SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CCNA Network Fundamentals Vocab
Start Test
Study First
Subjects
:
cisco
,
it-skills
,
ccna
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. The process by which a device adds networking heads and trailers to data from an application for the eventual transmission of the data onto a transmission medium.
encapsulation
segmentation
SYN
Optical time domain reflectometer
2. The retransmission delay used with CSMA/CD when a collision occurs. The algorithm forces each sender that detected the collisions to delay a random amount of time before attempting to retransmit.
low-order bit
backoff algorithm
tracert
authentication
3. Interface by magnetic signals caused by the flow of electricity. EMI can cause reduced data integrity and increased error rates on transmission channels. The physics of this process are that electrical current creates magnetic fields - which in turn
source
source IP address
Internet service provider
electromagnetic interface
4. A rectangular cabling connector with eight pins - often used with ethernet cables.
most significant bit
cloud
default route
RJ-45
5. As part of the TCP/IP internet layer - ICMP defines protocol messages used to inform network engineeres of how well an internetwork is working. For example - the ping command sends ICMP messages to determine whether a host can send packets ot another
ACK
symmetric switching
end device
Internet control message protocol
6. A request for information. Queries are answered with replies.
query
ARP cache
Internet backbone
broadcast address
7. Used by tcp or udp - with values between 0 and 1023 - these ports are allocated by high-privilege processes. They are used so that all clients know the correct port number to connect to.
server message block
channel
well known ports
destination IP address
8. Using values between 1024 and 49 -151 these numbers are equivalent to well-known ports in concept - but they are specifically used for nonprivileged application processes.
nslookup
syntax
registered ports
segment
9. A process where multiple digital data streams are combined into one signal.
multiplexing
Pad
dynamic routing
source IP address
10. The IEEE 802.2 standard that defines the upper sublayer of the Ethernet Layer 2 specifications.
Logical link control
Network address translation (NAT)
AND
jam signal
11. A group defined by a class D address (multicast - ranging from 224.0.0.0 to 239.255.255.255) - whereupon hosts can pertain to multicast groups. Hosts that have the same multicast address are part of the same host group.
port
source IP address
bridging
host group
12. A logical storage in the host's RAM to store ARP entries
Internet backbone
ARP cache
backoff algorithm
authentication
13. A protocol that allows a computer to retrieve email from a server.
post office protocol
fiber optics
Institute of Electrical and Electronics Engineers
best effort
14. In ethernet - a device that receives an electrical signal in one port - interprets the bits and regenerates a clean signal that it sends out all other ports of the hub. Typically it also supplies several ports - which are oftentimes RJ-45 jacks.
pulse amplitude modulation
gateway
best effort
hub
15. An access method used with some LAN technologies by which devices access the media in a controlled manner. This access to the LAN is managed using a small frame called a toke. A device can send only when it has claimed the use of the token.
token passing
gateway
ping sweep
Internet backbone
16. Defines which wires in a cable should connect to each pin on the connectors on both ends of a cable. For example - a UTP cable used for ethernet - used for a straight-through cable pinout - connects the wire at pin 1 on one end with the pin 1 on the
router
pinout
RST
octet
17. The management of data flow between devices in a network. It is used to avoid too much data arriving before a device can handle it - causing data overflow.
Pad
destination IP address
flow control
frame
18. Real-time communication between two or more people through text. The text is conveyed through computers connected over a network such as the internet. files can also be transferred through the IM program to share files.
instant messaging
shielded twisted pair cable
4b/5b
IP address
19. A generic term from OSI that refers to the data - headers - and trailers about which a particular network layer is concerned.
manchester encoding
switch
syntax
protocol data unit
20. A term that describes IPv4 packets sent to all hosts in a particular network. In a directed broadcast - a single copy of the packet is routed to the specified network - where it is broadcast to all hosts on that network
bit
directed broadcast
multicast group
post office protocol
21. A source of information that is highly reliable and known for its accuracy
redundancy
dispersion
latency
authoritative
22. As filed in the TCP header that is set in a sent segment - signifies the maximum amount of unacknowledged data the host is willing to receive before the other sending host must wait for an acknowledgment.
Internet Assigned Numbers Authority
connectionless
window size
Requests for Comments
23. Organizations that are responsible for the allocation and registration of Internet number resources within a particular region of the world. These registries include the American Registry for Internet Number for North America; RIPE network coordinati
Regional Internet Registries
Internet Assigned Numbers Authority
TCP/IP
router protocol
24. A group of IP addresses that have the same value in the first part of the IP addresses - for the purpose of allowing routing to identify the group by the inital part of the addresses. IP addresses in the same subnet typically sit on the same network
acknowledgment number
subnet
collision
Time to live
25. A network that incorporates both optical fiber along with coaxial cable to create a broadband network. commonly used by cable tv companies.
Internet control message protocol
hybrid fiber-coax
instant messaging
fiber-optic cable
26. Any combination of hardware device and/or software application designed to protect network devices from outside network users and/or malicious applications and files.
firewall
network baseline
limited scope address
default gateway
27. Part of a company's intranet that is extended to users outside the company
nonvolatile RAM (NVRAM)
subnet
domain name system
extranet
28. A combination of many IP subnets and networks - as created by building a network using routers. The term internwork is used to avoid confusion with the term network - because an internetwork can include several IP networks.
cache
metropolitan-area network
internetwork
user executive mode
29. A logical storage in a host's RAM to store arp entries.
data communications equipment
ARP table
digital logic
client
30. Computer hardware - typically used for LANS - that allows the computer to connect to some network cable. The NIC can then send and receive data over the cable at the direction of the computer.
control data
proxy arp
symmetric switching
network interface card
31. A 32-bit field in the tcp segment header that specifies the sequence number of the next byte this host expects to receive as a part of the TCP session. It is used to recognize lost packets and flow control
administratively scoped address
default gateway
single point of failure
acknowledgment number
32. A 1-bit flag in the tcp header that indicates the acknowledgment field is valid.
Optical time domain reflectometer
tracert
ACK
high-order bit
33. A process used to verify the identity of a person or process
broadcast address
authentication
smtp
manchester encoding
34. Normally - a relatively general term that refers to dfifferent kinds of networking devices. Historically - when routers were created - they were called gateways
extranet
Internet control message protocol
convergence
gateway
35. The lower of the two sublayers of the IEEE standard for ethernet. It is also the name of that sublayer
forwarding
media access control
overhead
domain name system
36. A network architecture designed to eliminate network downtime cause by a single point of failure.
download
redundancy
server message block
Packet Tracer
37. Radio frequencies that creat noise that interferes with information being transmitted across unshielded copper cabling.
protocol data unit
locally administered address
radio frequency interference
hop
38. The passage of a data packet between two network nodes.
hypertext transfer protocol
hop
media access control
intermediary device
39. The ability of a protocol. system or component to be modified to fit a new need.
SYN
backoff algorithm
scalability
ACK
40. A MAC address that can be configured on a device. The LAA can be used in place of the BIA . This means that you can replace a NIC or use a substitute device without changing the address used by the network to access the station.
virtual local area network
latency
locally administered address
address pool
41. A method of internal processing by LAN switches. The switch must receive the entire frame before it sends the first bit of the frame. Store and forward switch is the method used by cisco switches.
Network time protocol
store and forward
syntax
asynchronous
42. Communication that only allows one station to receive while the other station is transmitting
Thicknet
Open systems interconnection
encapsulation
half duplex
43. The actual data transfer rate between two computers at some point in time. Throughput is impacted by the slowest-speed link used to send data between the two computers - as well as myriad variables that might change during the course of a day.
multicast group
throuhpu
destination IP address
encryption
44. A 1-bit field in the TCP header that is used by a device that wants to terminate its session with the other device. This is done by inserting the FIN flag in the flag field found in the TCP segment
FIN
SYN
gigabit ethernet
network address
45. Refers to whether the performance of a device - attached to a particular type of LAN - can be accurately predicted. Token Ring LANS are deterministic - but ethernet LANS are non deterministic.
deterministic
TCP
Open systems interconnection
TCP/IP
46. An application level network protocl mainly applied to shared access to files - printers - serial ports - and miscellaneous communications between nodes on a network.
4b/5b
keyword
server message block
low-order bit
47. From the priviledged mode - you can enter the device's global caonfiguration mode. From global configuration mode - you can configure global parameters or enter other configuration submodes such as interface - router and line configuration submodes.
frame
global configuration mod
positional notation
encapsulation
48. A common term for 10base5 ethernet - referring to the fact that 10base5 cabling is thicker than the coaxial cabling used for 10base2.
IP address
Thicknet
backoff algorithm
scalability
49. In IP subnetting - this refers to the portion of a set of IP addresses whose value must be identical for the addresses to be in the same subnet.
prefix length
segment
single point of failure
plug-in
50. The IP address of the originating host that is placed into the IP packet header.
cloud
source IP address
segment
domain name system