Test your basic knowledge |

CCNA Network Fundamentals Vocab

Subjects : cisco, it-skills, ccna
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A type of hash function that is used to produce a small - fixed size checksum of a block of data - such as a packet or a computer file. A CRC is computed and appended before transmission or storage - and verified afterward by the recipient to confirm






2. A network of computers that behave as if they are connected to the same network segment - even through they might be physically located on different segments of a LAN. VLANs are configured through software on the switch and router.






3. The origin of the PDU. This can be a process a host or a node - depending on the layer to which you are reffering.






4. The time required for some network pdu's to be sent and received - and a response PDU to be sent and received. In other words - the time between when a device sends data and when the same device receives a response.






5. Program used to download and send email. Email clients use POP3 to receive emails and use SMTP to send emails. Also called an email client






6. A form of signal modulation where the message information is encoded in the amplitude of series of signal pulses. It transmits data by varying the aplitunes of the individual pulses. This is now obsolete and has been replaced by pulse code modulation






7. Normally - a relatively general term that refers to dfifferent kinds of networking devices. Historically - when routers were created - they were called gateways






8. A rectangular cabling connector with eight pins - often used with ethernet cables.






9. Computer hardware - typically used for LANS - that allows the computer to connect to some network cable. The NIC can then send and receive data over the cable at the direction of the computer.






10. A removable component that has memory space for storage. Used on the router or switch for storing the compressed operating system image.






11. Any communication in which the sender and receiver do not prearrange for communications to occur






12. The process by which a router receives an incoming frame - discards the ata link header and trailer - makes a forwarding decision based on the destination IP address - adds a new data-link header and trailer based on the outgoing interface and forwar






13. A process by which an end device - after it receives data over some transmission medium - examines the headers and trailers at each successive higher layer - eventually handing the data to the correct application. Sometimes called de-encapsulation.






14. The design on networks that can continue to operate without interruption in the case of hardware - software or communications failures.






15. The process of obscuring information to make it unreadable without special knowledge - somtimes referred to as scrambling. The process takes the data to be encrypted and applies a mathematical formula to it along with a secret number. The resulting v






16. A temporary storage where data that has been retrieved or calculated and is accessed frequently can be stored. After the data is stored in the cache - the processes can access the cached copy instead of accessing the original data. A cache reduces th






17. A device such as a desktop or mobile device that is used by an end user.






18. Define in RFC 1918 - an IP address that does not have to be globally unique because the address exists inside packets only when the packets are inside a single private IP internetwork. Private IP addresses are popularly used in most company today - w






19. Using values between 1024 and 49 -151 these numbers are equivalent to well-known ports in concept - but they are specifically used for nonprivileged application processes.






20. An international - nonprofit organization for the advancement of technology related to eletricity. IEEE maintains the standards defining many LAN protocols.






21. A network device that accesses a service on another computer remotely by accessing the network.






22. An IPv4 address in the range of 169.254.1.0 to 169.254.254.255. Communication using these addresses is used with a ttl of 1 and limited to the local network






23. In ethernet - the process performed by a bridge or switch when it decides that it should not forward a frame out another port






24. An entry in an IP routing table that was created because a network engineer entered the routing information into the router's configuration.






25. A network that incorporates both optical fiber along with coaxial cable to create a broadband network. commonly used by cable tv companies.






26. A written specification that defines what tasks a service or device should perform. Each protocol defines messages - often in the form of headers - plus the rules and processes by which these messages are used to achieve some stated purpose.






27. The limited CLI mode where the commands available to the user are a subset of those available at the privileged level. In general - use the user Exec commands to temporarily change terminal settings - perform basic tests and list system information.






28. A command on many computer operating systems that discovers the IP addresses - and possibly host names - of the routers used by the network when sending a packet from one computer to another.






29. The standards body responsible for the development and approval of TCP/IP standards






30. A method of computer processing in which different parts of a program run simultaneously on two or more computers that are communicating with each other over a network






31. The arrangement of the nodes in a network and the physical connections between them. This is the representation of how the media is used to connect the devices.






32. A form of transmission where one device transmits to all devices within the network or on another network






33. The physical interface transceivers. It deals with Layer 1 (the physical layer - hence the PHY) of ethernet.






34. The learning of source addresses on incoming frames and adding them to the bridging table. After the table has been completed and when a frame is received on one of the bridge's interfaces - the bridge looks up the frame's destination address in its






35. A corporate system such as a website that is explicitly used by internal employees. Can be assessed internally or remotely






36. A method of internal processing by LAN switches. The switch must receive the entire frame before it sends the first bit of the frame. Store and forward switch is the method used by cisco switches.






37. An access method used with some LAN technologies by which devices access the media in a controlled manner. This access to the LAN is managed using a small frame called a toke. A device can send only when it has claimed the use of the token.






38. A term that describes IPv4 packets sent to all hosts in a particular network. In a directed broadcast - a single copy of the packet is routed to the specified network - where it is broadcast to all hosts on that network






39. A protocol used to dynamically assign IP configurations to hosts. The services defined by the protocol are used to request and assign an IP address - default gateway - and DNS server address to a network host.






40. MDIX is an alternative operation of ethernet ports on a hub. In this mode - the mapping of the wire pairs used in the hub port is in a crossover configuration. This allows you to use a straight-through cable to interconnect the hub to another hub.






41. A common name for ethernet technology that operates at 100 mbps.






42. An IPv4 multicast address that is restricted to a local group or organization






43. Communication that only allows one station to receive while the other station is transmitting






44. Used by tcp or udp - with values between 0 and 1023 - these ports are allocated by high-privilege processes. They are used so that all clients know the correct port number to connect to.






45. The first half of a MAC address. Manufactures must ensure that the value of the OUI has been registered with the IEEE. This value identifies the manufacturer of any Ethernet NIC or interface.






46. The optical or electrical impulse on a physical medium for purposes of communication.






47. Line code in which each bit of data is signified by at least one voltage level transition.






48. An IPv4 multicast address that is restricted to a local group or organization.






49. A network that is connected to a device's interface. For example networks that interface with the router are known to be directly connected. Devices learn their initial IP routes based on being connected to these subnets.






50. A network scanning technique used to identify which host IP addresses are operational.