Test your basic knowledge |

IT: Networking Vocab

Subject : it-skills
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A TCP/IP utility that allows you to look up the DNS host name of a network node by specifying its IP address - or vice versa. This is useful for verifying that a hos is configured correctly and for troubleshooting DNS resolution problems






2. User datagram protocol






3. An organization composed of more than 100 representatives from industry and government who together determine standards for the electronics industry in addition to other fields - such as chemical and nuclear engineering.






4. Maximum arc into which you can loop a cable before you will cause data transmission errors






5. A combination of techniques used to detect an intrusion and then to trace it back to its source






6. Extended service set: a group of access points






7. Regular voice-grade telephone service.






8. A TCP/IP troubleshooting utility that provides information about NetBIOs names and their addresses. If you know the NetBIOs name of a workstation - you can use nbtstat to determine its IP address






9. Manages network communication - available on a CD-ROM for example - that is used to manage communications and how frames or packets are sent using a protocol.






10. Which protocol allows users to recieve emails?






11. IRC






12. Four twisted wire pairs rated for 100 Mhz.






13. An error condition on a token ring network that indicates one or more nodes is not functioning.






14. What is the currency of Denmark?






15. Application layer protocol used to access information stored in a directory






16. The process of connecting to a wireless network






17. Amplitude - frequency (Hz) - wavelength - wavy line






18. MPLS






19. Is a secure form of HTTP






20. Functions at the network layer that add logical addresses and properly route data






21. Firewall packet inspection that ignores the state of the connection between the internal computer and the external computer - only blocks or allows a packet based on header information.






22. Controls the transport of data between systems






23. A flexible communications cable that contains pairs of insulated copper wires that are twisted together for reduction of EMI and RFI and covered with an outer insulating jacket.






24. Layer 5 through 7 Troubleshooting






25. Signals traveling on one wire infringes on the signal traveling over an adjacent wire






26. Wide area network






27. Process in which an NIDPS look for invalid data packets - packets that are malformed under the rules of the TCP/IP protocol






28. A far-reaching system of networks that usually extends over approximately 48 kilometers (about 30 miles) and often reaches across states and continents.






29. Also called the star-ring hybrid - topology - a network design in which the logic communication are in a ring - but the phyical layout of the network star.






30. Defines the physical characteristics of the network






31. Gigabit Interface Converter - Plugs in to an interface on a switch






32. Bootstrap Protocol






33. IDPS that uses profiles to detect anomalous protocol behavior






34. Provides services for applications






35. Cause by EMI/RFI - and other packets - interference on the signal






36. A computer that has its own CPU and may be used as a stand-alone computer for word processing - spreadsheet creation - or other software applications. It also may be used to access another computer such as another workstation or server via a network.






37. Several ethernet nodes can be connected and can monitor traffic or access media simultaneously






38. A type of interference that occurs when two LAN cables run close to each other. If one cable is carrying a signal and the other isn't - the one carrying a signal will induce a 'ghost' signal in the other cable






39. Point or stage in a wave's progress over time






40. Which protocol allows the transfer of a file from one computer to another over the network?






41. Secures messages being transmitted on the internet - uses RSA for authentication and encyption.






42. Brief delay in processing - length of cable can contribute to this






43. Generates signals as changes in voltage at the NIC






44. Medium network 128-191






45. Model for understanding and developing computer-to-computer communication developed in the 80s by ISO; divides networking functions among 7 layers






46. Total amount of communication cable that make up a network.






47. Asynchronous digital subscriber line. Method of providing internet service that uses the standard phone line - but transmits data at a different frequency than voice. Faster than ISDN.






48. Internet society






49. Presentation Layer






50. Service data unit