SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CCNA Network Fundamentals Vocab
Start Test
Study First
Subjects
:
cisco
,
it-skills
,
ccna
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. The IP address of the originating host that is placed into the IP packet header.
layered model
runt frame
source IP address
plug-in
2. Defines the commands - headers and processes by which web server and web browsers transfer files.
frame
protocol suite
hypertext transfer protocol
radix
3. In a shared media ethernet network - a signal generated by the transmitting devices that detects the collision. The jam signal continue to transmit for a specified period to ensure that all devices on the network detect the collision. The jame signal
connectionless
packet
jam signal
interframe spacing
4. Communication that uses a common clocking signal. In most synchronous communicatino - one of the communicating devices generates a clock signal into the circuit. Additional timing information is not required in the header.
control data
broadcast address
subnet
synchronous
5. A protocol used to dynamically assign IP configurations to hosts. The services defined by the protocol are used to request and assign an IP address - default gateway - and DNS server address to a network host.
URG
dynamic host configuration protocol
filtering
smtp
6. The management of data flow between devices in a network. It is used to avoid too much data arriving before a device can handle it - causing data overflow.
channel
flow control
dynamic host configuration protocol
connectionless
7. In the telnet application - commands are always introduced by a character with the decimal code 255 - known as the Interpret as Command character.
download
locally administered address
router
Interpret as command
8. A protocol for synchronizing the clocks of computer systems over packet-switch data networks. NTP uses UDP port 123 as its transport layer.
classful addressing
high-order bit
administratively scoped address
Network time protocol
9. A rectangular cabling connector with eight pins - often used with ethernet cables.
FIN
code gropu
download
RJ-45
10. A field in the IP header that prevents a packet form indefinitely looping around an IP internetwork. Router decrements the TTL field each time they forward a packet - and if they decrement the TTL to 0 - the router discards the packet - which prevent
octet
Time to live
channel
acknowledgment
11. Program used to download and send email. Email clients use POP3 to receive emails and use SMTP to send emails. Also called an email client
Network time protocol
Mail user agent
Requests for Comments
low-order bit
12. A service or a program to look up information in the DNS
interframe spacing
forwarding
nslookup
bandwidth
13. A device that connects end devices to the network or interconnects different networks. A router is an example of an intermediary device.
intermediary device
priority queing
window size
bit
14. In ethernet - the process performed by a bridge or switch when it decides that it should not forward a frame out another port
bridge table
filtering
intermediary device
noise
15. The networking layers whose processes are not affected by the media being used. In ethernet - these are all the layers from the LLC sublayer of data link upward.
Time to live
media independent
PSH
slot time
16. The IPv4 address block 192.0.2.0 to 192.0.2.255 that is set aside for teaching and learning purposes. These addresses can be used in documentation and network examples.
test-net address
full duplex
session
symmetric switching
17. A request for information. Queries are answered with replies.
query
pinout
bridge
limited broadcast
18. The bit position in a binary number having the greatest value. The most significant bit is sometime referred to as the leftmost bit.
hypertext transfer protocol
most significant bit
bridging
dispersion
19. In ethernet a layer 2 device that receives an electrical signal in one port - interprets the bits - and makes a filtering or forwarding decision about the frame. If it forward - it sends a regenerated signal. Switches typically have many physical por
switch
Organizational Unique Identifier
acknowledgment
redundancy
20. A map of the devices on a network representing how the devices communcate with each other.
Optical time domain reflectometer
control data
globally scoped addresses
logical topology
21. A name - as defined by DNS that uniquely identifies a computer in the internet. DNS servers can then respond to the DNS requests by supplying the IP address that is used by the computer that has a particular domain name. This term also refers to the
switch
backoff algorithm
domain name
IP header
22. A combination of many IP subnets and networks - as created by building a network using routers. The term internwork is used to avoid confusion with the term network - because an internetwork can include several IP networks.
electromagnetic interface
carrier sense multiple access (CSMA)
internetwork
fast ethernet
23. Normally - a relatively general term that refers to dfifferent kinds of networking devices. Historically - when routers were created - they were called gateways
window size
4b/5b
hub
gateway
24. Application-level throughput. It is the number of useful bits per unit of time from a certain source address to a certain destination - excluding protocol overhead and excluding retransmitted data packets.
cache
goodput
host address
flooding
25. A routing feature in which frames in an interface output queue are prioritized based on various characteristics such as packet size and interface type.
quality of service
bit
priority queing
multicast group
26. A part of the ethernet frame that fills in the data field to ensure that the data field meets the minimum size requirement of 46 bytes.
channel
dotted decimal
subnet mask
Pad
27. In a web browser - an application the browser uses - inside the browser window to display some types of content. For example - a browser typically uses a plug-in to display video.
Time to live
bridge table
extended star
plug-in
28. A communication path over a medium used to transport information from a sender to a receiver. Multiple channels can be multiplexed over a single cable
transparent bridging
gateway
channel
scalability
29. Physical medium that uses glass or plastic threads to transmit data. A fiber-optic cable consists of a bundle of these threads - each of which is capable of transmitting data into light waves.
half duplex
logical topology
fiber-optic cable
ethernet PHY
30. A process where multiple digital data streams are combined into one signal.
multiplexing
gateway
overhead
network segment
31. The MAC algorithm used by ethernet devices in a shared media. The protocol requires a node wishing to transmit to listen for a carrier signal before trying to send. If a carrier is sensed - the node waits for transmission in progress to finish before
carrier sense multiple access collision detect (CSMA/CD)
Internet service provider
most significant bit
bridge
32. The first half of a MAC address. Manufactures must ensure that the value of the OUI has been registered with the IEEE. This value identifies the manufacturer of any Ethernet NIC or interface.
virtual local area network
post office protocol
full duplex
Organizational Unique Identifier
33. An address used to represent a transmission from one device to all devices. In ethernet - the sepcial ethernet address FFFF.FFFF.FFFF is used as a destination MAC address to cause a frame to be sent to all devices on an ethernet LAN. In IPV4 - each s
broadcast address
source
store and forward
flow control
34. Routing table entry that is used to direct frames for which a next hop is not explicitly listed in the routing table. This route is used to forward a packet when no other known route exists for a give packet's destination address.
latency
server
classless addressing
default route
35. Communication that only allows one station to receive while the other station is transmitting
half duplex
multiplexing
collaborative
quality of service
36. A MAC address that can be configured on a device. The LAA can be used in place of the BIA . This means that you can replace a NIC or use a substitute device without changing the address used by the network to access the station.
goodput
locally administered address
console port
scope
37. The physical interface transceivers. It deals with Layer 1 (the physical layer - hence the PHY) of ethernet.
multicast group
dotted decimal
ethernet PHY
cyclic redundancy check
38. Real-time communication between two or more people through text. The text is conveyed through computers connected over a network such as the internet. files can also be transferred through the IM program to share files.
protocol suite
Internet Assigned Numbers Authority
default gateway
instant messaging
39. An application level network protocl mainly applied to shared access to files - printers - serial ports - and miscellaneous communications between nodes on a network.
latency
store and forward
locally administered address
server message block
40. Routing that adjusts automatically to network topology or traffic changes.
collaborative
query
Organizational Unique Identifier
dynamic routing
41. Ethernet that transmits data at 1 -000 -000 -000 one billion bits per second.
default route
instant messaging
noise
gigabit ethernet
42. A dotted decimal number that helps identify the structure of IP addresses. The mask represents the network and subnet parts of related IP addresses with binary 1s and the host part of related IP addresses with binary 0s
scheme
reserved link-local addresses
download
subnet mask
43. Media access methodology in which a node wishing to transmit listens for a carrier wave before trying to send. If a carrier is sensed - the node waits for the transmission in progress to finish before initiating its own transmission.
electromagnetic interface
carrier sense multiple access (CSMA)
encode
channel
44. A host or node that participates in some form of a group. For example - p2p technology defines a group of peers that participate jointly in the same activity - each one having a server and client component.
flooding
peer
Packet Tracer
router
45. In networking - a measurement of the speed of bits that can be transmitted over a particular link. It is the amount of data that can be transmitted in a certain amount of time. For digital bandwidth it is usually expressed in bits per second.
ethernet PHY
link-local address
flash
bandwidth
46. The process by which a device adds networking heads and trailers to data from an application for the eventual transmission of the data onto a transmission medium.
digital logic
bridge table
single point of failure
encapsulation
47. A method of internal processing by LAN switches. The switch must receive the entire frame before it sends the first bit of the frame. Store and forward switch is the method used by cisco switches.
keyword
store and forward
slash format
FIN
48. A high-speed line or series of connections that forms a major pathway within a network. The term is often used to describe the main network connections comprising the Internet.
Internet backbone
host
hybrid fiber-coax
default route
49. An application protocol typically not used by end users. Instead - it is used by the network management software and networking devices to allow a network engineer to monitor and troubleshoot network problems.
burned in address
half duplex
window size
smtp
50. A 1-bit flag in the tcp header that indicates the acknowledgment field is valid.
source
Internet Assigned Numbers Authority
synchronous
ACK