SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
IT: Networking Vocab
Start Test
Study First
Subject
:
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Most common cabling used in networking. Usually connects nodes to the main network.
ethernet
Patch Panel
physical address
Independent Computer Architecture
2. Hardware that constitutes the enterprise-wide cabling system
802.5
Cable Plant
Mechanical Transfer-Registered Jack
10base-t
3. Is used to route electronic mail through the internetwork
public network
802.3
utp
Simple Mail Transfer Protocol (SMTP)
4. Time Division Multiple Access
stp
TDMA
collision detection
Industrial - Scientific - and Medical
5. Enables the establishment of a Web connection - but it also provides for the exchange of resources - for example - displaying AOL's Web page in your brower.
Simple Mail Transfer Protocol (SMTP)
presentation layer
slip
Hypertext Transfer Protocol (HTTP)
6. A computer on a network that requests services or resources from another computer on a network
Network layer
workstation
Address Resolution Protocol
Transport Layer (Layer 4)
7. Is a host-to-host protocol like TCP - however it does not include mechanisms for ensuring timely delivery
User Datagram Protocol (UDP)
backbone
crossover cable
OSI
8. The cabling or radio waves used to connect one network computer to another - or one network to another - and transport data between them. - Means by which a communications signal is carried from one system to another (for example - twisted-pair wire
Transmission media
serial
vampire tap
Network Layer
9. Rules and configuration guidelines governing implementation and operation of IDPSs within an organization
hostname
site policy
Internet Protocol
DHCP
10. Communications cable that consists of one or more glass 0r plastic fiber cores inside a protective cladding material - covered by a plastic PVC outer jacket. Signal transmission along the inside fibers typically uses infrared light.
Internet Engineering Task Force (IETE)
Quality of Service
fiber-optic cables
node
11. Secure Shell
802.11n
RS-232
router
SSH
12. Physical Layer
Frequency
Time Division Multiple Access (TDMA)
Repeaters
confidence value
13. Where demarc is located if an organization follows structured cabling standards
802.5
entrance facilities
Point-to-Point Protocol over Ethernet
IDPS terrorist
14. A network design in which every node is connected to every other note - achieving fault tolerance.
telnet
Multiplexer
Logical Link Control
mesh topology
15. Layer 5 through 7 Troubleshooting
NNTP
Challenge Handshake Authentication Protocol
multiprotocol label switching
configured with correct sending and receiving email server information
16. A TCP/Ip troubleshooting utility that displays statistics and the state of current TCP/IP connections. It also displays ports - which can signal whether services are using the correct ports.
netstat
Integrated Services Digital Network
logical link control (LLC)
dig (domain information groper)
17. A private network that functions like a tunnel though a large network-such as the Internet or an enterprise network-that is restricted to designated member clients only.
Faulty network cable
Byte
virture privat network (VPN)
SDU
18. Uses light to communicate a signal; the light is dispersed on numerous paths as it travels through the core and is reflected back. Provides high bandwidth at high speeds over medium distances up to about 3000 feet
File Transfere Protocol - (FTP)
Multimode fiber
BOOTP
bayonet nut connector (BNC)
19. A Data Link sublayer that examines addressing information contained in a network frame and controls how devices share communications on the same network.
reassembly
netstat
statistical anomaly-based (stat - behavior-based) IDPS
media access control (MAC)
20. Binary values for each bit position
monitoring port (SPAN port)
bus topology
128 - 64 - 32 - 16 - 8 - 4 - 2 - 1
Internet
21. Application Layer
supernet mask
hub
TCP/IP Architecture Layer 4
port 53
22. Unix command at shell prompt to send a file to printer
isdn
CSU/DSU
TIA
lpr filename
23. Large diameter. led/light is generated at different angles. high throughput - high noise resistance - excellent security - and long distances
FHSS
MMF
broadcast frame or broadcast packet
frame
24. Is used to enable IP address to be assigned automatically by a DHCP server on a network.
broadcast storm
Dynamic Host Configuration Protocol (DHCP)
Intermediate Distribution Frame
firewall
25. Layer 4
Point-to-Multipoint
Transport
workstation
ATU-R
26. Max number of hops a packet can take b/w its source and destination using RIP on a LAN
NNTP
alert or alarm
15 hops
SMF
27. A systematic survey of all of the target organization's Internet addresses that is conducted to identify network services offered by hosts in that range
SMTP
ACK (acknowledgement)
fingerprinting
SDU
28. The device inside a computer that connect a computer to the network media
asynchronous comunications
authentication
NIC
Multimode fiber
29. 12-character string that uniquely identifies a network node - hard coded into the NIC by the manufacturer; composed ot the block ID and device ID
Secure Shell
MAC address
Physical
stateful protocol analysis (SPA) IDPS
30. Reflection in multiple different directions of a signal
scattering
ITU (International Telecommunication Union)
Local Connector
SSL
31. HTTP - SMTP - POP3 - VoIP
TCP/IP Vs. Netware: Application
Populated Segment
Byte
intrusion detection/prevention system (IDPS)
32. Network layer service that subdivides segments it receives from the Transport layer into smaller packets
100base-tx
Server
fragmentation
IPSec
33. A boundary between two zones of trust
router
firewall
15 hops
perimeter
34. Layer 6
802.44
ANSI (American National Standards Institute)
Simple Mail Transfer Protocol (SMTP)
Presentation
35. A network that links multiple LANs in a large city or metropolitan region.
802.2
SSH
Metropolitan area network (MAN)
Network
36. Set of protocols that specify how wireless networks works. Most common are currently B and G. N is an emerging standard.
POP3 (Post Office Protocol - version 3)
802.11
TCP/IP Network Access Layer Encapsulation
MMF
37. EFS
ISP (Internet service provider)
spread-spectrum
ppptp
Encrypting File System
38. Event that triggers alarm when no actual attack is in progress
cp connection
IEEE
false attack stimulus
public network
39. 500 meters - 10Mbps
10BASE5 Limit
digital adv
Point-to-Point Tunneling Protocol
carrier sense
40. RJ 45
AUI
802.11
transceiver
twisted pair connector
41. UDP
802.11
MAC sublayer
fat pipe
User Datagram Protocol
42. Carrier Sense Multiple Access with Collision Detection
FDM
CSMACD
Simple Network Management Protocol (SNMP)
(fiddy) Fiber Distributed Data Interface
43. Ethernet communications at speeds up to 100 Mbps as defined under the IEEE 802.3u standard.
Fast Ethernet
firewall
asymmetrical transmission
CIDR block
44. Generates signals as changes in voltage at the NIC
physical layer
Broadcast
Time Division Multiple Access (TDMA)
site policy
45. A single physical/non-physical medium for connecting computers
Presentation
enterprise network
computer network
medium
46. Each node passively listens for then accepts data
ISP (Internet service provider)
SMTP server name
passive topology
reassembly
47. Modulation technique in which the amplitude of the carrier signal is modified by the application of a data signal
twisted-pair cable
ARP
Amplitude Modulation
Metropolitan area network (MAN)
48. Hard-to-define skills such as dependability
Internet Engineering Task Force (IETE)
Application layer
soft skills
LAN
49. PDC
backbone
nbtstat
topology
Primary Domain Controller
50. Controls how applications access network
Synchronous Optical Network
Application
A Protocol
Telnet