Test your basic knowledge |

CCNA Network Fundamentals Vocab

Subjects : cisco, it-skills, ccna
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Routing table entry that is used to direct frames for which a next hop is not explicitly listed in the routing table. This route is used to forward a packet when no other known route exists for a give packet's destination address.






2. Interface by magnetic signals caused by the flow of electricity. EMI can cause reduced data integrity and increased error rates on transmission channels. The physics of this process are that electrical current creates magnetic fields - which in turn






3. DNS data records. Their precise format is defined in RFC 1035. The most important fields in a resource record are Name - class - type and data.






4. The bit position in a binary number having the greatest value. The most significant bit is sometime referred to as the leftmost bit.






5. A broadcast that is sent to a specific network or series of networks.






6. A network device - typically connected to a range of LAN and WAN interfaces - that forwards packets based on their destination IP addresses.






7. A part of the ethernet frame that fills in the data field to ensure that the data field meets the minimum size requirement of 46 bytes.






8. Part of a company's intranet that is extended to users outside the company






9. A protocol used between routers so that they can learn routes to add to their routing tables.






10. Data that directs a process. a flag in a data-link frame is an example of control data.






11. A time period between ethernet frames that allows fairness with the CSMA/CD algorithm. Without a space between frames in other words - without some time with no frames being sent a NIC might always listen for silence - never hear silence and therefor






12. A method of computer processing in which different parts of a program run simultaneously on two or more computers that are communicating with each other over a network






13. Communication that does not use a common clock between the sender and receiver. To maintain timing - additional information is sent to synchronize the receive circuit to the incoming data. For ethernet at 10MBPS - the ethernet devices do not send ele






14. The optical or electrical impulse on a physical medium for purposes of communication.






15. Physical medium that uses glass or plastic threads to transmit data. A fiber-optic cable consists of a bundle of these threads - each of which is capable of transmitting data into light waves.






16. In networking - a measurement of the speed of bits that can be transmitted over a particular link. It is the amount of data that can be transmitted in a certain amount of time. For digital bandwidth it is usually expressed in bits per second.






17. In LAN switches a reference to cases in which a frame is forwarded - or switche - when the incoming and outgoing interfaces use the same speed. It is the opposite of asymmetric switching.






18. The learning of source addresses on incoming frames and adding them to the bridging table. After the table has been completed and when a frame is received on one of the bridge's interfaces - the bridge looks up the frame's destination address in its






19. A routing feature in which frames in an interface output queue are prioritized based on various characteristics such as packet size and interface type.






20. In ethernet - the process performed by a bridge or switch when it decides that it should send a frame out another port.






21. International standardization program created by ISO and ITU-T to develop standards for data networking that facilitate multivendor equipment interoperability






22. Routing that adjusts automatically to network topology or traffic changes.






23. An application protocol typically not used by end users. Instead - it is used by the network management software and networking devices to allow a network engineer to monitor and troubleshoot network problems.






24. Defines which wires in a cable should connect to each pin on the connectors on both ends of a cable. For example - a UTP cable used for ethernet - used for a straight-through cable pinout - connects the wire at pin 1 on one end with the pin 1 on the






25. A 32-bit number - written in dotted decimal notation - used by the IP to uniquely identify an interface connected to an IP network. It is also used as a destination address in an IP header to allow routing - and as a source address to allow a compute






26. Define in RFC 1918 - an IP address that does not have to be globally unique because the address exists inside packets only when the packets are inside a single private IP internetwork. Private IP addresses are popularly used in most company today - w






27. The table used by a switch or bridge that associates MAC addresses with the outgoing port. The switch or bridge uses this table for its forwarding/filtering decisions.






28. A logical storage in the host's RAM to store ARP entries






29. In the telnet application - commands are always introduced by a character with the decimal code 255 - known as the Interpret as Command character.






30. A protocol used to dynamically assign IP configurations to hosts. The services defined by the protocol are used to request and assign an IP address - default gateway - and DNS server address to a network host.






31. Ethernet that transmits data at 1 -000 -000 -000 one billion bits per second.






32. In a web browser - an application the browser uses - inside the browser window to display some types of content. For example - a browser typically uses a plug-in to display video.






33. A network model defined by the IETF that has been implemented on most computers and network device in the world.






34. A network device that has an IPv4 address assigned to it to communication over a network.






35. The glass fibers inside certain cables over which light is transmitted to encode 0 and 1






36. A technique used to attack an ethernet network by sending fake ARP messages to an ethernet LAN. These frames contain false MAC addresses that confuse network devices - such as switches. As a result - frames intended for one node can be mistakenly sen






37. A group that receives a multicast transmission. The members of a multicast group have the same mulitcast IP addressing to receive the same transmission.






38. The time required for some network pdu's to be sent and received - and a response PDU to be sent and received. In other words - the time between when a device sends data and when the same device receives a response.






39. A type of hash function that is used to produce a small - fixed size checksum of a block of data - such as a packet or a computer file. A CRC is computed and appended before transmission or storage - and verified afterward by the recipient to confirm






40. The layer 3 address to which the data is going.






41. A generic term from OSI that refers to the data - headers - and trailers about which a particular network layer is concerned.






42. The standards body responsible for the development and approval of TCP/IP standards






43. A device on a network that serves as an access point to other networks. A default gateway is used by a host to forward IP packets that have destination addresses outside the local subnet. A router interface typically is used as the default gateway. W






44. Used in the CLI following the command. Keywords are parameters that are used with the command from a set of predefined values.






45. The MAC address that is permanently assigned to a LAN interface or NIC. It is called burned-in because the address is burned into a chip on the card - and the address cannot be changed. Also called universally administered address.






46. A special reserved IPv4 address - 127.0.0.1 that can be used to test TCP/IP applications. Packets sent to 127.0.0.1 by a computer never leave the computer or even require working NIC. Instead - the packet is processed by IP at the lowest layer and is






47. Binary digit used in the binary numbering system. Binary digits are units of information storage and communication in computing. Each bit can be either a 0 or a 1.






48. From the priviledged mode - you can enter the device's global caonfiguration mode. From global configuration mode - you can configure global parameters or enter other configuration submodes such as interface - router and line configuration submodes.






49. A corporate system such as a website that is explicitly used by internal employees. Can be assessed internally or remotely






50. A command on many computer operating systems that discovers the IP addresses - and possibly host names - of the routers used by the network when sending a packet from one computer to another.