Test your basic knowledge |

IT: Networking Vocab

Subject : it-skills
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Each computer is connected to a central device






2. Documented agreement containing technical specifications or other precise criteria used as guidelines to ensure that materials - products - processes - and services suit their intended purpose






3. The number of times a signal's amplitude changes over a fixed period of time - expressed in cycles per second - Hz






4. Is a challenge respone authentication protocol






5. Aversion of the traceroute utility found on some Linux distributions.






6. A utility for viewing or modifying a host's routing table






7. Refers to the IEEE 802.3z and IEEE 802.3ab standard for Ethernet communications speed up to 1 Gbps.






8. Contains information that a wireless node needs to associate with an ap






9. A Data Link sublayer that examines addressing information contained in a network frame and controls how devices share communications on the same network.






10. Which address is split in to four 8-bit parts called octets?






11. 500 meters - 10Mbps






12. Form of transmission in which signals are modulated as radiofrequency analog pulses with different frequency ranges; does not involve binary coding






13. Radio frequency interference. interference caused by radio.






14. RJ 11






15. Amplitude - frequency (Hz) - wavelength - wavy line






16. Used by web browser and web servers to exchange files






17. Data Link Layer






18. Crimp into pins 1 and 2 of RJ 45 connector






19. A computer that accesses another computer - such as a workstation that accesses a shared file on another workstation - server - or mainframe. The client may use the accessed computer (host) to process data - or may process accessed data using its own






20. Progress of a wave over a time in a relationship






21. A data-link protocol used for remote networking that can exchange IP addresses - carry data by multiple network layer protocols - and support different app. protocols.






22. 128 -64 -32 -16 -8 -4 -2 -1






23. A device used to connect thicknet cable with a transceiver. A vampire bypasses the need to serve the cable - because the vampire tap has a metal tooth that pierces through the outside cable insulation (like a vampire) and connects with the copper wir






24. SSH - secure shell






25. Alert or alarm that occurs in the absence of an actual attack






26. Network interface card






27. Ensures reliablity of packet transmissions from node to node - Ensures that data is sent and received in the same order - Provides acknowledgement when a packet is received - Monitors for packet transmission errors and resends bad packets - Breaks la






28. TFTP is a TCP/IP file transfer protocol that is designed for task such as the transfer of data to enable a diskless workstation to boot using files trasmitted from a server






29. A logical communication path established by the OSI Network layer for sending and receiving data.






30. Fiber-optic cable used on a network backbone for high-speed communications - such as between floors of a building.






31. Encompasses actions an organization takes when intrusion is detected






32. Device that separates a medium into multiple channels and issues signals to each of those subchannels






33. Developed by ISO and ANSI - a model that providees a framework for networked hardware and software communication based on seven layers.






34. Ensures that messages being transmitted on the internet are private and tamper proof






35. The least secure authentication method






36. 3rd layer; protocols translate network addresses into their physical counterparts and decide how to route data from the sender to the receiver






37. American national standards institute






38. Services that handle hardware diagnoses and failure alerts






39. A thin coaxial cable usually RG-58






40. Activities finalize restoration of operations to a normal state and seek to identify source and method of intrusion to ensure same type of attack cannot occur again






41. Signals travel in one direction






42. Satellite used for broadband internet access






43. Generates signals as changes in voltage at the NIC






44. CNAME






45. A standard for encoding and interpreting binary files - images - video - and non-ASCII character sets within an e-mail message.






46. PDC






47. Any device connected to a network - such as a microcomputer - mainframe - midrange computer - network equipment - or printer. Also called a station.






48. NDS






49. Physical and Data Link layers






50. CIFS






Can you answer 50 questions in 15 minutes?



Let me suggest you:



Major Subjects



Tests & Exams


AP
CLEP
DSST
GRE
SAT
GMAT

Most popular tests