Test your basic knowledge |

CCNA Network Fundamentals Vocab

Subjects : cisco, it-skills, ccna
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A special reserved IPv4 address - 127.0.0.1 that can be used to test TCP/IP applications. Packets sent to 127.0.0.1 by a computer never leave the computer or even require working NIC. Instead - the packet is processed by IP at the lowest layer and is






2. The IPv4 address block 192.0.2.0 to 192.0.2.255 that is set aside for teaching and learning purposes. These addresses can be used in documentation and network examples.






3. The glass fibers inside certain cables over which light is transmitted to encode 0 and 1






4. The MAC address that is permanently assigned to a LAN interface or NIC. It is called burned-in because the address is burned into a chip on the card - and the address cannot be changed. Also called universally administered address.






5. A written specification that defines what tasks a service or device should perform. Each protocol defines messages - often in the form of headers - plus the rules and processes by which these messages are used to achieve some stated purpose.






6. A group of IP addresses that have the same value in the first part of the IP addresses - for the purpose of allowing routing to identify the group by the inital part of the addresses. IP addresses in the same subnet typically sit on the same network






7. An internet wide system by which a hierarchical set of DNS servers collectively hold all the name IP address mappings - with DNS servers referring users to the correct DNS server to successfully resolve a DNS name.






8. A high-speed line or series of connections that forms a major pathway within a network. The term is often used to describe the main network connections comprising the Internet.






9. A signal on a medium used to support the transmission of data. Data is carried over the medium by modulation.






10. In networking - this term is used in several ways. With ethernet hub and switch hardware - port is simply another name for interface - which is a physical connector in the swithc into whic a cable can be connected. With TCP and UDP - a port is a soft






11. A service or a program to look up information in the DNS






12. IPv4 address of a network host. When talking about host addresses - they are the network layer addresses.






13. Somtimes called place-value notation - this is a numeral system in which each position is related to the next by a constant multiplier - a common ration - called the base or radix of that numeral system.






14. In a web browser - an application the browser uses - inside the browser window to display some types of content. For example - a browser typically uses a plug-in to display video.






15. A field in the IP header that prevents a packet form indefinitely looping around an IP internetwork. Router decrements the TTL field each time they forward a packet - and if they decrement the TTL to 0 - the router discards the packet - which prevent






16. In networking - a symbol used when drawing network diagrams that represent a part of the network whose details can be ignored for the purposes of the diagram.






17. Computer hardware - typically used for LANS - that allows the computer to connect to some network cable. The NIC can then send and receive data over the cable at the direction of the computer.






18. The bit position in a binary number having the greatest value. The most significant bit is sometime referred to as the leftmost bit.






19. Communication that only allows one station to receive while the other station is transmitting






20. A source of information that is highly reliable and known for its accuracy






21. The forwarding of packets where the forwarding decision is taken dynamically - hop by hop - based on the conditions of downstream fowrading nodes.






22. A common term for 10base5 ethernet - referring to the fact that 10base5 cabling is thicker than the coaxial cabling used for 10base2.






23. A series of documents and memoranda encompassing new research - innovations and methodologies applicable to Internet technologies. RFCs are a reference for how technologies should work.






24. A common name for ethernet technology that operates at 100 mbps.






25. This field of a frame signals the beginning or end of a frame.






26. The loss of communication signal on the media. This loss is due to degradation of the energy wave over time.






27. Organizations that are responsible for the allocation and registration of Internet number resources within a particular region of the world. These registries include the American Registry for Internet Number for North America; RIPE network coordinati






28. The standards body responsible for the development and approval of TCP/IP standards






29. The passage of a data packet between two network nodes.






30. In LAN switches a reference to cases in which a frame is forwarded - or switche - when the incoming and outgoing interfaces use the same speed. It is the opposite of asymmetric switching.






31. A MAC address that can be configured on a device. The LAA can be used in place of the BIA . This means that you can replace a NIC or use a substitute device without changing the address used by the network to access the station.






32. Data link layer term describing a device connected to a network.






33. The optical or electrical impulse on a physical medium for purposes of communication.






34. Application-level throughput. It is the number of useful bits per unit of time from a certain source address to a certain destination - excluding protocol overhead and excluding retransmitted data packets.






35. The learning of source addresses on incoming frames and adding them to the bridging table. After the table has been completed and when a frame is received on one of the bridge's interfaces - the bridge looks up the frame's destination address in its






36. A protocol that allows a computer to retrieve email from a server.






37. Any communication in which the sender and receiver do not prearrange for communications to occur






38. A member of a multicast group. Every multicast client in each group has the same IP address. Multicast addresses begin with 224... and end with 239...






39. Additional data that is provided with a command to provide information used by the execution of the command. IOS command arguments are entered at the CLI after the command






40. A technique used to attack an ethernet network by sending fake ARP messages to an ethernet LAN. These frames contain false MAC addresses that confuse network devices - such as switches. As a result - frames intended for one node can be mistakenly sen






41. Part of a company's intranet that is extended to users outside the company






42. The range of ip addresses that can be assigned by the DHCP server.






43. On a switch - a table that lists all known MAC addresses - and the bridges/switch port out which the bridge/switch should forward frames sent to each MAC address.






44. Radio frequencies that creat noise that interferes with information being transmitted across unshielded copper cabling.






45. Unencrypted password used to allow access to privledge EXEC mode from IOS user EXEC mode.






46. In a shared media ethernet network - a signal generated by the transmitting devices that detects the collision. The jam signal continue to transmit for a specified period to ensure that all devices on the network detect the collision. The jame signal






47. From the priviledged mode - you can enter the device's global caonfiguration mode. From global configuration mode - you can configure global parameters or enter other configuration submodes such as interface - router and line configuration submodes.






48. An application level network protocl mainly applied to shared access to files - printers - serial ports - and miscellaneous communications between nodes on a network.






49. Refers to whether the performance of a device - attached to a particular type of LAN - can be accurately predicted. Token Ring LANS are deterministic - but ethernet LANS are non deterministic.






50. A computer program that runs in the background and is usually initiated as a process. Daemons often support server processes.