Test your basic knowledge |

IT: Networking Vocab

Subject : it-skills
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Is a challenge respone authentication protocol






2. Is associated with unix/linux networks






3. The process of determining the best path from Point A on one network to Point B on another






4. Layer 3 Troubleshooting






5. Specify clients configurations to adhere to this subnet






6. Ppp tunneling protocol






7. Trivial file transfer protocol






8. Method of trasmitting data from a satellite






9. Layer 2 Troubleshooting






10. EMI interference induced on one cable by signals traveling on a nearby cable






11. Actual. how much data is transmitted during given time






12. GBIC






13. Contains information that a wireless node needs to associate with an ap






14. Device that separates broadcast domain






15. Device that can detect intrusion and launch an active response






16. Is a TCP/IP service that converts a computer or domain name to an IP address or that converts an IP address to a computer or domain name.






17. A system of computers - printer devices - network devices - and computer software linked by communications cabling or radio waves.






18. Useful for troubleshooting a network connectivity problem from workstation to another workstation






19. Saturation of network bandwidth caused by excessive traffic - as when a large number of computers or devices attemp to transmit simultaneously - or when computers or devices presist in transmitting repeatedly.






20. The wave splits into secondary waves






21. IDPS that examines network traffic in search of patterns that match known signatures






22. Glass or plastic shield around the core of a fiber-optic cable; reflects light back to the core in patterns that vary depending on the transmission mode






23. Application Layer






24. Synchronises data exchange






25. Which layer is responsible for putting data into frames as well as providing error checking data?






26. String used to identify an access point - configure on your new access points to match the settings on existing access points






27. Manages end-to-end delivery of data






28. A generic term referring to any set of protocols and standards collected into a comprehensive grouping that - when followed by the devices in a network - allows all the devices to communicate. Examples include TCP/IP and OSI.






29. Progress of a wave over a time in a relationship






30. When pulses that represent bits follow one another along a single transmission






31. A standard method or format for communication between networked devices






32. Requires CSU/DSU-the connection point for a t1 live at customers site






33. The process of connecting to a wireless network






34. A situation in which two or more packets are detected at the same time on an Ethernet network.






35. A type of interference that occurs when two LAN cables run close to each other. If one cable is carrying a signal and the other isn't - the one carrying a signal will induce a 'ghost' signal in the other cable






36. A network that links multiple LAN's in large city or metropolitan region.






37. A type of fiber optic connector. These connectors are square shaped and have release mechanisms to prevent the cable from accidentally being unplugged






38. Is used to enable IP address to be assigned automatically by a DHCP server on a network.






39. SMF






40. Physical layer. 10 giga bit throughput. baseband transmission. twisted pair. max length is 100 meters. cat 6 or 7.






41. Strategy that combines the best of the other two strategies; while individual agents still analyze and respond to local threats - their reporting to a hierarchical central facility enables the organization to detect widespread attacks






42. Describes the relative strength over a three dimensional area of an antenna






43. ICA






44. For fiber-optic cable communications - the difference between the transmitted power and the receiver sensitivity - as measured in decibels. It is the minimum transmitter power and receiver sensitivity needed for a signal to be sent and received fully






45. On a computer that receives data over a network - the process in which the device interprets the lower-layer headers and - when finished with each header - removes the header - revealing the next-higher-layer PDU.






46. Cause by length - loss of signals as it travels farther away






47. Equivalent to OSI Layer 3 Network






48. A Data Link sublayer of the OSI model that initiates the communication link between nodes and ensures the link is not unintentionally broken.






49. A form of address translation that uses Tcp port numbers to distinguish each client's transmission - thus allowing multiple clients to share a limited number of Internet-recognized IP addresses.






50. IEEE standard for wireless networking