Test your basic knowledge |

CCIE Vocab

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Cisco-proprietary STP feature in which a switch port monitors for STP BPDUs of any kind - err-disabling the port upon receipt of any BPDU.






2. Used by WRED to calculate the maximum percentage of packets discarded when the average queue depth falls between the minimum and maximum thresholds.






3. An MQC configuration style by which one policy map calls a second policy map. For example - a shaping policy map can call an LLQ policy map to implement LLQ for packets shaped by CB Shaping.






4. A workstation or server configured to collect and present RMON data for reporting purposes.






5. PIM-SM is a method of routing multicast packets that requires some intelligence in the network about the locations of receivers so that multicast traffic is not flooded into areas with no receivers. PIM Sparse Mode gets its name from the assumption t






6. Mark probability denominator.






7. EAP over LAN.






8. A term used with WFQ for the number assigned to a packet as it is enqueued into a WFQ. WFQ schedules the currently lowest SN packet next.






9. Inside telcos' original TDM hierarchy - a unit that combines multiple DS0s into a single channel






10. The process of forwarding packets through a router. Also called IP forwarding.






11. A Cisco-proprietary protocol - used by LAN switches to communicate VLAN configuration.






12. A term referring to the process of applying the Message Digest 5 (MD5) algorithm to a string - resulting in another value. The original string cannot be easily computed even when the hash is known - making this process a strong method for storing pas






13. Defined in FRF.11 - an FR VC that uses a slightly varied header - as compared with FRF.3 data VCs - to accommodate voice payloads directly encapsulated inside the Frame Relay LAPF header.






14. The structure inside telcos' original digital circuit build-out in the mid-1900s - based upon using TDM to combine and disperse smaller DS levels into larger levels - and vice versa.






15. Calculated measurement based on the actual queue depth and the previous average. Designed to allow WRED to adjust slowly to rapid changes of the actual queue depth.






16. Time-division multiplexing.






17. Designated router.






18. Message sent by a PIM-DM router to a downstream router when it receives a Graft message from the downstream router; sent using the unicast address of the downstream router.






19. With shaping - the number of bits allowed to be sent every Tc. Also defines the size of the token bucket when Be = 0.






20. Enhances RP redundancy by providing a method for RPs to exchange multicast source information - even between multicast domains.






21. Designed to solve the problems of multicast duplication and multicast routing loops. For every multicast packet received - a multicast router examines its source IP address - consults its unicast routing table - determines which interface it would us






22. In IP routing - a term referring to the building of IP routing tables by IP routing protocols.






23. An attack by which the attacker initiates many TCP connections to a server - but does not complete the TCP connections - by simply not sending the third segment normally used to establish the connection. The server may consume resources and reject ne






24. A message sent by the multicast router - by default every 60 seconds - on each of its LAN interfaces to determine whether any host wants to receive multicast traffic for any group.






25. The definitions for a particular set of data variables - with those definitions following the SMI specifications. See also SMI.






26. An enhanced version of WEP that is part of the 802.11i standard and has an automatic key-update mechanism that makes it much more secure than WEP. TKIP is not as strong as AES in terms of data protection.






27. A BGP router that - unknown to it - is aided by a route reflector server to cause all iBGP routers in an AS to learn all eBGP-learned prefixes.






28. With OSPF - the OSPF router that wins an election amongst all current neighbors. The DR is responsible for flooding on the subnet - and for creating and flooding the type 2 LSA for the subnet.






29. The most significant bit in the most significant byte of an Ethernet MAC address - its value implies that the address is a unicast MAC address (binary 0) or not (binary 1).






30. With EIGRP - a timer started when a reliable (to be acknowledged) message is transmitted. For any neighbor(s) failing to respond in its RTO - the RTP protocol causes retransmission. RTO is calculated based on SRTT.






31. An IPv6 address format used for publicly registered IPv6 addresses.






32. Backward Explicit Congestion Notification.






33. The All OSPF Routers multicast IP address - listened for by all OSPF routers.






34. Excess Burst.






35. Access Control Server. A term referring generically to a server that performs many AAA functions. It also refers to the software product Cisco Secure Access Control Server.






36. Cisco IOS IP Service Level Agent feature. Provides for router-generated information useful for verifying network performance on a scheduled basis - and the associated reporting functions.






37. A type of logic for how a router uses a default route. When a default route exists - and no more specific match is made between the destination of the packet and the routing table - the default route is used.






38. Virtual circuit.






39. A logical group of content engines running WCCP between them. The lead content engine determines the traffic distribution within the cluster - for optimum performance and scalability.






40. The range 232.0.0.0 through 232.255.255.255 that is allocated by IANA for SSM destination addresses and is reserved for use by source-specific applications and protocols.






41. Common Spanning Tree.






42. Cisco-proprietary STP feature in which switches use messaging to confirm the loss of Hello BPDUs in a switch's Root Port - to avoid having to wait for maxage to expire - resulting in faster convergence.






43. Weighted random early detection.






44. On a serial cable - the pin lead set by the DCE to imply that the DCE is ready to signal using pin leads






45. A term referring to how a router views a BGP peer relationship - in which the peer is in another AS.






46. An MPLS term referring to the MPLS label just before the IP header. Also called the VPN label when implementing MPLS VPNs.






47. Static length subnet masking.






48. With EIGRP - a router sharing the same primary subnet - with which Hellos are exchanged - parameters match - and with which routes can be exchanged.






49. In switch port security - the process whereby the switch dynamically learns the MAC address(es) of the device(s) connected to a switch port - and then adds those addresses to the running configuration as allowed MAC addresses for port security.






50. With RIP - a per-route timer that increases until the router receives a routing update that confirms the route is still valid - upon which the timer is reset to 0. If the updates cease - the Invalid timer will grow - until reaching the timer setting