SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CCNA Network Fundamentals Vocab
Start Test
Study First
Subjects
:
cisco
,
it-skills
,
ccna
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A company that helps create the Internet by providing connectivity to enterprises and individuals - as well as interconnecting to other ISPs to create connectivity to all other ISPs.
protocol
local area network
routing table
Internet service provider
2. An address used to represent a transmission from one device to all devices. In ethernet - the sepcial ethernet address FFFF.FFFF.FFFF is used as a destination MAC address to cause a frame to be sent to all devices on an ethernet LAN. In IPV4 - each s
IP address
broadcast address
source
Internet Assigned Numbers Authority
3. Refers to whether the performance of a device - attached to a particular type of LAN - can be accurately predicted. Token Ring LANS are deterministic - but ethernet LANS are non deterministic.
carrier sense multiple access (CSMA)
deterministic
connectionless
bridge
4. A network device - typically connected to a range of LAN and WAN interfaces - that forwards packets based on their destination IP addresses.
router
nonvolatile RAM (NVRAM)
signal
bandwidth
5. A communication path over a medium used to transport information from a sender to a receiver. Multiple channels can be multiplexed over a single cable
Organizational Unique Identifier
ACK
acknowledgment
channel
6. Program used to download and send email. Email clients use POP3 to receive emails and use SMTP to send emails. Also called an email client
International Organization for Standardization
port
Mail user agent
association identity AID
7. Any combination of hardware device and/or software application designed to protect network devices from outside network users and/or malicious applications and files.
overhead
broadcast address
firewall
network
8. Represents the 0 in the binary number. In an IP subnet mask - the lower-order bits represent the host portion. Sometimes called the host portion of bits.
default gateway
low-order bit
store and forward
distributed
9. A control mechanism that can provide different priorities to different users or data flows - or guarantee a certain level of performance to a data flow in accordance with requests from the application program.
Internet Assigned Numbers Authority
Optical time domain reflectometer
broadcast domain
quality of service
10. Another form of the root word converge in the phrase converged network. This kind of network aggregates various forms of traffic such as voice - video and data on the same network infrastructure. A more common usage represents the process by which ro
convergence
default route
Packet Tracer
data termianl equipment
11. Data that directs a process. a flag in a data-link frame is an example of control data.
Packet Tracer
domain name
control data
global configuration mod
12. The retransmission delay used with CSMA/CD when a collision occurs. The algorithm forces each sender that detected the collisions to delay a random amount of time before attempting to retransmit.
backoff algorithm
slot time
administratively scoped address
full duplex
13. A broadcast that is sent to a specific network or series of networks.
limited broadcast
host
argument
slot time
14. Network protocols or technologies that do not use the acknowledgment system to guarantee reliable delivery of information
filtering
4b/5b
best effort
carrier sense multiple access (CSMA)
15. The table used by a switch or bridge that associates MAC addresses with the outgoing port. The switch or bridge uses this table for its forwarding/filtering decisions.
global configuration mod
bridge table
host group
backoff algorithm
16. The process by which a device adds networking heads and trailers to data from an application for the eventual transmission of the data onto a transmission medium.
filtering
cache
TCP/IP
encapsulation
17. An organization that assigns the numbers important to the proper operation of the TCP/IP protocol and the Internet - including assigning globally unique IP addresses.
virtual local area network
Internet Assigned Numbers Authority
hub
symmetric switching
18. TCP or UDP ports that range from 49152 to 65535 and are not used by any defined server applications.
switch table
gateway
dynamic or private ports
bridging
19. A name - as defined by DNS that uniquely identifies a computer in the internet. DNS servers can then respond to the DNS requests by supplying the IP address that is used by the computer that has a particular domain name. This term also refers to the
ARP poisoning
domain name
router protocol
user executive mode
20. The management of data flow between devices in a network. It is used to avoid too much data arriving before a device can handle it - causing data overflow.
channel
flow control
globally scoped addresses
scheme
21. A MAC address that can be configured on a device. The LAA can be used in place of the BIA . This means that you can replace a NIC or use a substitute device without changing the address used by the network to access the station.
media access control
RST
broadcast address
locally administered address
22. A type of hash function that is used to produce a small - fixed size checksum of a block of data - such as a packet or a computer file. A CRC is computed and appended before transmission or storage - and verified afterward by the recipient to confirm
window size
goodput
cyclic redundancy check
physical network
23. The forwarding of packets where the forwarding decision is taken dynamically - hop by hop - based on the conditions of downstream fowrading nodes.
forwarding
selective forwarding
media access control
jam signal
24. Defines the commands - headers and processes by which web server and web browsers transfer files.
fiber optics
hypertext transfer protocol
bandwidth
Pad
25. Used in the CLI following the command. Keywords are parameters that are used with the command from a set of predefined values.
keyword
virtual local area network
post office protocol
TCP
26. Also known as boolean algebra. These consist of the AND OR and IF operations
bridging
digital logic
media access control
metropolitan-area network
27. A member of a multicast group. Every multicast client in each group has the same IP address. Multicast addresses begin with 224... and end with 239...
connectionless
multicast client
network
TCP/IP
28. A unit of measurement of the number of times 1000 bits can be transmitted in 1 second. 1 kbps = 1000bps
single point of failure
kilobits per second
domain name system
asynchronous
29. A list of router holds in memory for the purpose of deciding how to forward packets.
PSH
protocol
routing table
post office protocol
30. This field of a frame signals the beginning or end of a frame.
TCP
layered model
prefix length
delimiter
31. A field in the IP header that prevents a packet form indefinitely looping around an IP internetwork. Router decrements the TTL field each time they forward a packet - and if they decrement the TTL to 0 - the router discards the packet - which prevent
media-dependent interface (MDI)
Time to live
carrier sense multiple access collision detect (CSMA/CD)
scope
32. In LAN switches a reference to cases in which a frame is forwarded - or switche - when the incoming and outgoing interfaces use the same speed. It is the opposite of asymmetric switching.
symmetric switching
bit time
administratively scoped address
digital logic
33. A routing feature in which frames in an interface output queue are prioritized based on various characteristics such as packet size and interface type.
asynchronous
priority queing
protocol
internetwork
34. Organizations that are responsible for the allocation and registration of Internet number resources within a particular region of the world. These registries include the American Registry for Internet Number for North America; RIPE network coordinati
scheme
Regional Internet Registries
media independent
classless addressing
35. In a shared media ethernet network - a signal generated by the transmitting devices that detects the collision. The jam signal continue to transmit for a specified period to ensure that all devices on the network detect the collision. The jame signal
Internet backbone
code gropu
token passing
jam signal
36. An international standards body that defines many networking standards. Also - the standards body that created the OSI model.
International Organization for Standardization
network segment
broadcast
symmetric switching
37. A device that connects end devices to the network or interconnects different networks. A router is an example of an intermediary device.
intermediary device
IP
attenuation
SYN
38. The origin of the PDU. This can be a process a host or a node - depending on the layer to which you are reffering.
domain name
global configuration mod
frame
source
39. The client part of the DNS client server mechanism. A DNS resolver creates queries sent a across a network to a same server - interprets responses - and returns information to the requesting programs.
dns resolver
standards
hop
media-dependent interface (MDI)
40. A removable component that has memory space for storage. Used on the router or switch for storing the compressed operating system image.
fiber optics
flash
noise
filtering
41. A physical or a logical area in a LAN where the signals sent by the interfaces ma be subject o being combined. Within a collision domain - if a device sends a frame on a network segment - every other device on that same segment will receive that fram
backoff algorithm
Network time protocol
hypertext transfer protocol
collision domain
42. Line code in which 1s are represented by one significant condition and 0s are represented by another.
flow control
nonreturn to zero
host address
protocol
43. Information systems that allow the creation of a document or documents that can be edited by more than one person in real time
reserved link-local addresses
collaborative
switch table
peer
44. A network that is connected to a device's interface. For example networks that interface with the router are known to be directly connected. Devices learn their initial IP routes based on being connected to these subnets.
directly connected network
shielded twisted pair cable
PSH
host group
45. Radio frequencies that creat noise that interferes with information being transmitted across unshielded copper cabling.
directly connected network
radio frequency interference
ARP cache
Logical link control
46. The process of forwarding frames in a switch or a bridge from one port to another port or from segment to segment
slash format
kilobits per second
bridging
URG
47. A command on many computer operating systems that discovers the IP addresses - and possibly host names - of the routers used by the network when sending a packet from one computer to another.
acknowledgment number
binary
router
tracert
48. As filed in the TCP header that is set in a sent segment - signifies the maximum amount of unacknowledged data the host is willing to receive before the other sending host must wait for an acknowledgment.
locally administered address
console port
collaborative
window size
49. DNS data records. Their precise format is defined in RFC 1035. The most important fields in a resource record are Name - class - type and data.
resource records
metropolitan-area network
protocol suite
virtual terminal line
50. A temporary storage where data that has been retrieved or calculated and is accessed frequently can be stored. After the data is stored in the cache - the processes can access the cached copy instead of accessing the original data. A cache reduces th
flooding
cache
download
proxy arp