Test your basic knowledge |

CCNA Network Fundamentals Vocab

Subjects : cisco, it-skills, ccna
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A process by which an end device - after it receives data over some transmission medium - examines the headers and trailers at each successive higher layer - eventually handing the data to the correct application. Sometimes called de-encapsulation.






2. A network that incorporates both optical fiber along with coaxial cable to create a broadband network. commonly used by cable tv companies.






3. When used generically - this term refers to end-user data along with networking headers and trailers that are transmitted through a network. When used specifically - it is end-user data - along with the network or Internet layer headers and any highe






4. Routing that adjusts automatically to network topology or traffic changes.






5. A part of a computer network that every device communicates with using the same physical medium. Network segments are extended by hubs or repeaters.






6. International standardization program created by ISO and ITU-T to develop standards for data networking that facilitate multivendor equipment interoperability






7. The arrangement of the nodes in a network and the physical connections between them. This is the representation of how the media is used to connect the devices.






8. In networking - this term is used in several ways. With ethernet hub and switch hardware - port is simply another name for interface - which is a physical connector in the swithc into whic a cable can be connected. With TCP and UDP - a port is a soft






9. A communication path over a medium used to transport information from a sender to a receiver. Multiple channels can be multiplexed over a single cable






10. 1. a collision domain that is a section of a LAN that is bound by bridges - routers or switches. 2. In a LAN using a bus topology - a segment is a continuous electrical circuit that is often connected to other such segments with repeaters. 3. When us






11. A part of the ethernet frame that fills in the data field to ensure that the data field meets the minimum size requirement of 46 bytes.






12. In the telnet application - commands are always introduced by a character with the decimal code 255 - known as the Interpret as Command character.






13. An encoding scheme 4B/5B uses 5-bit symbols and codes to represent 4 bits of data. 4B/5B is used in 100Base-tx ethernet.






14. DNS data records. Their precise format is defined in RFC 1035. The most important fields in a resource record are Name - class - type and data.






15. A network of computers that behave as if they are connected to the same network segment - even through they might be physically located on different segments of a LAN. VLANs are configured through software on the switch and router.






16. The bit position in a binary number having the greatest value. The most significant bit is sometime referred to as the leftmost bit.






17. Information systems that allow the creation of a document or documents that can be edited by more than one person in real time






18. The optical or electrical impulse on a physical medium for purposes of communication.






19. Computer hardware - typically used for LANS - that allows the computer to connect to some network cable. The NIC can then send and receive data over the cable at the direction of the computer.






20. A service or a program to look up information in the DNS






21. Ethernet that transmits data at 1 -000 -000 -000 one billion bits per second.






22. The lower of the two sublayers of the IEEE standard for ethernet. It is also the name of that sublayer






23. A source of information that is highly reliable and known for its accuracy






24. The range of ip addresses that can be assigned by the DHCP server.






25. The design on networks that can continue to operate without interruption in the case of hardware - software or communications failures.






26. An international - nonprofit organization for the advancement of technology related to eletricity. IEEE maintains the standards defining many LAN protocols.






27. A control mechanism that can provide different priorities to different users or data flows - or guarantee a certain level of performance to a data flow in accordance with requests from the application program.






28. The extent of a certain item. For example - an address scope is also known as a range of addresses from beginning of the range to the end.






29. A method of internal processing by LAN switches. The switch must receive the entire frame before it sends the first bit of the frame. Store and forward switch is the method used by cisco switches.






30. The origin of the PDU. This can be a process a host or a node - depending on the layer to which you are reffering.






31. The MAC address that is permanently assigned to a LAN interface or NIC. It is called burned-in because the address is burned into a chip on the card - and the address cannot be changed. Also called universally administered address.






32. Program used to download and send email. Email clients use POP3 to receive emails and use SMTP to send emails. Also called an email client






33. The IP address of the originating host that is placed into the IP packet header.






34. The number of various unique digits - including 0 that a positional number system uses to represent numbers. For example - in the binary system (base 2) the radix is 2. In the decimal system the radix is 10.






35. A network topology characterized by a central location connected to multiple hubs. In an extended star - these interconnected hubs may be connected to more hubs. It is essentially a hierarchical topology but typically is drawn with the central site i






36. An international standards body that defines many networking standards. Also - the standards body that created the OSI model.






37. The management of data flow between devices in a network. It is used to avoid too much data arriving before a device can handle it - causing data overflow.






38. A technique used to attack an ethernet network by sending fake ARP messages to an ethernet LAN. These frames contain false MAC addresses that confuse network devices - such as switches. As a result - frames intended for one node can be mistakenly sen






39. On a switch - a table that lists all known MAC addresses - and the bridges/switch port out which the bridge/switch should forward frames sent to each MAC address.






40. In IP subnetting - this refers to the portion of a set of IP addresses whose value must be identical for the addresses to be in the same subnet.






41. Used by tcp or udp - with values between 0 and 1023 - these ports are allocated by high-privilege processes. They are used so that all clients know the correct port number to connect to.






42. A network scanning technique used to identify which host IP addresses are operational.






43. The minimum time a NIC or interface can take to send an entire frame. Slot time - then - implies a minimum frame size.






44. Defines the commands - headers and processes by which web server and web browsers transfer files.






45. The forwarding of packets where the forwarding decision is taken dynamically - hop by hop - based on the conditions of downstream fowrading nodes.






46. A temporary storage where data that has been retrieved or calculated and is accessed frequently can be stored. After the data is stored in the cache - the processes can access the cached copy instead of accessing the original data. A cache reduces th






47. A 32-bit number - written in dotted decimal notation - used by the IP to uniquely identify an interface connected to an IP network. It is also used as a destination address in an IP header to allow routing - and as a source address to allow a compute






48. Radio frequencies that creat noise that interferes with information being transmitted across unshielded copper cabling.






49. A plan - design or program of action to be followed. Sometimes an addressing plan is called an addressing SCHEME.






50. A network architecture designed to eliminate network downtime cause by a single point of failure.