Test your basic knowledge |

CCNA Network Fundamentals Vocab

Subjects : cisco, it-skills, ccna
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A protocol used between routers so that they can learn routes to add to their routing tables.






2. A field in the IP header that prevents a packet form indefinitely looping around an IP internetwork. Router decrements the TTL field each time they forward a packet - and if they decrement the TTL to 0 - the router discards the packet - which prevent






3. A device that connects multiple network segments at the data link layer of the OSI model. Bridges were the predecessor to LAN switches.






4. A 1-bt flag in the TCP header used to indicate the initial value of the sequence number. The SYN flag is only set in the first two segments of the three-way TCP connection establishment sequence.






5. From the priviledged mode - you can enter the device's global caonfiguration mode. From global configuration mode - you can configure global parameters or enter other configuration submodes such as interface - router and line configuration submodes.






6. The structure and order of words in a computer language






7. One of the three basic binary logic operations. ANDing yields the following result: 1 and 1 = 1 - 1 and 0 = 0 - 0 and 1 = 0






8. The MAC algorithm used by ethernet devices in a shared media. The protocol requires a node wishing to transmit to listen for a carrier signal before trying to send. If a carrier is sensed - the node waits for transmission in progress to finish before






9. A control mechanism that can provide different priorities to different users or data flows - or guarantee a certain level of performance to a data flow in accordance with requests from the application program.






10. The first half of a MAC address. Manufactures must ensure that the value of the OUI has been registered with the IEEE. This value identifies the manufacturer of any Ethernet NIC or interface.






11. Any communication in which the sender and receiver do not prearrange for communications to occur






12. A request for information. Queries are answered with replies.






13. The reference to text based logical interfaces on an ios device. These are accesses using telnet or ssh to perform administrative tasks. VTY lines are also called virtual type terminal.






14. The IP address of the originating host that is placed into the IP packet header.






15. A delineation of networking protocols and standards into different categories - called layers - along with definitions of which sets of standards and protocols need to be implemented to create products that can be used to create a working network






16. An international - nonprofit organization for the advancement of technology related to eletricity. IEEE maintains the standards defining many LAN protocols.






17. The arrangement of the nodes in a network and the physical connections between them. This is the representation of how the media is used to connect the devices.






18. A combination of many IP subnets and networks - as created by building a network using routers. The term internwork is used to avoid confusion with the term network - because an internetwork can include several IP networks.






19. The spreading of light signal caused by light signals traveling at different speeds through a fiber.






20. A process by which an end device - after it receives data over some transmission medium - examines the headers and trailers at each successive higher layer - eventually handing the data to the correct application. Sometimes called de-encapsulation.






21. Radio frequencies that creat noise that interferes with information being transmitted across unshielded copper cabling.






22. A protocol that allows a computer to retrieve email from a server.






23. TCP or UDP ports that range from 49152 to 65535 and are not used by any defined server applications.






24. An access method used with some LAN technologies by which devices access the media in a controlled manner. This access to the LAN is managed using a small frame called a toke. A device can send only when it has claimed the use of the token.






25. Data that directs a process. a flag in a data-link frame is an example of control data.






26. An IPV4 addressing scheme that uses a subnet mask that does not follow classful addressing limitations. It provides increased flexibility when dividing ranges of IP addresses into separate networks. Classless addressing is considered the best in curr






27. A protocol used to dynamically assign IP configurations to hosts. The services defined by the protocol are used to request and assign an IP address - default gateway - and DNS server address to a network host.






28. Translation RFC 1918 addresses to public domain addresses. Because RFC 1918 addresses are not routerd on the Internet - hosts accessing the Internet must use public domain addresses.






29. The ability of a protocol. system or component to be modified to fit a new need.






30. A dotted decimal number defined by the IPv4 protocol to represent a network or subnet. It represents the network that hosts reside in. Also called a network number or network ID.






31. Ethernet that transmits data at 1 -000 -000 -000 one billion bits per second.






32. A 1-bit flag in the tcp header that indicates the acknowledgment field is valid.






33. A network scanning technique used to identify which host IP addresses are operational.






34. A common name for ethernet technology that operates at 100 mbps.






35. A device such as a desktop or mobile device that is used by an end user.






36. Path through an internetwork through which packets are forwarded.






37. A process where multiple digital data streams are combined into one signal.






38. Routing that adjusts automatically to network topology or traffic changes.






39. To transfer data from the computer functioning as a server to the client computer you are using.






40. A service or a program to look up information in the DNS






41. A name - as defined by DNS that uniquely identifies a computer in the internet. DNS servers can then respond to the DNS requests by supplying the IP address that is used by the computer that has a particular domain name. This term also refers to the






42. A communication path over a medium used to transport information from a sender to a receiver. Multiple channels can be multiplexed over a single cable






43. An application protocol typically not used by end users. Instead - it is used by the network management software and networking devices to allow a network engineer to monitor and troubleshoot network problems.






44. Information systems that allow the creation of a document or documents that can be edited by more than one person in real time






45. A network topology characterized by a central location connected to multiple hubs. In an extended star - these interconnected hubs may be connected to more hubs. It is essentially a hierarchical topology but typically is drawn with the central site i






46. A collection of data that establishes a reference for network performance and behavior over a period of time. This reference data is used in the future to assess the health and relative growth of network utilization.






47. As filed in the TCP header that is set in a sent segment - signifies the maximum amount of unacknowledged data the host is willing to receive before the other sending host must wait for an acknowledgment.






48. Real-time communication between two or more people through text. The text is conveyed through computers connected over a network such as the internet. files can also be transferred through the IM program to share files.






49. A generic term from OSI that refers to the data - headers - and trailers about which a particular network layer is concerned.






50. Somtimes called place-value notation - this is a numeral system in which each position is related to the next by a constant multiplier - a common ration - called the base or radix of that numeral system.