Test your basic knowledge |

CCNA Network Fundamentals Vocab

Subjects : cisco, it-skills, ccna
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A device on a network that serves as an access point to other networks. A default gateway is used by a host to forward IP packets that have destination addresses outside the local subnet. A router interface typically is used as the default gateway. W






2. The time that passes while some event occurs. In networking - latency typically refers to the time that occurs between when something is sent in a network until it is received by another device.






3. A group of IP addresses that have the same value in the first part of the IP addresses - for the purpose of allowing routing to identify the group by the inital part of the addresses. IP addresses in the same subnet typically sit on the same network






4. A part of the ethernet frame that fills in the data field to ensure that the data field meets the minimum size requirement of 46 bytes.






5. An organization that assigns the numbers important to the proper operation of the TCP/IP protocol and the Internet - including assigning globally unique IP addresses.






6. A network device that accesses a service on another computer remotely by accessing the network.






7. The optical or electrical impulse on a physical medium for purposes of communication.






8. TCP or UDP ports that range from 49152 to 65535 and are not used by any defined server applications.






9. A 32-bit field in the tcp segment header that specifies the sequence number of the next byte this host expects to receive as a part of the TCP session. It is used to recognize lost packets and flow control






10. A dotted decimal number that helps identify the structure of IP addresses. The mask represents the network and subnet parts of related IP addresses with binary 1s and the host part of related IP addresses with binary 0s






11. A device that connects end devices to the network or interconnects different networks. A router is an example of an intermediary device.






12. The ability of a protocol. system or component to be modified to fit a new need.






13. A member of a multicast group. Every multicast client in each group has the same IP address. Multicast addresses begin with 224... and end with 239...






14. A collection of data that establishes a reference for network performance and behavior over a period of time. This reference data is used in the future to assess the health and relative growth of network utilization.






15. A communication path over a medium used to transport information from a sender to a receiver. Multiple channels can be multiplexed over a single cable






16. In networking - a measurement of the speed of bits that can be transmitted over a particular link. It is the amount of data that can be transmitted in a certain amount of time. For digital bandwidth it is usually expressed in bits per second.






17. The header defined by the IP. Used to create IP packets by encapsulating data supplied by higher-layer protocol (such as TCP) behind an IP header.






18. A computer program that runs in the background and is usually initiated as a process. Daemons often support server processes.






19. A process by which an end device - after it receives data over some transmission medium - examines the headers and trailers at each successive higher layer - eventually handing the data to the correct application. Sometimes called de-encapsulation.






20. Any combination of hardware device and/or software application designed to protect network devices from outside network users and/or malicious applications and files.






21. A removable component that has memory space for storage. Used on the router or switch for storing the compressed operating system image.






22. As part of the TCP/IP internet layer - ICMP defines protocol messages used to inform network engineeres of how well an internetwork is working. For example - the ping command sends ICMP messages to determine whether a host can send packets ot another






23. The forwarding of packets where the forwarding decision is taken dynamically - hop by hop - based on the conditions of downstream fowrading nodes.






24. The bit position in a binary number having the greatest value. The most significant bit is sometime referred to as the leftmost bit.






25. A convention for writing IP addresses with four decimal numbers - ranging from 0 to 255 - with each octet representing 8 bits of the 32 bit IP address. The term originates from the fact that each of the four decimal numbers is separated by a period.






26. A protocol used to dynamically assign IP configurations to hosts. The services defined by the protocol are used to request and assign an IP address - default gateway - and DNS server address to a network host.






27. An encoding scheme 4B/5B uses 5-bit symbols and codes to represent 4 bits of data. 4B/5B is used in 100Base-tx ethernet.






28. A common term for 10base2 ethernet - referring to the fact that 10base2 cabling is thinner than coaxial cabling used for 10base5






29. The process by which a device adds networking heads and trailers to data from an application for the eventual transmission of the data onto a transmission medium.






30. A network created for devices located in a limited geographic area - through which the company owning the LAN has the right to run cables.






31. Communication that allows receipt and transmission simultaneously. A station can transmit and receive at the same time. There are no collisions with full-duplex ethernet transmision.






32. The learning of source addresses on incoming frames and adding them to the bridging table. After the table has been completed and when a frame is received on one of the bridge's interfaces - the bridge looks up the frame's destination address in its






33. In ethernet a layer 2 device that receives an electrical signal in one port - interprets the bits - and makes a filtering or forwarding decision about the frame. If it forward - it sends a regenerated signal. Switches typically have many physical por






34. Can refer to computer hardware that is to be used by multiple concurrent users. Alternatively - this term can refer to computer software that provides services to many users. For example - a web server consists of web server software running on some






35. In the telnet application - commands are always introduced by a character with the decimal code 255 - known as the Interpret as Command character.






36. A network topology characterized by a central location connected to multiple hubs. In an extended star - these interconnected hubs may be connected to more hubs. It is essentially a hierarchical topology but typically is drawn with the central site i






37. Defines which wires in a cable should connect to each pin on the connectors on both ends of a cable. For example - a UTP cable used for ethernet - used for a straight-through cable pinout - connects the wire at pin 1 on one end with the pin 1 on the






38. A process used to verify the identity of a person or process






39. An access method used with some LAN technologies by which devices access the media in a controlled manner. This access to the LAN is managed using a small frame called a toke. A device can send only when it has claimed the use of the token.






40. Refers to whether the performance of a device - attached to a particular type of LAN - can be accurately predicted. Token Ring LANS are deterministic - but ethernet LANS are non deterministic.






41. A data link layer address - for example a MAC address






42. The MAC algorithm used by ethernet devices in a shared media. The protocol requires a node wishing to transmit to listen for a carrier signal before trying to send. If a carrier is sensed - the node waits for transmission in progress to finish before






43. A protocol for synchronizing the clocks of computer systems over packet-switch data networks. NTP uses UDP port 123 as its transport layer.






44. Radio frequencies that creat noise that interferes with information being transmitted across unshielded copper cabling.






45. A process used by a switch or bridge to forward broadcasts and unknown destination unicasts. The bridge/switch forwards these frames out all ports except the port on which the frame was received.






46. The number of various unique digits - including 0 that a positional number system uses to represent numbers. For example - in the binary system (base 2) the radix is 2. In the decimal system the radix is 10.






47. The retransmission delay used with CSMA/CD when a collision occurs. The algorithm forces each sender that detected the collisions to delay a random amount of time before attempting to retransmit.






48. Organizations that are responsible for the allocation and registration of Internet number resources within a particular region of the world. These registries include the American Registry for Internet Number for North America; RIPE network coordinati






49. A system of network design characterized by one or more major components that are required to maintain operation.






50. In networking - a general term referring to any energy signal on a transmission medium that is not part of the signal used to transmit data over that medium.






Can you answer 50 questions in 15 minutes?



Let me suggest you:



Major Subjects



Tests & Exams


AP
CLEP
DSST
GRE
SAT
GMAT

Most popular tests