Test your basic knowledge |

CCNA Network Fundamentals Vocab

Subjects : cisco, it-skills, ccna
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A control mechanism that can provide different priorities to different users or data flows - or guarantee a certain level of performance to a data flow in accordance with requests from the application program.






2. Used in the CLI following the command. Keywords are parameters that are used with the command from a set of predefined values.






3. From the priviledged mode - you can enter the device's global caonfiguration mode. From global configuration mode - you can configure global parameters or enter other configuration submodes such as interface - router and line configuration submodes.






4. A dotted decimal number that helps identify the structure of IP addresses. The mask represents the network and subnet parts of related IP addresses with binary 1s and the host part of related IP addresses with binary 0s






5. Can refer to computer hardware that is to be used by multiple concurrent users. Alternatively - this term can refer to computer software that provides services to many users. For example - a web server consists of web server software running on some






6. An international - nonprofit organization for the advancement of technology related to eletricity. IEEE maintains the standards defining many LAN protocols.






7. A drag-and-drop network simulator developed by Cisco to design - configure and troubleshoot network equipment within a controlled - simulated program environment.






8. A general type of cable - with the cable holding twisted pairs of copper wires and the cable itself having little shielding.






9. A network topology characterized by a central location connected to multiple hubs. In an extended star - these interconnected hubs may be connected to more hubs. It is essentially a hierarchical topology but typically is drawn with the central site i






10. A process used to verify the identity of a person or process






11. An entry in an IP routing table that was created because a network engineer entered the routing information into the router's configuration.






12. As part of the TCP/IP internet layer - ICMP defines protocol messages used to inform network engineeres of how well an internetwork is working. For example - the ping command sends ICMP messages to determine whether a host can send packets ot another






13. Another form of the root word converge in the phrase converged network. This kind of network aggregates various forms of traffic such as voice - video and data on the same network infrastructure. A more common usage represents the process by which ro






14. Unique addresses that are public domain addresses.






15. 1.collection of computers - printers - routers - switches - and other devices that can communication with each other over some transmission medium. 2. command that assgins a NIC based address to which the router is directly connected.






16. In ethernet - the process performed by a bridge or switch when it decides that it should not forward a frame out another port






17. A network device - typically connected to a range of LAN and WAN interfaces - that forwards packets based on their destination IP addresses.






18. Information systems that allow the creation of a document or documents that can be edited by more than one person in real time






19. Data link layer term describing a device connected to a network.






20. Line code in which 1s are represented by one significant condition and 0s are represented by another.






21. A device such as a desktop or mobile device that is used by an end user.






22. Also known as boolean algebra. These consist of the AND OR and IF operations






23. A system of network design characterized by one or more major components that are required to maintain operation.






24. In ethernet - a device that receives an electrical signal in one port - interprets the bits and regenerates a clean signal that it sends out all other ports of the hub. Typically it also supplies several ports - which are oftentimes RJ-45 jacks.






25. A 32-bit field in the tcp segment header that specifies the sequence number of the next byte this host expects to receive as a part of the TCP session. It is used to recognize lost packets and flow control






26. The passage of a data packet between two network nodes.






27. In TCP - the process of taking a large chunk of data and breaking it into small enough pieces to fit within a TCP segment without breaking any rules about the maximum amount of data allowed in a segment.






28. A process that uses the same ARP messages as a normal ARP - but by which a router replies instead of the host listed in the ARP request. When a router sees an ARP request that cannot reach the intended host - but for which the router knows a route to






29. Any communication in which the sender and receiver do not prearrange for communications to occur






30. A technique used to attack an ethernet network by sending fake ARP messages to an ethernet LAN. These frames contain false MAC addresses that confuse network devices - such as switches. As a result - frames intended for one node can be mistakenly sen






31. A network that is connected to a device's interface. For example networks that interface with the router are known to be directly connected. Devices learn their initial IP routes based on being connected to these subnets.






32. A special reserved IPv4 address - 127.0.0.1 that can be used to test TCP/IP applications. Packets sent to 127.0.0.1 by a computer never leave the computer or even require working NIC. Instead - the packet is processed by IP at the lowest layer and is






33. An IPv4 multicast address that is restricted to a local group or organization.






34. In LAN switches a reference to cases in which a frame is forwarded - or switche - when the incoming and outgoing interfaces use the same speed. It is the opposite of asymmetric switching.






35. An organization that assigns the numbers important to the proper operation of the TCP/IP protocol and the Internet - including assigning globally unique IP addresses.






36. The number of various unique digits - including 0 that a positional number system uses to represent numbers. For example - in the binary system (base 2) the radix is 2. In the decimal system the radix is 10.






37. The learning of source addresses on incoming frames and adding them to the bridging table. After the table has been completed and when a frame is received on one of the bridge's interfaces - the bridge looks up the frame's destination address in its






38. Any combination of hardware device and/or software application designed to protect network devices from outside network users and/or malicious applications and files.






39. One of the three basic binary logic operations. ANDing yields the following result: 1 and 1 = 1 - 1 and 0 = 0 - 0 and 1 = 0






40. An international standards body that defines many networking standards. Also - the standards body that created the OSI model.






41. A routing feature in which frames in an interface output queue are prioritized based on various characteristics such as packet size and interface type.






42. Unencrypted password used to allow access to privledge EXEC mode from IOS user EXEC mode.






43. The retransmission delay used with CSMA/CD when a collision occurs. The algorithm forces each sender that detected the collisions to delay a random amount of time before attempting to retransmit.






44. A request for information. Queries are answered with replies.






45. A network device that has an IPv4 address assigned to it to communication over a network.






46. An IP address that has been registered with IANA or one of its member agencies - which guarantees that the address is globally unique. Globally unique public IP addresses can be used for packets sent through the Internet.






47. A member of a multicast group. Every multicast client in each group has the same IP address. Multicast addresses begin with 224... and end with 239...






48. A device that connects to a local digital telephone loop for a WAN circuit to a serial interface on a network device - typically connecting to a router. The CSU/DSU performs physical Layer 1 signaling on WAN circuits






49. The bit position in a binary number having the greatest value. The most significant bit is sometime referred to as the leftmost bit.






50. Refers to whether the performance of a device - attached to a particular type of LAN - can be accurately predicted. Token Ring LANS are deterministic - but ethernet LANS are non deterministic.