Test your basic knowledge |

CCNA Network Fundamentals Vocab

Subjects : cisco, it-skills, ccna
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A group defined by a class D address (multicast - ranging from 224.0.0.0 to 239.255.255.255) - whereupon hosts can pertain to multicast groups. Hosts that have the same multicast address are part of the same host group.






2. A protocol that allows a computer to retrieve email from a server.






3. Network layer protocol in the TCP/IP stack offering a connectionless internetwork service. IP provides features for addressing - type-of-service specification - fragmentation and reassembly - and security.






4. A type of network cabling that includes twisted-pair wires - with shielding around each pair of wires - as well as another shield around all wires in the cable.






5. The management of data flow between devices in a network. It is used to avoid too much data arriving before a device can handle it - causing data overflow.






6. In a web browser - an application the browser uses - inside the browser window to display some types of content. For example - a browser typically uses a plug-in to display video.






7. The layer 3 address to which the data is going.






8. Unencrypted password used to allow access to privledge EXEC mode from IOS user EXEC mode.






9. A process that uses the same ARP messages as a normal ARP - but by which a router replies instead of the host listed in the ARP request. When a router sees an ARP request that cannot reach the intended host - but for which the router knows a route to






10. Media access methodology in which a node wishing to transmit listens for a carrier wave before trying to send. If a carrier is sensed - the node waits for the transmission in progress to finish before initiating its own transmission.






11. A network scanning technique used to identify which host IP addresses are operational.






12. A 1-bit flag in the TCP header used to indicate that the receiving host should notify the destination process to do urgent processing.






13. A notification sent from one network device to another to confirm that some event has occured.






14. Program used to download and send email. Email clients use POP3 to receive emails and use SMTP to send emails. Also called an email client






15. The structure and order of words in a computer language






16. A host or node that participates in some form of a group. For example - p2p technology defines a group of peers that participate jointly in the same activity - each one having a server and client component.






17. In networking - a general term referring to any energy signal on a transmission medium that is not part of the signal used to transmit data over that medium.






18. The forwarding of packets where the forwarding decision is taken dynamically - hop by hop - based on the conditions of downstream fowrading nodes.






19. An internationally recognized definition of technical specifications that ensure worldwide consistency.






20. A data link layer address - for example a MAC address






21. In ethernet a layer 2 device that receives an electrical signal in one port - interprets the bits - and makes a filtering or forwarding decision about the frame. If it forward - it sends a regenerated signal. Switches typically have many physical por






22. Using values between 1024 and 49 -151 these numbers are equivalent to well-known ports in concept - but they are specifically used for nonprivileged application processes.






23. A part of a computer network that every device communicates with using the same physical medium. Network segments are extended by hubs or repeaters.






24. A corporate system such as a website that is explicitly used by internal employees. Can be assessed internally or remotely






25. A method of computer processing in which different parts of a program run simultaneously on two or more computers that are communicating with each other over a network






26. As filed in the TCP header that is set in a sent segment - signifies the maximum amount of unacknowledged data the host is willing to receive before the other sending host must wait for an acknowledgment.






27. A service or a program to look up information in the DNS






28. A technique used to attack an ethernet network by sending fake ARP messages to an ethernet LAN. These frames contain false MAC addresses that confuse network devices - such as switches. As a result - frames intended for one node can be mistakenly sen






29. A temporary storage where data that has been retrieved or calculated and is accessed frequently can be stored. After the data is stored in the cache - the processes can access the cached copy instead of accessing the original data. A cache reduces th






30. A 1-bit field in the TCP header that is used by a device that wants to terminate its session with the other device. This is done by inserting the FIN flag in the flag field found in the TCP segment






31. IPv4 address of a network host. When talking about host addresses - they are the network layer addresses.






32. The dividing of IP datagrams to meet the MTU requirement of a layer 2 protocol.






33. An encoding scheme 4B/5B uses 5-bit symbols and codes to represent 4 bits of data. 4B/5B is used in 100Base-tx ethernet.






34. 1. a collision domain that is a section of a LAN that is bound by bridges - routers or switches. 2. In a LAN using a bus topology - a segment is a continuous electrical circuit that is often connected to other such segments with repeaters. 3. When us






35. Information systems that allow the creation of a document or documents that can be edited by more than one person in real time






36. A collection of data that establishes a reference for network performance and behavior over a period of time. This reference data is used in the future to assess the health and relative growth of network utilization.






37. The time required for some network pdu's to be sent and received - and a response PDU to be sent and received. In other words - the time between when a device sends data and when the same device receives a response.






38. In a shared media ethernet network - a signal generated by the transmitting devices that detects the collision. The jam signal continue to transmit for a specified period to ensure that all devices on the network detect the collision. The jame signal






39. A generic term from OSI that refers to the data - headers - and trailers about which a particular network layer is concerned.






40. Network protocols or technologies that do not use the acknowledgment system to guarantee reliable delivery of information






41. In the telnet application - commands are always introduced by a character with the decimal code 255 - known as the Interpret as Command character.






42. A 32-bit field in the tcp segment header that specifies the sequence number of the next byte this host expects to receive as a part of the TCP session. It is used to recognize lost packets and flow control






43. A group that receives a multicast transmission. The members of a multicast group have the same mulitcast IP addressing to receive the same transmission.






44. A process where multiple digital data streams are combined into one signal.






45. The learning of source addresses on incoming frames and adding them to the bridging table. After the table has been completed and when a frame is received on one of the bridge's interfaces - the bridge looks up the frame's destination address in its






46. Communication that only allows one station to receive while the other station is transmitting






47. The portion of a binary number that carries the most weight - the one written farthest to the left. High-order bits are the 1s in the network mask.






48. Line code in which each bit of data is signified by at least one voltage level transition.






49. Resources used to manage or operate the network. Overhead consumes bandwidth and reduces the amount of application data that can be transported across the network.






50. A common term for 10base2 ethernet - referring to the fact that 10base2 cabling is thinner than coaxial cabling used for 10base5







Sorry!:) No result found.

Can you answer 50 questions in 15 minutes?


Let me suggest you:



Major Subjects



Tests & Exams


AP
CLEP
DSST
GRE
SAT
GMAT

Most popular tests