets Layer






10. Network Layer






11. Transmission that involves one transmitter and multiple - undefined receivers






12. A network design built by running cable from one PC of file server to the next - like links in a chain.






13. Device that receives and retransmits microwave data signals






14. Which layer in the OSI is responsible for routing and controling the flow of packets around the network?






15. Model for understanding and developing computer-to-computer communication developed in the 80s by ISO; divides networking functions among 7 layers






16. A resistor that is connected to the end of a segment on a bus network - so that data-carrying signals are absorbed at the point where the segment stops. Absorbing the signals ensures they are not reflected back onto the cable after they reach the end






17. Consists of activities that deter intrusion






18. A combination of techniques used to detect an intrusion and then to trace it back to its source






19. A cable TV company - such as Comcast Broadband.






20. Strength of digital signal






21. Cause by EMI/RFI - and other packets - interference on the signal






22. Is usde to communicate time synchronization information between systemson a network






23. A gateway that operates on the Internet backbone.






24. The means through which data is transmitted and received






25. Refers to the IEEE 802.3z and IEEE 802.3ab standard for Ethernet communications speed up to 1 Gbps.






26. Positive and zero. 1 and 0's.






27. Amplitude modulation-amplitude of signal is modified






28. Application Layer






29. Connection-less






30. Transport Layer






31. Media access control






32. Junction point between the MDF and concentrations of fewer connections; those that terminate in a telecommunications closet






33. ACL






34. CDFS






35. A shell protocol that enables systems to use various authenticaion mechanisms.






36. To make more efficient use of limited numbers of legitimate IP addressing






37. AMI






38. Prevents broadcast storms by enabling switches to calculate paths that avoid potential loops and artificially block the links that would complete a loop






39. Device with little - if any - of it's own processing or disk capacity; depends on a host to supply it with applications and data-processing services






40. The IEEE stanard for error and flow control in data frames.






41. SCP






42. International society composed of engineering professionals - promotes development and education in the electrical engineering and computer fields






43. A connector used to terminate coaxial cable used for transmitting television and broadband cable signals






44. Telephone jacks






45. The combination of an IP address's network ID and subnet information. By interpreting the address's extended network prefix - a device can determine the subnet to which an address belongs.






46. IDPS that reviews log files from servers - network devices - and other IDPSs for signatures indicating an attack or intrusion






47. MT-RJ






48. Address Resolution Protocol






49. A generic term referring to any set of protocols and standards collected into a comprehensive grouping that - when followed by the devices in a network - allows all the devices to communicate. Examples include TCP/IP and OSI.






50. Data Link Layer







Sorry!:) No result found.

Can you answer 50 questions in 15 minutes?


Let me suggest you:



Major Subjects



Tests & Exams


AP
CLEP
DSST
GRE
SAT
GMAT

Most popular tests