Test your basic knowledge |

IT: Networking Vocab

Subject : it-skills
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. SFTP






2. Individual insulated wire pairs - less expensive then STP - less resistant to noise






3. LPR






4. Can use WPA to improve the security of data in transit






5. An algorithm used to verify the accuracy of data contained in a data frame.






6. Secure Sockets Layer






7. GBIC






8. The IEEE 802.3ae standard for Ethernet communications at 10 Gbps






9. An advantage of networks






10. Port used during a domain name lookup






11. IANA






12. Also called the physical or device address - the hexadecimal number permanently assigned to a network interface and used by the MAC sublayer within the DATA Link layer (Layer 2).






13. Cross talk with 2+ wires






14. Strategy that combines the best of the other two strategies; while individual agents still analyze and respond to local threats - their reporting to a hierarchical central facility enables the organization to detect widespread attacks






15. Short reach. only multimode-max length is 500. baseband transmission. 1000 mpbs.






16. UDP






17. Prevents broadcast storms by enabling switches to calculate paths that avoid potential loops and artificially block the links that would complete a loop






18. Manages end-to-end delivery of data






19. Physical Layer






20. Application Layer






21. Type of interference caused by signals traveling on nearby wire pairs infringing on another pair's signal






22. Device typically used to create a VLAN






23. Set of protocols that specify how wireless networks works. Most common are currently B and G. N is an emerging standard.






24. Device that connects network segments and directs data based on information in the data packet






25. The process in which an attacker obtains confidential information by contacting employees and deceiving them into giving up passwords - IP addresses - server names - and so on.






26. Secure Hypertext Transfer Protocol






27. A combination of techniques used to detect an intrusion and then to trace it back to its source






28. Provides th transfer medium (such as cable) - Translates data into a transmission signal appropriate to the transfer medium - Sends the signal along the transfer medium - Includes the pyical layout of the network - Monitors for transmission error - D






29. A switchhing method that creates separte channels on one communication medium by establishing different frequencies for each channel.






30. Domain Name System






31. A TCP/IP utility used to show or modify a client's host name.






32. NAT






33. Which protocol allows users to send emails?






34. Hard-to-define skills such as dependability






35. Enables sharing remote drivers - Enables sharing remote printers - Handles e-mail messages - Provides file transfer services - Provides file management services - Provides terminal emulation






36. Hypertext Transfer Protocol






37. The least secure authentication method






38. The oldest type of network design - this topology consists of multiple nodes attached to a central hub - switch - or router.






39. Hypertext Transfer Protocol Secure






40. Scrambles information into an alternative form that requires a key or password to decrypt the information.






41. Gigabit Interface Converter - Plugs in to an interface on a switch






42. Layer 1






43. A network that links multiple LAN's in large city or metropolitan region.






44. Firewall packet inspection that examines the data contained in a packet as well as the state of the connection between internal and external computers.






45. Internet group management protocol






46. Refers to the IEEE 802.3z and IEEE 802.3ab standard for Ethernet communications speed up to 1 Gbps.






47. Carrier sense multiple access with collision detection






48. A medium that carries 1 signal






49. A private network that functions like a tunnel though a large network-such as the Internet or an enterprise network-that is restricted to designated member clients only.






50. A series of interconnected computers - printing devices - and other computer equipment that shares hardware and software resources. The service area usually is limited to a given office area - floor - or building.