SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CCNA Network Fundamentals Vocab
Start Test
Study First
Subjects
:
cisco
,
it-skills
,
ccna
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. The bit position in a binary number having the greatest value. The most significant bit is sometime referred to as the leftmost bit.
host address
filtering
delimiter
most significant bit
2. Line code in which each bit of data is signified by at least one voltage level transition.
Internet Engineering Task Force
manchester encoding
distributed
cloud
3. A notification sent from one network device to another to confirm that some event has occured.
Internet backbone
acknowledgment
host address
media-dependent interface (MDI)
4. Program used to download and send email. Email clients use POP3 to receive emails and use SMTP to send emails. Also called an email client
Mail user agent
bit
gateway
directed broadcast
5. A technique used to attack an ethernet network by sending fake ARP messages to an ethernet LAN. These frames contain false MAC addresses that confuse network devices - such as switches. As a result - frames intended for one node can be mistakenly sen
most significant bit
administratively scoped address
nonvolatile RAM (NVRAM)
ARP poisoning
6. Using values between 1024 and 49 -151 these numbers are equivalent to well-known ports in concept - but they are specifically used for nonprivileged application processes.
routing
thinnet
cloud
registered ports
7. An international standards body that defines many networking standards. Also - the standards body that created the OSI model.
transparent bridging
International Organization for Standardization
gigabit ethernet
channel service unit/data service unit
8. A process used by a switch or bridge to forward broadcasts and unknown destination unicasts. The bridge/switch forwards these frames out all ports except the port on which the frame was received.
flooding
Logical link control
host group
RJ-45
9. A group of devices associated by the arrangement of a hierarchial addressing scheme. Devices in the same logical network that share a common network portion of their Layer 3 addresses.
logical network
kilobits per second
globally scoped addresses
RST
10. A popular certification method for fiber systems. The OTDR injects light into the fiber and then graphically displays the results of the detected reflected light. The OTDR measures the elapsed transit time of reflected light to calculate the distance
Optical time domain reflectometer
query
Logical link control
dns resolver
11. Routing table entry that is used to direct frames for which a next hop is not explicitly listed in the routing table. This route is used to forward a packet when no other known route exists for a give packet's destination address.
default route
physical topology
Optical time domain reflectometer
best effort
12. The devices and connections of a communications network that comprise the network end of the user to network interface. The DCE provides a physical connection to the network - forwards traffic - and provides a clocking signal used to synchronize data
multicast client
gateway
IP header
data communications equipment
13. A type of hash function that is used to produce a small - fixed size checksum of a block of data - such as a packet or a computer file. A CRC is computed and appended before transmission or storage - and verified afterward by the recipient to confirm
peer
domain name system
cyclic redundancy check
redundancy
14. The spreading of light signal caused by light signals traveling at different speeds through a fiber.
dispersion
keyword
bandwidth
dynamic host configuration protocol
15. Binary digit used in the binary numbering system. Binary digits are units of information storage and communication in computing. Each bit can be either a 0 or a 1.
bit
syntax
source
RJ-45
16. A protocol that allows a computer to retrieve email from a server.
bridging
RJ-45
post office protocol
jam signal
17. The management of data flow between devices in a network. It is used to avoid too much data arriving before a device can handle it - causing data overflow.
flow control
goodput
internetwork
address pool
18. The layer 2 pdu that has been encoded by a data link layer protocol for digital transmission. Some different kinds of frames are ethernet frames and PPP frames.
jam signal
frame
virtual circuit
Network address translation (NAT)
19. Network protocols or technologies that do not use the acknowledgment system to guarantee reliable delivery of information
best effort
host address
carrier sense multiple access collision detect (CSMA/CD)
data termianl equipment
20. A network of computers that behave as if they are connected to the same network segment - even through they might be physically located on different segments of a LAN. VLANs are configured through software on the switch and router.
daemon
carrier
virtual local area network
International Organization for Standardization
21. Random-access memory that does not lose its contents when the computer is shut down
nonvolatile RAM (NVRAM)
carrier sense multiple access collision detect (CSMA/CD)
shielded twisted pair cable
dotted decimal
22. The actual data transfer rate between two computers at some point in time. Throughput is impacted by the slowest-speed link used to send data between the two computers - as well as myriad variables that might change during the course of a day.
RST
throuhpu
Regional Internet Registries
Logical link control
23. Unencrypted password used to allow access to privledge EXEC mode from IOS user EXEC mode.
connectionless
ARP poisoning
enable password
Internet control message protocol
24. A 1-bit flag in the TCP header that is used to request to the higher layers for immediate delivery of the packet.
PSH
noise
limited broadcast
loopback
25. An internationally recognized definition of technical specifications that ensure worldwide consistency.
TCP/IP
acknowledgment number
standards
link-local address
26. Communication that allows receipt and transmission simultaneously. A station can transmit and receive at the same time. There are no collisions with full-duplex ethernet transmision.
limited broadcast
full duplex
Address resolution protocol
dynamic routing
27. The MAC algorithm used by ethernet devices in a shared media. The protocol requires a node wishing to transmit to listen for a carrier signal before trying to send. If a carrier is sensed - the node waits for transmission in progress to finish before
nonvolatile RAM (NVRAM)
media-dependent interface (MDI)
TCP/IP
carrier sense multiple access collision detect (CSMA/CD)
28. In networking - a general term referring to any energy signal on a transmission medium that is not part of the signal used to transmit data over that medium.
noise
argument
channel service unit/data service unit
filtering
29. A source of information that is highly reliable and known for its accuracy
segmentation
slash format
SYN
authoritative
30. A collection of data that establishes a reference for network performance and behavior over a period of time. This reference data is used in the future to assess the health and relative growth of network utilization.
association identity AID
network baseline
Internet control message protocol
Time to live
31. A special reserved IPv4 address - 127.0.0.1 that can be used to test TCP/IP applications. Packets sent to 127.0.0.1 by a computer never leave the computer or even require working NIC. Instead - the packet is processed by IP at the lowest layer and is
redundancy
bridge
priority queing
loopback
32. A group defined by a class D address (multicast - ranging from 224.0.0.0 to 239.255.255.255) - whereupon hosts can pertain to multicast groups. Hosts that have the same multicast address are part of the same host group.
thinnet
host group
manchester encoding
ethernet PHY
33. The retransmission delay used with CSMA/CD when a collision occurs. The algorithm forces each sender that detected the collisions to delay a random amount of time before attempting to retransmit.
dispersion
backoff algorithm
acknowledgment
dns resolver
34. A layer 4 protocl of TCP/IP model - TCP lets applications guarantee delivery of data across a network.
user executive mode
attenuation
TCP
electromagnetic interface
35. An international - nonprofit organization for the advancement of technology related to eletricity. IEEE maintains the standards defining many LAN protocols.
jam signal
convergence
Institute of Electrical and Electronics Engineers
physical network
36. A type of network cabling that includes twisted-pair wires - with shielding around each pair of wires - as well as another shield around all wires in the cable.
shielded twisted pair cable
Interpret as command
virtual terminal line
carrier sense multiple access collision detect (CSMA/CD)
37. One of the three basic binary logic operations. ANDing yields the following result: 1 and 1 = 1 - 1 and 0 = 0 - 0 and 1 = 0
syntax
symmetric switching
registered ports
AND
38. A network created for devices located in a limited geographic area - through which the company owning the LAN has the right to run cables.
shielded twisted pair cable
channel
transparent bridging
local area network
39. A plan - design or program of action to be followed. Sometimes an addressing plan is called an addressing SCHEME.
physical media
prefix length
scheme
PSH
40. In ethernet - the results of two nodes transmitting simlutaneously. The signals from each device are damaged when they combine on the media
domain name
collision
enable password
user executive mode
41. A MAC address that can be configured on a device. The LAA can be used in place of the BIA . This means that you can replace a NIC or use a substitute device without changing the address used by the network to access the station.
public address
FIN
locally administered address
globally scoped addresses
42. An application level network protocl mainly applied to shared access to files - printers - serial ports - and miscellaneous communications between nodes on a network.
filtering
server message block
decapsulation
prviate address
43. A group of IP addresses that have the same value in the first part of the IP addresses - for the purpose of allowing routing to identify the group by the inital part of the addresses. IP addresses in the same subnet typically sit on the same network
Internet Engineering Task Force
registered ports
virtual circuit
subnet
44. International standardization program created by ISO and ITU-T to develop standards for data networking that facilitate multivendor equipment interoperability
Open systems interconnection
link-local address
prviate address
metropolitan-area network
45. In the telnet application - commands are always introduced by a character with the decimal code 255 - known as the Interpret as Command character.
Interpret as command
pulse amplitude modulation
transparent bridging
instant messaging
46. The IP address of the originating host that is placed into the IP packet header.
static route
source IP address
router
association identity AID
47. A temporary storage where data that has been retrieved or calculated and is accessed frequently can be stored. After the data is stored in the cache - the processes can access the cached copy instead of accessing the original data. A cache reduces th
loopback
Time to live
FIN
cache
48. A 32-bit number - written in dotted decimal notation - used by the IP to uniquely identify an interface connected to an IP network. It is also used as a destination address in an IP header to allow routing - and as a source address to allow a compute
Internet control message protocol
Thicknet
distributed
IP address
49. Resources used to manage or operate the network. Overhead consumes bandwidth and reduces the amount of application data that can be transported across the network.
maximum transmission unit
overhead
bridging
redundancy
50. In ethernet - the process performed by a bridge or switch when it decides that it should send a frame out another port.
low-order bit
standards
extended star
forwarding