SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CCNA Network Fundamentals Vocab
Start Test
Study First
Subjects
:
cisco
,
it-skills
,
ccna
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A type of hash function that is used to produce a small - fixed size checksum of a block of data - such as a packet or a computer file. A CRC is computed and appended before transmission or storage - and verified afterward by the recipient to confirm
cyclic redundancy check
directly connected network
broadcast address
priority queing
2. A network of computers that behave as if they are connected to the same network segment - even through they might be physically located on different segments of a LAN. VLANs are configured through software on the switch and router.
virtual local area network
intranet
channel service unit/data service unit
protocol data unit
3. The origin of the PDU. This can be a process a host or a node - depending on the layer to which you are reffering.
source
overhead
router protocol
goodput
4. The time required for some network pdu's to be sent and received - and a response PDU to be sent and received. In other words - the time between when a device sends data and when the same device receives a response.
kilobits per second
hierarchical addressing
flow control
round-trip time
5. Program used to download and send email. Email clients use POP3 to receive emails and use SMTP to send emails. Also called an email client
Mail user agent
prefix length
dotted decimal
hub
6. A form of signal modulation where the message information is encoded in the amplitude of series of signal pulses. It transmits data by varying the aplitunes of the individual pulses. This is now obsolete and has been replaced by pulse code modulation
pulse amplitude modulation
physical network
radio frequency interference
nonvolatile RAM (NVRAM)
7. Normally - a relatively general term that refers to dfifferent kinds of networking devices. Historically - when routers were created - they were called gateways
bit time
broadcast
AND
gateway
8. A rectangular cabling connector with eight pins - often used with ethernet cables.
acknowledgment number
RJ-45
protocol
classful addressing
9. Computer hardware - typically used for LANS - that allows the computer to connect to some network cable. The NIC can then send and receive data over the cable at the direction of the computer.
console port
test-net address
router
network interface card
10. A removable component that has memory space for storage. Used on the router or switch for storing the compressed operating system image.
scope
flash
symmetric switching
IP address
11. Any communication in which the sender and receiver do not prearrange for communications to occur
query
authoritative
acknowledgment number
connectionless
12. The process by which a router receives an incoming frame - discards the ata link header and trailer - makes a forwarding decision based on the destination IP address - adds a new data-link header and trailer based on the outgoing interface and forwar
host
physical network
data termianl equipment
routing
13. A process by which an end device - after it receives data over some transmission medium - examines the headers and trailers at each successive higher layer - eventually handing the data to the correct application. Sometimes called de-encapsulation.
global configuration mod
URG
decapsulation
thinnet
14. The design on networks that can continue to operate without interruption in the case of hardware - software or communications failures.
bridge table
fault tolerance
router
routing table
15. The process of obscuring information to make it unreadable without special knowledge - somtimes referred to as scrambling. The process takes the data to be encrypted and applies a mathematical formula to it along with a secret number. The resulting v
segmentation
keyword
encryption
Open systems interconnection
16. A temporary storage where data that has been retrieved or calculated and is accessed frequently can be stored. After the data is stored in the cache - the processes can access the cached copy instead of accessing the original data. A cache reduces th
cache
dns resolver
association identity AID
slash format
17. A device such as a desktop or mobile device that is used by an end user.
end device
manchester encoding
IP header
positional notation
18. Define in RFC 1918 - an IP address that does not have to be globally unique because the address exists inside packets only when the packets are inside a single private IP internetwork. Private IP addresses are popularly used in most company today - w
prviate address
nonvolatile RAM (NVRAM)
fiber-optic cable
pulse amplitude modulation
19. Using values between 1024 and 49 -151 these numbers are equivalent to well-known ports in concept - but they are specifically used for nonprivileged application processes.
network baseline
registered ports
host address
Time to live
20. An international - nonprofit organization for the advancement of technology related to eletricity. IEEE maintains the standards defining many LAN protocols.
Institute of Electrical and Electronics Engineers
Internet control message protocol
Network address translation (NAT)
virtual terminal line
21. A network device that accesses a service on another computer remotely by accessing the network.
fragmentation
dynamic or private ports
AND
client
22. An IPv4 address in the range of 169.254.1.0 to 169.254.254.255. Communication using these addresses is used with a ttl of 1 and limited to the local network
slash format
virtual terminal line
node
link-local address
23. In ethernet - the process performed by a bridge or switch when it decides that it should not forward a frame out another port
network baseline
router
filtering
plug-in
24. An entry in an IP routing table that was created because a network engineer entered the routing information into the router's configuration.
virtual circuit
static route
encryption
physical media
25. A network that incorporates both optical fiber along with coaxial cable to create a broadband network. commonly used by cable tv companies.
hybrid fiber-coax
server
fast ethernet
forwarding
26. A written specification that defines what tasks a service or device should perform. Each protocol defines messages - often in the form of headers - plus the rules and processes by which these messages are used to achieve some stated purpose.
switch table
protocol
kilobits per second
Open systems interconnection
27. The limited CLI mode where the commands available to the user are a subset of those available at the privileged level. In general - use the user Exec commands to temporarily change terminal settings - perform basic tests and list system information.
throuhpu
user executive mode
ARP cache
routing table
28. A command on many computer operating systems that discovers the IP addresses - and possibly host names - of the routers used by the network when sending a packet from one computer to another.
subnet mask
control data
tracert
router
29. The standards body responsible for the development and approval of TCP/IP standards
packet
cache
reserved link-local addresses
Internet Engineering Task Force
30. A method of computer processing in which different parts of a program run simultaneously on two or more computers that are communicating with each other over a network
prviate address
bridge
bridge table
distributed
31. The arrangement of the nodes in a network and the physical connections between them. This is the representation of how the media is used to connect the devices.
collision
delimiter
physical topology
keyword
32. A form of transmission where one device transmits to all devices within the network or on another network
symmetric switching
network interface card
jam signal
broadcast
33. The physical interface transceivers. It deals with Layer 1 (the physical layer - hence the PHY) of ethernet.
ARP poisoning
ethernet PHY
deterministic
collision
34. The learning of source addresses on incoming frames and adding them to the bridging table. After the table has been completed and when a frame is received on one of the bridge's interfaces - the bridge looks up the frame's destination address in its
public address
transparent bridging
physical media
instant messaging
35. A corporate system such as a website that is explicitly used by internal employees. Can be assessed internally or remotely
keyword
classful addressing
intranet
hierarchical addressing
36. A method of internal processing by LAN switches. The switch must receive the entire frame before it sends the first bit of the frame. Store and forward switch is the method used by cisco switches.
physical network
thinnet
prefix length
store and forward
37. An access method used with some LAN technologies by which devices access the media in a controlled manner. This access to the LAN is managed using a small frame called a toke. A device can send only when it has claimed the use of the token.
token passing
Internet service provider
fast ethernet
best effort
38. A term that describes IPv4 packets sent to all hosts in a particular network. In a directed broadcast - a single copy of the packet is routed to the specified network - where it is broadcast to all hosts on that network
console port
instant messaging
prefix length
directed broadcast
39. A protocol used to dynamically assign IP configurations to hosts. The services defined by the protocol are used to request and assign an IP address - default gateway - and DNS server address to a network host.
media independent
dynamic host configuration protocol
protocol data unit
bit
40. MDIX is an alternative operation of ethernet ports on a hub. In this mode - the mapping of the wire pairs used in the hub port is in a crossover configuration. This allows you to use a straight-through cable to interconnect the hub to another hub.
bridging
collision domain
octet
media-dependent interface crossover
41. A common name for ethernet technology that operates at 100 mbps.
authoritative
fast ethernet
fragmentation
data communications equipment
42. An IPv4 multicast address that is restricted to a local group or organization
fault tolerance
slot time
administratively scoped address
latency
43. Communication that only allows one station to receive while the other station is transmitting
prefix length
half duplex
unshieled twisted-pair
nonreturn to zero
44. Used by tcp or udp - with values between 0 and 1023 - these ports are allocated by high-privilege processes. They are used so that all clients know the correct port number to connect to.
well known ports
link-local address
virtual terminal line
bit time
45. The first half of a MAC address. Manufactures must ensure that the value of the OUI has been registered with the IEEE. This value identifies the manufacturer of any Ethernet NIC or interface.
Organizational Unique Identifier
shielded twisted pair cable
goodput
registered ports
46. The optical or electrical impulse on a physical medium for purposes of communication.
administratively scoped address
radix
bridge table
signal
47. Line code in which each bit of data is signified by at least one voltage level transition.
scope
console port
manchester encoding
Time to live
48. An IPv4 multicast address that is restricted to a local group or organization.
port
limited scope address
physical network
digital logic
49. A network that is connected to a device's interface. For example networks that interface with the router are known to be directly connected. Devices learn their initial IP routes based on being connected to these subnets.
Institute of Electrical and Electronics Engineers
subnet
physical media
directly connected network
50. A network scanning technique used to identify which host IP addresses are operational.
ping sweep
scheme
virtual circuit
fiber optics