Test your basic knowledge |

CCNA Network Fundamentals Vocab

Subjects : cisco, it-skills, ccna
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. The bit position in a binary number having the greatest value. The most significant bit is sometime referred to as the leftmost bit.






2. Line code in which each bit of data is signified by at least one voltage level transition.






3. A notification sent from one network device to another to confirm that some event has occured.






4. Program used to download and send email. Email clients use POP3 to receive emails and use SMTP to send emails. Also called an email client






5. A technique used to attack an ethernet network by sending fake ARP messages to an ethernet LAN. These frames contain false MAC addresses that confuse network devices - such as switches. As a result - frames intended for one node can be mistakenly sen






6. Using values between 1024 and 49 -151 these numbers are equivalent to well-known ports in concept - but they are specifically used for nonprivileged application processes.






7. An international standards body that defines many networking standards. Also - the standards body that created the OSI model.






8. A process used by a switch or bridge to forward broadcasts and unknown destination unicasts. The bridge/switch forwards these frames out all ports except the port on which the frame was received.






9. A group of devices associated by the arrangement of a hierarchial addressing scheme. Devices in the same logical network that share a common network portion of their Layer 3 addresses.






10. A popular certification method for fiber systems. The OTDR injects light into the fiber and then graphically displays the results of the detected reflected light. The OTDR measures the elapsed transit time of reflected light to calculate the distance






11. Routing table entry that is used to direct frames for which a next hop is not explicitly listed in the routing table. This route is used to forward a packet when no other known route exists for a give packet's destination address.






12. The devices and connections of a communications network that comprise the network end of the user to network interface. The DCE provides a physical connection to the network - forwards traffic - and provides a clocking signal used to synchronize data






13. A type of hash function that is used to produce a small - fixed size checksum of a block of data - such as a packet or a computer file. A CRC is computed and appended before transmission or storage - and verified afterward by the recipient to confirm






14. The spreading of light signal caused by light signals traveling at different speeds through a fiber.






15. Binary digit used in the binary numbering system. Binary digits are units of information storage and communication in computing. Each bit can be either a 0 or a 1.






16. A protocol that allows a computer to retrieve email from a server.






17. The management of data flow between devices in a network. It is used to avoid too much data arriving before a device can handle it - causing data overflow.






18. The layer 2 pdu that has been encoded by a data link layer protocol for digital transmission. Some different kinds of frames are ethernet frames and PPP frames.






19. Network protocols or technologies that do not use the acknowledgment system to guarantee reliable delivery of information






20. A network of computers that behave as if they are connected to the same network segment - even through they might be physically located on different segments of a LAN. VLANs are configured through software on the switch and router.






21. Random-access memory that does not lose its contents when the computer is shut down






22. The actual data transfer rate between two computers at some point in time. Throughput is impacted by the slowest-speed link used to send data between the two computers - as well as myriad variables that might change during the course of a day.






23. Unencrypted password used to allow access to privledge EXEC mode from IOS user EXEC mode.






24. A 1-bit flag in the TCP header that is used to request to the higher layers for immediate delivery of the packet.






25. An internationally recognized definition of technical specifications that ensure worldwide consistency.






26. Communication that allows receipt and transmission simultaneously. A station can transmit and receive at the same time. There are no collisions with full-duplex ethernet transmision.






27. The MAC algorithm used by ethernet devices in a shared media. The protocol requires a node wishing to transmit to listen for a carrier signal before trying to send. If a carrier is sensed - the node waits for transmission in progress to finish before






28. In networking - a general term referring to any energy signal on a transmission medium that is not part of the signal used to transmit data over that medium.






29. A source of information that is highly reliable and known for its accuracy






30. A collection of data that establishes a reference for network performance and behavior over a period of time. This reference data is used in the future to assess the health and relative growth of network utilization.






31. A special reserved IPv4 address - 127.0.0.1 that can be used to test TCP/IP applications. Packets sent to 127.0.0.1 by a computer never leave the computer or even require working NIC. Instead - the packet is processed by IP at the lowest layer and is






32. A group defined by a class D address (multicast - ranging from 224.0.0.0 to 239.255.255.255) - whereupon hosts can pertain to multicast groups. Hosts that have the same multicast address are part of the same host group.






33. The retransmission delay used with CSMA/CD when a collision occurs. The algorithm forces each sender that detected the collisions to delay a random amount of time before attempting to retransmit.






34. A layer 4 protocl of TCP/IP model - TCP lets applications guarantee delivery of data across a network.






35. An international - nonprofit organization for the advancement of technology related to eletricity. IEEE maintains the standards defining many LAN protocols.






36. A type of network cabling that includes twisted-pair wires - with shielding around each pair of wires - as well as another shield around all wires in the cable.






37. One of the three basic binary logic operations. ANDing yields the following result: 1 and 1 = 1 - 1 and 0 = 0 - 0 and 1 = 0






38. A network created for devices located in a limited geographic area - through which the company owning the LAN has the right to run cables.






39. A plan - design or program of action to be followed. Sometimes an addressing plan is called an addressing SCHEME.






40. In ethernet - the results of two nodes transmitting simlutaneously. The signals from each device are damaged when they combine on the media






41. A MAC address that can be configured on a device. The LAA can be used in place of the BIA . This means that you can replace a NIC or use a substitute device without changing the address used by the network to access the station.






42. An application level network protocl mainly applied to shared access to files - printers - serial ports - and miscellaneous communications between nodes on a network.






43. A group of IP addresses that have the same value in the first part of the IP addresses - for the purpose of allowing routing to identify the group by the inital part of the addresses. IP addresses in the same subnet typically sit on the same network






44. International standardization program created by ISO and ITU-T to develop standards for data networking that facilitate multivendor equipment interoperability






45. In the telnet application - commands are always introduced by a character with the decimal code 255 - known as the Interpret as Command character.






46. The IP address of the originating host that is placed into the IP packet header.






47. A temporary storage where data that has been retrieved or calculated and is accessed frequently can be stored. After the data is stored in the cache - the processes can access the cached copy instead of accessing the original data. A cache reduces th






48. A 32-bit number - written in dotted decimal notation - used by the IP to uniquely identify an interface connected to an IP network. It is also used as a destination address in an IP header to allow routing - and as a source address to allow a compute






49. Resources used to manage or operate the network. Overhead consumes bandwidth and reduces the amount of application data that can be transported across the network.






50. In ethernet - the process performed by a bridge or switch when it decides that it should send a frame out another port.