Test your basic knowledge |

CCNA Network Fundamentals Vocab

Subjects : cisco, it-skills, ccna
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. The layer 3 address to which the data is going.






2. A network model defined by the IETF that has been implemented on most computers and network device in the world.






3. A generic term from OSI that refers to the data - headers - and trailers about which a particular network layer is concerned.






4. Any combination of hardware device and/or software application designed to protect network devices from outside network users and/or malicious applications and files.






5. The reference to text based logical interfaces on an ios device. These are accesses using telnet or ssh to perform administrative tasks. VTY lines are also called virtual type terminal.






6. A type of hash function that is used to produce a small - fixed size checksum of a block of data - such as a packet or a computer file. A CRC is computed and appended before transmission or storage - and verified afterward by the recipient to confirm






7. A type of network cabling that includes twisted-pair wires - with shielding around each pair of wires - as well as another shield around all wires in the cable.






8. The connection of devices on a common media. Sometimes a physical network is also referred to as a network segment.






9. International standardization program created by ISO and ITU-T to develop standards for data networking that facilitate multivendor equipment interoperability






10. The dividing of IP datagrams to meet the MTU requirement of a layer 2 protocol.






11. Interface by magnetic signals caused by the flow of electricity. EMI can cause reduced data integrity and increased error rates on transmission channels. The physics of this process are that electrical current creates magnetic fields - which in turn






12. In IP subnetting - this refers to the portion of a set of IP addresses whose value must be identical for the addresses to be in the same subnet.






13. Routing that adjusts automatically to network topology or traffic changes.






14. The origin of the PDU. This can be a process a host or a node - depending on the layer to which you are reffering.






15. TCP or UDP ports that range from 49152 to 65535 and are not used by any defined server applications.






16. Unencrypted password used to allow access to privledge EXEC mode from IOS user EXEC mode.






17. An access method used with some LAN technologies by which devices access the media in a controlled manner. This access to the LAN is managed using a small frame called a toke. A device can send only when it has claimed the use of the token.






18. A member of a multicast group. Every multicast client in each group has the same IP address. Multicast addresses begin with 224... and end with 239...






19. A list of router holds in memory for the purpose of deciding how to forward packets.






20. The devices and connections of a communications network that comprise the network end of the user to network interface. The DCE provides a physical connection to the network - forwards traffic - and provides a clocking signal used to synchronize data






21. A group of devices associated by the arrangement of a hierarchial addressing scheme. Devices in the same logical network that share a common network portion of their Layer 3 addresses.






22. Random-access memory that does not lose its contents when the computer is shut down






23. From the priviledged mode - you can enter the device's global caonfiguration mode. From global configuration mode - you can configure global parameters or enter other configuration submodes such as interface - router and line configuration submodes.






24. A network scanning technique used to identify which host IP addresses are operational.






25. The spreading of light signal caused by light signals traveling at different speeds through a fiber.






26. A rectangular cabling connector with eight pins - often used with ethernet cables.






27. Defines which wires in a cable should connect to each pin on the connectors on both ends of a cable. For example - a UTP cable used for ethernet - used for a straight-through cable pinout - connects the wire at pin 1 on one end with the pin 1 on the






28. The IPv4 address block 192.0.2.0 to 192.0.2.255 that is set aside for teaching and learning purposes. These addresses can be used in documentation and network examples.






29. A 1-bit flag in the tcp header that indicates the acknowledgment field is valid.






30. The method of for finding a host's hardware address from its IPv4 network layer address.






31. Using values between 1024 and 49 -151 these numbers are equivalent to well-known ports in concept - but they are specifically used for nonprivileged application processes.






32. An IPv4 multicast address that is restricted to a local group or organization






33. The process by which a device adds networking heads and trailers to data from an application for the eventual transmission of the data onto a transmission medium.






34. A series of documents and memoranda encompassing new research - innovations and methodologies applicable to Internet technologies. RFCs are a reference for how technologies should work.






35. Additional data that is provided with a command to provide information used by the execution of the command. IOS command arguments are entered at the CLI after the command






36. A method of computer processing in which different parts of a program run simultaneously on two or more computers that are communicating with each other over a network






37. A dotted decimal number that helps identify the structure of IP addresses. The mask represents the network and subnet parts of related IP addresses with binary 1s and the host part of related IP addresses with binary 0s






38. A time period between ethernet frames that allows fairness with the CSMA/CD algorithm. Without a space between frames in other words - without some time with no frames being sent a NIC might always listen for silence - never hear silence and therefor






39. Network protocols or technologies that do not use the acknowledgment system to guarantee reliable delivery of information






40. Organizations that are responsible for the allocation and registration of Internet number resources within a particular region of the world. These registries include the American Registry for Internet Number for North America; RIPE network coordinati






41. A written specification that defines what tasks a service or device should perform. Each protocol defines messages - often in the form of headers - plus the rules and processes by which these messages are used to achieve some stated purpose.






42. Also known as boolean algebra. These consist of the AND OR and IF operations






43. Radio frequencies that creat noise that interferes with information being transmitted across unshielded copper cabling.






44. A request for information. Queries are answered with replies.






45. In ethernet - the results of two nodes transmitting simlutaneously. The signals from each device are damaged when they combine on the media






46. An entry in an IP routing table that was created because a network engineer entered the routing information into the router's configuration.






47. When used generically - this term refers to end-user data along with networking headers and trailers that are transmitted through a network. When used specifically - it is end-user data - along with the network or Internet layer headers and any highe






48. A part of a computer network that every device communicates with using the same physical medium. Network segments are extended by hubs or repeaters.






49. Ethernet that transmits data at 1 -000 -000 -000 one billion bits per second.






50. Used in the CLI following the command. Keywords are parameters that are used with the command from a set of predefined values.