SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CCNA Network Fundamentals Vocab
Start Test
Study First
Subjects
:
cisco
,
it-skills
,
ccna
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. To change the energy levels transmitted over some networking medium to transmit bits over that medium.
encode
electromagnetic interface
slash format
scheme
2. From the priviledged mode - you can enter the device's global caonfiguration mode. From global configuration mode - you can configure global parameters or enter other configuration submodes such as interface - router and line configuration submodes.
argument
distributed
global configuration mod
protocol suite
3. A method of internal processing by LAN switches. The switch must receive the entire frame before it sends the first bit of the frame. Store and forward switch is the method used by cisco switches.
media independent
token passing
store and forward
intranet
4. The IPv4 address block 192.0.2.0 to 192.0.2.255 that is set aside for teaching and learning purposes. These addresses can be used in documentation and network examples.
registered ports
test-net address
user executive mode
octet
5. A 1-bit flag in the TCP header that is used to request to the higher layers for immediate delivery of the packet.
PSH
most significant bit
instant messaging
Internet service provider
6. The layer 2 pdu that has been encoded by a data link layer protocol for digital transmission. Some different kinds of frames are ethernet frames and PPP frames.
frame
forwarding
firewall
server message block
7. A network of computers that behave as if they are connected to the same network segment - even through they might be physically located on different segments of a LAN. VLANs are configured through software on the switch and router.
bit
virtual local area network
hop
locally administered address
8. In ethernet - the results of two nodes transmitting simlutaneously. The signals from each device are damaged when they combine on the media
collision
data termianl equipment
source
deterministic
9. A broadcast that is sent to a specific network or series of networks.
signal
limited broadcast
store and forward
most significant bit
10. A routing feature in which frames in an interface output queue are prioritized based on various characteristics such as packet size and interface type.
subnet mask
firewall
priority queing
bridge table
11. A 32-bit field in the tcp segment header that specifies the sequence number of the next byte this host expects to receive as a part of the TCP session. It is used to recognize lost packets and flow control
burned in address
acknowledgment number
ARP cache
Internet Assigned Numbers Authority
12. A process where multiple digital data streams are combined into one signal.
multiplexing
Address resolution protocol
connectionless
slot time
13. The physical interface transceivers. It deals with Layer 1 (the physical layer - hence the PHY) of ethernet.
collision
network interface card
ethernet PHY
dynamic routing
14. Unique addresses that are public domain addresses.
resource records
prviate address
port
globally scoped addresses
15. A group defined by a class D address (multicast - ranging from 224.0.0.0 to 239.255.255.255) - whereupon hosts can pertain to multicast groups. Hosts that have the same multicast address are part of the same host group.
hub
host group
local area network
locally administered address
16. As filed in the TCP header that is set in a sent segment - signifies the maximum amount of unacknowledged data the host is willing to receive before the other sending host must wait for an acknowledgment.
Pad
carrier
hierarchical addressing
window size
17. MDIX is an alternative operation of ethernet ports on a hub. In this mode - the mapping of the wire pairs used in the hub port is in a crossover configuration. This allows you to use a straight-through cable to interconnect the hub to another hub.
IP address
Network time protocol
media-dependent interface crossover
subnet mask
18. Resources used to manage or operate the network. Overhead consumes bandwidth and reduces the amount of application data that can be transported across the network.
fault tolerance
overhead
synchronous
download
19. A host or node that participates in some form of a group. For example - p2p technology defines a group of peers that participate jointly in the same activity - each one having a server and client component.
Thicknet
peer
extended star
fragmentation
20. This field of a frame signals the beginning or end of a frame.
delimiter
4b/5b
subnet mask
best effort
21. A network created for devices located in a limited geographic area - through which the company owning the LAN has the right to run cables.
selective forwarding
ARP table
local area network
collision
22. A computer program that runs in the background and is usually initiated as a process. Daemons often support server processes.
dotted decimal
Open systems interconnection
bridge table
daemon
23. A 1-bit flag in the TCP header used to indicate that the receiving host should notify the destination process to do urgent processing.
virtual local area network
URG
carrier sense multiple access (CSMA)
MAC table
24. A part of a computer network that every device communicates with using the same physical medium. Network segments are extended by hubs or repeaters.
connection oriented
broadcast address
high-order bit
network segment
25. A general type of cable - with the cable holding twisted pairs of copper wires and the cable itself having little shielding.
metropolitan-area network
nonreturn to zero
scalability
unshieled twisted-pair
26. Computer hardware - typically used for LANS - that allows the computer to connect to some network cable. The NIC can then send and receive data over the cable at the direction of the computer.
Mail user agent
smtp
network interface card
acknowledgment
27. Data that directs a process. a flag in a data-link frame is an example of control data.
Interpret as command
collision
control data
round-trip time
28. A method of expressing a network prefix. It uses a forward slash / followed by the network prefix.
limited scope address
Institute of Electrical and Electronics Engineers
directly connected network
slash format
29. A network with a geographic size between a LAN and a WAN. Typically used by service providers to create a highspeed network in a major metropolitan area where many customers might want high speed services between large sites around a city.
intermediary device
metropolitan-area network
Internet service provider
kilobits per second
30. A plan - design or program of action to be followed. Sometimes an addressing plan is called an addressing SCHEME.
scheme
Internet Engineering Task Force
media independent
channel
31. An entry in an IP routing table that was created because a network engineer entered the routing information into the router's configuration.
channel service unit/data service unit
broadcast address
static route
media-dependent interface (MDI)
32. A protocol that allows a computer to retrieve email from a server.
virtual terminal line
Regional Internet Registries
post office protocol
association identity AID
33. Communication that allows receipt and transmission simultaneously. A station can transmit and receive at the same time. There are no collisions with full-duplex ethernet transmision.
Requests for Comments
enable password
full duplex
IP
34. An IP address that has been registered with IANA or one of its member agencies - which guarantees that the address is globally unique. Globally unique public IP addresses can be used for packets sent through the Internet.
public address
instant messaging
virtual circuit
hybrid fiber-coax
35. In the telnet application - commands are always introduced by a character with the decimal code 255 - known as the Interpret as Command character.
Interpret as command
transparent bridging
logical network
flash
36. The IEEE 802.2 standard that defines the upper sublayer of the Ethernet Layer 2 specifications.
Logical link control
convergence
media access control
prefix length
37. The MAC algorithm used by ethernet devices in a shared media. The protocol requires a node wishing to transmit to listen for a carrier signal before trying to send. If a carrier is sensed - the node waits for transmission in progress to finish before
token passing
proxy arp
carrier sense multiple access collision detect (CSMA/CD)
extranet
38. In TCP - the process of taking a large chunk of data and breaking it into small enough pieces to fit within a TCP segment without breaking any rules about the maximum amount of data allowed in a segment.
switch table
SYN
full duplex
segmentation
39. A network device that accesses a service on another computer remotely by accessing the network.
control data
client
best effort
Organizational Unique Identifier
40. In networking - this term is used in several ways. With ethernet hub and switch hardware - port is simply another name for interface - which is a physical connector in the swithc into whic a cable can be connected. With TCP and UDP - a port is a soft
Thicknet
client
port
protocol data unit
41. The learning of source addresses on incoming frames and adding them to the bridging table. After the table has been completed and when a frame is received on one of the bridge's interfaces - the bridge looks up the frame's destination address in its
public address
hypertext transfer protocol
transparent bridging
node
42. A name - as defined by DNS that uniquely identifies a computer in the internet. DNS servers can then respond to the DNS requests by supplying the IP address that is used by the computer that has a particular domain name. This term also refers to the
SYN
Internet
hybrid fiber-coax
domain name
43. A convention for writing IP addresses with four decimal numbers - ranging from 0 to 255 - with each octet representing 8 bits of the 32 bit IP address. The term originates from the fact that each of the four decimal numbers is separated by a period.
router
source IP address
maximum transmission unit
dotted decimal
44. Any combination of hardware device and/or software application designed to protect network devices from outside network users and/or malicious applications and files.
physical address
firewall
synchronous
local area network
45. 1.collection of computers - printers - routers - switches - and other devices that can communication with each other over some transmission medium. 2. command that assgins a NIC based address to which the router is directly connected.
registered ports
network
host address
virtual circuit
46. The IP address of the originating host that is placed into the IP packet header.
symmetric switching
convergence
source IP address
dns resolver
47. A network scanning technique used to identify which host IP addresses are operational.
slash format
ping sweep
unshieled twisted-pair
Internet service provider
48. The process of obscuring information to make it unreadable without special knowledge - somtimes referred to as scrambling. The process takes the data to be encrypted and applies a mathematical formula to it along with a secret number. The resulting v
router
encryption
synchronous
server message block
49. The connection of devices on a common media. Sometimes a physical network is also referred to as a network segment.
physical network
authoritative
reserved link-local addresses
decapsulation
50. International standardization program created by ISO and ITU-T to develop standards for data networking that facilitate multivendor equipment interoperability
priority queing
router
scalability
Open systems interconnection