SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CCNA Network Fundamentals Vocab
Start Test
Study First
Subjects
:
cisco
,
it-skills
,
ccna
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. The design on networks that can continue to operate without interruption in the case of hardware - software or communications failures.
quality of service
fault tolerance
metropolitan-area network
asynchronous
2. The passage of a data packet between two network nodes.
Thicknet
public address
hop
ARP table
3. Random-access memory that does not lose its contents when the computer is shut down
nonvolatile RAM (NVRAM)
source IP address
gigabit ethernet
FIN
4. The process by which a device adds networking heads and trailers to data from an application for the eventual transmission of the data onto a transmission medium.
encapsulation
broadcast domain
Organizational Unique Identifier
hypertext transfer protocol
5. The first half of a MAC address. Manufactures must ensure that the value of the OUI has been registered with the IEEE. This value identifies the manufacturer of any Ethernet NIC or interface.
Organizational Unique Identifier
host address
router
protocol
6. The extent of a certain item. For example - an address scope is also known as a range of addresses from beginning of the range to the end.
selective forwarding
network baseline
address pool
scope
7. 1. a collision domain that is a section of a LAN that is bound by bridges - routers or switches. 2. In a LAN using a bus topology - a segment is a continuous electrical circuit that is often connected to other such segments with repeaters. 3. When us
segment
binary
bit
global configuration mod
8. An application protocol typically not used by end users. Instead - it is used by the network management software and networking devices to allow a network engineer to monitor and troubleshoot network problems.
full duplex
smtp
destination IP address
backoff algorithm
9. The IP address of the originating host that is placed into the IP packet header.
delimiter
Internet Assigned Numbers Authority
store and forward
source IP address
10. As part of the TCP/IP internet layer - ICMP defines protocol messages used to inform network engineeres of how well an internetwork is working. For example - the ping command sends ICMP messages to determine whether a host can send packets ot another
Internet control message protocol
metropolitan-area network
filtering
association identity AID
11. The largest IP packet size allowed to be sent out a particular interface. Ethernet interfaces default to an MTU of 1500 because the data field of an Ethernet frame should be limited to 1500 bytes - and the IP packet sits inside the ethernet frame's d
bit
maximum transmission unit
prviate address
scheme
12. An encoding scheme 4B/5B uses 5-bit symbols and codes to represent 4 bits of data. 4B/5B is used in 100Base-tx ethernet.
PSH
gateway
TCP
4b/5b
13. In TCP - the process of taking a large chunk of data and breaking it into small enough pieces to fit within a TCP segment without breaking any rules about the maximum amount of data allowed in a segment.
segmentation
interframe spacing
end device
carrier
14. When used generically - this term refers to end-user data along with networking headers and trailers that are transmitted through a network. When used specifically - it is end-user data - along with the network or Internet layer headers and any highe
global configuration mod
virtual circuit
packet
limited broadcast
15. 1.collection of computers - printers - routers - switches - and other devices that can communication with each other over some transmission medium. 2. command that assgins a NIC based address to which the router is directly connected.
protocol data unit
IP address
network
limited broadcast
16. A network architecture designed to eliminate network downtime cause by a single point of failure.
attenuation
redundancy
registered ports
query
17. The bit position in a binary number having the greatest value. The most significant bit is sometime referred to as the leftmost bit.
media-dependent interface crossover
tracert
MAC table
most significant bit
18. The time that passes while some event occurs. In networking - latency typically refers to the time that occurs between when something is sent in a network until it is received by another device.
prviate address
router
latency
dispersion
19. DNS data records. Their precise format is defined in RFC 1035. The most important fields in a resource record are Name - class - type and data.
subnet
global configuration mod
resource records
noise
20. The physical interface transceivers. It deals with Layer 1 (the physical layer - hence the PHY) of ethernet.
ethernet PHY
scope
media access control
prviate address
21. Real-time communication between two or more people through text. The text is conveyed through computers connected over a network such as the internet. files can also be transferred through the IM program to share files.
transparent bridging
node
instant messaging
fiber optics
22. A process that uses the same ARP messages as a normal ARP - but by which a router replies instead of the host listed in the ARP request. When a router sees an ARP request that cannot reach the intended host - but for which the router knows a route to
best effort
proxy arp
default route
layered model
23. The management of data flow between devices in a network. It is used to avoid too much data arriving before a device can handle it - causing data overflow.
AND
decapsulation
flow control
argument
24. In networking - a measurement of the speed of bits that can be transmitted over a particular link. It is the amount of data that can be transmitted in a certain amount of time. For digital bandwidth it is usually expressed in bits per second.
default route
filtering
switch
bandwidth
25. The standards body responsible for the development and approval of TCP/IP standards
data communications equipment
routing table
extranet
Internet Engineering Task Force
26. The IEEE 802.2 standard that defines the upper sublayer of the Ethernet Layer 2 specifications.
Logical link control
acknowledgment number
console port
collision
27. A communication path over a medium used to transport information from a sender to a receiver. Multiple channels can be multiplexed over a single cable
signal
default gateway
channel
Internet backbone
28. In IP subnetting - this refers to the portion of a set of IP addresses whose value must be identical for the addresses to be in the same subnet.
prefix length
bridge
smtp
quality of service
29. A popular certification method for fiber systems. The OTDR injects light into the fiber and then graphically displays the results of the detected reflected light. The OTDR measures the elapsed transit time of reflected light to calculate the distance
hierarchical addressing
unshieled twisted-pair
Optical time domain reflectometer
manchester encoding
30. A system of network design characterized by one or more major components that are required to maintain operation.
server message block
collision
single point of failure
authentication
31. A 1-bt flag in the TCP header used to indicate the initial value of the sequence number. The SYN flag is only set in the first two segments of the three-way TCP connection establishment sequence.
prviate address
SYN
source IP address
Thicknet
32. Translation RFC 1918 addresses to public domain addresses. Because RFC 1918 addresses are not routerd on the Internet - hosts accessing the Internet must use public domain addresses.
distributed
Network address translation (NAT)
pinout
proxy arp
33. In ethernet - the process performed by a bridge or switch when it decides that it should not forward a frame out another port
scheme
most significant bit
filtering
cache
34. In a web browser - an application the browser uses - inside the browser window to display some types of content. For example - a browser typically uses a plug-in to display video.
TCP
plug-in
network interface card
ACK
35. Any combination of hardware device and/or software application designed to protect network devices from outside network users and/or malicious applications and files.
ACK
firewall
public address
forwarding
36. An internationally recognized definition of technical specifications that ensure worldwide consistency.
static route
selective forwarding
IP address
standards
37. An international standards body that defines many networking standards. Also - the standards body that created the OSI model.
Mail user agent
connection oriented
International Organization for Standardization
authentication
38. A combination of many IP subnets and networks - as created by building a network using routers. The term internwork is used to avoid confusion with the term network - because an internetwork can include several IP networks.
channel
token passing
best effort
internetwork
39. A protocol used between routers so that they can learn routes to add to their routing tables.
default route
router protocol
protocol data unit
flooding
40. A control mechanism that can provide different priorities to different users or data flows - or guarantee a certain level of performance to a data flow in accordance with requests from the application program.
quality of service
pinout
encapsulation
RST
41. A dotted decimal number that helps identify the structure of IP addresses. The mask represents the network and subnet parts of related IP addresses with binary 1s and the host part of related IP addresses with binary 0s
octet
association identity AID
subnet mask
radio frequency interference
42. A type of hash function that is used to produce a small - fixed size checksum of a block of data - such as a packet or a computer file. A CRC is computed and appended before transmission or storage - and verified afterward by the recipient to confirm
router
attenuation
routing table
cyclic redundancy check
43. An ethernet frame that is less than 64 bytes in size. Runts are caused by collisions and are also know as collision fragments
directed broadcast
logical network
runt frame
shielded twisted pair cable
44. A process where multiple digital data streams are combined into one signal.
multiplexing
positional notation
frame
media access control
45. A grouping of code that meets a certain - already specified - condition for entering in that certain group.
URG
physical topology
intermediary device
code gropu
46. Communication that only allows one station to receive while the other station is transmitting
half duplex
limited broadcast
extranet
synchronous
47. The process of forwarding frames in a switch or a bridge from one port to another port or from segment to segment
collaborative
hierarchical addressing
Internet service provider
bridging
48. The connection of devices on a common media. Sometimes a physical network is also referred to as a network segment.
server message block
physical network
data termianl equipment
physical address
49. In networking - a symbol used when drawing network diagrams that represent a part of the network whose details can be ignored for the purposes of the diagram.
prefix length
best effort
cloud
switch
50. The forwarding of packets where the forwarding decision is taken dynamically - hop by hop - based on the conditions of downstream fowrading nodes.
data communications equipment
link-local address
selective forwarding
cache