Test your basic knowledge |

CCIE Vocab

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. With EIGRP - for a particular route - the case in which the RD is lower than the FD.






2. A security standard that includes both TKIP and AES and was ratified by the Wi-Fi Alliance.






3. Cisco Wireless LAN Solution Engine.






4. Secure Shell protocol used for character-oriented command-line access and configuration. A highly secure alternative to Telnet.






5. A neighbor state that signifies the other router has reached neighbor status - having passed the parameter check.






6. An optional transitive BGP path attribute used to store 32-bit decimal values. Used for flexible grouping of routes by assigning the group the same COMMUNITY value. Other routers can apply routing policies based on the COMMUNITY value. Used in a larg






7. A message that each host sends - either in response to a router Query message or on its own - to all multicast groups for which it would like to receive multicast traffic.






8. An EIGRP message that is used to ask neighboring routers to verify their route to a particular subnet. Query messages require an Ack.






9. Copper cable with RJ-45 connectors in which the wire at pin 1 on one end is connected to pin 1 on the other end; the wire at pin 2 is connected to pin 2 on the other end; and so on.






10. Operation - Administration - and Maintenance.






11. The difference between the measured signal power and the noise power that a particular receiver sees at a given time. Higher SNRs generally indicate better performance.






12. Challenge Handshake Authentication Protocol.






13. In SNMP - the process of a manager using successive GetNext and GetBulk commands to discover the exact MIB structure supported by an SNMP agent. The process involves the manager asking for each successive MIB leaf variable.






14. A state for a route in an EIGRP topology table that indicates that the router believes that the route is stable - and it is not currently looking for any new routes to that subnet.






15. A definition that determines the data structure and information implied by a particular LSA.






16. When subnetting a class A - B - or C address - the subnet for which all subnet bits are binary 0.






17. A serial-line encoding standard that substitutes Bipolar Violations in a string of eight binary 0s to provide enough signal transitions to maintain synchronization.






18. In the context of SNMP - the Inform command is sent by an SNMP manager to communicate a set of variables - and their values - to another SNMP manager. The main purpose is to allow multiple managers to exchange MIB information - and work together - wi






19. Modified Deficit Round-Robin.






20. The speed at which the access link is clocked. This choice affects the price of the connection and many aspects of traffic shaping and policing - compression - quality of service - and other configuration options.






21. An administrative setting - included in Hellos - that is the first criteria for electing a DR. The highest priority wins - with values from 1-255 - with priority 0 meaning a router cannot become DR or BDR.






22. Also called VLAN trunking - a method (using either the Cisco ISL protocol or the IEEE 802.1Q protocol) to support carrying traffic between switches for multiple VLANs that have members on more than one switch.






23. Any occurrence that could change a router's EIGRP topology table - including a received Update or Query - a failed interface - or the loss of a neighbor.






24. Part of the Cisco IOS Firewall feature set - CBAC inspects traffic using information in the higher-layer protocols being carried to decide whether to open the firewall to specific inbound traffic. CBAC supports both UDP and TCP and multiple higher-la






25. From one perspective - DTE devices are one of two devices on either end of a communications circuit - specifically the device with less control over the communications. In Frame Relay - routers connected to a Frame Relay access link are DTE devices.






26. A generic term that refers to the data structure used by a layer in a layered network architecture when sending data.






27. The structure inside telcos' original digital circuit build-out in the mid-1900s - based upon using TDM to combine and disperse smaller DS levels into larger levels - and vice versa.






28. Penultimate hop popping.






29. A VC that is set up dynamically when needed. An SVC can be equated to a dial-on-demand connection in concept.






30. A Cisco router feature in which the router works to prevent SYN attacks either by monitoring TCP connections flowing through the router - or by actively terminating TCP connection until the TCP connection is established and then knitting the client-s






31. A wireless LAN physical layer that operates at up to 11-Mbps data rates using DSSS in the 2.4-GHz band.






32. A method for how a TCP sender grows its calculated CWND variable - thereby growing the allowed window for the connection. Slow Start grows CWND at an exponential rate.






33. Prefix list.






34. The encapsulation of EAP messages directly inside LAN frames. This encapsulation is used between the supplicant and the authenticator.






35. Jargon used to refer to the first of two buckets in the dual token bucket model; its size is Bc.






36. An interface on a Cisco IOS-based switch that is treated as if it were an interface on a router.






37. Smoothed Round-Trip Time.






38. An OSPF area into which external (type 5) LSAs are not introduced by its ABRs; instead - the ABRs originate and inject default routes into the area.






39. A name used for DS1 lines inside the North American TDM hierarchy.






40. Maximum Segment Size.






41. The 802.1X function implemented by a switch - in which the switch translates between EAPoL and RADIUS messages in both directions - and enables/disables ports based on the success/failure of authentication.






42. Aka minimum CIR.






43. IP routing The simplest MPLS application - involving the advertisement of an IGP to learn IP routes - and LDP or TDP to advertise labels.






44. A feature of Ethernet NICs. When the NIC transmits an electrical signal - it "loops" the transmitted electrical current back onto the receive pair. By doing so - if another NIC transmits a frame at the same time - the NIC can detect the overlapping r






45. A Frame Relay traffic shaping feature during which the shaping rate is reduced when the shaper notices congestion through the receipt of BECN or ForeSight messages.






46. A term used with WFQ for the number assigned to a packet as it is enqueued into a WFQ. WFQ schedules the currently lowest SN packet next.






47. Peak information rate.






48. The protocol used by content engines to manage traffic flow between routers configured for WCCP and between content engines. WCCP takes advantage of the fact that many web pages (and other content) are regularly accessed by users in a given network.






49. Time Interval.






50. A packet-scheduling algorithm used in Cisco switches that provides similar behavior to CBWFQ in shared mode and polices in shaped mode.