SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
IT: Networking Vocab
Start Test
Study First
Subject
:
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Is an e mail retival protocol designed to enabel users to access their e-mail from various locations
Inter Message Access Protocol (IMAP)
Trivial File Transfer Protocol (TFTP)
full duplex
udp
2. MSAU
coaxial cable
CHAP
MultiStation Access Unit
fat pipe
3. Data circuit-terminating equipment. multiplexer or modem
DCE
goodput
802.11b
Private Network
4. Is associated with unix/linux networks
POP3 (Post Office Protocol - version 3)
Secure Copy
802.2
Class E Network
5. Tool used to determine whether a customers line is obtaining dial tone from the CO
Internet Engineering Task Force (IETE)
port 25
butt set
OSI model
6. HTTPS - Secure implementation of HTTP
Single Mode Fiber
port 443
Localhost
Default Gateway
7. Positive and zero. 1 and 0's.
soft skills
Remote Desktop Protocol
binary
wide area network (WAN)
8. Transport Layer
OSI Layer 7
Flow Control
RFI
port 69
9. Layer 2 Troubleshooting
Post Office Protocol 3 (POP3)
Internet Message Access Protocol version 4
Routing
Incorrect device drivers
10. Process in which an NIDPS inspects the higher-order protocols (HTTP - FTP - Telnet) are examined for unexpected packet behavior or improper use
PSTN
fault tolerance
application protocol verification
Core Gateway
11. On a computer that receives data over a network - the process in which the device interprets the lower-layer headers and - when finished with each header - removes the header - revealing the next-higher-layer PDU.
Class B Network
Decapsulation
electromagnetic interference (EMI)
Conduit
12. Routers work here
5-4-3 rule
Secure File Transfer Protocol
Network
FDM
13. Protocol that encapsulates data for transmission over VPNs
Data Link Layer
Simple Mail Transfer Protocol (SMTP)
ATU-R
L2TP
14. ARP
subnetting purpose
NIC (Network Interface Card)
Address Resolution Protocol
802.11b
15. Rules and configuration guidelines governing implementation and operation of IDPSs within an organization
site policy
OSI
Physical
MAC sublayer
16. Compresses
NIC
Presentation
collision
omnidirectional antenna
17. Open Systems Interconnection model
binary
OSI Layer 7
OSI
MPLS
18. After typing ping 127.0.0.1 - it tells you the test failed
Application
Private Network
Network
TCP/IP protocol failure
19. Multiplexing based on priority
Multiplexing
site policy
statistical multiplexing
PING
20. Unix command at shell prompt to send a file to printer
tracepath
lpr filename
SLIP
installing cable
21. A network that offers services to members of the public - such as network services offered by a telecommunications company or a cable TV company.
Amplitude Modulation
public network
installing cable
EAPoL
22. A type of cable used in network wiring and is usually shielded - which means that it is more immune to interference then unshielded cables
Access Control List
TCP/IP Vs. OSI: Application
t1 connection
Coaxial Cable
23. User watching an episode of TV show over the internet is what kind of communication
RS 232
protocol and services
RIP
point to multipoint
24. The physical layout of cable and wireless network devices and the logical path followed by network frames or packets sent on the cable or by wireless transmissions.
header
Point-to-Point Tunneling Protocol
Topology
802.3
25. The sender transmits the data to the destination without establishment of a connection.
connectionless
Firewall Filtering
Internet
Transport
26. A process that ensures one device does not send information faster than it can be received by another device.
CSMA/CD
ring topology
transport layer
flow control
27. More variable - convey greater subtleties with less energy
TDM
signal
analog adv
TCP/UDP
28. Any device connected to a network - such as a microcomputer - mainframe - midrange computer - network equipment - or printer. Also called a node.
star-ring hybrid topology
Internet Control Message Protocol
station
FDMA
29. Application layer protocol used to access information stored in a directory
Peer-to-peer network
LDAP
topology
Trivial File Transfer Protocol (TFTP)
30. AD
802.5
hot site
Active Directory
2.4-GHz band
31. Slow wireless standard 11-18 throughput
half duplex
802.11a
Media Dependent Interface Crossover
RealVNC
32. A device used to connect thicknet cable with a transceiver. A vampire bypasses the need to serve the cable - because the vampire tap has a metal tooth that pierces through the outside cable insulation (like a vampire) and connects with the copper wir
Kroner
proxy server
EIA
vampire tap
33. SFTP
protocol
metropolitan area network (MAN)
Topology
Secure File Transfer Protocol
34. ICA
asymmetrical transmission
Application
site policy
Independent Computer Architecture
35. AH
Network Layer (Layer 3)
inline sensor
Authentication Header
physical media
36. Each node is connected to the two nearest nodes so that the entire network forms a circle - active - twisted pair of fiber optic - single malfunction in workstation can disable entire network - not flexible or scalbe
IANA (Internet Assigned Numbers Authority)
Point-to-Multipoint
ring topology
Transport
37. A generic term referring to the header defined by some layer of a networking model - and the data encapsulated by the header ( and possibly trailer) of that layer - but specifically not including an lower-layer headers and trailers.
Protocol Data Unit
Multimode fiber
monitoring port (SPAN port)
ANDing
38. Electronics industries Alliance
Star topology
SMTP
EIA
Internet Assigned Numbers Authority
39. Network device that makes high-level application connections on behalf of internal hosts and other machines
IANA
port 53
proxy server
AM
40. A term used to refer to data within the Data-link layer of the OSI model.
socket
FDM
Server
frame
41. Twist wire so you don't get interference on the memory
fiber optic cable
fixing cross talk
User Datagram Protocol (UDP)
ATM
42. Activities finalize restoration of operations to a normal state and seek to identify source and method of intrusion to ensure same type of attack cannot occur again
frame
BOOTP
intrusion correction
Packets
43. In CIDR notation - the number of bits used for an extended network prefix. For example - the CIDR block for 199.34.89.0/22 is /22
CIDR block
fixing attenuation
Simple Network Management Protocol
ISOC
44. A transport system that uses the CSMA/CD access method for data transmission on a network. Typically it is implemented in a bus or star-bus hybrid topology.
MS-CHAP
port 123
Ethernet
Backbone
45. Which class of IP address would be allocated to a very large company?
NetWare Core Protocol
RIP
Class A
cross talk
46. A protocol that runs in the Dession and Transport layers of the OSI model and associates NetBIOS names with workstations. NetBIOS alone is not routable because it does not contain Network Layer information. However - when encapsulated in another prot
Session
802.3
Gigabit Ethernet (fiber characteristics)
NetBIOs
47. Does not operate at the application layer
ARP
100base-tx
PSTN
Gigabit Ethernet
48. Name Of Layer 1
overhead
protocol
Physical
Data Link
49. Consists of activities that deter intrusion
transmission media
intrusion prevention
port 143
SNAT (Static Network Address Translation)
50. Lower sublayer of the Data Link layer; appends the physical address of the destination computer onto the fram
MAC (Media Access Control) sublayer
TCP/IP Vs. OSI: Internet
bayonet nut connector (BNC)
RAS