Test your basic knowledge |

CCNA Network Fundamentals Vocab

Subjects : cisco, it-skills, ccna
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A form of transmission where one device transmits to all devices within the network or on another network






2. A field in the IP header that prevents a packet form indefinitely looping around an IP internetwork. Router decrements the TTL field each time they forward a packet - and if they decrement the TTL to 0 - the router discards the packet - which prevent






3. The table used by a switch or bridge that associates MAC addresses with the outgoing port. The switch or bridge uses this table for its forwarding/filtering decisions.






4. A plan - design or program of action to be followed. Sometimes an addressing plan is called an addressing SCHEME.






5. As part of the TCP/IP internet layer - ICMP defines protocol messages used to inform network engineeres of how well an internetwork is working. For example - the ping command sends ICMP messages to determine whether a host can send packets ot another






6. In TCP - the process of taking a large chunk of data and breaking it into small enough pieces to fit within a TCP segment without breaking any rules about the maximum amount of data allowed in a segment.






7. Defines the commands - headers and processes by which web server and web browsers transfer files.






8. A rectangular cabling connector with eight pins - often used with ethernet cables.






9. A network scanning technique used to identify which host IP addresses are operational.






10. 1.collection of computers - printers - routers - switches - and other devices that can communication with each other over some transmission medium. 2. command that assgins a NIC based address to which the router is directly connected.






11. In the telnet application - commands are always introduced by a character with the decimal code 255 - known as the Interpret as Command character.






12. A 1-bt flag in the TCP header used to indicate the initial value of the sequence number. The SYN flag is only set in the first two segments of the three-way TCP connection establishment sequence.






13. A source of information that is highly reliable and known for its accuracy






14. A process used to verify the identity of a person or process






15. Network layer protocol in the TCP/IP stack offering a connectionless internetwork service. IP provides features for addressing - type-of-service specification - fragmentation and reassembly - and security.






16. The spreading of light signal caused by light signals traveling at different speeds through a fiber.






17. The MAC address that is permanently assigned to a LAN interface or NIC. It is called burned-in because the address is burned into a chip on the card - and the address cannot be changed. Also called universally administered address.






18. Computer hardware - typically used for LANS - that allows the computer to connect to some network cable. The NIC can then send and receive data over the cable at the direction of the computer.






19. Routing table entry that is used to direct frames for which a next hop is not explicitly listed in the routing table. This route is used to forward a packet when no other known route exists for a give packet's destination address.






20. A signal on a medium used to support the transmission of data. Data is carried over the medium by modulation.






21. The loss of communication signal on the media. This loss is due to degradation of the energy wave over time.






22. The first half of a MAC address. Manufactures must ensure that the value of the OUI has been registered with the IEEE. This value identifies the manufacturer of any Ethernet NIC or interface.






23. A network topology characterized by a central location connected to multiple hubs. In an extended star - these interconnected hubs may be connected to more hubs. It is essentially a hierarchical topology but typically is drawn with the central site i






24. The structure and order of words in a computer language






25. A system of network design characterized by one or more major components that are required to maintain operation.






26. A method of computer processing in which different parts of a program run simultaneously on two or more computers that are communicating with each other over a network






27. The retransmission delay used with CSMA/CD when a collision occurs. The algorithm forces each sender that detected the collisions to delay a random amount of time before attempting to retransmit.






28. Unique addresses that are public domain addresses.






29. A type of network cabling that includes twisted-pair wires - with shielding around each pair of wires - as well as another shield around all wires in the cable.






30. Program used to download and send email. Email clients use POP3 to receive emails and use SMTP to send emails. Also called an email client






31. Network protocols or technologies that do not use the acknowledgment system to guarantee reliable delivery of information






32. An encoding scheme 4B/5B uses 5-bit symbols and codes to represent 4 bits of data. 4B/5B is used in 100Base-tx ethernet.






33. The cabling and connectors used to interconnect the network devices.






34. A control mechanism that can provide different priorities to different users or data flows - or guarantee a certain level of performance to a data flow in accordance with requests from the application program.






35. A logical connection between devices in which the frames are passed between the devices. Virtual circuits are independent of the physical structure and may be established through multiple physical devices.






36. The ability of a protocol. system or component to be modified to fit a new need.






37. A high-speed line or series of connections that forms a major pathway within a network. The term is often used to describe the main network connections comprising the Internet.






38. A device that connects end devices to the network or interconnects different networks. A router is an example of an intermediary device.






39. An IPV4 addressing scheme that uses a subnet mask that does not follow classful addressing limitations. It provides increased flexibility when dividing ranges of IP addresses into separate networks. Classless addressing is considered the best in curr






40. Binary digit used in the binary numbering system. Binary digits are units of information storage and communication in computing. Each bit can be either a 0 or a 1.






41. A process where multiple digital data streams are combined into one signal.






42. A notification sent from one network device to another to confirm that some event has occured.






43. The management of data flow between devices in a network. It is used to avoid too much data arriving before a device can handle it - causing data overflow.






44. Data link layer term describing a device connected to a network.






45. A common term for 10base2 ethernet - referring to the fact that 10base2 cabling is thinner than coaxial cabling used for 10base5






46. A collection of data that establishes a reference for network performance and behavior over a period of time. This reference data is used in the future to assess the health and relative growth of network utilization.






47. IPv4 address of a network host. When talking about host addresses - they are the network layer addresses.






48. A member of a multicast group. Every multicast client in each group has the same IP address. Multicast addresses begin with 224... and end with 239...






49. Interface by magnetic signals caused by the flow of electricity. EMI can cause reduced data integrity and increased error rates on transmission channels. The physics of this process are that electrical current creates magnetic fields - which in turn






50. An ethernet frame that is less than 64 bytes in size. Runts are caused by collisions and are also know as collision fragments