SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CCNA Network Fundamentals Vocab
Start Test
Study First
Subjects
:
cisco
,
it-skills
,
ccna
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A special reserved IPv4 address - 127.0.0.1 that can be used to test TCP/IP applications. Packets sent to 127.0.0.1 by a computer never leave the computer or even require working NIC. Instead - the packet is processed by IP at the lowest layer and is
Mail user agent
virtual circuit
loopback
electromagnetic interface
2. The IPv4 address block 192.0.2.0 to 192.0.2.255 that is set aside for teaching and learning purposes. These addresses can be used in documentation and network examples.
switch
FIN
network address
test-net address
3. The glass fibers inside certain cables over which light is transmitted to encode 0 and 1
fiber optics
Internet Assigned Numbers Authority
media independent
filtering
4. The MAC address that is permanently assigned to a LAN interface or NIC. It is called burned-in because the address is burned into a chip on the card - and the address cannot be changed. Also called universally administered address.
bridge
subnet
burned in address
filtering
5. A written specification that defines what tasks a service or device should perform. Each protocol defines messages - often in the form of headers - plus the rules and processes by which these messages are used to achieve some stated purpose.
protocol
broadcast address
goodput
best effort
6. A group of IP addresses that have the same value in the first part of the IP addresses - for the purpose of allowing routing to identify the group by the inital part of the addresses. IP addresses in the same subnet typically sit on the same network
gateway
subnet
latency
IP header
7. An internet wide system by which a hierarchical set of DNS servers collectively hold all the name IP address mappings - with DNS servers referring users to the correct DNS server to successfully resolve a DNS name.
domain name system
tracert
globally scoped addresses
loopback
8. A high-speed line or series of connections that forms a major pathway within a network. The term is often used to describe the main network connections comprising the Internet.
IP header
Internet backbone
query
physical media
9. A signal on a medium used to support the transmission of data. Data is carried over the medium by modulation.
carrier
TCP/IP
IP
Internet
10. In networking - this term is used in several ways. With ethernet hub and switch hardware - port is simply another name for interface - which is a physical connector in the swithc into whic a cable can be connected. With TCP and UDP - a port is a soft
Requests for Comments
encode
port
store and forward
11. A service or a program to look up information in the DNS
segment
nslookup
source IP address
synchronous
12. IPv4 address of a network host. When talking about host addresses - they are the network layer addresses.
nslookup
carrier sense multiple access (CSMA)
host address
transparent bridging
13. Somtimes called place-value notation - this is a numeral system in which each position is related to the next by a constant multiplier - a common ration - called the base or radix of that numeral system.
TCP
RST
segmentation
positional notation
14. In a web browser - an application the browser uses - inside the browser window to display some types of content. For example - a browser typically uses a plug-in to display video.
router
virtual local area network
IP address
plug-in
15. A field in the IP header that prevents a packet form indefinitely looping around an IP internetwork. Router decrements the TTL field each time they forward a packet - and if they decrement the TTL to 0 - the router discards the packet - which prevent
bridge table
routing table
Time to live
source
16. In networking - a symbol used when drawing network diagrams that represent a part of the network whose details can be ignored for the purposes of the diagram.
address pool
cloud
globally scoped addresses
network
17. Computer hardware - typically used for LANS - that allows the computer to connect to some network cable. The NIC can then send and receive data over the cable at the direction of the computer.
packet
delimiter
network address
network interface card
18. The bit position in a binary number having the greatest value. The most significant bit is sometime referred to as the leftmost bit.
most significant bit
synchronous
directed broadcast
scope
19. Communication that only allows one station to receive while the other station is transmitting
virtual terminal line
ethernet PHY
half duplex
connection oriented
20. A source of information that is highly reliable and known for its accuracy
authoritative
scheme
node
dispersion
21. The forwarding of packets where the forwarding decision is taken dynamically - hop by hop - based on the conditions of downstream fowrading nodes.
static route
router
selective forwarding
segment
22. A common term for 10base5 ethernet - referring to the fact that 10base5 cabling is thicker than the coaxial cabling used for 10base2.
attenuation
port
Thicknet
host
23. A series of documents and memoranda encompassing new research - innovations and methodologies applicable to Internet technologies. RFCs are a reference for how technologies should work.
Requests for Comments
host address
store and forward
prviate address
24. A common name for ethernet technology that operates at 100 mbps.
scope
Institute of Electrical and Electronics Engineers
deterministic
fast ethernet
25. This field of a frame signals the beginning or end of a frame.
radix
instant messaging
forwarding
delimiter
26. The loss of communication signal on the media. This loss is due to degradation of the energy wave over time.
Interpret as command
source IP address
limited broadcast
attenuation
27. Organizations that are responsible for the allocation and registration of Internet number resources within a particular region of the world. These registries include the American Registry for Internet Number for North America; RIPE network coordinati
carrier
source
Regional Internet Registries
deterministic
28. The standards body responsible for the development and approval of TCP/IP standards
ping sweep
Internet Engineering Task Force
segmentation
packet
29. The passage of a data packet between two network nodes.
International Organization for Standardization
public address
carrier sense multiple access (CSMA)
hop
30. In LAN switches a reference to cases in which a frame is forwarded - or switche - when the incoming and outgoing interfaces use the same speed. It is the opposite of asymmetric switching.
redundancy
bridge table
URG
symmetric switching
31. A MAC address that can be configured on a device. The LAA can be used in place of the BIA . This means that you can replace a NIC or use a substitute device without changing the address used by the network to access the station.
flash
locally administered address
Open systems interconnection
administratively scoped address
32. Data link layer term describing a device connected to a network.
node
authoritative
scalability
throuhpu
33. The optical or electrical impulse on a physical medium for purposes of communication.
MAC table
user executive mode
classless addressing
signal
34. Application-level throughput. It is the number of useful bits per unit of time from a certain source address to a certain destination - excluding protocol overhead and excluding retransmitted data packets.
multicast group
scalability
source IP address
goodput
35. The learning of source addresses on incoming frames and adding them to the bridging table. After the table has been completed and when a frame is received on one of the bridge's interfaces - the bridge looks up the frame's destination address in its
transparent bridging
Internet Engineering Task Force
proxy arp
switch table
36. A protocol that allows a computer to retrieve email from a server.
logical topology
post office protocol
reserved link-local addresses
thinnet
37. Any communication in which the sender and receiver do not prearrange for communications to occur
connectionless
pinout
routing table
decapsulation
38. A member of a multicast group. Every multicast client in each group has the same IP address. Multicast addresses begin with 224... and end with 239...
plug-in
multicast client
channel service unit/data service unit
carrier
39. Additional data that is provided with a command to provide information used by the execution of the command. IOS command arguments are entered at the CLI after the command
IP
argument
client
filtering
40. A technique used to attack an ethernet network by sending fake ARP messages to an ethernet LAN. These frames contain false MAC addresses that confuse network devices - such as switches. As a result - frames intended for one node can be mistakenly sen
ARP poisoning
port
half duplex
selective forwarding
41. Part of a company's intranet that is extended to users outside the company
host group
ARP poisoning
scope
extranet
42. The range of ip addresses that can be assigned by the DHCP server.
layered model
session
address pool
digital logic
43. On a switch - a table that lists all known MAC addresses - and the bridges/switch port out which the bridge/switch should forward frames sent to each MAC address.
nonvolatile RAM (NVRAM)
flash
MAC table
source
44. Radio frequencies that creat noise that interferes with information being transmitted across unshielded copper cabling.
backoff algorithm
radio frequency interference
router
positional notation
45. Unencrypted password used to allow access to privledge EXEC mode from IOS user EXEC mode.
local area network
enable password
ARP table
redundancy
46. In a shared media ethernet network - a signal generated by the transmitting devices that detects the collision. The jam signal continue to transmit for a specified period to ensure that all devices on the network detect the collision. The jame signal
jam signal
data termianl equipment
enable password
default gateway
47. From the priviledged mode - you can enter the device's global caonfiguration mode. From global configuration mode - you can configure global parameters or enter other configuration submodes such as interface - router and line configuration submodes.
Organizational Unique Identifier
virtual circuit
low-order bit
global configuration mod
48. An application level network protocl mainly applied to shared access to files - printers - serial ports - and miscellaneous communications between nodes on a network.
virtual circuit
server message block
fragmentation
collision domain
49. Refers to whether the performance of a device - attached to a particular type of LAN - can be accurately predicted. Token Ring LANS are deterministic - but ethernet LANS are non deterministic.
Mail user agent
octet
deterministic
nonvolatile RAM (NVRAM)
50. A computer program that runs in the background and is usually initiated as a process. Daemons often support server processes.
daemon
network
digital logic
connectionless