SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
IT: Networking Vocab
Start Test
Study First
Subject
:
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. ATM
Asynchronous Transfer Mode
ASCII
signal bounce
mesh topology
2. Large diameter. led/light is generated at different angles. high throughput - high noise resistance - excellent security - and long distances
MMF
Serial Line Internet Protocol
scattering
bandwidth
3. A network design consisting of a continuous path for data with no logical beginning or ending point - and thus no terminators.
ring topology
fault tolerance
Cladding
Virtual private network (VPN)
4. Multiplexing based on priority
Institute of Electrical and Electronics Engineers (IEEE)
ATM
statistical multiplexing
Ethernet
5. Refers to the IEEE 802.3z and IEEE 802.3ab standard for Ethernet communications speed up to 1 Gbps.
communications media
Gigabit Ethernet
Post Office Protocol
mtr (my traceroute)
6. Layer 1 Troubleshooting
WAN
transceiver
Incorrect cable type
fully distributed control strategy
7. A connecting device for a network that accepts messages and forwards them to the correct section of the network. Generally more intelligent than a hub and a switch.
A Protocol
port 21
router
headened
8. A form of address translation that uses Tcp port numbers to distinguish each client's transmission - thus allowing multiple clients to share a limited number of Internet-recognized IP addresses.
Remote Access Service
back hack
PAT (Port Address Translation)
routing
9. Multiple physical/non-physical mediums for connecting computers
frequency
10 Gigabit Ethernet
media
15 hops
10. The physical layout of a computer network
Mesh topology
A Protocol
port 53
topology
11. A specially configured connection on a network device that is capable of viewing all the traffic that moves through the entire device.
Multiplexing
monitoring port (SPAN port)
Session
port 80
12. Regular voice-grade telephone service.
host
plain old telephone service (POTS)
SYN-ACK (synchronization-acknowledgment)
analog dis
13. Data Link Layer
Network Switching
Network
protocol
Byte
14. Physical layer. 10 giga bit throughput. baseband transmission. twisted pair. max length is 100 meters. cat 6 or 7.
10Gbase-t
SMTP server name
Presentation
network layer
15. Why are web pages viewed using HTTP?
To stop the Hamburgerler from stealing all of Ronnie McDonalds burgers
Primary Rate Interface
Bandwidth
LLC
16. Long reach. multimode max length is 550 meters. single mode max length is 5000. 1000 mpbs. baseband transmission
BNC connector
1000base-lx
broadband
SONET
17. Ppp over ethernet
intrusion prevention system (IPS)
pppoe
intranet
fixing attenuation
18. Area above the ceiling tile or below the subfloor in a building
incremental backup
MAC
Plenum
intrusion
19. Gives each node unique address
Star topology
Transport
Secure Copy Protocol
MAN
20. AH
ARP
Application
Authentication Header
Topology
21. Offers one way for a computer to access another computer over the network or over the Internet. For example - an IBM programmer can use Telnet on a Windows XP or Red Hat Enterprise Linux computer to access a mainframe though the Internet
Session
Telnet
bandwidth
switch
22. Physical Layer
OSI Layer 1
Group Policy Object
ITU
physical address
23. Brief delay in processing - length of cable can contribute to this
stateless firewall
RIR (Regional Internet Registry)
Domain Name System (DNS)
latency
24. Protocol data unit. An OSI term to refer generically to a grouping of information by a particular layer of the OSI model. More specifically - an LxPDU would imply the data and headers as defined by Layer x.
VPN
ICS host
PDU
intrusion prevention system (IPS)
25. Manually specify on each workstation so that their users can pick up their internet email from the linux email server
Secure Shell (SSH)
SMTP server name
active scanning
t1 connection
26. 1-126
star topology
binary
network class a
trap and trace
27. Physical layer standard for serial communications
Nonbroadcast Point-to-Multipoint Transmission
RS-232
simplex
Virtual Private Network
28. POP3
Topology
Fiber Distributed Data Interface (FDDI)
Subnetmask
Post Office Protocol version 3
29. Coordinates and maintains communications between two nodes on the network
switch
port 25
PSTN
session layer
30. Address resolution protocol
Fault tolerance
entrance facilities
media
ARP
31. Consists of activities that deter intrusion
Crossover Cable
intrusion prevention
FDM
beaconing
32. Each node is connected to the two nearest nodes so that the entire network forms a circle - active - twisted pair of fiber optic - single malfunction in workstation can disable entire network - not flexible or scalbe
ring topology
To stop the Hamburgerler from stealing all of Ronnie McDonalds burgers
horizontal cabling
demilitarized zone
33. A network design built by running cable from one PC of file server to the next - like links in a chain.
802.11
POP (Post Office Protocol)
bus topology
Active Directory
34. Process of directing a datagram from its source through an internetwork to its destination using the most efficient path.
Transport
routing
ADSL
LC connector
35. Network interface card
NIC
Network File System
MultiStation Access Unit
Byte
36. On a network using the MIcrosoft Internet Connections Sharing service - the computer whose Internet connection other computers share. The ICS host must contain two network interfaces: one that connects to the Internet and one that connects to the LAN
network layer
IEEE (Institute of Electrical and Electronics Engineers)
Broadband
ICS host
37. Network layer service that subdivides segments it receives from the Transport layer into smaller packets
Session
device ID
Routing
fragmentation
38. Event that triggers alarm when no actual attack is in progress
false attack stimulus
entrapment
ARP
ppptp
39. Short reach. only multimode-max length is 500. baseband transmission. 1000 mpbs.
Device power unplugged
1000base-sx
Post Office Protocol version 3
LC connector
40. Allows for secure interactive control of remote systems
Secure Shell (SSH
AM
padded cell
NetBIOs
41. ARP
Address Resolution Protocol
TCP/IP Vs. Netware: Transport & Internet
white/orange and orange
impedance
42. Signal interference caused by magnetic force field generated by electrical devices such as motors.
Frequency Modulation
baseband
OSI Layer 7
electromagnetic interference (EMI)
43. Round time trip. time it takes for packet to get from sender to receiver and back
leased line
PPP
RTT
flow control
44. DNS - Domain name system
port 53
telnet
Multimode fiber
Secure Shell (SSH
45. Multimode fiber
phishing
MMF
Physical Layer
intrusion detection
46. Device that can detect intrusion and launch an active response
CSU/DSU
intrusion prevention system (IPS)
MAN
ITU (International Telecommunication Union)
47. Cabling that transmit data using light waves. Higher bandwidth than other types of cabling.
Analog
fiber optics
PSTN
backbone
48. Maximum arc into which you can loop a cable before you will cause data transmission errors
Bend Radius
File Transfere Protocol - (FTP)
log file monitor (LFM) IDPS
wavelength
49. Routing protocol most likely used to replace a router for that handles traffic to and from the companies connection to its NSP
LLC (Logical Link Control) sublayer
BGP
SDU
Simple Mail Transfer Protocol (SMTP)
50. Occurs when attacker attempts to gain entry or disrupt normal operations of information systems - almost always with intent to do harm
star-ring hybrid topology
Channel
intrusion
scattering