Test your basic knowledge |

IT: Networking Vocab

Subject : it-skills
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. The cabling or radio waves used to connect one network computer to another - or one network to another - and transport data between them. - Means by which a communications signal is carried from one system to another (for example - twisted-pair wire






2. FTP - file transfer- control






3. Strategy in which all control functions are applied at the physical location of each IDPS component






4. Large diameter. led/light is generated at different angles. high throughput - high noise resistance - excellent security - and long distances






5. Pointing in a direction






6. Measure of the difference between the highest and lowest frequencies that a medium can transmit






7. A TCP/Ip troubleshooting utility that displays statistics and the state of current TCP/IP connections. It also displays ports - which can signal whether services are using the correct ports.






8. Pipeline used to contain and protect cabling; usually made from metal






9. Follow TIA/EIA 568 specifications






10. Data only






11. Two twisted wire pairs. It's the oldes type and is only voice grade - it isn't rated for data communication.






12. Layer 5






13. Open Systems Interconnection model






14. Hubs and switches work here






15. Device similar to a burglar alarm in that it detects a violation and activates an alarm.






16. Device that can detect intrusion and launch an active response






17. Layer 1 Troubleshooting






18. Layer 1






19. The IEEE standard for broadband wireless metropolitan area networking (also known as WiMax)






20. The Application layer TCP/IP subprotocol responsible for moving messages from one e-mail server to another.






21. Internet Engineering Task Force






22. Activities finalize restoration of operations to a normal state and seek to identify source and method of intrusion to ensure same type of attack cannot occur again






23. OU






24. Device that receives and retransmits microwave data signals






25. A transmitter concentrates the signal energy at a single frequency or in a very small range of frequencies






26. LC






27. Uses frame headers






28. An advantage of networks






29. 1000 representatives from industry and gov't who determine standards for electronics - chemical and nuclear engineering - health and safety - and construction






30. Packet a node sends to acknowledge that it received a SYN request for connection; 2nd of three-step connection process






31. First set of six characters that make up the MAC address and that are unique to a particular manufacturer






32. IEEE standard describing specifications for wireless transmissions






33. Type of transmission in which signlas may travel in both directions over a medium - but only in one direction at a time






34. Network standard that can reliaby transmit data farthest






35. Fiber optic - enables one fiber optic connection to carry multiple light signals simultaneously






36. Several ethernet nodes can be connected and can monitor traffic or access media simultaneously






37. Type of multiplexing that assigns a unique frequncy band to each communications subchannel






38. Term that describes current anti-intrusion technologies






39. The _____________ allows computers to 'talk' to themselves on a different port.






40. Attachment Unit Interface Cable equipped with 15 pin connectors






41. Ethernet NICs listen on network and wait until they detect no other nodes transmitting data






42. Serves as a translator; manages data encryption






43. Also called the star-ring hybrid - topology - a network design in which the logic communication are in a ring - but the phyical layout of the network star.






44. Useful for troubleshooting a network connectivity problem from workstation to another workstation






45. A cable that consists of a single cable sheath containing a combination of fibers and copper cable.






46. Frequency modulation-frequency of signal is modified






47. HDLC






48. A worldwide network network of interconnected LANs - and MANs - that uses the TCP/IP protocol to enable people to share e-mail messages and computer files and to access a vast array of infromation.






49. A series of interconnected computers - printing devices - and other computer equipment that share hardware and software resources. The services area usually is limited to a given office - floor - or building.






50. CIFS