SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
IT: Networking Vocab
Start Test
Study First
Subject
:
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. These reside on a computer or appliance connected to network segment and monitor network traffic
Kroner
port 69
network-based IDPS (NIDPS)
white/orange and orange
2. Process of grouping almost identical alarms occurring at almost same time into single higher-level alarm
alarm clustering and compaction
LLC (Logical Link Control) sublayer
A Protocol
TIA
3. International society composed of engineering professionals with goals of promoting development and education in the electrical engineering and computer science fields
2.4-GHz band
IEEE
VPN
thin client computing
4. Unit of data at any layer of the OSI model
false negative
perimeter
EIA/TIA
PDU (protocol data unit)
5. A type of multimode fiber-optic cable that reflects the light-based signals like a mirror within the cable - resulting in different signals arriving at different times and with an increased likeihood of distortion over longer cable runs.
intrusion detection/prevention system (IDPS)
MAC address
step-index multimode fiber-optic cable
OSI Layer 1
6. A set of routines that make up part of a software application
rj-45
TCP port 23
omnidirectional antenna
API (application program interface)
7. Control frame that indicates to the rest of the network that a particular node has the right to transmit data
bandwidth
IP Addressing
baseband
token
8. Routes packets through network
POP (Post Office Protocol)
Session layer
Modulation
Network
9. Station transmits a probe that is then replied by the access point
Network
15 hops
fat pipe
active scanning
10. Twisted pair patch cable in which the termination locations of the transmit and receive wires on one end of the cable are reversed
MIME (Multipurpose Internet Mail Extensions)
mesh topology
Crossover Cable
Hyper Text Transfer Protocol (HTTP)
11. Consists of single cable that connects all nodes on a network without intervening connectivity devices - inexpensive - hard to find source of error - not very fault tolerant - data is transmitted in one direction in the ring.
single-mode fiber-optic cable
honey pot
bus topology
SMF
12. Ethernet communications at speeds up to 100 Mbps as defined under the IEEE 802.3u standard.
Telnet
Fast Ethernet
NIC
IGMP
13. GPO
FF02
POP3
IDPS terrorist
Group Policy Object
14. A flexible communications cable that contains pairs of insulated copper wires that are twisted together for reduction of EMI and RFI and covered with an outer insulating jacket.
twisted-pair cable
wavelength
butt set
fault tolerance
15. Media access control
alarm clustering and compaction
public network
MAC
Patch Panel
16. Which protocol allows the transfer of a file from one computer to another over the network?
File Transfer Protocol
L2TP
Internet Group Membership Protocol (IGMP)
Main Distribution Frame
17. Running system for a while to track types of false positives it generates and then adjusting IDPS alarm classifications
Latency
ISO
Encrypting File System
alarm filtering
18. A form of address translation that uses Tcp port numbers to distinguish each client's transmission - thus allowing multiple clients to share a limited number of Internet-recognized IP addresses.
Session
Berkeley Software Distribution
PAT (Port Address Translation)
Virtual private network (VPN)
19. Which protocol is responsible for routing packets around the network?
DSL
Amplifier
wavelength
Internet Protocol
20. Techniques that employ hardware and software to province assurance against equipment failures - computer service interruptions - and data losses
FF02
Synchronous Optical Network
User Datagram Protocol (UDP)
fault tolerance
21. Http - Hypertext transfer protocol
Ethernet (characteristics)
port 80
half duplex
L2TP
22. Used with single mode or multi mode fiber optic cable
Gigabit Ethernet (fiber characteristics)
satellite
monitoring port (SPAN port)
standard connector
23. VPN
Point-to-Multipoint
Correct default gateway
router
Virtual Private Network
24. (local area network) network of computers and others that is confined to a relatively small space
protocol stack verification
firewall
DHCP
LAN
25. Application Layer
route
Independent Computer Architecture
SMTP
Group Policy Object
26. The cabling or radio waves used to connect one network computer to another - or one network to another - and transport data between them. - Means by which a communications signal is carried from one system to another (for example - twisted-pair wire
partially distributed control strategy
Transmission media
backbone
synchronous communications
27. Specify clients configurations to adhere to this subnet
directional antennas
MAC address
255.255.255.252
collision detection
28. Type of switching for multiple data packets make up the same transmission and use identical paths to reach the destination
message and circuit
ring topology
POP3 (Post Office Protocol - version 3)
intrusion prevention
29. International telecommunication Union
ICMP
Phase
bus topology
ITU
30. Virture privat network
VPN
Telnet
bandwidth
Dynamic Host Configuration protocol (DHCP)
31. Electromagnetic interference. waves from electrical devices. ex. RFI
EMI
TCP/IP Vs. Netware: Transport & Internet
OSI
statistical anomaly-based (stat - behavior-based) IDPS
32. Consists of activities that deter intrusion
satellite
Client Software
intrusion prevention
802.44
33. Developed by ISO and ANSI - a model that providees a framework for networked hardware and software communication based on seven layers.
Serial
Transport Layer Security (TSL)
Open System Interconnection (OSI) referance model
intrusion detection system (IDS)
34. What does POP3 stand for?
WINS
Application layer
fat pipe
Post Office Protocol
35. Faster wireless standard 20-25
fixing attenuation
802.11g
Berkeley Software Distribution
Packet
36. PPTP
reflection
wavelength
port 22
Point-to-Point Tunneling Protocol
37. Network layer service that subdivides segments it receives from the Transport layer into smaller packets
fragmentation
Nonbroadcast Point-to-Multipoint Transmission
Alternate Mark Inversion
DSLAM
38. Assigning a placeholder to each piece of a block of data to allow the receiving node's Transport layer to reassemble the data in the correct order
sequencing
collision detection
stateful firewall
10BASE5 Limit
39. This phase begins and end a PPP session.
back door
enticement
OSI
link dead phase
40. Follow TIA/EIA 568 specifications
soft skills
File Transfere Protocol - (FTP)
installing cable
CD-ROM File System
41. Physical Layer
IGMP
802.11b
multiprotocol label switching
Hubs
42. 4th layer; protocols ensure that data are transferred from point A to point B reliably and without errors; services include flow control - acknowledgment - error correction - segmentation - reassembly - and sequencing
link dead phase
HTTP
MAN
Transport layer
43. Extent to which a signal has weakened after traveling a given distance
Multiplexer
Attenuation
simplex
intrusion
44. A type of address translation in which each private IP address is correlated with its own Internet-recognized IP address.
Electrical Signaling
carrier sense
Single mode fiber
SNAT (Static Network Address Translation)
45. An Application layer protocol used to retrieve messages from a mail server. When a client retrieves mail via POP - messages previously stored on the mail server are downloaded to the client's workstation - and then deleted from the mail server.
OSI Layer 6
MAC
POP (Post Office Protocol)
Point-to-Point Protocol
46. The IEEE standard for broadband wireless metropolitan area networking (also known as WiMax)
FCS (frame check sequence)
Network News Transport Protocol (NNTP)
perimeter
802.16
47. Routing protocol most likely used to replace a router for that handles traffic to and from the companies connection to its NSP
BGP
IEEE
Application
1000base-sx
48. An algorithm used to verify the accuracy of data contained in a data frame.
flow control
Institute of Electrical and Electronics Engineers (IEEE)
CRC (cyclic redundancy check)
broadcast frame or broadcast packet
49. Network File System
Post Office Protocol version 3
Access Control List
fiber optics
NFS
50. Device that can detect intrusion and launch an active response
intrusion prevention system (IPS)
LC connector
(fiddy) Fiber Distributed Data Interface
Data Circuit-Terminating Equipment