Test your basic knowledge |

CCNA Network Fundamentals Vocab

Subjects : cisco, it-skills, ccna
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. An internet wide system by which a hierarchical set of DNS servers collectively hold all the name IP address mappings - with DNS servers referring users to the correct DNS server to successfully resolve a DNS name.






2. A list of router holds in memory for the purpose of deciding how to forward packets.






3. The IPv4 address block 192.0.2.0 to 192.0.2.255 that is set aside for teaching and learning purposes. These addresses can be used in documentation and network examples.






4. A group of devices associated by the arrangement of a hierarchial addressing scheme. Devices in the same logical network that share a common network portion of their Layer 3 addresses.






5. A name - as defined by DNS that uniquely identifies a computer in the internet. DNS servers can then respond to the DNS requests by supplying the IP address that is used by the computer that has a particular domain name. This term also refers to the






6. A unit of measurement of the number of times 1000 bits can be transmitted in 1 second. 1 kbps = 1000bps






7. An IP address that has been registered with IANA or one of its member agencies - which guarantees that the address is globally unique. Globally unique public IP addresses can be used for packets sent through the Internet.






8. The networking layers whose processes are not affected by the media being used. In ethernet - these are all the layers from the LLC sublayer of data link upward.






9. Radio frequencies that creat noise that interferes with information being transmitted across unshielded copper cabling.






10. A group defined by a class D address (multicast - ranging from 224.0.0.0 to 239.255.255.255) - whereupon hosts can pertain to multicast groups. Hosts that have the same multicast address are part of the same host group.






11. The limited CLI mode where the commands available to the user are a subset of those available at the privileged level. In general - use the user Exec commands to temporarily change terminal settings - perform basic tests and list system information.






12. Physical medium that uses glass or plastic threads to transmit data. A fiber-optic cable consists of a bundle of these threads - each of which is capable of transmitting data into light waves.






13. A collection of data that establishes a reference for network performance and behavior over a period of time. This reference data is used in the future to assess the health and relative growth of network utilization.






14. A high-speed line or series of connections that forms a major pathway within a network. The term is often used to describe the main network connections comprising the Internet.






15. The retransmission delay used with CSMA/CD when a collision occurs. The algorithm forces each sender that detected the collisions to delay a random amount of time before attempting to retransmit.






16. A 1-bit flag in the TCP header used to indicate that the receiving host should notify the destination process to do urgent processing.






17. A dotted decimal number that helps identify the structure of IP addresses. The mask represents the network and subnet parts of related IP addresses with binary 1s and the host part of related IP addresses with binary 0s






18. Routing that adjusts automatically to network topology or traffic changes.






19. A logical connection between devices in which the frames are passed between the devices. Virtual circuits are independent of the physical structure and may be established through multiple physical devices.






20. A protocol that allows a computer to retrieve email from a server.






21. Communication that allows receipt and transmission simultaneously. A station can transmit and receive at the same time. There are no collisions with full-duplex ethernet transmision.






22. Also known as boolean algebra. These consist of the AND OR and IF operations






23. Communication that does not use a common clock between the sender and receiver. To maintain timing - additional information is sent to synchronize the receive circuit to the incoming data. For ethernet at 10MBPS - the ethernet devices do not send ele






24. A member of a multicast group. Every multicast client in each group has the same IP address. Multicast addresses begin with 224... and end with 239...






25. A group of 8 binary bits. It is similar to - but not the same as - a byte. One Application in computer network is to use octets to divide IPv4 addresses into four components






26. In networking - a general term referring to any energy signal on a transmission medium that is not part of the signal used to transmit data over that medium.






27. DNS data records. Their precise format is defined in RFC 1035. The most important fields in a resource record are Name - class - type and data.






28. The ability of a protocol. system or component to be modified to fit a new need.






29. The normal operation of ethernet ports on a hub. In this mode - the mapping of the wire pairs in the hub port is in a normal configuration. Some hubs provide a media-dependent interface/media-dependent interface - crossover switch. This switch is usu






30. The largest IP packet size allowed to be sent out a particular interface. Ethernet interfaces default to an MTU of 1500 because the data field of an Ethernet frame should be limited to 1500 bytes - and the IP packet sits inside the ethernet frame's d






31. The dividing of IP datagrams to meet the MTU requirement of a layer 2 protocol.






32. A network device that has an IPv4 address assigned to it to communication over a network.






33. The MAC address that is permanently assigned to a LAN interface or NIC. It is called burned-in because the address is burned into a chip on the card - and the address cannot be changed. Also called universally administered address.






34. TCP or UDP ports that range from 49152 to 65535 and are not used by any defined server applications.






35. Used by tcp or udp - with values between 0 and 1023 - these ports are allocated by high-privilege processes. They are used so that all clients know the correct port number to connect to.






36. From the priviledged mode - you can enter the device's global caonfiguration mode. From global configuration mode - you can configure global parameters or enter other configuration submodes such as interface - router and line configuration submodes.






37. An entry in an IP routing table that was created because a network engineer entered the routing information into the router's configuration.






38. An organization that assigns the numbers important to the proper operation of the TCP/IP protocol and the Internet - including assigning globally unique IP addresses.






39. Another form of the root word converge in the phrase converged network. This kind of network aggregates various forms of traffic such as voice - video and data on the same network infrastructure. A more common usage represents the process by which ro






40. Network layer protocol in the TCP/IP stack offering a connectionless internetwork service. IP provides features for addressing - type-of-service specification - fragmentation and reassembly - and security.






41. Part of a company's intranet that is extended to users outside the company






42. A 32-bit field in the tcp segment header that specifies the sequence number of the next byte this host expects to receive as a part of the TCP session. It is used to recognize lost packets and flow control






43. The process of forwarding frames in a switch or a bridge from one port to another port or from segment to segment






44. A technique used to attack an ethernet network by sending fake ARP messages to an ethernet LAN. These frames contain false MAC addresses that confuse network devices - such as switches. As a result - frames intended for one node can be mistakenly sen






45. A 32-bit number - written in dotted decimal notation - used by the IP to uniquely identify an interface connected to an IP network. It is also used as a destination address in an IP header to allow routing - and as a source address to allow a compute






46. A group of IP addresses that have the same value in the first part of the IP addresses - for the purpose of allowing routing to identify the group by the inital part of the addresses. IP addresses in the same subnet typically sit on the same network






47. A MAC address that can be configured on a device. The LAA can be used in place of the BIA . This means that you can replace a NIC or use a substitute device without changing the address used by the network to access the station.






48. A process where multiple digital data streams are combined into one signal.






49. Any combination of hardware device and/or software application designed to protect network devices from outside network users and/or malicious applications and files.






50. The extent of a certain item. For example - an address scope is also known as a range of addresses from beginning of the range to the end.