Test your basic knowledge |

CCNA Network Fundamentals Vocab

Subjects : cisco, it-skills, ccna
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. The process by which a device adds networking heads and trailers to data from an application for the eventual transmission of the data onto a transmission medium.






2. The retransmission delay used with CSMA/CD when a collision occurs. The algorithm forces each sender that detected the collisions to delay a random amount of time before attempting to retransmit.






3. Interface by magnetic signals caused by the flow of electricity. EMI can cause reduced data integrity and increased error rates on transmission channels. The physics of this process are that electrical current creates magnetic fields - which in turn






4. A rectangular cabling connector with eight pins - often used with ethernet cables.






5. As part of the TCP/IP internet layer - ICMP defines protocol messages used to inform network engineeres of how well an internetwork is working. For example - the ping command sends ICMP messages to determine whether a host can send packets ot another






6. A request for information. Queries are answered with replies.






7. Used by tcp or udp - with values between 0 and 1023 - these ports are allocated by high-privilege processes. They are used so that all clients know the correct port number to connect to.






8. Using values between 1024 and 49 -151 these numbers are equivalent to well-known ports in concept - but they are specifically used for nonprivileged application processes.






9. A process where multiple digital data streams are combined into one signal.






10. The IEEE 802.2 standard that defines the upper sublayer of the Ethernet Layer 2 specifications.






11. A group defined by a class D address (multicast - ranging from 224.0.0.0 to 239.255.255.255) - whereupon hosts can pertain to multicast groups. Hosts that have the same multicast address are part of the same host group.






12. A logical storage in the host's RAM to store ARP entries






13. A protocol that allows a computer to retrieve email from a server.






14. In ethernet - a device that receives an electrical signal in one port - interprets the bits and regenerates a clean signal that it sends out all other ports of the hub. Typically it also supplies several ports - which are oftentimes RJ-45 jacks.






15. An access method used with some LAN technologies by which devices access the media in a controlled manner. This access to the LAN is managed using a small frame called a toke. A device can send only when it has claimed the use of the token.






16. Defines which wires in a cable should connect to each pin on the connectors on both ends of a cable. For example - a UTP cable used for ethernet - used for a straight-through cable pinout - connects the wire at pin 1 on one end with the pin 1 on the






17. The management of data flow between devices in a network. It is used to avoid too much data arriving before a device can handle it - causing data overflow.






18. Real-time communication between two or more people through text. The text is conveyed through computers connected over a network such as the internet. files can also be transferred through the IM program to share files.






19. A generic term from OSI that refers to the data - headers - and trailers about which a particular network layer is concerned.






20. A term that describes IPv4 packets sent to all hosts in a particular network. In a directed broadcast - a single copy of the packet is routed to the specified network - where it is broadcast to all hosts on that network






21. A source of information that is highly reliable and known for its accuracy






22. As filed in the TCP header that is set in a sent segment - signifies the maximum amount of unacknowledged data the host is willing to receive before the other sending host must wait for an acknowledgment.






23. Organizations that are responsible for the allocation and registration of Internet number resources within a particular region of the world. These registries include the American Registry for Internet Number for North America; RIPE network coordinati






24. A group of IP addresses that have the same value in the first part of the IP addresses - for the purpose of allowing routing to identify the group by the inital part of the addresses. IP addresses in the same subnet typically sit on the same network






25. A network that incorporates both optical fiber along with coaxial cable to create a broadband network. commonly used by cable tv companies.






26. Any combination of hardware device and/or software application designed to protect network devices from outside network users and/or malicious applications and files.






27. Part of a company's intranet that is extended to users outside the company






28. A combination of many IP subnets and networks - as created by building a network using routers. The term internwork is used to avoid confusion with the term network - because an internetwork can include several IP networks.






29. A logical storage in a host's RAM to store arp entries.






30. Computer hardware - typically used for LANS - that allows the computer to connect to some network cable. The NIC can then send and receive data over the cable at the direction of the computer.






31. A 32-bit field in the tcp segment header that specifies the sequence number of the next byte this host expects to receive as a part of the TCP session. It is used to recognize lost packets and flow control






32. A 1-bit flag in the tcp header that indicates the acknowledgment field is valid.






33. A process used to verify the identity of a person or process






34. Normally - a relatively general term that refers to dfifferent kinds of networking devices. Historically - when routers were created - they were called gateways






35. The lower of the two sublayers of the IEEE standard for ethernet. It is also the name of that sublayer






36. A network architecture designed to eliminate network downtime cause by a single point of failure.






37. Radio frequencies that creat noise that interferes with information being transmitted across unshielded copper cabling.






38. The passage of a data packet between two network nodes.






39. The ability of a protocol. system or component to be modified to fit a new need.






40. A MAC address that can be configured on a device. The LAA can be used in place of the BIA . This means that you can replace a NIC or use a substitute device without changing the address used by the network to access the station.






41. A method of internal processing by LAN switches. The switch must receive the entire frame before it sends the first bit of the frame. Store and forward switch is the method used by cisco switches.






42. Communication that only allows one station to receive while the other station is transmitting






43. The actual data transfer rate between two computers at some point in time. Throughput is impacted by the slowest-speed link used to send data between the two computers - as well as myriad variables that might change during the course of a day.






44. A 1-bit field in the TCP header that is used by a device that wants to terminate its session with the other device. This is done by inserting the FIN flag in the flag field found in the TCP segment






45. Refers to whether the performance of a device - attached to a particular type of LAN - can be accurately predicted. Token Ring LANS are deterministic - but ethernet LANS are non deterministic.






46. An application level network protocl mainly applied to shared access to files - printers - serial ports - and miscellaneous communications between nodes on a network.






47. From the priviledged mode - you can enter the device's global caonfiguration mode. From global configuration mode - you can configure global parameters or enter other configuration submodes such as interface - router and line configuration submodes.






48. A common term for 10base5 ethernet - referring to the fact that 10base5 cabling is thicker than the coaxial cabling used for 10base2.






49. In IP subnetting - this refers to the portion of a set of IP addresses whose value must be identical for the addresses to be in the same subnet.






50. The IP address of the originating host that is placed into the IP packet header.