SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CCNA Network Fundamentals Vocab
Start Test
Study First
Subjects
:
cisco
,
it-skills
,
ccna
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A control mechanism that can provide different priorities to different users or data flows - or guarantee a certain level of performance to a data flow in accordance with requests from the application program.
pulse amplitude modulation
plug-in
PSH
quality of service
2. Used in the CLI following the command. Keywords are parameters that are used with the command from a set of predefined values.
authoritative
keyword
RST
link-local address
3. From the priviledged mode - you can enter the device's global caonfiguration mode. From global configuration mode - you can configure global parameters or enter other configuration submodes such as interface - router and line configuration submodes.
decapsulation
Internet
pulse amplitude modulation
global configuration mod
4. A dotted decimal number that helps identify the structure of IP addresses. The mask represents the network and subnet parts of related IP addresses with binary 1s and the host part of related IP addresses with binary 0s
store and forward
subnet mask
directed broadcast
collision domain
5. Can refer to computer hardware that is to be used by multiple concurrent users. Alternatively - this term can refer to computer software that provides services to many users. For example - a web server consists of web server software running on some
metropolitan-area network
port
subnet mask
server
6. An international - nonprofit organization for the advancement of technology related to eletricity. IEEE maintains the standards defining many LAN protocols.
domain name
bit time
Institute of Electrical and Electronics Engineers
query
7. A drag-and-drop network simulator developed by Cisco to design - configure and troubleshoot network equipment within a controlled - simulated program environment.
Organizational Unique Identifier
Packet Tracer
carrier sense multiple access (CSMA)
best effort
8. A general type of cable - with the cable holding twisted pairs of copper wires and the cable itself having little shielding.
unshieled twisted-pair
dispersion
full duplex
broadcast domain
9. A network topology characterized by a central location connected to multiple hubs. In an extended star - these interconnected hubs may be connected to more hubs. It is essentially a hierarchical topology but typically is drawn with the central site i
MAC table
ping sweep
extended star
router
10. A process used to verify the identity of a person or process
authentication
symmetric switching
public address
physical address
11. An entry in an IP routing table that was created because a network engineer entered the routing information into the router's configuration.
cyclic redundancy check
classless addressing
control data
static route
12. As part of the TCP/IP internet layer - ICMP defines protocol messages used to inform network engineeres of how well an internetwork is working. For example - the ping command sends ICMP messages to determine whether a host can send packets ot another
throuhpu
network address
client
Internet control message protocol
13. Another form of the root word converge in the phrase converged network. This kind of network aggregates various forms of traffic such as voice - video and data on the same network infrastructure. A more common usage represents the process by which ro
selective forwarding
acknowledgment number
convergence
authentication
14. Unique addresses that are public domain addresses.
globally scoped addresses
default route
logical network
broadcast domain
15. 1.collection of computers - printers - routers - switches - and other devices that can communication with each other over some transmission medium. 2. command that assgins a NIC based address to which the router is directly connected.
network
public address
bridging
flow control
16. In ethernet - the process performed by a bridge or switch when it decides that it should not forward a frame out another port
filtering
domain name system
decapsulation
burned in address
17. A network device - typically connected to a range of LAN and WAN interfaces - that forwards packets based on their destination IP addresses.
plug-in
router
switch table
encapsulation
18. Information systems that allow the creation of a document or documents that can be edited by more than one person in real time
source
collaborative
Internet Assigned Numbers Authority
intranet
19. Data link layer term describing a device connected to a network.
protocol data unit
segment
node
router
20. Line code in which 1s are represented by one significant condition and 0s are represented by another.
limited broadcast
nonreturn to zero
subnet
store and forward
21. A device such as a desktop or mobile device that is used by an end user.
end device
Internet backbone
FIN
instant messaging
22. Also known as boolean algebra. These consist of the AND OR and IF operations
Network time protocol
routing
digital logic
well known ports
23. A system of network design characterized by one or more major components that are required to maintain operation.
ARP table
bit time
single point of failure
slot time
24. In ethernet - a device that receives an electrical signal in one port - interprets the bits and regenerates a clean signal that it sends out all other ports of the hub. Typically it also supplies several ports - which are oftentimes RJ-45 jacks.
subnet mask
server
code gropu
hub
25. A 32-bit field in the tcp segment header that specifies the sequence number of the next byte this host expects to receive as a part of the TCP session. It is used to recognize lost packets and flow control
acknowledgment number
encode
jam signal
fragmentation
26. The passage of a data packet between two network nodes.
hop
Regional Internet Registries
fiber-optic cable
backoff algorithm
27. In TCP - the process of taking a large chunk of data and breaking it into small enough pieces to fit within a TCP segment without breaking any rules about the maximum amount of data allowed in a segment.
subnet
segmentation
attenuation
default route
28. A process that uses the same ARP messages as a normal ARP - but by which a router replies instead of the host listed in the ARP request. When a router sees an ARP request that cannot reach the intended host - but for which the router knows a route to
pinout
media-dependent interface (MDI)
hop
proxy arp
29. Any communication in which the sender and receiver do not prearrange for communications to occur
connectionless
multicast group
full duplex
ARP poisoning
30. A technique used to attack an ethernet network by sending fake ARP messages to an ethernet LAN. These frames contain false MAC addresses that confuse network devices - such as switches. As a result - frames intended for one node can be mistakenly sen
plug-in
ARP poisoning
bandwidth
association identity AID
31. A network that is connected to a device's interface. For example networks that interface with the router are known to be directly connected. Devices learn their initial IP routes based on being connected to these subnets.
router
switch table
directly connected network
internetwork
32. A special reserved IPv4 address - 127.0.0.1 that can be used to test TCP/IP applications. Packets sent to 127.0.0.1 by a computer never leave the computer or even require working NIC. Instead - the packet is processed by IP at the lowest layer and is
connection oriented
ping sweep
best effort
loopback
33. An IPv4 multicast address that is restricted to a local group or organization.
kilobits per second
MAC table
limited scope address
digital logic
34. In LAN switches a reference to cases in which a frame is forwarded - or switche - when the incoming and outgoing interfaces use the same speed. It is the opposite of asymmetric switching.
selective forwarding
symmetric switching
carrier sense multiple access collision detect (CSMA/CD)
scheme
35. An organization that assigns the numbers important to the proper operation of the TCP/IP protocol and the Internet - including assigning globally unique IP addresses.
manchester encoding
priority queing
Internet Assigned Numbers Authority
logical topology
36. The number of various unique digits - including 0 that a positional number system uses to represent numbers. For example - in the binary system (base 2) the radix is 2. In the decimal system the radix is 10.
FIN
maximum transmission unit
radix
token passing
37. The learning of source addresses on incoming frames and adding them to the bridging table. After the table has been completed and when a frame is received on one of the bridge's interfaces - the bridge looks up the frame's destination address in its
transparent bridging
domain name system
bit
Time to live
38. Any combination of hardware device and/or software application designed to protect network devices from outside network users and/or malicious applications and files.
single point of failure
flash
firewall
broadcast domain
39. One of the three basic binary logic operations. ANDing yields the following result: 1 and 1 = 1 - 1 and 0 = 0 - 0 and 1 = 0
most significant bit
Internet Assigned Numbers Authority
AND
connectionless
40. An international standards body that defines many networking standards. Also - the standards body that created the OSI model.
carrier
International Organization for Standardization
nonreturn to zero
peer
41. A routing feature in which frames in an interface output queue are prioritized based on various characteristics such as packet size and interface type.
priority queing
end device
media-dependent interface (MDI)
carrier sense multiple access collision detect (CSMA/CD)
42. Unencrypted password used to allow access to privledge EXEC mode from IOS user EXEC mode.
dynamic or private ports
goodput
enable password
low-order bit
43. The retransmission delay used with CSMA/CD when a collision occurs. The algorithm forces each sender that detected the collisions to delay a random amount of time before attempting to retransmit.
AND
scalability
virtual terminal line
backoff algorithm
44. A request for information. Queries are answered with replies.
query
port
Network address translation (NAT)
digital logic
45. A network device that has an IPv4 address assigned to it to communication over a network.
data communications equipment
connection oriented
host
classful addressing
46. An IP address that has been registered with IANA or one of its member agencies - which guarantees that the address is globally unique. Globally unique public IP addresses can be used for packets sent through the Internet.
public address
RJ-45
firewall
acknowledgment
47. A member of a multicast group. Every multicast client in each group has the same IP address. Multicast addresses begin with 224... and end with 239...
internetwork
switch table
multicast client
Internet Engineering Task Force
48. A device that connects to a local digital telephone loop for a WAN circuit to a serial interface on a network device - typically connecting to a router. The CSU/DSU performs physical Layer 1 signaling on WAN circuits
logical topology
RST
most significant bit
channel service unit/data service unit
49. The bit position in a binary number having the greatest value. The most significant bit is sometime referred to as the leftmost bit.
IP
most significant bit
physical network
media access control
50. Refers to whether the performance of a device - attached to a particular type of LAN - can be accurately predicted. Token Ring LANS are deterministic - but ethernet LANS are non deterministic.
broadcast domain
cyclic redundancy check
octet
deterministic