SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
IT: Networking Vocab
Start Test
Study First
Subject
:
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Twisted pair cable consisting of a number of twisted pairs of copper wire with a simple plastic casing. Because - no shielding is used in this cable - it is very susceptible to EMI - RFI - and other types of interference
Classful Addressing
Session layer
Unshielded twisted pair
Regeneration
2. A digital communication service that uses the same network infrastructure as PSTN - but is expensive
TCP/IP Vs. Netware: Application
ISDN
Domain Name Service
Trivial File Transfer Protocol (TFTP)
3. UN agency that regulates international telecommunications and provides developing countries with technical expertise and equipment to advance their technological bases
bandwidth
ITU (International Telecommunication Union)
link establishment phase
EIA (Electronics Industries Alliance)
4. Wavelength division multiplexing
ARP
WDM
Conduit
firewall
5. Amplitude - frequency (Hz) - wavelength - wavy line
slip
analog signal
PPP
Asynchronous Transfer Mode
6. The way nodes responds to a collision
headened
Regeneration
Service Set Identifier
collision detection
7. A unit of data transmitted on a network that contains control and address information corresponding to the OSI Data Link layer - or Layer 2.
FTP
Client
frame
presentation layer
8. Transport Layer
network class C
Networking Model
TCP/IP Transport Layer Encapsulation
TCP/IP Architecture Layer 3
9. Controls how applications access network
Application
access services
digital adv
UDP
10. Total amount of communication cable that make up a network.
cable plant
Crosstalk
OSI model
128 - 64 - 32 - 16 - 8 - 4 - 2 - 1
11. AH
Bend Radius
standard connector
Authentication Header
fiber optic cable
12. A mail retrieval protocol that improves on the shortcomings of POP. The single biggest advantage IMAP4 has relative to POP is that it allows users to store messages on the mail server - rather than always having to download them to a local machine.
Session
connectivity device
Simple Mail Transfer Protocol (SMTP)
IMAP (Internet Message Access Protocol)
13. Metropolitan area network
Demarcation Point
File Transfere Protocol - (FTP)
LAN
MAN
14. Encrypts
Presentation
MAC (Media Access Control) sublayer
IGMP
footprinting
15. A type of cable used in network wiring and is usually shielded - which means that it is more immune to interference then unshielded cables
GBIC
Internet Message Access Protocol version 4
public network
Coaxial Cable
16. Layer 1 Troubleshooting
Faulty network cable
FTP
NIC
FDMA
17. (fix) if analog shield twisted pairs or if digital with a repeater
protocol stack verification
fixing noise
physical media
ICS (Internet Connection Sharing)
18. Which protocol allows users to send emails?
checksum
Internet Protocol
SMTP
traceroute (tracert)
19. Example of an internetwork
SMTP
frequency
Internet
sequencing
20. Hub/repeaters
isdn
physical layer device
cable plant
TCP/IP Architecture Layer 4
21. Layer 1 Troubleshooting
Incorrect cable type
encryption
DNAT (Dynamic Network Address Translation)
Impedance
22. This layer in the OSI network model breaks up the files into packets to allow them to be sent around the network.
LLC
goodput
Transport Layer
Physical
23. Connector used with single mode and multimode fiber optic cable
802.3
Point-to-Multipoint
LC connector
Secure Shell
24. Two communication systems establish 2-way communication prior to the exchange of data
session
WINS
protocol
connection
25. IDPS that reviews log files from servers - network devices - and other IDPSs for signatures indicating an attack or intrusion
Apple File Protocol
ICS (Internet Connection Sharing)
Presentation
log file monitor (LFM) IDPS
26. AMI
Secure Sockets Layer (SSL)
pstn
Alternate Mark Inversion
transceiver
27. Zeroconf
Private Network
Zero Configuration
telephone connector
SNMP
28. Layer 2 Troubleshooting
FDM
Incorrect device drivers
Network
Common Internet File System
29. Why are web pages viewed using HTTP?
RFI
baseband
half duplex
To stop the Hamburgerler from stealing all of Ronnie McDonalds burgers
30. Is used to route electronic mail through the internetwork
Simple Mail Transfer Protocol (SMTP)
PPP
DSL
physical address
31. A term referring to a data-link header and trailer - plus the data encapsulated between the header and trailer.
Frame
Frequency Modulation
10Base-T
SIP
32. Technique for formatting signals in which one property of a carrier wave is modified by the addition of a data signal during transmission
checksum
Modulation
POP3 (Post Office Protocol - version 3)
topology
33. Reverse address resolution protocol
802.11
intrusion
shielded twisted-paired (STP) cable
RARP
34. Does not operate at the application layer
Transmission Control Protocol
stateful firewall
ssl
ARP
35. NNTP
Transmission Control Protocol
EIA (Electronics Industries Alliance)
Network News Transport Protocol
ANSI
36. Analog - only one direction. radio frequency analog waves w differences in frequency. expensive - longer distance. ex. cable TV
Data Circuit-Terminating Equipment
POP (Post Office Protocol)
broadband
Round Trip Time
37. User datagram protocol
Hubs
UDP
alarm clustering and compaction
Half-Duplex
38. Signals travel in both directions but only one at a time
WINS
half duplex
false attack stimulus
Conduit
39. Which protocol is responsible for splitting data into packets and adding a header to each one?
Transmission Control Protocol
broadcast frame or broadcast packet
narrowband
NFS
40. Faster networking and inexpensive - flexible - easy to install
analog dis
128 - 64 - 32 - 16 - 8 - 4 - 2 - 1
twisted shielded pair
router
41. Process of grouping almost identical alarms occurring at almost same time into single higher-level alarm
Telnet
service data unit (SDU)
NetWare Core Protocol
alarm clustering and compaction
42. A systematic survey of all of the target organization's Internet addresses that is conducted to identify network services offered by hosts in that range
Ferrule
fingerprinting
Port Numbers
fractionalizing
43. Multiple signals travel simultaneously - medium is separated into multiple channels
Broadcast
carrier sense
multiplexing
client
44. OSPF
link dead phase
Open Shortest Path First
BOOTP
TCP/IP Transport Layer Encapsulation
45. Consists of single cable that connects all nodes on a network without intervening connectivity devices - inexpensive - hard to find source of error - not very fault tolerant - data is transmitted in one direction in the ring.
Data Circuit-Terminating Equipment
10Base-T
HTTPS
bus topology
46. Also called the star-wired ring topology - a network design in which the logic communication are in a ring - but the phyical layout of the network star.
star-ring hybrid topology
Client
site policy awareness
Domain Name Service
47. What is a unique name that identifies an internet site called?
TCP/IP Architecture Layer 2
Domain Name
PSTN
MAU
48. A data link protocol used for remote networking that is rarely used today.
POP (Post Office Protocol)
CIDR (Classless Interdomain Routing)
reassembly
SLIP
49. Layer 4 Troubleshooting
Firewall configured correctly
Bend Radius
signal bounce
WAN
50. Generates signals as changes in voltage at the NIC
Access Control List
1000base-lx
physical layer
connection