Test your basic knowledge |

IT: Networking Vocab

Subject : it-skills
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Device that can detect intrusion and launch an active response






2. Traces path from one network node to another - identifying all intermediate hops b/w two nodes






3. Which protocol allows users to send emails?






4. Virtually local area network-device-switch






5. Session Layer






6. The process of determining the best path from Point A on one network to Point B on another






7. Security measure verifies that your user name and password are contained in the NOS directory






8. Offers one way for a computer to access another computer over the network or over the Internet. For example - an IBM programmer can use Telnet on a Windows XP or Red Hat Enterprise Linux computer to access a mainframe though the Internet






9. Core TCP/IP protocol that operates in the Network layer and provided information about how and where data should be delivered; subprotocol that enables TCP/IP to inernetwork






10. Faster networking and inexpensive - flexible - easy to install






11. Transport Layer






12. Network cable that contains pairs of insulated wires that are twisted together and surrounded by a shielding material for added EMI and RFI protection - all inside a protective jacket.






13. Simple Mail Transfer Protocol






14. Individual insulated wire pairs - less expensive then STP - less resistant to noise






15. Term that describes current anti-intrusion technologies






16. The process of attracting attention to a system by placing tantalizing information in key locations.






17. A form of fiber-optic cable that supports only one signal transmission at a time and that is used mainly for long- distance communication.






18. The IEEE standard for Ethernet networking devices and data handling (using the CSMA/CD access method)






19. Authentication prtocol that does not issue a challenge or require 3rd party verification of the computer requestiing authentication






20. Type of protocol useful when data must be transferred quickly






21. A series of interconnected computers - printing devices - and other computer equipment that share hardware and software resources. The services area usually is limited to a given office - floor - or building.






22. Is a protocol for defining host groups.






23. Data Link Layer






24. An algorithm used to verify the accuracy of data contained in a data frame.






25. Which protocol allows users to recieve emails?






26. Internet Layer






27. Error detection and correction






28. Glass or plastic shield around the core of a fiber-optic cable; reflects light back to the core in patterns that vary depending on the transmission mode






29. A worldwide network network of interconnected LANs - and MANs - that uses the TCP/IP protocol to enable people to share e-mail messages and computer files and to access a vast array of infromation.






30. Can use WPA to improve the security of data in transit






31. Transport protocol and TCP/IP port that uses telnet utility use






32. Addresses packet size






33. A type of address translation in which each private IP address is correlated with its own Internet-recognized IP address.






34. A physical layer standard that defines a method for building a synchronous telecommunications network based on fiber-optic cables.






35. To make more efficient use of limited numbers of legitimate IP addressing






36. A network design in which every node is connected to every other note - achieving fault tolerance.






37. A permanent telephone connection between 2 locations that provide a predetermined amount of bandwidth at all times






38. Small Form Plug-gables - Plugs in to an interface on a switch






39. Requires CSU/DSU-the connection point for a t1 live at customers site






40. A common way of sharing resources on a peer-to-peer network






41. Type of interference that may be caused by motors - power lines - televisions - copiers - etc






42. Layer 1 Troubleshooting






43. Wavelength division multiplexing






44. A data-link protocol used for remote networking that can exchange IP addresses - carry data by multiple network layer protocols - and support different app. protocols.






45. The part of a network to which segments and significant shared devices connect






46. The 100BaseVG/100VG-AnyLAN approach abandon the CSMA/CD transmission technique for one called demand priorTity.






47. A type of fiber optic cable connector that uses a mechanism similar to the BNC connectors used by Thinnet






48. A type of multimode fiber-optic cable that reflects the light-based signals like a mirror within the cable - resulting in different signals arriving at different times and with an increased likeihood of distortion over longer cable runs.






49. Is used to allow searching and updating of a directory service






50. CDFS