Test your basic knowledge |

CCNA Network Fundamentals Vocab

Subjects : cisco, it-skills, ccna
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. The structure and order of words in a computer language






2. Somtimes called place-value notation - this is a numeral system in which each position is related to the next by a constant multiplier - a common ration - called the base or radix of that numeral system.






3. An IPv4 multicast address that is restricted to a local group or organization






4. In a shared media ethernet network - a signal generated by the transmitting devices that detects the collision. The jam signal continue to transmit for a specified period to ensure that all devices on the network detect the collision. The jame signal






5. An application protocol typically not used by end users. Instead - it is used by the network management software and networking devices to allow a network engineer to monitor and troubleshoot network problems.






6. A common term for 10base2 ethernet - referring to the fact that 10base2 cabling is thinner than coaxial cabling used for 10base5






7. The MAC algorithm used by ethernet devices in a shared media. The protocol requires a node wishing to transmit to listen for a carrier signal before trying to send. If a carrier is sensed - the node waits for transmission in progress to finish before






8. On a switch - a table that lists all known MAC addresses - and the bridges/switch port out which the bridge/switch should forward frames sent to each MAC address.






9. A form of signal modulation where the message information is encoded in the amplitude of series of signal pulses. It transmits data by varying the aplitunes of the individual pulses. This is now obsolete and has been replaced by pulse code modulation






10. The ability of a protocol. system or component to be modified to fit a new need.






11. The table used by a switch or bridge that associates MAC addresses with the outgoing port. The switch or bridge uses this table for its forwarding/filtering decisions.






12. A process where multiple digital data streams are combined into one signal.






13. A dotted decimal number defined by the IPv4 protocol to represent a network or subnet. It represents the network that hosts reside in. Also called a network number or network ID.






14. A protocol for synchronizing the clocks of computer systems over packet-switch data networks. NTP uses UDP port 123 as its transport layer.






15. Resources used to manage or operate the network. Overhead consumes bandwidth and reduces the amount of application data that can be transported across the network.






16. The header defined by the IP. Used to create IP packets by encapsulating data supplied by higher-layer protocol (such as TCP) behind an IP header.






17. Define in RFC 1918 - an IP address that does not have to be globally unique because the address exists inside packets only when the packets are inside a single private IP internetwork. Private IP addresses are popularly used in most company today - w






18. A system of network design characterized by one or more major components that are required to maintain operation.






19. The process by which a device adds networking heads and trailers to data from an application for the eventual transmission of the data onto a transmission medium.






20. The extent of a certain item. For example - an address scope is also known as a range of addresses from beginning of the range to the end.






21. Interface by magnetic signals caused by the flow of electricity. EMI can cause reduced data integrity and increased error rates on transmission channels. The physics of this process are that electrical current creates magnetic fields - which in turn






22. The loss of communication signal on the media. This loss is due to degradation of the energy wave over time.






23. A MAC address that can be configured on a device. The LAA can be used in place of the BIA . This means that you can replace a NIC or use a substitute device without changing the address used by the network to access the station.






24. A 1-bit flag in the TCP header that is used to request that a connection be re-established.






25. From the priviledged mode - you can enter the device's global caonfiguration mode. From global configuration mode - you can configure global parameters or enter other configuration submodes such as interface - router and line configuration submodes.






26. A command on many computer operating systems that discovers the IP addresses - and possibly host names - of the routers used by the network when sending a packet from one computer to another.






27. A part of a computer network that every device communicates with using the same physical medium. Network segments are extended by hubs or repeaters.






28. A number used in the 802.11 header to specify the session between a wireless client and the access point.






29. A member of a multicast group. Every multicast client in each group has the same IP address. Multicast addresses begin with 224... and end with 239...






30. The portion of a binary number that carries the most weight - the one written farthest to the left. High-order bits are the 1s in the network mask.






31. The IPv4 address block 192.0.2.0 to 192.0.2.255 that is set aside for teaching and learning purposes. These addresses can be used in documentation and network examples.






32. The design on networks that can continue to operate without interruption in the case of hardware - software or communications failures.






33. The spreading of light signal caused by light signals traveling at different speeds through a fiber.






34. Defines the commands - headers and processes by which web server and web browsers transfer files.






35. A delineation of networking protocols and standards into different categories - called layers - along with definitions of which sets of standards and protocols need to be implemented to create products that can be used to create a working network






36. Additional data that is provided with a command to provide information used by the execution of the command. IOS command arguments are entered at the CLI after the command






37. A 1-bit flag in the TCP header used to indicate that the receiving host should notify the destination process to do urgent processing.






38. The network that combines enterprise networks - individual users - and ISPs into a single global IP network.






39. An internationally recognized definition of technical specifications that ensure worldwide consistency.






40. In TCP - the process of taking a large chunk of data and breaking it into small enough pieces to fit within a TCP segment without breaking any rules about the maximum amount of data allowed in a segment.






41. The reference to text based logical interfaces on an ios device. These are accesses using telnet or ssh to perform administrative tasks. VTY lines are also called virtual type terminal.






42. Computer hardware - typically used for LANS - that allows the computer to connect to some network cable. The NIC can then send and receive data over the cable at the direction of the computer.






43. Represents the 0 in the binary number. In an IP subnet mask - the lower-order bits represent the host portion. Sometimes called the host portion of bits.






44. The glass fibers inside certain cables over which light is transmitted to encode 0 and 1






45. In the telnet application - commands are always introduced by a character with the decimal code 255 - known as the Interpret as Command character.






46. A temporary storage where data that has been retrieved or calculated and is accessed frequently can be stored. After the data is stored in the cache - the processes can access the cached copy instead of accessing the original data. A cache reduces th






47. Application-level throughput. It is the number of useful bits per unit of time from a certain source address to a certain destination - excluding protocol overhead and excluding retransmitted data packets.






48. An entry in an IP routing table that was created because a network engineer entered the routing information into the router's configuration.






49. A popular certification method for fiber systems. The OTDR injects light into the fiber and then graphically displays the results of the detected reflected light. The OTDR measures the elapsed transit time of reflected light to calculate the distance






50. A logical connection between devices in which the frames are passed between the devices. Virtual circuits are independent of the physical structure and may be established through multiple physical devices.