Test your basic knowledge |

IT: Networking Vocab

Subject : it-skills
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. An international body that establishes communications and networking standards - and that is particularly known for its contributions to network protocol standards.






2. Which protocol provides the user with many functions of the world wide web?






3. Divides channel into different time slots and assigns data to nodes who are attached to time slots






4. The Application layer TCP/IP subprotocol responsible for moving messages from one e-mail server to another.






5. ATM






6. Four twisted wire pairs rated for 100 Mhz - but capable of handling the disturbance on eash pair that's caused by transmitting on all four pairs at the same time.






7. PPPoE






8. Anything - hardware or software - that monitors transmission of packets of digital information that attempt to pass the perimeter of a network






9. Requires CSU/DSU-the connection point for a t1 live at customers site






10. Wrapping one layer's PDU with protocol information so that it can be interpreted by a lower layer






11. Manages network communication - available on a CD-ROM for example - that is used to manage communications and how frames or packets are sent using a protocol.






12. The distinct units of data that are exchanged between nodes on a network






13. An adapter board designed to connect a workstation - server - or other network device to a network medium.






14. Network layer service that subdivides segments it receives from the Transport layer into smaller packets






15. Pointing in a direction






16. Similar to bus topology - but the ends are connected






17. Internet protocol security-defines encryption - authentication - and key management for TCP/IP transmission






18. A connecting device for a network that accepts messages and passes them on to other parts of the network. Generally more intelligent than a hub.






19. Application layer protocol that formulates and interprets requests between Web clients and servers






20. A termination unit also called a transceiver or DSL modem






21. Allows clients to communicate in different floors






22. Techniques that employ hardware and software to provide assurance against equipment failures - computer service interruptions - and data loss.






23. Is part of theTCP/IP protcol suite and used to retrive e-mail from a remote server to a local client over a TCP/IP connection






24. LC - ST - SC - or MT RJ






25. Vulnerability created in a system by a virus or worm which allows the attacker to access the system at will with special privileges.






26. International Organization for Standardization






27. Pulses of precise - positive voltages and zero voltages (binary)






28. A transmission method that has distinct signal levels to represent binary zeroes or ones - such as +5 volts and 0 volts.






29. Measure of the difference between the highest and lowest frequencies that a medium can transmit






30. Secure Sockets Layer






31. LPR






32. A data-link protocol used for remote networking that can exchange IP addresses - carry data by multiple network layer protocols - and support different app. protocols.






33. A worldwide network of interconnected LANs and MANs that uses the TCP/IP protocol to enable people to shares e-mail messages and computer files and to access a vast array of information.






34. A computer that has its own CPU and may be used as a stand-alone computer for word processing - spreadsheet creation - or other software applications. It also may be used to access another computer such as another workstation or server via a network.






35. 2nd layer; bridges the networking media with the Network layer. Primary function is to divide the data it receives from the Network layer into frames to be transmitted by the Physical layer






36. Electromagnetic interference






37. The IEEE standard for Ethernet networking devices and data handling (using the CSMA/CD access method)






38. Layer 5






39. A network that links multiple LANs in a large city or metropolitan region.






40. An app. that provides centralized authentication and authorization services for a network.






41. Which protocol allows users to recieve emails?






42. Value placed upon an IDPS's ability to detect/identify certain attacks correctly






43. Minimum cabling standard for PoE






44. Virture privat network






45. Name Of Layer 7






46. A series of interconnected computers - printing devices - and other computer equipment that share hardware and software resources. The services area usually is limited to a given office - floor - or building.






47. IDPS that compares sampled network activity to established baseline






48. Ensures reliablity of packet transmissions from node to node - Ensures that data is sent and received in the same order - Provides acknowledgement when a packet is received - Monitors for packet transmission errors and resends bad packets - Breaks la






49. A data encryption technique employed between a server and a client - such as between a client's browser and an Internet server.






50. AFP