Test your basic knowledge |

CCNA Network Fundamentals Vocab

Subjects : cisco, it-skills, ccna
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A company that helps create the Internet by providing connectivity to enterprises and individuals - as well as interconnecting to other ISPs to create connectivity to all other ISPs.






2. An address used to represent a transmission from one device to all devices. In ethernet - the sepcial ethernet address FFFF.FFFF.FFFF is used as a destination MAC address to cause a frame to be sent to all devices on an ethernet LAN. In IPV4 - each s






3. Refers to whether the performance of a device - attached to a particular type of LAN - can be accurately predicted. Token Ring LANS are deterministic - but ethernet LANS are non deterministic.






4. A network device - typically connected to a range of LAN and WAN interfaces - that forwards packets based on their destination IP addresses.






5. A communication path over a medium used to transport information from a sender to a receiver. Multiple channels can be multiplexed over a single cable






6. Program used to download and send email. Email clients use POP3 to receive emails and use SMTP to send emails. Also called an email client






7. Any combination of hardware device and/or software application designed to protect network devices from outside network users and/or malicious applications and files.






8. Represents the 0 in the binary number. In an IP subnet mask - the lower-order bits represent the host portion. Sometimes called the host portion of bits.






9. A control mechanism that can provide different priorities to different users or data flows - or guarantee a certain level of performance to a data flow in accordance with requests from the application program.






10. Another form of the root word converge in the phrase converged network. This kind of network aggregates various forms of traffic such as voice - video and data on the same network infrastructure. A more common usage represents the process by which ro






11. Data that directs a process. a flag in a data-link frame is an example of control data.






12. The retransmission delay used with CSMA/CD when a collision occurs. The algorithm forces each sender that detected the collisions to delay a random amount of time before attempting to retransmit.






13. A broadcast that is sent to a specific network or series of networks.






14. Network protocols or technologies that do not use the acknowledgment system to guarantee reliable delivery of information






15. The table used by a switch or bridge that associates MAC addresses with the outgoing port. The switch or bridge uses this table for its forwarding/filtering decisions.






16. The process by which a device adds networking heads and trailers to data from an application for the eventual transmission of the data onto a transmission medium.






17. An organization that assigns the numbers important to the proper operation of the TCP/IP protocol and the Internet - including assigning globally unique IP addresses.






18. TCP or UDP ports that range from 49152 to 65535 and are not used by any defined server applications.






19. A name - as defined by DNS that uniquely identifies a computer in the internet. DNS servers can then respond to the DNS requests by supplying the IP address that is used by the computer that has a particular domain name. This term also refers to the






20. The management of data flow between devices in a network. It is used to avoid too much data arriving before a device can handle it - causing data overflow.






21. A MAC address that can be configured on a device. The LAA can be used in place of the BIA . This means that you can replace a NIC or use a substitute device without changing the address used by the network to access the station.






22. A type of hash function that is used to produce a small - fixed size checksum of a block of data - such as a packet or a computer file. A CRC is computed and appended before transmission or storage - and verified afterward by the recipient to confirm






23. The forwarding of packets where the forwarding decision is taken dynamically - hop by hop - based on the conditions of downstream fowrading nodes.






24. Defines the commands - headers and processes by which web server and web browsers transfer files.






25. Used in the CLI following the command. Keywords are parameters that are used with the command from a set of predefined values.






26. Also known as boolean algebra. These consist of the AND OR and IF operations






27. A member of a multicast group. Every multicast client in each group has the same IP address. Multicast addresses begin with 224... and end with 239...






28. A unit of measurement of the number of times 1000 bits can be transmitted in 1 second. 1 kbps = 1000bps






29. A list of router holds in memory for the purpose of deciding how to forward packets.






30. This field of a frame signals the beginning or end of a frame.






31. A field in the IP header that prevents a packet form indefinitely looping around an IP internetwork. Router decrements the TTL field each time they forward a packet - and if they decrement the TTL to 0 - the router discards the packet - which prevent






32. In LAN switches a reference to cases in which a frame is forwarded - or switche - when the incoming and outgoing interfaces use the same speed. It is the opposite of asymmetric switching.






33. A routing feature in which frames in an interface output queue are prioritized based on various characteristics such as packet size and interface type.






34. Organizations that are responsible for the allocation and registration of Internet number resources within a particular region of the world. These registries include the American Registry for Internet Number for North America; RIPE network coordinati






35. In a shared media ethernet network - a signal generated by the transmitting devices that detects the collision. The jam signal continue to transmit for a specified period to ensure that all devices on the network detect the collision. The jame signal






36. An international standards body that defines many networking standards. Also - the standards body that created the OSI model.






37. A device that connects end devices to the network or interconnects different networks. A router is an example of an intermediary device.






38. The origin of the PDU. This can be a process a host or a node - depending on the layer to which you are reffering.






39. The client part of the DNS client server mechanism. A DNS resolver creates queries sent a across a network to a same server - interprets responses - and returns information to the requesting programs.






40. A removable component that has memory space for storage. Used on the router or switch for storing the compressed operating system image.






41. A physical or a logical area in a LAN where the signals sent by the interfaces ma be subject o being combined. Within a collision domain - if a device sends a frame on a network segment - every other device on that same segment will receive that fram






42. Line code in which 1s are represented by one significant condition and 0s are represented by another.






43. Information systems that allow the creation of a document or documents that can be edited by more than one person in real time






44. A network that is connected to a device's interface. For example networks that interface with the router are known to be directly connected. Devices learn their initial IP routes based on being connected to these subnets.






45. Radio frequencies that creat noise that interferes with information being transmitted across unshielded copper cabling.






46. The process of forwarding frames in a switch or a bridge from one port to another port or from segment to segment






47. A command on many computer operating systems that discovers the IP addresses - and possibly host names - of the routers used by the network when sending a packet from one computer to another.






48. As filed in the TCP header that is set in a sent segment - signifies the maximum amount of unacknowledged data the host is willing to receive before the other sending host must wait for an acknowledgment.






49. DNS data records. Their precise format is defined in RFC 1035. The most important fields in a resource record are Name - class - type and data.






50. A temporary storage where data that has been retrieved or calculated and is accessed frequently can be stored. After the data is stored in the cache - the processes can access the cached copy instead of accessing the original data. A cache reduces th