Test your basic knowledge |

CCIE Vocab

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Defined in RFC 826 - a protocol used on LANs so that an IP host can discover the MAC address of another device that is using a particular IP address.






2. An 802.1d STP transitory port state in which the port does not send or receive frames - and does not learn MAC addresses - but does wait for STP convergence and for CAM flushing by the switches in the network.






3. An effort to reduce the query scope with EIGRP - using route summarization or EIGRP stub routers.






4. A neighbor state that signifies the other router has reached neighbor status - having passed the parameter check. The FIB entry details the information needed for forwarding: the next-hop router and the outgoing interface - in an optimized mtrie stru






5. Loss of Frame.






6. An alternative software loaded into a Cisco router - used for low-level debugging and for password recovery.






7. Sequence number.






8. An MPLS application that allows the MPLS network to connect to multiple different IP networks - with overlapping IP addresses - and provide IP connectivity to those multiple networks.






9. Gateway Load Balancing Protocol.






10. In the context of SNMP - the Trap command is sent by an SNMP agent - to a manager - when the agent wants to send unsolicited information to the manager. Trap is not followed by a Response message from the receiving SNMP manager.






11. Data Carrier Detect.






12. A convention for IP addresses in which class A - B - and C default network prefixes (of 8 - 16 - and 24 bits - respectively) are ignored.






13. With EIGRP - a route that is not a successor route - but that meets the feasibility condition; can be used when the successor route fails - without causing loops.






14. A switch feature that limits the number of allowed MAC addresses on a port - with optional limits based on the actual values of the MAC addresses.






15. Bootstrap Router.






16. Router-Port Group Management Protocol.






17. Rendezvous point.






18. With PIM on a multiaccess network - the PIM router with the highest IP address on the subnet. It is also the IGMPv1 Querier. The DR is responsible for the following tasks: - Sending PIM register and PIM join and prune messages toward the RP to infor






19. In IP routing - a term referring to the process of forwarding packets through a router.






20. Boot Protocol. A standard (RFC 951) protocol by which a LAN-attached host can dynamically broadcast a request for a server to assign it an IP address - along with other configuration settings - including a subnet mask and default gateway IP address.






21. A Layer 3 forwarding path through a router that does not optimize the forwarding path through the router.






22. A style of attack in which an ICMP Echo is sent with a directed broadcast (subnet broadcast) destination IP address - and a source address of the host that is being attacked. The attack can result in the Echo reaching a large number of hosts - all of






23. A category used by a policer to classify packets relative to the traffic contract. With two-color policers - these packets are considered to be above the contract; for three-color - these packets are above the Bc setting - but within the Be setting.






24. A message sent by each host - either in response to a router Query or on its own - to all multicast groups for which it would like to receive multicast traffic.






25. A process used in routers that are encrypting traffic to permit egress QoS actions to be taken on traffic that is being encrypted on that router. QoS pre-classification keeps a copy of each packet to be encrypted in memory long enough to take the app






26. Discard Eligible.






27. A BGP path attribute that is communicated throughout a single AS to signify which route of multiple possible routes is the best route to be taken when leaving that AS. A larger value is considered to be better.






28. Enhanced Local Management Interface.






29. The process of running the SPF algorithm against the LSDB - with the result being the determination of the current best route(s) to each subnet.






30. An E-LSR in an MPLS VPN network whose role in a particular discussion is to receive labeled packets from other LSRs and then forward the packets as unlabeled packets to CE routers.






31. A term generally describing characteristics about BGP paths that are advertised in BGP Updates.






32. A type of OSPF packet used to discover neighbors - check for parameter agreement - and monitor the health of another router.






33. The multicast addresses assigned by IANA.






34. Link Control Protocol.






35. The common set of IOS configuration commands that is used with each QoS feature whose name begins with "Class-Based."






36. Maximum Response Time.






37. A conceptual model used by CB Policing when using an excess burst.






38. Digital Signal Level 1.






39. An OSPF external route for which internal OSPF cost is added to the cost of the route as it was redistributed into OSPF.






40. Edge LSR.






41. Priority queue and priority queuing.






42. A T1 alarm state that occurs when a device has detected a local LOF/LOS/AIS condition. The device in Red alarm state then sends a Yellow alarm signal.






43. In IPv6 - the Neighbor Discovery message used by an IPv6 node to request information about a neighbor or neighbors.






44. A wireless LAN that offers connections to the Internet from public places - such as airports - hotels - and coffee shops.






45. A Cisco-proprietary messaging protocol implemented in WAN switches that can be used to signal network status - including congestion - independent of end-user frames and cells.






46. A time value that each wireless station must set based on the duration value found in every 802.11 frame. The time value counts down and must be equal to zero before a station is allowed to access the wireless medium. The result is a collision-avoida






47. An IPv6/IPv4 tunneling method that allows isolated IPv6 domains to be connected over an IPv4 network.






48. The difference between the measured signal power and the noise power that a particular receiver sees at a given time. Higher SNRs generally indicate better performance.






49. Used by RRs to denote the RID of the iBGP neighbor that injected the NLRI into the AS.






50. A method for optimizing the flow of multicast IP packets passing through a LAN switch. The switch using IGMP snooping examines IGMP messages to determine which ports need to receive traffic for each multicast group.