SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CCNA Network Fundamentals Vocab
Start Test
Study First
Subjects
:
cisco
,
it-skills
,
ccna
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A group of IP addresses that have the same value in the first part of the IP addresses - for the purpose of allowing routing to identify the group by the inital part of the addresses. IP addresses in the same subnet typically sit on the same network
slash format
keyword
multicast group
subnet
2. A network model defined by the IETF that has been implemented on most computers and network device in the world.
enable password
routing table
TCP/IP
registered ports
3. A term that describes IPv4 packets sent to all hosts in a particular network. In a directed broadcast - a single copy of the packet is routed to the specified network - where it is broadcast to all hosts on that network
limited broadcast
maximum transmission unit
directed broadcast
network segment
4. A routing feature in which frames in an interface output queue are prioritized based on various characteristics such as packet size and interface type.
priority queing
classful addressing
Internet Assigned Numbers Authority
source IP address
5. A service or a program to look up information in the DNS
nslookup
default gateway
AND
forwarding
6. A notification sent from one network device to another to confirm that some event has occured.
download
smtp
acknowledgment
International Organization for Standardization
7. Represents the 0 in the binary number. In an IP subnet mask - the lower-order bits represent the host portion. Sometimes called the host portion of bits.
low-order bit
flooding
broadcast domain
instant messaging
8. In networking - this term is used in several ways. With ethernet hub and switch hardware - port is simply another name for interface - which is a physical connector in the swithc into whic a cable can be connected. With TCP and UDP - a port is a soft
thinnet
port
MAC table
metropolitan-area network
9. The header defined by the IP. Used to create IP packets by encapsulating data supplied by higher-layer protocol (such as TCP) behind an IP header.
SYN
physical topology
IP header
half duplex
10. A process used by a switch or bridge to forward broadcasts and unknown destination unicasts. The bridge/switch forwards these frames out all ports except the port on which the frame was received.
full duplex
flooding
data communications equipment
limited scope address
11. A drag-and-drop network simulator developed by Cisco to design - configure and troubleshoot network equipment within a controlled - simulated program environment.
encode
Mail user agent
Packet Tracer
throuhpu
12. The arrangement of the nodes in a network and the physical connections between them. This is the representation of how the media is used to connect the devices.
burned in address
broadcast
bandwidth
physical topology
13. Defines the commands - headers and processes by which web server and web browsers transfer files.
dns resolver
physical topology
hypertext transfer protocol
data termianl equipment
14. In the telnet application - commands are always introduced by a character with the decimal code 255 - known as the Interpret as Command character.
overhead
link-local address
Interpret as command
physical network
15. A common term for 10base2 ethernet - referring to the fact that 10base2 cabling is thinner than coaxial cabling used for 10base5
resource records
thinnet
layered model
channel
16. Also known as boolean algebra. These consist of the AND OR and IF operations
user executive mode
intermediary device
cyclic redundancy check
digital logic
17. A type of hash function that is used to produce a small - fixed size checksum of a block of data - such as a packet or a computer file. A CRC is computed and appended before transmission or storage - and verified afterward by the recipient to confirm
resource records
Internet Assigned Numbers Authority
quality of service
cyclic redundancy check
18. A layer 4 protocl of TCP/IP model - TCP lets applications guarantee delivery of data across a network.
global configuration mod
PSH
TCP
logical topology
19. An international standards body that defines many networking standards. Also - the standards body that created the OSI model.
store and forward
encapsulation
International Organization for Standardization
bit
20. An application level network protocl mainly applied to shared access to files - printers - serial ports - and miscellaneous communications between nodes on a network.
prviate address
Pad
dns resolver
server message block
21. The MAC address that is permanently assigned to a LAN interface or NIC. It is called burned-in because the address is burned into a chip on the card - and the address cannot be changed. Also called universally administered address.
burned in address
network address
kilobits per second
frame
22. Line code in which 1s are represented by one significant condition and 0s are represented by another.
nonreturn to zero
well known ports
most significant bit
data communications equipment
23. A rectangular cabling connector with eight pins - often used with ethernet cables.
media-dependent interface crossover
internetwork
RJ-45
broadcast
24. The time required to send a single bit over some transmission medium. The time can be calculated at 1/speed - where speed is the number of bits per second sent over the medium
default gateway
globally scoped addresses
bit time
internetwork
25. A plan - design or program of action to be followed. Sometimes an addressing plan is called an addressing SCHEME.
multicast client
subnet mask
scheme
slot time
26. Refers to whether the performance of a device - attached to a particular type of LAN - can be accurately predicted. Token Ring LANS are deterministic - but ethernet LANS are non deterministic.
fiber optics
gigabit ethernet
deterministic
PSH
27. A common term for 10base5 ethernet - referring to the fact that 10base5 cabling is thicker than the coaxial cabling used for 10base2.
Thicknet
console port
flow control
high-order bit
28. A process used to verify the identity of a person or process
authentication
dotted decimal
local area network
global configuration mod
29. A unicast IP address that is considered to have three parts: a network part - a subnet part - and a host part. The term classful refers to the fact that classful network rules are first applied to the address - and then the rest of the address can be
bridge table
classful addressing
Logical link control
nonvolatile RAM (NVRAM)
30. 1. a collision domain that is a section of a LAN that is bound by bridges - routers or switches. 2. In a LAN using a bus topology - a segment is a continuous electrical circuit that is often connected to other such segments with repeaters. 3. When us
domain name system
transparent bridging
logical network
segment
31. The structure and order of words in a computer language
switch table
source IP address
syntax
interframe spacing
32. A device that connects to a local digital telephone loop for a WAN circuit to a serial interface on a network device - typically connecting to a router. The CSU/DSU performs physical Layer 1 signaling on WAN circuits
channel service unit/data service unit
logical topology
network address
slot time
33. The glass fibers inside certain cables over which light is transmitted to encode 0 and 1
fiber optics
server
radio frequency interference
quality of service
34. MDIX is an alternative operation of ethernet ports on a hub. In this mode - the mapping of the wire pairs used in the hub port is in a crossover configuration. This allows you to use a straight-through cable to interconnect the hub to another hub.
acknowledgment
proxy arp
media-dependent interface crossover
query
35. A written specification that defines what tasks a service or device should perform. Each protocol defines messages - often in the form of headers - plus the rules and processes by which these messages are used to achieve some stated purpose.
radix
ARP poisoning
association identity AID
protocol
36. The bit position in a binary number having the greatest value. The most significant bit is sometime referred to as the leftmost bit.
subnet
most significant bit
packet
single point of failure
37. A numbering system characterized by 1 and 0
packet
binary
Logical link control
dotted decimal
38. A convention for writing IP addresses with four decimal numbers - ranging from 0 to 255 - with each octet representing 8 bits of the 32 bit IP address. The term originates from the fact that each of the four decimal numbers is separated by a period.
Internet control message protocol
dotted decimal
nslookup
cloud
39. Ethernet that transmits data at 1 -000 -000 -000 one billion bits per second.
Internet backbone
virtual circuit
gigabit ethernet
thinnet
40. A group of 8 binary bits. It is similar to - but not the same as - a byte. One Application in computer network is to use octets to divide IPv4 addresses into four components
TCP/IP
octet
Network time protocol
carrier sense multiple access (CSMA)
41. The first half of a MAC address. Manufactures must ensure that the value of the OUI has been registered with the IEEE. This value identifies the manufacturer of any Ethernet NIC or interface.
host group
Organizational Unique Identifier
Internet control message protocol
domain name
42. A member of a multicast group. Every multicast client in each group has the same IP address. Multicast addresses begin with 224... and end with 239...
subnet mask
fault tolerance
multicast client
server
43. A network scanning technique used to identify which host IP addresses are operational.
binary
acknowledgment number
pinout
ping sweep
44. The layer 3 address to which the data is going.
well known ports
fragmentation
destination IP address
prefix length
45. The physical interface transceivers. It deals with Layer 1 (the physical layer - hence the PHY) of ethernet.
ethernet PHY
fiber optics
fast ethernet
virtual terminal line
46. A communication path over a medium used to transport information from a sender to a receiver. Multiple channels can be multiplexed over a single cable
hybrid fiber-coax
directly connected network
channel
digital logic
47. The IPv4 multicast addresses 224.0.0.0 to 224.0.0.255. These addresses are to be used for multicast groups on a local network. Packets to these destinations are always transmitted with a TTTL value of 1
pinout
instant messaging
nonvolatile RAM (NVRAM)
reserved link-local addresses
48. A device on a network that serves as an access point to other networks. A default gateway is used by a host to forward IP packets that have destination addresses outside the local subnet. A router interface typically is used as the default gateway. W
backoff algorithm
local area network
bandwidth
default gateway
49. From the priviledged mode - you can enter the device's global caonfiguration mode. From global configuration mode - you can configure global parameters or enter other configuration submodes such as interface - router and line configuration submodes.
global configuration mod
ethernet PHY
acknowledgment number
carrier
50. Another form of the root word converge in the phrase converged network. This kind of network aggregates various forms of traffic such as voice - video and data on the same network infrastructure. A more common usage represents the process by which ro
pinout
session
full duplex
convergence