SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CCNA Network Fundamentals Vocab
Start Test
Study First
Subjects
:
cisco
,
it-skills
,
ccna
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A delineation of networking protocols and standards into different categories - called layers - along with definitions of which sets of standards and protocols need to be implemented to create products that can be used to create a working network
redundancy
protocol suite
runt frame
firewall
2. A corporate system such as a website that is explicitly used by internal employees. Can be assessed internally or remotely
broadcast
intranet
radio frequency interference
router
3. A source of information that is highly reliable and known for its accuracy
loopback
authoritative
Logical link control
channel service unit/data service unit
4. A 1-bit flag in the TCP header that is used to request to the higher layers for immediate delivery of the packet.
digital logic
bridging
PSH
Internet service provider
5. The ability of a protocol. system or component to be modified to fit a new need.
data termianl equipment
router
scalability
radix
6. Part of a company's intranet that is extended to users outside the company
authoritative
low-order bit
extranet
fiber-optic cable
7. Application-level throughput. It is the number of useful bits per unit of time from a certain source address to a certain destination - excluding protocol overhead and excluding retransmitted data packets.
Organizational Unique Identifier
Thicknet
router
goodput
8. A model that consists of various layers that enable the development and explanation of technology to be done on a modular basis. This allows interoperability among different technologies among the different layers.
layered model
burned in address
directed broadcast
intermediary device
9. The devices and connections of a communications network that comprise the network end of the user to network interface. The DCE provides a physical connection to the network - forwards traffic - and provides a clocking signal used to synchronize data
URG
data communications equipment
TCP/IP
argument
10. Defines which wires in a cable should connect to each pin on the connectors on both ends of a cable. For example - a UTP cable used for ethernet - used for a straight-through cable pinout - connects the wire at pin 1 on one end with the pin 1 on the
pinout
latency
digital logic
Requests for Comments
11. The time required for some network pdu's to be sent and received - and a response PDU to be sent and received. In other words - the time between when a device sends data and when the same device receives a response.
kilobits per second
physical network
round-trip time
high-order bit
12. A process by which an end device - after it receives data over some transmission medium - examines the headers and trailers at each successive higher layer - eventually handing the data to the correct application. Sometimes called de-encapsulation.
nonvolatile RAM (NVRAM)
collision domain
internetwork
decapsulation
13. An ethernet frame that is less than 64 bytes in size. Runts are caused by collisions and are also know as collision fragments
collision domain
runt frame
International Organization for Standardization
nonvolatile RAM (NVRAM)
14. The reference to text based logical interfaces on an ios device. These are accesses using telnet or ssh to perform administrative tasks. VTY lines are also called virtual type terminal.
IP address
virtual terminal line
plug-in
radix
15. Organizations that are responsible for the allocation and registration of Internet number resources within a particular region of the world. These registries include the American Registry for Internet Number for North America; RIPE network coordinati
scope
Institute of Electrical and Electronics Engineers
firewall
Regional Internet Registries
16. The MAC address that is permanently assigned to a LAN interface or NIC. It is called burned-in because the address is burned into a chip on the card - and the address cannot be changed. Also called universally administered address.
dynamic host configuration protocol
Address resolution protocol
limited scope address
burned in address
17. The connection of devices on a common media. Sometimes a physical network is also referred to as a network segment.
quality of service
octet
physical network
selective forwarding
18. A communication path over a medium used to transport information from a sender to a receiver. Multiple channels can be multiplexed over a single cable
hybrid fiber-coax
channel
redundancy
bit time
19. A process used by a switch or bridge to forward broadcasts and unknown destination unicasts. The bridge/switch forwards these frames out all ports except the port on which the frame was received.
PSH
flooding
extranet
client
20. Media access methodology in which a node wishing to transmit listens for a carrier wave before trying to send. If a carrier is sensed - the node waits for the transmission in progress to finish before initiating its own transmission.
cyclic redundancy check
fiber-optic cable
ACK
carrier sense multiple access (CSMA)
21. The range of ip addresses that can be assigned by the DHCP server.
Thicknet
directly connected network
loopback
address pool
22. An IPv4 multicast address that is restricted to a local group or organization.
manchester encoding
authoritative
limited scope address
Network time protocol
23. Represents the 0 in the binary number. In an IP subnet mask - the lower-order bits represent the host portion. Sometimes called the host portion of bits.
low-order bit
dns resolver
network address
token passing
24. A group defined by a class D address (multicast - ranging from 224.0.0.0 to 239.255.255.255) - whereupon hosts can pertain to multicast groups. Hosts that have the same multicast address are part of the same host group.
Institute of Electrical and Electronics Engineers
host group
slash format
redundancy
25. A service or a program to look up information in the DNS
half duplex
nslookup
deterministic
slot time
26. Also known as boolean algebra. These consist of the AND OR and IF operations
Internet backbone
digital logic
smtp
IP address
27. The design on networks that can continue to operate without interruption in the case of hardware - software or communications failures.
fault tolerance
destination IP address
domain name system
acknowledgment
28. A network that incorporates both optical fiber along with coaxial cable to create a broadband network. commonly used by cable tv companies.
slash format
priority queing
hybrid fiber-coax
carrier sense multiple access collision detect (CSMA/CD)
29. A numbering system characterized by 1 and 0
connection oriented
scheme
fiber optics
binary
30. A written specification that defines what tasks a service or device should perform. Each protocol defines messages - often in the form of headers - plus the rules and processes by which these messages are used to achieve some stated purpose.
link-local address
radio frequency interference
protocol
cache
31. Interface by magnetic signals caused by the flow of electricity. EMI can cause reduced data integrity and increased error rates on transmission channels. The physics of this process are that electrical current creates magnetic fields - which in turn
most significant bit
electromagnetic interface
FIN
broadcast domain
32. The dividing of IP datagrams to meet the MTU requirement of a layer 2 protocol.
attenuation
download
media-dependent interface (MDI)
fragmentation
33. A data link layer address - for example a MAC address
network baseline
physical address
frame
default gateway
34. Resources used to manage or operate the network. Overhead consumes bandwidth and reduces the amount of application data that can be transported across the network.
reserved link-local addresses
test-net address
control data
overhead
35. The method of for finding a host's hardware address from its IPv4 network layer address.
RJ-45
Address resolution protocol
multicast client
global configuration mod
36. A 32-bit number - written in dotted decimal notation - used by the IP to uniquely identify an interface connected to an IP network. It is also used as a destination address in an IP header to allow routing - and as a source address to allow a compute
backoff algorithm
transparent bridging
IP address
association identity AID
37. 1. a collision domain that is a section of a LAN that is bound by bridges - routers or switches. 2. In a LAN using a bus topology - a segment is a continuous electrical circuit that is often connected to other such segments with repeaters. 3. When us
synchronous
segment
Mail user agent
virtual terminal line
38. The origin of the PDU. This can be a process a host or a node - depending on the layer to which you are reffering.
source
high-order bit
cyclic redundancy check
default gateway
39. In LAN switches a reference to cases in which a frame is forwarded - or switche - when the incoming and outgoing interfaces use the same speed. It is the opposite of asymmetric switching.
dynamic or private ports
packet
Institute of Electrical and Electronics Engineers
symmetric switching
40. A dotted decimal number that helps identify the structure of IP addresses. The mask represents the network and subnet parts of related IP addresses with binary 1s and the host part of related IP addresses with binary 0s
default gateway
subnet mask
URG
RJ-45
41. The process of obscuring information to make it unreadable without special knowledge - somtimes referred to as scrambling. The process takes the data to be encrypted and applies a mathematical formula to it along with a secret number. The resulting v
encryption
multicast group
physical address
media independent
42. As filed in the TCP header that is set in a sent segment - signifies the maximum amount of unacknowledged data the host is willing to receive before the other sending host must wait for an acknowledgment.
window size
collision
radio frequency interference
Requests for Comments
43. A method of expressing a network prefix. It uses a forward slash / followed by the network prefix.
subnet mask
slash format
octet
gateway
44. The process by which a router receives an incoming frame - discards the ata link header and trailer - makes a forwarding decision based on the destination IP address - adds a new data-link header and trailer based on the outgoing interface and forwar
store and forward
Address resolution protocol
broadcast address
routing
45. Path through an internetwork through which packets are forwarded.
virtual terminal line
gateway
router
slot time
46. An IPv4 address in the range of 169.254.1.0 to 169.254.254.255. Communication using these addresses is used with a ttl of 1 and limited to the local network
link-local address
standards
distributed
node
47. A computer program that runs in the background and is usually initiated as a process. Daemons often support server processes.
classless addressing
daemon
encryption
deterministic
48. A network that is connected to a device's interface. For example networks that interface with the router are known to be directly connected. Devices learn their initial IP routes based on being connected to these subnets.
switch
multicast client
encode
directly connected network
49. Translation RFC 1918 addresses to public domain addresses. Because RFC 1918 addresses are not routerd on the Internet - hosts accessing the Internet must use public domain addresses.
noise
collision
Network address translation (NAT)
fast ethernet
50. A form of signal modulation where the message information is encoded in the amplitude of series of signal pulses. It transmits data by varying the aplitunes of the individual pulses. This is now obsolete and has been replaced by pulse code modulation
pulse amplitude modulation
local area network
filtering
redundancy