Test your basic knowledge |

IT: Networking Vocab

Subject : it-skills
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. The physical layout of a computer network






2. Physical layer. 100 mpbs throughout. baseband transmission. cat 5 or higher utp. max length is 100 meters. two wire twisted pair-full duplexing.






3. A station checks for existing wireless transmissions before starting the transmission






4. Hardware device located at the ISP side of ADSL connections.






5. 2nd layer; bridges the networking media with the Network layer. Primary function is to divide the data it receives from the Network layer into frames to be transmitted by the Physical layer






6. Sequences packets in correct order






7. Anything - hardware or software - that monitors transmission of packets of digital information that attempt to pass the perimeter of a network






8. Two communication systems establish 2-way communication prior to the exchange of data






9. A service used via the Application layer to recognize and access other layers






10. User friendly web addresses are translated into IP addresses by the...






11. As defined by the EIA/TIA-568 standard - cabling that connects workstations and servers in the work area.






12. Services that allow remote users to connect to the network






13. A TCP/IP utility that allows you to look up the DNS host name of a network node by specifying its IP address - or vice versa. This is useful for verifying that a hos is configured correctly and for troubleshooting DNS resolution problems






14. Device similar to a burglar alarm in that it detects a violation and activates an alarm.






15. A computer that accesses another computer - such as a workstation that accesses a shared file on another workstation - server - or mainframe. The client may use the accessed computer (host) to process data - or may process accessed data using its own






16. Occurs when attacker attempts to gain entry or disrupt normal operations of information systems - almost always with intent to do harm






17. A route discovery and analysis utility that comes with UNIX and Linux operating systems. Mtr combines with functions of the ping and traceroute commands and delivers an easily readable chart as its output






18. Address Resolution Protocol






19. An international organization of scientists - engineers - technicians - and educators that plays a leading role in developing standards for network cabling and data transmissions.






20. The _____________ allows computers to 'talk' to themselves on a different port.






21. User datagram protocol






22. Media access control






23. FTP - file transfer- control






24. Also called the physical or MAC address - the hexadecimal number permanently assigned to a network interface and used by the MAC sublayer within the DATA Link layer (Layer 2).






25. A network on which any computer can communicate with other networked computers on an equal (peer) basic without going though an intermediary - such as a server. Peer-to-Peer networking enables each computer to offer and access shared resoures - such






26. Device that separates multiplexed signals once they are received and regenerates them in their original form






27. QoS technique enables packet switches technologies to travel over traditionally circuit switched connections






28. Pieces of hardware that connect the wire to the network device






29. The IEEE standard for broadband wireless metropolitan area networking (also known as WiMax)






30. A fixed number associated with a device's NIC






31. Private connection from a LAN to an internet service provider.






32. Serial internet protocol






33. LC






34. Name Of Layer 4






35. Signal interference caused by magnetic force field generated by electrical devices such as motors.






36. Appends physical address of destination computer onto the frame






37. Round time trip. time it takes for packet to get from sender to receiver and back






38. Is used to allow searching and updating of a directory service






39. Physical layer. 10 giga bit throughput. baseband transmission. twisted pair. max length is 100 meters. cat 6 or 7.






40. Wrapping one layer's PDU with protocol information so that it can be interpreted by a lower layer






41. Translates data to a format the receiving node understands - such as from EBCDIC to ASCII - Performs data encryption - Performs data compression






42. Describes the relative strength over a three dimensional area of an antenna






43. Device that acts as a wireless switch so that nodes can connect wirelessly to a network.






44. International society composed of engineering professionals - promotes development and education in the electrical engineering and computer fields






45. Communications cable that has no shielding material between the pair of insulated wires twisted together and the cable's outside jacket.






46. ATM






47. Requires many pulses to transmit same info that an analog can transmit in a wave






48. Set of routines that make up part of a software application






49. To make more efficient use of limited numbers of legitimate IP addressing






50. Why are web pages viewed using HTTP?