SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
IT: Networking Vocab
Start Test
Study First
Subject
:
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Progress of a wave over a time in a relationship
Transport Layer
phase
Application
Internet Connection Sharing
2. Internet group management protocol
IGMP
attenuation
TDMA
TCP/IP Vs. Netware: Network Access
3. The shorter the wavelength
IP Addressing
the higher the frequency
network class B
802.2
4. Transmission that involves one transmitter and multiple - undefined receivers
SSH
nslookup
Broadcast
node
5. BDC
802.16
stp
Backup Domain Controller
Class A Network
6. A far-reaching system of networks that usually extends over approximately 48 kilometers (about 30 miles) and often reaches across states and continents.
Gigabit Ethernet (non-fiber characteristics)
Transport
wide area network (WAN)
802.16
7. IP
Internet Protocol
Transmission Protocol (TCP)
attenuation
certification value may be lessened due to the number of people obtaining them
8. ICA
passive scanning
Alien Cross Talk
Presentation
Independent Computer Architecture
9. Techniques that employ hardware and software to province assurance against equipment failures - computer service interruptions - and data losses
fault tolerance
Network News Transport Protocol
mesh topology
media
10. An established guidline that specifies how networked data is formatted into packet or frame - how it is transmitted - and how it is interpreted at the receiving end.
MAC
TCP/IP Vs. OSI: Application
media access control (MAC)
protocol
11. MPLS
the higher the frequency
installing cable
802.16
multiprotocol label switching
12. A connector used to terminate coaxial cable used for transmitting television and broadband cable signals
server
f type connector
metropolitan area network (MAN)
Time Division Multiple Access (TDMA)
13. Equals a single pulse in the digital encoding system
Bit
Time Division Multiple Access (TDMA)
Radio Frequency Interference
American Standard Code for Information Interchange (ASCII)
14. RJ 45
TCP/IP Vs. OSI: Application
twisted pair connector
addressing
Telnet
15. American Standard Code for Information Interchange
ASCII
Universal serial bus
FDDI
ATU-R
16. Standard that describes a security technique - wireless networks - in which a port is prevented from receiving traffic until the transmitters credentials are verified by authentication server
extranet
ethernet
EAPoL
Telnet
17. Time Division Multiple Access
TDMA
ethernet
certification value may be lessened due to the number of people obtaining them
network-based IDPS (NIDPS)
18. A network that offers services to members of the public - such as network services offered by a telecommunications company or a cable TV company.
CSMACD
signature-based (knowledge-based - misuse-detection) IDPS
public network
NetWare Directory Services
19. Layer 3 Troubleshooting
Amplitude Modulation
pathping
mtr (my traceroute)
IP address within the assigned network
20. Minimum cabling standard for PoE
signature-based (knowledge-based - misuse-detection) IDPS
Secure Hypertext Transfer Protocol (S-HTTP)
baseband
cat 5
21. F type (like TV cable) or BNC (crimped)
Category 6
twisted pair connector
802.5
coax cable connector
22. Wrapping one layer's PDU with protocol information so that it can be interpreted by a lower layer
addressing
encapsulate
Frequency Modulation
signal bounce
23. The seventh layer of the OSI model. Application layer protocols enable software programs to negotiate formatting - procedural - security - synchronization - and other requirements with the network.
fragmentation
packet
Application Layer
User Datagram Protocol (UDP)
24. Signals traveling on one wire infringes on the signal traveling over an adjacent wire
Amplifier
port 143
cross talk
ICMP
25. Scrambles information into an alternative form that requires a key or password to decrypt the information.
encryption
terminal
bandwidth
Phase
26. A computer that accesses another computer - such as a workstation that accesses a shared file on another workstation - server - or mainframe. The client may use the accessed computer (host) to process data - or may process accessed data using its own
TCP/IP Vs. Netware: Transport & Internet
Transport layer
Client
network
27. 7th layer; protocols enable software programs to negotiate formatting - procedural - security - synchronization - and other requirements with the network
SYN (syncronization)
Application layer
Correct default gateway
statistical multiplexing
28. Data circuit-terminating equipment. multiplexer or modem
Hypertext Transfer Protocol (HTTP)
Network
DCE
MAC address
29. Best fault tolerance
full mesh
ANSI
Frequency Division Multiple Access (FDMA)
Time Division Multiple Access (TDMA)
30. Service that supports email
Address Resolution Protocol (ARP)
communications services
SIP
network-based IDPS (NIDPS)
31. Is a host-to-host protocol like TCP - however it does not include mechanisms for ensuring timely delivery
Data Link (Layer 2)
twisted-pair cable
User Datagram Protocol (UDP)
Amplitude
32. This phase determines how often systems should send each other quality statistics.
link quality monitoring
fiber optic cable
Session
grade-index multimode fiber-optic cable
33. A value or means of identifying a service on a network node - such as socket or port 103 for standerdized e-mail services in the TCP protocol.
FF02
installing cable
socket
amplitude
34. Moving from one BSS to another without losing connectivity
Impedance
IPSec
roaming
SNMP
35. Connector with 9 pins - commonly used in a serial communication that conforms to the rs-232 standard
Correct default gateway
DB-9 connector
ring topology
multimeter
36. Cause by EMI/RFI - and other packets - interference on the signal
demand priority
noise
Challenge Handshake Authentication Protocol
switch
37. A private network that functions like a tunnel though a large network-such as the Internet or an enterprise network-that is restricted to designated member clients only.
virture privat network (VPN)
protocol and services
10BASE5 Limit
Berkeley Software Distribution
38. A variation of CHAP designed by Microsoft
TCP/IP Internet Layer Encapsulation
geosynchronous
MS-CHAP
routing
39. Panel of data receptors into which twisted pair wire is inserted to complete a circuit
Ethernet
SYN-ACK (synchronization-acknowledgment)
RIP
Punch-Down Block
40. The oldest type of network design - this topology consists of multiple nodes attached to a central hub - switch - or router.
SLIP
Star topology
asymmetrical transmission
1000base-sx
41. A network design consisting of a continuous path for data with no logical beginning or ending point - and thus no terminators.
Multiplexer
ring topology
firmware
session
42. MMF
stp
Fiber Distributed Data Interface (FDDI)
10BASE2 Limit
MultiMode Fiber
43. Actual. how much data is transmitted during given time
OSI
ppptp
DNS
throughput
44. IMAP4
switch
Internet Message Access Protocol version 4
nslookup
T-Carrier Level 1
45. Is a system that is distributed throughout the internetwork to provide address/name resolution.
Internet Protocol version 4
Class D Network
Domain Name System (DNS)
WDM
46. Is part of theTCP/IP protcol suite and used to retrive e-mail from a remote server to a local client over a TCP/IP connection
local area network (LAN)
CRC (cyclic redundancy check)
Post Office Protocol 3 (POP3)
dig (domain information groper)
47. Length of time it takes for a packet to go from sender to receiver - then back to sender; measured in milliseconds
802.16
Round Trip Time
CSU/DSU
Synchronous Optical Network
48. Device with little - if any - of it's own processing or disk capacity; depends on a host to supply it with applications and data-processing services
segment
presentation layer
Ferrule
terminal
49. Data Link sublayer that manages flow control
entrapment
LLC
Challenge Handshake Authentication Protocol
Internetwork Packet Exchange
50. Saturation of network bandwidth caused by excessive traffic - as when a large number of computers or devices attemp to transmit simultaneously - or when computers or devices presist in transmitting repeatedly.
Line Printer Daemon
broadcast storm
binary
cp connection