SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CCNA Network Fundamentals Vocab
Start Test
Study First
Subjects
:
cisco
,
it-skills
,
ccna
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Path through an internetwork through which packets are forwarded.
router
positional notation
pinout
nonreturn to zero
2. A notification sent from one network device to another to confirm that some event has occured.
bridge table
Mail user agent
acknowledgment
ARP table
3. The table used by a switch that associates MAC addresses with the outgoing port. A general term for the table that a LAN bridge uses for its forwarding/filtering decisions. The table holds a list of MAC addresses and the port out which the bridge sho
authentication
fiber-optic cable
switch table
network interface card
4. A group that receives a multicast transmission. The members of a multicast group have the same mulitcast IP addressing to receive the same transmission.
FIN
multicast group
Internet
Pad
5. A broadcast that is sent to a specific network or series of networks.
throuhpu
limited broadcast
dynamic host configuration protocol
router
6. In IP subnetting - this refers to the portion of a set of IP addresses whose value must be identical for the addresses to be in the same subnet.
logical topology
source IP address
carrier sense multiple access (CSMA)
prefix length
7. The extent of a certain item. For example - an address scope is also known as a range of addresses from beginning of the range to the end.
server message block
scope
authentication
best effort
8. A request for information. Queries are answered with replies.
query
data termianl equipment
classless addressing
fragmentation
9. A 1-bit flag in the TCP header used to indicate that the receiving host should notify the destination process to do urgent processing.
authentication
International Organization for Standardization
loopback
URG
10. A host or node that participates in some form of a group. For example - p2p technology defines a group of peers that participate jointly in the same activity - each one having a server and client component.
peer
carrier
physical network
virtual circuit
11. A common term for 10base2 ethernet - referring to the fact that 10base2 cabling is thinner than coaxial cabling used for 10base5
Mail user agent
Internet service provider
dispersion
thinnet
12. A device that connects to a local digital telephone loop for a WAN circuit to a serial interface on a network device - typically connecting to a router. The CSU/DSU performs physical Layer 1 signaling on WAN circuits
Packet Tracer
channel service unit/data service unit
Thicknet
hop
13. A network that is connected to a device's interface. For example networks that interface with the router are known to be directly connected. Devices learn their initial IP routes based on being connected to these subnets.
directly connected network
shielded twisted pair cable
loopback
connection oriented
14. An IPv4 address in the range of 169.254.1.0 to 169.254.254.255. Communication using these addresses is used with a ttl of 1 and limited to the local network
extranet
locally administered address
collaborative
link-local address
15. On a switch - a table that lists all known MAC addresses - and the bridges/switch port out which the bridge/switch should forward frames sent to each MAC address.
MAC table
Internet Assigned Numbers Authority
nonvolatile RAM (NVRAM)
IP
16. The process by which a router receives an incoming frame - discards the ata link header and trailer - makes a forwarding decision based on the destination IP address - adds a new data-link header and trailer based on the outgoing interface and forwar
full duplex
routing
hub
flooding
17. An application protocol typically not used by end users. Instead - it is used by the network management software and networking devices to allow a network engineer to monitor and troubleshoot network problems.
code gropu
smtp
scope
most significant bit
18. The process of obscuring information to make it unreadable without special knowledge - somtimes referred to as scrambling. The process takes the data to be encrypted and applies a mathematical formula to it along with a secret number. The resulting v
encryption
query
port
AND
19. A network of computers that behave as if they are connected to the same network segment - even through they might be physically located on different segments of a LAN. VLANs are configured through software on the switch and router.
network baseline
session
virtual local area network
static route
20. A group of 8 binary bits. It is similar to - but not the same as - a byte. One Application in computer network is to use octets to divide IPv4 addresses into four components
octet
electromagnetic interface
layered model
control data
21. A protocol that allows a computer to retrieve email from a server.
network interface card
metropolitan-area network
post office protocol
router protocol
22. A 1-bit flag in the TCP header that is used to request to the higher layers for immediate delivery of the packet.
host group
PSH
Internet Assigned Numbers Authority
broadcast address
23. The IEEE 802.2 standard that defines the upper sublayer of the Ethernet Layer 2 specifications.
Logical link control
Institute of Electrical and Electronics Engineers
channel service unit/data service unit
unshieled twisted-pair
24. Communication that only allows one station to receive while the other station is transmitting
proxy arp
half duplex
segmentation
transparent bridging
25. A list of router holds in memory for the purpose of deciding how to forward packets.
deterministic
client
hop
routing table
26. A process used to verify the identity of a person or process
local area network
authentication
encode
Organizational Unique Identifier
27. A collection of data that establishes a reference for network performance and behavior over a period of time. This reference data is used in the future to assess the health and relative growth of network utilization.
network baseline
segment
port
limited broadcast
28. In ethernet a layer 2 device that receives an electrical signal in one port - interprets the bits - and makes a filtering or forwarding decision about the frame. If it forward - it sends a regenerated signal. Switches typically have many physical por
switch
physical media
instant messaging
physical network
29. Routing table entry that is used to direct frames for which a next hop is not explicitly listed in the routing table. This route is used to forward a packet when no other known route exists for a give packet's destination address.
jam signal
ARP cache
limited scope address
default route
30. Any combination of hardware device and/or software application designed to protect network devices from outside network users and/or malicious applications and files.
ACK
gateway
firewall
host
31. A network device that has an IPv4 address assigned to it to communication over a network.
host
International Organization for Standardization
hub
ping sweep
32. Ethernet that transmits data at 1 -000 -000 -000 one billion bits per second.
dotted decimal
priority queing
gigabit ethernet
Internet
33. An entry in an IP routing table that was created because a network engineer entered the routing information into the router's configuration.
static route
cyclic redundancy check
IP address
Internet backbone
34. In the telnet application - commands are always introduced by a character with the decimal code 255 - known as the Interpret as Command character.
distributed
Interpret as command
Internet control message protocol
Open systems interconnection
35. A service or a program to look up information in the DNS
nslookup
logical network
positional notation
ARP poisoning
36. Binary digit used in the binary numbering system. Binary digits are units of information storage and communication in computing. Each bit can be either a 0 or a 1.
directed broadcast
bit
bit time
gigabit ethernet
37. A type of hash function that is used to produce a small - fixed size checksum of a block of data - such as a packet or a computer file. A CRC is computed and appended before transmission or storage - and verified afterward by the recipient to confirm
cyclic redundancy check
Pad
shielded twisted pair cable
Time to live
38. A temporary storage where data that has been retrieved or calculated and is accessed frequently can be stored. After the data is stored in the cache - the processes can access the cached copy instead of accessing the original data. A cache reduces th
node
logical topology
backoff algorithm
cache
39. A computer program that runs in the background and is usually initiated as a process. Daemons often support server processes.
packet
collision domain
daemon
hub
40. Using values between 1024 and 49 -151 these numbers are equivalent to well-known ports in concept - but they are specifically used for nonprivileged application processes.
cache
registered ports
bit time
syntax
41. Routing that adjusts automatically to network topology or traffic changes.
segmentation
server message block
flow control
dynamic routing
42. A dotted decimal number that helps identify the structure of IP addresses. The mask represents the network and subnet parts of related IP addresses with binary 1s and the host part of related IP addresses with binary 0s
network segment
subnet mask
signal
ARP cache
43. The process by which a device adds networking heads and trailers to data from an application for the eventual transmission of the data onto a transmission medium.
extended star
encapsulation
encryption
token passing
44. Defines the commands - headers and processes by which web server and web browsers transfer files.
hypertext transfer protocol
gateway
Internet Assigned Numbers Authority
bridge
45. 1. a collision domain that is a section of a LAN that is bound by bridges - routers or switches. 2. In a LAN using a bus topology - a segment is a continuous electrical circuit that is often connected to other such segments with repeaters. 3. When us
segment
Logical link control
code gropu
collision domain
46. Random-access memory that does not lose its contents when the computer is shut down
nonvolatile RAM (NVRAM)
cloud
packet
octet
47. Translation RFC 1918 addresses to public domain addresses. Because RFC 1918 addresses are not routerd on the Internet - hosts accessing the Internet must use public domain addresses.
connectionless
cloud
Network address translation (NAT)
noise
48. A high-speed line or series of connections that forms a major pathway within a network. The term is often used to describe the main network connections comprising the Internet.
client
enable password
argument
Internet backbone
49. A model that consists of various layers that enable the development and explanation of technology to be done on a modular basis. This allows interoperability among different technologies among the different layers.
routing
layered model
port
quality of service
50. Used by tcp or udp - with values between 0 and 1023 - these ports are allocated by high-privilege processes. They are used so that all clients know the correct port number to connect to.
well known ports
Packet Tracer
multicast group
binary