Test your basic knowledge |

CCNA Network Fundamentals Vocab

Subjects : cisco, it-skills, ccna
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. An international - nonprofit organization for the advancement of technology related to eletricity. IEEE maintains the standards defining many LAN protocols.






2. A form of signal modulation where the message information is encoded in the amplitude of series of signal pulses. It transmits data by varying the aplitunes of the individual pulses. This is now obsolete and has been replaced by pulse code modulation






3. A network architecture designed to eliminate network downtime cause by a single point of failure.






4. A grouping of code that meets a certain - already specified - condition for entering in that certain group.






5. A process where multiple digital data streams are combined into one signal.






6. Program used to download and send email. Email clients use POP3 to receive emails and use SMTP to send emails. Also called an email client






7. A type of network cabling that includes twisted-pair wires - with shielding around each pair of wires - as well as another shield around all wires in the cable.






8. Defines the commands - headers and processes by which web server and web browsers transfer files.






9. The process by which a router receives an incoming frame - discards the ata link header and trailer - makes a forwarding decision based on the destination IP address - adds a new data-link header and trailer based on the outgoing interface and forwar






10. Line code in which each bit of data is signified by at least one voltage level transition.






11. A 1-bit flag in the TCP header that is used to request that a connection be re-established.






12. A network created for devices located in a limited geographic area - through which the company owning the LAN has the right to run cables.






13. Unencrypted password used to allow access to privledge EXEC mode from IOS user EXEC mode.






14. Data link layer term describing a device connected to a network.






15. A method of internal processing by LAN switches. The switch must receive the entire frame before it sends the first bit of the frame. Store and forward switch is the method used by cisco switches.






16. A source of information that is highly reliable and known for its accuracy






17. A system of network design characterized by one or more major components that are required to maintain operation.






18. A 1-bit flag in the tcp header that indicates the acknowledgment field is valid.






19. Additional data that is provided with a command to provide information used by the execution of the command. IOS command arguments are entered at the CLI after the command






20. The first half of a MAC address. Manufactures must ensure that the value of the OUI has been registered with the IEEE. This value identifies the manufacturer of any Ethernet NIC or interface.






21. A network device - typically connected to a range of LAN and WAN interfaces - that forwards packets based on their destination IP addresses.






22. A logical network composed of all the computers and networking devices that can be reached by sending a frame to the data link layer broadcast address.






23. Physical medium that uses glass or plastic threads to transmit data. A fiber-optic cable consists of a bundle of these threads - each of which is capable of transmitting data into light waves.






24. A MAC address that can be configured on a device. The LAA can be used in place of the BIA . This means that you can replace a NIC or use a substitute device without changing the address used by the network to access the station.






25. A 1-bit field in the TCP header that is used by a device that wants to terminate its session with the other device. This is done by inserting the FIN flag in the flag field found in the TCP segment






26. In a web browser - an application the browser uses - inside the browser window to display some types of content. For example - a browser typically uses a plug-in to display video.






27. Network protocols or technologies that do not use the acknowledgment system to guarantee reliable delivery of information






28. An address used to represent a transmission from one device to all devices. In ethernet - the sepcial ethernet address FFFF.FFFF.FFFF is used as a destination MAC address to cause a frame to be sent to all devices on an ethernet LAN. In IPV4 - each s






29. The loss of communication signal on the media. This loss is due to degradation of the energy wave over time.






30. A unicast IP address that is considered to have three parts: a network part - a subnet part - and a host part. The term classful refers to the fact that classful network rules are first applied to the address - and then the rest of the address can be






31. The largest IP packet size allowed to be sent out a particular interface. Ethernet interfaces default to an MTU of 1500 because the data field of an Ethernet frame should be limited to 1500 bytes - and the IP packet sits inside the ethernet frame's d






32. An application protocol typically not used by end users. Instead - it is used by the network management software and networking devices to allow a network engineer to monitor and troubleshoot network problems.






33. A group of 8 binary bits. It is similar to - but not the same as - a byte. One Application in computer network is to use octets to divide IPv4 addresses into four components






34. In TCP - the process of taking a large chunk of data and breaking it into small enough pieces to fit within a TCP segment without breaking any rules about the maximum amount of data allowed in a segment.






35. A port on cisco devices to which a terminal or computer with a terminal emulator is connected to the network device in order to communicate and configure the network device






36. In ethernet a layer 2 device that receives an electrical signal in one port - interprets the bits - and makes a filtering or forwarding decision about the frame. If it forward - it sends a regenerated signal. Switches typically have many physical por






37. A dotted decimal number that helps identify the structure of IP addresses. The mask represents the network and subnet parts of related IP addresses with binary 1s and the host part of related IP addresses with binary 0s






38. A network that is connected to a device's interface. For example networks that interface with the router are known to be directly connected. Devices learn their initial IP routes based on being connected to these subnets.






39. A network topology characterized by a central location connected to multiple hubs. In an extended star - these interconnected hubs may be connected to more hubs. It is essentially a hierarchical topology but typically is drawn with the central site i






40. A time period between ethernet frames that allows fairness with the CSMA/CD algorithm. Without a space between frames in other words - without some time with no frames being sent a NIC might always listen for silence - never hear silence and therefor






41. The number of various unique digits - including 0 that a positional number system uses to represent numbers. For example - in the binary system (base 2) the radix is 2. In the decimal system the radix is 10.






42. The actual data transfer rate between two computers at some point in time. Throughput is impacted by the slowest-speed link used to send data between the two computers - as well as myriad variables that might change during the course of a day.






43. The time that passes while some event occurs. In networking - latency typically refers to the time that occurs between when something is sent in a network until it is received by another device.






44. The MAC address that is permanently assigned to a LAN interface or NIC. It is called burned-in because the address is burned into a chip on the card - and the address cannot be changed. Also called universally administered address.






45. A signal on a medium used to support the transmission of data. Data is carried over the medium by modulation.






46. An ethernet frame that is less than 64 bytes in size. Runts are caused by collisions and are also know as collision fragments






47. The structure and order of words in a computer language






48. The process of obscuring information to make it unreadable without special knowledge - somtimes referred to as scrambling. The process takes the data to be encrypted and applies a mathematical formula to it along with a secret number. The resulting v






49. A technique used to attack an ethernet network by sending fake ARP messages to an ethernet LAN. These frames contain false MAC addresses that confuse network devices - such as switches. As a result - frames intended for one node can be mistakenly sen






50. In networking - a measurement of the speed of bits that can be transmitted over a particular link. It is the amount of data that can be transmitted in a certain amount of time. For digital bandwidth it is usually expressed in bits per second.