Test your basic knowledge |

CCNA Network Fundamentals Vocab

Subjects : cisco, it-skills, ccna
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A corporate system such as a website that is explicitly used by internal employees. Can be assessed internally or remotely






2. A 32-bit number - written in dotted decimal notation - used by the IP to uniquely identify an interface connected to an IP network. It is also used as a destination address in an IP header to allow routing - and as a source address to allow a compute






3. To transfer data from the computer functioning as a server to the client computer you are using.






4. A 1-bt flag in the TCP header used to indicate the initial value of the sequence number. The SYN flag is only set in the first two segments of the three-way TCP connection establishment sequence.






5. A network topology characterized by a central location connected to multiple hubs. In an extended star - these interconnected hubs may be connected to more hubs. It is essentially a hierarchical topology but typically is drawn with the central site i






6. An IP address that has been registered with IANA or one of its member agencies - which guarantees that the address is globally unique. Globally unique public IP addresses can be used for packets sent through the Internet.






7. The range of ip addresses that can be assigned by the DHCP server.






8. A part of a computer network that every device communicates with using the same physical medium. Network segments are extended by hubs or repeaters.






9. The dividing of IP datagrams to meet the MTU requirement of a layer 2 protocol.






10. A group defined by a class D address (multicast - ranging from 224.0.0.0 to 239.255.255.255) - whereupon hosts can pertain to multicast groups. Hosts that have the same multicast address are part of the same host group.






11. A 1-bit field in the TCP header that is used by a device that wants to terminate its session with the other device. This is done by inserting the FIN flag in the flag field found in the TCP segment






12. From the priviledged mode - you can enter the device's global caonfiguration mode. From global configuration mode - you can configure global parameters or enter other configuration submodes such as interface - router and line configuration submodes.






13. A physical or a logical area in a LAN where the signals sent by the interfaces ma be subject o being combined. Within a collision domain - if a device sends a frame on a network segment - every other device on that same segment will receive that fram






14. Physical medium that uses glass or plastic threads to transmit data. A fiber-optic cable consists of a bundle of these threads - each of which is capable of transmitting data into light waves.






15. In networking - a measurement of the speed of bits that can be transmitted over a particular link. It is the amount of data that can be transmitted in a certain amount of time. For digital bandwidth it is usually expressed in bits per second.






16. In the telnet application - commands are always introduced by a character with the decimal code 255 - known as the Interpret as Command character.






17. MDIX is an alternative operation of ethernet ports on a hub. In this mode - the mapping of the wire pairs used in the hub port is in a crossover configuration. This allows you to use a straight-through cable to interconnect the hub to another hub.






18. Network protocols or technologies that do not use the acknowledgment system to guarantee reliable delivery of information






19. The retransmission delay used with CSMA/CD when a collision occurs. The algorithm forces each sender that detected the collisions to delay a random amount of time before attempting to retransmit.






20. The devices and connections of a communications network that comprise the network end of the user to network interface. The DCE provides a physical connection to the network - forwards traffic - and provides a clocking signal used to synchronize data






21. The structure and order of words in a computer language






22. A map of the devices on a network representing how the devices communcate with each other.






23. In a shared media ethernet network - a signal generated by the transmitting devices that detects the collision. The jam signal continue to transmit for a specified period to ensure that all devices on the network detect the collision. The jame signal






24. A part of the ethernet frame that fills in the data field to ensure that the data field meets the minimum size requirement of 46 bytes.






25. In networking - this term is used in several ways. With ethernet hub and switch hardware - port is simply another name for interface - which is a physical connector in the swithc into whic a cable can be connected. With TCP and UDP - a port is a soft






26. An application level network protocl mainly applied to shared access to files - printers - serial ports - and miscellaneous communications between nodes on a network.






27. The cabling and connectors used to interconnect the network devices.






28. A process used by a switch or bridge to forward broadcasts and unknown destination unicasts. The bridge/switch forwards these frames out all ports except the port on which the frame was received.






29. A process by which an end device - after it receives data over some transmission medium - examines the headers and trailers at each successive higher layer - eventually handing the data to the correct application. Sometimes called de-encapsulation.






30. Line code in which 1s are represented by one significant condition and 0s are represented by another.






31. The portion of a binary number that carries the most weight - the one written farthest to the left. High-order bits are the 1s in the network mask.






32. In TCP - the process of taking a large chunk of data and breaking it into small enough pieces to fit within a TCP segment without breaking any rules about the maximum amount of data allowed in a segment.






33. A dotted decimal number that helps identify the structure of IP addresses. The mask represents the network and subnet parts of related IP addresses with binary 1s and the host part of related IP addresses with binary 0s






34. The reference to text based logical interfaces on an ios device. These are accesses using telnet or ssh to perform administrative tasks. VTY lines are also called virtual type terminal.






35. The process of obscuring information to make it unreadable without special knowledge - somtimes referred to as scrambling. The process takes the data to be encrypted and applies a mathematical formula to it along with a secret number. The resulting v






36. A logical storage in a host's RAM to store arp entries.






37. A 32-bit field in the tcp segment header that specifies the sequence number of the next byte this host expects to receive as a part of the TCP session. It is used to recognize lost packets and flow control






38. Data that directs a process. a flag in a data-link frame is an example of control data.






39. A 1-bit flag in the TCP header that is used to request that a connection be re-established.






40. The design on networks that can continue to operate without interruption in the case of hardware - software or communications failures.






41. The connection of devices on a common media. Sometimes a physical network is also referred to as a network segment.






42. The IEEE 802.2 standard that defines the upper sublayer of the Ethernet Layer 2 specifications.






43. A protocol for synchronizing the clocks of computer systems over packet-switch data networks. NTP uses UDP port 123 as its transport layer.






44. A device on a network that serves as an access point to other networks. A default gateway is used by a host to forward IP packets that have destination addresses outside the local subnet. A router interface typically is used as the default gateway. W






45. Organizations that are responsible for the allocation and registration of Internet number resources within a particular region of the world. These registries include the American Registry for Internet Number for North America; RIPE network coordinati






46. A network architecture designed to eliminate network downtime cause by a single point of failure.






47. The layer 2 pdu that has been encoded by a data link layer protocol for digital transmission. Some different kinds of frames are ethernet frames and PPP frames.






48. Part of a company's intranet that is extended to users outside the company






49. The ability of a protocol. system or component to be modified to fit a new need.






50. A numbering system characterized by 1 and 0