SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
IT: Networking Vocab
Start Test
Study First
Subject
:
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Type of interference that may be caused by motors - power lines - televisions - copiers - etc
Electromagnetic Interference
Static IP Addressing
POP3
Conduit
2. Ensures reliablity of packet transmissions from node to node - Ensures that data is sent and received in the same order - Provides acknowledgement when a packet is received - Monitors for packet transmission errors and resends bad packets - Breaks la
Berkeley Internet Name Domain
To stop the Hamburgerler from stealing all of Ronnie McDonalds burgers
baseband
Transport Layer (Layer 4)
3. Which protocol allows users to send emails?
API (application program interface)
network interface card (NIC)
SMTP
Inter Message Access Protocol (IMAP)
4. FHSS
Client
Kerberos
Frequency Hopping Spread Spectrum
network
5. IDPS's ability to dynamically modify its configuration in response to environmental activity
Radio Waves
isdn
site policy awareness
OSI Layer 2
6. A 32 bit number that - when combined with a device's IP address - indicates the kind of supernet to which the device belongs.
Incorrect device drivers
supernet mask
MAN
High-Level Data Link Control
7. Lower sublayer of the Data Link layer; appends the physical address of the destination computer onto the fram
MAC (Media Access Control) sublayer
OSI (Open Systems Interconnection) model
Protocol
configured with correct sending and receiving email server information
8. Form of transmission in which signals are modulated as radiofrequency analog pulses with different frequency ranges; does not involve binary coding
Presentation
wavelength
Transport
Broadband
9. Glass or plastic shield around the core of a fiber-optic cable; reflects light back to the core in patterns that vary depending on the transmission mode
Cladding
Metropolitan area network (MAN)
802.16
tunneling
10. Control frame that indicates to the rest of the network that a particular node has the right to transmit data
token
NTP
backbone
hybrid fiber / coax (HFC) cable
11. Provides FTP - HTTP - SMTP...
Channel Service Unit
Gigabit Ethernet (fiber characteristics)
Demarcation Point
Application
12. Contains information that a wireless node needs to associate with an ap
encryption
TDM
rj-11
beacon frame
13. Segment
Network Time Protocol (NTP)
frame
TCP/IP Transport Layer Encapsulation
local area network (LAN)
14. Small Form Plug-gables - Plugs in to an interface on a switch
OSI Layer 6
SFP
Unshielded twisted pair
Multistation Access Unit
15. Hubs and switches work here
encryption
latency
Data Link
OSI model
16. A series of interconnected computers - printing devices - and other computer equipment that shares hardware and software resources. The service area usually is limited to a given office area - floor - or building.
protocol
Category 1
crimping tool and wore stripper
Local area network (LAN)
17. Radio frequency interference. interference caused by radio.
utp
cp connection
RFI
Gigabit Ethernet
18. IP
Serial Line Internet Protocol
Internet Protocol
link quality monitoring
ISOC (Internet Society)
19. Maintains and assigns IP addresses in the US
EAPoL
STP
ICANN (Internet Corporation for Assigned Names and Numbers)
butt set
20. A connecting device for a network that accepts messages and forwards them to the correct section of the network. Generally more intelligent than a hub and a switch.
NIC
LLC
network monitor
router
21. The process of wrapping one layer's PDU with protocol information so that it can be interpreted by a lower layer. For example - Data Link layer protocols encapsulate Network layer packets in frames.
encapsulate
Remote Access Service
802.16
TCP port 23
22. RAS
installing cable
Media Converter
Firewall configured correctly
Remote Access Service
23. Faster wireless standard 20-25
User Datagram Protocol
Remote Authentication Dial-In User Service
WAN Connectivity
802.11g
24. These reside on a computer or appliance connected to network segment and monitor network traffic
network-based IDPS (NIDPS)
Internet Group Multicast Protocol
entrance facilities
tracert
25. Computers - devices - and connectivity necessary to rebuild a network exist - and all have appropriated configured updated and connected to match your networks current state. most expensive disaster recovery contingency to maintain
hot site
SNMP
incremental backup
Simple Mail Transfer Protocol (SMTP)
26. Used to resolve NetBIOS names w IP address
Incorrect cable type
Secure Shell (SSH
logical address
WINS
27. Associates a MAC address with a given IP address - reverse ARP
255.255.255.252
datagram
RARP
fault tolerance
28. The physical layout of the cable and wireless network devices and the logical path followed by network frames and packets sent on the cable or by wireless transmissions
Network Address Translation
Secure Copy
transmission media
topology
29. Logical link control
Populated Segment
terminators
LLC
authentication
30. Unique identifying number for a network node; follows a hierarchical addressing scheme; can be assigned through OS software; added to data packets and interpreted by protocols at the Network layer
geosynchronous
noise
CSMACD
network address
31. The physical layout of a computer network
BSS
Optical Loss
IEEE (Institute of Electrical and Electronics Engineers)
topology
32. The distinct units of data that are exchanged between nodes on a network
Internet Engineering Task Force (IETE)
DNAT (Dynamic Network Address Translation)
Challenge-Response Authentication Mechanism - Message Digest 5
data packets
33. Faster networking and inexpensive - flexible - easy to install
twisted shielded pair
802.3
Full Duplex NIC Communication
128 - 64 - 32 - 16 - 8 - 4 - 2 - 1
34. Large networks 1-126
omnidirectional antenna
Class A Network
perimeter
CSMA/CD
35. Layer 1
Session Layer
protocol
Physical
Network
36. Twisted pair cable consisting of a number of twisted pairs of copper wire with a simple plastic casing. Because - no shielding is used in this cable - it is very susceptible to EMI - RFI - and other types of interference
FM
evasion
Unshielded twisted pair
ITU
37. Name Of Layer 6
File Transfer Protocol (FTP)
PDU
Presentation
Improperly configured switch
38. Distance between corresponding points on cycle
physical address
wavelength
management services
802.11n
39. Basic error checking and correction
analog signal
bus topology
Data Link
Session layer
40. Honey pot that has been protected so it cannot be easily compromised
padded cell
LC connector
Transport
TCP/IP Architecture Layer 4
41. IEEE standard for wireless networking
intrusion
802.44
HTTPS
Group Policy Object
42. Determines standards for the electronics industry and other fields - such as chemical and nuclear engineering - health and safety - and construction
ANSI
Lightweight Directory Access Protocol
Transport Layer (Layer 4)
Transport
43. String used to identify an access point - configure on your new access points to match the settings on existing access points
Main Distribution Frame
128 - 64 - 32 - 16 - 8 - 4 - 2 - 1
SSID
routing
44. Data Link Layer
Network Switching
phishing
Universal serial bus
Network File System (NFS)
45. A technique for connecting to a network at a remote location using Internet as the medium.
SNMP
TCP/IP Network Access Layer Encapsulation
VPN
fixing attenuation
46. Data transmission that involves one transmitter and one receiver
certification value may be lessened due to the number of people obtaining them
installing cable
Point-to-Point
thin client computing
47. IPv4
Repeater
Secure Sockets Layer (SSL)
geosynchronous
Internet Protocol version 4
48. Routers use it to identify nodes belonging to a multicast group
IGMP
RIP
Session
socket
49. RSA
attenuation
power budget
MAN
Rivest - Shamir - Adelman
50. Physical layer. 100 mpbs throughout. baseband transmission. cat 5 or higher utp. max length is 100 meters. two wire twisted pair-full duplexing.
100base-tx
Channel
bus topology
BOOTP