SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
IT: Networking Vocab
Start Test
Study First
Subject
:
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. SFTP
Access Control List
PPP
node
Secure File Transfer Protocol
2. Individual insulated wire pairs - less expensive then STP - less resistant to noise
ISO
UTP
TCP/IP Architecture Layer 3
network
3. LPR
encapsulate
Line Printer Remote
Core Gateway
Internet
4. Can use WPA to improve the security of data in transit
FDMA
802.11b
standard
NTP
5. An algorithm used to verify the accuracy of data contained in a data frame.
full mesh
WDM
port 110
CRC (cyclic redundancy check)
6. Secure Sockets Layer
IP address within the assigned network
Subnetmask
SSL
SONET
7. GBIC
DSL
NetWare Loadable Module
EAPoL
Gigabit Interface Converter
8. The IEEE 802.3ae standard for Ethernet communications at 10 Gbps
10 Gigabit Ethernet
port 110
POTS
analog adv
9. An advantage of networks
Alien Cross Talk
Ring topology
ASCII
networks enable users to share resources
10. Port used during a domain name lookup
port 53
star-bus hybrid topology
Loose network cable connection
installing cable
11. IANA
Point-to-Point
DNAT (Dynamic Network Address Translation)
passive scanning
Internet Assigned Numbers Authority
12. Also called the physical or device address - the hexadecimal number permanently assigned to a network interface and used by the MAC sublayer within the DATA Link layer (Layer 2).
data packets
encapsulate
MAC address
ARP
13. Cross talk with 2+ wires
NetWare Directory Services
alien cross talk
network class a
Network News Transport Protocol (NNTP)
14. Strategy that combines the best of the other two strategies; while individual agents still analyze and respond to local threats - their reporting to a hierarchical central facility enables the organization to detect widespread attacks
partially distributed control strategy
RARP
event viewer
ITU
15. Short reach. only multimode-max length is 500. baseband transmission. 1000 mpbs.
1000base-lx
1000base-sx
stateful protocol analysis (SPA) IDPS
Analog
16. UDP
802.3
User Datagram Protocol
ISO (International Organization for Standardization)
Secure Shell
17. Prevents broadcast storms by enabling switches to calculate paths that avoid potential loops and artificially block the links that would complete a loop
STP
NFS
RTT
access point
18. Manages end-to-end delivery of data
Mac Addressing
rollover cable
workstation
transport layer
19. Physical Layer
Presentation
Impedance
intrusion detection/prevention system (IDPS)
OSI Layer 1
20. Application Layer
OSI Layer 7
Group Policy Object
Domain Name System (DNS)
tunneling
21. Type of interference caused by signals traveling on nearby wire pairs infringing on another pair's signal
Cross Talk
telnet
10Gbase-t
Institute of Electrical and Electronics Engineers
22. Device typically used to create a VLAN
Internet Control Message Protocol (ICMP
HTTP (Hypertext Transfer Protocol)
collision
switch
23. Set of protocols that specify how wireless networks works. Most common are currently B and G. N is an emerging standard.
Network Time Protocol (NTP)
single-mode fiber-optic cable
802.11
ports
24. Device that connects network segments and directs data based on information in the data packet
leased line
Industrial - Scientific - and Medical
router
Repeater
25. The process in which an attacker obtains confidential information by contacting employees and deceiving them into giving up passwords - IP addresses - server names - and so on.
15 hops
hot site
social engineering
broadband
26. Secure Hypertext Transfer Protocol
SMF
S-HTTP
ATU-R
reflection
27. A combination of techniques used to detect an intrusion and then to trace it back to its source
SONET
trap and trace
Physical
broadband
28. Provides th transfer medium (such as cable) - Translates data into a transmission signal appropriate to the transfer medium - Sends the signal along the transfer medium - Includes the pyical layout of the network - Monitors for transmission error - D
Lightweight Directory Access Protocol
Crosstalk
white/orange and orange
Physical Layer (Layer 1)
29. A switchhing method that creates separte channels on one communication medium by establishing different frequencies for each channel.
connection
PDU (protocol data unit)
Ethernet
Frequency Division Multiple Access (FDMA)
30. Domain Name System
DNS
Telnet
802.11n
SDU
31. A TCP/IP utility used to show or modify a client's host name.
Media Dependent Interface
management services
Berkeley Internet Name Domain
hostname
32. NAT
Asymmetric Digital Subscriber Line
Media Dependent Interface Crossover
Network Address Translation
Canonical Name
33. Which protocol allows users to send emails?
IEEE
partially distributed control strategy
SMTP
DHCP
34. Hard-to-define skills such as dependability
PDU
Cable Plant
host-based IDPS (HIPDS)
soft skills
35. Enables sharing remote drivers - Enables sharing remote printers - Handles e-mail messages - Provides file transfer services - Provides file management services - Provides terminal emulation
SIP
Application Layer (Layer 7)
Impedance
IGMP
36. Hypertext Transfer Protocol
Data Circuit-Terminating Equipment
Bit-Error Rate Test
ISOC (Internet Society)
HTTP
37. The least secure authentication method
PAP
Amplifier
Plenum
server
38. The oldest type of network design - this topology consists of multiple nodes attached to a central hub - switch - or router.
socket
Star topology
Secure Sockets Layer (SSL)
802.11
39. Hypertext Transfer Protocol Secure
HTTPS
Session
routing
packet
40. Scrambles information into an alternative form that requires a key or password to decrypt the information.
Topology
Network Time Protocol
Line Printer Daemon
encryption
41. Gigabit Interface Converter - Plugs in to an interface on a switch
workstation
ANSI (American National Standards Institute)
GBIC
fault tolerance
42. Layer 1
Application
Repeater
POP3
Physical
43. A network that links multiple LAN's in large city or metropolitan region.
frequency
Punch-Down Block
fading
metropolitan area network (MAN)
44. Firewall packet inspection that examines the data contained in a packet as well as the state of the connection between internal and external computers.
ANDing
stateful firewall
Transport
management services
45. Internet group management protocol
Extended Network Prefix
Layer 2 Forwarding
IGMP
TCP/IP Architecture Layer 1
46. Refers to the IEEE 802.3z and IEEE 802.3ab standard for Ethernet communications speed up to 1 Gbps.
analog signal
half duplex
standard
Gigabit Ethernet
47. Carrier sense multiple access with collision detection
baseband
analog adv
CSMA/CD
POP3
48. A medium that carries 1 signal
hybrid fiber / coax (HFC) cable
coaxial cable
baseband
throughput
49. A private network that functions like a tunnel though a large network-such as the Internet or an enterprise network-that is restricted to designated member clients only.
TCP/IP Vs. Netware: Network Access
Logical Link Control
overhead
virture privat network (VPN)
50. A series of interconnected computers - printing devices - and other computer equipment that shares hardware and software resources. The service area usually is limited to a given office area - floor - or building.
port 443
Local area network (LAN)
MAC
tunneling