SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
IT: Networking Vocab
Start Test
Study First
Subject
:
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A medium that carries 1 signal
Institute of Electrical and Electronics Engineers
baseband
PAT (Port Address Translation)
DB-25 connector
2. A computer that has its own CPU and may be used as a stand-alone computer for word processing - spreadsheet genation - or other software applications. It also may be used to access another computer such as another workstation or server via a network.
true attack stimulus
broadband
Service Set Identifier
workstation
3. The most popular type of network for medium- and large-scale organizations
client/server
POP (Post Office Protocol)
router
port 123
4. (local area network) network of computers and others that is confined to a relatively small space
multimeter
multipath
802.11a
LAN
5. Metropolitan area network
noise
where NICs operate
Secure Shell
MAN
6. OU
Organizational Unit
Active Directory
site policy
Private Network
7. 192-223
User Datagram Protocol (UDP)
association
Session Layer
network class C
8. Theoretical. difference b/w highest and lowest frequency.
PPP
Canonical Name
Network
bandwidth
9. Which address is split in to four 8-bit parts called octets?
Static IP Addressing
Coaxial Cable
IP Address
Berkeley Software Distribution
10. Speed: 100 Mbps - Alternative name: 10BASE-TX - IEEE Standard: IEEE 802.3u - Cable Type: Copper - max length 100m
Application
server
Fast Ethernet (characteristics)
fiber optics
11. A process that ensures one device does not send information faster than it can be received by another device.
flow control
Internet Relay Chat
binary
Coaxial Cable
12. IEEE 802.2 Logical Link Control (LLC) sublayer of the data link layer
802.2
entrance facilities
transmit
active scanning
13. Network File System
star wired ring
NFS
MAC
encapsulation
14. Layer 3 Troubleshooting
IEEE (Institute of Electrical and Electronics Engineers)
analog adv
Correct default gateway
redirector
15. Maximum arc into which you can loop a cable before you will cause data transmission errors
Bend Radius
whois
NetWare Loadable Module
virture privat network (VPN)
16. IEEE standard for Ethernet devices and data handling
802.3
SSID
logical address
CRC
17. Example of an internetwork
Cable Plant
evasion
Internet
access services
18. 185 meters - 10Mbps
Data Link layer
leased line
10BASE2 Limit
radio frequency interference (RFI)
19. ACL
Access Control List
network-based IDPS (NIDPS)
ppptp
SYN (syncronization)
20. A network transport control method used in Ethernet networks. It regulates transmission by sensing the presence of packet collisions.
Carrier Sense Multiple Access with Collision Detection (CSMACD)
fixing attenuation
broadband
bandwidth
21. Data jack
Network Information Service
single-mode fiber-optic cable
confidence value
rj-45
22. Network Layer
Application
Routing
User Datagram Protocol (UDP)
fiber-optic cables
23. Data circuit-terminating equipment. multiplexer or modem
Transport Layer Security (TSL)
802.11g
Networking Model
DCE
24. Nondata info that must accompany data for it to be properly routed. addition to data
configured with correct sending and receiving email server information
CSMA/CA
frequency
overhead
25. Voltage is varied and imprecise - more susceptible
analog dis
PDU
bayonet nut connector (BNC)
MAC address
26. Is a method for automatically assigning address and other configuration parameters to network hosts.
Dynamic Host Configuration protocol (DHCP)
thin client computing
CIDR block
virture privat network (VPN)
27. An International organization of scientists - engineers - technicians - and educators that play a leading role in developing standards for network cabling and data transmissions.
subnetting purpose
Institute of Electrical and Electronics Engineers (IEEE)
Private Network
MAU
28. 12-character string that uniquely identifies a network node - hard coded into the NIC by the manufacturer; composed ot the block ID and device ID
BNC connector
ISO (International Organization for Standardization)
MAC address
node
29. Routes packets through network
802.3
twisted pair connector
802.44
Network
30. Hardware device located at the ISP side of ADSL connections.
Internet Relay Chat
Error Handling
port 123
DSLAM
31. A generic term referring to any set of protocols and standards collected into a comprehensive grouping that - when followed by the devices in a network - allows all the devices to communicate. Examples include TCP/IP and OSI.
Internet Protocol Security
Networking Model
RARP
ISP (Internet service provider)
32. Process in which an NIDPS look for invalid data packets - packets that are malformed under the rules of the TCP/IP protocol
plain old telephone service (POTS)
protocol stack verification
configured with correct sending and receiving email server information
rj-11
33. A network design consisting of a continuous path for data with no logical beginning or ending point - and thus no terminators.
Post Office Protocol version 3
ITU
Internet Control Message Protocol
Ring topology
34. NIDPS system that examines network traffic in order to identify problems related to the flow of traffic. Most sensors are passive mode deployment only.
Network File System
IP Address
Secure Shell (SSH
Network Behavior Analysis
35. Is used to allow searching and updating of a directory service
Alien Cross Talk
Secure File Transfer Protocol (SFTP)
Light Weight Directory access protocol (LDAP
802.3af
36. Authentication prtocol that does not issue a challenge or require 3rd party verification of the computer requestiing authentication
Secure File Transfer Protocol
simplex
kereberos
noise
37. Direct-sequence spread spectrum: signal bits are distributed over a frequency band
DSSS
Address Resolution Protocol (ARP)
pstn
TCP/IP Vs. Netware: Network Access
38. FM
10BASE5 Limit
star wired ring
fixing cross talk
Frequency Modulation
39. Controls how applications access network
stateless firewall
Application
SFP
Frames
40. An algorithm used to verify the accuracy of data contained in a data frame.
RTT
synchronous communications
Trivial File Transfer Protocol (TFTP)
CRC (cyclic redundancy check)
41. Coordinates and maintains communications between two nodes on the network
Packet
Wide area network (WAN
TDM
session layer
42. Layer 1
Physical
Boot Protocol /Bootstrap Protocol
MultiMode Fiber
Ethernet
43. Shielded twisted pair
Asynchronous Transfer Mode
stp
Computer network
To stop the Hamburgerler from stealing all of Ronnie McDonalds burgers
44. An IP addressing convention that adheres to network class distinctions - in which the first 8 bits of a Class A address - the first 16 bits of a Class B address - and the first 24 bits of a Class C address are used for network Information
SDU
1000base-lx
Classful Addressing
Thin Eterhnet/10 Base 2
45. BootP
transport layer
FCS (frame check sequence)
Boot Protocol /Bootstrap Protocol
Metropolitan area network (MAN)
46. Physical layer. 10 mpbs throughput. baseband transmission. max length is 100 meters. follows 5-4-3 rule. star topology. cat 3 or higher utp. twisted pair.
10base-t
ISO (International Organization for Standardization)
AM
goodput
47. Data Link Layer
Mac Addressing
statistical anomaly-based (stat - behavior-based) IDPS
Populated Segment
mtr (my traceroute)
48. What is a unique name that identifies an internet site called?
LDAP
1000base-t
Domain Name
Entrance Facilities
49. Signals on bus that would travel endlessly between two nodes
signal bounce
tunneling
Institute of Electrical and Electronics Engineers (IEEE)
Class C Network
50. A logical process of combining bits. In ANDing - a bit with a value of 1 plus another bit with a value of 1 results in a 1. A bit with a value of 0 plus any other bit results in a 0.
ANDing
cyclic redundancy check (CRC)
ICANN (Internet Corporation for Assigned Names and Numbers)
honey net