SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CCNA Network Fundamentals Vocab
Start Test
Study First
Subjects
:
cisco
,
it-skills
,
ccna
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Any combination of hardware device and/or software application designed to protect network devices from outside network users and/or malicious applications and files.
TCP/IP
locally administered address
firewall
ping sweep
2. Application-level throughput. It is the number of useful bits per unit of time from a certain source address to a certain destination - excluding protocol overhead and excluding retransmitted data packets.
best effort
scalability
public address
goodput
3. The dividing of IP datagrams to meet the MTU requirement of a layer 2 protocol.
delimiter
Open systems interconnection
round-trip time
fragmentation
4. The MAC algorithm used by ethernet devices in a shared media. The protocol requires a node wishing to transmit to listen for a carrier signal before trying to send. If a carrier is sensed - the node waits for transmission in progress to finish before
carrier sense multiple access collision detect (CSMA/CD)
flooding
extended star
bandwidth
5. Additional data that is provided with a command to provide information used by the execution of the command. IOS command arguments are entered at the CLI after the command
digital logic
argument
token passing
server message block
6. The table used by a switch or bridge that associates MAC addresses with the outgoing port. The switch or bridge uses this table for its forwarding/filtering decisions.
positional notation
segmentation
bridge table
daemon
7. A corporate system such as a website that is explicitly used by internal employees. Can be assessed internally or remotely
intranet
scope
link-local address
slot time
8. As part of the TCP/IP internet layer - ICMP defines protocol messages used to inform network engineeres of how well an internetwork is working. For example - the ping command sends ICMP messages to determine whether a host can send packets ot another
broadcast address
Internet control message protocol
priority queing
synchronous
9. An international - nonprofit organization for the advancement of technology related to eletricity. IEEE maintains the standards defining many LAN protocols.
fault tolerance
Institute of Electrical and Electronics Engineers
console port
IP
10. An internet wide system by which a hierarchical set of DNS servers collectively hold all the name IP address mappings - with DNS servers referring users to the correct DNS server to successfully resolve a DNS name.
daemon
convergence
signal
domain name system
11. A group defined by a class D address (multicast - ranging from 224.0.0.0 to 239.255.255.255) - whereupon hosts can pertain to multicast groups. Hosts that have the same multicast address are part of the same host group.
channel
fragmentation
media access control
host group
12. A grouping of code that meets a certain - already specified - condition for entering in that certain group.
code gropu
subnet mask
fiber optics
transparent bridging
13. On a switch - a table that lists all known MAC addresses - and the bridges/switch port out which the bridge/switch should forward frames sent to each MAC address.
MAC table
internetwork
throuhpu
network address
14. An access method used with some LAN technologies by which devices access the media in a controlled manner. This access to the LAN is managed using a small frame called a toke. A device can send only when it has claimed the use of the token.
public address
channel service unit/data service unit
virtual circuit
token passing
15. A communication path over a medium used to transport information from a sender to a receiver. Multiple channels can be multiplexed over a single cable
ARP poisoning
channel
IP address
keyword
16. A network topology characterized by a central location connected to multiple hubs. In an extended star - these interconnected hubs may be connected to more hubs. It is essentially a hierarchical topology but typically is drawn with the central site i
distributed
port
extended star
connection oriented
17. An internationally recognized definition of technical specifications that ensure worldwide consistency.
fiber-optic cable
host group
round-trip time
standards
18. The lower of the two sublayers of the IEEE standard for ethernet. It is also the name of that sublayer
media access control
host address
server message block
limited scope address
19. The first half of a MAC address. Manufactures must ensure that the value of the OUI has been registered with the IEEE. This value identifies the manufacturer of any Ethernet NIC or interface.
bridge table
plug-in
Organizational Unique Identifier
IP address
20. Program used to download and send email. Email clients use POP3 to receive emails and use SMTP to send emails. Also called an email client
URG
Mail user agent
forwarding
resource records
21. Used by tcp or udp - with values between 0 and 1023 - these ports are allocated by high-privilege processes. They are used so that all clients know the correct port number to connect to.
well known ports
switch
standards
pinout
22. A routing feature in which frames in an interface output queue are prioritized based on various characteristics such as packet size and interface type.
network baseline
user executive mode
priority queing
standards
23. A form of transmission where one device transmits to all devices within the network or on another network
global configuration mod
logical topology
broadcast
fiber-optic cable
24. Also known as boolean algebra. These consist of the AND OR and IF operations
virtual terminal line
digital logic
Thicknet
session
25. DNS data records. Their precise format is defined in RFC 1035. The most important fields in a resource record are Name - class - type and data.
dynamic routing
RJ-45
resource records
server message block
26. The structure and order of words in a computer language
syntax
kilobits per second
multicast group
firewall
27. An ethernet frame that is less than 64 bytes in size. Runts are caused by collisions and are also know as collision fragments
fiber-optic cable
globally scoped addresses
runt frame
segment
28. A notification sent from one network device to another to confirm that some event has occured.
channel
MAC table
virtual local area network
acknowledgment
29. The forwarding of packets where the forwarding decision is taken dynamically - hop by hop - based on the conditions of downstream fowrading nodes.
gigabit ethernet
layered model
token passing
selective forwarding
30. A company that helps create the Internet by providing connectivity to enterprises and individuals - as well as interconnecting to other ISPs to create connectivity to all other ISPs.
Internet service provider
hierarchical addressing
virtual circuit
media-dependent interface crossover
31. A common term for 10base2 ethernet - referring to the fact that 10base2 cabling is thinner than coaxial cabling used for 10base5
argument
Open systems interconnection
flow control
thinnet
32. Communication that uses a common clocking signal. In most synchronous communicatino - one of the communicating devices generates a clock signal into the circuit. Additional timing information is not required in the header.
synchronous
RST
high-order bit
directly connected network
33. A related set of communications transactions between two or more network devices.
session
Pad
nslookup
priority queing
34. The ability of a protocol. system or component to be modified to fit a new need.
flow control
extended star
scalability
syntax
35. An application level network protocl mainly applied to shared access to files - printers - serial ports - and miscellaneous communications between nodes on a network.
globally scoped addresses
global configuration mod
radix
server message block
36. The devices and connections of a communications network that comprise the network end of the user to network interface. The DCE provides a physical connection to the network - forwards traffic - and provides a clocking signal used to synchronize data
data communications equipment
media-dependent interface (MDI)
RST
smtp
37. A 1-bit flag in the TCP header that is used to request that a connection be re-established.
static route
RST
host group
domain name system
38. A part of the ethernet frame that fills in the data field to ensure that the data field meets the minimum size requirement of 46 bytes.
bit
Pad
protocol
encryption
39. A protocol used between routers so that they can learn routes to add to their routing tables.
broadcast domain
SYN
PSH
router protocol
40. Routing table entry that is used to direct frames for which a next hop is not explicitly listed in the routing table. This route is used to forward a packet when no other known route exists for a give packet's destination address.
flash
local area network
single point of failure
default route
41. The networking layers whose processes are not affected by the media being used. In ethernet - these are all the layers from the LLC sublayer of data link upward.
media independent
slash format
acknowledgment
binary
42. Used in the CLI following the command. Keywords are parameters that are used with the command from a set of predefined values.
keyword
high-order bit
resource records
Requests for Comments
43. A layer 4 protocl of TCP/IP model - TCP lets applications guarantee delivery of data across a network.
window size
TCP
dispersion
default route
44. A device such as a desktop or mobile device that is used by an end user.
media-dependent interface crossover
segment
end device
media independent
45. The retransmission delay used with CSMA/CD when a collision occurs. The algorithm forces each sender that detected the collisions to delay a random amount of time before attempting to retransmit.
deterministic
backoff algorithm
high-order bit
bit
46. A 1-bt flag in the TCP header used to indicate the initial value of the sequence number. The SYN flag is only set in the first two segments of the three-way TCP connection establishment sequence.
SYN
collaborative
bridge table
slash format
47. An IPv4 address in the range of 169.254.1.0 to 169.254.254.255. Communication using these addresses is used with a ttl of 1 and limited to the local network
post office protocol
TCP
link-local address
fiber optics
48. Information systems that allow the creation of a document or documents that can be edited by more than one person in real time
collaborative
port
asynchronous
ACK
49. A data link layer address - for example a MAC address
physical address
extranet
routing
virtual circuit
50. The actual data transfer rate between two computers at some point in time. Throughput is impacted by the slowest-speed link used to send data between the two computers - as well as myriad variables that might change during the course of a day.
end device
directly connected network
throuhpu
association identity AID