Test your basic knowledge |

CCNA Network Fundamentals Vocab

Subjects : cisco, it-skills, ccna
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. The process of obscuring information to make it unreadable without special knowledge - somtimes referred to as scrambling. The process takes the data to be encrypted and applies a mathematical formula to it along with a secret number. The resulting v






2. A rectangular cabling connector with eight pins - often used with ethernet cables.






3. In ethernet - the results of two nodes transmitting simlutaneously. The signals from each device are damaged when they combine on the media






4. The IP address of the originating host that is placed into the IP packet header.






5. The network that combines enterprise networks - individual users - and ISPs into a single global IP network.






6. The dividing of IP datagrams to meet the MTU requirement of a layer 2 protocol.






7. The management of data flow between devices in a network. It is used to avoid too much data arriving before a device can handle it - causing data overflow.






8. The time required to send a single bit over some transmission medium. The time can be calculated at 1/speed - where speed is the number of bits per second sent over the medium






9. A corporate system such as a website that is explicitly used by internal employees. Can be assessed internally or remotely






10. The normal operation of ethernet ports on a hub. In this mode - the mapping of the wire pairs in the hub port is in a normal configuration. Some hubs provide a media-dependent interface/media-dependent interface - crossover switch. This switch is usu






11. A type of network cabling that includes twisted-pair wires - with shielding around each pair of wires - as well as another shield around all wires in the cable.






12. Radio frequencies that creat noise that interferes with information being transmitted across unshielded copper cabling.






13. An application level network protocl mainly applied to shared access to files - printers - serial ports - and miscellaneous communications between nodes on a network.






14. A system of network design characterized by one or more major components that are required to maintain operation.






15. Line code in which each bit of data is signified by at least one voltage level transition.






16. An addressing scheme in which a network is partitioned into sections - with the section identifier forming one part of each destination's address and the destination identifier forming another






17. A plan - design or program of action to be followed. Sometimes an addressing plan is called an addressing SCHEME.






18. In networking - this term is used in several ways. With ethernet hub and switch hardware - port is simply another name for interface - which is a physical connector in the swithc into whic a cable can be connected. With TCP and UDP - a port is a soft






19. A protocol used to dynamically assign IP configurations to hosts. The services defined by the protocol are used to request and assign an IP address - default gateway - and DNS server address to a network host.






20. Computer hardware - typically used for LANS - that allows the computer to connect to some network cable. The NIC can then send and receive data over the cable at the direction of the computer.






21. The IPv4 address block 192.0.2.0 to 192.0.2.255 that is set aside for teaching and learning purposes. These addresses can be used in documentation and network examples.






22. Part of a company's intranet that is extended to users outside the company






23. One of the three basic binary logic operations. ANDing yields the following result: 1 and 1 = 1 - 1 and 0 = 0 - 0 and 1 = 0






24. An internet wide system by which a hierarchical set of DNS servers collectively hold all the name IP address mappings - with DNS servers referring users to the correct DNS server to successfully resolve a DNS name.






25. The bit position in a binary number having the greatest value. The most significant bit is sometime referred to as the leftmost bit.






26. The networking layers whose processes are not affected by the media being used. In ethernet - these are all the layers from the LLC sublayer of data link upward.






27. A dotted decimal number defined by the IPv4 protocol to represent a network or subnet. It represents the network that hosts reside in. Also called a network number or network ID.






28. Used in the CLI following the command. Keywords are parameters that are used with the command from a set of predefined values.






29. A dotted decimal number that helps identify the structure of IP addresses. The mask represents the network and subnet parts of related IP addresses with binary 1s and the host part of related IP addresses with binary 0s






30. An ethernet frame that is less than 64 bytes in size. Runts are caused by collisions and are also know as collision fragments






31. The design on networks that can continue to operate without interruption in the case of hardware - software or communications failures.






32. Communication that uses a common clocking signal. In most synchronous communicatino - one of the communicating devices generates a clock signal into the circuit. Additional timing information is not required in the header.






33. The MAC algorithm used by ethernet devices in a shared media. The protocol requires a node wishing to transmit to listen for a carrier signal before trying to send. If a carrier is sensed - the node waits for transmission in progress to finish before






34. Somtimes called place-value notation - this is a numeral system in which each position is related to the next by a constant multiplier - a common ration - called the base or radix of that numeral system.






35. The time required for some network pdu's to be sent and received - and a response PDU to be sent and received. In other words - the time between when a device sends data and when the same device receives a response.






36. Resources used to manage or operate the network. Overhead consumes bandwidth and reduces the amount of application data that can be transported across the network.






37. Additional data that is provided with a command to provide information used by the execution of the command. IOS command arguments are entered at the CLI after the command






38. A type of hash function that is used to produce a small - fixed size checksum of a block of data - such as a packet or a computer file. A CRC is computed and appended before transmission or storage - and verified afterward by the recipient to confirm






39. The learning of source addresses on incoming frames and adding them to the bridging table. After the table has been completed and when a frame is received on one of the bridge's interfaces - the bridge looks up the frame's destination address in its






40. Network layer protocol in the TCP/IP stack offering a connectionless internetwork service. IP provides features for addressing - type-of-service specification - fragmentation and reassembly - and security.






41. A protocol used between routers so that they can learn routes to add to their routing tables.






42. A time period between ethernet frames that allows fairness with the CSMA/CD algorithm. Without a space between frames in other words - without some time with no frames being sent a NIC might always listen for silence - never hear silence and therefor






43. A 32-bit field in the tcp segment header that specifies the sequence number of the next byte this host expects to receive as a part of the TCP session. It is used to recognize lost packets and flow control






44. An IPV4 addressing scheme that uses a subnet mask that does not follow classful addressing limitations. It provides increased flexibility when dividing ranges of IP addresses into separate networks. Classless addressing is considered the best in curr






45. Routing table entry that is used to direct frames for which a next hop is not explicitly listed in the routing table. This route is used to forward a packet when no other known route exists for a give packet's destination address.






46. A unicast IP address that is considered to have three parts: a network part - a subnet part - and a host part. The term classful refers to the fact that classful network rules are first applied to the address - and then the rest of the address can be






47. The process of forwarding frames in a switch or a bridge from one port to another port or from segment to segment






48. Real-time communication between two or more people through text. The text is conveyed through computers connected over a network such as the internet. files can also be transferred through the IM program to share files.






49. As filed in the TCP header that is set in a sent segment - signifies the maximum amount of unacknowledged data the host is willing to receive before the other sending host must wait for an acknowledgment.






50. The cabling and connectors used to interconnect the network devices.






Can you answer 50 questions in 15 minutes?



Let me suggest you:



Major Subjects



Tests & Exams


AP
CLEP
DSST
GRE
SAT
GMAT

Most popular tests