Test your basic knowledge |

CCNA Network Fundamentals Vocab

Subjects : cisco, it-skills, ccna
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A group of devices associated by the arrangement of a hierarchial addressing scheme. Devices in the same logical network that share a common network portion of their Layer 3 addresses.






2. A technique used to attack an ethernet network by sending fake ARP messages to an ethernet LAN. These frames contain false MAC addresses that confuse network devices - such as switches. As a result - frames intended for one node can be mistakenly sen






3. In ethernet - the process performed by a bridge or switch when it decides that it should not forward a frame out another port






4. Real-time communication between two or more people through text. The text is conveyed through computers connected over a network such as the internet. files can also be transferred through the IM program to share files.






5. The first half of a MAC address. Manufactures must ensure that the value of the OUI has been registered with the IEEE. This value identifies the manufacturer of any Ethernet NIC or interface.






6. The physical interface transceivers. It deals with Layer 1 (the physical layer - hence the PHY) of ethernet.






7. In LAN switches a reference to cases in which a frame is forwarded - or switche - when the incoming and outgoing interfaces use the same speed. It is the opposite of asymmetric switching.






8. A term that describes IPv4 packets sent to all hosts in a particular network. In a directed broadcast - a single copy of the packet is routed to the specified network - where it is broadcast to all hosts on that network






9. Any communication in which the sender and receiver do not prearrange for communications to occur






10. An address used to represent a transmission from one device to all devices. In ethernet - the sepcial ethernet address FFFF.FFFF.FFFF is used as a destination MAC address to cause a frame to be sent to all devices on an ethernet LAN. In IPV4 - each s






11. The portion of a binary number that carries the most weight - the one written farthest to the left. High-order bits are the 1s in the network mask.






12. A protocol that allows a computer to retrieve email from a server.






13. A high-speed line or series of connections that forms a major pathway within a network. The term is often used to describe the main network connections comprising the Internet.






14. This field of a frame signals the beginning or end of a frame.






15. Radio frequencies that creat noise that interferes with information being transmitted across unshielded copper cabling.






16. A process by which an end device - after it receives data over some transmission medium - examines the headers and trailers at each successive higher layer - eventually handing the data to the correct application. Sometimes called de-encapsulation.






17. Somtimes called place-value notation - this is a numeral system in which each position is related to the next by a constant multiplier - a common ration - called the base or radix of that numeral system.






18. 1.collection of computers - printers - routers - switches - and other devices that can communication with each other over some transmission medium. 2. command that assgins a NIC based address to which the router is directly connected.






19. Binary digit used in the binary numbering system. Binary digits are units of information storage and communication in computing. Each bit can be either a 0 or a 1.






20. A unicast IP address that is considered to have three parts: a network part - a subnet part - and a host part. The term classful refers to the fact that classful network rules are first applied to the address - and then the rest of the address can be






21. A 1-bit flag in the TCP header that is used to request to the higher layers for immediate delivery of the packet.






22. An internet wide system by which a hierarchical set of DNS servers collectively hold all the name IP address mappings - with DNS servers referring users to the correct DNS server to successfully resolve a DNS name.






23. An international standards body that defines many networking standards. Also - the standards body that created the OSI model.






24. The lower of the two sublayers of the IEEE standard for ethernet. It is also the name of that sublayer






25. A method of computer processing in which different parts of a program run simultaneously on two or more computers that are communicating with each other over a network






26. The IPv4 multicast addresses 224.0.0.0 to 224.0.0.255. These addresses are to be used for multicast groups on a local network. Packets to these destinations are always transmitted with a TTTL value of 1






27. Normally - a relatively general term that refers to dfifferent kinds of networking devices. Historically - when routers were created - they were called gateways






28. A request for information. Queries are answered with replies.






29. A dotted decimal number defined by the IPv4 protocol to represent a network or subnet. It represents the network that hosts reside in. Also called a network number or network ID.






30. One of the three basic binary logic operations. ANDing yields the following result: 1 and 1 = 1 - 1 and 0 = 0 - 0 and 1 = 0






31. A network that is connected to a device's interface. For example networks that interface with the router are known to be directly connected. Devices learn their initial IP routes based on being connected to these subnets.






32. A method of expressing a network prefix. It uses a forward slash / followed by the network prefix.






33. A process used to verify the identity of a person or process






34. The process of forwarding frames in a switch or a bridge from one port to another port or from segment to segment






35. Any combination of hardware device and/or software application designed to protect network devices from outside network users and/or malicious applications and files.






36. The largest IP packet size allowed to be sent out a particular interface. Ethernet interfaces default to an MTU of 1500 because the data field of an Ethernet frame should be limited to 1500 bytes - and the IP packet sits inside the ethernet frame's d






37. A removable component that has memory space for storage. Used on the router or switch for storing the compressed operating system image.






38. A network device that accesses a service on another computer remotely by accessing the network.






39. A protocol for synchronizing the clocks of computer systems over packet-switch data networks. NTP uses UDP port 123 as its transport layer.






40. Network layer protocol in the TCP/IP stack offering a connectionless internetwork service. IP provides features for addressing - type-of-service specification - fragmentation and reassembly - and security.






41. Defines the commands - headers and processes by which web server and web browsers transfer files.






42. TCP or UDP ports that range from 49152 to 65535 and are not used by any defined server applications.






43. A control mechanism that can provide different priorities to different users or data flows - or guarantee a certain level of performance to a data flow in accordance with requests from the application program.






44. A network created for devices located in a limited geographic area - through which the company owning the LAN has the right to run cables.






45. The process of obscuring information to make it unreadable without special knowledge - somtimes referred to as scrambling. The process takes the data to be encrypted and applies a mathematical formula to it along with a secret number. The resulting v






46. A combination of many IP subnets and networks - as created by building a network using routers. The term internwork is used to avoid confusion with the term network - because an internetwork can include several IP networks.






47. Represents the 0 in the binary number. In an IP subnet mask - the lower-order bits represent the host portion. Sometimes called the host portion of bits.






48. Resources used to manage or operate the network. Overhead consumes bandwidth and reduces the amount of application data that can be transported across the network.






49. A time period between ethernet frames that allows fairness with the CSMA/CD algorithm. Without a space between frames in other words - without some time with no frames being sent a NIC might always listen for silence - never hear silence and therefor






50. Communication that only allows one station to receive while the other station is transmitting