SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
IT: Networking Vocab
Start Test
Study First
Subject
:
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Device that can detect intrusion and launch an active response
Category 5e
MAC
MAC address
intrusion prevention system (IPS)
2. Traces path from one network node to another - identifying all intermediate hops b/w two nodes
tracert
ANSI
fiber-optic cables
CSU/DSU
3. Which protocol allows users to send emails?
Network interface card (NIC)
Organizational Unit
EIA (Electronics Industries Alliance)
SMTP
4. Virtually local area network-device-switch
ssl
10BASE5 Limit
VLAN
Network Layer
5. Session Layer
virtual circuit
MS-CHAP
Cable Plant
OSI Layer 5
6. The process of determining the best path from Point A on one network to Point B on another
routing
Transport Layer
Physical layer
IEEE (Institute of Electrical and Electronics Engineers)
7. Security measure verifies that your user name and password are contained in the NOS directory
DNAT (Dynamic Network Address Translation)
authentication
routing
fiber optic cable
8. Offers one way for a computer to access another computer over the network or over the Internet. For example - an IBM programmer can use Telnet on a Windows XP or Red Hat Enterprise Linux computer to access a mainframe though the Internet
Telnet
Network Layer
ANDing
Channel
9. Core TCP/IP protocol that operates in the Network layer and provided information about how and where data should be delivered; subprotocol that enables TCP/IP to inernetwork
Secure Shell (SSH)
SSH
IP (Internet Protocol)
Decapsulation
10. Faster networking and inexpensive - flexible - easy to install
twisted shielded pair
TDM
User Datagram Protocol (UDP)
Frequency Division Multiple Access (FDMA)
11. Transport Layer
TCP/IP Architecture Layer 3
geosynchronous
802.11
Presentation Layer
12. Network cable that contains pairs of insulated wires that are twisted together and surrounded by a shielding material for added EMI and RFI protection - all inside a protective jacket.
Domain Name Service
OSI Layer 7
shielded twisted-paired (STP) cable
SSH
13. Simple Mail Transfer Protocol
SMTP
true attack stimulus
SSL
digital signal
14. Individual insulated wire pairs - less expensive then STP - less resistant to noise
Backbone
UTP
port 123
SCP
15. Term that describes current anti-intrusion technologies
network class a
event viewer
ppp
intrusion detection/prevention system (IDPS)
16. The process of attracting attention to a system by placing tantalizing information in key locations.
collision detection
enticement
configured with correct sending and receiving email server information
twisted-pair cable
17. A form of fiber-optic cable that supports only one signal transmission at a time and that is used mainly for long- distance communication.
single-mode fiber-optic cable
honey pot
addressing
intrusion correction
18. The IEEE standard for Ethernet networking devices and data handling (using the CSMA/CD access method)
ISOC
802.3
HTTP
Internet Information Services
19. Authentication prtocol that does not issue a challenge or require 3rd party verification of the computer requestiing authentication
kereberos
5-4-3 rule
Internet
driver signing
20. Type of protocol useful when data must be transferred quickly
Loose network cable connection
SSL
connectionless
Application Layer
21. A series of interconnected computers - printing devices - and other computer equipment that share hardware and software resources. The services area usually is limited to a given office - floor - or building.
wavelength
local area network (LAN)
AUI
Single mode fiber
22. Is a protocol for defining host groups.
Network Information Service
Analog
Internet Group Membership Protocol (IGMP)
American Wire Gauge
23. Data Link Layer
Data Circuit-Terminating Equipment
MAN
Network Switching
MultiStation Access Unit
24. An algorithm used to verify the accuracy of data contained in a data frame.
bus topology
Physical
Application Layer
CRC (cyclic redundancy check)
25. Which protocol allows users to recieve emails?
POP3
directional antennas
Physical Layer
Multimode fiber
26. Internet Layer
TCP/IP Architecture Layer 2
SSH
Post Office Protocol
centralized control strategy
27. Error detection and correction
Transport
TCP/IP
OSI Layer 5
File Transfere Protocol - (FTP)
28. Glass or plastic shield around the core of a fiber-optic cable; reflects light back to the core in patterns that vary depending on the transmission mode
broadcast storm
Segment
Port Numbers
Cladding
29. A worldwide network network of interconnected LANs - and MANs - that uses the TCP/IP protocol to enable people to share e-mail messages and computer files and to access a vast array of infromation.
Frames
Internet
FDMA
Institute of Electrical and Electronics Engineers (IEEE)
30. Can use WPA to improve the security of data in transit
Transport
Internet Protocol
route
802.11b
31. Transport protocol and TCP/IP port that uses telnet utility use
crimping tool and wore stripper
TCP port 23
STP
Presentation
32. Addresses packet size
LDAP
LAN
Entrance Facilities
Data Link
33. A type of address translation in which each private IP address is correlated with its own Internet-recognized IP address.
SNAT (Static Network Address Translation)
star topology
PSTN
TCP/IP Vs. OSI: Transport
34. A physical layer standard that defines a method for building a synchronous telecommunications network based on fiber-optic cables.
SONET
SMF
ISO (International Organization for Standardization)
noise
35. To make more efficient use of limited numbers of legitimate IP addressing
subnetting purpose
workstation
Transport
Shielded Twised Pair
36. A network design in which every node is connected to every other note - achieving fault tolerance.
mesh topology
VLAN
stp
statistical multiplexing
37. A permanent telephone connection between 2 locations that provide a predetermined amount of bandwidth at all times
authentication
POP3 (Post Office Protocol - version 3)
Port Numbers
leased line
38. Small Form Plug-gables - Plugs in to an interface on a switch
SFP
2.4-GHz band
Session
IP gateway in NAT
39. Requires CSU/DSU-the connection point for a t1 live at customers site
t1 connection
TCP/IP Vs. OSI: Network Access
station
IGMP
40. A common way of sharing resources on a peer-to-peer network
backbone
802.11
modifying the file-sharing controls
Wide area network (WAN
41. Type of interference that may be caused by motors - power lines - televisions - copiers - etc
Electromagnetic Interference
installing cable
DSL
802.11
42. Layer 1 Troubleshooting
Internet
Application
Transport
Incorrect cable type
43. Wavelength division multiplexing
leased line
MAC address
physical layer
WDM
44. A data-link protocol used for remote networking that can exchange IP addresses - carry data by multiple network layer protocols - and support different app. protocols.
RIR (Regional Internet Registry)
WAN
PPP
Subnetmask
45. The part of a network to which segments and significant shared devices connect
protocol
backbone
Class A
Wide area network (WAN
46. The 100BaseVG/100VG-AnyLAN approach abandon the CSMA/CD transmission technique for one called demand priorTity.
coaxial cable
IEEE 802.12 Standard
Session
Transport
47. A type of fiber optic cable connector that uses a mechanism similar to the BNC connectors used by Thinnet
Secure Shell (SSH)
FDMA
routing
Straight tip connector
48. A type of multimode fiber-optic cable that reflects the light-based signals like a mirror within the cable - resulting in different signals arriving at different times and with an increased likeihood of distortion over longer cable runs.
step-index multimode fiber-optic cable
802.3
MAC (Media Access Control) sublayer
stateless firewall
49. Is used to allow searching and updating of a directory service
IP Addressing
ISDN
Light Weight Directory access protocol (LDAP
checksum
50. CDFS
honey pot
Channel
CD-ROM File System
5-4-3 rule