SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
IT: Networking Vocab
Start Test
Study First
Subject
:
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Knows which VLAN a stream of data belongs to by reading a tad added to each frames header
switch
bandwidth
Open System Interconnection (OSI) referance model
PSTN
2. A combination of LAN's - MAN's - or WAN's that provides computer users with an array of computer and network resources to complete different tasks.
ethernet
phishing
802.11b
enterprise network
3. Assigning a placeholder to each piece of a block of data to allow the receiving node's Transport layer to reassemble the data in the correct order
false negative
device ID
Trivial File Transfer Protocol (TFTP)
sequencing
4. Attacker who utilizes tactics designed to trip the organization's IDPS - essentially causing the organization to conduct its own DoS attack - but overreacting to an actual - but insignificant - attack.
perimeter
802.3af
IDPS terrorist
protocol
5. Secure sockets layer-encyrpts TCP/IP transmission including web forms- en route b/w the client server using public key encryption technology
connectionless
Channel Service Unit
ssl
HTTP (Hypertext Transfer Protocol)
6. A network topology in which all of the nodes are connected to a central line or bus
bus topology
station
Cross Talk
virture privat network (VPN)
7. Transport Layer
Attenuation
goodput
RealVNC
Segments
8. A connecting device for a network that accepts messages and passes them on to other parts of the network. Generally more intelligent than a hub.
t1 connection
switch
Latency
UTP
9. Which protocol allows the transfer of a file from one computer to another over the network?
enterprise network
ethernet
FTP
File Transfer Protocol
10. Performs name resolution
Session
Boot Protocol /Bootstrap Protocol
ring topology
nslookup
11. Firewalls perform two basic security functions
packet filtering - application proxy
NTP
plenum cables
link establishment phase
12. The part of a network to which segments and significant shared devices connect
backbone
255.255.0.0
Serial Line Internet Protocol
intrusion reaction
13. A network whose access is restricted to only clients or machines with proper credentials.
MAC address
Internet Protocol
driver signing
Private Network
14. ISM
Network Behavior Analysis
Industrial - Scientific - and Medical
PSTN
Alternate Mark Inversion
15. BootP
fixing noise
Boot Protocol /Bootstrap Protocol
API (application program interface)
Core Gateway
16. Professional organization with 90 chapters around the world that helps to establish technical standards for the internet
DNS
protocol stack verification
ISOC (Internet Society)
association
17. Public switched telephone network
Ferrule
Media Converter
Category 3
PSTN
18. Method of controlling how network nodes access communication channels - ex highway
network access method
Microbrowser
10Base-T
Static IP Addressing
19. Amount of data that can be transmitted over media or wireless at a time.
rollover cable
supernet
bandwidth
protocol data unit (PDU)
20. Device that separates multiplexed signals once they are received and regenerates them in their original form
Conduit
noise
Demultiplexer
radiation pattern
21. International telecommunication Union
ITU
Logical Link Control
Point-to-Point Tunneling Protocol
MTU (maximum transmission unit)
22. Helps you identify percentage of traffic that compromises broadcasts
transport layer
Class D Network
MAC
network monitor
23. Data only
goodput
File Transfer Protocol (FTP)
MAN
Point-to-Point Protocol over Ethernet
24. Consists of procedures and systems that identify system intrusions
PSTN
Address Resolution Protocol
intrusion detection
802.11a
25. IDPS that uses profiles to detect anomalous protocol behavior
TCP/IP Internet Layer Encapsulation
electromagnetic interference (EMI)
Kerberos
stateful protocol analysis (SPA) IDPS
26. Error detection and correction
terminators
802.11a
ASCII
Transport
27. Lower sublayer of the Data Link layer; appends the physical address of the destination computer onto the fram
MAC (Media Access Control) sublayer
fixing attenuation
Presention Layer (Layer 6)
metropolitan area network (MAN)
28. Slow wireless standard 11-18 throughput
802.11a
management services
Topology
Data Link
29. Process in which an NIDPS inspects the higher-order protocols (HTTP - FTP - Telnet) are examined for unexpected packet behavior or improper use
cabeloco
protocol data unit (PDU)
analog dis
application protocol verification
30. Assigning a unique frequency band to each communication
fat pipe
FDM
entrapment
FM
31. 2nd layer; bridges the networking media with the Network layer. Primary function is to divide the data it receives from the Network layer into frames to be transmitted by the Physical layer
Data Link layer
User Datagram Protocol (UDP)
Challenge-Response Authentication Mechanism - Message Digest 5
Network
32. Lowest or 1st layer; protocols generate and detect signals so as to transmit and receive data over a network medium - also set the data transmission rate and monitor data error rates - but do not provide error correction
Metropolitan area network (MAN)
Physical layer
public network
collision
33. MPLS
SONET
t1 connection
Hubs
multiprotocol label switching
34. Network segment that contains end nodes - such as workstations
Class B Network
Application layer
topology
Populated Segment
35. Translates data to a format the receiving node understands - such as from EBCDIC to ASCII - Performs data encryption - Performs data compression
port 110
Virtual Private Network
Physical Layer
Presention Layer (Layer 6)
36. American Standard Code for Information Interchange
star-bus hybrid topology
ASCII
MPLS
alien cross talk
37. Dynamic host configuration protocol
connectionless
DHCP
PPP
Data Link
38. A permanent telephone connection between 2 locations that provide a predetermined amount of bandwidth at all times
leased line
half duplex
mesh topology
protocol
39. Default subnet mask for 154.13.44.87
255.255.0.0
Optical Time Domain Reflectometer
DHCP
Microbrowser
40. Type of multiplexing that assigns a unique frequncy band to each communications subchannel
Half-Duplex
Frequency Division Multiplexing
satellite
Full-Duplex
41. Address Resolution Protocol
host
Hyper Text Transfer Protocol (HTTP)
fixing noise
ARP
42. The actual data - any communication that encodes a message
datagram
signal
OSI
Regeneration
43. Asynchronous digital subscriber line. Method of providing internet service that uses the standard phone line - but transmits data at a different frequency than voice. Faster than ISDN.
SSL
ADSL
Packets
L2TP
44. NTP
white/orange and orange
802.5
RIR (Regional Internet Registry)
Network Time Protocol
45. Device similar to a burglar alarm in that it detects a violation and activates an alarm.
terminator
Hyper Text Transfer Protocol (HTTP)
ISP (Internet service provider)
intrusion detection system (IDS)
46. Name Of Layer 5
Session
PDU (protocol data unit)
User Datagram Protocol
Single mode fiber
47. Http - Hypertext transfer protocol
Transport
802.3
port 80
packet filtering - application proxy
48. Communications cable that consists of one or more glass 0r plastic fiber cores inside a protective cladding material - covered by a plastic PVC outer jacket. Signal transmission along the inside fibers typically uses infrared light.
TCP/IP Vs. Netware: Transport & Internet
fiber-optic cables
intrusion reaction
serial
49. Virture privat network
Secure Copy Protocol
Fast Ethernet (characteristics)
ppptp
VPN
50. Refers to the IEEE 802.3z and IEEE 802.3ab standard for Ethernet communications speed up to 1 Gbps.
Gigabit Ethernet
plain old telephone service (POTS)
CRC (cyclic redundancy check)
alarm filtering