SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CCNA Network Fundamentals Vocab
Start Test
Study First
Subjects
:
cisco
,
it-skills
,
ccna
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A protocol used between routers so that they can learn routes to add to their routing tables.
acknowledgment
router protocol
URG
syntax
2. A field in the IP header that prevents a packet form indefinitely looping around an IP internetwork. Router decrements the TTL field each time they forward a packet - and if they decrement the TTL to 0 - the router discards the packet - which prevent
Requests for Comments
scope
distributed
Time to live
3. A device that connects multiple network segments at the data link layer of the OSI model. Bridges were the predecessor to LAN switches.
peer
gigabit ethernet
dispersion
bridge
4. A 1-bt flag in the TCP header used to indicate the initial value of the sequence number. The SYN flag is only set in the first two segments of the three-way TCP connection establishment sequence.
locally administered address
SYN
default gateway
download
5. From the priviledged mode - you can enter the device's global caonfiguration mode. From global configuration mode - you can configure global parameters or enter other configuration submodes such as interface - router and line configuration submodes.
user executive mode
acknowledgment
global configuration mod
subnet mask
6. The structure and order of words in a computer language
physical network
bridge
end device
syntax
7. One of the three basic binary logic operations. ANDing yields the following result: 1 and 1 = 1 - 1 and 0 = 0 - 0 and 1 = 0
Organizational Unique Identifier
collision
AND
local area network
8. The MAC algorithm used by ethernet devices in a shared media. The protocol requires a node wishing to transmit to listen for a carrier signal before trying to send. If a carrier is sensed - the node waits for transmission in progress to finish before
transparent bridging
scope
carrier sense multiple access collision detect (CSMA/CD)
IP
9. A control mechanism that can provide different priorities to different users or data flows - or guarantee a certain level of performance to a data flow in accordance with requests from the application program.
well known ports
quality of service
collision domain
query
10. The first half of a MAC address. Manufactures must ensure that the value of the OUI has been registered with the IEEE. This value identifies the manufacturer of any Ethernet NIC or interface.
throuhpu
Address resolution protocol
server message block
Organizational Unique Identifier
11. Any communication in which the sender and receiver do not prearrange for communications to occur
priority queing
data communications equipment
syntax
connectionless
12. A request for information. Queries are answered with replies.
smtp
broadcast address
query
best effort
13. The reference to text based logical interfaces on an ios device. These are accesses using telnet or ssh to perform administrative tasks. VTY lines are also called virtual type terminal.
virtual terminal line
resource records
source
delimiter
14. The IP address of the originating host that is placed into the IP packet header.
console port
source IP address
IP
bit time
15. A delineation of networking protocols and standards into different categories - called layers - along with definitions of which sets of standards and protocols need to be implemented to create products that can be used to create a working network
protocol suite
slot time
radio frequency interference
directed broadcast
16. An international - nonprofit organization for the advancement of technology related to eletricity. IEEE maintains the standards defining many LAN protocols.
port
Institute of Electrical and Electronics Engineers
extranet
standards
17. The arrangement of the nodes in a network and the physical connections between them. This is the representation of how the media is used to connect the devices.
physical topology
Time to live
encapsulation
Network time protocol
18. A combination of many IP subnets and networks - as created by building a network using routers. The term internwork is used to avoid confusion with the term network - because an internetwork can include several IP networks.
internetwork
instant messaging
pulse amplitude modulation
carrier sense multiple access (CSMA)
19. The spreading of light signal caused by light signals traveling at different speeds through a fiber.
media-dependent interface crossover
frame
dispersion
plug-in
20. A process by which an end device - after it receives data over some transmission medium - examines the headers and trailers at each successive higher layer - eventually handing the data to the correct application. Sometimes called de-encapsulation.
loopback
decapsulation
bit
distributed
21. Radio frequencies that creat noise that interferes with information being transmitted across unshielded copper cabling.
ACK
radio frequency interference
channel
test-net address
22. A protocol that allows a computer to retrieve email from a server.
post office protocol
console port
dotted decimal
nonvolatile RAM (NVRAM)
23. TCP or UDP ports that range from 49152 to 65535 and are not used by any defined server applications.
goodput
dynamic or private ports
well known ports
high-order bit
24. An access method used with some LAN technologies by which devices access the media in a controlled manner. This access to the LAN is managed using a small frame called a toke. A device can send only when it has claimed the use of the token.
data termianl equipment
prviate address
scalability
token passing
25. Data that directs a process. a flag in a data-link frame is an example of control data.
code gropu
fragmentation
control data
International Organization for Standardization
26. An IPV4 addressing scheme that uses a subnet mask that does not follow classful addressing limitations. It provides increased flexibility when dividing ranges of IP addresses into separate networks. Classless addressing is considered the best in curr
classless addressing
network interface card
peer
source IP address
27. A protocol used to dynamically assign IP configurations to hosts. The services defined by the protocol are used to request and assign an IP address - default gateway - and DNS server address to a network host.
client
bridge
AND
dynamic host configuration protocol
28. Translation RFC 1918 addresses to public domain addresses. Because RFC 1918 addresses are not routerd on the Internet - hosts accessing the Internet must use public domain addresses.
subnet mask
hierarchical addressing
flash
Network address translation (NAT)
29. The ability of a protocol. system or component to be modified to fit a new need.
argument
local area network
domain name
scalability
30. A dotted decimal number defined by the IPv4 protocol to represent a network or subnet. It represents the network that hosts reside in. Also called a network number or network ID.
cache
subnet
IP header
network address
31. Ethernet that transmits data at 1 -000 -000 -000 one billion bits per second.
prefix length
transparent bridging
slot time
gigabit ethernet
32. A 1-bit flag in the tcp header that indicates the acknowledgment field is valid.
ACK
round-trip time
signal
scheme
33. A network scanning technique used to identify which host IP addresses are operational.
segmentation
ping sweep
kilobits per second
prviate address
34. A common name for ethernet technology that operates at 100 mbps.
filtering
acknowledgment
fast ethernet
prefix length
35. A device such as a desktop or mobile device that is used by an end user.
nslookup
collision
end device
FIN
36. Path through an internetwork through which packets are forwarded.
synchronous
Internet service provider
flash
router
37. A process where multiple digital data streams are combined into one signal.
extended star
multicast client
multiplexing
positional notation
38. Routing that adjusts automatically to network topology or traffic changes.
dynamic routing
gigabit ethernet
media independent
Requests for Comments
39. To transfer data from the computer functioning as a server to the client computer you are using.
noise
public address
download
ACK
40. A service or a program to look up information in the DNS
limited scope address
nslookup
manchester encoding
intranet
41. A name - as defined by DNS that uniquely identifies a computer in the internet. DNS servers can then respond to the DNS requests by supplying the IP address that is used by the computer that has a particular domain name. This term also refers to the
gigabit ethernet
filtering
association identity AID
domain name
42. A communication path over a medium used to transport information from a sender to a receiver. Multiple channels can be multiplexed over a single cable
virtual circuit
cyclic redundancy check
classful addressing
channel
43. An application protocol typically not used by end users. Instead - it is used by the network management software and networking devices to allow a network engineer to monitor and troubleshoot network problems.
signal
broadcast address
dynamic routing
smtp
44. Information systems that allow the creation of a document or documents that can be edited by more than one person in real time
well known ports
collaborative
ARP poisoning
best effort
45. A network topology characterized by a central location connected to multiple hubs. In an extended star - these interconnected hubs may be connected to more hubs. It is essentially a hierarchical topology but typically is drawn with the central site i
extended star
host
single point of failure
deterministic
46. A collection of data that establishes a reference for network performance and behavior over a period of time. This reference data is used in the future to assess the health and relative growth of network utilization.
argument
flow control
routing
network baseline
47. As filed in the TCP header that is set in a sent segment - signifies the maximum amount of unacknowledged data the host is willing to receive before the other sending host must wait for an acknowledgment.
authentication
network segment
window size
decapsulation
48. Real-time communication between two or more people through text. The text is conveyed through computers connected over a network such as the internet. files can also be transferred through the IM program to share files.
flash
instant messaging
Interpret as command
binary
49. A generic term from OSI that refers to the data - headers - and trailers about which a particular network layer is concerned.
protocol data unit
IP
physical media
enable password
50. Somtimes called place-value notation - this is a numeral system in which each position is related to the next by a constant multiplier - a common ration - called the base or radix of that numeral system.
local area network
positional notation
fast ethernet
collision