SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
IT: Networking Vocab
Start Test
Study First
Subject
:
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A poplar alternative to FTP is NFS software offered by Sun Microsystems - which uses Sun's remotr procedure call specification via TCP port 111.
Network File System (NFS)
BNC connector
RFI
lpr filename
2. Metropolitan area network
site policy
HTTP
Institute of Electrical and Electronics Engineers (IEEE)
MAN
3. A gateway that operates on the Internet backbone.
FDDI
ISDN
Core Gateway
connectivity device
4. A permanent telephone connection between 2 locations that provide a predetermined amount of bandwidth at all times
leased line
Physical
American Standard Code for Information Interchange (ASCII)
back hack
5. Wide area network
Organizational Unit
WAN
enticement
star topology
6. Pointing in a direction
directional antennas
Internetwork Packet Exchange
Line Printer Daemon
bayonet nut connector (BNC)
7. 1-126
beacon frame
HTTPS
network class a
mtr (my traceroute)
8. Cross talk that occurs between wire pairs near the source of a signal
installing cable
SMTP (Simple Mail transfer Protocol)
Transport
Near End Cross Talk
9. A systematic survey of all of the target organization's Internet addresses that is conducted to identify network services offered by hosts in that range
alert or alarm
where NICs operate
Host
fingerprinting
10. A logical grouping of information that includes the network layer header and encapsulated data - but specifically does not include any headers and trailers below the network layer.
Packet
bandwidth
RFI
Network Time Protocol (NTP)
11. File Transfere Protocol
FTP
Address Resolution Protocol (ARP)
twisted-pair cable
Hyper Text Transfer Protocol (HTTP)
12. WAN transmission technologies that contains a segment that relied on 10GBase-EW standard
router
SONET
Rivest - Shamir - Adelman
Authentication Header
13. UDP
false negative
User Datagram Protocol
Simple Network Management Protocol
Line Printer Remote
14. Eight bits of information; in a digital signaling system - one byte carries one piece of information
Active Directory
Fast Ethernet
Byte
CSMA/CD
15. Where demarc is located if an organization follows structured cabling standards
entrance facilities
Data Link
multiprotocol label switching
Category 5e
16. Transport Layer
OSI Layer 4
Core
Boot Protocol /Bootstrap Protocol
15 hops
17. IPSec
Secure Sockets Layer (SSL)
10Gbase-t
Internet Protocol Security
Amplitude Modulation
18. A device used to connect thicknet cable with a transceiver. A vampire bypasses the need to serve the cable - because the vampire tap has a metal tooth that pierces through the outside cable insulation (like a vampire) and connects with the copper wir
vampire tap
Secure Hypertext Transfer Protocol (S-HTTP)
Braiding
bus topology
19. ACL
Common Internet File System
Access Control List
Presentation
MTU (maximum transmission unit)
20. Serves as a translator; manages data encryption
Post Office Protocol 3 (POP3)
presentation layer
Session
back hack
21. Rules and configuration guidelines governing implementation and operation of IDPSs within an organization
site policy
Presentation
Optical Time Domain Reflectometer
Structure
22. The way nodes responds to a collision
STP
collision detection
Alternate Mark Inversion
Remote Access Service
23. Process in which an NIDPS look for invalid data packets - packets that are malformed under the rules of the TCP/IP protocol
WDM
protocol stack verification
Internetwork Packet Exchange
Point-to-Point Tunneling Protocol
24. A network design in which every node is connected to every other note - achieving fault tolerance.
Challenge-Response Authentication Mechanism - Message Digest 5
mesh topology
RIP
Transport Layer
25. One transmitter issues signals to multiple receivers; receivers may be undefined or defined
Data Link
Point-to-Multipoint
broadband
Data Terminal Equipment
26. A medium that carries 1 signal
baseband
modem
Session
port 110
27. Network layer service that subdivides segments it receives from the Transport layer into smaller packets
Local area network (LAN)
fragmentation
throughput
port 80
28. Encompasses actions an organization takes when intrusion is detected
SLIP
cable plant
intrusion reaction
false negative
29. MAU
kereberos
Multistation Access Unit
EIA (Electronics Industries Alliance)
Remote Access Service
30. The action of luring an individual into committing a crime.
entrapment
MAC address
Decapsulation
802.3
31. Cyclic redundancy check
CRC
1000base-lx
Protocol Data Unit
configured with correct sending and receiving email server information
32. International telecommunication Union
ppptp
IGMP
diffraction
ITU
33. MDIX
Client Software
access services
Media Dependent Interface Crossover
throughput
34. Device used to regenerate a signal
Lightweight Directory Access Protocol
Time Division Multiple Access (TDMA)
session layer
Repeater
35. An 8-bit character-coding method consisting of 96 uppercase and lowercase characters and numbers - plus 32 nonprinting characters.
Domain Name
American Standard Code for Information Interchange (ASCII)
supernet mask
NIC
36. Wireless standard
Presentation layer
IMAP (Internet Message Access Protocol)
IEEE
802.11
37. Accurate alarm events that do not pose significant threat to information security
Amplitude
Network Information Service
noise
SMF
38. Signals travel in one direction
TCP/IP Transport Layer Encapsulation
back hack
physical layer device
simplex
39. (fix) if analog an amplifier or if digital with repeater
topology
fixing attenuation
metropolitan area network (MAN)
transmission media
40. Any end device on the network (for example: computers - printers - copy machines...)
vampire tap
Secure Copy
node
router
41. Dynamic Host Configuration Protocol
plenum area
Multiplexing
supernet
DHCP
42. Used to resolve NetBIOS names w IP address
connection
topology
ITU
WINS
43. ICMP
Bits
HTTPS
Category 1
Internet Control Message Protocol
44. Enables the establishment of a Web connection - but it also provides for the exchange of resources - for example - displaying AOL's Web page in your brower.
Hypertext Transfer Protocol (HTTP)
collision detection
SMTP (Simple Mail transfer Protocol)
hot site
45. Unshielded twisted pair
utp
OSI (Open Systems Interconnection) model
TIA
File Transfer Protocol
46. Braided metal shielding used to insulate some types of coaxial cable
IP address within the assigned network
link quality monitoring
Canonical Name
Braiding
47. An authentication protocol that uses public key technology to provide users with secured access to network resources.
host-based IDPS (HIPDS)
headened
Node
Kerberos
48. A private network that functions like a tunnel though a large network-such as the Internet or an enterprise network-that is restricted to designated member clients only.
802.11
Inter Message Access Protocol (IMAP)
virture privat network (VPN)
DHCP
49. Network Layer
POP (Post Office Protocol)
High-Level Data Link Control
fractionalizing
OSI Layer 3
50. Wrapping one layer's PDU with protocol information so that it can be interpreted by a lower layer
SMTP
Core Gateway
terminal
encapsulate