Test your basic knowledge |

CCNA Network Fundamentals Vocab

Subjects : cisco, it-skills, ccna
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Path through an internetwork through which packets are forwarded.






2. A notification sent from one network device to another to confirm that some event has occured.






3. The table used by a switch that associates MAC addresses with the outgoing port. A general term for the table that a LAN bridge uses for its forwarding/filtering decisions. The table holds a list of MAC addresses and the port out which the bridge sho






4. A group that receives a multicast transmission. The members of a multicast group have the same mulitcast IP addressing to receive the same transmission.






5. A broadcast that is sent to a specific network or series of networks.






6. In IP subnetting - this refers to the portion of a set of IP addresses whose value must be identical for the addresses to be in the same subnet.






7. The extent of a certain item. For example - an address scope is also known as a range of addresses from beginning of the range to the end.






8. A request for information. Queries are answered with replies.






9. A 1-bit flag in the TCP header used to indicate that the receiving host should notify the destination process to do urgent processing.






10. A host or node that participates in some form of a group. For example - p2p technology defines a group of peers that participate jointly in the same activity - each one having a server and client component.






11. A common term for 10base2 ethernet - referring to the fact that 10base2 cabling is thinner than coaxial cabling used for 10base5






12. A device that connects to a local digital telephone loop for a WAN circuit to a serial interface on a network device - typically connecting to a router. The CSU/DSU performs physical Layer 1 signaling on WAN circuits






13. A network that is connected to a device's interface. For example networks that interface with the router are known to be directly connected. Devices learn their initial IP routes based on being connected to these subnets.






14. An IPv4 address in the range of 169.254.1.0 to 169.254.254.255. Communication using these addresses is used with a ttl of 1 and limited to the local network






15. On a switch - a table that lists all known MAC addresses - and the bridges/switch port out which the bridge/switch should forward frames sent to each MAC address.






16. The process by which a router receives an incoming frame - discards the ata link header and trailer - makes a forwarding decision based on the destination IP address - adds a new data-link header and trailer based on the outgoing interface and forwar






17. An application protocol typically not used by end users. Instead - it is used by the network management software and networking devices to allow a network engineer to monitor and troubleshoot network problems.






18. The process of obscuring information to make it unreadable without special knowledge - somtimes referred to as scrambling. The process takes the data to be encrypted and applies a mathematical formula to it along with a secret number. The resulting v






19. A network of computers that behave as if they are connected to the same network segment - even through they might be physically located on different segments of a LAN. VLANs are configured through software on the switch and router.






20. A group of 8 binary bits. It is similar to - but not the same as - a byte. One Application in computer network is to use octets to divide IPv4 addresses into four components






21. A protocol that allows a computer to retrieve email from a server.






22. A 1-bit flag in the TCP header that is used to request to the higher layers for immediate delivery of the packet.






23. The IEEE 802.2 standard that defines the upper sublayer of the Ethernet Layer 2 specifications.






24. Communication that only allows one station to receive while the other station is transmitting






25. A list of router holds in memory for the purpose of deciding how to forward packets.






26. A process used to verify the identity of a person or process






27. A collection of data that establishes a reference for network performance and behavior over a period of time. This reference data is used in the future to assess the health and relative growth of network utilization.






28. In ethernet a layer 2 device that receives an electrical signal in one port - interprets the bits - and makes a filtering or forwarding decision about the frame. If it forward - it sends a regenerated signal. Switches typically have many physical por






29. Routing table entry that is used to direct frames for which a next hop is not explicitly listed in the routing table. This route is used to forward a packet when no other known route exists for a give packet's destination address.






30. Any combination of hardware device and/or software application designed to protect network devices from outside network users and/or malicious applications and files.






31. A network device that has an IPv4 address assigned to it to communication over a network.






32. Ethernet that transmits data at 1 -000 -000 -000 one billion bits per second.






33. An entry in an IP routing table that was created because a network engineer entered the routing information into the router's configuration.






34. In the telnet application - commands are always introduced by a character with the decimal code 255 - known as the Interpret as Command character.






35. A service or a program to look up information in the DNS






36. Binary digit used in the binary numbering system. Binary digits are units of information storage and communication in computing. Each bit can be either a 0 or a 1.






37. A type of hash function that is used to produce a small - fixed size checksum of a block of data - such as a packet or a computer file. A CRC is computed and appended before transmission or storage - and verified afterward by the recipient to confirm






38. A temporary storage where data that has been retrieved or calculated and is accessed frequently can be stored. After the data is stored in the cache - the processes can access the cached copy instead of accessing the original data. A cache reduces th






39. A computer program that runs in the background and is usually initiated as a process. Daemons often support server processes.






40. Using values between 1024 and 49 -151 these numbers are equivalent to well-known ports in concept - but they are specifically used for nonprivileged application processes.






41. Routing that adjusts automatically to network topology or traffic changes.






42. A dotted decimal number that helps identify the structure of IP addresses. The mask represents the network and subnet parts of related IP addresses with binary 1s and the host part of related IP addresses with binary 0s






43. The process by which a device adds networking heads and trailers to data from an application for the eventual transmission of the data onto a transmission medium.






44. Defines the commands - headers and processes by which web server and web browsers transfer files.






45. 1. a collision domain that is a section of a LAN that is bound by bridges - routers or switches. 2. In a LAN using a bus topology - a segment is a continuous electrical circuit that is often connected to other such segments with repeaters. 3. When us






46. Random-access memory that does not lose its contents when the computer is shut down






47. Translation RFC 1918 addresses to public domain addresses. Because RFC 1918 addresses are not routerd on the Internet - hosts accessing the Internet must use public domain addresses.






48. A high-speed line or series of connections that forms a major pathway within a network. The term is often used to describe the main network connections comprising the Internet.






49. A model that consists of various layers that enable the development and explanation of technology to be done on a modular basis. This allows interoperability among different technologies among the different layers.






50. Used by tcp or udp - with values between 0 and 1023 - these ports are allocated by high-privilege processes. They are used so that all clients know the correct port number to connect to.