SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
IT: Networking Vocab
Start Test
Study First
Subject
:
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Each computer is connected to a central device
stateful protocol analysis (SPA) IDPS
star topology
encryption
CSMA/CD
2. Documented agreement containing technical specifications or other precise criteria used as guidelines to ensure that materials - products - processes - and services suit their intended purpose
SSL
SYN-ACK (synchronization-acknowledgment)
CSMA/CA
standard
3. The number of times a signal's amplitude changes over a fixed period of time - expressed in cycles per second - Hz
Mac Addressing
Frequency
alert or alarm
Synchronous Optical Network
4. Is a challenge respone authentication protocol
Organizational Unit
Session
CHAP
bandwidth
5. Aversion of the traceroute utility found on some Linux distributions.
Transmission media
tracepath
RTT
virture privat network (VPN)
6. A utility for viewing or modifying a host's routing table
port 143
route
bus topology
Internet Engineering Task Force (IETE)
7. Refers to the IEEE 802.3z and IEEE 802.3ab standard for Ethernet communications speed up to 1 Gbps.
coax cable connector
Gigabit Ethernet
Network interface card (NIC)
VLAN
8. Contains information that a wireless node needs to associate with an ap
star topology
TCP/UDP
broadcast frame or broadcast packet
beacon frame
9. A Data Link sublayer that examines addressing information contained in a network frame and controls how devices share communications on the same network.
media access control (MAC)
analog signal
fully distributed control strategy
redirector
10. Which address is split in to four 8-bit parts called octets?
attenuation
IP Address
UDP
Institute of Electrical and Electronics Engineers (IEEE)
11. 500 meters - 10Mbps
10BASE5 Limit
ring topology
Cross Talk
t1 connection
12. Form of transmission in which signals are modulated as radiofrequency analog pulses with different frequency ranges; does not involve binary coding
FTP
connectivity device
Broadband
Binary
13. Radio frequency interference. interference caused by radio.
telnet
ICMP
RFI
CRC (cyclic redundancy check)
14. RJ 11
telephone connector
Internet Control Message Protocol (ICMP
Radio Frequency Interference
LAN
15. Amplitude - frequency (Hz) - wavelength - wavy line
fully distributed control strategy
intrusion prevention system (IPS)
analog signal
WAN Connectivity
16. Used by web browser and web servers to exchange files
DNS
Primary Domain Controller
Hyper Text Transfer Protocol (HTTP)
firmware
17. Data Link Layer
Point-to-Point Tunneling Protocol
Attenuation
redirector
Network Switching
18. Crimp into pins 1 and 2 of RJ 45 connector
white/orange and orange
addressing
nslookup
collision
19. A computer that accesses another computer - such as a workstation that accesses a shared file on another workstation - server - or mainframe. The client may use the accessed computer (host) to process data - or may process accessed data using its own
token
Internet Information Services
client
File Transfer Protocol (FTP)
20. Progress of a wave over a time in a relationship
Transport
Correct default gateway
phase
twisted-pair cable
21. A data-link protocol used for remote networking that can exchange IP addresses - carry data by multiple network layer protocols - and support different app. protocols.
Presentation
Punch-Down Block
PPP
802.11a
22. 128 -64 -32 -16 -8 -4 -2 -1
netstat
binary
Line Printer Remote
honey net
23. A device used to connect thicknet cable with a transceiver. A vampire bypasses the need to serve the cable - because the vampire tap has a metal tooth that pierces through the outside cable insulation (like a vampire) and connects with the copper wir
Trivial File Transfer Protocol (TFTP)
network access method
FDDI
vampire tap
24. SSH - secure shell
perimeter
port 22
ADSL
IP Address
25. Alert or alarm that occurs in the absence of an actual attack
nbtstat
American Standard Code for Information Interchange (ASCII)
false positive
PDU
26. Network interface card
Half-Duplex
NIC
Network
Network Behavior Analysis
27. Ensures reliablity of packet transmissions from node to node - Ensures that data is sent and received in the same order - Provides acknowledgement when a packet is received - Monitors for packet transmission errors and resends bad packets - Breaks la
Plenum
Channel Service Unit
Kerberos
Transport Layer (Layer 4)
28. TFTP is a TCP/IP file transfer protocol that is designed for task such as the transfer of data to enable a diskless workstation to boot using files trasmitted from a server
ring topology
DSSS
EAP
Trivial File Transfer Protocol (TFTP)
29. A logical communication path established by the OSI Network layer for sending and receiving data.
virtual circuit
BSS
electromagnetic interference (EMI)
DHCP
30. Fiber-optic cable used on a network backbone for high-speed communications - such as between floors of a building.
fat pipe
NetWare Loadable Module
Secure Sockets Layer (SSL)
Application Layer (Layer 7)
31. Encompasses actions an organization takes when intrusion is detected
intrusion reaction
partially distributed control strategy
crimping tool and wore stripper
binary
32. Device that separates a medium into multiple channels and issues signals to each of those subchannels
POP (Post Office Protocol)
Network
Primary Rate Interface
Multiplexer
33. Developed by ISO and ANSI - a model that providees a framework for networked hardware and software communication based on seven layers.
client
Internet Engineering Task Force (IETE)
Open System Interconnection (OSI) referance model
Network Layer (Layer 3)
34. Ensures that messages being transmitted on the internet are private and tamper proof
protocol
Transport Layer Security (TSL)
Application
Data Link
35. The least secure authentication method
PAP
fiber optics
ring topology
Cladding
36. 3rd layer; protocols translate network addresses into their physical counterparts and decide how to route data from the sender to the receiver
extranet
Network layer
MAC sublayer
server
37. American national standards institute
ANSI
rj-11
NetWare Directory Services
NAT (Network Address Translation)
38. Services that handle hardware diagnoses and failure alerts
RFI
management services
beaconing
LLC
39. A thin coaxial cable usually RG-58
tuning
Layer 2 Forwarding
Data Link
Thin Eterhnet/10 Base 2
40. Activities finalize restoration of operations to a normal state and seek to identify source and method of intrusion to ensure same type of attack cannot occur again
2.4-GHz band
Crossover Cable
intrusion correction
Device power off
41. Signals travel in one direction
Segments
scattering
server
simplex
42. Satellite used for broadband internet access
SFP
American Wire Gauge
geosynchronous
OSI Layer 1
43. Generates signals as changes in voltage at the NIC
TCP port 23
MAC
physical layer
RFI
44. CNAME
Canonical Name
Frequency Division Multiple Access (FDMA)
Secure File Transfer Protocol
rj-11
45. A standard for encoding and interpreting binary files - images - video - and non-ASCII character sets within an e-mail message.
MIME (Multipurpose Internet Mail Extensions)
SDU
ANDing
entrance facilities
46. PDC
Electrical Signaling
Primary Domain Controller
WAN
Data Link
47. Any device connected to a network - such as a microcomputer - mainframe - midrange computer - network equipment - or printer. Also called a station.
Node
port 123
Presentation
coax cable connector
48. NDS
TFTP
network access method
simplex
NetWare Directory Services
49. Physical and Data Link layers
Password Authentication Protocol
Internet
NetWare Loadable Module
where NICs operate
50. CIFS
router
Common Internet File System
Service Set Identifier
Near End Cross Talk
Can you answer 50 questions in 15 minutes?
Let me suggest you:
Browse all subjects
Browse all tests
Most popular tests
Major Subjects
Tests & Exams
AP
CLEP
DSST
GRE
SAT
GMAT
Certifications
CISSP go to https://www.isc2.org/
PMP
ITIL
RHCE
MCTS
More...
IT Skills
Android Programming
Data Modeling
Objective C Programming
Basic Python Programming
Adobe Illustrator
More...
Business Skills
Advertising Techniques
Business Accounting Basics
Business Strategy
Human Resource Management
Marketing Basics
More...
Soft Skills
Body Language
People Skills
Public Speaking
Persuasion
Job Hunting And Resumes
More...
Vocabulary
GRE Vocab
SAT Vocab
TOEFL Essential Vocab
Basic English Words For All
Global Words You Should Know
Business English
More...
Languages
AP German Vocab
AP Latin Vocab
SAT Subject Test: French
Italian Survival
Norwegian Survival
More...
Engineering
Audio Engineering
Computer Science Engineering
Aerospace Engineering
Chemical Engineering
Structural Engineering
More...
Health Sciences
Basic Nursing Skills
Health Science Language Fundamentals
Veterinary Technology Medical Language
Cardiology
Clinical Surgery
More...
English
Grammar Fundamentals
Literary And Rhetorical Vocab
Elements Of Style Vocab
Introduction To English Major
Complete Advanced Sentences
Literature
Homonyms
More...
Math
Algebra Formulas
Basic Arithmetic: Measurements
Metric Conversions
Geometric Properties
Important Math Facts
Number Sense Vocab
Business Math
More...
Other Major Subjects
Science
Economics
History
Law
Performing-arts
Cooking
Logic & Reasoning
Trivia
Browse all subjects
Browse all tests
Most popular tests