SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CCNA Network Fundamentals Vocab
Start Test
Study First
Subjects
:
cisco
,
it-skills
,
ccna
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A type of hash function that is used to produce a small - fixed size checksum of a block of data - such as a packet or a computer file. A CRC is computed and appended before transmission or storage - and verified afterward by the recipient to confirm
Requests for Comments
prefix length
well known ports
cyclic redundancy check
2. A written specification that defines what tasks a service or device should perform. Each protocol defines messages - often in the form of headers - plus the rules and processes by which these messages are used to achieve some stated purpose.
nonreturn to zero
reserved link-local addresses
protocol
cache
3. An international - nonprofit organization for the advancement of technology related to eletricity. IEEE maintains the standards defining many LAN protocols.
Institute of Electrical and Electronics Engineers
Internet service provider
directed broadcast
locally administered address
4. Represents the 0 in the binary number. In an IP subnet mask - the lower-order bits represent the host portion. Sometimes called the host portion of bits.
low-order bit
Internet control message protocol
switch
shielded twisted pair cable
5. Physical medium that uses glass or plastic threads to transmit data. A fiber-optic cable consists of a bundle of these threads - each of which is capable of transmitting data into light waves.
fiber-optic cable
link-local address
redundancy
ACK
6. A 1-bt flag in the TCP header used to indicate the initial value of the sequence number. The SYN flag is only set in the first two segments of the three-way TCP connection establishment sequence.
scheme
session
SYN
argument
7. A communication path over a medium used to transport information from a sender to a receiver. Multiple channels can be multiplexed over a single cable
carrier sense multiple access (CSMA)
intermediary device
channel
logical network
8. A data link layer address - for example a MAC address
connectionless
jam signal
physical address
burned in address
9. An international standards body that defines many networking standards. Also - the standards body that created the OSI model.
Internet
virtual local area network
International Organization for Standardization
firewall
10. A network model defined by the IETF that has been implemented on most computers and network device in the world.
Network time protocol
deterministic
TCP/IP
cyclic redundancy check
11. Also known as boolean algebra. These consist of the AND OR and IF operations
digital logic
acknowledgment
node
Internet control message protocol
12. The devices and connections of a communications network that comprise the network end of the user to network interface. The DCE provides a physical connection to the network - forwards traffic - and provides a clocking signal used to synchronize data
media access control
data communications equipment
tracert
locally administered address
13. In TCP - the process of taking a large chunk of data and breaking it into small enough pieces to fit within a TCP segment without breaking any rules about the maximum amount of data allowed in a segment.
scheme
segmentation
signal
authentication
14. Line code in which each bit of data is signified by at least one voltage level transition.
logical network
manchester encoding
globally scoped addresses
attenuation
15. A time period between ethernet frames that allows fairness with the CSMA/CD algorithm. Without a space between frames in other words - without some time with no frames being sent a NIC might always listen for silence - never hear silence and therefor
prefix length
synchronous
deterministic
interframe spacing
16. Resources used to manage or operate the network. Overhead consumes bandwidth and reduces the amount of application data that can be transported across the network.
host
Internet Engineering Task Force
overhead
registered ports
17. A network scanning technique used to identify which host IP addresses are operational.
Internet
ping sweep
round-trip time
fiber optics
18. Define in RFC 1918 - an IP address that does not have to be globally unique because the address exists inside packets only when the packets are inside a single private IP internetwork. Private IP addresses are popularly used in most company today - w
prviate address
peer
Thicknet
source IP address
19. Network protocols or technologies that do not use the acknowledgment system to guarantee reliable delivery of information
goodput
virtual circuit
manchester encoding
best effort
20. A method of internal processing by LAN switches. The switch must receive the entire frame before it sends the first bit of the frame. Store and forward switch is the method used by cisco switches.
store and forward
download
globally scoped addresses
URG
21. In IP subnetting - this refers to the portion of a set of IP addresses whose value must be identical for the addresses to be in the same subnet.
domain name
protocol
bridge
prefix length
22. Defines the commands - headers and processes by which web server and web browsers transfer files.
hypertext transfer protocol
dns resolver
Internet Engineering Task Force
Interpret as command
23. The loss of communication signal on the media. This loss is due to degradation of the energy wave over time.
attenuation
burned in address
authoritative
intranet
24. A port on cisco devices to which a terminal or computer with a terminal emulator is connected to the network device in order to communicate and configure the network device
store and forward
protocol
Network time protocol
console port
25. The optical or electrical impulse on a physical medium for purposes of communication.
signal
broadcast address
hop
resource records
26. Communication that uses a common clocking signal. In most synchronous communicatino - one of the communicating devices generates a clock signal into the circuit. Additional timing information is not required in the header.
synchronous
host group
data communications equipment
instant messaging
27. In networking - a symbol used when drawing network diagrams that represent a part of the network whose details can be ignored for the purposes of the diagram.
decapsulation
protocol suite
cloud
TCP/IP
28. Another form of the root word converge in the phrase converged network. This kind of network aggregates various forms of traffic such as voice - video and data on the same network infrastructure. A more common usage represents the process by which ro
scalability
convergence
shielded twisted pair cable
switch table
29. A model that consists of various layers that enable the development and explanation of technology to be done on a modular basis. This allows interoperability among different technologies among the different layers.
Thicknet
host
layered model
prviate address
30. A device that connects to a local digital telephone loop for a WAN circuit to a serial interface on a network device - typically connecting to a router. The CSU/DSU performs physical Layer 1 signaling on WAN circuits
dotted decimal
channel service unit/data service unit
user executive mode
nonvolatile RAM (NVRAM)
31. A convention for writing IP addresses with four decimal numbers - ranging from 0 to 255 - with each octet representing 8 bits of the 32 bit IP address. The term originates from the fact that each of the four decimal numbers is separated by a period.
broadcast
globally scoped addresses
scheme
dotted decimal
32. A process used by a switch or bridge to forward broadcasts and unknown destination unicasts. The bridge/switch forwards these frames out all ports except the port on which the frame was received.
flooding
MAC table
binary
IP address
33. In networking - this term is used in several ways. With ethernet hub and switch hardware - port is simply another name for interface - which is a physical connector in the swithc into whic a cable can be connected. With TCP and UDP - a port is a soft
half duplex
physical network
port
test-net address
34. In a web browser - an application the browser uses - inside the browser window to display some types of content. For example - a browser typically uses a plug-in to display video.
plug-in
pulse amplitude modulation
collision domain
dynamic or private ports
35. 1. a collision domain that is a section of a LAN that is bound by bridges - routers or switches. 2. In a LAN using a bus topology - a segment is a continuous electrical circuit that is often connected to other such segments with repeaters. 3. When us
segment
dotted decimal
Logical link control
ethernet PHY
36. A technique used to attack an ethernet network by sending fake ARP messages to an ethernet LAN. These frames contain false MAC addresses that confuse network devices - such as switches. As a result - frames intended for one node can be mistakenly sen
ARP poisoning
4b/5b
address pool
bridge
37. Computer hardware - typically used for LANS - that allows the computer to connect to some network cable. The NIC can then send and receive data over the cable at the direction of the computer.
dynamic or private ports
carrier
deterministic
network interface card
38. An organization that assigns the numbers important to the proper operation of the TCP/IP protocol and the Internet - including assigning globally unique IP addresses.
Internet Assigned Numbers Authority
bridge
locally administered address
gigabit ethernet
39. An address used to represent a transmission from one device to all devices. In ethernet - the sepcial ethernet address FFFF.FFFF.FFFF is used as a destination MAC address to cause a frame to be sent to all devices on an ethernet LAN. In IPV4 - each s
best effort
collision
cyclic redundancy check
broadcast address
40. A form of signal modulation where the message information is encoded in the amplitude of series of signal pulses. It transmits data by varying the aplitunes of the individual pulses. This is now obsolete and has been replaced by pulse code modulation
destination IP address
pulse amplitude modulation
Internet backbone
bridging
41. The cabling and connectors used to interconnect the network devices.
loopback
nslookup
physical media
octet
42. A popular certification method for fiber systems. The OTDR injects light into the fiber and then graphically displays the results of the detected reflected light. The OTDR measures the elapsed transit time of reflected light to calculate the distance
Optical time domain reflectometer
noise
plug-in
scope
43. On a switch - a table that lists all known MAC addresses - and the bridges/switch port out which the bridge/switch should forward frames sent to each MAC address.
Regional Internet Registries
MAC table
convergence
radio frequency interference
44. A related set of communications transactions between two or more network devices.
IP
channel
session
filtering
45. To change the energy levels transmitted over some networking medium to transmit bits over that medium.
encode
virtual local area network
shielded twisted pair cable
source
46. An access method used with some LAN technologies by which devices access the media in a controlled manner. This access to the LAN is managed using a small frame called a toke. A device can send only when it has claimed the use of the token.
token passing
reserved link-local addresses
channel service unit/data service unit
nonreturn to zero
47. The lower of the two sublayers of the IEEE standard for ethernet. It is also the name of that sublayer
test-net address
media-dependent interface crossover
fiber-optic cable
media access control
48. A network with a geographic size between a LAN and a WAN. Typically used by service providers to create a highspeed network in a major metropolitan area where many customers might want high speed services between large sites around a city.
cache
authentication
metropolitan-area network
fragmentation
49. The dividing of IP datagrams to meet the MTU requirement of a layer 2 protocol.
data communications equipment
fragmentation
single point of failure
PSH
50. A logical network composed of all the computers and networking devices that can be reached by sending a frame to the data link layer broadcast address.
cache
broadcast domain
network baseline
subnet mask