SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CCNA Network Fundamentals Vocab
Start Test
Study First
Subjects
:
cisco
,
it-skills
,
ccna
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. The process of obscuring information to make it unreadable without special knowledge - somtimes referred to as scrambling. The process takes the data to be encrypted and applies a mathematical formula to it along with a secret number. The resulting v
media independent
network segment
encryption
console port
2. A rectangular cabling connector with eight pins - often used with ethernet cables.
broadcast
full duplex
source
RJ-45
3. In ethernet - the results of two nodes transmitting simlutaneously. The signals from each device are damaged when they combine on the media
metropolitan-area network
Regional Internet Registries
collision
port
4. The IP address of the originating host that is placed into the IP packet header.
overhead
synchronous
source IP address
fault tolerance
5. The network that combines enterprise networks - individual users - and ISPs into a single global IP network.
global configuration mod
reserved link-local addresses
network address
Internet
6. The dividing of IP datagrams to meet the MTU requirement of a layer 2 protocol.
fragmentation
global configuration mod
host
flooding
7. The management of data flow between devices in a network. It is used to avoid too much data arriving before a device can handle it - causing data overflow.
reserved link-local addresses
peer
subnet mask
flow control
8. The time required to send a single bit over some transmission medium. The time can be calculated at 1/speed - where speed is the number of bits per second sent over the medium
plug-in
Open systems interconnection
bit time
media independent
9. A corporate system such as a website that is explicitly used by internal employees. Can be assessed internally or remotely
ARP table
network
backoff algorithm
intranet
10. The normal operation of ethernet ports on a hub. In this mode - the mapping of the wire pairs in the hub port is in a normal configuration. Some hubs provide a media-dependent interface/media-dependent interface - crossover switch. This switch is usu
console port
Internet control message protocol
flash
media-dependent interface (MDI)
11. A type of network cabling that includes twisted-pair wires - with shielding around each pair of wires - as well as another shield around all wires in the cable.
carrier
ACK
ARP table
shielded twisted pair cable
12. Radio frequencies that creat noise that interferes with information being transmitted across unshielded copper cabling.
ethernet PHY
radio frequency interference
positional notation
burned in address
13. An application level network protocl mainly applied to shared access to files - printers - serial ports - and miscellaneous communications between nodes on a network.
unshieled twisted-pair
server message block
collaborative
network interface card
14. A system of network design characterized by one or more major components that are required to maintain operation.
protocol data unit
throuhpu
single point of failure
authoritative
15. Line code in which each bit of data is signified by at least one voltage level transition.
signal
post office protocol
manchester encoding
authentication
16. An addressing scheme in which a network is partitioned into sections - with the section identifier forming one part of each destination's address and the destination identifier forming another
hierarchical addressing
AND
token passing
overhead
17. A plan - design or program of action to be followed. Sometimes an addressing plan is called an addressing SCHEME.
enable password
keyword
convergence
scheme
18. In networking - this term is used in several ways. With ethernet hub and switch hardware - port is simply another name for interface - which is a physical connector in the swithc into whic a cable can be connected. With TCP and UDP - a port is a soft
redundancy
port
flash
thinnet
19. A protocol used to dynamically assign IP configurations to hosts. The services defined by the protocol are used to request and assign an IP address - default gateway - and DNS server address to a network host.
dynamic host configuration protocol
extranet
ping sweep
decapsulation
20. Computer hardware - typically used for LANS - that allows the computer to connect to some network cable. The NIC can then send and receive data over the cable at the direction of the computer.
data termianl equipment
Open systems interconnection
carrier
network interface card
21. The IPv4 address block 192.0.2.0 to 192.0.2.255 that is set aside for teaching and learning purposes. These addresses can be used in documentation and network examples.
test-net address
client
FIN
interframe spacing
22. Part of a company's intranet that is extended to users outside the company
selective forwarding
client
extranet
hypertext transfer protocol
23. One of the three basic binary logic operations. ANDing yields the following result: 1 and 1 = 1 - 1 and 0 = 0 - 0 and 1 = 0
AND
Internet Engineering Task Force
enable password
keyword
24. An internet wide system by which a hierarchical set of DNS servers collectively hold all the name IP address mappings - with DNS servers referring users to the correct DNS server to successfully resolve a DNS name.
scalability
positional notation
domain name system
manchester encoding
25. The bit position in a binary number having the greatest value. The most significant bit is sometime referred to as the leftmost bit.
most significant bit
ethernet PHY
ARP cache
full duplex
26. The networking layers whose processes are not affected by the media being used. In ethernet - these are all the layers from the LLC sublayer of data link upward.
download
media independent
query
round-trip time
27. A dotted decimal number defined by the IPv4 protocol to represent a network or subnet. It represents the network that hosts reside in. Also called a network number or network ID.
network address
deterministic
layered model
International Organization for Standardization
28. Used in the CLI following the command. Keywords are parameters that are used with the command from a set of predefined values.
peer
query
smtp
keyword
29. A dotted decimal number that helps identify the structure of IP addresses. The mask represents the network and subnet parts of related IP addresses with binary 1s and the host part of related IP addresses with binary 0s
subnet mask
multiplexing
ACK
node
30. An ethernet frame that is less than 64 bytes in size. Runts are caused by collisions and are also know as collision fragments
runt frame
collision
nslookup
destination IP address
31. The design on networks that can continue to operate without interruption in the case of hardware - software or communications failures.
fault tolerance
convergence
cyclic redundancy check
media-dependent interface crossover
32. Communication that uses a common clocking signal. In most synchronous communicatino - one of the communicating devices generates a clock signal into the circuit. Additional timing information is not required in the header.
synchronous
resource records
overhead
local area network
33. The MAC algorithm used by ethernet devices in a shared media. The protocol requires a node wishing to transmit to listen for a carrier signal before trying to send. If a carrier is sensed - the node waits for transmission in progress to finish before
carrier sense multiple access collision detect (CSMA/CD)
extranet
decapsulation
bridging
34. Somtimes called place-value notation - this is a numeral system in which each position is related to the next by a constant multiplier - a common ration - called the base or radix of that numeral system.
Address resolution protocol
cache
positional notation
dotted decimal
35. The time required for some network pdu's to be sent and received - and a response PDU to be sent and received. In other words - the time between when a device sends data and when the same device receives a response.
virtual local area network
round-trip time
flash
bridge table
36. Resources used to manage or operate the network. Overhead consumes bandwidth and reduces the amount of application data that can be transported across the network.
overhead
administratively scoped address
subnet mask
filtering
37. Additional data that is provided with a command to provide information used by the execution of the command. IOS command arguments are entered at the CLI after the command
argument
classful addressing
client
tracert
38. A type of hash function that is used to produce a small - fixed size checksum of a block of data - such as a packet or a computer file. A CRC is computed and appended before transmission or storage - and verified afterward by the recipient to confirm
router
link-local address
cyclic redundancy check
positional notation
39. The learning of source addresses on incoming frames and adding them to the bridging table. After the table has been completed and when a frame is received on one of the bridge's interfaces - the bridge looks up the frame's destination address in its
globally scoped addresses
Open systems interconnection
media-dependent interface (MDI)
transparent bridging
40. Network layer protocol in the TCP/IP stack offering a connectionless internetwork service. IP provides features for addressing - type-of-service specification - fragmentation and reassembly - and security.
directed broadcast
IP
Internet
noise
41. A protocol used between routers so that they can learn routes to add to their routing tables.
cloud
keyword
Packet Tracer
router protocol
42. A time period between ethernet frames that allows fairness with the CSMA/CD algorithm. Without a space between frames in other words - without some time with no frames being sent a NIC might always listen for silence - never hear silence and therefor
interframe spacing
multiplexing
console port
node
43. A 32-bit field in the tcp segment header that specifies the sequence number of the next byte this host expects to receive as a part of the TCP session. It is used to recognize lost packets and flow control
quality of service
acknowledgment number
client
multiplexing
44. An IPV4 addressing scheme that uses a subnet mask that does not follow classful addressing limitations. It provides increased flexibility when dividing ranges of IP addresses into separate networks. Classless addressing is considered the best in curr
digital logic
classless addressing
protocol data unit
metropolitan-area network
45. Routing table entry that is used to direct frames for which a next hop is not explicitly listed in the routing table. This route is used to forward a packet when no other known route exists for a give packet's destination address.
protocol data unit
fiber-optic cable
code gropu
default route
46. A unicast IP address that is considered to have three parts: a network part - a subnet part - and a host part. The term classful refers to the fact that classful network rules are first applied to the address - and then the rest of the address can be
acknowledgment
unshieled twisted-pair
channel
classful addressing
47. The process of forwarding frames in a switch or a bridge from one port to another port or from segment to segment
bridging
daemon
carrier
host group
48. Real-time communication between two or more people through text. The text is conveyed through computers connected over a network such as the internet. files can also be transferred through the IM program to share files.
encapsulation
protocol
instant messaging
nonvolatile RAM (NVRAM)
49. As filed in the TCP header that is set in a sent segment - signifies the maximum amount of unacknowledged data the host is willing to receive before the other sending host must wait for an acknowledgment.
IP header
classless addressing
window size
cache
50. The cabling and connectors used to interconnect the network devices.
TCP
enable password
physical media
positional notation
Can you answer 50 questions in 15 minutes?
Let me suggest you:
Browse all subjects
Browse all tests
Most popular tests
Major Subjects
Tests & Exams
AP
CLEP
DSST
GRE
SAT
GMAT
Certifications
CISSP go to https://www.isc2.org/
PMP
ITIL
RHCE
MCTS
More...
IT Skills
Android Programming
Data Modeling
Objective C Programming
Basic Python Programming
Adobe Illustrator
More...
Business Skills
Advertising Techniques
Business Accounting Basics
Business Strategy
Human Resource Management
Marketing Basics
More...
Soft Skills
Body Language
People Skills
Public Speaking
Persuasion
Job Hunting And Resumes
More...
Vocabulary
GRE Vocab
SAT Vocab
TOEFL Essential Vocab
Basic English Words For All
Global Words You Should Know
Business English
More...
Languages
AP German Vocab
AP Latin Vocab
SAT Subject Test: French
Italian Survival
Norwegian Survival
More...
Engineering
Audio Engineering
Computer Science Engineering
Aerospace Engineering
Chemical Engineering
Structural Engineering
More...
Health Sciences
Basic Nursing Skills
Health Science Language Fundamentals
Veterinary Technology Medical Language
Cardiology
Clinical Surgery
More...
English
Grammar Fundamentals
Literary And Rhetorical Vocab
Elements Of Style Vocab
Introduction To English Major
Complete Advanced Sentences
Literature
Homonyms
More...
Math
Algebra Formulas
Basic Arithmetic: Measurements
Metric Conversions
Geometric Properties
Important Math Facts
Number Sense Vocab
Business Math
More...
Other Major Subjects
Science
Economics
History
Law
Performing-arts
Cooking
Logic & Reasoning
Trivia
Browse all subjects
Browse all tests
Most popular tests