SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CCNA Network Fundamentals Vocab
Start Test
Study First
Subjects
:
cisco
,
it-skills
,
ccna
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. An internet wide system by which a hierarchical set of DNS servers collectively hold all the name IP address mappings - with DNS servers referring users to the correct DNS server to successfully resolve a DNS name.
domain name system
global configuration mod
well known ports
fault tolerance
2. To change the energy levels transmitted over some networking medium to transmit bits over that medium.
encode
smtp
octet
logical network
3. The process of obscuring information to make it unreadable without special knowledge - somtimes referred to as scrambling. The process takes the data to be encrypted and applies a mathematical formula to it along with a secret number. The resulting v
gigabit ethernet
extranet
Logical link control
encryption
4. A field in the IP header that prevents a packet form indefinitely looping around an IP internetwork. Router decrements the TTL field each time they forward a packet - and if they decrement the TTL to 0 - the router discards the packet - which prevent
full duplex
hub
user executive mode
Time to live
5. A device such as a desktop or mobile device that is used by an end user.
distributed
collision
global configuration mod
end device
6. Used by tcp or udp - with values between 0 and 1023 - these ports are allocated by high-privilege processes. They are used so that all clients know the correct port number to connect to.
default route
plug-in
well known ports
hypertext transfer protocol
7. The largest IP packet size allowed to be sent out a particular interface. Ethernet interfaces default to an MTU of 1500 because the data field of an Ethernet frame should be limited to 1500 bytes - and the IP packet sits inside the ethernet frame's d
carrier sense multiple access (CSMA)
maximum transmission unit
routing table
extranet
8. An IP address that has been registered with IANA or one of its member agencies - which guarantees that the address is globally unique. Globally unique public IP addresses can be used for packets sent through the Internet.
enable password
domain name system
public address
AND
9. A process used by a switch or bridge to forward broadcasts and unknown destination unicasts. The bridge/switch forwards these frames out all ports except the port on which the frame was received.
flooding
limited broadcast
ACK
peer
10. A plan - design or program of action to be followed. Sometimes an addressing plan is called an addressing SCHEME.
low-order bit
bridging
decapsulation
scheme
11. The client part of the DNS client server mechanism. A DNS resolver creates queries sent a across a network to a same server - interprets responses - and returns information to the requesting programs.
octet
dns resolver
attenuation
data termianl equipment
12. An addressing scheme in which a network is partitioned into sections - with the section identifier forming one part of each destination's address and the destination identifier forming another
virtual circuit
hierarchical addressing
overhead
attenuation
13. The time required for some network pdu's to be sent and received - and a response PDU to be sent and received. In other words - the time between when a device sends data and when the same device receives a response.
round-trip time
host address
reserved link-local addresses
media independent
14. A corporate system such as a website that is explicitly used by internal employees. Can be assessed internally or remotely
intranet
source IP address
hub
gateway
15. The structure and order of words in a computer language
standards
connectionless
hybrid fiber-coax
syntax
16. In a shared media ethernet network - a signal generated by the transmitting devices that detects the collision. The jam signal continue to transmit for a specified period to ensure that all devices on the network detect the collision. The jame signal
fiber optics
ACK
jam signal
redundancy
17. A device that connects to a local digital telephone loop for a WAN circuit to a serial interface on a network device - typically connecting to a router. The CSU/DSU performs physical Layer 1 signaling on WAN circuits
best effort
extranet
channel service unit/data service unit
node
18. Define in RFC 1918 - an IP address that does not have to be globally unique because the address exists inside packets only when the packets are inside a single private IP internetwork. Private IP addresses are popularly used in most company today - w
Time to live
prviate address
encode
digital logic
19. In ethernet a layer 2 device that receives an electrical signal in one port - interprets the bits - and makes a filtering or forwarding decision about the frame. If it forward - it sends a regenerated signal. Switches typically have many physical por
switch
domain name
FIN
Address resolution protocol
20. The time required to send a single bit over some transmission medium. The time can be calculated at 1/speed - where speed is the number of bits per second sent over the medium
bit time
ACK
data communications equipment
gateway
21. Network protocols or technologies that do not use the acknowledgment system to guarantee reliable delivery of information
switch table
signal
best effort
switch
22. A map of the devices on a network representing how the devices communcate with each other.
syntax
source IP address
logical topology
bit time
23. A control mechanism that can provide different priorities to different users or data flows - or guarantee a certain level of performance to a data flow in accordance with requests from the application program.
local area network
quality of service
gateway
source IP address
24. The physical interface transceivers. It deals with Layer 1 (the physical layer - hence the PHY) of ethernet.
flooding
carrier
global configuration mod
ethernet PHY
25. DNS data records. Their precise format is defined in RFC 1035. The most important fields in a resource record are Name - class - type and data.
priority queing
unshieled twisted-pair
store and forward
resource records
26. A group of 8 binary bits. It is similar to - but not the same as - a byte. One Application in computer network is to use octets to divide IPv4 addresses into four components
RJ-45
Pad
octet
electromagnetic interface
27. The first half of a MAC address. Manufactures must ensure that the value of the OUI has been registered with the IEEE. This value identifies the manufacturer of any Ethernet NIC or interface.
Organizational Unique Identifier
daemon
most significant bit
Thicknet
28. A dotted decimal number defined by the IPv4 protocol to represent a network or subnet. It represents the network that hosts reside in. Also called a network number or network ID.
transparent bridging
network address
fault tolerance
subnet mask
29. The normal operation of ethernet ports on a hub. In this mode - the mapping of the wire pairs in the hub port is in a normal configuration. Some hubs provide a media-dependent interface/media-dependent interface - crossover switch. This switch is usu
hypertext transfer protocol
directly connected network
AND
media-dependent interface (MDI)
30. An application protocol typically not used by end users. Instead - it is used by the network management software and networking devices to allow a network engineer to monitor and troubleshoot network problems.
SYN
Optical time domain reflectometer
channel service unit/data service unit
smtp
31. The portion of a binary number that carries the most weight - the one written farthest to the left. High-order bits are the 1s in the network mask.
classful addressing
network
high-order bit
association identity AID
32. Any combination of hardware device and/or software application designed to protect network devices from outside network users and/or malicious applications and files.
gateway
flooding
firewall
address pool
33. When used generically - this term refers to end-user data along with networking headers and trailers that are transmitted through a network. When used specifically - it is end-user data - along with the network or Internet layer headers and any highe
Institute of Electrical and Electronics Engineers
binary
packet
dynamic routing
34. A time period between ethernet frames that allows fairness with the CSMA/CD algorithm. Without a space between frames in other words - without some time with no frames being sent a NIC might always listen for silence - never hear silence and therefor
prviate address
interframe spacing
asynchronous
smtp
35. A logical storage in the host's RAM to store ARP entries
ARP cache
download
data communications equipment
bridging
36. Communication that uses a common clocking signal. In most synchronous communicatino - one of the communicating devices generates a clock signal into the circuit. Additional timing information is not required in the header.
gateway
router
synchronous
firewall
37. Translation RFC 1918 addresses to public domain addresses. Because RFC 1918 addresses are not routerd on the Internet - hosts accessing the Internet must use public domain addresses.
default gateway
Network address translation (NAT)
tracert
fiber-optic cable
38. Additional data that is provided with a command to provide information used by the execution of the command. IOS command arguments are entered at the CLI after the command
argument
limited scope address
attenuation
bit time
39. A 1-bit flag in the tcp header that indicates the acknowledgment field is valid.
ACK
radix
nslookup
broadcast
40. Communication where the sender and receiver must prearrange for communications to occur; otherwise - the communication fails.
node
kilobits per second
connection oriented
daemon
41. The table used by a switch or bridge that associates MAC addresses with the outgoing port. The switch or bridge uses this table for its forwarding/filtering decisions.
bridge table
TCP
bridging
hop
42. In TCP - the process of taking a large chunk of data and breaking it into small enough pieces to fit within a TCP segment without breaking any rules about the maximum amount of data allowed in a segment.
download
registered ports
segmentation
extended star
43. In a web browser - an application the browser uses - inside the browser window to display some types of content. For example - a browser typically uses a plug-in to display video.
authoritative
user executive mode
plug-in
shielded twisted pair cable
44. The process of forwarding frames in a switch or a bridge from one port to another port or from segment to segment
broadcast
globally scoped addresses
thinnet
bridging
45. A drag-and-drop network simulator developed by Cisco to design - configure and troubleshoot network equipment within a controlled - simulated program environment.
Packet Tracer
bridging
encryption
local area network
46. A general type of cable - with the cable holding twisted pairs of copper wires and the cable itself having little shielding.
synchronous
FIN
domain name system
unshieled twisted-pair
47. From the priviledged mode - you can enter the device's global caonfiguration mode. From global configuration mode - you can configure global parameters or enter other configuration submodes such as interface - router and line configuration submodes.
Internet Assigned Numbers Authority
global configuration mod
packet
distributed
48. On a switch - a table that lists all known MAC addresses - and the bridges/switch port out which the bridge/switch should forward frames sent to each MAC address.
MAC table
overhead
virtual terminal line
server
49. Unique addresses that are public domain addresses.
extranet
globally scoped addresses
priority queing
most significant bit
50. In LAN switches a reference to cases in which a frame is forwarded - or switche - when the incoming and outgoing interfaces use the same speed. It is the opposite of asymmetric switching.
symmetric switching
Optical time domain reflectometer
host
pinout
Sorry!:) No result found.
Can you answer 50 questions in 15 minutes?
Let me suggest you:
Browse all subjects
Browse all tests
Most popular tests
Major Subjects
Tests & Exams
AP
CLEP
DSST
GRE
SAT
GMAT
Certifications
CISSP go to https://www.isc2.org/
PMP
ITIL
RHCE
MCTS
More...
IT Skills
Android Programming
Data Modeling
Objective C Programming
Basic Python Programming
Adobe Illustrator
More...
Business Skills
Advertising Techniques
Business Accounting Basics
Business Strategy
Human Resource Management
Marketing Basics
More...
Soft Skills
Body Language
People Skills
Public Speaking
Persuasion
Job Hunting And Resumes
More...
Vocabulary
GRE Vocab
SAT Vocab
TOEFL Essential Vocab
Basic English Words For All
Global Words You Should Know
Business English
More...
Languages
AP German Vocab
AP Latin Vocab
SAT Subject Test: French
Italian Survival
Norwegian Survival
More...
Engineering
Audio Engineering
Computer Science Engineering
Aerospace Engineering
Chemical Engineering
Structural Engineering
More...
Health Sciences
Basic Nursing Skills
Health Science Language Fundamentals
Veterinary Technology Medical Language
Cardiology
Clinical Surgery
More...
English
Grammar Fundamentals
Literary And Rhetorical Vocab
Elements Of Style Vocab
Introduction To English Major
Complete Advanced Sentences
Literature
Homonyms
More...
Math
Algebra Formulas
Basic Arithmetic: Measurements
Metric Conversions
Geometric Properties
Important Math Facts
Number Sense Vocab
Business Math
More...
Other Major Subjects
Science
Economics
History
Law
Performing-arts
Cooking
Logic & Reasoning
Trivia
Browse all subjects
Browse all tests
Most popular tests