Test your basic knowledge |

CCNA Network Fundamentals Vocab

Subjects : cisco, it-skills, ccna
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Any combination of hardware device and/or software application designed to protect network devices from outside network users and/or malicious applications and files.






2. Application-level throughput. It is the number of useful bits per unit of time from a certain source address to a certain destination - excluding protocol overhead and excluding retransmitted data packets.






3. The dividing of IP datagrams to meet the MTU requirement of a layer 2 protocol.






4. The MAC algorithm used by ethernet devices in a shared media. The protocol requires a node wishing to transmit to listen for a carrier signal before trying to send. If a carrier is sensed - the node waits for transmission in progress to finish before






5. Additional data that is provided with a command to provide information used by the execution of the command. IOS command arguments are entered at the CLI after the command






6. The table used by a switch or bridge that associates MAC addresses with the outgoing port. The switch or bridge uses this table for its forwarding/filtering decisions.






7. A corporate system such as a website that is explicitly used by internal employees. Can be assessed internally or remotely






8. As part of the TCP/IP internet layer - ICMP defines protocol messages used to inform network engineeres of how well an internetwork is working. For example - the ping command sends ICMP messages to determine whether a host can send packets ot another






9. An international - nonprofit organization for the advancement of technology related to eletricity. IEEE maintains the standards defining many LAN protocols.






10. An internet wide system by which a hierarchical set of DNS servers collectively hold all the name IP address mappings - with DNS servers referring users to the correct DNS server to successfully resolve a DNS name.






11. A group defined by a class D address (multicast - ranging from 224.0.0.0 to 239.255.255.255) - whereupon hosts can pertain to multicast groups. Hosts that have the same multicast address are part of the same host group.






12. A grouping of code that meets a certain - already specified - condition for entering in that certain group.






13. On a switch - a table that lists all known MAC addresses - and the bridges/switch port out which the bridge/switch should forward frames sent to each MAC address.






14. An access method used with some LAN technologies by which devices access the media in a controlled manner. This access to the LAN is managed using a small frame called a toke. A device can send only when it has claimed the use of the token.






15. A communication path over a medium used to transport information from a sender to a receiver. Multiple channels can be multiplexed over a single cable






16. A network topology characterized by a central location connected to multiple hubs. In an extended star - these interconnected hubs may be connected to more hubs. It is essentially a hierarchical topology but typically is drawn with the central site i






17. An internationally recognized definition of technical specifications that ensure worldwide consistency.






18. The lower of the two sublayers of the IEEE standard for ethernet. It is also the name of that sublayer






19. The first half of a MAC address. Manufactures must ensure that the value of the OUI has been registered with the IEEE. This value identifies the manufacturer of any Ethernet NIC or interface.






20. Program used to download and send email. Email clients use POP3 to receive emails and use SMTP to send emails. Also called an email client






21. Used by tcp or udp - with values between 0 and 1023 - these ports are allocated by high-privilege processes. They are used so that all clients know the correct port number to connect to.






22. A routing feature in which frames in an interface output queue are prioritized based on various characteristics such as packet size and interface type.






23. A form of transmission where one device transmits to all devices within the network or on another network






24. Also known as boolean algebra. These consist of the AND OR and IF operations






25. DNS data records. Their precise format is defined in RFC 1035. The most important fields in a resource record are Name - class - type and data.






26. The structure and order of words in a computer language






27. An ethernet frame that is less than 64 bytes in size. Runts are caused by collisions and are also know as collision fragments






28. A notification sent from one network device to another to confirm that some event has occured.






29. The forwarding of packets where the forwarding decision is taken dynamically - hop by hop - based on the conditions of downstream fowrading nodes.






30. A company that helps create the Internet by providing connectivity to enterprises and individuals - as well as interconnecting to other ISPs to create connectivity to all other ISPs.






31. A common term for 10base2 ethernet - referring to the fact that 10base2 cabling is thinner than coaxial cabling used for 10base5






32. Communication that uses a common clocking signal. In most synchronous communicatino - one of the communicating devices generates a clock signal into the circuit. Additional timing information is not required in the header.






33. A related set of communications transactions between two or more network devices.






34. The ability of a protocol. system or component to be modified to fit a new need.






35. An application level network protocl mainly applied to shared access to files - printers - serial ports - and miscellaneous communications between nodes on a network.






36. The devices and connections of a communications network that comprise the network end of the user to network interface. The DCE provides a physical connection to the network - forwards traffic - and provides a clocking signal used to synchronize data






37. A 1-bit flag in the TCP header that is used to request that a connection be re-established.






38. A part of the ethernet frame that fills in the data field to ensure that the data field meets the minimum size requirement of 46 bytes.






39. A protocol used between routers so that they can learn routes to add to their routing tables.






40. Routing table entry that is used to direct frames for which a next hop is not explicitly listed in the routing table. This route is used to forward a packet when no other known route exists for a give packet's destination address.






41. The networking layers whose processes are not affected by the media being used. In ethernet - these are all the layers from the LLC sublayer of data link upward.






42. Used in the CLI following the command. Keywords are parameters that are used with the command from a set of predefined values.






43. A layer 4 protocl of TCP/IP model - TCP lets applications guarantee delivery of data across a network.






44. A device such as a desktop or mobile device that is used by an end user.






45. The retransmission delay used with CSMA/CD when a collision occurs. The algorithm forces each sender that detected the collisions to delay a random amount of time before attempting to retransmit.






46. A 1-bt flag in the TCP header used to indicate the initial value of the sequence number. The SYN flag is only set in the first two segments of the three-way TCP connection establishment sequence.






47. An IPv4 address in the range of 169.254.1.0 to 169.254.254.255. Communication using these addresses is used with a ttl of 1 and limited to the local network






48. Information systems that allow the creation of a document or documents that can be edited by more than one person in real time






49. A data link layer address - for example a MAC address






50. The actual data transfer rate between two computers at some point in time. Throughput is impacted by the slowest-speed link used to send data between the two computers - as well as myriad variables that might change during the course of a day.