Test your basic knowledge |

CCNA Network Fundamentals Vocab

Subjects : cisco, it-skills, ccna
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. To change the energy levels transmitted over some networking medium to transmit bits over that medium.






2. From the priviledged mode - you can enter the device's global caonfiguration mode. From global configuration mode - you can configure global parameters or enter other configuration submodes such as interface - router and line configuration submodes.






3. A method of internal processing by LAN switches. The switch must receive the entire frame before it sends the first bit of the frame. Store and forward switch is the method used by cisco switches.






4. The IPv4 address block 192.0.2.0 to 192.0.2.255 that is set aside for teaching and learning purposes. These addresses can be used in documentation and network examples.






5. A 1-bit flag in the TCP header that is used to request to the higher layers for immediate delivery of the packet.






6. The layer 2 pdu that has been encoded by a data link layer protocol for digital transmission. Some different kinds of frames are ethernet frames and PPP frames.






7. A network of computers that behave as if they are connected to the same network segment - even through they might be physically located on different segments of a LAN. VLANs are configured through software on the switch and router.






8. In ethernet - the results of two nodes transmitting simlutaneously. The signals from each device are damaged when they combine on the media






9. A broadcast that is sent to a specific network or series of networks.






10. A routing feature in which frames in an interface output queue are prioritized based on various characteristics such as packet size and interface type.






11. A 32-bit field in the tcp segment header that specifies the sequence number of the next byte this host expects to receive as a part of the TCP session. It is used to recognize lost packets and flow control






12. A process where multiple digital data streams are combined into one signal.






13. The physical interface transceivers. It deals with Layer 1 (the physical layer - hence the PHY) of ethernet.






14. Unique addresses that are public domain addresses.






15. A group defined by a class D address (multicast - ranging from 224.0.0.0 to 239.255.255.255) - whereupon hosts can pertain to multicast groups. Hosts that have the same multicast address are part of the same host group.






16. As filed in the TCP header that is set in a sent segment - signifies the maximum amount of unacknowledged data the host is willing to receive before the other sending host must wait for an acknowledgment.






17. MDIX is an alternative operation of ethernet ports on a hub. In this mode - the mapping of the wire pairs used in the hub port is in a crossover configuration. This allows you to use a straight-through cable to interconnect the hub to another hub.






18. Resources used to manage or operate the network. Overhead consumes bandwidth and reduces the amount of application data that can be transported across the network.






19. A host or node that participates in some form of a group. For example - p2p technology defines a group of peers that participate jointly in the same activity - each one having a server and client component.






20. This field of a frame signals the beginning or end of a frame.






21. A network created for devices located in a limited geographic area - through which the company owning the LAN has the right to run cables.






22. A computer program that runs in the background and is usually initiated as a process. Daemons often support server processes.






23. A 1-bit flag in the TCP header used to indicate that the receiving host should notify the destination process to do urgent processing.






24. A part of a computer network that every device communicates with using the same physical medium. Network segments are extended by hubs or repeaters.






25. A general type of cable - with the cable holding twisted pairs of copper wires and the cable itself having little shielding.






26. Computer hardware - typically used for LANS - that allows the computer to connect to some network cable. The NIC can then send and receive data over the cable at the direction of the computer.






27. Data that directs a process. a flag in a data-link frame is an example of control data.






28. A method of expressing a network prefix. It uses a forward slash / followed by the network prefix.






29. A network with a geographic size between a LAN and a WAN. Typically used by service providers to create a highspeed network in a major metropolitan area where many customers might want high speed services between large sites around a city.






30. A plan - design or program of action to be followed. Sometimes an addressing plan is called an addressing SCHEME.






31. An entry in an IP routing table that was created because a network engineer entered the routing information into the router's configuration.






32. A protocol that allows a computer to retrieve email from a server.






33. Communication that allows receipt and transmission simultaneously. A station can transmit and receive at the same time. There are no collisions with full-duplex ethernet transmision.






34. An IP address that has been registered with IANA or one of its member agencies - which guarantees that the address is globally unique. Globally unique public IP addresses can be used for packets sent through the Internet.






35. In the telnet application - commands are always introduced by a character with the decimal code 255 - known as the Interpret as Command character.






36. The IEEE 802.2 standard that defines the upper sublayer of the Ethernet Layer 2 specifications.






37. The MAC algorithm used by ethernet devices in a shared media. The protocol requires a node wishing to transmit to listen for a carrier signal before trying to send. If a carrier is sensed - the node waits for transmission in progress to finish before






38. In TCP - the process of taking a large chunk of data and breaking it into small enough pieces to fit within a TCP segment without breaking any rules about the maximum amount of data allowed in a segment.






39. A network device that accesses a service on another computer remotely by accessing the network.






40. In networking - this term is used in several ways. With ethernet hub and switch hardware - port is simply another name for interface - which is a physical connector in the swithc into whic a cable can be connected. With TCP and UDP - a port is a soft






41. The learning of source addresses on incoming frames and adding them to the bridging table. After the table has been completed and when a frame is received on one of the bridge's interfaces - the bridge looks up the frame's destination address in its






42. A name - as defined by DNS that uniquely identifies a computer in the internet. DNS servers can then respond to the DNS requests by supplying the IP address that is used by the computer that has a particular domain name. This term also refers to the






43. A convention for writing IP addresses with four decimal numbers - ranging from 0 to 255 - with each octet representing 8 bits of the 32 bit IP address. The term originates from the fact that each of the four decimal numbers is separated by a period.






44. Any combination of hardware device and/or software application designed to protect network devices from outside network users and/or malicious applications and files.






45. 1.collection of computers - printers - routers - switches - and other devices that can communication with each other over some transmission medium. 2. command that assgins a NIC based address to which the router is directly connected.






46. The IP address of the originating host that is placed into the IP packet header.






47. A network scanning technique used to identify which host IP addresses are operational.






48. The process of obscuring information to make it unreadable without special knowledge - somtimes referred to as scrambling. The process takes the data to be encrypted and applies a mathematical formula to it along with a secret number. The resulting v






49. The connection of devices on a common media. Sometimes a physical network is also referred to as a network segment.






50. International standardization program created by ISO and ITU-T to develop standards for data networking that facilitate multivendor equipment interoperability