SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
IT: Networking Vocab
Start Test
Study First
Subject
:
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A TCP/IP utility that queries the DNS database and provides information about a host given its IP address or vice versa. Dig is similar to the nslookup utility - but provides more information - even in its simplest form - than nslookup can.
port 25
bandwidth
NetWare Core Protocol
dig (domain information groper)
2. Synchronises data exchange
Networking Model
back hack
satellite
Session
3. IEEE standard for wireless networking
topology
star-bus hybrid topology
802.44
SFP
4. The wave bounces back when encountering an object
Local area network (LAN)
Local Connector
reflection
Analog
5. Is a protocol designed for managing complex networks
Simple Network Management protocol (SNMP)
ICANN (Internet Corporation for Assigned Names and Numbers)
Modulation
CSMA/CA
6. VPN
connectivity device
Presentation layer
Internet Protocol
Virtual Private Network
7. IANA
Data Link
Internet Assigned Numbers Authority
TCP/IP Vs. Netware: Network Access
RIR (Regional Internet Registry)
8. An international body that establishes communications and networking standards - and that is particularly known for its contributions to network protocol standards.
International Organization for Standardization (ISO)
port 21
LAN
Session
9. A specially configured connection on a network device that is capable of viewing all the traffic that moves through the entire device.
ANSI
monitoring port (SPAN port)
Primary Rate Interface
coax cable connector
10. Process by which attacker changes the format and/or timing of their activities to avoid being detected by the IDPS
intrusion prevention
evasion
Punch-Down Block
CSMA/CD
11. Decoy systems designed to lure potential attackers away from critical systems
Internet Connection Sharing
node
NetWare Directory Services
honey pot
12. What is the currency of Denmark?
66 Block
client/server
Kroner
fragmentation
13. FDM
Session
VPN
Frequency Division Multiplexing
connectivity device
14. American national standards institute
ANSI
Shielded Twised Pair
Active Directory
Coaxial Cable
15. Hackers sending emails to make it look like its legit and its actually dangerous to the workstation
connectionless
cat 5
phishing
Network Time Protocol (NTP)
16. Actual. how much data is transmitted during given time
logical address
OSI (Open Systems Interconnection) model
throughput
analog dis
17. Transmission that involves one transmitter and multiple - undefined receivers
twisted-pair cable
Media Dependent Interface Crossover
Broadcast
Network Time Protocol
18. Carrier Sense Multiple Access with Collision Detection
Internet Assigned Numbers Authority
virtual circuit
ITU
CSMACD
19. PPTP
MAC sublayer
OSI model
Inter Message Access Protocol (IMAP)
Point-to-Point Tunneling Protocol
20. A resistor that is connected to the end of a segment on a bus network - so that data-carrying signals are absorbed at the point where the segment stop. Aborbing the signals ensures they are not reflected back onto the cable after they reach the end-t
File Transfer Protocol (FTP)
Data Link (Layer 2)
NIC (Network Interface Card)
terminator
21. Consists of activities that deter intrusion
host-based IDPS (HIPDS)
10Gbase-t
block ID
intrusion prevention
22. International Organization for Standardization
Multiplexing
extranet
ISO
Bus topology
23. What early protocol allows users to access machines remotley that has no security implemented within it?
Telnet
802.3
Terminator
Connectors
24. FTP-Data - file transfer data
router
block ID
Port 20
Boot Protocol /Bootstrap Protocol
25. Public switched telephone network
Multistation Access Unit
logical address
pstn
Data Circuit-Terminating Equipment
26. Is a challenge respone authentication protocol
Faulty network cable
Noise
trap and trace
CHAP
27. An algorithm used to verify the accuracy of data contained in a data frame.
Data Link
spread-spectrum
Class D Network
CRC (cyclic redundancy check)
28. A network on which any computer can communicate with other networked computers on an equal (peer) basic without going though an intermediary - such as a server. Peer-to-Peer networking enables each computer to offer and access shared resoures - such
802.5
peer-to-peer network
terminator
honey net
29. Secures messages being transmitted on the internet - uses RSA for authentication and encyption.
Secure Sockets Layer (SSL)
noise
SSL
Structure
30. A type of cable used in network wiring and is usually shielded - which means that it is more immune to interference then unshielded cables
Coaxial Cable
IEEE
Alien Cross Talk
twisted-pair cable
31. Loop back address for IPv6
Frequency Modulation
Telnet
::1
(fiddy) Fiber Distributed Data Interface
32. MSAU
authentication
MultiStation Access Unit
LLC (Logical Link Control) sublayer
Secure Sockets Layer (SSL)
33. Developed by ISO and ANSI - a model that providees a framework for networked hardware and software communication based on seven layers.
Application
Open System Interconnection (OSI) referance model
RARP
Fast Ethernet (characteristics)
34. Type of protocol useful when data must be transferred quickly
protocol
connectionless
802.16
Terminator
35. Type of punch-down block used to terminate telephone circuits; does not meet Cat 5 or better standards
Physical Layer
66 Block
Data Link
Category 6
36. Device used to regenerate a signal
Asymmetric Digital Subscriber Line
intrusion detection
Application Layer (Layer 7)
Repeater
37. The sender transmits the data to the destination without establishment of a connection.
TDM
Network layer
Microbrowser
connectionless
38. IPv6 addressing - multicast group
FF02
socket
Segment
Gigabit Interface Converter
39. Medium network 128-191
Optical Loss
Class B Network
ICANN (Internet Corporation for Assigned Names and Numbers)
NetWare Loadable Module
40. IMAP4
Application Layer
Address Resolution Protocol
Internet Message Access Protocol version 4
Multiplexer
41. Technique for formatting signals in which one property of a carrier wave is modified by the addition of a data signal during transmission
Modulation
ATM
Radio Waves
Data Circuit-Terminating Equipment
42. Analog - only one direction. radio frequency analog waves w differences in frequency. expensive - longer distance. ex. cable TV
metropolitan area network (MAN)
alarm clustering and compaction
broadband
diffraction
43. Secure CoPy-utility that allows you to copy files securely from host to another
Ethernet
coaxial cable
SCP
standard connector
44. MIB
Management Information Base
honey net
Frequency Division Multiple Access (FDMA)
protocol
45. OSPF
fractionalizing
Open Shortest Path First
SIP
Organizational Unit
46. Appends physical address of destination computer onto the frame
SMF
MAC address
MAC sublayer
utp
47. Multicast group 224-239
Class D Network
SSID
Amplitude Modulation
Line Printer Remote
48. A standard for encoding and interpreting binary files - images - video - and non-ASCII character sets within an e-mail message.
frequency
Ethernet (characteristics)
network-based IDPS (NIDPS)
MIME (Multipurpose Internet Mail Extensions)
49. The process of determining the best path from Point A on one network to Point B on another
bridge
SYN (syncronization)
routing
router
50. Two communication systems establish 2-way communication prior to the exchange of data
BGP
connection
10BASE5 Limit
MAC address