Test your basic knowledge |

CCNA Network Fundamentals Vocab

Subjects : cisco, it-skills, ccna
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. MDIX is an alternative operation of ethernet ports on a hub. In this mode - the mapping of the wire pairs used in the hub port is in a crossover configuration. This allows you to use a straight-through cable to interconnect the hub to another hub.






2. In TCP - the process of taking a large chunk of data and breaking it into small enough pieces to fit within a TCP segment without breaking any rules about the maximum amount of data allowed in a segment.






3. The largest IP packet size allowed to be sent out a particular interface. Ethernet interfaces default to an MTU of 1500 because the data field of an Ethernet frame should be limited to 1500 bytes - and the IP packet sits inside the ethernet frame's d






4. A network with a geographic size between a LAN and a WAN. Typically used by service providers to create a highspeed network in a major metropolitan area where many customers might want high speed services between large sites around a city.






5. A list of router holds in memory for the purpose of deciding how to forward packets.






6. A protocol for synchronizing the clocks of computer systems over packet-switch data networks. NTP uses UDP port 123 as its transport layer.






7. A group that receives a multicast transmission. The members of a multicast group have the same mulitcast IP addressing to receive the same transmission.






8. International standardization program created by ISO and ITU-T to develop standards for data networking that facilitate multivendor equipment interoperability






9. The bit position in a binary number having the greatest value. The most significant bit is sometime referred to as the leftmost bit.






10. Additional data that is provided with a command to provide information used by the execution of the command. IOS command arguments are entered at the CLI after the command






11. A notification sent from one network device to another to confirm that some event has occured.






12. The MAC address that is permanently assigned to a LAN interface or NIC. It is called burned-in because the address is burned into a chip on the card - and the address cannot be changed. Also called universally administered address.






13. Somtimes called place-value notation - this is a numeral system in which each position is related to the next by a constant multiplier - a common ration - called the base or radix of that numeral system.






14. An encoding scheme 4B/5B uses 5-bit symbols and codes to represent 4 bits of data. 4B/5B is used in 100Base-tx ethernet.






15. In ethernet - the results of two nodes transmitting simlutaneously. The signals from each device are damaged when they combine on the media






16. Any communication in which the sender and receiver do not prearrange for communications to occur






17. DNS data records. Their precise format is defined in RFC 1035. The most important fields in a resource record are Name - class - type and data.






18. A process used to verify the identity of a person or process






19. Data link layer term describing a device connected to a network.






20. A source of information that is highly reliable and known for its accuracy






21. A technique used to attack an ethernet network by sending fake ARP messages to an ethernet LAN. These frames contain false MAC addresses that confuse network devices - such as switches. As a result - frames intended for one node can be mistakenly sen






22. A time period between ethernet frames that allows fairness with the CSMA/CD algorithm. Without a space between frames in other words - without some time with no frames being sent a NIC might always listen for silence - never hear silence and therefor






23. The loss of communication signal on the media. This loss is due to degradation of the energy wave over time.






24. A form of transmission where one device transmits to all devices within the network or on another network






25. The origin of the PDU. This can be a process a host or a node - depending on the layer to which you are reffering.






26. A common term for 10base2 ethernet - referring to the fact that 10base2 cabling is thinner than coaxial cabling used for 10base5






27. The method of for finding a host's hardware address from its IPv4 network layer address.






28. The layer 2 pdu that has been encoded by a data link layer protocol for digital transmission. Some different kinds of frames are ethernet frames and PPP frames.






29. A method of internal processing by LAN switches. The switch must receive the entire frame before it sends the first bit of the frame. Store and forward switch is the method used by cisco switches.






30. Translation RFC 1918 addresses to public domain addresses. Because RFC 1918 addresses are not routerd on the Internet - hosts accessing the Internet must use public domain addresses.






31. A corporate system such as a website that is explicitly used by internal employees. Can be assessed internally or remotely






32. A part of the ethernet frame that fills in the data field to ensure that the data field meets the minimum size requirement of 46 bytes.






33. Communication that allows receipt and transmission simultaneously. A station can transmit and receive at the same time. There are no collisions with full-duplex ethernet transmision.






34. A unit of measurement of the number of times 1000 bits can be transmitted in 1 second. 1 kbps = 1000bps






35. In ethernet - the process performed by a bridge or switch when it decides that it should not forward a frame out another port






36. The optical or electrical impulse on a physical medium for purposes of communication.






37. The table used by a switch that associates MAC addresses with the outgoing port. A general term for the table that a LAN bridge uses for its forwarding/filtering decisions. The table holds a list of MAC addresses and the port out which the bridge sho






38. The IPv4 multicast addresses 224.0.0.0 to 224.0.0.255. These addresses are to be used for multicast groups on a local network. Packets to these destinations are always transmitted with a TTTL value of 1






39. A protocol used to dynamically assign IP configurations to hosts. The services defined by the protocol are used to request and assign an IP address - default gateway - and DNS server address to a network host.






40. An IPV4 addressing scheme that uses a subnet mask that does not follow classful addressing limitations. It provides increased flexibility when dividing ranges of IP addresses into separate networks. Classless addressing is considered the best in curr






41. A method of expressing a network prefix. It uses a forward slash / followed by the network prefix.






42. A 1-bit flag in the TCP header that is used to request that a connection be re-established.






43. A broadcast that is sent to a specific network or series of networks.






44. One of the three basic binary logic operations. ANDing yields the following result: 1 and 1 = 1 - 1 and 0 = 0 - 0 and 1 = 0






45. A term that describes IPv4 packets sent to all hosts in a particular network. In a directed broadcast - a single copy of the packet is routed to the specified network - where it is broadcast to all hosts on that network






46. The forwarding of packets where the forwarding decision is taken dynamically - hop by hop - based on the conditions of downstream fowrading nodes.






47. A company that helps create the Internet by providing connectivity to enterprises and individuals - as well as interconnecting to other ISPs to create connectivity to all other ISPs.






48. Media access methodology in which a node wishing to transmit listens for a carrier wave before trying to send. If a carrier is sensed - the node waits for the transmission in progress to finish before initiating its own transmission.






49. A group of 8 binary bits. It is similar to - but not the same as - a byte. One Application in computer network is to use octets to divide IPv4 addresses into four components






50. Also known as boolean algebra. These consist of the AND OR and IF operations