Test your basic knowledge |

CCIE Vocab

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Variable-length subnet masking.






2. A method of applying a mathematical formula - with input including a private key - the message contents - and sometimes a shared text string - with the resulting digest being included with the message. The sender and the receiver perform the same mat






3. A message sent by a multicast router - by default every 125 seconds - on each of its LAN interfaces to determine whether any host wants to receive multicast traffic for any group.






4. Regeneration of the Layer 2 encapsulation removed from frames forwarded in a SPAN session.






5. Data Terminal Ready.






6. WRED compares this setting to the average queue depth to decide whether packets should be discarded. No packets are discarded if the average queue depth falls below this minimum threshold.






7. Feasible distance.






8. A serial-line encoding standard that sends alternating positive and negative 3-volt signals for binary 1 - and no signal (0 V) for binary 0.






9. Uses Modular QoS CLI to control the amount and type of traffic handled by the router or switch control plane. Class maps identify traffic types - and then a service policy applied to the device control plane sets actions for each type of traffic.






10. A switch feature that examines incoming frames - comparing the source IP and MAC addresses to the DHCP snooping binding database - filtering frames whose addresses are not listed in the database for the incoming interface.






11. Peak information rate.






12. Password Authentication Protocol.






13. A BGP path attribute that allows routers in one AS to set a value and advertise it into a neighboring AS - impacting the decision process in that neighboring AS. A smaller value is considered better. Also called the BGP metric.






14. An MPLS data structure used for forwarding labeled packets. The LFIB lists the incoming label - which is compared to the incoming packet's label - along with forwarding instructions for the packet.






15. Message sent by a PIM-DM router to its upstream router asking to quickly restart forwarding the group traffic; sent using the unicast address of the upstream router.






16. Jargon referring to a policer action through which - instead of discarding an out-of-contract packet - the policer marks a different IPP or DSCP value - allowing the packet to continue on its way - but making the packet more likely to be discarded la






17. A term generally describing characteristics about BGP paths that are advertised in BGP Updates.






18. Timer An STP timer that dictates how long a port should stay in the listening state and the learning state.






19. Source-specific multicast.






20. Internet Group Management Protocol.






21. The operating mode of shaped round-robin that provides a low-latency queue with policing.






22. An OSPF external route for which internal OSPF cost is not added to the cost of the route as it was redistributed into OSPF.






23. Records client authentication and roaming events - which are sent to the CiscoWorks Wireless LAN Solution Engine (WLSE) to monitor client associations to specific access points.






24. An 802.1w RSTP port state in which the port is an alternative Designated Port on some LAN segment.






25. Excess Burst.






26. Allows the router to act as an inline IPS - doing deep packet inspection.






27. Advanced Encryption Standard A superior encryption mechanism that is part of the 802.11i standard and has much stronger security than TKIP.






28. An FRF standard for Frame Relay-to-ATM Service Interworking in which one DTE uses Frame Relay and one uses ATM.






29. The most significant bit in the most significant byte of an Ethernet MAC address - its value implies that the address is a unicast MAC address (binary 0) or not (binary 1).






30. The process of taking the payload inside a Layer 2 frame - including the headers of Layer 3 and above - compressing the data - and then uncompressing the data on the receiving router.






31. A Cisco switch feature that permits limiting traffic arriving at switch ports by percentage or absolute bandwidth. Separate thresholds are available per port for unicast - multicast - and broadcast traffic.






32. The speed at which the access link is clocked. This choice affects the price of the connection and many aspects of traffic shaping and policing - compression - quality of service - and other configuration options.






33. A TCP variable that defines the largest number of bytes allowed in a TCP segment's Data field. The calculation does not include the TCP header. With a typical IP MTU of 1500 bytes - the resulting default MSS would be 1460. TCP hosts must support an M






34. A term used in this book to refer to a route that is included in a larger summary route.






35. The SNMP specifications - standardized in RFCs - defining the rules by which SNMP MIB variables should be defined.






36. A vendor consortium that formerly worked to further Frame Relay common vendor standards.






37. Controls the distribution of multicast traffic for the private multicast address range 239.0.0.0 to 239.255.255.255 by configuring a filter and applying it on the interfaces.






38. Voice over Frame Relay.






39. A message sent by a router - after receiving a Leave message from a host - to determine whether there are still any active members of the group. The router uses the group address as the destination address.






40. An 802.1w RSTP port state in which the port is not the Root Port but is available to become the root port if the current root port goes down.






41. The second most significant bit in the most significant byte of an Ethernet MAC address - a value of binary 0 implies that the address is a Universally Administered Address (UAA) (also known as Burned-In Address [BIA]) - and a value of binary 1 impli






42. In shaping and policing - commonly used to refer to the shaping or policing rate. For WAN services - a common reference to the bit rate defined in the WAN service business contract for each VC.






43. With EIGRP - a purposefully slowly changing measurement of round-trip time between neighbors - from which the EIGRP RTO is calculated.






44. Defined in RFC 1293 - this protocol allows a Frame Relay-attached device to react to a received LMI "PVC up" message by announcing its Layer 3 addresses to the device on the other end of the PVC.






45. Network Address Translation.






46. The notation in a Cisco IOS IP routing table that identifies the route used by that router as the default route.






47. An alternative software loaded into a Cisco router - used for low-level debugging and for password recovery.






48. Instead of advertising all routes out a particular interface - the routing protocol omits the routes whose outgoing interface field matches the interface out which the update would be sent.






49. PIM-SM is a method of routing multicast packets that requires some intelligence in the network about the locations of receivers so that multicast traffic is not flooded into areas with no receivers. PIM Sparse Mode gets its name from the assumption t






50. The one VLAN on an 802.1Q trunk for which the endpoints do not add the 4-byte 802.1Q tag when transmitting frames in that VLAN.