SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
IT: Networking Vocab
Start Test
Study First
Subject
:
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. 7th layer; protocols enable software programs to negotiate formatting - procedural - security - synchronization - and other requirements with the network
Application layer
HTTP
Asymmetric Digital Subscriber Line
Presentation
2. Does not operate at the application layer
ARP
attenuation
port 80
Latency
3. Unique identifying number for a network node; follows a hierarchical addressing scheme; can be assigned through OS software; added to data packets and interpreted by protocols at the Network layer
workstation
Physical
network address
impedance
4. Type of switching for multiple data packets make up the same transmission and use identical paths to reach the destination
Transmission Control Protocol
message and circuit
SNAT (Static Network Address Translation)
network access method
5. Length of time it takes for a packet to go from sender to receiver - then back to sender; measured in milliseconds
checksum
Internet Control Message Protocol
Physical
Round Trip Time
6. Set of routines that make up part of a software application
API (application program interface)
ppptp
Remote Authentication Dial-In User Service
Device power off
7. Used with single mode or multi mode fiber optic cable
standard connector
certification value may be lessened due to the number of people obtaining them
intrusion correction
binary
8. A network design consisting of a continuous path for data with no logical beginning or ending point - and thus no terminators.
Repeater
Ring topology
network interface card (NIC)
confidence value
9. Device that modulates analog signals into digital signals for transmission over telephone lines - and demodulates digital signals into analog for the receiving end
Modem
workstation
host-based IDPS (HIPDS)
authentication
10. Translates data to a format the receiving node understands - such as from EBCDIC to ASCII - Performs data encryption - Performs data compression
association
Internet Connection Sharing
American Wire Gauge
Presention Layer (Layer 6)
11. A system of computers - print devices - network devices - and computer software linked by communications cabling or radio waves.
Frames
route
Computer network
Encapsulation
12. A type of multimode fiber-optic cable in which the light-based signals follow uniform curved routes inside the cable - resulting in signals that all arrive at the same time and with less long-distance distortion than step-index cable.
Internet Group Membership Protocol (IGMP)
TCP/IP Vs. OSI: Application
grade-index multimode fiber-optic cable
OSI
13. Internet Engineering Task Force
IPSec
Post Office Protocol 3 (POP3)
POP3
IETE
14. Junction point between the MDF and concentrations of fewer connections; those that terminate in a telecommunications closet
ARP
Intermediate Distribution Frame
LAN
Encapsulation
15. Network Layer
Hyper Text Transfer Protocol (HTTP)
Routing
Domain Name System (DNS)
Transmission Control Protocol
16. Maximum arc into which you can loop a cable before you will cause data transmission errors
LAN
Bend Radius
Incorrect device drivers
active scanning
17. Extent to which a signal has weakened after traveling a given distance
Electromagnetic Interference
star-bus hybrid topology
Class E Network
Attenuation
18. Secure Shell
SSH
Simple Mail Transfer Protocol (SMTP)
TCP/IP Vs. OSI: Application
digital signal
19. Positive and zero. 1 and 0's.
intrusion prevention
Networking Model
binary
Common Internet File System
20. PDC
Optical Loss
half duplex
switch
Primary Domain Controller
21. Which protocol allows users to recieve emails?
POP3
Open Shortest Path First
enterprise network
10BASE2 Limit
22. Used connecting a workstation to a routers console part
(fiddy) Fiber Distributed Data Interface
RS 232
Session Layer
port 80
23. A versatile - chainable serial-bus technology that connects up to 127 devices at speeds of 1.5 Mbps and 12 Mbps as well as 480 Mbps.
Multistation Access Unit
Universal serial bus
log file monitor (LFM) IDPS
coaxial cable
24. The 100BaseVG/100VG-AnyLAN approach abandon the CSMA/CD transmission technique for one called demand priorTity.
CSMA/CD
Braiding
beaconing
IEEE 802.12 Standard
25. Connection for data exchange between two parties
pstn
session
Boot Protocol /Bootstrap Protocol
802.2
26. Provides Internet access and/or other services such as email and Web hosting
ISP (Internet service provider)
Secure Copy Protocol
ISDN
entrapment
27. The IEEE standard for token ring networking devices and data handling.
Electromagnetic Interference
802.5
Digital
Metropolitan area network (MAN)
28. Describes the relative strength over a three dimensional area of an antenna
radiation pattern
DSL
physical layer
Coaxial Cable
29. A computer that accesses another computer - such as a workstation that accesses a shared file on another workstation - server - or mainframe. The client may use the accessed computer (host) to process data - or may process accessed data using its own
device ID
client
Fault tolerance
Multimode fiber
30. Nondata information that mus accompany data in order for a signal to be properly routed and interpreted by the network
bandwidth
Post Office Protocol version 3
Remote Authentication Dial-In User Service
Overhead
31. Unit of data that results from subdividing a larger protocol data unit
Data Link
segment
Kroner
Amplitude Modulation
32. A computer on a network that requests services or resources from another computer on a network
Gigabit Ethernet
workstation
Correct subnet mask
ISDN
33. IEEE standard describing specifications for wireless transmissions
peer-to-peer network
802.11
fiber optics
Bandwidth
34. Measure of frequency equivalent to the number of amplitude cycles per second
Improperly configured switch
Hertz
Mesh topology
telephone connector
35. Hackers sending emails to make it look like its legit and its actually dangerous to the workstation
Simple Network Management Protocol (SNMP)
POTS
reassembly
phishing
36. Allows clients to communicate in different floors
switch
throughput
OSI
Berkeley Software Distribution
37. A resistor that is connected to the end of a segment on a bus network - so that data-carrying signals are absorbed at the point where the segment stop. Aborbing the signals ensures they are not reflected back onto the cable after they reach the end-t
message and circuit
terminator
Incorrect device drivers
presentation layer
38. An enclosed area - such as a false floor - or ceiling - in which pressure from air or gas can be greater than the pressure outside the enclosed area - particularly during a fire. Plenum area in buildings often extend to multiple rooms or extend throu
Post Office Protocol
Quality of Service
plenum area
OSI Layer 2
39. A permanent telephone connection between 2 locations that provide a predetermined amount of bandwidth at all times
leased line
TCP/IP Architecture Layer 4
ISO
ATU-R
40. Hub/repeaters
Apple File Protocol
physical layer device
CSU/DSU
evasion
41. LDAP
crossover cable
Byte
Lightweight Directory Access Protocol
Internet Group Multicast Protocol
42. The seventh layer of the OSI model. Application layer protocols enable software programs to negotiate formatting - procedural - security - synchronization - and other requirements with the network.
HTTPS
Application Layer
Telnet
TIA (Telecommications Industry Association)
43. CIFS
ISOC
Common Internet File System
Amplitude
Adjacent Layer Interaction
44. You may set up a web server on companys access server - allowing global connections - for employees to access
ICANN (Internet Corporation for Assigned Names and Numbers)
SMTP
fat pipe
demilitarized zone
45. Brief delay in processing - length of cable can contribute to this
router
t1 connection
OSI
latency
46. Is associated with unix/linux networks
Simple Network Management Protocol
MultiMode Fiber
Secure Copy
step-index multimode fiber-optic cable
47. An Application layer protocol used to retrieve messages from a mail server. When a client retrieves mail via POP - messages previously stored on the mail server are downloaded to the client's workstation - and then deleted from the mail server.
IP address within the assigned network
Network Layer (Layer 3)
POP (Post Office Protocol)
TCP port 23
48. Pipeline used to contain and protect cabling; usually made from metal
analog dis
STP
Conduit
PPP
49. Type of transmission in which signlas may travel in both directions over a medium - but only in one direction at a time
Half-Duplex
802.11g
Internet
fiber optic connector
50. The most widely-used protocol that manages notes posted on usenet newsgroups
PSTN
RS-232
Network News Transport Protocol (NNTP)
Electrical Signaling