Test your basic knowledge |

IT: Networking Vocab

Subject : it-skills
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. CHAP






2. Round time trip. time it takes for packet to get from sender to receiver and back






3. Method of trasmitting data from a satellite






4. What is the currency of Denmark?






5. The <html> - <head> and <body> tags are all examples of ________ tags






6. Honey pot that has been protected so it cannot be easily compromised






7. NCP






8. LDAP






9. A type of address translation in which a limited pool of internet-valid IP addresses is shared by multiple private network hosts.






10. Failure of an IDPS to react to an actual attack event






11. A protocol that runs in the Dession and Transport layers of the OSI model and associates NetBIOS names with workstations. NetBIOS alone is not routable because it does not contain Network Layer information. However - when encapsulated in another prot






12. Rules determining the format and transmission of data






13. Type of switching for multiple data packets make up the same transmission and use identical paths to reach the destination






14. Tools in order to connect a new RJ45






15. The actual data - any communication that encodes a message






16. Services that allow remote users to connect to the network






17. Defines the physical characteristics of the network






18. A data transmission rate






19. International society composed of engineering professionals - promotes development and education in the electrical engineering and computer fields






20. Name Of Layer 5






21. Determines standards for the electronics industry and other fields - such as chemical and nuclear engineering - health and safety - and construction






22. What early protocol allows users to access machines remotley that has no security implemented within it?






23. A generic term referring to the header defined by some layer of a networking model - and the data encapsulated by the header ( and possibly trailer) of that layer - but specifically not including an lower-layer headers and trailers.






24. Physical layer. 1 gpbs throughput. baseband transmission. max length is 100 meters. cat 5e or higher utp. twisted pair.






25. HTTP/web/internet - change this port to make it more difficult for someone to connect to your web server






26. Transport Layer






27. Event that triggers alarms and causes an IDPS to react as if a real attack is in progress






28. TFTP is a TCP/IP file transfer protocol that is designed for task such as the transfer of data to enable a diskless workstation to boot using files trasmitted from a server






29. Used to resolve NetBIOS names w IP address






30. Intelligently direct data between networks based on addressing - patterns of usage - and availability of network segments






31. Compatible with 802.11a - b - g 600-65 throughput






32. A station checks for existing wireless transmissions before starting the transmission






33. Method of gauging the appropriate rate of data transmission based on how fast he recipient can accept data






34. A TCP/IP utility that allows you to look up the DNS host name of a network node by specifying its IP address - or vice versa. This is useful for verifying that a hos is configured correctly and for troubleshooting DNS resolution problems






35. A remote connection where the client computer is a low-end computer that communicates with a terminal server.






36. Network-max segment length-100 meters






37. A worldwide network of interconnected LANs and MANs that uses the TCP/IP protocol to enable people to shares e-mail messages and computer files and to access a vast array of information.






38. A type of cable used in network wiring and is usually shielded - which means that it is more immune to interference then unshielded cables






39. The physical layout of a computer network






40. A combination of techniques used to detect an intrusion and then to trace it back to its source






41. International society composed of engineering professionals with goals of promoting development and education in the electrical engineering and computer science fields






42. Works closely with IP in providing error and control information - by allowing hosts to exchange packet status information to help move the packets along the internetwork






43. The process of validating a user.






44. Type of protocol useful when data must be transferred quickly






45. 128 -64 -32 -16 -8 -4 -2 -1






46. A medium that carries 1 signal






47. A TCP/IP utility used to show or modify a client's host name.






48. Point of division between a telecommunications service carrier's network and a building's internal network






49. The Application layer TCP/IP subprotocol responsible for moving messages from one e-mail server to another.






50. A computer that provides client stations with access to files and printers as shared resources to a computer network