Test your basic knowledge |

IT: Networking Vocab

Subject : it-skills
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Is an e mail retival protocol designed to enabel users to access their e-mail from various locations






2. MSAU






3. Data circuit-terminating equipment. multiplexer or modem






4. Is associated with unix/linux networks






5. Tool used to determine whether a customers line is obtaining dial tone from the CO






6. HTTPS - Secure implementation of HTTP






7. Positive and zero. 1 and 0's.






8. Transport Layer






9. Layer 2 Troubleshooting






10. Process in which an NIDPS inspects the higher-order protocols (HTTP - FTP - Telnet) are examined for unexpected packet behavior or improper use






11. On a computer that receives data over a network - the process in which the device interprets the lower-layer headers and - when finished with each header - removes the header - revealing the next-higher-layer PDU.






12. Routers work here






13. Protocol that encapsulates data for transmission over VPNs






14. ARP






15. Rules and configuration guidelines governing implementation and operation of IDPSs within an organization






16. Compresses






17. Open Systems Interconnection model






18. After typing ping 127.0.0.1 - it tells you the test failed






19. Multiplexing based on priority






20. Unix command at shell prompt to send a file to printer






21. A network that offers services to members of the public - such as network services offered by a telecommunications company or a cable TV company.






22. A type of cable used in network wiring and is usually shielded - which means that it is more immune to interference then unshielded cables






23. User watching an episode of TV show over the internet is what kind of communication






24. The physical layout of cable and wireless network devices and the logical path followed by network frames or packets sent on the cable or by wireless transmissions.






25. The sender transmits the data to the destination without establishment of a connection.






26. A process that ensures one device does not send information faster than it can be received by another device.






27. More variable - convey greater subtleties with less energy






28. Any device connected to a network - such as a microcomputer - mainframe - midrange computer - network equipment - or printer. Also called a node.






29. Application layer protocol used to access information stored in a directory






30. AD






31. Slow wireless standard 11-18 throughput






32. A device used to connect thicknet cable with a transceiver. A vampire bypasses the need to serve the cable - because the vampire tap has a metal tooth that pierces through the outside cable insulation (like a vampire) and connects with the copper wir






33. SFTP






34. ICA






35. AH






36. Each node is connected to the two nearest nodes so that the entire network forms a circle - active - twisted pair of fiber optic - single malfunction in workstation can disable entire network - not flexible or scalbe






37. A generic term referring to the header defined by some layer of a networking model - and the data encapsulated by the header ( and possibly trailer) of that layer - but specifically not including an lower-layer headers and trailers.






38. Electronics industries Alliance






39. Network device that makes high-level application connections on behalf of internal hosts and other machines






40. A term used to refer to data within the Data-link layer of the OSI model.






41. Twist wire so you don't get interference on the memory






42. Activities finalize restoration of operations to a normal state and seek to identify source and method of intrusion to ensure same type of attack cannot occur again






43. In CIDR notation - the number of bits used for an extended network prefix. For example - the CIDR block for 199.34.89.0/22 is /22






44. A transport system that uses the CSMA/CD access method for data transmission on a network. Typically it is implemented in a bus or star-bus hybrid topology.






45. Which class of IP address would be allocated to a very large company?






46. A protocol that runs in the Dession and Transport layers of the OSI model and associates NetBIOS names with workstations. NetBIOS alone is not routable because it does not contain Network Layer information. However - when encapsulated in another prot






47. Does not operate at the application layer






48. Name Of Layer 1






49. Consists of activities that deter intrusion






50. Lower sublayer of the Data Link layer; appends the physical address of the destination computer onto the fram