SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CCNA Network Fundamentals Vocab
Start Test
Study First
Subjects
:
cisco
,
it-skills
,
ccna
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A process by which an end device - after it receives data over some transmission medium - examines the headers and trailers at each successive higher layer - eventually handing the data to the correct application. Sometimes called de-encapsulation.
decapsulation
network baseline
host address
fiber-optic cable
2. A network that incorporates both optical fiber along with coaxial cable to create a broadband network. commonly used by cable tv companies.
scheme
hybrid fiber-coax
acknowledgment number
Time to live
3. When used generically - this term refers to end-user data along with networking headers and trailers that are transmitted through a network. When used specifically - it is end-user data - along with the network or Internet layer headers and any highe
physical address
packet
scope
download
4. Routing that adjusts automatically to network topology or traffic changes.
token passing
distributed
dynamic routing
bridge table
5. A part of a computer network that every device communicates with using the same physical medium. Network segments are extended by hubs or repeaters.
IP
encode
network segment
scalability
6. International standardization program created by ISO and ITU-T to develop standards for data networking that facilitate multivendor equipment interoperability
Pad
Open systems interconnection
well known ports
cyclic redundancy check
7. The arrangement of the nodes in a network and the physical connections between them. This is the representation of how the media is used to connect the devices.
physical topology
MAC table
FIN
high-order bit
8. In networking - this term is used in several ways. With ethernet hub and switch hardware - port is simply another name for interface - which is a physical connector in the swithc into whic a cable can be connected. With TCP and UDP - a port is a soft
half duplex
port
node
network interface card
9. A communication path over a medium used to transport information from a sender to a receiver. Multiple channels can be multiplexed over a single cable
redundancy
association identity AID
channel
symmetric switching
10. 1. a collision domain that is a section of a LAN that is bound by bridges - routers or switches. 2. In a LAN using a bus topology - a segment is a continuous electrical circuit that is often connected to other such segments with repeaters. 3. When us
segment
carrier sense multiple access (CSMA)
fault tolerance
electromagnetic interface
11. A part of the ethernet frame that fills in the data field to ensure that the data field meets the minimum size requirement of 46 bytes.
session
AND
Pad
digital logic
12. In the telnet application - commands are always introduced by a character with the decimal code 255 - known as the Interpret as Command character.
burned in address
Interpret as command
bridge
redundancy
13. An encoding scheme 4B/5B uses 5-bit symbols and codes to represent 4 bits of data. 4B/5B is used in 100Base-tx ethernet.
Network time protocol
media independent
4b/5b
port
14. DNS data records. Their precise format is defined in RFC 1035. The most important fields in a resource record are Name - class - type and data.
resource records
overhead
fiber-optic cable
hop
15. A network of computers that behave as if they are connected to the same network segment - even through they might be physically located on different segments of a LAN. VLANs are configured through software on the switch and router.
virtual local area network
router
radix
dispersion
16. The bit position in a binary number having the greatest value. The most significant bit is sometime referred to as the leftmost bit.
switch
most significant bit
window size
segmentation
17. Information systems that allow the creation of a document or documents that can be edited by more than one person in real time
attenuation
collaborative
query
subnet
18. The optical or electrical impulse on a physical medium for purposes of communication.
router protocol
jam signal
carrier sense multiple access (CSMA)
signal
19. Computer hardware - typically used for LANS - that allows the computer to connect to some network cable. The NIC can then send and receive data over the cable at the direction of the computer.
domain name system
routing
redundancy
network interface card
20. A service or a program to look up information in the DNS
Regional Internet Registries
broadcast address
nslookup
overhead
21. Ethernet that transmits data at 1 -000 -000 -000 one billion bits per second.
Thicknet
maximum transmission unit
gigabit ethernet
classless addressing
22. The lower of the two sublayers of the IEEE standard for ethernet. It is also the name of that sublayer
broadcast address
Internet control message protocol
media access control
Internet Assigned Numbers Authority
23. A source of information that is highly reliable and known for its accuracy
authoritative
IP address
flooding
network
24. The range of ip addresses that can be assigned by the DHCP server.
post office protocol
address pool
bit
AND
25. The design on networks that can continue to operate without interruption in the case of hardware - software or communications failures.
fault tolerance
code gropu
multicast group
International Organization for Standardization
26. An international - nonprofit organization for the advancement of technology related to eletricity. IEEE maintains the standards defining many LAN protocols.
gateway
Institute of Electrical and Electronics Engineers
broadcast domain
physical topology
27. A control mechanism that can provide different priorities to different users or data flows - or guarantee a certain level of performance to a data flow in accordance with requests from the application program.
intranet
TCP
quality of service
association identity AID
28. The extent of a certain item. For example - an address scope is also known as a range of addresses from beginning of the range to the end.
scope
subnet mask
Interpret as command
link-local address
29. A method of internal processing by LAN switches. The switch must receive the entire frame before it sends the first bit of the frame. Store and forward switch is the method used by cisco switches.
store and forward
network
multicast client
interframe spacing
30. The origin of the PDU. This can be a process a host or a node - depending on the layer to which you are reffering.
intranet
directly connected network
source
electromagnetic interface
31. The MAC address that is permanently assigned to a LAN interface or NIC. It is called burned-in because the address is burned into a chip on the card - and the address cannot be changed. Also called universally administered address.
Internet control message protocol
burned in address
SYN
extended star
32. Program used to download and send email. Email clients use POP3 to receive emails and use SMTP to send emails. Also called an email client
binary
Mail user agent
extended star
Internet backbone
33. The IP address of the originating host that is placed into the IP packet header.
Interpret as command
encode
window size
source IP address
34. The number of various unique digits - including 0 that a positional number system uses to represent numbers. For example - in the binary system (base 2) the radix is 2. In the decimal system the radix is 10.
radix
Regional Internet Registries
octet
protocol
35. A network topology characterized by a central location connected to multiple hubs. In an extended star - these interconnected hubs may be connected to more hubs. It is essentially a hierarchical topology but typically is drawn with the central site i
prefix length
Requests for Comments
unshieled twisted-pair
extended star
36. An international standards body that defines many networking standards. Also - the standards body that created the OSI model.
standards
International Organization for Standardization
half duplex
burned in address
37. The management of data flow between devices in a network. It is used to avoid too much data arriving before a device can handle it - causing data overflow.
flow control
logical network
jam signal
broadcast domain
38. A technique used to attack an ethernet network by sending fake ARP messages to an ethernet LAN. These frames contain false MAC addresses that confuse network devices - such as switches. As a result - frames intended for one node can be mistakenly sen
MAC table
electromagnetic interface
test-net address
ARP poisoning
39. On a switch - a table that lists all known MAC addresses - and the bridges/switch port out which the bridge/switch should forward frames sent to each MAC address.
encapsulation
MAC table
segmentation
forwarding
40. In IP subnetting - this refers to the portion of a set of IP addresses whose value must be identical for the addresses to be in the same subnet.
most significant bit
prefix length
decapsulation
Internet control message protocol
41. Used by tcp or udp - with values between 0 and 1023 - these ports are allocated by high-privilege processes. They are used so that all clients know the correct port number to connect to.
global configuration mod
Logical link control
classful addressing
well known ports
42. A network scanning technique used to identify which host IP addresses are operational.
ping sweep
dns resolver
Open systems interconnection
post office protocol
43. The minimum time a NIC or interface can take to send an entire frame. Slot time - then - implies a minimum frame size.
logical network
slot time
octet
International Organization for Standardization
44. Defines the commands - headers and processes by which web server and web browsers transfer files.
nonreturn to zero
hypertext transfer protocol
link-local address
packet
45. The forwarding of packets where the forwarding decision is taken dynamically - hop by hop - based on the conditions of downstream fowrading nodes.
globally scoped addresses
intermediary device
selective forwarding
broadcast
46. A temporary storage where data that has been retrieved or calculated and is accessed frequently can be stored. After the data is stored in the cache - the processes can access the cached copy instead of accessing the original data. A cache reduces th
collision
cache
low-order bit
bridge table
47. A 32-bit number - written in dotted decimal notation - used by the IP to uniquely identify an interface connected to an IP network. It is also used as a destination address in an IP header to allow routing - and as a source address to allow a compute
gateway
multicast client
media-dependent interface (MDI)
IP address
48. Radio frequencies that creat noise that interferes with information being transmitted across unshielded copper cabling.
half duplex
radio frequency interference
Packet Tracer
MAC table
49. A plan - design or program of action to be followed. Sometimes an addressing plan is called an addressing SCHEME.
default route
scalability
collision domain
scheme
50. A network architecture designed to eliminate network downtime cause by a single point of failure.
redundancy
network interface card
dynamic or private ports
ARP poisoning