Test your basic knowledge |

IT: Networking Vocab

Subject : it-skills
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Carrier sense multiple access with collision detection






2. Hypertext Transfer Protocol






3. Individual insulated wire pairs - less expensive then STP - less resistant to noise






4. Signals composed ot pulses that can have a value of only 1 or 0






5. 12 digits - A-F/0-9






6. Process of breaking large packets into smaller packets.






7. A logical communication path established by the OSI Network layer for sending and receiving data.






8. Bootstrap Protocol






9. Media access control






10. Transport Layer






11. Connection based






12. Interference that may be generated by broadcast signals from radio or TV towers






13. Secure CoPy-utility that allows you to copy files securely from host to another






14. Provides a generic method of transferring files






15. Manages end-to-end delivery of data






16. Institute of Electrical and Electronics Engineers






17. Stop signals after they have reached the end of the wire






18. Error detection and correction






19. Direct-sequence spread spectrum: signal bits are distributed over a frequency band






20. Max number of hops a packet can take b/w its source and destination using RIP on a LAN






21. TFTP - trivial file transfer protocol






22. Is used to route electronic mail through the internetwork






23. Is an e mail retival protocol designed to enabel users to access their e-mail from various locations






24. IDPS that reviews log files from servers - network devices - and other IDPSs for signatures indicating an attack or intrusion






25. Regular voice-grade telephone service.






26. Gives each node unique address






27. A worldwide network network of interconnected LANs - and MANs - that uses the TCP/IP protocol to enable people to share e-mail messages and computer files and to access a vast array of infromation.






28. Distance between corresponding points on cycle






29. Shielded twisted pair






30. Layer 4 Troubleshooting






31. IEEE 802.3 Media Access Control (MAC) sublayer of the data link layer






32. Is associated with unix/linux networks






33. To make more efficient use of limited numbers of legitimate IP addressing






34. The 100BaseVG/100VG-AnyLAN approach abandon the CSMA/CD transmission technique for one called demand priorTity.






35. MPLS






36. BIND






37. Network File System






38. (WIde area network) Carry networks longer distances than Lans






39. The NIC and network equipment are set up so they cannot send and receive at the same time






40. A value or means of identifying a service on a network node - such as socket or port 103 for standerdized e-mail services in the TCP protocol.






41. Intelligently direct data between networks based on addressing - patterns of usage - and availability of network segments






42. Measure of the difference between the highest and lowest frequencies that a medium can transmit






43. Package for data that includes not only the data - or 'payload -' but also the sender's and recipient's addressing and control information. Generated at the Data Link layer and issued to the Physical layer






44. The first set of six characters that make up the MAC address and that are unique to a particular manufacturer.






45. A network that offers services to members of the public - such as network services offered by a telecommunications company or a cable TV company.






46. Frequency modulation-frequency of signal is modified






47. A data encryption technique employed between a server and a client - such as between a client's browser and an Internet server.






48. Junction point between the MDF and concentrations of fewer connections; those that terminate in a telecommunications closet






49. Is part of theTCP/IP protcol suite and used to retrive e-mail from a remote server to a local client over a TCP/IP connection






50. Network interface card







Sorry!:) No result found.

Can you answer 50 questions in 15 minutes?


Let me suggest you:



Major Subjects



Tests & Exams


AP
CLEP
DSST
GRE
SAT
GMAT

Most popular tests