SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
IT: Networking Vocab
Start Test
Study First
Subject
:
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Vulnerability created in a system by a virus or worm which allows the attacker to access the system at will with special privileges.
Network Layer (Layer 3)
Application Layer
protocol
back door
2. A protocol data unit that has been transfered between OSI layers and then stripped of control information and transfere instructions.
service data unit (SDU)
star topology
data packets
Channel Service Unit
3. A network that any user can access with no restrictions. the most familiar example of a public network is the Internet
standard
Extended Network Prefix
binary
public network
4. Fiber Distributed Data Interface
FDDI
Domain Name Service
Secure Copy Protocol
throughput
5. It enables the sending node to obtain the MAC address of the intended recipient before packets are sent.
spread-spectrum
ports
Address Resolution Protocol (ARP)
star wired bus
6. Services that allow remote users to connect to the network
netstat
grade-index multimode fiber-optic cable
access services
Data Service Unit
7. A generic term referring to any set of protocols and standards collected into a comprehensive grouping that - when followed by the devices in a network - allows all the devices to communicate. Examples include TCP/IP and OSI.
access point
Networking Model
OSI (Open Systems Interconnection) model
TCP/IP Internet Layer Encapsulation
8. Hackers sending emails to make it look like its legit and its actually dangerous to the workstation
sequencing
fixing cross talk
CD-ROM File System
phishing
9. Modulates digital into analog in transmitting end and demodulates analog into digital in recieving end
Quality of Service
modem
UTP
utp
10. A term used to refer to data within the Network layer of the OSI model.
Conduit
Trivial File Transfer Protocol (TFTP)
Core Gateway
datagram
11. A specially configured connection on a network device that is capable of viewing all the traffic that moves through the entire device.
IDPS terrorist
monitoring port (SPAN port)
NetBIOs
1000base-t
12. The IEEE 802.3ae standard for Ethernet communications at 10 Gbps
TCP/IP Vs. Netware: Network Access
Open System Interconnection (OSI) referance model
10 Gigabit Ethernet
Protocol Data Unit
13. Security measure verifies that your user name and password are contained in the NOS directory
Presentation Layer
authentication
inline sensor
network
14. The capacity to send and receive signals at the same time on the same medium.
full duplex
collision detection
incremental backup
signal bounce
15. The communication between two networking devices for the purposes of the functions defined at a particular layer of a networking model - with the communication happening by using a header defined by that layer of the model. The two devices set values
Nonbroadcast Point-to-Multipoint Transmission
utp
Same Layer Interaction
inline sensor
16. Which layer in the OSI network model is responsible for providing a set of interfaces for applications to obtain access to networked services?
Presention Layer (Layer 6)
AUI
hub
Application Layer
17. Style of data transmission in which the pulses that represent bits follow one another along a single transmission line; sequentially issued
Serial
Kerberos
Bandwidth
EMI
18. IEEE 802.2 Logical Link Control (LLC) sublayer of the data link layer
802.2
Class C Network
twisted pair connector
Simple Network Management protocol (SNMP)
19. A private network that functions like a tunnel though a large network-such as the Internet or an enterprise network-that is restricted to designated member clients only.
MAN
virture privat network (VPN)
frequency
RADIUS
20. Service that supports email
communications services
half duplex
Amplitude
Demultiplexer
21. Communications cable that has no shielding material between the pair of insulated wires twisted together and the cable's outside jacket.
Secure Shell (SSH
Unshielded twisted-pair (UTP) cable
VLAN
routing
22. Internet group management protocol
PPP
soft skills
access services
IGMP
23. Layer 3 Troubleshooting
Loose network cable connection
Point-to-Point Tunneling Protocol
Correct default gateway
Punch-Down Block
24. SSH - secure shell
port 22
Twister Pair Cable
Internetwork Packet Exchange
network class a
25. Occurs when attacker attempts to gain entry or disrupt normal operations of information systems - almost always with intent to do harm
computer network
intrusion
kereberos
SMTP
26. Running system for a while to track types of false positives it generates and then adjusting IDPS alarm classifications
Independent Computer Architecture
router
alarm filtering
Plenum
27. Device that connects network segments and directs data based on information in the data packet
Inter Message Access Protocol (IMAP)
router
Amplitude Modulation
Integrated Services Digital Network
28. These reside on a computer or appliance connected to network segment and monitor network traffic
NetBIOs
Integrated Services Digital Network
Application layer
network-based IDPS (NIDPS)
29. A type of fiber optic cable connector that uses a mechanism similar to the BNC connectors used by Thinnet
Data Link
CRC (cyclic redundancy check)
Straight tip connector
cabeloco
30. Tool used to determine whether a customers line is obtaining dial tone from the CO
butt set
Secure File Transfer Protocol (SFTP)
intrusion correction
128 - 64 - 32 - 16 - 8 - 4 - 2 - 1
31. Which class of IP address would be allocated to a very large company?
segment
certification value may be lessened due to the number of people obtaining them
Class A
Trivial File Transfer Protocol (TFTP)
32. Progress of a wave over a time in a relationship
port 22
phase
802.16
Trivial File Transfer Protocol (TFTP)
33. Produces guidelines for how network cable should be installed in commercial buildings
hot site
fiber optic cable
EIA/TIA
port 110
34. The medium that carries multiple signals simultaneously
broadband
cyclic redundancy check (CRC)
Data Link
Frequency Division Multiplexing
35. Default subnet mask for 154.13.44.87
255.255.0.0
Hyper text transfer protocol
WAN
whois
36. Serial internet protocol
slip
device address
association
fragmentation
37. A system of computers - print devices - network devices - and computer software linked by communications cabling or radio waves.
mesh topology
port 80
(fiddy) Fiber Distributed Data Interface
Computer network
38. Physical Layer
ICAN
Hubs
Twister Pair Cable
IP Addressing
39. 5 segments b/w two nodes - 4 repeating devices - and 3 segments connected by two repeating devices
5-4-3 rule
HTTPS
802.11n
ethernet
40. As defined by the EIA/TIA-568 standard - cable that runs between network equipment rooms - floors - and buildings.
Line Printer Remote
backbone cabling
fiber-optic cables
Straight tip connector
41. Individual insulated wire pairs - less expensive then STP - less resistant to noise
SDU
American Standard Code for Information Interchange (ASCII)
UTP
RAS
42. A service on a node
Multiplexer
Channel Service Unit
ANSI (American National Standards Institute)
ports
43. Requires CSU/DSU-the connection point for a t1 live at customers site
Quality of Service
Secure Shell
Multiplexing
t1 connection
44. Segment
Firewall configured correctly
fingerprinting
statistical multiplexing
TCP/IP Transport Layer Encapsulation
45. Routing protocol most likely used to replace a router for that handles traffic to and from the companies connection to its NSP
Light Weight Directory access protocol (LDAP
passive scanning
crimping tool and wore stripper
BGP
46. On a network using the MIcrosoft Internet Connections Sharing service - the computer whose Internet connection other computers share. The ICS host must contain two network interfaces: one that connects to the Internet and one that connects to the LAN
Transport Layer Security (TSL)
ICS host
Secure Copy
fragmentation
47. Shielded twisted pair
stp
hub
Modulation
tracert
48. A remote connection where the client computer is a low-end computer that communicates with a terminal server.
ISDN
horizontal cabling
lpr filename
thin client computing
49. The process of attracting attention to a system by placing tantalizing information in key locations.
MAN
fixing noise
plain old telephone service (POTS)
enticement
50. Communications that occur in discrete units where the start of a unit is signaled by a start bit at the front and the end of the unit is signaled by a stop bit at the back.
Application Layer
Presentation Layer
CSMA/CD
asynchronous comunications