Test your basic knowledge |

CCNA Network Fundamentals Vocab

Subjects : cisco, it-skills, ccna
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A field in the IP header that prevents a packet form indefinitely looping around an IP internetwork. Router decrements the TTL field each time they forward a packet - and if they decrement the TTL to 0 - the router discards the packet - which prevent






2. A form of transmission where one device transmits to all devices within the network or on another network






3. A numbering system characterized by 1 and 0






4. A network model defined by the IETF that has been implemented on most computers and network device in the world.






5. International standardization program created by ISO and ITU-T to develop standards for data networking that facilitate multivendor equipment interoperability






6. The design on networks that can continue to operate without interruption in the case of hardware - software or communications failures.






7. A collection of data that establishes a reference for network performance and behavior over a period of time. This reference data is used in the future to assess the health and relative growth of network utilization.






8. TCP or UDP ports that range from 49152 to 65535 and are not used by any defined server applications.






9. Used in the CLI following the command. Keywords are parameters that are used with the command from a set of predefined values.






10. IPv4 address of a network host. When talking about host addresses - they are the network layer addresses.






11. Unique addresses that are public domain addresses.






12. A company that helps create the Internet by providing connectivity to enterprises and individuals - as well as interconnecting to other ISPs to create connectivity to all other ISPs.






13. The reference to text based logical interfaces on an ios device. These are accesses using telnet or ssh to perform administrative tasks. VTY lines are also called virtual type terminal.






14. In ethernet - the process performed by a bridge or switch when it decides that it should not forward a frame out another port






15. 1. a collision domain that is a section of a LAN that is bound by bridges - routers or switches. 2. In a LAN using a bus topology - a segment is a continuous electrical circuit that is often connected to other such segments with repeaters. 3. When us






16. The management of data flow between devices in a network. It is used to avoid too much data arriving before a device can handle it - causing data overflow.






17. Path through an internetwork through which packets are forwarded.






18. In networking - a general term referring to any energy signal on a transmission medium that is not part of the signal used to transmit data over that medium.






19. A form of signal modulation where the message information is encoded in the amplitude of series of signal pulses. It transmits data by varying the aplitunes of the individual pulses. This is now obsolete and has been replaced by pulse code modulation






20. A process used to verify the identity of a person or process






21. Any communication in which the sender and receiver do not prearrange for communications to occur






22. A MAC address that can be configured on a device. The LAA can be used in place of the BIA . This means that you can replace a NIC or use a substitute device without changing the address used by the network to access the station.






23. A 32-bit number - written in dotted decimal notation - used by the IP to uniquely identify an interface connected to an IP network. It is also used as a destination address in an IP header to allow routing - and as a source address to allow a compute






24. The IP address of the originating host that is placed into the IP packet header.






25. A 1-bt flag in the TCP header used to indicate the initial value of the sequence number. The SYN flag is only set in the first two segments of the three-way TCP connection establishment sequence.






26. A rectangular cabling connector with eight pins - often used with ethernet cables.






27. A network that incorporates both optical fiber along with coaxial cable to create a broadband network. commonly used by cable tv companies.






28. A device on a network that serves as an access point to other networks. A default gateway is used by a host to forward IP packets that have destination addresses outside the local subnet. A router interface typically is used as the default gateway. W






29. The bit position in a binary number having the greatest value. The most significant bit is sometime referred to as the leftmost bit.






30. In ethernet a layer 2 device that receives an electrical signal in one port - interprets the bits - and makes a filtering or forwarding decision about the frame. If it forward - it sends a regenerated signal. Switches typically have many physical por






31. A 1-bit flag in the TCP header that is used to request that a connection be re-established.






32. A high-speed line or series of connections that forms a major pathway within a network. The term is often used to describe the main network connections comprising the Internet.






33. Somtimes called place-value notation - this is a numeral system in which each position is related to the next by a constant multiplier - a common ration - called the base or radix of that numeral system.






34. To transfer data from the computer functioning as a server to the client computer you are using.






35. An application level network protocl mainly applied to shared access to files - printers - serial ports - and miscellaneous communications between nodes on a network.






36. An application protocol typically not used by end users. Instead - it is used by the network management software and networking devices to allow a network engineer to monitor and troubleshoot network problems.






37. The method of for finding a host's hardware address from its IPv4 network layer address.






38. A common name for ethernet technology that operates at 100 mbps.






39. An addressing scheme in which a network is partitioned into sections - with the section identifier forming one part of each destination's address and the destination identifier forming another






40. Another form of the root word converge in the phrase converged network. This kind of network aggregates various forms of traffic such as voice - video and data on the same network infrastructure. A more common usage represents the process by which ro






41. The standards body responsible for the development and approval of TCP/IP standards






42. A plan - design or program of action to be followed. Sometimes an addressing plan is called an addressing SCHEME.






43. The loss of communication signal on the media. This loss is due to degradation of the energy wave over time.






44. The table used by a switch or bridge that associates MAC addresses with the outgoing port. The switch or bridge uses this table for its forwarding/filtering decisions.






45. An internet wide system by which a hierarchical set of DNS servers collectively hold all the name IP address mappings - with DNS servers referring users to the correct DNS server to successfully resolve a DNS name.






46. A grouping of code that meets a certain - already specified - condition for entering in that certain group.






47. The cabling and connectors used to interconnect the network devices.






48. Resources used to manage or operate the network. Overhead consumes bandwidth and reduces the amount of application data that can be transported across the network.






49. An encoding scheme 4B/5B uses 5-bit symbols and codes to represent 4 bits of data. 4B/5B is used in 100Base-tx ethernet.






50. A 32-bit field in the tcp segment header that specifies the sequence number of the next byte this host expects to receive as a part of the TCP session. It is used to recognize lost packets and flow control