SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
IT: Networking Vocab
Start Test
Study First
Subject
:
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Running system for a while to track types of false positives it generates and then adjusting IDPS alarm classifications
ANSI
alarm filtering
SSID
Fast Ethernet (characteristics)
2. Encrypts
FCS (frame check sequence)
Attenuation
Zero Configuration
Presentation
3. Connector used with single mode and multimode fiber optic cable
OSI Layer 6
LC connector
hybrid fiber / coax (HFC) cable
fiber optic cable
4. The way nodes responds to a collision
passive topology
shielded twisted-paired (STP) cable
Electromagnetic Interference
collision detection
5. International telecommunication Union
ITU
RTS/CTS
hot site
CD-ROM File System
6. Frequency hoping spread spectrum: a signal jumps between several different frequencies
IEEE 802.12 Standard
bridge
FHSS
WINS
7. A worldwide network network of interconnected LANs - and MANs - that uses the TCP/IP protocol to enable people to share e-mail messages and computer files and to access a vast array of infromation.
Inter Message Access Protocol (IMAP)
STP
twisted pair connector
Internet
8. Cyclic redundancy check
TCP/IP Vs. Netware: Transport & Internet
evasion
CRC
logical address
9. An International organization of scientists - engineers - technicians - and educators that play a leading role in developing standards for network cabling and data transmissions.
SMTP server name
Institute of Electrical and Electronics Engineers (IEEE)
Remote Access Service
1550bytes
10. Consists of activities that deter intrusion
false negative
intrusion prevention
Amplitude Modulation
intranet
11. Communications cable that has no shielding material between the pair of insulated wires twisted together and the cable's outside jacket.
Twister Pair Cable
Unshielded twisted-pair (UTP) cable
ssl
FDDI
12. (fix) if analog shield twisted pairs or if digital with a repeater
OSI (Open Systems Interconnection) model
fixing noise
Amplitude Modulation
public network
13. An internetwork is two or more computer networks connected together.
internetwork
MIME (Multipurpose Internet Mail Extensions)
addressing
Amplifier
14. Plain old telephone service
POTS
Bits
isdn
American Wire Gauge
15. The action of luring an individual into committing a crime.
802.11n
signal bounce
entrapment
physical layer device
16. Regular voice-grade telephone service.
evasion
plain old telephone service (POTS)
Multistation Access Unit
L2TP
17. Works closely with IP in providing error and control information - by allowing hosts to exchange packet status information to help move the packets along the internetwork
Frequency Modulation
Internet Control Message Protocol (ICMP
transport layer
Structure
18. Which layer in the OSI network model is responsible for providing a set of interfaces for applications to obtain access to networked services?
TCP/IP Transport Layer Encapsulation
Asymmetric Digital Subscriber Line
Host
Application Layer
19. A high-capacity communications medium that joins networks on the same floor in a building - on different floors - and across long distances.
Data Service Unit
backbone
networks enable users to share resources
Networking Model
20. Frequency Division Multiple Access
Serial
Gigabit Ethernet
Data Link
FDMA
21. Vulnerability created in a system by a virus or worm which allows the attacker to access the system at will with special privileges.
802.11
PDU
back door
SSID
22. Occurs when attacker attempts to gain entry or disrupt normal operations of information systems - almost always with intent to do harm
Full Duplex NIC Communication
fixing attenuation
intrusion
Internet
23. Extent to which a signal has weakened after traveling a given distance
routing
SSL
Attenuation
Session Layer (Layer 5)
24. Authentication prtocol that does not issue a challenge or require 3rd party verification of the computer requestiing authentication
cabeloco
baseband
kereberos
alarm clustering and compaction
25. BSD
SDU
Physical
simplex
Berkeley Software Distribution
26. The total amount of opposition to the flow of current.
Service Set Identifier
impedance
Data Link Layer
CIDR block
27. Progress of a wave over a time in a relationship
phase
ISO
OSI model
IEEE (Institute of Electrical and Electronics Engineers)
28. An authentication protocol that uses public key technology to provide users with secured access to network resources.
Regeneration
Punch-Down Block
Populated Segment
Kerberos
29. MIB
single-mode fiber-optic cable
topology
Management Information Base
Time Division Multiple Access (TDMA)
30. HTTP - SMTP - POP3 - VoIP
TCP/IP Vs. Netware: Application
IDPS terrorist
host-based IDPS (HIPDS)
wide area network (WAN)
31. Fiber-optic cable used on a network backbone for high-speed communications - such as between floors of a building.
switch
Internet
fat pipe
A Protocol
32. Four twisted wire pairs with three twists per foot. This type can handle transmissions up to 16 MHz. Now limited to telecommunication equipment
carrier sense
pppoe
Category 3
tunneling
33. Method of gauging the appropriate rate of data transmission based on how fast he recipient can accept data
false positive
Physical
flow control
Point-to-Point Protocol
34. First set of six characters that make up the MAC address and that are unique to a particular manufacturer
pppoe
block ID
Institute of Electrical and Electronics Engineers (IEEE)
twisted shielded pair
35. ISM
Industrial - Scientific - and Medical
protocol
link dead phase
communications media
36. A device that can transmit and receive - such as transmitting and receiving signals on a communication cable
digital adv
Same Layer Interaction
IANA (Internet Assigned Numbers Authority)
transceiver
37. IEEE standard for token ring devices and data handling
Internet Protocol
Physical Layer (Layer 1)
signature-based (knowledge-based - misuse-detection) IDPS
802.5
38. Maximum arc into which you can loop a cable before you will cause data transmission errors
frame
MAC address
Internet Control Message Protocol (ICMP
Bend Radius
39. ICMP
datagram
Internet Control Message Protocol
site policy awareness
Quality of Service
40. IPX & SPX
Repeaters
fiber optic cable
TCP/IP Vs. Netware: Transport & Internet
media
41. Application Layer
protocol and services
OSI Layer 7
service data unit (SDU)
Flow Control
42. Point to point protocol
ppp
t1 connection
simplex
crossover cable
43. An established guidline that specifies how networked data is formatted into packet or frame - how it is transmitted - and how it is interpreted at the receiving end.
Bit-Error Rate Test
virture privat network (VPN)
protocol
Physical Layer (Layer 1)
44. Where demarc is located if an organization follows structured cabling standards
entrance facilities
Computer network
IDPS terrorist
SSH
45. Layer 4 Troubleshooting
port 143
NFS
Firewall configured correctly
Secure Shell (SSH
46. Hardware device located at the ISP side of ADSL connections.
multipath
communications services
token
DSLAM
47. A system of computers - print devices - network devices - and computer software linked by communications cabling or radio waves.
bandwidth
SFP
Computer network
wide area network (WAN)
48. Hypertext Transfer Protocol Secure
network interface card (NIC)
HTTPS
OSI
Overhead
49. A gateway that operates on the Internet backbone.
star-bus hybrid topology
connectivity device
Core Gateway
Virtual private network (VPN)
50. Receives a signal on one end - interprets it as 0 & 1 - then generates a new clean signal on the other end.
power budget
Asynchronous Transfer Mode
Repeater
node