CCNA Guide to Cisco Networking

62 terms by LynnStarr1967 

Create a new folder

Advertisement Upgrade to remove ads

Chapters 1 & 2 Theory test

Two computers connected by a wire form a network.

TRUE

In 1954, the International Organization for Standardization (ISO) presented the Open Systems Interconnection (OSI) model.

FALSE

Computers must use a common protocol to communicate properly.

TRUE

Peer communication allows error checking to occur on two separate layers simultaneously.

TRUE

Many LANs and WANs contain several segments. Dividing a network into segments reduces performance.

FALSE

The number of nodes on a network and the length of cable used influence the quality of communication on the network.

TRUE

Repeaters and hubs reformat data structures, so they can connect networks that require different types of frames.

FALSE

The IEEE standard for WLANs use unlicensed, but not unregulated, radio frequencies.

TRUE

Bridges operate at the Network layer of the OSI model.

FALSE

Like bridges, switches operate at the Network layer of the OSI model.

FALSE

The term _____ refers to the wire cabling, such as coaxial or the more commonly used twisted-pair, that form the connections in most networks.

Media

_____ networks have computers that are servers and computers that act as clients to those servers.

Client/server

A _____ is contained within a company or department and located in a single geographic area, usually a building or part of a building

LAN

A _____ spans multiple geographic areas and is usually connected by common telecommunication carriers.

WAN

The term _____ refers to the intermediate stage between a LAN and a WAN.

MAN

The term _____ refers to a series of storage devices, such as tapes, hard drives, and CDs, that are networked together to provide very fast data storage for a network or sub-network.

SAN

The part of the company's network that allows access to non employees is called the _____, which is accessed over or through the Internet.

Extranet

The part of the company's network that allows access to employees is called the _____, which is completely separate from the Internet.

Intranet

The seven layers of the OSI reference model communicate with one another via _____ communication.

Peer

The OSI model _____ layer defines the mechanical, electrical, and procedural events that occur during the physical transmission of electronic signals on the wire.

Physical

The _____ is information that is used to determine whether data was corrupted during transmission.

CRC

The _____ sub-layer of the Data Link layer defines how data is packaged for the network.

LLC

The _____ sub-layer of the Data Link layer defines the media access method and provides a unique identifier for the network card.

MAC

A(n) _____ address is a 48-bit address represented as a 12-digit hexadecimal number given to each network card during production.

MAC

Because the MAC address is added during the manufacturing process, it is a permanent marking. For this reason, the address is also known as a _____.

BIA

The protocols at the Network layer allow computers to route packets to remote networks using a _____ address.

Logical

_____ protocols, such as TCP, require an acknowledgement (ACK) of the receipt of data packets.

Connection-oriented

_____ protocols such as User Datagram Protocol (UDP), do not require an ACK.

Connectionless

Data sent by a connectionless transport is called a _____.

Datagram

Each layer in a protocol stack may add a(n) _____ to the data as it is passed down the layers.

PDU

A(n) _____, which is also known as a header or a trailer, is specific information that is sent from one layer on the source computer to the same layer on the destination computer.

PDU

On analog networks, devices that boost the signal are called _____.

Amplifiers

Devices that "see" the traffic of other devices are said to be on the same _____ as those devices.

Collision domain

If a single access point is available in infrastructure mode, then the mode is said to be a(n) _____.

Basic Service Set (BSS)

Typically WLANs involve multiple access points connected to various switches in the network. This type of infrastructure mode is known as a(n) _____.

Extended Service Set (ESS)

A _____ filters traffic between network segments by examining the destination MAC address.

Bridge

_____ increase network performance by reducing the number of frames transmitted to the rest of the network.

Switches

Switches filter based on _____ addresses.

MAC

_____ provide filtering and network traffic control on LANs and WANs. These devices can connect multiple segments and multiple networks.

Routers

Routers operate at the _____ layer of the OSI model.

Network

When TCP/IP is used on an internetwork, the logical address is known as a(n) _____ address.

IP

_____ are commonly used to connect networks to the Internet.

Routers

A(n) _____ functions as both a bridge for nonroutable protocols and a router for routable protocols.

Brouter

A(n) _____ is usually a combination of hardware and software. Its purpose is to translate between different protocol suites.

Gateway

_____ have the most negative effect on network performance.

Gateways

_____ is a network access method (or media access method) originated by the University of Hawaii.

Ethernet

Ethernet uses _____ to prevent data packets from colliding on the network.

CSMA/CD

A _____ is the physical area in which a frame collision might occur.

Collision domain

_____ Ethernet uses the same network access method (CSMA/CD) as common 10BaseT Ethernet, but provides 10 times the data transmission rate.

Fast

Fast Ethernet is defined under the IEEE _____ standard.

802.3u

In _____ communications, devices can send and receive signals, but not at the same time.

Half-duplex

In _____ communications, devices can send and receive signals simultaneously.

Full-duplex

The term computer network, or simply _____, refers to the connection of two or more computers by some type of medium.

Network

In a client/server network, the _____ host the resources for the clients to use and provide security.

Server

A(n) _____ is a device that allows a computer or other device to connect to a network through the media.

NIC

A(n) _____ is a network that uses a public communications infrastructure to facilitate private communication between a company LAN and remote employees.

VPN

As the layers pass the data through the protocol stack, the addition of a header and/or trailer is called _____.

Encapsulation

_____ usually refers to the physical layout of network cable and devices.

Topology

_____ provide cell-based areas where wireless clients such as laptops and PDAs can connect to the network by associating with the access point.

Wireless Access Point

_____ is the breaking down of a single heavily populated network segment into smaller segments, or collision domains, populated by fewer nodes.

Segmentation

A switch opens a(n) _____ between the source and the destination. This prevents communications between just two computers from being broadcast to every computer on the network or segment.

Virtual circuit

When machines must share a wire and compete for available bandwidth with other machines, they experience _____.

Contention

Please allow access to your computer’s microphone to use Voice Recording.

Having trouble? Click here for help.

We can’t access your microphone!

Click the icon above to update your browser permissions above and try again

Example:

Reload the page to try again!

Reload

Press Cmd-0 to reset your zoom

Press Ctrl-0 to reset your zoom

It looks like your browser might be zoomed in or out. Your browser needs to be zoomed to a normal size to record audio.

Please upgrade Flash or install Chrome
to use Voice Recording.

For more help, see our troubleshooting page.

Your microphone is muted

For help fixing this issue, see this FAQ.

Star this term

You can study starred terms together

NEW! Voice Recording

Create Set