SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
IT: Networking Vocab
Start Test
Study First
Subject
:
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Only two wire pairs are reversed
Data Link
Gigabit Interface Converter
ISO
crossover cable
2. Authentication prtocol that does not issue a challenge or require 3rd party verification of the computer requestiing authentication
TFTP
subnetting purpose
1000base-lx
kereberos
3. The cableing or radio waves used to connect one network computer to another - or one network to another - and transport data between them.
RealVNC
communications media
Class C Network
ARP
4. Each node is connected to the two nearest nodes so that the entire network forms a circle - active - twisted pair of fiber optic - single malfunction in workstation can disable entire network - not flexible or scalbe
ring topology
Frequency Division Multiplexing
protocol data unit (PDU)
hybrid fiber / coax (HFC) cable
5. IMAP4
MPLS
Internet Message Access Protocol version 4
Presention Layer (Layer 6)
Latency
6. MX
step-index multimode fiber-optic cable
Fast Ethernet
signature-based (knowledge-based - misuse-detection) IDPS
Mail Exchanger
7. Secure Hypertext Transfer Protocol
bandwidth
fragmentation
S-HTTP
modem
8. Computers - devices - and connectivity necessary to rebuild a network exist - and all have appropriated configured updated and connected to match your networks current state. most expensive disaster recovery contingency to maintain
Challenge Handshake Authentication Protocol
Transport layer
Secure Copy Protocol
hot site
9. A specialized UN agency that provides developing countries with technical expertise and equipment
Telnet
Cross Talk
ITU
Transport Layer
10. L2TP
telnet
Layer 2 Tunneling Protocol
star wired bus
dedicated lines
11. Prevents broadcast storms by enabling switches to calculate paths that avoid potential loops and artificially block the links that would complete a loop
star topology
Internet Key Exchange
STP
CSMACD
12. OTDR
goodput
ICS (Internet Connection Sharing)
analog adv
Optical Time Domain Reflectometer
13. AM
synchronous communications
802.2
Amplitude Modulation
Presentation
14. Hubs and switches work here
Data Link
public switched telephone network (PSTN)
Frequency Modulation
TCP/IP
15. Cabling that transmit data using light waves. Higher bandwidth than other types of cabling.
Channel
terminal
AM
fiber optics
16. PPPoE
Point-to-Point Protocol over Ethernet
Microbrowser
Hyper Text Transfer Protocol (HTTP)
Channel Service Unit
17. GPO
Group Policy Object
Application layer
Presentation
Presentation Layer
18. Lower sublayer of the Data Link layer; appends the physical address of the destination computer onto the fram
Application
router
SNMP
MAC (Media Access Control) sublayer
19. NTP
Network Time Protocol
duplex
Loose network cable connection
Data Terminal Equipment
20. To make more efficient use of limited numbers of legitimate IP addressing
TCP/IP Architecture Layer 2
broadband
subnetting purpose
Transport
21. MPLS
Correct default gateway
enterprise network
multiprotocol label switching
Network Address Translation
22. A cable TV company - such as Comcast Broadband.
Hubs
Inter Message Access Protocol (IMAP)
cabeloco
Decapsulation
23. Traces path from one network node to another - identifying all intermediate hops b/w two nodes
rj-11
POP3
Hyper Text Transfer Protocol (HTTP)
tracert
24. A computer on a network that requests services or resources from another computer on a network
ICMP
CSU/DSU
workstation
fractionalizing
25. 7th layer; protocols enable software programs to negotiate formatting - procedural - security - synchronization - and other requirements with the network
SMF
Media Dependent Interface
Application layer
Data Link
26. The way nodes responds to a collision
Internet Relay Chat
collision detection
LAN
analog dis
27. Form of transmission in which digital signals are sent through direct current pulses applied to a wire; can only send one signal at a time
Baseband
Private Network
IMAP (Internet Message Access Protocol)
telnet
28. Media Access Unit (transmitter/ receiver)
ESS
application protocol verification
MAU
Point-to-Point Protocol over Ethernet
29. Is a challenge respone authentication protocol
intrusion reaction
Demarcation Point
Cladding
CHAP
30. Process of grouping almost identical alarms occurring at almost same time into single higher-level alarm
alarm clustering and compaction
Internet Group Multicast Protocol
dig (domain information groper)
plenum area
31. The seventh layer of the OSI model. Application layer protocols enable software programs to negotiate formatting - procedural - security - synchronization - and other requirements with the network.
confidence value
DSLAM
EAPoL
Application Layer
32. The medium that carries multiple signals simultaneously
broadband
alert or alarm
driver
OSI
33. EMI interference induced on one cable by signals traveling on a nearby cable
Point-to-Point Protocol over Ethernet
PPP
FTP
Alien Cross Talk
34. Strategy in which all control functions are applied at the physical location of each IDPS component
Network File System
cyclic redundancy check (CRC)
full duplex
fully distributed control strategy
35. User watching an episode of TV show over the internet is what kind of communication
intrusion prevention
Secure Shell (SSH
point to multipoint
1000base-sx
36. A connecting device for a network that accepts messages and broadcasts them out to the rest of the network.
Workstation
Server
Institute of Electrical and Electronics Engineers (IEEE)
hub
37. A network design consisting of a continuous path for data with no logical beginning or ending point - and thus no terminators.
CRC (cyclic redundancy check)
ring topology
Wide area network (WAN
datagram
38. This phase determines how often systems should send each other quality statistics.
full duplex
link quality monitoring
POP3
Incorrect device drivers
39. Can use WPA to improve the security of data in transit
802.11
802.11b
LAN
protocol data unit (PDU)
40. Application Layer
Data Link
CRC (cyclic redundancy check)
Client Software
802.11b
41. Single mode fiber
SMF
ssl
analog signal
fully distributed control strategy
42. An international body that establishes communications and networking standards - and that is particularly known for its contributions to network protocol standards.
attenuation
EAPoL
ISOC
International Organization for Standardization (ISO)
43. Length of time it takes for a packet to go from sender to receiver - then back to sender; measured in milliseconds
stateless firewall
FF02
Round Trip Time
transceiver
44. Internet society
LC connector
Asynchronous Transfer Mode
ISOC
EAPoL
45. The physical cables that link computers in a network
NetBIOs
physical media
Challenge-Response Authentication Mechanism - Message Digest 5
utp
46. Pieces of hardware that connect the wire to the network device
token ring
Connectors
Frequency
Post Office Protocol 3 (POP3)
47. Institute of electrical and electronics engineers
switch
API (application program interface)
IEEE
TFTP
48. A network owned and maintained by an organization -such as a campus network operated by a college.
private network
bus topology
Structure
MS-CHAP
49. A service used via the Application layer to recognize and access other layers
MultiStation Access Unit
Data Link
FF02
redirector
50. The IEEE standard for token ring networking devices and data handling.
EAPoL
802.5
route
Attenuation