Test your basic knowledge |

CCNA Network Fundamentals Vocab

Subjects : cisco, it-skills, ccna
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. IPv4 address of a network host. When talking about host addresses - they are the network layer addresses.






2. Network layer protocol in the TCP/IP stack offering a connectionless internetwork service. IP provides features for addressing - type-of-service specification - fragmentation and reassembly - and security.






3. A technique used to attack an ethernet network by sending fake ARP messages to an ethernet LAN. These frames contain false MAC addresses that confuse network devices - such as switches. As a result - frames intended for one node can be mistakenly sen






4. A drag-and-drop network simulator developed by Cisco to design - configure and troubleshoot network equipment within a controlled - simulated program environment.






5. The minimum time a NIC or interface can take to send an entire frame. Slot time - then - implies a minimum frame size.






6. The time required to send a single bit over some transmission medium. The time can be calculated at 1/speed - where speed is the number of bits per second sent over the medium






7. Defines which wires in a cable should connect to each pin on the connectors on both ends of a cable. For example - a UTP cable used for ethernet - used for a straight-through cable pinout - connects the wire at pin 1 on one end with the pin 1 on the






8. A 1-bit flag in the TCP header that is used to request to the higher layers for immediate delivery of the packet.






9. This field of a frame signals the beginning or end of a frame.






10. A logical connection between devices in which the frames are passed between the devices. Virtual circuits are independent of the physical structure and may be established through multiple physical devices.






11. A device such as a desktop or mobile device that is used by an end user.






12. The MAC algorithm used by ethernet devices in a shared media. The protocol requires a node wishing to transmit to listen for a carrier signal before trying to send. If a carrier is sensed - the node waits for transmission in progress to finish before






13. A device that connects end devices to the network or interconnects different networks. A router is an example of an intermediary device.






14. The normal operation of ethernet ports on a hub. In this mode - the mapping of the wire pairs in the hub port is in a normal configuration. Some hubs provide a media-dependent interface/media-dependent interface - crossover switch. This switch is usu






15. Program used to download and send email. Email clients use POP3 to receive emails and use SMTP to send emails. Also called an email client






16. The physical interface transceivers. It deals with Layer 1 (the physical layer - hence the PHY) of ethernet.






17. A logical network composed of all the computers and networking devices that can be reached by sending a frame to the data link layer broadcast address.






18. A model that consists of various layers that enable the development and explanation of technology to be done on a modular basis. This allows interoperability among different technologies among the different layers.






19. The largest IP packet size allowed to be sent out a particular interface. Ethernet interfaces default to an MTU of 1500 because the data field of an Ethernet frame should be limited to 1500 bytes - and the IP packet sits inside the ethernet frame's d






20. Translation RFC 1918 addresses to public domain addresses. Because RFC 1918 addresses are not routerd on the Internet - hosts accessing the Internet must use public domain addresses.






21. Communication that only allows one station to receive while the other station is transmitting






22. A network model defined by the IETF that has been implemented on most computers and network device in the world.






23. Radio frequencies that creat noise that interferes with information being transmitted across unshielded copper cabling.






24. The process of forwarding frames in a switch or a bridge from one port to another port or from segment to segment






25. Normally - a relatively general term that refers to dfifferent kinds of networking devices. Historically - when routers were created - they were called gateways






26. A part of the ethernet frame that fills in the data field to ensure that the data field meets the minimum size requirement of 46 bytes.






27. An application protocol typically not used by end users. Instead - it is used by the network management software and networking devices to allow a network engineer to monitor and troubleshoot network problems.






28. A part of a computer network that every device communicates with using the same physical medium. Network segments are extended by hubs or repeaters.






29. The standards body responsible for the development and approval of TCP/IP standards






30. As part of the TCP/IP internet layer - ICMP defines protocol messages used to inform network engineeres of how well an internetwork is working. For example - the ping command sends ICMP messages to determine whether a host can send packets ot another






31. A network created for devices located in a limited geographic area - through which the company owning the LAN has the right to run cables.






32. Routing that adjusts automatically to network topology or traffic changes.






33. The bit position in a binary number having the greatest value. The most significant bit is sometime referred to as the leftmost bit.






34. Part of a company's intranet that is extended to users outside the company






35. An ethernet frame that is less than 64 bytes in size. Runts are caused by collisions and are also know as collision fragments






36. The process by which a router receives an incoming frame - discards the ata link header and trailer - makes a forwarding decision based on the destination IP address - adds a new data-link header and trailer based on the outgoing interface and forwar






37. A logical storage in a host's RAM to store arp entries.






38. A grouping of code that meets a certain - already specified - condition for entering in that certain group.






39. A name - as defined by DNS that uniquely identifies a computer in the internet. DNS servers can then respond to the DNS requests by supplying the IP address that is used by the computer that has a particular domain name. This term also refers to the






40. Using values between 1024 and 49 -151 these numbers are equivalent to well-known ports in concept - but they are specifically used for nonprivileged application processes.






41. A network device - typically connected to a range of LAN and WAN interfaces - that forwards packets based on their destination IP addresses.






42. The portion of a binary number that carries the most weight - the one written farthest to the left. High-order bits are the 1s in the network mask.






43. A 1-bt flag in the TCP header used to indicate the initial value of the sequence number. The SYN flag is only set in the first two segments of the three-way TCP connection establishment sequence.






44. The IEEE 802.2 standard that defines the upper sublayer of the Ethernet Layer 2 specifications.






45. The method of for finding a host's hardware address from its IPv4 network layer address.






46. The dividing of IP datagrams to meet the MTU requirement of a layer 2 protocol.






47. A generic term from OSI that refers to the data - headers - and trailers about which a particular network layer is concerned.






48. A form of signal modulation where the message information is encoded in the amplitude of series of signal pulses. It transmits data by varying the aplitunes of the individual pulses. This is now obsolete and has been replaced by pulse code modulation






49. A company that helps create the Internet by providing connectivity to enterprises and individuals - as well as interconnecting to other ISPs to create connectivity to all other ISPs.






50. Communication that allows receipt and transmission simultaneously. A station can transmit and receive at the same time. There are no collisions with full-duplex ethernet transmision.