SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CCNA Network Fundamentals Vocab
Start Test
Study First
Subjects
:
cisco
,
it-skills
,
ccna
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. The process of forwarding frames in a switch or a bridge from one port to another port or from segment to segment
deterministic
bridge
bridging
Network time protocol
2. The MAC algorithm used by ethernet devices in a shared media. The protocol requires a node wishing to transmit to listen for a carrier signal before trying to send. If a carrier is sensed - the node waits for transmission in progress to finish before
scheme
carrier sense multiple access collision detect (CSMA/CD)
store and forward
limited broadcast
3. An access method used with some LAN technologies by which devices access the media in a controlled manner. This access to the LAN is managed using a small frame called a toke. A device can send only when it has claimed the use of the token.
source IP address
token passing
extranet
store and forward
4. Another form of the root word converge in the phrase converged network. This kind of network aggregates various forms of traffic such as voice - video and data on the same network infrastructure. A more common usage represents the process by which ro
public address
router
convergence
registered ports
5. Binary digit used in the binary numbering system. Binary digits are units of information storage and communication in computing. Each bit can be either a 0 or a 1.
authoritative
scalability
source
bit
6. The dividing of IP datagrams to meet the MTU requirement of a layer 2 protocol.
backoff algorithm
fragmentation
ARP cache
router protocol
7. A written specification that defines what tasks a service or device should perform. Each protocol defines messages - often in the form of headers - plus the rules and processes by which these messages are used to achieve some stated purpose.
store and forward
protocol
ARP cache
radix
8. A unicast IP address that is considered to have three parts: a network part - a subnet part - and a host part. The term classful refers to the fact that classful network rules are first applied to the address - and then the rest of the address can be
convergence
4b/5b
classful addressing
domain name system
9. A process used by a switch or bridge to forward broadcasts and unknown destination unicasts. The bridge/switch forwards these frames out all ports except the port on which the frame was received.
TCP/IP
fiber-optic cable
virtual local area network
flooding
10. A general type of cable - with the cable holding twisted pairs of copper wires and the cable itself having little shielding.
unshieled twisted-pair
kilobits per second
Time to live
download
11. A convention for writing IP addresses with four decimal numbers - ranging from 0 to 255 - with each octet representing 8 bits of the 32 bit IP address. The term originates from the fact that each of the four decimal numbers is separated by a period.
switch
Internet Engineering Task Force
dotted decimal
reserved link-local addresses
12. A generic term from OSI that refers to the data - headers - and trailers about which a particular network layer is concerned.
broadcast domain
gateway
protocol data unit
fiber optics
13. A network scanning technique used to identify which host IP addresses are operational.
ping sweep
routing
International Organization for Standardization
daemon
14. A form of signal modulation where the message information is encoded in the amplitude of series of signal pulses. It transmits data by varying the aplitunes of the individual pulses. This is now obsolete and has been replaced by pulse code modulation
pulse amplitude modulation
runt frame
server message block
latency
15. The time required for some network pdu's to be sent and received - and a response PDU to be sent and received. In other words - the time between when a device sends data and when the same device receives a response.
round-trip time
media independent
filtering
proxy arp
16. A logical network composed of all the computers and networking devices that can be reached by sending a frame to the data link layer broadcast address.
unshieled twisted-pair
Address resolution protocol
broadcast domain
distributed
17. Communication where the sender and receiver must prearrange for communications to occur; otherwise - the communication fails.
decapsulation
connection oriented
association identity AID
ARP table
18. A company that helps create the Internet by providing connectivity to enterprises and individuals - as well as interconnecting to other ISPs to create connectivity to all other ISPs.
hypertext transfer protocol
limited broadcast
internetwork
Internet service provider
19. Represents the 0 in the binary number. In an IP subnet mask - the lower-order bits represent the host portion. Sometimes called the host portion of bits.
segmentation
low-order bit
hierarchical addressing
encapsulation
20. In ethernet - the results of two nodes transmitting simlutaneously. The signals from each device are damaged when they combine on the media
slash format
collision
extranet
International Organization for Standardization
21. A field in the IP header that prevents a packet form indefinitely looping around an IP internetwork. Router decrements the TTL field each time they forward a packet - and if they decrement the TTL to 0 - the router discards the packet - which prevent
Time to live
attenuation
noise
routing
22. A network model defined by the IETF that has been implemented on most computers and network device in the world.
TCP/IP
segmentation
router protocol
Time to live
23. The limited CLI mode where the commands available to the user are a subset of those available at the privileged level. In general - use the user Exec commands to temporarily change terminal settings - perform basic tests and list system information.
user executive mode
dynamic host configuration protocol
collaborative
subnet
24. A process where multiple digital data streams are combined into one signal.
scalability
tracert
gateway
multiplexing
25. Application-level throughput. It is the number of useful bits per unit of time from a certain source address to a certain destination - excluding protocol overhead and excluding retransmitted data packets.
nslookup
goodput
flash
tracert
26. A part of the ethernet frame that fills in the data field to ensure that the data field meets the minimum size requirement of 46 bytes.
link-local address
nslookup
Pad
logical network
27. A numbering system characterized by 1 and 0
full duplex
binary
network segment
protocol
28. The design on networks that can continue to operate without interruption in the case of hardware - software or communications failures.
routing
noise
fault tolerance
firewall
29. An internationally recognized definition of technical specifications that ensure worldwide consistency.
FIN
dotted decimal
IP address
standards
30. Radio frequencies that creat noise that interferes with information being transmitted across unshielded copper cabling.
peer
intranet
radio frequency interference
physical network
31. A common term for 10base2 ethernet - referring to the fact that 10base2 cabling is thinner than coaxial cabling used for 10base5
broadcast domain
protocol
user executive mode
thinnet
32. Line code in which each bit of data is signified by at least one voltage level transition.
layered model
manchester encoding
bridging
protocol
33. A form of transmission where one device transmits to all devices within the network or on another network
broadcast address
scope
broadcast
dotted decimal
34. A process used to verify the identity of a person or process
Internet service provider
Internet Engineering Task Force
nslookup
authentication
35. An internet wide system by which a hierarchical set of DNS servers collectively hold all the name IP address mappings - with DNS servers referring users to the correct DNS server to successfully resolve a DNS name.
domain name system
media access control
scheme
transparent bridging
36. An international - nonprofit organization for the advancement of technology related to eletricity. IEEE maintains the standards defining many LAN protocols.
host
firewall
pinout
Institute of Electrical and Electronics Engineers
37. An entry in an IP routing table that was created because a network engineer entered the routing information into the router's configuration.
source IP address
hub
network address
static route
38. A delineation of networking protocols and standards into different categories - called layers - along with definitions of which sets of standards and protocols need to be implemented to create products that can be used to create a working network
Optical time domain reflectometer
multicast client
protocol suite
tracert
39. The IEEE 802.2 standard that defines the upper sublayer of the Ethernet Layer 2 specifications.
RST
Logical link control
standards
address pool
40. Real-time communication between two or more people through text. The text is conveyed through computers connected over a network such as the internet. files can also be transferred through the IM program to share files.
fiber optics
instant messaging
media independent
bridge table
41. A time period between ethernet frames that allows fairness with the CSMA/CD algorithm. Without a space between frames in other words - without some time with no frames being sent a NIC might always listen for silence - never hear silence and therefor
interframe spacing
hypertext transfer protocol
shielded twisted pair cable
metropolitan-area network
42. A host or node that participates in some form of a group. For example - p2p technology defines a group of peers that participate jointly in the same activity - each one having a server and client component.
virtual circuit
peer
Internet Engineering Task Force
cloud
43. A protocol for synchronizing the clocks of computer systems over packet-switch data networks. NTP uses UDP port 123 as its transport layer.
most significant bit
Network time protocol
server
tracert
44. A layer 4 protocl of TCP/IP model - TCP lets applications guarantee delivery of data across a network.
virtual local area network
high-order bit
TCP
public address
45. Unencrypted password used to allow access to privledge EXEC mode from IOS user EXEC mode.
cyclic redundancy check
most significant bit
enable password
kilobits per second
46. The network that combines enterprise networks - individual users - and ISPs into a single global IP network.
nonreturn to zero
broadcast address
reserved link-local addresses
Internet
47. An application level network protocl mainly applied to shared access to files - printers - serial ports - and miscellaneous communications between nodes on a network.
asynchronous
server message block
layered model
loopback
48. A model that consists of various layers that enable the development and explanation of technology to be done on a modular basis. This allows interoperability among different technologies among the different layers.
backoff algorithm
router
physical media
layered model
49. A request for information. Queries are answered with replies.
flash
reserved link-local addresses
query
fiber optics
50. A temporary storage where data that has been retrieved or calculated and is accessed frequently can be stored. After the data is stored in the cache - the processes can access the cached copy instead of accessing the original data. A cache reduces th
cache
Requests for Comments
source
instant messaging