SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
IT: Networking Vocab
Start Test
Study First
Subject
:
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. IDPS that examines network traffic in search of patterns that match known signatures
signature-based (knowledge-based - misuse-detection) IDPS
star topology
flow control
Simple Network Management protocol (SNMP)
2. Signals traveling on one wire infringes on the signal traveling over an adjacent wire
UTP
protocol
cross talk
log file monitor (LFM) IDPS
3. Pipeline used to contain and protect cabling; usually made from metal
RFI
Conduit
NetBIOs
narrowband
4. Network time protocol
NTP
false positive
pppoe
Gigabit Ethernet (non-fiber characteristics)
5. TFTP is a TCP/IP file transfer protocol that is designed for task such as the transfer of data to enable a diskless workstation to boot using files trasmitted from a server
Trivial File Transfer Protocol (TFTP)
token
crossover cable
TIA
6. American Standard Code for Information Interchange
narrowband
ASCII
Ethernet (characteristics)
Data Link
7. Simple Mail Transfer Protocol
plenum area
crossover cable
client/server
SMTP
8. GPO
Thin Eterhnet/10 Base 2
Group Policy Object
intrusion
network access method
9. The physical layout of a computer network
Network
star wired ring
topology
66 Block
10. Shielded twisted pair
Ring topology
Transport
stp
Session
11. ICA
Independent Computer Architecture
ARP
standard connector
segmentation
12. Device with little - if any - of it's own processing or disk capacity; depends on a host to supply it with applications and data-processing services
Baseband
terminal
network address
802.3
13. Secure CoPy-utility that allows you to copy files securely from host to another
ARP
10BASE5 Limit
nslookup
SCP
14. Package for data that includes not only the data - or 'payload -' but also the sender's and recipient's addressing and control information. Generated at the Data Link layer and issued to the Physical layer
SMF
connection
frame
utp
15. Equivalent to OSI Layer 3 Network
TCP/IP Vs. OSI: Internet
MTU (maximum transmission unit)
route
LAN
16. The IEEE 802.3ae standard for Ethernet communications at 10 Gbps
MAC sublayer
OSI model
10 Gigabit Ethernet
Layer 2 Tunneling Protocol
17. The process of checking a communication medium - such as cable - for a voltage level - signal transition - or light - indicating the presence of a data-carrying signal.
Device power off
demilitarized zone
AUI
carrier sense
18. On a network using the MIcrosoft Internet Connections Sharing service - the computer whose Internet connection other computers share. The ICS host must contain two network interfaces: one that connects to the Internet and one that connects to the LAN
ICS host
standard connector
firmware
Amplifier
19. 1-126
redirector
network class a
SSL
Network
20. The utility that allows you to query ICANN's DNS registration database and find information about a domain.
Basic Rate Interface
Internet Engineering Task Force (IETE)
SMTP
whois
21. A computer (mainframe - minicomputer - server - or workstation) that has an operating system enabling multiple computers to access it at the same time for files - data - and services.
ISOC (Internet Society)
host
token
access point
22. BDC
Backup Domain Controller
802.5
Node
Subnetmask
23. Firewall packet inspection that ignores the state of the connection between the internal computer and the external computer - only blocks or allows a packet based on header information.
connection
Telnet
port 21
stateless firewall
24. Using part of a leased line
host-based IDPS (HIPDS)
fractionalizing
firewall
PDU (protocol data unit)
25. International society composed of engineering professionals - promotes development and education in the electrical engineering and computer fields
association
IEEE (Institute of Electrical and Electronics Engineers)
Bit
LAN
26. An 8-bit character-coding method consisting of 96 uppercase and lowercase characters and numbers - plus 32 nonprinting characters.
port 80
power budget
POP3
American Standard Code for Information Interchange (ASCII)
27. An adapter board designed to connect a workstation - server - or other network device to a network medium.
Network interface card (NIC)
NetWare Core Protocol
Firewall Filtering
NIC
28. Pointing in a direction
MIME (Multipurpose Internet Mail Extensions)
IANA
block ID
directional antennas
29. The oldest type of network design with - this topology consist fo multiple nodes attached to a central hub - switch - or router.
star wired ring
Secure Shell (SSH
SMF
star topology
30. LDAP
Lightweight Directory Access Protocol
Internet Information Services
DHCP
phase
31. Trivial File Transfer Protocol
TFTP
metropolitan area network (MAN)
switch
network interface card (NIC)
32. IDPS that reviews log files from servers - network devices - and other IDPSs for signatures indicating an attack or intrusion
MAC address
log file monitor (LFM) IDPS
plain old telephone service (POTS)
ISO
33. Internet protocol security-defines encryption - authentication - and key management for TCP/IP transmission
star-ring hybrid topology
IPSec
alien cross talk
Network Information Service
34. Layer 1 Troubleshooting
block ID
IEEE
Incorrect cable type
Gigabit Ethernet
35. IEEE 802.3 Media Access Control (MAC) sublayer of the data link layer
802.3
Challenge-Response Authentication Mechanism - Message Digest 5
intrusion reaction
serial
36. The gateway that first interprets a device's outbound requests - and then interprets its inbound requests to and from other subnets.
Default Gateway
Star topology
Flow Control
Internet Key Exchange
37. A connecting device for a network that accepts messages and passes them on to other parts of the network. Generally more intelligent than a hub.
switch
Institute of Electrical and Electronics Engineers (IEEE)
Domain Name
10base-t
38. Enables the establishment of a Web connection - but it also provides for the exchange of resources - for example - displaying AOL's Web page in your brower.
High-Level Data Link Control
Hypertext Transfer Protocol (HTTP)
active scanning
Simple Network Management Protocol
39. The device inside a computer that connect a computer to the network media
bayonet nut connector (BNC)
NIC
LLC
netstat
40. Moving from one BSS to another without losing connectivity
statistical anomaly-based (stat - behavior-based) IDPS
token ring
roaming
Canonical Name
41. Which protocol allows users to recieve emails?
Internet Engineering Task Force (IETE)
fully distributed control strategy
Presentation
POP3
42. EFS
Encrypting File System
Domain Controller
Internet Protocol
Presentation Layer
43. Is a challenge respone authentication protocol
network layer
STP
CHAP
Rivest - Shamir - Adelman
44. NFS
IETE
pathping
Network File System
Protocol
45. POP3 - post office protocol 3
port 110
Data Link
intrusion
Modulation
46. MX
Mail Exchanger
Workstation
Subnetmask
reassembly
47. OTDR
network address
66 Block
host
Optical Time Domain Reflectometer
48. Packet a node sends to acknowledge that it received a SYN request for connection; 2nd of three-step connection process
Data Link Layer
Cable Plant
SYN-ACK (synchronization-acknowledgment)
where NICs operate
49. Open Systems Interconnection model is standard description or reference model for how messages should be transmitted between any 2 points in a telecommunications network.
netstat
SYN (syncronization)
OSI
entrapment
50. Best fault tolerance
Domain Name System (DNS)
NAT (Network Address Translation)
power budget
full mesh