SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
IT: Networking Vocab
Start Test
Study First
Subject
:
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Which protocol allows users to send emails?
SMTP
RFI
the higher the frequency
Gigabit Interface Converter
2. A specialized device that allows multiple networks or segments to connect and exchange data
port 110
frame
connectivity device
public network
3. Form of transmission in which signals are modulated as radiofrequency analog pulses with different frequency ranges; does not involve binary coding
Broadband
supernet mask
connectionless
crossover cable
4. L2F
Byte
false positive
Layer 2 Forwarding
Impedance
5. An international body that establishes communications and networking standards - and that is particularly known for its contributions to network protocol standards.
Authentication Header
inline sensor
International Organization for Standardization (ISO)
Bit-Error Rate Test
6. Faster wireless standard 20-25
white/orange and orange
Network interface card (NIC)
802.11g
fully distributed control strategy
7. A shell protocol that enables systems to use various authenticaion mechanisms.
binary
association
wavelength
EAP
8. Signal that uses variable voltage to create continuous waves - resulting in an inexact transmission
802.5
Analog
ATM
802.11b
9. Experimentation 240-255
Class E Network
Network
Radio Waves
broadband
10. Moving from one BSS to another without losing connectivity
fiber optic cable
roaming
internetwork
stateless firewall
11. Application Layer
statistical anomaly-based (stat - behavior-based) IDPS
SMTP
topology
throughput
12. SSID
beaconing
Session layer
Service Set Identifier
bandwidth
13. The act of hacking into a hacker's system to find out as much as possible about the hacker
back hack
Layer 2 Tunneling Protocol
broadcast storm
Frequency
14. Satellite used for broadband internet access
WAN Connectivity
geosynchronous
power over ethernet
Serial Line Internet Protocol
15. The wave bounces back when encountering an object
signal
Broadcast
MAC
reflection
16. Signals travel in both directions but only one at a time
802.3
half duplex
fiber-optic cables
TCP/IP Vs. Netware: Application
17. PDC
5-4-3 rule
Primary Domain Controller
OSI Layer 2
transmission media
18. The total amount of opposition to the flow of current.
firmware
Network Information Service
TCP port 23
impedance
19. Media access control
cp connection
TCP/IP Network Access Layer Encapsulation
MAC
SMTP
20. Pieces of hardware that connect the wire to the network device
tuning
radio frequency interference (RFI)
Connectors
nbtstat
21. What is an agreed set of rules that two parties agree on in order to communicate with each other commanly known as?
A Protocol
LLC
Session
intrusion prevention system (IPS)
22. Enables the establishment of a Web connection - but it also provides for the exchange of resources - for example - displaying AOL's Web page in your brower.
host-based IDPS (HIPDS)
HTTP
Hypertext Transfer Protocol (HTTP)
lpr filename
23. Communications that occur in discrete units where the start of a unit is signaled by a start bit at the front and the end of the unit is signaled by a stop bit at the back.
asynchronous comunications
Telnet
Single mode fiber
cross talk
24. Maximum arc into which you can loop a cable before you will cause data transmission errors
Gigabit Ethernet (non-fiber characteristics)
Bend Radius
topology
Electrical Signaling
25. A command-line utility that combines the functionality of the tracert and ping commands (similar to UNIX's mtr command) and comes with Windows XP - Vista - and Windows Server 2003 and Server 2008
inline sensor
pathping
Unshielded twisted pair
checksum
26. Supplying electrical power through ethernet
OSI Layer 3
Shielded Twised Pair
power over ethernet
fixing noise
27. Internet group management protocol
ports
IGMP
15 hops
Phase
28. IEEE standard for error and flow control in data frames
Basic Rate Interface
directional antennas
802.2
routing
29. A gateway that operates on the Internet backbone.
Core Gateway
Virtual private network (VPN)
SNMP
Session
30. Process of breaking large packets into smaller packets.
Default Gateway
fading
Telnet
fragmentation
31. Single mode fiber
header
session layer
Node
SMF
32. String used to identify an access point - configure on your new access points to match the settings on existing access points
session layer
EAPoL
SSID
WINS
33. AM
ITU
Amplitude Modulation
TCP/IP Architecture Layer 3
Baseband
34. MAC Protocols
802.3
NIC
ARP
TCP/IP Vs. Netware: Network Access
35. CHAP
Trivial File Transfer Protocol (TFTP)
Active Directory
Challenge Handshake Authentication Protocol
OSI model
36. Decoy systems designed to lure potential attackers away from critical systems
routing
Class A
honey pot
IETE
37. A route discovery and analysis utility that comes with UNIX and Linux operating systems. Mtr combines with functions of the ping and traceroute commands and delivers an easily readable chart as its output
crossover cable
Dynamic Host Configuration protocol (DHCP)
coaxial cable
mtr (my traceroute)
38. POP3 - post office protocol 3
Internet Protocol Security
ICMP
flow control
port 110
39. Service that supports email
Phase
communications services
star topology
virtual circuit
40. The distinct units of data that are exchanged between nodes on a network
data packets
Repeaters
HTTPS
Internet Protocol
41. Modulates digital into analog in transmitting end and demodulates analog into digital in recieving end
WINS
baseband
modem
802.3
42. Four twisted wire pairs rated for 100 Mhz.
Category 5
Binary
Incorrect cable type
Session
43. Does not operate at the application layer
Primary Domain Controller
baseband
TCP/IP Internet Layer Encapsulation
ARP
44. Max number of hops a packet can take b/w its source and destination using RIP on a LAN
analog
protocol
15 hops
data packets
45. Is a file transfer protocol that uses s ecure shell (SSH)
To stop the Hamburgerler from stealing all of Ronnie McDonalds burgers
port 53
RIR (Regional Internet Registry)
Secure File Transfer Protocol (SFTP)
46. The more resistant to cross talk (STP)
the more twist
Subscriber connector
Kerberos
Patch Panel
47. An IDPS that resides on particular computer or server (the host) and monitors activity only on that system. Also known as system integrity verifiers.
Shielded Twised Pair
intrusion detection system (IDS)
host-based IDPS (HIPDS)
LLC
48. Also called the star-bus hybrid topology - a network design that combines the logial comunications of a bus with the physical layout of a star.
ISOC
star-wired bus topology
Alien Cross Talk
Category 6
49. ICA
Independent Computer Architecture
virtual circuit
NTP
fixing cross talk
50. A common way of sharing resources on a peer-to-peer network
modifying the file-sharing controls
TCP/UDP
Impedance
100base-tx