SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CCNA Network Fundamentals Vocab
Start Test
Study First
Subjects
:
cisco
,
it-skills
,
ccna
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A generic term from OSI that refers to the data - headers - and trailers about which a particular network layer is concerned.
cache
protocol data unit
enable password
association identity AID
2. The forwarding of packets where the forwarding decision is taken dynamically - hop by hop - based on the conditions of downstream fowrading nodes.
selective forwarding
slot time
round-trip time
media access control
3. Network protocols or technologies that do not use the acknowledgment system to guarantee reliable delivery of information
server
best effort
default gateway
low-order bit
4. A 1-bt flag in the TCP header used to indicate the initial value of the sequence number. The SYN flag is only set in the first two segments of the three-way TCP connection establishment sequence.
Organizational Unique Identifier
SYN
host
forwarding
5. A part of the ethernet frame that fills in the data field to ensure that the data field meets the minimum size requirement of 46 bytes.
plug-in
public address
synchronous
Pad
6. An entry in an IP routing table that was created because a network engineer entered the routing information into the router's configuration.
RJ-45
thinnet
attenuation
static route
7. In a web browser - an application the browser uses - inside the browser window to display some types of content. For example - a browser typically uses a plug-in to display video.
bandwidth
slot time
jam signal
plug-in
8. A form of signal modulation where the message information is encoded in the amplitude of series of signal pulses. It transmits data by varying the aplitunes of the individual pulses. This is now obsolete and has been replaced by pulse code modulation
Time to live
physical topology
pulse amplitude modulation
hierarchical addressing
9. An IP address that has been registered with IANA or one of its member agencies - which guarantees that the address is globally unique. Globally unique public IP addresses can be used for packets sent through the Internet.
extended star
public address
ARP cache
delimiter
10. The loss of communication signal on the media. This loss is due to degradation of the energy wave over time.
logical topology
local area network
attenuation
data termianl equipment
11. Real-time communication between two or more people through text. The text is conveyed through computers connected over a network such as the internet. files can also be transferred through the IM program to share files.
Internet service provider
instant messaging
4b/5b
logical network
12. In IP subnetting - this refers to the portion of a set of IP addresses whose value must be identical for the addresses to be in the same subnet.
prefix length
runt frame
round-trip time
default route
13. The standards body responsible for the development and approval of TCP/IP standards
physical network
Internet Engineering Task Force
virtual local area network
cloud
14. The MAC algorithm used by ethernet devices in a shared media. The protocol requires a node wishing to transmit to listen for a carrier signal before trying to send. If a carrier is sensed - the node waits for transmission in progress to finish before
carrier sense multiple access collision detect (CSMA/CD)
RJ-45
intermediary device
Internet service provider
15. Line code in which 1s are represented by one significant condition and 0s are represented by another.
nonreturn to zero
window size
Network address translation (NAT)
daemon
16. A network created for devices located in a limited geographic area - through which the company owning the LAN has the right to run cables.
Internet
dispersion
frame
local area network
17. Another form of the root word converge in the phrase converged network. This kind of network aggregates various forms of traffic such as voice - video and data on the same network infrastructure. A more common usage represents the process by which ro
bridge table
convergence
router
frame
18. Unique addresses that are public domain addresses.
media access control
low-order bit
thinnet
globally scoped addresses
19. A data link layer address - for example a MAC address
network segment
physical address
data termianl equipment
dispersion
20. To change the energy levels transmitted over some networking medium to transmit bits over that medium.
scalability
channel
encode
prviate address
21. Also known as boolean algebra. These consist of the AND OR and IF operations
locally administered address
routing table
digital logic
node
22. The IPv4 multicast addresses 224.0.0.0 to 224.0.0.255. These addresses are to be used for multicast groups on a local network. Packets to these destinations are always transmitted with a TTTL value of 1
reserved link-local addresses
network address
loopback
goodput
23. TCP or UDP ports that range from 49152 to 65535 and are not used by any defined server applications.
dynamic or private ports
Time to live
TCP/IP
scheme
24. A control mechanism that can provide different priorities to different users or data flows - or guarantee a certain level of performance to a data flow in accordance with requests from the application program.
globally scoped addresses
quality of service
virtual terminal line
data communications equipment
25. Program used to download and send email. Email clients use POP3 to receive emails and use SMTP to send emails. Also called an email client
enable password
Regional Internet Registries
Mail user agent
quality of service
26. The connection of devices on a common media. Sometimes a physical network is also referred to as a network segment.
token passing
physical topology
round-trip time
physical network
27. A convention for writing IP addresses with four decimal numbers - ranging from 0 to 255 - with each octet representing 8 bits of the 32 bit IP address. The term originates from the fact that each of the four decimal numbers is separated by a period.
routing
association identity AID
dotted decimal
metropolitan-area network
28. An addressing scheme in which a network is partitioned into sections - with the section identifier forming one part of each destination's address and the destination identifier forming another
hierarchical addressing
cyclic redundancy check
connection oriented
Internet service provider
29. In ethernet a layer 2 device that receives an electrical signal in one port - interprets the bits - and makes a filtering or forwarding decision about the frame. If it forward - it sends a regenerated signal. Switches typically have many physical por
Requests for Comments
switch
octet
argument
30. A device such as a desktop or mobile device that is used by an end user.
end device
packet
test-net address
router protocol
31. In TCP - the process of taking a large chunk of data and breaking it into small enough pieces to fit within a TCP segment without breaking any rules about the maximum amount of data allowed in a segment.
connectionless
segmentation
bridge
Packet Tracer
32. Organizations that are responsible for the allocation and registration of Internet number resources within a particular region of the world. These registries include the American Registry for Internet Number for North America; RIPE network coordinati
encode
globally scoped addresses
Regional Internet Registries
broadcast
33. The reference to text based logical interfaces on an ios device. These are accesses using telnet or ssh to perform administrative tasks. VTY lines are also called virtual type terminal.
cache
high-order bit
virtual terminal line
International Organization for Standardization
34. A system of network design characterized by one or more major components that are required to maintain operation.
hierarchical addressing
URG
single point of failure
full duplex
35. Using values between 1024 and 49 -151 these numbers are equivalent to well-known ports in concept - but they are specifically used for nonprivileged application processes.
registered ports
broadcast
unshieled twisted-pair
binary
36. A network that incorporates both optical fiber along with coaxial cable to create a broadband network. commonly used by cable tv companies.
hypertext transfer protocol
hybrid fiber-coax
bit
cache
37. A protocol used to dynamically assign IP configurations to hosts. The services defined by the protocol are used to request and assign an IP address - default gateway - and DNS server address to a network host.
Internet service provider
test-net address
Internet backbone
dynamic host configuration protocol
38. Unencrypted password used to allow access to privledge EXEC mode from IOS user EXEC mode.
code gropu
enable password
slash format
ARP cache
39. A device that connects to a local digital telephone loop for a WAN circuit to a serial interface on a network device - typically connecting to a router. The CSU/DSU performs physical Layer 1 signaling on WAN circuits
channel service unit/data service unit
shielded twisted pair cable
network baseline
IP header
40. From the priviledged mode - you can enter the device's global caonfiguration mode. From global configuration mode - you can configure global parameters or enter other configuration submodes such as interface - router and line configuration submodes.
global configuration mod
firewall
carrier
digital logic
41. A group of 8 binary bits. It is similar to - but not the same as - a byte. One Application in computer network is to use octets to divide IPv4 addresses into four components
switch table
window size
octet
Network time protocol
42. The normal operation of ethernet ports on a hub. In this mode - the mapping of the wire pairs in the hub port is in a normal configuration. Some hubs provide a media-dependent interface/media-dependent interface - crossover switch. This switch is usu
fault tolerance
multiplexing
signal
media-dependent interface (MDI)
43. Radio frequencies that creat noise that interferes with information being transmitted across unshielded copper cabling.
authentication
link-local address
query
radio frequency interference
44. A type of hash function that is used to produce a small - fixed size checksum of a block of data - such as a packet or a computer file. A CRC is computed and appended before transmission or storage - and verified afterward by the recipient to confirm
cyclic redundancy check
bit time
query
collision domain
45. A temporary storage where data that has been retrieved or calculated and is accessed frequently can be stored. After the data is stored in the cache - the processes can access the cached copy instead of accessing the original data. A cache reduces th
token passing
nslookup
cache
hierarchical addressing
46. The process by which a router receives an incoming frame - discards the ata link header and trailer - makes a forwarding decision based on the destination IP address - adds a new data-link header and trailer based on the outgoing interface and forwar
FIN
collision domain
routing
dynamic or private ports
47. A group that receives a multicast transmission. The members of a multicast group have the same mulitcast IP addressing to receive the same transmission.
positional notation
fiber-optic cable
multicast group
ARP poisoning
48. The time required to send a single bit over some transmission medium. The time can be calculated at 1/speed - where speed is the number of bits per second sent over the medium
metropolitan-area network
network
bit time
network address
49. A model that consists of various layers that enable the development and explanation of technology to be done on a modular basis. This allows interoperability among different technologies among the different layers.
network baseline
quality of service
smtp
layered model
50. A network architecture designed to eliminate network downtime cause by a single point of failure.
bridging
multicast group
fast ethernet
redundancy