Test your basic knowledge |

CCNA Network Fundamentals Vocab

Subjects : cisco, it-skills, ccna
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A generic term from OSI that refers to the data - headers - and trailers about which a particular network layer is concerned.






2. The forwarding of packets where the forwarding decision is taken dynamically - hop by hop - based on the conditions of downstream fowrading nodes.






3. Network protocols or technologies that do not use the acknowledgment system to guarantee reliable delivery of information






4. A 1-bt flag in the TCP header used to indicate the initial value of the sequence number. The SYN flag is only set in the first two segments of the three-way TCP connection establishment sequence.






5. A part of the ethernet frame that fills in the data field to ensure that the data field meets the minimum size requirement of 46 bytes.






6. An entry in an IP routing table that was created because a network engineer entered the routing information into the router's configuration.






7. In a web browser - an application the browser uses - inside the browser window to display some types of content. For example - a browser typically uses a plug-in to display video.






8. A form of signal modulation where the message information is encoded in the amplitude of series of signal pulses. It transmits data by varying the aplitunes of the individual pulses. This is now obsolete and has been replaced by pulse code modulation






9. An IP address that has been registered with IANA or one of its member agencies - which guarantees that the address is globally unique. Globally unique public IP addresses can be used for packets sent through the Internet.






10. The loss of communication signal on the media. This loss is due to degradation of the energy wave over time.






11. Real-time communication between two or more people through text. The text is conveyed through computers connected over a network such as the internet. files can also be transferred through the IM program to share files.






12. In IP subnetting - this refers to the portion of a set of IP addresses whose value must be identical for the addresses to be in the same subnet.






13. The standards body responsible for the development and approval of TCP/IP standards






14. The MAC algorithm used by ethernet devices in a shared media. The protocol requires a node wishing to transmit to listen for a carrier signal before trying to send. If a carrier is sensed - the node waits for transmission in progress to finish before






15. Line code in which 1s are represented by one significant condition and 0s are represented by another.






16. A network created for devices located in a limited geographic area - through which the company owning the LAN has the right to run cables.






17. Another form of the root word converge in the phrase converged network. This kind of network aggregates various forms of traffic such as voice - video and data on the same network infrastructure. A more common usage represents the process by which ro






18. Unique addresses that are public domain addresses.






19. A data link layer address - for example a MAC address






20. To change the energy levels transmitted over some networking medium to transmit bits over that medium.






21. Also known as boolean algebra. These consist of the AND OR and IF operations






22. The IPv4 multicast addresses 224.0.0.0 to 224.0.0.255. These addresses are to be used for multicast groups on a local network. Packets to these destinations are always transmitted with a TTTL value of 1






23. TCP or UDP ports that range from 49152 to 65535 and are not used by any defined server applications.






24. A control mechanism that can provide different priorities to different users or data flows - or guarantee a certain level of performance to a data flow in accordance with requests from the application program.






25. Program used to download and send email. Email clients use POP3 to receive emails and use SMTP to send emails. Also called an email client






26. The connection of devices on a common media. Sometimes a physical network is also referred to as a network segment.






27. A convention for writing IP addresses with four decimal numbers - ranging from 0 to 255 - with each octet representing 8 bits of the 32 bit IP address. The term originates from the fact that each of the four decimal numbers is separated by a period.






28. An addressing scheme in which a network is partitioned into sections - with the section identifier forming one part of each destination's address and the destination identifier forming another






29. In ethernet a layer 2 device that receives an electrical signal in one port - interprets the bits - and makes a filtering or forwarding decision about the frame. If it forward - it sends a regenerated signal. Switches typically have many physical por






30. A device such as a desktop or mobile device that is used by an end user.






31. In TCP - the process of taking a large chunk of data and breaking it into small enough pieces to fit within a TCP segment without breaking any rules about the maximum amount of data allowed in a segment.






32. Organizations that are responsible for the allocation and registration of Internet number resources within a particular region of the world. These registries include the American Registry for Internet Number for North America; RIPE network coordinati






33. The reference to text based logical interfaces on an ios device. These are accesses using telnet or ssh to perform administrative tasks. VTY lines are also called virtual type terminal.






34. A system of network design characterized by one or more major components that are required to maintain operation.






35. Using values between 1024 and 49 -151 these numbers are equivalent to well-known ports in concept - but they are specifically used for nonprivileged application processes.






36. A network that incorporates both optical fiber along with coaxial cable to create a broadband network. commonly used by cable tv companies.






37. A protocol used to dynamically assign IP configurations to hosts. The services defined by the protocol are used to request and assign an IP address - default gateway - and DNS server address to a network host.






38. Unencrypted password used to allow access to privledge EXEC mode from IOS user EXEC mode.






39. A device that connects to a local digital telephone loop for a WAN circuit to a serial interface on a network device - typically connecting to a router. The CSU/DSU performs physical Layer 1 signaling on WAN circuits






40. From the priviledged mode - you can enter the device's global caonfiguration mode. From global configuration mode - you can configure global parameters or enter other configuration submodes such as interface - router and line configuration submodes.






41. A group of 8 binary bits. It is similar to - but not the same as - a byte. One Application in computer network is to use octets to divide IPv4 addresses into four components






42. The normal operation of ethernet ports on a hub. In this mode - the mapping of the wire pairs in the hub port is in a normal configuration. Some hubs provide a media-dependent interface/media-dependent interface - crossover switch. This switch is usu






43. Radio frequencies that creat noise that interferes with information being transmitted across unshielded copper cabling.






44. A type of hash function that is used to produce a small - fixed size checksum of a block of data - such as a packet or a computer file. A CRC is computed and appended before transmission or storage - and verified afterward by the recipient to confirm






45. A temporary storage where data that has been retrieved or calculated and is accessed frequently can be stored. After the data is stored in the cache - the processes can access the cached copy instead of accessing the original data. A cache reduces th






46. The process by which a router receives an incoming frame - discards the ata link header and trailer - makes a forwarding decision based on the destination IP address - adds a new data-link header and trailer based on the outgoing interface and forwar






47. A group that receives a multicast transmission. The members of a multicast group have the same mulitcast IP addressing to receive the same transmission.






48. The time required to send a single bit over some transmission medium. The time can be calculated at 1/speed - where speed is the number of bits per second sent over the medium






49. A model that consists of various layers that enable the development and explanation of technology to be done on a modular basis. This allows interoperability among different technologies among the different layers.






50. A network architecture designed to eliminate network downtime cause by a single point of failure.