Test your basic knowledge |

CCNA Network Fundamentals Vocab

Subjects : cisco, it-skills, ccna
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Any communication in which the sender and receiver do not prearrange for communications to occur






2. A logical network composed of all the computers and networking devices that can be reached by sending a frame to the data link layer broadcast address.






3. The header defined by the IP. Used to create IP packets by encapsulating data supplied by higher-layer protocol (such as TCP) behind an IP header.






4. The process of obscuring information to make it unreadable without special knowledge - somtimes referred to as scrambling. The process takes the data to be encrypted and applies a mathematical formula to it along with a secret number. The resulting v






5. A device such as a desktop or mobile device that is used by an end user.






6. A data link layer address - for example a MAC address






7. A generic term from OSI that refers to the data - headers - and trailers about which a particular network layer is concerned.






8. To transfer data from the computer functioning as a server to the client computer you are using.






9. A logical storage in a host's RAM to store arp entries.






10. DNS data records. Their precise format is defined in RFC 1035. The most important fields in a resource record are Name - class - type and data.






11. The physical interface transceivers. It deals with Layer 1 (the physical layer - hence the PHY) of ethernet.






12. A host or node that participates in some form of a group. For example - p2p technology defines a group of peers that participate jointly in the same activity - each one having a server and client component.






13. Program used to download and send email. Email clients use POP3 to receive emails and use SMTP to send emails. Also called an email client






14. A temporary storage where data that has been retrieved or calculated and is accessed frequently can be stored. After the data is stored in the cache - the processes can access the cached copy instead of accessing the original data. A cache reduces th






15. In networking - a general term referring to any energy signal on a transmission medium that is not part of the signal used to transmit data over that medium.






16. A part of the ethernet frame that fills in the data field to ensure that the data field meets the minimum size requirement of 46 bytes.






17. Random-access memory that does not lose its contents when the computer is shut down






18. Physical medium that uses glass or plastic threads to transmit data. A fiber-optic cable consists of a bundle of these threads - each of which is capable of transmitting data into light waves.






19. The layer 3 address to which the data is going.






20. A broadcast that is sent to a specific network or series of networks.






21. The optical or electrical impulse on a physical medium for purposes of communication.






22. An application protocol typically not used by end users. Instead - it is used by the network management software and networking devices to allow a network engineer to monitor and troubleshoot network problems.






23. An internationally recognized definition of technical specifications that ensure worldwide consistency.






24. The number of various unique digits - including 0 that a positional number system uses to represent numbers. For example - in the binary system (base 2) the radix is 2. In the decimal system the radix is 10.






25. A process by which an end device - after it receives data over some transmission medium - examines the headers and trailers at each successive higher layer - eventually handing the data to the correct application. Sometimes called de-encapsulation.






26. The IPv4 multicast addresses 224.0.0.0 to 224.0.0.255. These addresses are to be used for multicast groups on a local network. Packets to these destinations are always transmitted with a TTTL value of 1






27. In ethernet - the process performed by a bridge or switch when it decides that it should send a frame out another port.






28. The bit position in a binary number having the greatest value. The most significant bit is sometime referred to as the leftmost bit.






29. The network that combines enterprise networks - individual users - and ISPs into a single global IP network.






30. A type of network cabling that includes twisted-pair wires - with shielding around each pair of wires - as well as another shield around all wires in the cable.






31. A command on many computer operating systems that discovers the IP addresses - and possibly host names - of the routers used by the network when sending a packet from one computer to another.






32. An IPV4 addressing scheme that uses a subnet mask that does not follow classful addressing limitations. It provides increased flexibility when dividing ranges of IP addresses into separate networks. Classless addressing is considered the best in curr






33. A name - as defined by DNS that uniquely identifies a computer in the internet. DNS servers can then respond to the DNS requests by supplying the IP address that is used by the computer that has a particular domain name. This term also refers to the






34. In LAN switches a reference to cases in which a frame is forwarded - or switche - when the incoming and outgoing interfaces use the same speed. It is the opposite of asymmetric switching.






35. A network topology characterized by a central location connected to multiple hubs. In an extended star - these interconnected hubs may be connected to more hubs. It is essentially a hierarchical topology but typically is drawn with the central site i






36. A dotted decimal number defined by the IPv4 protocol to represent a network or subnet. It represents the network that hosts reside in. Also called a network number or network ID.






37. The structure and order of words in a computer language






38. Can refer to computer hardware that is to be used by multiple concurrent users. Alternatively - this term can refer to computer software that provides services to many users. For example - a web server consists of web server software running on some






39. The extent of a certain item. For example - an address scope is also known as a range of addresses from beginning of the range to the end.






40. A 32-bit number - written in dotted decimal notation - used by the IP to uniquely identify an interface connected to an IP network. It is also used as a destination address in an IP header to allow routing - and as a source address to allow a compute






41. A control mechanism that can provide different priorities to different users or data flows - or guarantee a certain level of performance to a data flow in accordance with requests from the application program.






42. Communication that does not use a common clock between the sender and receiver. To maintain timing - additional information is sent to synchronize the receive circuit to the incoming data. For ethernet at 10MBPS - the ethernet devices do not send ele






43. The standards body responsible for the development and approval of TCP/IP standards






44. A network device that accesses a service on another computer remotely by accessing the network.






45. The design on networks that can continue to operate without interruption in the case of hardware - software or communications failures.






46. The method of for finding a host's hardware address from its IPv4 network layer address.






47. A numbering system characterized by 1 and 0






48. A network architecture designed to eliminate network downtime cause by a single point of failure.






49. A map of the devices on a network representing how the devices communcate with each other.






50. An IPv4 address in the range of 169.254.1.0 to 169.254.254.255. Communication using these addresses is used with a ttl of 1 and limited to the local network