Test your basic knowledge |

CCNA Network Fundamentals Vocab

Subjects : cisco, it-skills, ccna
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. The portion of a binary number that carries the most weight - the one written farthest to the left. High-order bits are the 1s in the network mask.






2. A method of computer processing in which different parts of a program run simultaneously on two or more computers that are communicating with each other over a network






3. When used generically - this term refers to end-user data along with networking headers and trailers that are transmitted through a network. When used specifically - it is end-user data - along with the network or Internet layer headers and any highe






4. Used by tcp or udp - with values between 0 and 1023 - these ports are allocated by high-privilege processes. They are used so that all clients know the correct port number to connect to.






5. A drag-and-drop network simulator developed by Cisco to design - configure and troubleshoot network equipment within a controlled - simulated program environment.






6. A 1-bit flag in the TCP header used to indicate that the receiving host should notify the destination process to do urgent processing.






7. A written specification that defines what tasks a service or device should perform. Each protocol defines messages - often in the form of headers - plus the rules and processes by which these messages are used to achieve some stated purpose.






8. A data link layer address - for example a MAC address






9. Additional data that is provided with a command to provide information used by the execution of the command. IOS command arguments are entered at the CLI after the command






10. Unique addresses that are public domain addresses.






11. The method of for finding a host's hardware address from its IPv4 network layer address.






12. An ethernet frame that is less than 64 bytes in size. Runts are caused by collisions and are also know as collision fragments






13. A common name for ethernet technology that operates at 100 mbps.






14. International standardization program created by ISO and ITU-T to develop standards for data networking that facilitate multivendor equipment interoperability






15. A part of the ethernet frame that fills in the data field to ensure that the data field meets the minimum size requirement of 46 bytes.






16. 1. a collision domain that is a section of a LAN that is bound by bridges - routers or switches. 2. In a LAN using a bus topology - a segment is a continuous electrical circuit that is often connected to other such segments with repeaters. 3. When us






17. A network topology characterized by a central location connected to multiple hubs. In an extended star - these interconnected hubs may be connected to more hubs. It is essentially a hierarchical topology but typically is drawn with the central site i






18. Network protocols or technologies that do not use the acknowledgment system to guarantee reliable delivery of information






19. A 1-bit field in the TCP header that is used by a device that wants to terminate its session with the other device. This is done by inserting the FIN flag in the flag field found in the TCP segment






20. Data that directs a process. a flag in a data-link frame is an example of control data.






21. Line code in which 1s are represented by one significant condition and 0s are represented by another.






22. In ethernet - the process performed by a bridge or switch when it decides that it should not forward a frame out another port






23. From the priviledged mode - you can enter the device's global caonfiguration mode. From global configuration mode - you can configure global parameters or enter other configuration submodes such as interface - router and line configuration submodes.






24. A protocol used between routers so that they can learn routes to add to their routing tables.






25. A 1-bt flag in the TCP header used to indicate the initial value of the sequence number. The SYN flag is only set in the first two segments of the three-way TCP connection establishment sequence.






26. A 1-bit flag in the tcp header that indicates the acknowledgment field is valid.






27. In ethernet a layer 2 device that receives an electrical signal in one port - interprets the bits - and makes a filtering or forwarding decision about the frame. If it forward - it sends a regenerated signal. Switches typically have many physical por






28. Communication that allows receipt and transmission simultaneously. A station can transmit and receive at the same time. There are no collisions with full-duplex ethernet transmision.






29. A high-speed line or series of connections that forms a major pathway within a network. The term is often used to describe the main network connections comprising the Internet.






30. A network that incorporates both optical fiber along with coaxial cable to create a broadband network. commonly used by cable tv companies.






31. Any combination of hardware device and/or software application designed to protect network devices from outside network users and/or malicious applications and files.






32. The table used by a switch that associates MAC addresses with the outgoing port. A general term for the table that a LAN bridge uses for its forwarding/filtering decisions. The table holds a list of MAC addresses and the port out which the bridge sho






33. A number used in the 802.11 header to specify the session between a wireless client and the access point.






34. A source of information that is highly reliable and known for its accuracy






35. MDIX is an alternative operation of ethernet ports on a hub. In this mode - the mapping of the wire pairs used in the hub port is in a crossover configuration. This allows you to use a straight-through cable to interconnect the hub to another hub.






36. A dotted decimal number that helps identify the structure of IP addresses. The mask represents the network and subnet parts of related IP addresses with binary 1s and the host part of related IP addresses with binary 0s






37. A communication path over a medium used to transport information from a sender to a receiver. Multiple channels can be multiplexed over a single cable






38. In networking - this term is used in several ways. With ethernet hub and switch hardware - port is simply another name for interface - which is a physical connector in the swithc into whic a cable can be connected. With TCP and UDP - a port is a soft






39. The first half of a MAC address. Manufactures must ensure that the value of the OUI has been registered with the IEEE. This value identifies the manufacturer of any Ethernet NIC or interface.






40. A corporate system such as a website that is explicitly used by internal employees. Can be assessed internally or remotely






41. A port on cisco devices to which a terminal or computer with a terminal emulator is connected to the network device in order to communicate and configure the network device






42. A company that helps create the Internet by providing connectivity to enterprises and individuals - as well as interconnecting to other ISPs to create connectivity to all other ISPs.






43. This field of a frame signals the beginning or end of a frame.






44. A rectangular cabling connector with eight pins - often used with ethernet cables.






45. The connection of devices on a common media. Sometimes a physical network is also referred to as a network segment.






46. Used in the CLI following the command. Keywords are parameters that are used with the command from a set of predefined values.






47. A special reserved IPv4 address - 127.0.0.1 that can be used to test TCP/IP applications. Packets sent to 127.0.0.1 by a computer never leave the computer or even require working NIC. Instead - the packet is processed by IP at the lowest layer and is






48. An addressing scheme in which a network is partitioned into sections - with the section identifier forming one part of each destination's address and the destination identifier forming another






49. A network model defined by the IETF that has been implemented on most computers and network device in the world.






50. Using values between 1024 and 49 -151 these numbers are equivalent to well-known ports in concept - but they are specifically used for nonprivileged application processes.