Test your basic knowledge |

IT: Networking Vocab

Subject : it-skills
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. IMAP - internet message access protocol






2. Cause by length - loss of signals as it travels farther away






3. A utility for viewing or modifying a host's routing table






4. The total amount of opposition to the flow of current.






5. Physical layer. 10 mpbs throughput. baseband transmission. max length is 100 meters. follows 5-4-3 rule. star topology. cat 3 or higher utp. twisted pair.






6. Term that describes current anti-intrusion technologies






7. A network that links multiple LAN's in large city or metropolitan region.






8. Name Of Layer 5






9. Compatible with 802.11a - b - g 600-65 throughput






10. Small network 192-223






11. A very high speed - long distance media that consists of a single strand of fiber glass that carries the signals. Can transmit data 50 times further than multimode fiber at a faster rate






12. The IEEE standard for token ring networking devices and data handling.






13. A network on which any computer can communicate with other networked computers on an equal (peer) basis without going through an intermediary - such as a server. Peer-to-peer networking enables each computer to offer and access shared resources - suc






14. Attacker who utilizes tactics designed to trip the organization's IDPS - essentially causing the organization to conduct its own DoS attack - but overreacting to an actual - but insignificant - attack.






15. The medium that carries multiple signals simultaneously






16. Device that separates multiplexed signals once they are received and regenerates them in their original form






17. A device that must be located at each end of a leased line.






18. Vulnerability created in a system by a virus or worm which allows the attacker to access the system at will with special privileges.






19. CNAME






20. Is a system that is distributed throughout the internetwork to provide address/name resolution.






21. The process of wrapping one layer's PDU with protocol information so that it can be interpreted by a lower layer. For example - Data Link layer protocols encapsulate Network layer packets in frames.






22. Layer 2 Troubleshooting






23. The distinct units of data that are exchanged between nodes on a network






24. Data transmission that involves one transmitter and one receiver






25. Extended service set: a group of access points






26. Best fault tolerance






27. Serial internet protocol






28. String used to identify an access point - configure on your new access points to match the settings on existing access points






29. Consists of activities that deter intrusion






30. ARP






31. Constructs data frames using the appropriate format for the network - reatea CRC information - Checks for errors using CRC information - Retransmits data if there is error - Initiates the communications link and makes sure it is not interrupted - thu






32. Describes the relative strength over a three dimensional area of an antenna






33. A connector that is used for thin coax cable and that has a boyonet-like shell.






34. A standard for encoding and interpreting binary files - images - video - and non-ASCII character sets within an e-mail message.






35. Layer 3 Troubleshooting






36. A 32 bit number that - when combined with a device's IP address - indicates the kind of supernet to which the device belongs.






37. Device that processes signals; multiplexer or modem






38. The utility that allows you to query ICANN's DNS registration database and find information about a domain.






39. The least secure authentication method






40. A poplar alternative to FTP is NFS software offered by Sun Microsystems - which uses Sun's remotr procedure call specification via TCP port 111.






41. A type of fiber optic connector. These connectors are square shaped and have release mechanisms to prevent the cable from accidentally being unplugged






42. Authentication prtocol that does not issue a challenge or require 3rd party verification of the computer requestiing authentication






43. Which protocol allows users to send emails?






44. CRAM-MD5






45. Multicast group 224-239






46. Ensures outgoing traffic can traverse public networks by replacing each outgoing packets source addresss field w valid IP address






47. The NIC and network equipment are set up so that they have the capacity to send and receive simultaneously. which is possible because od buffering at the NIC.






48. Is usde to communicate time synchronization information between systemson a network






49. Device that connects network segments and directs data based on information in the data packet






50. What is an agreed set of rules that two parties agree on in order to communicate with each other commanly known as?