SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
Search
Test your basic knowledge |
IT: Networking Vocab
Start Test
Study First
Subject
:
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Name Of Layer 3
Trivial File Transfer Protocol (TFTP)
port 69
Network
OSI Layer 4
2. Manages end-to-end delivery of data
transport layer
cross talk
digital signal
Application
3. Plain old telephone service
segment
coax cable connector
POTS
voltage
4. Data Link Layer
IEEE (Institute of Electrical and Electronics Engineers)
OSI Layer 2
cable plant
ARP
5. Name Of Layer 1
Internet Engineering Task Force (IETE)
Ethernet
Modulation
Physical
6. Resistance that contributes to controlling an electrical signal; measured in ohms
ANDing
Impedance
radio frequency interference (RFI)
PDU (protocol data unit)
7. Address Resolution Protocol
bandwidth
Internet Connection Sharing
ARP
Overhead
8. Occurs when attacker attempts to gain entry or disrupt normal operations of information systems - almost always with intent to do harm
intrusion
Application
Carrier Sense Multiple Access with Collision Detection (CSMACD)
IEEE
9. Collection of honey pots connecting several honey pot systems on a subnet
honey net
peer-to-peer network
A Protocol
reassembly
10. Transport layer protocol that services a request without requiring a verified session and without guaranteeing delivery data
Password Authentication Protocol
10BASE5 Limit
Gigabit Interface Converter
connectionless
11. Analog - only one direction. radio frequency analog waves w differences in frequency. expensive - longer distance. ex. cable TV
Presentation
Nonbroadcast Point-to-Multipoint Transmission
broadband
impedance
12. Time Division Multiple Access
logical address
active scanning
TDMA
PDU
13. Packet a node sends to acknowledge that it received a SYN request for connection; 2nd of three-step connection process
false positive
collision
10Base-T
SYN-ACK (synchronization-acknowledgment)
14. IPSec
Hubs
IMAP (Internet Message Access Protocol)
Internet Protocol Security
Internetwork Packet Exchange
15. The combination of an IP address's network ID and subnet information. By interpreting the address's extended network prefix - a device can determine the subnet to which an address belongs.
Extended Network Prefix
bus topology
IMAP4 (Internet Message Access Protocol - version 4)
goodput
16. Transport Layer
link quality monitoring
Error Handling
Gigabit Ethernet (fiber characteristics)
Presentation
17. ICA
Independent Computer Architecture
Data Link
Transport layer
Application Layer (Layer 7)
18. A device used to connect thicknet cable with a transceiver. A vampire bypasses the need to serve the cable - because the vampire tap has a metal tooth that pierces through the outside cable insulation (like a vampire) and connects with the copper wir
bus topology
Data Link
vampire tap
tuning
19. Network Layer
the higher the frequency
network class a
Remote Desktop Protocol
Packets
20. Example of an internetwork
Protocol
Internet
standby UPS
header
21. Scrambles information into an alternative form that requires a key or password to decrypt the information.
encryption
ISO (International Organization for Standardization)
Adjacent Layer Interaction
collision
22. A Data Link sublayer of the OSI model that initiates the communication link between nodes and ensures the link is not unintentionally broken.
LLC (Logical Link Control) sublayer
Media Converter
Alternate Mark Inversion
logical link control (LLC)
23. Layer 3 Troubleshooting
ANSI
IP address within the assigned network
Category 1
Application
24. An IP addressing and subnetting method in which network and host information is manipulated without adhering to the limitations imposed by traditional network class distinctions. CIDR is also known as classless routing or supernetting. Older routing
site policy awareness
Local Connector
CIDR (Classless Interdomain Routing)
Ethernet
25. A thin coaxial cable usually RG-58
802.44
802.16
Thin Eterhnet/10 Base 2
stateless firewall
26. Application Layer
Network Time Protocol
Unshielded twisted-pair (UTP) cable
Session Layer
TCP/IP Architecture Layer 4
27. BSD
SLIP
NetBIOs
Extended Network Prefix
Berkeley Software Distribution
28. The pattern used to install a network medium
Transmission Protocol (TCP)
Internet Protocol
topology
switch
29. Helps you identify percentage of traffic that compromises broadcasts
network monitor
SONET
routing
protocol data unit (PDU)
30. Eight bits of information; in a digital signaling system - one byte carries one piece of information
Bits
Byte
Category 3
authentication
31. Transport Layer
fat pipe
ANDing
Flow Control
Fast Ethernet (characteristics)
32. Controls how applications access network
IDPS terrorist
connectionless
intrusion prevention system (IPS)
Application
33. The IEEE standard for broadband wireless metropolitan area networking (also known as WiMax)
SMTP server name
TCP port 23
application protocol verification
802.16
34. CHAP
Challenge Handshake Authentication Protocol
fixing cross talk
Static IP Addressing
tracepath
35. Loop back address for IPv6
Packets
::1
public switched telephone network (PSTN)
Frame
36. The shorter the wavelength
the higher the frequency
POTS
Challenge Handshake Authentication Protocol
CSU/DSU
37. Point of division between a telecommunications service carrier's network and a building's internal network
Demarcation Point
Simple Network Management Protocol (SNMP)
(fiddy) Fiber Distributed Data Interface
802.3
38. IPv6 addressing - multicast group
protocol
crimping tool and wore stripper
FF02
Serial
39. UN agency that regulates international telecommunications and provides developing countries with technical expertise and equipment to advance their technological bases
TCP/IP Architecture Layer 3
protocol and services
ITU (International Telecommunication Union)
protocol
40. Most common cabling used in networking. Usually connects nodes to the main network.
Simple Network Management protocol (SNMP)
ethernet
redirector
Category 3
41. Transforms data into a form network or applications will understand
router
Impedance
Presentation
back hack
42. A network that links multiple LANs in a large city or metropolitan region.
duplex
Metropolitan area network (MAN)
geosynchronous
Internet Connection Sharing
43. Is a protocol for defining host groups.
baseband
router
half duplex
Internet Group Membership Protocol (IGMP)
44. Is an e mail retival protocol designed to enabel users to access their e-mail from various locations
Inter Message Access Protocol (IMAP)
WAN
Device power off
digital adv
45. Also called the star-wired ring topology - a network design in which the logic communication are in a ring - but the phyical layout of the network star.
TCP/IP Vs. Netware: Application
confidence value
Analog
star-ring hybrid topology
46. Max size of data units on Ethernet networks
Extended Network Prefix
amplitude
MMF
1550bytes
47. Device used to regenerate a signal
Remote Desktop Protocol
Layer 2 Tunneling Protocol
Repeater
telnet
48. Application Layer
host-based IDPS (HIPDS)
EIA/TIA
Telnet
Transport
49. Error detection and correction
Transport
star wired bus
Network
Post Office Protocol version 3
50. Event that triggers alarms and causes an IDPS to react as if a real attack is in progress
true attack stimulus
Hypertext Transfer Protocol Secure (HTTPS)
Multistation Access Unit
Open Shortest Path First