SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
IT: Networking Vocab
Start Test
Study First
Subject
:
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. UN agency that regulates international telecommunications and provides developing countries with technical expertise and equipment to advance their technological bases
Internet Protocol
connection oriented
ITU (International Telecommunication Union)
DB-25 connector
2. A private computer network with resources accessible only to internal members.
OSI
Category 6
intranet
DNAT (Dynamic Network Address Translation)
3. Manages network communication - available on a CD-ROM for example - that is used to manage communications and how frames or packets are sent using a protocol.
SONET
NIC drivers
Crossover Cable
backbone
4. Bootstrap Protocol
BOOTP
ICANN (Internet Corporation for Assigned Names and Numbers)
Category 5
Patch Panel
5. Source emits a RTS (request to send) signal to the access point - and the access point replies with CTS (clear to send) for the source to begin its transmission
protocol
RTS/CTS
802.2
fiber optics
6. Name Of Layer 3
Network
Adjacent Layer Interaction
configured with correct sending and receiving email server information
modem
7. Uses multiple frequencies to transmit signal
Packets
spread-spectrum
ITU
Data Link
8. Application Layer
fractionalizing
port 123
Telnet
access services
9. Strategy that combines the best of the other two strategies; while individual agents still analyze and respond to local threats - their reporting to a hierarchical central facility enables the organization to detect widespread attacks
802.2
Quality of Service
mesh topology
partially distributed control strategy
10. FTP is an application that enables the transfer of data from one remote device to another - using TCP/IP
device address
CIDR (Classless Interdomain Routing)
CRC
File Transfere Protocol - (FTP)
11. An advantage of networks
enticement
Frames
networks enable users to share resources
Internet
12. Different upload/download speeds.
rj-45
ICS (Internet Connection Sharing)
Frequency Modulation
asymmetrical transmission
13. Type of punch-down block used to terminate telephone circuits; does not meet Cat 5 or better standards
IP Addressing
66 Block
carrier sense
modem
14. Zeroconf
crossover cable
Zero Configuration
ISDN
driver signing
15. Time Division Multiple Access
SMTP
DSL
TDMA
Category 3
16. RJ 11
Full-Duplex
intrusion detection/prevention system (IDPS)
LLC
telephone connector
17. Core TCP/IP protocol that operates in the Network layer and provided information about how and where data should be delivered; subprotocol that enables TCP/IP to inernetwork
IP (Internet Protocol)
star-wired bus topology
LLC
FDMA
18. Four twisted wire pairs rated for 100 Mhz.
EMI
MAN
Category 5
RTS/CTS
19. MSAU
2.4-GHz band
port 53
MultiStation Access Unit
SNMP
20. Telecommunications industry association
DNS
TIA
Telnet
TCP/IP Internet Layer Encapsulation
21. GBIC
switch
passive topology
Error Handling
Gigabit Interface Converter
22. Style of data transmission in which the pulses that represent bits follow one another along a single transmission line; sequentially issued
switch
cabeloco
Serial
terminal
23. A network owned and maintained by an organization -such as a campus network operated by a college.
noise
Physical layer
private network
fiber optic cable
24. Allows for secure interactive control of remote systems
Secure Shell (SSH
OSI
rj-11
nslookup
25. Lowest or 1st layer; protocols generate and detect signals so as to transmit and receive data over a network medium - also set the data transmission rate and monitor data error rates - but do not provide error correction
Physical layer
::1
Internet Information Services
Half Duplex NIC Communication
26. More reliable then analog - noise doesn't affect as much - more efficient - fewer errors
digital adv
twisted-pair cable
1550bytes
VPN
27. Measure of strength
amplitude
Presentation layer
VPN
f type connector
28. A computer (mainframe - minicomputer - server - or workstation) that has an operating system enabling multiple computers to access it at the same time for files - data - and services.
topology
IGMP
segment
host
29. Data jack
SLIP
carrier sense
rj-45
API (application program interface)
30. Local area network
OSI Layer 4
LAN
Quality of Service
analog adv
31. Signal interference caused by electrical devices that emit radio waves at the same frequency used by network signal transmissions.
encryption
radio frequency interference (RFI)
Demultiplexer
roaming
32. Brief delay in processing - length of cable can contribute to this
analog dis
Optical Loss
Kerberos
latency
33. A type of point-to-point digital WAN connection that uses standard phone lines to provide high-speed comm.
Data Link
intrusion reaction
Inter Message Access Protocol (IMAP)
DSL
34. Manages IP address allocation and the domain name system
Network
SFP
IANA (Internet Assigned Numbers Authority)
NNTP
35. IDPS that examines network traffic in search of patterns that match known signatures
SCP
Multiplexer
signature-based (knowledge-based - misuse-detection) IDPS
5-4-3 rule
36. Subgroup of EIA that focuses on standards for information technology - wireless - satellite - fiber optics - and telephone equipment; best known for network cable installation guidelines (TIA/EIA 568-B Series)
Regeneration
DSL
TIA (Telecommications Industry Association)
Network
37. Carrier sense multiple access with collision detection
POP (Post Office Protocol)
CSMA/CD
impedance
Class B Network
38. Signal interference caused by magnetic force field generated by electrical devices such as motors.
electromagnetic interference (EMI)
impedance
Data Link
Domain Name System (DNS)
39. The pattern used to install a network medium
traceroute (tracert)
Latency
topology
File Transfer Protocol (FTP)
40. Binary values for each bit position
128 - 64 - 32 - 16 - 8 - 4 - 2 - 1
802.2
Asymmetric Digital Subscriber Line
Host
41. Communications cable that consists of one or more glass 0r plastic fiber cores inside a protective cladding material - covered by a plastic PVC outer jacket. Signal transmission along the inside fibers typically uses infrared light.
Radio Frequency Interference
fiber-optic cables
Demarcation Point
WDM
42. A far-reaching system of networks that usually extends over approximately 48 kilometers (about 30 miles) and often reaches across states and continents.
packet
Wide area network (WAN
TCP/IP Vs. OSI: Application
Layer 2 Forwarding
43. The wave splits into secondary waves
Organizational Unit
satellite
diffraction
Authentication Header
44. An algorithm used to verify the accuracy of data contained in a data frame.
CRC (cyclic redundancy check)
stateful firewall
tracert
Optical Time Domain Reflectometer
45. Which protocol allows the transfer of a file from one computer to another over the network?
802.11g
honey net
diffraction
File Transfer Protocol
46. Method of data modulation in which the frequency of the carrier signal is modified by the application of the data signal
CIDR (Classless Interdomain Routing)
TCP/UDP
Frequency Modulation
Multiplexing
47. Pipeline used to contain and protect cabling; usually made from metal
CIDR (Classless Interdomain Routing)
TCP/IP Vs. Netware: Network Access
Conduit
802.11n
48. Which address is split in to four 8-bit parts called octets?
Faulty network cable
IP Address
connectionless
host
49. Secure Shell
SSH
fiber optics
TDM
TCP/IP Vs. OSI: Application
50. Process of retransmitting a digital signal; repeats the pure signal without the noise
DTE
cross talk
Dynamic Host Configuration Protocol (DHCP)
Regeneration