Test your basic knowledge |

CCNA Network Fundamentals Vocab

Subjects : cisco, it-skills, ccna
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A request for information. Queries are answered with replies.






2. A company that helps create the Internet by providing connectivity to enterprises and individuals - as well as interconnecting to other ISPs to create connectivity to all other ISPs.






3. A network of computers that behave as if they are connected to the same network segment - even through they might be physically located on different segments of a LAN. VLANs are configured through software on the switch and router.






4. Communication that uses a common clocking signal. In most synchronous communicatino - one of the communicating devices generates a clock signal into the circuit. Additional timing information is not required in the header.






5. A model that consists of various layers that enable the development and explanation of technology to be done on a modular basis. This allows interoperability among different technologies among the different layers.






6. The ability of a protocol. system or component to be modified to fit a new need.






7. The first half of a MAC address. Manufactures must ensure that the value of the OUI has been registered with the IEEE. This value identifies the manufacturer of any Ethernet NIC or interface.






8. A network scanning technique used to identify which host IP addresses are operational.






9. This field of a frame signals the beginning or end of a frame.






10. The process of obscuring information to make it unreadable without special knowledge - somtimes referred to as scrambling. The process takes the data to be encrypted and applies a mathematical formula to it along with a secret number. The resulting v






11. The connection of devices on a common media. Sometimes a physical network is also referred to as a network segment.






12. The IP address of the originating host that is placed into the IP packet header.






13. A 1-bit field in the TCP header that is used by a device that wants to terminate its session with the other device. This is done by inserting the FIN flag in the flag field found in the TCP segment






14. A group of 8 binary bits. It is similar to - but not the same as - a byte. One Application in computer network is to use octets to divide IPv4 addresses into four components






15. The networking layers whose processes are not affected by the media being used. In ethernet - these are all the layers from the LLC sublayer of data link upward.






16. The extent of a certain item. For example - an address scope is also known as a range of addresses from beginning of the range to the end.






17. Communication that allows receipt and transmission simultaneously. A station can transmit and receive at the same time. There are no collisions with full-duplex ethernet transmision.






18. A common term for 10base5 ethernet - referring to the fact that 10base5 cabling is thicker than the coaxial cabling used for 10base2.






19. The IPv4 multicast addresses 224.0.0.0 to 224.0.0.255. These addresses are to be used for multicast groups on a local network. Packets to these destinations are always transmitted with a TTTL value of 1






20. The normal operation of ethernet ports on a hub. In this mode - the mapping of the wire pairs in the hub port is in a normal configuration. Some hubs provide a media-dependent interface/media-dependent interface - crossover switch. This switch is usu






21. The layer 3 address to which the data is going.






22. The process by which a device adds networking heads and trailers to data from an application for the eventual transmission of the data onto a transmission medium.






23. As part of the TCP/IP internet layer - ICMP defines protocol messages used to inform network engineeres of how well an internetwork is working. For example - the ping command sends ICMP messages to determine whether a host can send packets ot another






24. A source of information that is highly reliable and known for its accuracy






25. A method of computer processing in which different parts of a program run simultaneously on two or more computers that are communicating with each other over a network






26. A 32-bit number - written in dotted decimal notation - used by the IP to uniquely identify an interface connected to an IP network. It is also used as a destination address in an IP header to allow routing - and as a source address to allow a compute






27. An IPv4 address in the range of 169.254.1.0 to 169.254.254.255. Communication using these addresses is used with a ttl of 1 and limited to the local network






28. A network device - typically connected to a range of LAN and WAN interfaces - that forwards packets based on their destination IP addresses.






29. A device on a network that serves as an access point to other networks. A default gateway is used by a host to forward IP packets that have destination addresses outside the local subnet. A router interface typically is used as the default gateway. W






30. TCP or UDP ports that range from 49152 to 65535 and are not used by any defined server applications.






31. A logical connection between devices in which the frames are passed between the devices. Virtual circuits are independent of the physical structure and may be established through multiple physical devices.






32. The management of data flow between devices in a network. It is used to avoid too much data arriving before a device can handle it - causing data overflow.






33. In a web browser - an application the browser uses - inside the browser window to display some types of content. For example - a browser typically uses a plug-in to display video.






34. A process used by a switch or bridge to forward broadcasts and unknown destination unicasts. The bridge/switch forwards these frames out all ports except the port on which the frame was received.






35. A notification sent from one network device to another to confirm that some event has occured.






36. The portion of a binary number that carries the most weight - the one written farthest to the left. High-order bits are the 1s in the network mask.






37. Using values between 1024 and 49 -151 these numbers are equivalent to well-known ports in concept - but they are specifically used for nonprivileged application processes.






38. An encoding scheme 4B/5B uses 5-bit symbols and codes to represent 4 bits of data. 4B/5B is used in 100Base-tx ethernet.






39. Interface by magnetic signals caused by the flow of electricity. EMI can cause reduced data integrity and increased error rates on transmission channels. The physics of this process are that electrical current creates magnetic fields - which in turn






40. An access method used with some LAN technologies by which devices access the media in a controlled manner. This access to the LAN is managed using a small frame called a toke. A device can send only when it has claimed the use of the token.






41. Real-time communication between two or more people through text. The text is conveyed through computers connected over a network such as the internet. files can also be transferred through the IM program to share files.






42. As filed in the TCP header that is set in a sent segment - signifies the maximum amount of unacknowledged data the host is willing to receive before the other sending host must wait for an acknowledgment.






43. Communication where the sender and receiver must prearrange for communications to occur; otherwise - the communication fails.






44. An IP address that has been registered with IANA or one of its member agencies - which guarantees that the address is globally unique. Globally unique public IP addresses can be used for packets sent through the Internet.






45. A corporate system such as a website that is explicitly used by internal employees. Can be assessed internally or remotely






46. A broadcast that is sent to a specific network or series of networks.






47. A device such as a desktop or mobile device that is used by an end user.






48. Network protocols or technologies that do not use the acknowledgment system to guarantee reliable delivery of information






49. An international - nonprofit organization for the advancement of technology related to eletricity. IEEE maintains the standards defining many LAN protocols.






50. MDIX is an alternative operation of ethernet ports on a hub. In this mode - the mapping of the wire pairs used in the hub port is in a crossover configuration. This allows you to use a straight-through cable to interconnect the hub to another hub.







Sorry!:) No result found.

Can you answer 50 questions in 15 minutes?


Let me suggest you:



Major Subjects



Tests & Exams


AP
CLEP
DSST
GRE
SAT
GMAT

Most popular tests