SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
IT: Networking Vocab
Start Test
Study First
Subject
:
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Error detection and correction
connectivity device
Application Layer
Transport
Asynchronous Transfer Mode
2. Cross talk with 2+ wires
Session
message and circuit
WAN
alien cross talk
3. A command-line utility that combines the functionality of the tracert and ping commands (similar to UNIX's mtr command) and comes with Windows XP - Vista - and Windows Server 2003 and Server 2008
pathping
802.11b
STP
NTP
4. A thin coaxial cable usually RG-58
Institute of Electrical and Electronics Engineers (IEEE)
Twister Pair Cable
Thin Eterhnet/10 Base 2
Ethernet
5. ICS
Media Dependent Interface Crossover
802.11
Internet Connection Sharing
OSI Layer 1
6. Standards organizations representing 157 countries headquartered in Geneva. Goal is to establish international standards to facilitate global exchange of information and barrier-free trade
Application
ISO (International Organization for Standardization)
Network interface card (NIC)
TCP/IP Architecture Layer 3
7. Strategy that combines the best of the other two strategies; while individual agents still analyze and respond to local threats - their reporting to a hierarchical central facility enables the organization to detect widespread attacks
::1
Data Circuit-Terminating Equipment
partially distributed control strategy
padded cell
8. Honey pot that has been protected so it cannot be easily compromised
padded cell
pathping
Internet Protocol Security
collision
9. A transport system that uses the CSMA/CD access method for data transmission on a network. Typically it is implemented in a bus or star-bus hybrid topology.
Straight tip connector
throughput
Ethernet
Thin Eterhnet/10 Base 2
10. Local area network
ISDN
LAN
Service Set Identifier
Class B Network
11. An advantage of networks
intrusion detection system (IDS)
FTP
networks enable users to share resources
802.11
12. Does not operate at the application layer
ARP
Network
IEEE (Institute of Electrical and Electronics Engineers)
Trivial File Transfer Protocol (TFTP)
13. Data Link Layer
Network
Hyper Text Transfer Protocol (HTTP)
kereberos
Frames
14. Total amount of communication cable that make up a network.
authentication
Braiding
cable plant
Line Printer Remote
15. A computer that accesses another computer - such as a workstation that accesses a shared file on another workstation - server - or mainframe. The client may use the accessed computer (host) to process data - or may process accessed data using its own
microwave
client
cross talk
signature-based (knowledge-based - misuse-detection) IDPS
16. Physical layer. 10 mpbs throughput. baseband transmission. max length is 100 meters. follows 5-4-3 rule. star topology. cat 3 or higher utp. twisted pair.
terminators
digital
10base-t
Physical Layer (Layer 1)
17. As defined by the EIA/TIA-568 standard - cable that runs between network equipment rooms - floors - and buildings.
backbone cabling
Internet Information Services
t1 connection
bus topology
18. A route discovery and analysis utility that comes with UNIX and Linux operating systems. Mtr combines with functions of the ping and traceroute commands and delivers an easily readable chart as its output
mtr (my traceroute)
Routing
Network Layer (Layer 3)
Firewall Filtering
19. MDIX
intrusion prevention system (IPS)
message and circuit
Latency
Media Dependent Interface Crossover
20. The physical layout of a computer network
Internet
Shielded Twised Pair
pppoe
topology
21. Control frame that indicates to the rest of the network that a particular node has the right to transmit data
token
Session
public network
Flow Control
22. A very high speed - long distance media that consists of a single strand of fiber glass that carries the signals. Can transmit data 50 times further than multimode fiber at a faster rate
Single mode fiber
network
Session Layer
SLIP
23. Data Link Layer
dedicated lines
modifying the file-sharing controls
Plenum
Network Switching
24. Short reach. only multimode-max length is 500. baseband transmission. 1000 mpbs.
TCP/IP Vs. OSI: Application
1000base-sx
Conduit
protocol and services
25. Name Of Layer 5
MAC address
Session
802.11b
POP3 (Post Office Protocol - version 3)
26. Large diameter. led/light is generated at different angles. high throughput - high noise resistance - excellent security - and long distances
narrowband
Industrial - Scientific - and Medical
MMF
star wired bus
27. RJ 45
stp
twisted pair connector
TCP/IP Vs. Netware: Network Access
monitoring port (SPAN port)
28. What is the term used when every host on the network has a fixed IP address?
router
Class E Network
star-ring hybrid topology
Static IP Addressing
29. An error detection method that calculates a value for the total size of the information fields contained in a frame. The value is inserted near the end of a frame by the Data Link layer on the sending node - and checked by the Data Link layer on the
cyclic redundancy check (CRC)
Data Link
LDAP
Presentation layer
30. After typing ping 127.0.0.1 - it tells you the test failed
TCP/IP protocol failure
star-wired bus topology
Transport
Transport layer
31. Data only
fingerprinting
token ring
stateful protocol analysis (SPA) IDPS
goodput
32. Any device connected to a network - such as a microcomputer - mainframe - midrange computer - network equipment - or printer. Also called a node.
802.11n
station
baseband
wavelength
33. Networking technology developed at Xerox in the 70s and improved by Digital Equipment Corp - Inel - and Xerox. Most common form of network transmission - follows IEEE 802.3 standard
encapsulate
Ethernet
host
demilitarized zone
34. Lower sublayer of the Data Link layer; appends the physical address of the destination computer onto the fram
redirector
MAC (Media Access Control) sublayer
topology
DSL
35. A permanent telephone connection between 2 locations that provide a predetermined amount of bandwidth at all times
Domain Name Service
leased line
incremental backup
broadcast frame or broadcast packet
36. Two twisted wire pairs. It's the oldes type and is only voice grade - it isn't rated for data communication.
802.5
beaconing
stateful protocol analysis (SPA) IDPS
Category 1
37. A network that links multiple LAN's in large city or metropolitan region.
HTTP
metropolitan area network (MAN)
Telnet
fixing cross talk
38. Routing protocol most likely used to replace a router for that handles traffic to and from the companies connection to its NSP
hot site
BGP
cabeloco
802.11
39. Connects multiple LANs
SMTP
WAN
collision detection
Open Shortest Path First
40. A computer that accesses another computer - such as a workstation that accesses a shared file on another workstation - server - or mainframe. The client may use the accessed computer (host) to process data - or may process accessed data using its own
wavelength
bandwidth
Client
carrier sense
41. Pulses of precise - positive voltages and zero voltages (binary)
Domain Name
digital signal
point to multipoint
Institute of Electrical and Electronics Engineers (IEEE)
42. Produces guidelines for how network cable should be installed in commercial buildings
intrusion prevention
Amplitude Modulation
EIA/TIA
FDM
43. Unshielded twisted pair
TCP/IP Architecture Layer 1
physical layer
utp
Secure Sockets Layer (SSL)
44. Asynchronous digital subscriber line. Method of providing internet service that uses the standard phone line - but transmits data at a different frequency than voice. Faster than ISDN.
EIA/TIA
ADSL
Line Printer Remote
Open Shortest Path First
45. Is a file transfer protocol that uses s ecure shell (SSH)
Ring topology
stateful firewall
Transport layer
Secure File Transfer Protocol (SFTP)
46. A computer that has its own CPU and may be used as a stand-alone computer for word processing - spreadsheet creation - or other software applications. It also may be used to access another computer such as another workstation or server via a network.
Workstation
half duplex
Noise
analog adv
47. An International organization of scientists - engineers - technicians - and educators that play a leading role in developing standards for network cabling and data transmissions.
Noise
RARP
port 69
Institute of Electrical and Electronics Engineers (IEEE)
48. Defines the physical characteristics of the network
logical link control (LLC)
Physical
802.11
star topology
49. Media Access Unit (transmitter/ receiver)
Latency
MAU
digital adv
MPLS
50. User friendly web addresses are translated into IP addresses by the...
Domain Name Service
Session Layer
802.44
authentication