Test your basic knowledge |

CCNA Network Fundamentals Vocab

Subjects : cisco, it-skills, ccna
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. An internet wide system by which a hierarchical set of DNS servers collectively hold all the name IP address mappings - with DNS servers referring users to the correct DNS server to successfully resolve a DNS name.






2. To change the energy levels transmitted over some networking medium to transmit bits over that medium.






3. The process of obscuring information to make it unreadable without special knowledge - somtimes referred to as scrambling. The process takes the data to be encrypted and applies a mathematical formula to it along with a secret number. The resulting v






4. A field in the IP header that prevents a packet form indefinitely looping around an IP internetwork. Router decrements the TTL field each time they forward a packet - and if they decrement the TTL to 0 - the router discards the packet - which prevent






5. A device such as a desktop or mobile device that is used by an end user.






6. Used by tcp or udp - with values between 0 and 1023 - these ports are allocated by high-privilege processes. They are used so that all clients know the correct port number to connect to.






7. The largest IP packet size allowed to be sent out a particular interface. Ethernet interfaces default to an MTU of 1500 because the data field of an Ethernet frame should be limited to 1500 bytes - and the IP packet sits inside the ethernet frame's d






8. An IP address that has been registered with IANA or one of its member agencies - which guarantees that the address is globally unique. Globally unique public IP addresses can be used for packets sent through the Internet.






9. A process used by a switch or bridge to forward broadcasts and unknown destination unicasts. The bridge/switch forwards these frames out all ports except the port on which the frame was received.






10. A plan - design or program of action to be followed. Sometimes an addressing plan is called an addressing SCHEME.






11. The client part of the DNS client server mechanism. A DNS resolver creates queries sent a across a network to a same server - interprets responses - and returns information to the requesting programs.






12. An addressing scheme in which a network is partitioned into sections - with the section identifier forming one part of each destination's address and the destination identifier forming another






13. The time required for some network pdu's to be sent and received - and a response PDU to be sent and received. In other words - the time between when a device sends data and when the same device receives a response.






14. A corporate system such as a website that is explicitly used by internal employees. Can be assessed internally or remotely






15. The structure and order of words in a computer language






16. In a shared media ethernet network - a signal generated by the transmitting devices that detects the collision. The jam signal continue to transmit for a specified period to ensure that all devices on the network detect the collision. The jame signal






17. A device that connects to a local digital telephone loop for a WAN circuit to a serial interface on a network device - typically connecting to a router. The CSU/DSU performs physical Layer 1 signaling on WAN circuits






18. Define in RFC 1918 - an IP address that does not have to be globally unique because the address exists inside packets only when the packets are inside a single private IP internetwork. Private IP addresses are popularly used in most company today - w






19. In ethernet a layer 2 device that receives an electrical signal in one port - interprets the bits - and makes a filtering or forwarding decision about the frame. If it forward - it sends a regenerated signal. Switches typically have many physical por






20. The time required to send a single bit over some transmission medium. The time can be calculated at 1/speed - where speed is the number of bits per second sent over the medium






21. Network protocols or technologies that do not use the acknowledgment system to guarantee reliable delivery of information






22. A map of the devices on a network representing how the devices communcate with each other.






23. A control mechanism that can provide different priorities to different users or data flows - or guarantee a certain level of performance to a data flow in accordance with requests from the application program.






24. The physical interface transceivers. It deals with Layer 1 (the physical layer - hence the PHY) of ethernet.






25. DNS data records. Their precise format is defined in RFC 1035. The most important fields in a resource record are Name - class - type and data.






26. A group of 8 binary bits. It is similar to - but not the same as - a byte. One Application in computer network is to use octets to divide IPv4 addresses into four components






27. The first half of a MAC address. Manufactures must ensure that the value of the OUI has been registered with the IEEE. This value identifies the manufacturer of any Ethernet NIC or interface.






28. A dotted decimal number defined by the IPv4 protocol to represent a network or subnet. It represents the network that hosts reside in. Also called a network number or network ID.






29. The normal operation of ethernet ports on a hub. In this mode - the mapping of the wire pairs in the hub port is in a normal configuration. Some hubs provide a media-dependent interface/media-dependent interface - crossover switch. This switch is usu






30. An application protocol typically not used by end users. Instead - it is used by the network management software and networking devices to allow a network engineer to monitor and troubleshoot network problems.






31. The portion of a binary number that carries the most weight - the one written farthest to the left. High-order bits are the 1s in the network mask.






32. Any combination of hardware device and/or software application designed to protect network devices from outside network users and/or malicious applications and files.






33. When used generically - this term refers to end-user data along with networking headers and trailers that are transmitted through a network. When used specifically - it is end-user data - along with the network or Internet layer headers and any highe






34. A time period between ethernet frames that allows fairness with the CSMA/CD algorithm. Without a space between frames in other words - without some time with no frames being sent a NIC might always listen for silence - never hear silence and therefor






35. A logical storage in the host's RAM to store ARP entries






36. Communication that uses a common clocking signal. In most synchronous communicatino - one of the communicating devices generates a clock signal into the circuit. Additional timing information is not required in the header.






37. Translation RFC 1918 addresses to public domain addresses. Because RFC 1918 addresses are not routerd on the Internet - hosts accessing the Internet must use public domain addresses.






38. Additional data that is provided with a command to provide information used by the execution of the command. IOS command arguments are entered at the CLI after the command






39. A 1-bit flag in the tcp header that indicates the acknowledgment field is valid.






40. Communication where the sender and receiver must prearrange for communications to occur; otherwise - the communication fails.






41. The table used by a switch or bridge that associates MAC addresses with the outgoing port. The switch or bridge uses this table for its forwarding/filtering decisions.






42. In TCP - the process of taking a large chunk of data and breaking it into small enough pieces to fit within a TCP segment without breaking any rules about the maximum amount of data allowed in a segment.






43. In a web browser - an application the browser uses - inside the browser window to display some types of content. For example - a browser typically uses a plug-in to display video.






44. The process of forwarding frames in a switch or a bridge from one port to another port or from segment to segment






45. A drag-and-drop network simulator developed by Cisco to design - configure and troubleshoot network equipment within a controlled - simulated program environment.






46. A general type of cable - with the cable holding twisted pairs of copper wires and the cable itself having little shielding.






47. From the priviledged mode - you can enter the device's global caonfiguration mode. From global configuration mode - you can configure global parameters or enter other configuration submodes such as interface - router and line configuration submodes.






48. On a switch - a table that lists all known MAC addresses - and the bridges/switch port out which the bridge/switch should forward frames sent to each MAC address.






49. Unique addresses that are public domain addresses.






50. In LAN switches a reference to cases in which a frame is forwarded - or switche - when the incoming and outgoing interfaces use the same speed. It is the opposite of asymmetric switching.







Sorry!:) No result found.

Can you answer 50 questions in 15 minutes?


Let me suggest you:



Major Subjects



Tests & Exams


AP
CLEP
DSST
GRE
SAT
GMAT

Most popular tests