SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
IT: Networking Vocab
Start Test
Study First
Subject
:
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Name Of Layer 3
entrapment
Network
MAN
NetWare Core Protocol
2. Internet corporation for assigned names and numbers
DHCP
fat pipe
rollover cable
ICAN
3. T1
POP3
T-Carrier Level 1
TCP/IP Architecture Layer 4
link dead phase
4. Lowest or 1st layer; protocols generate and detect signals so as to transmit and receive data over a network medium - also set the data transmission rate and monitor data error rates - but do not provide error correction
switch
To stop the Hamburgerler from stealing all of Ronnie McDonalds burgers
Physical layer
Core Gateway
5. Attacker who utilizes tactics designed to trip the organization's IDPS - essentially causing the organization to conduct its own DoS attack - but overreacting to an actual - but insignificant - attack.
Industrial - Scientific - and Medical
IDPS terrorist
WAN
coax cable connector
6. Local area network
Connectors
Round Trip Time
LAN
MAN
7. 1) A computer (mainframe - minicomputer - server - or workstation) that has an operating system enabling multiple computers to access it at the same time for files - data - and services. Programs and information may be processed at the host - or they
node
fragmentation
Host
latency
8. A computer that has its own CPU and may be used as a stand-alone computer for word processing - spreadsheet genation - or other software applications. It also may be used to access another computer such as another workstation or server via a network.
Frequency Division Multiplexing
network
connectionless
workstation
9. A network design consisting of a continuous path for data with no logical beginning or ending point - and thus no terminators.
step-index multimode fiber-optic cable
IEEE (Institute of Electrical and Electronics Engineers)
POP3
ring topology
10. Data Link Layer
CRC (cyclic redundancy check)
Ethernet
Hyper Text Transfer Protocol (HTTP)
cp connection
11. An Application layer protocol used to retrieve messages from a mail server. When a client retrieves mail via POP - messages previously stored on the mail server are downloaded to the client's workstation - and then deleted from the mail server.
POP (Post Office Protocol)
fiber optic cable
router
topology
12. Not individually insulated but shielded. use when there is noise.
TCP/IP Network Access Layer Encapsulation
STP
CD-ROM File System
Client Software
13. IEEE standard for error and flow control in data frames
honey net
Hyper text transfer protocol
802.2
cyclic redundancy check (CRC)
14. Service data unit
IEEE 802.12 Standard
SDU
phishing
connectionless
15. Device that boosts - or strengthens - and analog signal
Peer-to-peer network
Improperly configured switch
Amplifier
RealVNC
16. Internet control message protocol
ICMP
fiber optic connector
Microbrowser
TCP/IP Architecture Layer 4
17. The 100BaseVG/100VG-AnyLAN approach abandon the CSMA/CD transmission technique for one called demand priorTity.
Inter Message Access Protocol (IMAP)
IEEE 802.12 Standard
Protocol Data Unit
Cladding
18. A term used to refer to data within the Data-link layer of the OSI model.
frame
tracert
Virtual Private Network
Session Layer
19. MDIX
broadband
Media Dependent Interface Crossover
PDU
Optical Time Domain Reflectometer
20. Functions at the network layer that add logical addresses and properly route data
routing
protocol and services
twisted pair connector
route
21. 192-223
ACK (acknowledgement)
network class C
Routing
Primary Rate Interface
22. A utility for viewing or modifying a host's routing table
Transmission Protocol (TCP)
horizontal cabling
route
asynchronous comunications
23. The oldest type of network design with - this topology consist fo multiple nodes attached to a central hub - switch - or router.
Noise
centralized control strategy
encapsulate
star topology
24. Institute of Electrical and Electronics Engineers
Network
IEEE
OSI
Transmission media
25. POE standard
255.255.0.0
Secure Copy
802.3af
collision
26. Fiber-optic cable used on a network backbone for high-speed communications - such as between floors of a building.
mtr (my traceroute)
fat pipe
SFP
local area network (LAN)
27. PDC
backbone
session layer
Same Layer Interaction
Primary Domain Controller
28. The utility that allows you to query ICANN's DNS registration database and find information about a domain.
ethernet
Class C Network
whois
TDM
29. Is part of theTCP/IP protcol suite and used to retrive e-mail from a remote server to a local client over a TCP/IP connection
Transport
Post Office Protocol 3 (POP3)
Full-Duplex
EIA (Electronics Industries Alliance)
30. Layer 6
Presentation
session
geosynchronous
association
31. Voltage is varied and imprecise - more susceptible
Localhost
bandwidth
analog dis
supernet
32. Electromagnetic interference
terminator
EMI
alien cross talk
Dynamic Host Configuration Protocol (DHCP)
33. A systematic survey of all of the target organization's Internet addresses that is conducted to identify network services offered by hosts in that range
RS-232
fingerprinting
MAN
L2TP
34. Computers - devices - and connectivity necessary to rebuild a network exist - and all have appropriated configured updated and connected to match your networks current state. most expensive disaster recovery contingency to maintain
honey net
hot site
ISOC (Internet Society)
File Transfer Protocol (FTP)
35. ATM
step-index multimode fiber-optic cable
Asynchronous Transfer Mode
broadband
broadband
36. Firewall packet inspection that ignores the state of the connection between the internal computer and the external computer - only blocks or allows a packet based on header information.
Remote Terminal Emulation (Telnet)
Byte
stateless firewall
whois
37. A unit of data formatted for transmission over a network that contains control and other information that corresponds to the OSI Networklayer; also called Layer 3.
packet
cat 5
routing
cp connection
38. Multicast group 224-239
Line Printer Remote
Remote Authentication Dial-In User Service
Impedance
Class D Network
39. Device that modulates analog signals into digital signals for transmission over telephone lines - and demodulates digital signals into analog for the receiving end
fat pipe
Modem
backbone cabling
logical address
40. Extent to which a signal has weakened after traveling a given distance
Attenuation
IDPS terrorist
Channel
fiber optic connector
41. Connection-less
Physical
udp
Amplifier
port 143
42. Measure of strength
EAP
amplitude
fiber optic cable
topology
43. Scrambles information into an alternative form that requires a key or password to decrypt the information.
Flow Control
Remote Terminal Emulation (Telnet)
encryption
UTP
44. Each computer is connected to a central device
Optical Time Domain Reflectometer
Gigabit Ethernet (fiber characteristics)
star topology
coax cable connector
45. Device used to regenerate a signal
Repeater
inline sensor
IEEE
ISOC
46. The gateway that first interprets a device's outbound requests - and then interprets its inbound requests to and from other subnets.
Encrypting File System
Default Gateway
frame
Universal serial bus
47. The NIC and network equipment are set up so that they have the capacity to send and receive simultaneously. which is possible because od buffering at the NIC.
packet filtering - application proxy
Active Directory
Full Duplex NIC Communication
connectionless
48. A standard for encoding and interpreting binary files - images - video - and non-ASCII character sets within an e-mail message.
MIME (Multipurpose Internet Mail Extensions)
Workstation
Serial
Packets
49. A switching method that enables multiple devices to communicate over the same commnications medium by creating time slots in which each device transmits.
TCP/IP protocol failure
multiplexing
Crossover Cable
Time Division Multiple Access (TDMA)
50. Is a protocol designed for managing complex networks
Frame
Simple Network Management protocol (SNMP)
router
Virtual private network (VPN)