Test your basic knowledge |

CCNA Network Fundamentals Vocab

Subjects : cisco, it-skills, ccna
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. The forwarding of packets where the forwarding decision is taken dynamically - hop by hop - based on the conditions of downstream fowrading nodes.






2. An IP address that has been registered with IANA or one of its member agencies - which guarantees that the address is globally unique. Globally unique public IP addresses can be used for packets sent through the Internet.






3. Defines which wires in a cable should connect to each pin on the connectors on both ends of a cable. For example - a UTP cable used for ethernet - used for a straight-through cable pinout - connects the wire at pin 1 on one end with the pin 1 on the






4. Using values between 1024 and 49 -151 these numbers are equivalent to well-known ports in concept - but they are specifically used for nonprivileged application processes.






5. A generic term from OSI that refers to the data - headers - and trailers about which a particular network layer is concerned.






6. Communication that only allows one station to receive while the other station is transmitting






7. An organization that assigns the numbers important to the proper operation of the TCP/IP protocol and the Internet - including assigning globally unique IP addresses.






8. A process used to verify the identity of a person or process






9. A source of information that is highly reliable and known for its accuracy






10. Unencrypted password used to allow access to privledge EXEC mode from IOS user EXEC mode.






11. A method of computer processing in which different parts of a program run simultaneously on two or more computers that are communicating with each other over a network






12. A network device that accesses a service on another computer remotely by accessing the network.






13. The design on networks that can continue to operate without interruption in the case of hardware - software or communications failures.






14. A 1-bit flag in the TCP header used to indicate that the receiving host should notify the destination process to do urgent processing.






15. A 1-bit flag in the TCP header that is used to request to the higher layers for immediate delivery of the packet.






16. The learning of source addresses on incoming frames and adding them to the bridging table. After the table has been completed and when a frame is received on one of the bridge's interfaces - the bridge looks up the frame's destination address in its






17. Path through an internetwork through which packets are forwarded.






18. The retransmission delay used with CSMA/CD when a collision occurs. The algorithm forces each sender that detected the collisions to delay a random amount of time before attempting to retransmit.






19. Organizations that are responsible for the allocation and registration of Internet number resources within a particular region of the world. These registries include the American Registry for Internet Number for North America; RIPE network coordinati






20. The passage of a data packet between two network nodes.






21. A plan - design or program of action to be followed. Sometimes an addressing plan is called an addressing SCHEME.






22. The actual data transfer rate between two computers at some point in time. Throughput is impacted by the slowest-speed link used to send data between the two computers - as well as myriad variables that might change during the course of a day.






23. Data that directs a process. a flag in a data-link frame is an example of control data.






24. A special reserved IPv4 address - 127.0.0.1 that can be used to test TCP/IP applications. Packets sent to 127.0.0.1 by a computer never leave the computer or even require working NIC. Instead - the packet is processed by IP at the lowest layer and is






25. A 1-bt flag in the TCP header used to indicate the initial value of the sequence number. The SYN flag is only set in the first two segments of the three-way TCP connection establishment sequence.






26. In LAN switches a reference to cases in which a frame is forwarded - or switche - when the incoming and outgoing interfaces use the same speed. It is the opposite of asymmetric switching.






27. A process that uses the same ARP messages as a normal ARP - but by which a router replies instead of the host listed in the ARP request. When a router sees an ARP request that cannot reach the intended host - but for which the router knows a route to






28. A group of 8 binary bits. It is similar to - but not the same as - a byte. One Application in computer network is to use octets to divide IPv4 addresses into four components






29. Routing that adjusts automatically to network topology or traffic changes.






30. In a shared media ethernet network - a signal generated by the transmitting devices that detects the collision. The jam signal continue to transmit for a specified period to ensure that all devices on the network detect the collision. The jame signal






31. The process by which a device adds networking heads and trailers to data from an application for the eventual transmission of the data onto a transmission medium.






32. The MAC address that is permanently assigned to a LAN interface or NIC. It is called burned-in because the address is burned into a chip on the card - and the address cannot be changed. Also called universally administered address.






33. 1.collection of computers - printers - routers - switches - and other devices that can communication with each other over some transmission medium. 2. command that assgins a NIC based address to which the router is directly connected.






34. The time required to send a single bit over some transmission medium. The time can be calculated at 1/speed - where speed is the number of bits per second sent over the medium






35. A layer 4 protocl of TCP/IP model - TCP lets applications guarantee delivery of data across a network.






36. An entry in an IP routing table that was created because a network engineer entered the routing information into the router's configuration.






37. A logical network composed of all the computers and networking devices that can be reached by sending a frame to the data link layer broadcast address.






38. An addressing scheme in which a network is partitioned into sections - with the section identifier forming one part of each destination's address and the destination identifier forming another






39. A system of network design characterized by one or more major components that are required to maintain operation.






40. A device that connects to a local digital telephone loop for a WAN circuit to a serial interface on a network device - typically connecting to a router. The CSU/DSU performs physical Layer 1 signaling on WAN circuits






41. A group that receives a multicast transmission. The members of a multicast group have the same mulitcast IP addressing to receive the same transmission.






42. The normal operation of ethernet ports on a hub. In this mode - the mapping of the wire pairs in the hub port is in a normal configuration. Some hubs provide a media-dependent interface/media-dependent interface - crossover switch. This switch is usu






43. The IEEE 802.2 standard that defines the upper sublayer of the Ethernet Layer 2 specifications.






44. An internationally recognized definition of technical specifications that ensure worldwide consistency.






45. When used generically - this term refers to end-user data along with networking headers and trailers that are transmitted through a network. When used specifically - it is end-user data - along with the network or Internet layer headers and any highe






46. The IPv4 multicast addresses 224.0.0.0 to 224.0.0.255. These addresses are to be used for multicast groups on a local network. Packets to these destinations are always transmitted with a TTTL value of 1






47. Represents the 0 in the binary number. In an IP subnet mask - the lower-order bits represent the host portion. Sometimes called the host portion of bits.






48. A protocol for synchronizing the clocks of computer systems over packet-switch data networks. NTP uses UDP port 123 as its transport layer.






49. An application protocol typically not used by end users. Instead - it is used by the network management software and networking devices to allow a network engineer to monitor and troubleshoot network problems.






50. A popular certification method for fiber systems. The OTDR injects light into the fiber and then graphically displays the results of the detected reflected light. The OTDR measures the elapsed transit time of reflected light to calculate the distance