Test your basic knowledge |

CCNA Network Fundamentals Vocab

Subjects : cisco, it-skills, ccna
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. DNS data records. Their precise format is defined in RFC 1035. The most important fields in a resource record are Name - class - type and data.






2. The cabling and connectors used to interconnect the network devices.






3. Unencrypted password used to allow access to privledge EXEC mode from IOS user EXEC mode.






4. Any combination of hardware device and/or software application designed to protect network devices from outside network users and/or malicious applications and files.






5. An ethernet frame that is less than 64 bytes in size. Runts are caused by collisions and are also know as collision fragments






6. The loss of communication signal on the media. This loss is due to degradation of the energy wave over time.






7. The ability of a protocol. system or component to be modified to fit a new need.






8. A 1-bit flag in the TCP header that is used to request that a connection be re-established.






9. MDIX is an alternative operation of ethernet ports on a hub. In this mode - the mapping of the wire pairs used in the hub port is in a crossover configuration. This allows you to use a straight-through cable to interconnect the hub to another hub.






10. A network scanning technique used to identify which host IP addresses are operational.






11. The time required to send a single bit over some transmission medium. The time can be calculated at 1/speed - where speed is the number of bits per second sent over the medium






12. A technique used to attack an ethernet network by sending fake ARP messages to an ethernet LAN. These frames contain false MAC addresses that confuse network devices - such as switches. As a result - frames intended for one node can be mistakenly sen






13. The optical or electrical impulse on a physical medium for purposes of communication.






14. A generic term from OSI that refers to the data - headers - and trailers about which a particular network layer is concerned.






15. The process by which a router receives an incoming frame - discards the ata link header and trailer - makes a forwarding decision based on the destination IP address - adds a new data-link header and trailer based on the outgoing interface and forwar






16. A plan - design or program of action to be followed. Sometimes an addressing plan is called an addressing SCHEME.






17. An addressing scheme in which a network is partitioned into sections - with the section identifier forming one part of each destination's address and the destination identifier forming another






18. A type of network cabling that includes twisted-pair wires - with shielding around each pair of wires - as well as another shield around all wires in the cable.






19. A communication path over a medium used to transport information from a sender to a receiver. Multiple channels can be multiplexed over a single cable






20. An application protocol typically not used by end users. Instead - it is used by the network management software and networking devices to allow a network engineer to monitor and troubleshoot network problems.






21. Computer hardware - typically used for LANS - that allows the computer to connect to some network cable. The NIC can then send and receive data over the cable at the direction of the computer.






22. An international standards body that defines many networking standards. Also - the standards body that created the OSI model.






23. The standards body responsible for the development and approval of TCP/IP standards






24. Unique addresses that are public domain addresses.






25. The lower of the two sublayers of the IEEE standard for ethernet. It is also the name of that sublayer






26. Used by tcp or udp - with values between 0 and 1023 - these ports are allocated by high-privilege processes. They are used so that all clients know the correct port number to connect to.






27. Real-time communication between two or more people through text. The text is conveyed through computers connected over a network such as the internet. files can also be transferred through the IM program to share files.






28. An IP address that has been registered with IANA or one of its member agencies - which guarantees that the address is globally unique. Globally unique public IP addresses can be used for packets sent through the Internet.






29. A field in the IP header that prevents a packet form indefinitely looping around an IP internetwork. Router decrements the TTL field each time they forward a packet - and if they decrement the TTL to 0 - the router discards the packet - which prevent






30. The networking layers whose processes are not affected by the media being used. In ethernet - these are all the layers from the LLC sublayer of data link upward.






31. 1.collection of computers - printers - routers - switches - and other devices that can communication with each other over some transmission medium. 2. command that assgins a NIC based address to which the router is directly connected.






32. The table used by a switch that associates MAC addresses with the outgoing port. A general term for the table that a LAN bridge uses for its forwarding/filtering decisions. The table holds a list of MAC addresses and the port out which the bridge sho






33. The largest IP packet size allowed to be sent out a particular interface. Ethernet interfaces default to an MTU of 1500 because the data field of an Ethernet frame should be limited to 1500 bytes - and the IP packet sits inside the ethernet frame's d






34. A type of hash function that is used to produce a small - fixed size checksum of a block of data - such as a packet or a computer file. A CRC is computed and appended before transmission or storage - and verified afterward by the recipient to confirm






35. Interface by magnetic signals caused by the flow of electricity. EMI can cause reduced data integrity and increased error rates on transmission channels. The physics of this process are that electrical current creates magnetic fields - which in turn






36. A device that connects multiple network segments at the data link layer of the OSI model. Bridges were the predecessor to LAN switches.






37. A 1-bit flag in the tcp header that indicates the acknowledgment field is valid.






38. A protocol that allows a computer to retrieve email from a server.






39. An entry in an IP routing table that was created because a network engineer entered the routing information into the router's configuration.






40. A physical or a logical area in a LAN where the signals sent by the interfaces ma be subject o being combined. Within a collision domain - if a device sends a frame on a network segment - every other device on that same segment will receive that fram






41. IPv4 address of a network host. When talking about host addresses - they are the network layer addresses.






42. Part of a company's intranet that is extended to users outside the company






43. A 1-bit field in the TCP header that is used by a device that wants to terminate its session with the other device. This is done by inserting the FIN flag in the flag field found in the TCP segment






44. A protocol used between routers so that they can learn routes to add to their routing tables.






45. A routing feature in which frames in an interface output queue are prioritized based on various characteristics such as packet size and interface type.






46. Organizations that are responsible for the allocation and registration of Internet number resources within a particular region of the world. These registries include the American Registry for Internet Number for North America; RIPE network coordinati






47. A group defined by a class D address (multicast - ranging from 224.0.0.0 to 239.255.255.255) - whereupon hosts can pertain to multicast groups. Hosts that have the same multicast address are part of the same host group.






48. A name - as defined by DNS that uniquely identifies a computer in the internet. DNS servers can then respond to the DNS requests by supplying the IP address that is used by the computer that has a particular domain name. This term also refers to the






49. A network device that has an IPv4 address assigned to it to communication over a network.






50. The extent of a certain item. For example - an address scope is also known as a range of addresses from beginning of the range to the end.