Test your basic knowledge |

CCNA Network Fundamentals Vocab

Subjects : cisco, it-skills, ccna
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. This field of a frame signals the beginning or end of a frame.






2. An internet wide system by which a hierarchical set of DNS servers collectively hold all the name IP address mappings - with DNS servers referring users to the correct DNS server to successfully resolve a DNS name.






3. A protocol used to dynamically assign IP configurations to hosts. The services defined by the protocol are used to request and assign an IP address - default gateway - and DNS server address to a network host.






4. In the telnet application - commands are always introduced by a character with the decimal code 255 - known as the Interpret as Command character.






5. Used by tcp or udp - with values between 0 and 1023 - these ports are allocated by high-privilege processes. They are used so that all clients know the correct port number to connect to.






6. Defines which wires in a cable should connect to each pin on the connectors on both ends of a cable. For example - a UTP cable used for ethernet - used for a straight-through cable pinout - connects the wire at pin 1 on one end with the pin 1 on the






7. A unit of measurement of the number of times 1000 bits can be transmitted in 1 second. 1 kbps = 1000bps






8. An access method used with some LAN technologies by which devices access the media in a controlled manner. This access to the LAN is managed using a small frame called a toke. A device can send only when it has claimed the use of the token.






9. On a switch - a table that lists all known MAC addresses - and the bridges/switch port out which the bridge/switch should forward frames sent to each MAC address.






10. The forwarding of packets where the forwarding decision is taken dynamically - hop by hop - based on the conditions of downstream fowrading nodes.






11. An IPv4 address in the range of 169.254.1.0 to 169.254.254.255. Communication using these addresses is used with a ttl of 1 and limited to the local network






12. Can refer to computer hardware that is to be used by multiple concurrent users. Alternatively - this term can refer to computer software that provides services to many users. For example - a web server consists of web server software running on some






13. A rectangular cabling connector with eight pins - often used with ethernet cables.






14. A common term for 10base2 ethernet - referring to the fact that 10base2 cabling is thinner than coaxial cabling used for 10base5






15. In LAN switches a reference to cases in which a frame is forwarded - or switche - when the incoming and outgoing interfaces use the same speed. It is the opposite of asymmetric switching.






16. A protocol for synchronizing the clocks of computer systems over packet-switch data networks. NTP uses UDP port 123 as its transport layer.






17. An application level network protocl mainly applied to shared access to files - printers - serial ports - and miscellaneous communications between nodes on a network.






18. The layer 3 address to which the data is going.






19. The loss of communication signal on the media. This loss is due to degradation of the energy wave over time.






20. A process that uses the same ARP messages as a normal ARP - but by which a router replies instead of the host listed in the ARP request. When a router sees an ARP request that cannot reach the intended host - but for which the router knows a route to






21. Defines the commands - headers and processes by which web server and web browsers transfer files.






22. A technique used to attack an ethernet network by sending fake ARP messages to an ethernet LAN. These frames contain false MAC addresses that confuse network devices - such as switches. As a result - frames intended for one node can be mistakenly sen






23. Data that directs a process. a flag in a data-link frame is an example of control data.






24. Network protocols or technologies that do not use the acknowledgment system to guarantee reliable delivery of information






25. Represents the 0 in the binary number. In an IP subnet mask - the lower-order bits represent the host portion. Sometimes called the host portion of bits.






26. An ethernet frame that is less than 64 bytes in size. Runts are caused by collisions and are also know as collision fragments






27. A layer 4 protocl of TCP/IP model - TCP lets applications guarantee delivery of data across a network.






28. A series of documents and memoranda encompassing new research - innovations and methodologies applicable to Internet technologies. RFCs are a reference for how technologies should work.






29. The reference to text based logical interfaces on an ios device. These are accesses using telnet or ssh to perform administrative tasks. VTY lines are also called virtual type terminal.






30. A 1-bit field in the TCP header that is used by a device that wants to terminate its session with the other device. This is done by inserting the FIN flag in the flag field found in the TCP segment






31. A dotted decimal number defined by the IPv4 protocol to represent a network or subnet. It represents the network that hosts reside in. Also called a network number or network ID.






32. A network model defined by the IETF that has been implemented on most computers and network device in the world.






33. A network device that accesses a service on another computer remotely by accessing the network.






34. A type of network cabling that includes twisted-pair wires - with shielding around each pair of wires - as well as another shield around all wires in the cable.






35. Organizations that are responsible for the allocation and registration of Internet number resources within a particular region of the world. These registries include the American Registry for Internet Number for North America; RIPE network coordinati






36. An encoding scheme 4B/5B uses 5-bit symbols and codes to represent 4 bits of data. 4B/5B is used in 100Base-tx ethernet.






37. The number of various unique digits - including 0 that a positional number system uses to represent numbers. For example - in the binary system (base 2) the radix is 2. In the decimal system the radix is 10.






38. Network layer protocol in the TCP/IP stack offering a connectionless internetwork service. IP provides features for addressing - type-of-service specification - fragmentation and reassembly - and security.






39. A collection of data that establishes a reference for network performance and behavior over a period of time. This reference data is used in the future to assess the health and relative growth of network utilization.






40. The extent of a certain item. For example - an address scope is also known as a range of addresses from beginning of the range to the end.






41. A logical storage in the host's RAM to store ARP entries






42. A generic term from OSI that refers to the data - headers - and trailers about which a particular network layer is concerned.






43. The layer 2 pdu that has been encoded by a data link layer protocol for digital transmission. Some different kinds of frames are ethernet frames and PPP frames.






44. A network topology characterized by a central location connected to multiple hubs. In an extended star - these interconnected hubs may be connected to more hubs. It is essentially a hierarchical topology but typically is drawn with the central site i






45. A 1-bit flag in the TCP header that is used to request that a connection be re-established.






46. In ethernet - the process performed by a bridge or switch when it decides that it should send a frame out another port.






47. TCP or UDP ports that range from 49152 to 65535 and are not used by any defined server applications.






48. A dotted decimal number that helps identify the structure of IP addresses. The mask represents the network and subnet parts of related IP addresses with binary 1s and the host part of related IP addresses with binary 0s






49. A numbering system characterized by 1 and 0






50. The standards body responsible for the development and approval of TCP/IP standards