Test your basic knowledge |

CCNA Network Fundamentals Vocab

Subjects : cisco, it-skills, ccna
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Communication that only allows one station to receive while the other station is transmitting






2. The loss of communication signal on the media. This loss is due to degradation of the energy wave over time.






3. An IPV4 addressing scheme that uses a subnet mask that does not follow classful addressing limitations. It provides increased flexibility when dividing ranges of IP addresses into separate networks. Classless addressing is considered the best in curr






4. In ethernet - the process performed by a bridge or switch when it decides that it should send a frame out another port.






5. An application protocol typically not used by end users. Instead - it is used by the network management software and networking devices to allow a network engineer to monitor and troubleshoot network problems.






6. A special reserved IPv4 address - 127.0.0.1 that can be used to test TCP/IP applications. Packets sent to 127.0.0.1 by a computer never leave the computer or even require working NIC. Instead - the packet is processed by IP at the lowest layer and is






7. A time period between ethernet frames that allows fairness with the CSMA/CD algorithm. Without a space between frames in other words - without some time with no frames being sent a NIC might always listen for silence - never hear silence and therefor






8. In a web browser - an application the browser uses - inside the browser window to display some types of content. For example - a browser typically uses a plug-in to display video.






9. 1. a collision domain that is a section of a LAN that is bound by bridges - routers or switches. 2. In a LAN using a bus topology - a segment is a continuous electrical circuit that is often connected to other such segments with repeaters. 3. When us






10. The standards body responsible for the development and approval of TCP/IP standards






11. A rectangular cabling connector with eight pins - often used with ethernet cables.






12. The table used by a switch that associates MAC addresses with the outgoing port. A general term for the table that a LAN bridge uses for its forwarding/filtering decisions. The table holds a list of MAC addresses and the port out which the bridge sho






13. A notification sent from one network device to another to confirm that some event has occured.






14. The devices and connections of a communications network that comprise the network end of the user to network interface. The DCE provides a physical connection to the network - forwards traffic - and provides a clocking signal used to synchronize data






15. A logical connection between devices in which the frames are passed between the devices. Virtual circuits are independent of the physical structure and may be established through multiple physical devices.






16. A convention for writing IP addresses with four decimal numbers - ranging from 0 to 255 - with each octet representing 8 bits of the 32 bit IP address. The term originates from the fact that each of the four decimal numbers is separated by a period.






17. The first half of a MAC address. Manufactures must ensure that the value of the OUI has been registered with the IEEE. This value identifies the manufacturer of any Ethernet NIC or interface.






18. In the telnet application - commands are always introduced by a character with the decimal code 255 - known as the Interpret as Command character.






19. The client part of the DNS client server mechanism. A DNS resolver creates queries sent a across a network to a same server - interprets responses - and returns information to the requesting programs.






20. A group of 8 binary bits. It is similar to - but not the same as - a byte. One Application in computer network is to use octets to divide IPv4 addresses into four components






21. A term that describes IPv4 packets sent to all hosts in a particular network. In a directed broadcast - a single copy of the packet is routed to the specified network - where it is broadcast to all hosts on that network






22. The process of forwarding frames in a switch or a bridge from one port to another port or from segment to segment






23. Radio frequencies that creat noise that interferes with information being transmitted across unshielded copper cabling.






24. Routing table entry that is used to direct frames for which a next hop is not explicitly listed in the routing table. This route is used to forward a packet when no other known route exists for a give packet's destination address.






25. The spreading of light signal caused by light signals traveling at different speeds through a fiber.






26. A port on cisco devices to which a terminal or computer with a terminal emulator is connected to the network device in order to communicate and configure the network device






27. The IPv4 address block 192.0.2.0 to 192.0.2.255 that is set aside for teaching and learning purposes. These addresses can be used in documentation and network examples.






28. Can refer to computer hardware that is to be used by multiple concurrent users. Alternatively - this term can refer to computer software that provides services to many users. For example - a web server consists of web server software running on some






29. The lower of the two sublayers of the IEEE standard for ethernet. It is also the name of that sublayer






30. Line code in which 1s are represented by one significant condition and 0s are represented by another.






31. A process used to verify the identity of a person or process






32. A plan - design or program of action to be followed. Sometimes an addressing plan is called an addressing SCHEME.






33. Routing that adjusts automatically to network topology or traffic changes.






34. A 1-bit flag in the TCP header that is used to request that a connection be re-established.






35. Line code in which each bit of data is signified by at least one voltage level transition.






36. Path through an internetwork through which packets are forwarded.






37. Represents the 0 in the binary number. In an IP subnet mask - the lower-order bits represent the host portion. Sometimes called the host portion of bits.






38. Translation RFC 1918 addresses to public domain addresses. Because RFC 1918 addresses are not routerd on the Internet - hosts accessing the Internet must use public domain addresses.






39. A part of the ethernet frame that fills in the data field to ensure that the data field meets the minimum size requirement of 46 bytes.






40. In networking - a measurement of the speed of bits that can be transmitted over a particular link. It is the amount of data that can be transmitted in a certain amount of time. For digital bandwidth it is usually expressed in bits per second.






41. The reference to text based logical interfaces on an ios device. These are accesses using telnet or ssh to perform administrative tasks. VTY lines are also called virtual type terminal.






42. The learning of source addresses on incoming frames and adding them to the bridging table. After the table has been completed and when a frame is received on one of the bridge's interfaces - the bridge looks up the frame's destination address in its






43. An international - nonprofit organization for the advancement of technology related to eletricity. IEEE maintains the standards defining many LAN protocols.






44. A network device that has an IPv4 address assigned to it to communication over a network.






45. A 1-bt flag in the TCP header used to indicate the initial value of the sequence number. The SYN flag is only set in the first two segments of the three-way TCP connection establishment sequence.






46. Refers to whether the performance of a device - attached to a particular type of LAN - can be accurately predicted. Token Ring LANS are deterministic - but ethernet LANS are non deterministic.






47. Application-level throughput. It is the number of useful bits per unit of time from a certain source address to a certain destination - excluding protocol overhead and excluding retransmitted data packets.






48. The arrangement of the nodes in a network and the physical connections between them. This is the representation of how the media is used to connect the devices.






49. Physical medium that uses glass or plastic threads to transmit data. A fiber-optic cable consists of a bundle of these threads - each of which is capable of transmitting data into light waves.






50. Communication that uses a common clocking signal. In most synchronous communicatino - one of the communicating devices generates a clock signal into the circuit. Additional timing information is not required in the header.