SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
IT: Networking Vocab
Start Test
Study First
Subject
:
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Algorithm used to verify the accuracy of data contained in a data frame
802.2
Firewall Filtering
CRC (cyclic redundancy check)
Layer 2 Forwarding
2. Amplitude modulation-amplitude of signal is modified
RARP
BNC connector
AM
passive scanning
3. Documented agreement containing technical specifications or other precise criteria used as guidelines to ensure that materials - products - processes - and services suit their intended purpose
standard
Application Layer
Line Printer Daemon
evasion
4. The actual data - any communication that encodes a message
signal
half duplex
TCP/IP Transport Layer Encapsulation
Carrier Sense Multiple Access / Collision Detection
5. Transport Layer
cyclic redundancy check (CRC)
port 443
TCP/UDP
ANDing
6. 128 -64 -32 -16 -8 -4 -2 -1
standard connector
packet
traceroute (tracert)
binary
7. Amount of data that can be transmitted over media or wireless at a time.
bandwidth
topology
standard connector
Classful Addressing
8. RAS
MAU
shielded twisted-paired (STP) cable
Remote Access Service
Point-to-Multipoint
9. SMF
802.3
network layer
noise
Single Mode Fiber
10. Process in which an NIDPS inspects the higher-order protocols (HTTP - FTP - Telnet) are examined for unexpected packet behavior or improper use
connection
DTE
Internet
application protocol verification
11. IPv4
API (application program interface)
802.16
OSI Layer 3
Internet Protocol version 4
12. Frequency division multiplexing
TCP/IP Vs. OSI: Network Access
FDM
Main Distribution Frame
Secure Shell (SSH
13. Open Systems Interconnection model
single-mode fiber-optic cable
TCP/IP Network Access Layer Encapsulation
signal bounce
OSI
14. Which layer in the OSI network model handles data format information for networked communications?
Thin Eterhnet/10 Base 2
OSI Layer 5
Independent Computer Architecture
Presentation Layer
15. A unit of data transmitted on a network that contains control and address information corresponding to the OSI Data Link layer - or Layer 2.
1550bytes
CSMA/CD
frame
white/orange and orange
16. Transforms data into a form network or applications will understand
Presentation
netstat
Primary Rate Interface
Physical Layer
17. What does POP3 stand for?
Regeneration
Alternate Mark Inversion
OSI
Post Office Protocol
18. User datagram protocol
OSI Layer 3
Port 23
UDP
utp
19. Device that enables networks or segments using different media to interconnect and exchange signals
802.44
128 - 64 - 32 - 16 - 8 - 4 - 2 - 1
Media Converter
block ID
20. (local area network) network of computers and others that is confined to a relatively small space
Twister Pair Cable
Cladding
LAN
Category 6
21. A standard method or format for communication between networked devices
protocol
Subnetmask
TIA (Telecommications Industry Association)
supernet
22. Ethernet communications at speeds up to 100 Mbps as defined under the IEEE 802.3u standard.
Internet Assigned Numbers Authority
packet
fixing attenuation
Fast Ethernet
23. The oldest type of network design - this topology consists of multiple nodes attached to a central hub - switch - or router.
10 Gigabit Ethernet
802.11a
Star topology
bus topology
24. Consists of single cable that connects all nodes on a network without intervening connectivity devices - inexpensive - hard to find source of error - not very fault tolerant - data is transmitted in one direction in the ring.
router
Application Layer (Layer 7)
bus topology
MAU
25. FTP is an application that enables the transfer of data from one remote device to another - using TCP/IP
driver signing
File Transfere Protocol - (FTP)
twisted-pair cable
Half-Duplex
26. A data communications technique that transmits a packet directly from the sending node - though a switch - and to the receiving node - without passing though other network nodes.
Firewall configured correctly
Bit
active scanning
demand priority
27. SSH - secure shell
Application Layer
t1 connection
port 22
API (application program interface)
28. Provides service that ensure accurate and timely delivery of network communications between two hosts
false attack stimulus
Transmission Protocol (TCP)
Radio Frequency Interference
Apple File Protocol
29. A network transport control method used in Ethernet networks. It regulates transmission by sensing the presence of packet collisions.
footprinting
Carrier Sense Multiple Access with Collision Detection (CSMACD)
SCP
Management Information Base
30. FDDI
Phase
bandwidth
(fiddy) Fiber Distributed Data Interface
66 Block
31. Most common cabling used in networking. Usually connects nodes to the main network.
Presentation
star-bus hybrid topology
ethernet
Routing
32. Session initiation protocol-performed on VoIP - determines location of endpoints - and establishes sessions between endpoints
SIP
Internet Key Exchange
RS 232
intrusion detection
33. The IEEE stanard for error and flow control in data frames.
SNAT (Static Network Address Translation)
802.2
fully distributed control strategy
bus topology
34. Is a system that is distributed throughout the internetwork to provide address/name resolution.
WINS
Protocol Data Unit
Domain Name System (DNS)
Baseband
35. Time Division Multiple Access
TDMA
Protocol
SSID
POP3 (Post Office Protocol - version 3)
36. Is used to allow searching and updating of a directory service
incremental backup
Boot Protocol /Bootstrap Protocol
Light Weight Directory access protocol (LDAP
ATM
37. Standard analog telephone system
PDU
star-ring hybrid topology
PSTN
RAS
38. Is a challenge respone authentication protocol
TCP/IP Architecture Layer 2
Device power off
ATM
CHAP
39. A network design consisting of a continuous path for data with no logical beginning or ending point - and thus no terminators.
High-Level Data Link Control
Ring topology
Internet Relay Chat
RFI
40. Trivial file transfer protocol
Data Circuit-Terminating Equipment
tuning
TFTP
Authentication Header
41. Is a file transfer protocol that uses s ecure shell (SSH)
Secure File Transfer Protocol (SFTP)
token
Main Distribution Frame
SMTP server name
42. Physical layer. 10 giga bit throughput. baseband transmission. twisted pair. max length is 100 meters. cat 6 or 7.
honey net
Unshielded twisted pair
10Gbase-t
Crosstalk
43. Connection based
Data Link
802.2
carrier sense
cp connection
44. More variable - convey greater subtleties with less energy
Secure File Transfer Protocol
IEEE
analog adv
ports
45. Allows for secure interactive control of remote systems
IGMP
Secure Shell (SSH
Bend Radius
port 443
46. Also called the star-wired bus topology - a network design that combines the logial comunications of a bus with the physical layout of a star.
Radio Frequency Interference
driver signing
star-bus hybrid topology
Port Numbers
47. A network owned and maintained by an organization -such as a campus network operated by a college.
Network interface card (NIC)
terminal
private network
Gateway Services for NetWare
48. Layer 3 Troubleshooting
Transport
multipath
CSMA/CA
Correct subnet mask
49. Length of time it takes for a packet to go from sender to receiver - then back to sender; measured in milliseconds
Secure File Transfer Protocol
network class B
Round Trip Time
Session
50. Application layer protocol that formulates and interprets requests between Web clients and servers
dedicated lines
HTTP (Hypertext Transfer Protocol)
block ID
CHAP