Test your basic knowledge |

CCNA Network Fundamentals Vocab

Subjects : cisco, it-skills, ccna
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A field in the IP header that prevents a packet form indefinitely looping around an IP internetwork. Router decrements the TTL field each time they forward a packet - and if they decrement the TTL to 0 - the router discards the packet - which prevent






2. A protocol that allows a computer to retrieve email from a server.






3. A dotted decimal number defined by the IPv4 protocol to represent a network or subnet. It represents the network that hosts reside in. Also called a network number or network ID.






4. Network protocols or technologies that do not use the acknowledgment system to guarantee reliable delivery of information






5. An ethernet frame that is less than 64 bytes in size. Runts are caused by collisions and are also know as collision fragments






6. Communication that uses a common clocking signal. In most synchronous communicatino - one of the communicating devices generates a clock signal into the circuit. Additional timing information is not required in the header.






7. The normal operation of ethernet ports on a hub. In this mode - the mapping of the wire pairs in the hub port is in a normal configuration. Some hubs provide a media-dependent interface/media-dependent interface - crossover switch. This switch is usu






8. A written specification that defines what tasks a service or device should perform. Each protocol defines messages - often in the form of headers - plus the rules and processes by which these messages are used to achieve some stated purpose.






9. The network that combines enterprise networks - individual users - and ISPs into a single global IP network.






10. An IPv4 multicast address that is restricted to a local group or organization.






11. A data link layer address - for example a MAC address






12. A plan - design or program of action to be followed. Sometimes an addressing plan is called an addressing SCHEME.






13. A source of information that is highly reliable and known for its accuracy






14. Application-level throughput. It is the number of useful bits per unit of time from a certain source address to a certain destination - excluding protocol overhead and excluding retransmitted data packets.






15. Data link layer term describing a device connected to a network.






16. The header defined by the IP. Used to create IP packets by encapsulating data supplied by higher-layer protocol (such as TCP) behind an IP header.






17. The IPv4 address block 192.0.2.0 to 192.0.2.255 that is set aside for teaching and learning purposes. These addresses can be used in documentation and network examples.






18. An IPv4 multicast address that is restricted to a local group or organization






19. The minimum time a NIC or interface can take to send an entire frame. Slot time - then - implies a minimum frame size.






20. In the telnet application - commands are always introduced by a character with the decimal code 255 - known as the Interpret as Command character.






21. A form of transmission where one device transmits to all devices within the network or on another network






22. A group that receives a multicast transmission. The members of a multicast group have the same mulitcast IP addressing to receive the same transmission.






23. The time that passes while some event occurs. In networking - latency typically refers to the time that occurs between when something is sent in a network until it is received by another device.






24. A group of devices associated by the arrangement of a hierarchial addressing scheme. Devices in the same logical network that share a common network portion of their Layer 3 addresses.






25. A group of IP addresses that have the same value in the first part of the IP addresses - for the purpose of allowing routing to identify the group by the inital part of the addresses. IP addresses in the same subnet typically sit on the same network






26. A model that consists of various layers that enable the development and explanation of technology to be done on a modular basis. This allows interoperability among different technologies among the different layers.






27. An application level network protocl mainly applied to shared access to files - printers - serial ports - and miscellaneous communications between nodes on a network.






28. The retransmission delay used with CSMA/CD when a collision occurs. The algorithm forces each sender that detected the collisions to delay a random amount of time before attempting to retransmit.






29. A unit of measurement of the number of times 1000 bits can be transmitted in 1 second. 1 kbps = 1000bps






30. A method of internal processing by LAN switches. The switch must receive the entire frame before it sends the first bit of the frame. Store and forward switch is the method used by cisco switches.






31. A logical storage in the host's RAM to store ARP entries






32. In a shared media ethernet network - a signal generated by the transmitting devices that detects the collision. The jam signal continue to transmit for a specified period to ensure that all devices on the network detect the collision. The jame signal






33. Communication where the sender and receiver must prearrange for communications to occur; otherwise - the communication fails.






34. The reference to text based logical interfaces on an ios device. These are accesses using telnet or ssh to perform administrative tasks. VTY lines are also called virtual type terminal.






35. Translation RFC 1918 addresses to public domain addresses. Because RFC 1918 addresses are not routerd on the Internet - hosts accessing the Internet must use public domain addresses.






36. In networking - a symbol used when drawing network diagrams that represent a part of the network whose details can be ignored for the purposes of the diagram.






37. A network architecture designed to eliminate network downtime cause by a single point of failure.






38. The standards body responsible for the development and approval of TCP/IP standards






39. A signal on a medium used to support the transmission of data. Data is carried over the medium by modulation.






40. The learning of source addresses on incoming frames and adding them to the bridging table. After the table has been completed and when a frame is received on one of the bridge's interfaces - the bridge looks up the frame's destination address in its






41. A dotted decimal number that helps identify the structure of IP addresses. The mask represents the network and subnet parts of related IP addresses with binary 1s and the host part of related IP addresses with binary 0s






42. The lower of the two sublayers of the IEEE standard for ethernet. It is also the name of that sublayer






43. The largest IP packet size allowed to be sent out a particular interface. Ethernet interfaces default to an MTU of 1500 because the data field of an Ethernet frame should be limited to 1500 bytes - and the IP packet sits inside the ethernet frame's d






44. A name - as defined by DNS that uniquely identifies a computer in the internet. DNS servers can then respond to the DNS requests by supplying the IP address that is used by the computer that has a particular domain name. This term also refers to the






45. The process by which a router receives an incoming frame - discards the ata link header and trailer - makes a forwarding decision based on the destination IP address - adds a new data-link header and trailer based on the outgoing interface and forwar






46. The spreading of light signal caused by light signals traveling at different speeds through a fiber.






47. Any combination of hardware device and/or software application designed to protect network devices from outside network users and/or malicious applications and files.






48. A map of the devices on a network representing how the devices communcate with each other.






49. An entry in an IP routing table that was created because a network engineer entered the routing information into the router's configuration.






50. A control mechanism that can provide different priorities to different users or data flows - or guarantee a certain level of performance to a data flow in accordance with requests from the application program.