Test your basic knowledge |

CCIE Vocab

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Differentiated Services.






2. Extensible Authentication Protocol.






3. An issue whereby parts of the RF signal take different paths from the source to the destination - which causes direct and reflected signals to reach the receiver at different times - and corresponding bit errors.






4. The SNMP specifications - standardized in RFCs - defining the rules by which SNMP MIB variables should be defined.






5. Class-Based Weighted Fair Queuing.






6. Layer 2 payload compression.






7. A serial-line encoding standard that sends alternating positive and negative 3-volt signals for binary 1 - and no signal (0 V) for binary 0.






8. Customer edge.






9. A wireless LAN physical layer that operates at up to 11-Mbps data rates using DSSS in the 2.4-GHz band.






10. An NTP mode in which two or more NTP servers mutually synchronize their clocks.






11. Also called VLAN trunking - a method (using either the Cisco ISL protocol or the IEEE 802.1Q protocol) to support carrying traffic between switches for multiple VLANs that have members on more than one switch.






12. Defined in RFC 2091 - the extensions define how RIP may send a full update once - and then send updates only when routes change - when an update is requested - or when a RIP interface changes state from down to up.






13. The destination VLAN for an RSPAN session.






14. The Lempel Ziv STAC compression algorithm is used in Frame Relay networks to define dynamic dictionary entries that list a binary string from the compressed data and an associated smaller string that represents it during transmission






15. Authentication - authorization - and accounting.






16. A BGP neighbor state in which the BGP neighbors have stabilized and can exchange routing information using BGP Update messages.






17. VLAN Trunking Protocol.






18. The signal strength of the RF signal at the output of the radio card or access point transmitter - before being fed into the antenna. Measured in milliwatts - watts - or dBm.






19. An optional contention-free 802.11 access protocol that requires the access point to poll wireless stations before they are able to send frames. Not commonly implemented.






20. With OSPF - the timer used to determine when a neighboring router has failed - based on a router not receiving any OSPF messages - including Hellos - in this timer period.






21. A Frame Relay address used in Frame Relay headers to identify the VC






22. A standards-based way of helping routers find Rendezvous Points (RP). RPs notify BSRs of the groups they handle. BSRs in turn flood the group-to-RP mappings throughout the network. Each router individually determines which RP to use for a particular






23. The process of taking a PDU from some other source and placing a header in front of the original PDU - and possibly a trailer behind it.






24. Any OSPF neighbor for which the database flooding process has completed.






25. A mechanism for conserving battery power in wireless stations. The access point buffers data frames destined to sleeping stations - which wake periodically to learn from information in the beacon frame whether or not data frames are waiting for trans






26. Defined in RFC 3748 - the protocol used by IEEE 802.1X for exchanging authentication information.






27. An EIGRP message that is used to acknowledge reliable EIGRP messages - namely Update - Query - and Reply messages. Acks do not require an Ack.






28. In MPLS VPNs - a 64-bit Extended Community path attribute attached to a BGP route for the purpose of controlling into which VRFs the route is added.






29. The 32-bit number used to represent an OSPF router.






30. Cisco Wireless LAN Solution Engine.






31. A TCP variable that defines the largest number of bytes allowed in a TCP segment's Data field. The calculation does not include the TCP header. With a typical IP MTU of 1500 bytes - the resulting default MSS would be 1460. TCP hosts must support an M






32. Weighted fair queuing.






33. A 3-tuple consisting of an IP address - port number - and transport layer protocol. TCP connections exist between a pair of sockets.






34. A term referring generically to ways in which a router or switch can determine whether a particular device or user should be allowed access.






35. The second most significant bit in the most significant byte of an Ethernet MAC address - a value of binary 0 implies that the address is a Universally Administered Address (UAA) (also known as Burned-In Address [BIA]) - and a value of binary 1 impli






36. A security standard that includes both TKIP and AES and was ratified by the Wi-Fi Alliance.






37. Expedited Forwarding.






38. An STP timer that dictates how long a switch should wait when it ceases to hear Hellos.






39. Multicast Listener Discovery.






40. PIM-SM is a method of routing multicast packets that requires some intelligence in the network about the locations of receivers so that multicast traffic is not flooded into areas with no receivers. PIM Sparse Mode gets its name from the assumption t






41. With EIGRP - for a particular route - the case in which the RD is lower than the FD.






42. PIM-DM is a method of routing multicast packets that depends on a flood-and-prune approach. PIM Dense Mode gets its name from the assumption that there are many receivers of a particular multicast group - close together (from a network perspective).






43. A BGP router that - unknown to it - is aided by a route reflector server to cause all iBGP routers in an AS to learn all eBGP-learned prefixes.






44. Virtual Router Redundancy Protocol.






45. The algorithm used by OSPF and IS-IS to compute routes based on the LSDB.






46. In OSPF - a router that is prepared to take over the designated router.






47. An EIGRP message that identifies neighbors - exchanges parameters - and is sent periodically as a keepalive function. Hellos do not require an Ack.






48. A type of OSPF packet used to exchange and acknowledge LSA headers. Sometimes called DBD.






49. External BGP.






50. 64 bits at the end of an IPv6 global address - used to uniquely identify each host in a subnet.