SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
Search
Test your basic knowledge |
CCNA Network Fundamentals Vocab
Start Test
Study First
Subjects
:
cisco
,
it-skills
,
ccna
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. The layer 2 pdu that has been encoded by a data link layer protocol for digital transmission. Some different kinds of frames are ethernet frames and PPP frames.
slot time
multicast client
frame
registered ports
2. A network device that has an IPv4 address assigned to it to communication over a network.
MAC table
host
media-dependent interface crossover
attenuation
3. A service or a program to look up information in the DNS
nslookup
router
router protocol
broadcast domain
4. Unique addresses that are public domain addresses.
globally scoped addresses
well known ports
asynchronous
media-dependent interface (MDI)
5. A source of information that is highly reliable and known for its accuracy
Organizational Unique Identifier
classful addressing
authoritative
destination IP address
6. The time that passes while some event occurs. In networking - latency typically refers to the time that occurs between when something is sent in a network until it is received by another device.
latency
Organizational Unique Identifier
collision domain
asynchronous
7. A removable component that has memory space for storage. Used on the router or switch for storing the compressed operating system image.
layered model
flash
end device
unshieled twisted-pair
8. In IP subnetting - this refers to the portion of a set of IP addresses whose value must be identical for the addresses to be in the same subnet.
end device
most significant bit
public address
prefix length
9. MDIX is an alternative operation of ethernet ports on a hub. In this mode - the mapping of the wire pairs used in the hub port is in a crossover configuration. This allows you to use a straight-through cable to interconnect the hub to another hub.
packet
media-dependent interface crossover
source
slash format
10. Used by tcp or udp - with values between 0 and 1023 - these ports are allocated by high-privilege processes. They are used so that all clients know the correct port number to connect to.
ACK
loopback
Requests for Comments
well known ports
11. Somtimes called place-value notation - this is a numeral system in which each position is related to the next by a constant multiplier - a common ration - called the base or radix of that numeral system.
proxy arp
bridge table
positional notation
nonreturn to zero
12. Define in RFC 1918 - an IP address that does not have to be globally unique because the address exists inside packets only when the packets are inside a single private IP internetwork. Private IP addresses are popularly used in most company today - w
host group
server
source IP address
prviate address
13. An IPv4 multicast address that is restricted to a local group or organization.
cyclic redundancy check
limited scope address
AND
cache
14. Communication that uses a common clocking signal. In most synchronous communicatino - one of the communicating devices generates a clock signal into the circuit. Additional timing information is not required in the header.
synchronous
session
code gropu
multiplexing
15. The connection of devices on a common media. Sometimes a physical network is also referred to as a network segment.
physical network
best effort
slot time
pinout
16. A process by which an end device - after it receives data over some transmission medium - examines the headers and trailers at each successive higher layer - eventually handing the data to the correct application. Sometimes called de-encapsulation.
single point of failure
decapsulation
post office protocol
subnet mask
17. Additional data that is provided with a command to provide information used by the execution of the command. IOS command arguments are entered at the CLI after the command
broadcast
encryption
kilobits per second
argument
18. A group of 8 binary bits. It is similar to - but not the same as - a byte. One Application in computer network is to use octets to divide IPv4 addresses into four components
Internet control message protocol
octet
low-order bit
logical network
19. The networking layers whose processes are not affected by the media being used. In ethernet - these are all the layers from the LLC sublayer of data link upward.
Logical link control
shielded twisted pair cable
dynamic or private ports
media independent
20. A rectangular cabling connector with eight pins - often used with ethernet cables.
RJ-45
Internet Assigned Numbers Authority
Requests for Comments
standards
21. A device on a network that serves as an access point to other networks. A default gateway is used by a host to forward IP packets that have destination addresses outside the local subnet. A router interface typically is used as the default gateway. W
encode
default gateway
International Organization for Standardization
fiber-optic cable
22. A group that receives a multicast transmission. The members of a multicast group have the same mulitcast IP addressing to receive the same transmission.
ARP table
quality of service
multicast group
protocol suite
23. The passage of a data packet between two network nodes.
hop
default gateway
bridge
router
24. A part of the ethernet frame that fills in the data field to ensure that the data field meets the minimum size requirement of 46 bytes.
Logical link control
bandwidth
Pad
frame
25. A company that helps create the Internet by providing connectivity to enterprises and individuals - as well as interconnecting to other ISPs to create connectivity to all other ISPs.
control data
network address
switch
Internet service provider
26. A protocol used between routers so that they can learn routes to add to their routing tables.
router protocol
instant messaging
segmentation
store and forward
27. Ethernet that transmits data at 1 -000 -000 -000 one billion bits per second.
multiplexing
physical media
gigabit ethernet
encode
28. The cabling and connectors used to interconnect the network devices.
physical media
goodput
collision
prviate address
29. Using values between 1024 and 49 -151 these numbers are equivalent to well-known ports in concept - but they are specifically used for nonprivileged application processes.
cloud
association identity AID
registered ports
router
30. The extent of a certain item. For example - an address scope is also known as a range of addresses from beginning of the range to the end.
virtual terminal line
destination IP address
scope
public address
31. The minimum time a NIC or interface can take to send an entire frame. Slot time - then - implies a minimum frame size.
slot time
dynamic or private ports
runt frame
gateway
32. Any communication in which the sender and receiver do not prearrange for communications to occur
AND
media access control
distributed
connectionless
33. The actual data transfer rate between two computers at some point in time. Throughput is impacted by the slowest-speed link used to send data between the two computers - as well as myriad variables that might change during the course of a day.
physical network
throuhpu
media access control
channel
34. The limited CLI mode where the commands available to the user are a subset of those available at the privileged level. In general - use the user Exec commands to temporarily change terminal settings - perform basic tests and list system information.
user executive mode
pulse amplitude modulation
data communications equipment
data termianl equipment
35. In TCP - the process of taking a large chunk of data and breaking it into small enough pieces to fit within a TCP segment without breaking any rules about the maximum amount of data allowed in a segment.
round-trip time
Internet service provider
bit
segmentation
36. A method of internal processing by LAN switches. The switch must receive the entire frame before it sends the first bit of the frame. Store and forward switch is the method used by cisco switches.
query
decapsulation
slash format
store and forward
37. An IP address that has been registered with IANA or one of its member agencies - which guarantees that the address is globally unique. Globally unique public IP addresses can be used for packets sent through the Internet.
asynchronous
ARP cache
smtp
public address
38. In LAN switches a reference to cases in which a frame is forwarded - or switche - when the incoming and outgoing interfaces use the same speed. It is the opposite of asymmetric switching.
manchester encoding
symmetric switching
RST
download
39. A signal on a medium used to support the transmission of data. Data is carried over the medium by modulation.
carrier
token passing
delimiter
ACK
40. The portion of a binary number that carries the most weight - the one written farthest to the left. High-order bits are the 1s in the network mask.
low-order bit
high-order bit
Time to live
fiber optics
41. A numbering system characterized by 1 and 0
directly connected network
download
binary
Packet Tracer
42. The first half of a MAC address. Manufactures must ensure that the value of the OUI has been registered with the IEEE. This value identifies the manufacturer of any Ethernet NIC or interface.
multiplexing
Organizational Unique Identifier
single point of failure
physical media
43. A network topology characterized by a central location connected to multiple hubs. In an extended star - these interconnected hubs may be connected to more hubs. It is essentially a hierarchical topology but typically is drawn with the central site i
synchronous
MAC table
electromagnetic interface
extended star
44. A technique used to attack an ethernet network by sending fake ARP messages to an ethernet LAN. These frames contain false MAC addresses that confuse network devices - such as switches. As a result - frames intended for one node can be mistakenly sen
ARP poisoning
default route
peer
router
45. Resources used to manage or operate the network. Overhead consumes bandwidth and reduces the amount of application data that can be transported across the network.
smtp
delimiter
keyword
overhead
46. A member of a multicast group. Every multicast client in each group has the same IP address. Multicast addresses begin with 224... and end with 239...
multicast client
node
directed broadcast
fault tolerance
47. A logical storage in a host's RAM to store arp entries.
ARP table
control data
goodput
domain name
48. A delineation of networking protocols and standards into different categories - called layers - along with definitions of which sets of standards and protocols need to be implemented to create products that can be used to create a working network
low-order bit
Internet Assigned Numbers Authority
protocol suite
server
49. A general type of cable - with the cable holding twisted pairs of copper wires and the cable itself having little shielding.
unshieled twisted-pair
network baseline
IP
redundancy
50. A form of transmission where one device transmits to all devices within the network or on another network
broadcast
carrier
data termianl equipment
flash