SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
IT: Networking Vocab
Start Test
Study First
Subject
:
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Physical Layer
Twister Pair Cable
Incorrect device drivers
LLC
Connectors
2. Type of interference that may be caused by motors - power lines - televisions - copiers - etc
To stop the Hamburgerler from stealing all of Ronnie McDonalds burgers
Session
Domain Name System (DNS)
Electromagnetic Interference
3. Layer 3
Password Authentication Protocol
asymmetrical transmission
Network
TCP/IP Architecture Layer 1
4. Small network 192-223
Class C Network
Class A
Adjacent Layer Interaction
ANDing
5. A data-link protocol used for remote networking that can exchange IP addresses - carry data by multiple network layer protocols - and support different app. protocols.
L2TP
Transmission media
PPP
IP Address
6. A TCP/IP troubleshooting utility that uses ICMP to trace the path from one networked node to another - identifying all intermediate hops between the two nodes. Traceroute is useful for determining router or subnet connectivity problems. On Windows-ba
traceroute (tracert)
utp
EIA (Electronics Industries Alliance)
Server
7. ARP
Address Resolution Protocol
Internet Control Message Protocol (ICMP
hot site
logical link control (LLC)
8. DSU
EIA
Internet Connection Sharing
MMF
Data Service Unit
9. An international body that establishes communications and networking standards - and that is particularly known for its contributions to network protocol standards.
International Organization for Standardization (ISO)
Physical Layer (Layer 1)
TCP/IP Architecture Layer 3
RIR (Regional Internet Registry)
10. On a network using the MIcrosoft Internet Connections Sharing service - the computer whose Internet connection other computers share. The ICS host must contain two network interfaces: one that connects to the Internet and one that connects to the LAN
NIC (Network Interface Card)
ISOC
ICS host
full duplex
11. Appends physical address of destination computer onto the frame
MAC sublayer
digital
topology
utp
12. What does POP3 stand for?
Post Office Protocol
Metropolitan area network (MAN)
fingerprinting
ITU
13. BRI
SYN (syncronization)
TCP/IP protocol failure
RS 232
Basic Rate Interface
14. Layer 1 Troubleshooting
Light Weight Directory access protocol (LDAP
Loose network cable connection
plenum area
Simple Network Management Protocol
15. Connects multiple LANs
service data unit (SDU)
CIDR (Classless Interdomain Routing)
WAN
port 443
16. Pointing in a direction
SSID
directional antennas
MAC (Media Access Control) sublayer
flow control
17. 6th layer; protocols translate between Application and Network layers; data are formatted so that the network can understand - with the format varying according to the type of network; manages data encryption and decryption - such as scrambling of sy
Presentation layer
social engineering
virture privat network (VPN)
Application Layer
18. Device that processes signals; multiplexer or modem
Topology
Packets
Data Circuit-Terminating Equipment
CIDR block
19. Twisted pair cable consisting of a number of twisted pairs of copper wire with a simple plastic casing. Because - no shielding is used in this cable - it is very susceptible to EMI - RFI - and other types of interference
Unshielded twisted pair
CSMA/CD
telephone connector
Internet Message Access Protocol version 4
20. A process in which a digital signature is placed in a driver. The digital signature helps ensure that the driver is tested and is compatible with the operating system and device for which it is written.
port 110
protocol
Network Behavior Analysis
driver signing
21. An 8-bit character-coding method consisting of 96 uppercase and lowercase characters and numbers - plus 32 nonprinting characters.
Network Layer
Loose network cable connection
American Standard Code for Information Interchange (ASCII)
intrusion reaction
22. Establishes maintains and terminates connections
Frequency
Dynamic Host Configuration protocol (DHCP)
encapsulate
Session
23. Example of an internetwork
Internet
site policy
SCP
server
24. A unit of data formatted for transmission over a network that contains control and other information that corresponds to the OSI Networklayer; also called Layer 3.
packet
FDM
MAC address
tracepath
25. Used with single mode or multi mode fiber optic cable
standard connector
full mesh
Crossover Cable
alert or alarm
26. Running system for a while to track types of false positives it generates and then adjusting IDPS alarm classifications
alarm filtering
To stop the Hamburgerler from stealing all of Ronnie McDonalds burgers
false negative
International Organization for Standardization (ISO)
27. SNMP
Simple Network Management Protocol
reflection
headened
Protocol Data Unit
28. The total amount of opposition to the flow of current.
impedance
power over ethernet
Service Set Identifier
the more twist
29. A network transport control method used in Ethernet networks. It regulates transmission by sensing the presence of packet collisions.
Carrier Sense Multiple Access with Collision Detection (CSMACD)
Simple Network Management Protocol (SNMP)
MAC
star wired ring
30. Data only
goodput
subnetting purpose
ISOC (Internet Society)
Simple Network Management Protocol (SNMP)
31. A drawback of certification
802.3af
MAC address
NIC (Network Interface Card)
certification value may be lessened due to the number of people obtaining them
32. Physical layer. 10 giga bit throughput. baseband transmission. twisted pair. max length is 100 meters. cat 6 or 7.
10Gbase-t
Default Gateway
Internet Key Exchange
Broadcast
33. Initiates the communication link - Makes sure the communication link is maintained - Determines which node transmits at any point in time - such as which one transmits first - Disconnectd when a communication session is over - Translates node address
Straight tip connector
Session Layer (Layer 5)
Device power off
site policy
34. NFS
beaconing
Internet Key Exchange
ACK (acknowledgement)
Network File System
35. The most commonly used form of Post office protocol.
Shielded Twised Pair
POP3 (Post Office Protocol - version 3)
Secure Sockets Layer (SSL)
session
36. Layer 5
Twister Pair Cable
PAT (Port Address Translation)
client/server
Session
37. POP3 - post office protocol 3
port 110
Category 5
10 Gigabit Ethernet
digital adv
38. A generic term for data being transmitted
Post Office Protocol 3 (POP3)
packet
Media Converter
false attack stimulus
39. IEEE
Institute of Electrical and Electronics Engineers
Transport
Telnet
Network Time Protocol (NTP)
40. Secure CoPy-utility that allows you to copy files securely from host to another
Shielded Twised Pair
SCP
MAN
roaming
41. On a computer that receives data over a network - the process in which the device interprets the lower-layer headers and - when finished with each header - removes the header - revealing the next-higher-layer PDU.
networks enable users to share resources
SMTP (Simple Mail transfer Protocol)
Decapsulation
802.3
42. Media access control
10BASE2 Limit
PDU
MAC
Electromagnetic Interference
43. Standard rating that indicates the diameter of a wire
Subscriber connector
Multiplexer
Point-to-Multipoint
American Wire Gauge
44. For fiber-optic cable communications - the difference between the transmitted power and the receiver sensitivity - as measured in decibels. It is the minimum transmitter power and receiver sensitivity needed for a signal to be sent and received fully
ethernet
802.16
power budget
Ethernet
45. The process of determining the best path from Point A on one network to Point B on another
directional antennas
MAC (Media Access Control) sublayer
routing
POP3
46. NIDPS system that examines network traffic in order to identify problems related to the flow of traffic. Most sensors are passive mode deployment only.
baseband
point to multipoint
CSMA/CD
Network Behavior Analysis
47. IEEE standard for wireless networking
802.44
10base-t
HTTP
Port 23
48. Nondata info that must accompany data for it to be properly routed. addition to data
fading
digital signal
overhead
star wired ring
49. Is a secure form of HTTP
back hack
NTP
HTTPS
omnidirectional antenna
50. Maintains and assigns IP addresses in the US
Physical Layer (Layer 1)
Port Numbers
ICANN (Internet Corporation for Assigned Names and Numbers)
International Organization for Standardization (ISO)