Test your basic knowledge |

IT: Networking Vocab

Subject : it-skills
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Name Of Layer 3






2. Manages end-to-end delivery of data






3. Plain old telephone service






4. Data Link Layer






5. Name Of Layer 1






6. Resistance that contributes to controlling an electrical signal; measured in ohms






7. Address Resolution Protocol






8. Occurs when attacker attempts to gain entry or disrupt normal operations of information systems - almost always with intent to do harm






9. Collection of honey pots connecting several honey pot systems on a subnet






10. Transport layer protocol that services a request without requiring a verified session and without guaranteeing delivery data






11. Analog - only one direction. radio frequency analog waves w differences in frequency. expensive - longer distance. ex. cable TV






12. Time Division Multiple Access






13. Packet a node sends to acknowledge that it received a SYN request for connection; 2nd of three-step connection process






14. IPSec






15. The combination of an IP address's network ID and subnet information. By interpreting the address's extended network prefix - a device can determine the subnet to which an address belongs.






16. Transport Layer






17. ICA






18. A device used to connect thicknet cable with a transceiver. A vampire bypasses the need to serve the cable - because the vampire tap has a metal tooth that pierces through the outside cable insulation (like a vampire) and connects with the copper wir






19. Network Layer






20. Example of an internetwork






21. Scrambles information into an alternative form that requires a key or password to decrypt the information.






22. A Data Link sublayer of the OSI model that initiates the communication link between nodes and ensures the link is not unintentionally broken.






23. Layer 3 Troubleshooting






24. An IP addressing and subnetting method in which network and host information is manipulated without adhering to the limitations imposed by traditional network class distinctions. CIDR is also known as classless routing or supernetting. Older routing






25. A thin coaxial cable usually RG-58






26. Application Layer






27. BSD






28. The pattern used to install a network medium






29. Helps you identify percentage of traffic that compromises broadcasts






30. Eight bits of information; in a digital signaling system - one byte carries one piece of information






31. Transport Layer






32. Controls how applications access network






33. The IEEE standard for broadband wireless metropolitan area networking (also known as WiMax)






34. CHAP






35. Loop back address for IPv6






36. The shorter the wavelength






37. Point of division between a telecommunications service carrier's network and a building's internal network






38. IPv6 addressing - multicast group






39. UN agency that regulates international telecommunications and provides developing countries with technical expertise and equipment to advance their technological bases






40. Most common cabling used in networking. Usually connects nodes to the main network.






41. Transforms data into a form network or applications will understand






42. A network that links multiple LANs in a large city or metropolitan region.






43. Is a protocol for defining host groups.






44. Is an e mail retival protocol designed to enabel users to access their e-mail from various locations






45. Also called the star-wired ring topology - a network design in which the logic communication are in a ring - but the phyical layout of the network star.






46. Max size of data units on Ethernet networks






47. Device used to regenerate a signal






48. Application Layer






49. Error detection and correction






50. Event that triggers alarms and causes an IDPS to react as if a real attack is in progress