SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CCNA Network Fundamentals Vocab
Start Test
Study First
Subjects
:
cisco
,
it-skills
,
ccna
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. DNS data records. Their precise format is defined in RFC 1035. The most important fields in a resource record are Name - class - type and data.
Requests for Comments
collision domain
resource records
server message block
2. Interface by magnetic signals caused by the flow of electricity. EMI can cause reduced data integrity and increased error rates on transmission channels. The physics of this process are that electrical current creates magnetic fields - which in turn
scalability
multicast client
network segment
electromagnetic interface
3. The passage of a data packet between two network nodes.
locally administered address
fast ethernet
hop
virtual local area network
4. Application-level throughput. It is the number of useful bits per unit of time from a certain source address to a certain destination - excluding protocol overhead and excluding retransmitted data packets.
dynamic or private ports
TCP/IP
console port
goodput
5. An international - nonprofit organization for the advancement of technology related to eletricity. IEEE maintains the standards defining many LAN protocols.
flow control
bridge table
collaborative
Institute of Electrical and Electronics Engineers
6. To change the energy levels transmitted over some networking medium to transmit bits over that medium.
fast ethernet
encode
SYN
dispersion
7. A dotted decimal number that helps identify the structure of IP addresses. The mask represents the network and subnet parts of related IP addresses with binary 1s and the host part of related IP addresses with binary 0s
bit
user executive mode
address pool
subnet mask
8. A 1-bit flag in the tcp header that indicates the acknowledgment field is valid.
network address
ACK
daemon
bit time
9. A model that consists of various layers that enable the development and explanation of technology to be done on a modular basis. This allows interoperability among different technologies among the different layers.
peer
administratively scoped address
decapsulation
layered model
10. The IPv4 multicast addresses 224.0.0.0 to 224.0.0.255. These addresses are to be used for multicast groups on a local network. Packets to these destinations are always transmitted with a TTTL value of 1
switch table
reserved link-local addresses
digital logic
user executive mode
11. IPv4 address of a network host. When talking about host addresses - they are the network layer addresses.
encapsulation
global configuration mod
host address
network address
12. In networking - this term is used in several ways. With ethernet hub and switch hardware - port is simply another name for interface - which is a physical connector in the swithc into whic a cable can be connected. With TCP and UDP - a port is a soft
Internet service provider
resource records
Address resolution protocol
port
13. Somtimes called place-value notation - this is a numeral system in which each position is related to the next by a constant multiplier - a common ration - called the base or radix of that numeral system.
positional notation
throuhpu
MAC table
convergence
14. The design on networks that can continue to operate without interruption in the case of hardware - software or communications failures.
encryption
host
fault tolerance
resource records
15. Communication where the sender and receiver must prearrange for communications to occur; otherwise - the communication fails.
instant messaging
connection oriented
extranet
multiplexing
16. Unique addresses that are public domain addresses.
latency
slash format
standards
globally scoped addresses
17. A series of documents and memoranda encompassing new research - innovations and methodologies applicable to Internet technologies. RFCs are a reference for how technologies should work.
standards
unshieled twisted-pair
PSH
Requests for Comments
18. A protocol for synchronizing the clocks of computer systems over packet-switch data networks. NTP uses UDP port 123 as its transport layer.
Network time protocol
dynamic or private ports
dispersion
physical topology
19. In a web browser - an application the browser uses - inside the browser window to display some types of content. For example - a browser typically uses a plug-in to display video.
most significant bit
plug-in
media independent
ARP cache
20. A general type of cable - with the cable holding twisted pairs of copper wires and the cable itself having little shielding.
client
query
virtual terminal line
unshieled twisted-pair
21. A common term for 10base5 ethernet - referring to the fact that 10base5 cabling is thicker than the coaxial cabling used for 10base2.
best effort
code gropu
collaborative
Thicknet
22. An IPV4 addressing scheme that uses a subnet mask that does not follow classful addressing limitations. It provides increased flexibility when dividing ranges of IP addresses into separate networks. Classless addressing is considered the best in curr
Organizational Unique Identifier
peer
prviate address
classless addressing
23. Line code in which 1s are represented by one significant condition and 0s are represented by another.
nonreturn to zero
carrier sense multiple access collision detect (CSMA/CD)
console port
test-net address
24. In ethernet - the process performed by a bridge or switch when it decides that it should not forward a frame out another port
filtering
Institute of Electrical and Electronics Engineers
encryption
TCP
25. An address used to represent a transmission from one device to all devices. In ethernet - the sepcial ethernet address FFFF.FFFF.FFFF is used as a destination MAC address to cause a frame to be sent to all devices on an ethernet LAN. In IPV4 - each s
extended star
half duplex
decapsulation
broadcast address
26. Used in the CLI following the command. Keywords are parameters that are used with the command from a set of predefined values.
physical topology
data termianl equipment
metropolitan-area network
keyword
27. The forwarding of packets where the forwarding decision is taken dynamically - hop by hop - based on the conditions of downstream fowrading nodes.
selective forwarding
AND
media access control
collision
28. MDIX is an alternative operation of ethernet ports on a hub. In this mode - the mapping of the wire pairs used in the hub port is in a crossover configuration. This allows you to use a straight-through cable to interconnect the hub to another hub.
media-dependent interface crossover
bridge table
Internet
end device
29. A protocol that allows a computer to retrieve email from a server.
internetwork
post office protocol
public address
bit time
30. The table used by a switch or bridge that associates MAC addresses with the outgoing port. The switch or bridge uses this table for its forwarding/filtering decisions.
Thicknet
scheme
bridge table
network address
31. Represents the 0 in the binary number. In an IP subnet mask - the lower-order bits represent the host portion. Sometimes called the host portion of bits.
AND
TCP/IP
overhead
low-order bit
32. The networking layers whose processes are not affected by the media being used. In ethernet - these are all the layers from the LLC sublayer of data link upward.
physical topology
media independent
single point of failure
reserved link-local addresses
33. Unencrypted password used to allow access to privledge EXEC mode from IOS user EXEC mode.
reserved link-local addresses
cloud
plug-in
enable password
34. Additional data that is provided with a command to provide information used by the execution of the command. IOS command arguments are entered at the CLI after the command
argument
classful addressing
RJ-45
client
35. The standards body responsible for the development and approval of TCP/IP standards
Institute of Electrical and Electronics Engineers
Optical time domain reflectometer
frame
Internet Engineering Task Force
36. The arrangement of the nodes in a network and the physical connections between them. This is the representation of how the media is used to connect the devices.
classless addressing
virtual local area network
Logical link control
physical topology
37. A system of network design characterized by one or more major components that are required to maintain operation.
media independent
server message block
single point of failure
download
38. An IPv4 multicast address that is restricted to a local group or organization
packet
administratively scoped address
dispersion
Institute of Electrical and Electronics Engineers
39. A broadcast that is sent to a specific network or series of networks.
IP address
limited broadcast
radio frequency interference
fault tolerance
40. A layer 4 protocl of TCP/IP model - TCP lets applications guarantee delivery of data across a network.
fault tolerance
RJ-45
TCP
store and forward
41. 1. a collision domain that is a section of a LAN that is bound by bridges - routers or switches. 2. In a LAN using a bus topology - a segment is a continuous electrical circuit that is often connected to other such segments with repeaters. 3. When us
segment
local area network
bridging
delimiter
42. Radio frequencies that creat noise that interferes with information being transmitted across unshielded copper cabling.
protocol suite
bridge
proxy arp
radio frequency interference
43. A removable component that has memory space for storage. Used on the router or switch for storing the compressed operating system image.
test-net address
backoff algorithm
client
flash
44. A type of hash function that is used to produce a small - fixed size checksum of a block of data - such as a packet or a computer file. A CRC is computed and appended before transmission or storage - and verified afterward by the recipient to confirm
host
goodput
unshieled twisted-pair
cyclic redundancy check
45. The IPv4 address block 192.0.2.0 to 192.0.2.255 that is set aside for teaching and learning purposes. These addresses can be used in documentation and network examples.
data communications equipment
AND
test-net address
nonvolatile RAM (NVRAM)
46. The IP address of the originating host that is placed into the IP packet header.
PSH
window size
source IP address
logical network
47. In ethernet a layer 2 device that receives an electrical signal in one port - interprets the bits - and makes a filtering or forwarding decision about the frame. If it forward - it sends a regenerated signal. Switches typically have many physical por
most significant bit
switch
layered model
Institute of Electrical and Electronics Engineers
48. An application level network protocl mainly applied to shared access to files - printers - serial ports - and miscellaneous communications between nodes on a network.
virtual circuit
scheme
Network address translation (NAT)
server message block
49. A grouping of code that meets a certain - already specified - condition for entering in that certain group.
argument
code gropu
Network address translation (NAT)
protocol data unit
50. Another form of the root word converge in the phrase converged network. This kind of network aggregates various forms of traffic such as voice - video and data on the same network infrastructure. A more common usage represents the process by which ro
convergence
encryption
address pool
client