SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
IT: Networking Vocab
Start Test
Study First
Subject
:
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Transport Layer
kereberos
Device power off
honey net
Segments
2. The most commonly used form of Internet Message Access Protocol.
IMAP4 (Internet Message Access Protocol - version 4)
Post Office Protocol 3 (POP3)
enticement
rj-11
3. Value placed upon an IDPS's ability to detect/identify certain attacks correctly
Core
Common Internet File System
NFS
confidence value
4. Cross talk with 2+ wires
MAC
terminators
router
alien cross talk
5. A TCP/IP utility that allows you to look up the DNS host name of a network node by specifying its IP address - or vice versa. This is useful for verifying that a hos is configured correctly and for troubleshooting DNS resolution problems
Institute of Electrical and Electronics Engineers
ATM
nslookup
Network Layer
6. Secure CoPy-utility that allows you to copy files securely from host to another
terminators
Demultiplexer
SCP
Same Layer Interaction
7. RJ 45
Single Mode Fiber
full duplex
twisted pair connector
Network File System
8. Signal interference caused by electrical devices that emit radio waves at the same frequency used by network signal transmissions.
FTP
bus topology
SMF
radio frequency interference (RFI)
9. Works closely with IP in providing error and control information - by allowing hosts to exchange packet status information to help move the packets along the internetwork
metropolitan area network (MAN)
Simple Mail Transfer Protocol (SMTP)
Internet Control Message Protocol (ICMP
reassembly
10. A network owned and maintained by an organization -such as a campus network operated by a college.
private network
NTP
IEEE
connectionless
11. A type of point-to-point digital WAN connection that uses standard phone lines to provide high-speed comm.
Half-Duplex
crossover cable
Transport Layer (Layer 4)
DSL
12. Developed by ISO and ANSI - a model that providees a framework for networked hardware and software communication based on seven layers.
Point-to-Point Protocol over Ethernet
Open System Interconnection (OSI) referance model
vampire tap
communications media
13. NIDPS system that examines network traffic in order to identify problems related to the flow of traffic. Most sensors are passive mode deployment only.
Dynamic Host Configuration Protocol (DHCP)
Point-to-Point
Network Behavior Analysis
star wired bus
14. An 8-bit character-coding method consisting of 96 uppercase and lowercase characters and numbers - plus 32 nonprinting characters.
American Standard Code for Information Interchange (ASCII)
port 143
ARP
Frequency Division Multiplexing
15. MSAU
Class A
Remote Authentication Dial-In User Service
microwave
MultiStation Access Unit
16. A TCP/IP utility that at its simplest returns either to IP address of a host if its host name is specified or its host name if its IP address is specified
host
rollover cable
Password Authentication Protocol
supernet
17. Ppp tunneling protocol
ppptp
OSI Layer 4
NNTP
message and circuit
18. The NIC and network equipment are set up so they cannot send and receive at the same time
Network Time Protocol
Half Duplex NIC Communication
coax cable connector
alarm filtering
19. A computer that accesses another computer - such as a workstation that accesses a shared file on another workstation - server - or mainframe. The client may use the accessed computer (host) to process data - or may process accessed data using its own
Half Duplex NIC Communication
Simple Network Management Protocol
Carrier Sense Multiple Access / Collision Detection
Client
20. Has 25 pins also commonly used with serial communication that conforms to the rs-232 standard
DB-25 connector
DTE
LC connector
TCP/IP Network Access Layer Encapsulation
21. The fact that wireless signals follow a number of paths to their destination
cross talk
DNAT
terminator
multipath
22. Large networks 1-126
Port 20
ppptp
Class A Network
encryption
23. RAS
Transmission media
SONET
Remote Access Service
Domain Name Service
24. Large diameter. led/light is generated at different angles. high throughput - high noise resistance - excellent security - and long distances
MMF
802.11g
radio frequency interference (RFI)
NIC (Network Interface Card)
25. The physical layout of cable and wireless network devices and the logical path followed by network frames or packets sent on the cable or by wireless transmissions.
configured with correct sending and receiving email server information
Topology
HTTPS
Overhead
26. The pattern used to install a network medium
GBIC
DHCP
topology
Conduit
27. A network on which any computer can communicate with other networked computers on an equal (peer) basic without going though an intermediary - such as a server. Peer-to-Peer networking enables each computer to offer and access shared resoures - such
FDDI
Secure File Transfer Protocol
peer-to-peer network
encryption
28. Provides services for applications
Application Layer (Layer 7)
Application
port 25
star topology
29. An app. that provides centralized authentication and authorization services for a network.
step-index multimode fiber-optic cable
Impedance
BGP
RADIUS
30. PDC
Primary Domain Controller
Bit
voltage
CSMA/CA
31. What type of browser is designed for use on small handheld devices such as palmtop computers and iPhones?
Data Link
collision detection
IANA
Microbrowser
32. Name Of Layer 7
TCP/IP Vs. OSI: Internet
Application
Transport
Data Link
33. Ensures reliablity of packet transmissions from node to node - Ensures that data is sent and received in the same order - Provides acknowledgement when a packet is received - Monitors for packet transmission errors and resends bad packets - Breaks la
service data unit (SDU)
802.3af
Transport Layer (Layer 4)
IANA (Internet Assigned Numbers Authority)
34. SLIP
protocol
frequency
Serial Line Internet Protocol
Unshielded twisted pair
35. Layer 2 Troubleshooting
Incorrect device drivers
Application
IGMP
alarm clustering and compaction
36. RADIUS
1000base-t
EMI
Remote Authentication Dial-In User Service
socket
37. Layer 3 Troubleshooting
Correct subnet mask
presentation layer
Secure Copy Protocol
intrusion correction
38. Name Of Layer 5
Session
network address
Main Distribution Frame
switch
39. PPP
asymmetrical transmission
Point-to-Point Protocol
signal
UTP
40. IPv6 addressing - multicast group
Repeaters
FF02
File Transfer Protocol (FTP)
routing
41. All wires are reversed
ssl
analog dis
rollover cable
bandwidth
42. Type of multiplexing that assigns a unique frequncy band to each communications subchannel
IEEE
Frequency Division Multiplexing
Challenge-Response Authentication Mechanism - Message Digest 5
Transport
43. Compatible with 802.11a - b - g 600-65 throughput
fiber-optic cables
802.11n
RS-232
cyclic redundancy check (CRC)
44. Equivalent to OSI Layer 3 Network
Internet Control Message Protocol
TCP/IP Vs. OSI: Internet
Optical Loss
FTP
45. Assigning a placeholder to each piece of a block of data to allow the receiving node's Transport layer to reassemble the data in the correct order
crossover cable
sequencing
Telnet
pstn
46. In CIDR notation - the number of bits used for an extended network prefix. For example - the CIDR block for 199.34.89.0/22 is /22
CRC (cyclic redundancy check)
CIDR block
frame
Data Link
47. Provides strung security for HTTP- transpored information - but it is only used by some vendor's application
peer-to-peer network
Data Link
MS-CHAP
Secure Hypertext Transfer Protocol (S-HTTP)
48. Computers - devices - and connectivity necessary to rebuild a network exist - and all have appropriated configured updated and connected to match your networks current state. most expensive disaster recovery contingency to maintain
perimeter
hub
hot site
802.11n
49. A type of multimode fiber-optic cable that reflects the light-based signals like a mirror within the cable - resulting in different signals arriving at different times and with an increased likeihood of distortion over longer cable runs.
step-index multimode fiber-optic cable
Data Link Layer
Dynamic Host Configuration protocol (DHCP)
Coaxial Cable
50. (local area network) network of computers and others that is confined to a relatively small space
Network interface card (NIC)
MAC address
pstn
LAN