SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CCNA Network Fundamentals Vocab
Start Test
Study First
Subjects
:
cisco
,
it-skills
,
ccna
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. The layer 3 address to which the data is going.
most significant bit
argument
destination IP address
host
2. A network model defined by the IETF that has been implemented on most computers and network device in the world.
multicast group
TCP/IP
overhead
delimiter
3. A generic term from OSI that refers to the data - headers - and trailers about which a particular network layer is concerned.
cloud
proxy arp
cyclic redundancy check
protocol data unit
4. Any combination of hardware device and/or software application designed to protect network devices from outside network users and/or malicious applications and files.
filtering
firewall
syntax
administratively scoped address
5. The reference to text based logical interfaces on an ios device. These are accesses using telnet or ssh to perform administrative tasks. VTY lines are also called virtual type terminal.
unshieled twisted-pair
TCP
goodput
virtual terminal line
6. A type of hash function that is used to produce a small - fixed size checksum of a block of data - such as a packet or a computer file. A CRC is computed and appended before transmission or storage - and verified afterward by the recipient to confirm
cyclic redundancy check
network baseline
data communications equipment
Network time protocol
7. A type of network cabling that includes twisted-pair wires - with shielding around each pair of wires - as well as another shield around all wires in the cable.
RJ-45
shielded twisted pair cable
administratively scoped address
single point of failure
8. The connection of devices on a common media. Sometimes a physical network is also referred to as a network segment.
physical network
test-net address
globally scoped addresses
Institute of Electrical and Electronics Engineers
9. International standardization program created by ISO and ITU-T to develop standards for data networking that facilitate multivendor equipment interoperability
distributed
instant messaging
segment
Open systems interconnection
10. The dividing of IP datagrams to meet the MTU requirement of a layer 2 protocol.
bridge table
fragmentation
bridging
AND
11. Interface by magnetic signals caused by the flow of electricity. EMI can cause reduced data integrity and increased error rates on transmission channels. The physics of this process are that electrical current creates magnetic fields - which in turn
slash format
electromagnetic interface
low-order bit
server
12. In IP subnetting - this refers to the portion of a set of IP addresses whose value must be identical for the addresses to be in the same subnet.
hop
prefix length
virtual terminal line
tracert
13. Routing that adjusts automatically to network topology or traffic changes.
local area network
console port
dynamic routing
manchester encoding
14. The origin of the PDU. This can be a process a host or a node - depending on the layer to which you are reffering.
source
media independent
PSH
hierarchical addressing
15. TCP or UDP ports that range from 49152 to 65535 and are not used by any defined server applications.
ARP table
extranet
dynamic or private ports
authentication
16. Unencrypted password used to allow access to privledge EXEC mode from IOS user EXEC mode.
Optical time domain reflectometer
asynchronous
maximum transmission unit
enable password
17. An access method used with some LAN technologies by which devices access the media in a controlled manner. This access to the LAN is managed using a small frame called a toke. A device can send only when it has claimed the use of the token.
noise
broadcast address
burned in address
token passing
18. A member of a multicast group. Every multicast client in each group has the same IP address. Multicast addresses begin with 224... and end with 239...
source
runt frame
Network address translation (NAT)
multicast client
19. A list of router holds in memory for the purpose of deciding how to forward packets.
routing table
network
goodput
ethernet PHY
20. The devices and connections of a communications network that comprise the network end of the user to network interface. The DCE provides a physical connection to the network - forwards traffic - and provides a clocking signal used to synchronize data
network baseline
reserved link-local addresses
data communications equipment
resource records
21. A group of devices associated by the arrangement of a hierarchial addressing scheme. Devices in the same logical network that share a common network portion of their Layer 3 addresses.
post office protocol
forwarding
registered ports
logical network
22. Random-access memory that does not lose its contents when the computer is shut down
nonvolatile RAM (NVRAM)
static route
query
throuhpu
23. From the priviledged mode - you can enter the device's global caonfiguration mode. From global configuration mode - you can configure global parameters or enter other configuration submodes such as interface - router and line configuration submodes.
bridge table
connection oriented
global configuration mod
forwarding
24. A network scanning technique used to identify which host IP addresses are operational.
ping sweep
virtual local area network
IP address
scheme
25. The spreading of light signal caused by light signals traveling at different speeds through a fiber.
maximum transmission unit
Optical time domain reflectometer
prefix length
dispersion
26. A rectangular cabling connector with eight pins - often used with ethernet cables.
RJ-45
window size
bridge table
Time to live
27. Defines which wires in a cable should connect to each pin on the connectors on both ends of a cable. For example - a UTP cable used for ethernet - used for a straight-through cable pinout - connects the wire at pin 1 on one end with the pin 1 on the
bridge
convergence
pinout
single point of failure
28. The IPv4 address block 192.0.2.0 to 192.0.2.255 that is set aside for teaching and learning purposes. These addresses can be used in documentation and network examples.
test-net address
fast ethernet
peer
host group
29. A 1-bit flag in the tcp header that indicates the acknowledgment field is valid.
ACK
source
Mail user agent
layered model
30. The method of for finding a host's hardware address from its IPv4 network layer address.
Address resolution protocol
token passing
fast ethernet
carrier sense multiple access collision detect (CSMA/CD)
31. Using values between 1024 and 49 -151 these numbers are equivalent to well-known ports in concept - but they are specifically used for nonprivileged application processes.
registered ports
TCP
SYN
physical address
32. An IPv4 multicast address that is restricted to a local group or organization
administratively scoped address
public address
subnet
MAC table
33. The process by which a device adds networking heads and trailers to data from an application for the eventual transmission of the data onto a transmission medium.
broadcast domain
encapsulation
ARP poisoning
reserved link-local addresses
34. A series of documents and memoranda encompassing new research - innovations and methodologies applicable to Internet technologies. RFCs are a reference for how technologies should work.
Internet control message protocol
media-dependent interface (MDI)
authoritative
Requests for Comments
35. Additional data that is provided with a command to provide information used by the execution of the command. IOS command arguments are entered at the CLI after the command
argument
ARP cache
host
Requests for Comments
36. A method of computer processing in which different parts of a program run simultaneously on two or more computers that are communicating with each other over a network
distributed
link-local address
single point of failure
redundancy
37. A dotted decimal number that helps identify the structure of IP addresses. The mask represents the network and subnet parts of related IP addresses with binary 1s and the host part of related IP addresses with binary 0s
daemon
subnet mask
address pool
switch table
38. A time period between ethernet frames that allows fairness with the CSMA/CD algorithm. Without a space between frames in other words - without some time with no frames being sent a NIC might always listen for silence - never hear silence and therefor
selective forwarding
physical topology
logical topology
interframe spacing
39. Network protocols or technologies that do not use the acknowledgment system to guarantee reliable delivery of information
host
flash
best effort
hypertext transfer protocol
40. Organizations that are responsible for the allocation and registration of Internet number resources within a particular region of the world. These registries include the American Registry for Internet Number for North America; RIPE network coordinati
Regional Internet Registries
convergence
URG
resource records
41. A written specification that defines what tasks a service or device should perform. Each protocol defines messages - often in the form of headers - plus the rules and processes by which these messages are used to achieve some stated purpose.
client
MAC table
virtual circuit
protocol
42. Also known as boolean algebra. These consist of the AND OR and IF operations
media-dependent interface (MDI)
domain name system
half duplex
digital logic
43. Radio frequencies that creat noise that interferes with information being transmitted across unshielded copper cabling.
radio frequency interference
quality of service
frame
client
44. A request for information. Queries are answered with replies.
network segment
switch table
query
registered ports
45. In ethernet - the results of two nodes transmitting simlutaneously. The signals from each device are damaged when they combine on the media
radio frequency interference
collision
filtering
latency
46. An entry in an IP routing table that was created because a network engineer entered the routing information into the router's configuration.
Logical link control
Pad
multicast group
static route
47. When used generically - this term refers to end-user data along with networking headers and trailers that are transmitted through a network. When used specifically - it is end-user data - along with the network or Internet layer headers and any highe
packet
binary
test-net address
Open systems interconnection
48. A part of a computer network that every device communicates with using the same physical medium. Network segments are extended by hubs or repeaters.
bridge
Internet Engineering Task Force
network segment
node
49. Ethernet that transmits data at 1 -000 -000 -000 one billion bits per second.
routing
flooding
gigabit ethernet
cloud
50. Used in the CLI following the command. Keywords are parameters that are used with the command from a set of predefined values.
RJ-45
router
convergence
keyword