Test your basic knowledge |

IT: Networking Vocab

Subject : it-skills
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Private connection from a LAN to an internet service provider.






2. Compresses






3. Faster wireless standard 20-25






4. Event that triggers alarms and causes an IDPS to react as if a real attack is in progress






5. IEEE standard for wireless networking






6. Layer 3 Troubleshooting






7. Allows an attached computer to act as a dumb terminal - with data processing taking place on the TCP/IP host computer






8. A network that offers services to members of the public - such as network services offered by a telecommunications company or a cable TV company.






9. The first set of six characters that make up the MAC address and that are unique to a particular manufacturer.






10. Most resistant to EMI






11. A generic term referring to any set of protocols and standards collected into a comprehensive grouping that - when followed by the devices in a network - allows all the devices to communicate. Examples include TCP/IP and OSI.






12. Documented agreement containing technical specifications or other precise criteria used as guidelines to ensure that materials - products - processes - and services suit their intended purpose






13. Networking technology developed at Xerox in the 70s and improved by Digital Equipment Corp - Inel - and Xerox. Most common form of network transmission - follows IEEE 802.3 standard






14. More variable - convey greater subtleties with less energy






15. Attachment Unit Interface Cable equipped with 15 pin connectors






16. Translates data to a format the receiving node understands - such as from EBCDIC to ASCII - Performs data encryption - Performs data compression






17. Transport Layer






18. Secure CoPy-utility that allows you to copy files securely from host to another






19. Groups of workstations are star connect to connectivity devices and then networked via single bus - cover long distances - easy to interconnect - more expensive - ethernet






20. Area above the ceiling tile or below the subfloor in a building






21. Brief delay in processing - length of cable can contribute to this






22. What is an agreed set of rules that two parties agree on in order to communicate with each other commanly known as?






23. Slow wireless standard 11-18 throughput






24. Metropolitan area network






25. IDPS that compares sampled network activity to established baseline






26. Enables the establishment of a Web connection - but it also provides for the exchange of resources - for example - displaying AOL's Web page in your brower.






27. A type of fiber optic connector. These connectors are square shaped and have release mechanisms to prevent the cable from accidentally being unplugged






28. Authentication prtocol that does not issue a challenge or require 3rd party verification of the computer requestiing authentication






29. A data-link protocol used for remote networking that can exchange IP addresses - carry data by multiple network layer protocols - and support different app. protocols.






30. Device typically used to create a VLAN






31. Services that handle hardware diagnoses and failure alerts






32. Telecommunications industry association






33. Telephone jacks






34. Strength of digital signal






35. Computers - devices - and connectivity necessary to rebuild a network exist - and all have appropriated configured updated and connected to match your networks current state. most expensive disaster recovery contingency to maintain






36. A type of multimode fiber-optic cable in which the light-based signals follow uniform curved routes inside the cable - resulting in signals that all arrive at the same time and with less long-distance distortion than step-index cable.






37. 12-character string that uniquely identifies a network node - hard coded into the NIC by the manufacturer; composed ot the block ID and device ID






38. (metropolitan area network) used with a handful of buildings and larger then a LAN - connects two or more Lans






39. Each node is connected to the two nearest nodes so that the entire network forms a circle - active - twisted pair of fiber optic - single malfunction in workstation can disable entire network - not flexible or scalbe






40. TFTP is a TCP/IP file transfer protocol that is designed for task such as the transfer of data to enable a diskless workstation to boot using files trasmitted from a server






41. Occurs when attacker attempts to gain entry or disrupt normal operations of information systems - almost always with intent to do harm






42. ISM






43. A type of point-to-point digital WAN connection that uses standard phone lines to provide high-speed comm.






44. Type of interference that may be caused by motors - power lines - televisions - copiers - etc






45. A combination of techniques used to detect an intrusion and then to trace it back to its source






46. Is a host-to-host protocol like TCP - however it does not include mechanisms for ensuring timely delivery






47. AM






48. A type of subnet that is created using bits that normally would be reserved for network class information by moving the subnet boundary to the left.






49. AH






50. Gigabit Interface Converter - Plugs in to an interface on a switch