Test your basic knowledge |

CCNA Network Fundamentals Vocab

Subjects : cisco, it-skills, ccna
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A 32-bit field in the tcp segment header that specifies the sequence number of the next byte this host expects to receive as a part of the TCP session. It is used to recognize lost packets and flow control






2. A group of devices associated by the arrangement of a hierarchial addressing scheme. Devices in the same logical network that share a common network portion of their Layer 3 addresses.






3. A device on a network that serves as an access point to other networks. A default gateway is used by a host to forward IP packets that have destination addresses outside the local subnet. A router interface typically is used as the default gateway. W






4. A generic term from OSI that refers to the data - headers - and trailers about which a particular network layer is concerned.






5. The range of ip addresses that can be assigned by the DHCP server.






6. Media access methodology in which a node wishing to transmit listens for a carrier wave before trying to send. If a carrier is sensed - the node waits for the transmission in progress to finish before initiating its own transmission.






7. A combination of many IP subnets and networks - as created by building a network using routers. The term internwork is used to avoid confusion with the term network - because an internetwork can include several IP networks.






8. A time period between ethernet frames that allows fairness with the CSMA/CD algorithm. Without a space between frames in other words - without some time with no frames being sent a NIC might always listen for silence - never hear silence and therefor






9. In IP subnetting - this refers to the portion of a set of IP addresses whose value must be identical for the addresses to be in the same subnet.






10. As part of the TCP/IP internet layer - ICMP defines protocol messages used to inform network engineeres of how well an internetwork is working. For example - the ping command sends ICMP messages to determine whether a host can send packets ot another






11. A source of information that is highly reliable and known for its accuracy






12. The normal operation of ethernet ports on a hub. In this mode - the mapping of the wire pairs in the hub port is in a normal configuration. Some hubs provide a media-dependent interface/media-dependent interface - crossover switch. This switch is usu






13. A protocol used to dynamically assign IP configurations to hosts. The services defined by the protocol are used to request and assign an IP address - default gateway - and DNS server address to a network host.






14. Part of a company's intranet that is extended to users outside the company






15. A network that incorporates both optical fiber along with coaxial cable to create a broadband network. commonly used by cable tv companies.






16. In ethernet - the process performed by a bridge or switch when it decides that it should not forward a frame out another port






17. DNS data records. Their precise format is defined in RFC 1035. The most important fields in a resource record are Name - class - type and data.






18. The loss of communication signal on the media. This loss is due to degradation of the energy wave over time.






19. The MAC algorithm used by ethernet devices in a shared media. The protocol requires a node wishing to transmit to listen for a carrier signal before trying to send. If a carrier is sensed - the node waits for transmission in progress to finish before






20. The limited CLI mode where the commands available to the user are a subset of those available at the privileged level. In general - use the user Exec commands to temporarily change terminal settings - perform basic tests and list system information.






21. The method of for finding a host's hardware address from its IPv4 network layer address.






22. In ethernet a layer 2 device that receives an electrical signal in one port - interprets the bits - and makes a filtering or forwarding decision about the frame. If it forward - it sends a regenerated signal. Switches typically have many physical por






23. A common term for 10base5 ethernet - referring to the fact that 10base5 cabling is thicker than the coaxial cabling used for 10base2.






24. Communication that only allows one station to receive while the other station is transmitting






25. A device that connects end devices to the network or interconnects different networks. A router is an example of an intermediary device.






26. A type of hash function that is used to produce a small - fixed size checksum of a block of data - such as a packet or a computer file. A CRC is computed and appended before transmission or storage - and verified afterward by the recipient to confirm






27. The origin of the PDU. This can be a process a host or a node - depending on the layer to which you are reffering.






28. A group of IP addresses that have the same value in the first part of the IP addresses - for the purpose of allowing routing to identify the group by the inital part of the addresses. IP addresses in the same subnet typically sit on the same network






29. The arrangement of the nodes in a network and the physical connections between them. This is the representation of how the media is used to connect the devices.






30. In networking - this term is used in several ways. With ethernet hub and switch hardware - port is simply another name for interface - which is a physical connector in the swithc into whic a cable can be connected. With TCP and UDP - a port is a soft






31. A plan - design or program of action to be followed. Sometimes an addressing plan is called an addressing SCHEME.






32. Somtimes called place-value notation - this is a numeral system in which each position is related to the next by a constant multiplier - a common ration - called the base or radix of that numeral system.






33. 1. a collision domain that is a section of a LAN that is bound by bridges - routers or switches. 2. In a LAN using a bus topology - a segment is a continuous electrical circuit that is often connected to other such segments with repeaters. 3. When us






34. Ethernet that transmits data at 1 -000 -000 -000 one billion bits per second.






35. Unencrypted password used to allow access to privledge EXEC mode from IOS user EXEC mode.






36. A logical connection between devices in which the frames are passed between the devices. Virtual circuits are independent of the physical structure and may be established through multiple physical devices.






37. A convention for writing IP addresses with four decimal numbers - ranging from 0 to 255 - with each octet representing 8 bits of the 32 bit IP address. The term originates from the fact that each of the four decimal numbers is separated by a period.






38. The cabling and connectors used to interconnect the network devices.






39. An IPv4 multicast address that is restricted to a local group or organization.






40. In the telnet application - commands are always introduced by a character with the decimal code 255 - known as the Interpret as Command character.






41. A network model defined by the IETF that has been implemented on most computers and network device in the world.






42. A physical or a logical area in a LAN where the signals sent by the interfaces ma be subject o being combined. Within a collision domain - if a device sends a frame on a network segment - every other device on that same segment will receive that fram






43. A system of network design characterized by one or more major components that are required to maintain operation.






44. In ethernet - the process performed by a bridge or switch when it decides that it should send a frame out another port.






45. Random-access memory that does not lose its contents when the computer is shut down






46. Data that directs a process. a flag in a data-link frame is an example of control data.






47. The management of data flow between devices in a network. It is used to avoid too much data arriving before a device can handle it - causing data overflow.






48. A host or node that participates in some form of a group. For example - p2p technology defines a group of peers that participate jointly in the same activity - each one having a server and client component.






49. A process by which an end device - after it receives data over some transmission medium - examines the headers and trailers at each successive higher layer - eventually handing the data to the correct application. Sometimes called de-encapsulation.






50. The IEEE 802.2 standard that defines the upper sublayer of the Ethernet Layer 2 specifications.