Test your basic knowledge |

CCIE Vocab

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Defined in RFC 1631 - a method of translating IP addresses in headers with the goal of allowing multiple hosts to share single public IP addresses - thereby reducing IPv4 public address depletion.






2. A style of attack in which an ICMP Echo is sent with a directed broadcast (subnet broadcast) destination IP address - and a source address of the host that is being attacked. The attack can result in the Echo reaching a large number of hosts - all of






3. A method for how a TCP sender grows its calculated CWND variable - thereby growing the allowed window for the connection. Slow Start grows CWND at an exponential rate.






4. Diffusing Update Algorithm.






5. Gateway Load Balancing Protocol.






6. Network Control Protocol.






7. A term used in this book to refer to a route that is included in a larger summary route.






8. A term referring to the process of applying the Message Digest 5 (MD5) algorithm to a string - resulting in another value. The original string cannot be easily computed even when the hash is known - making this process a strong method for storing pas






9. Excess Burst.






10. An NTP mode in which an NTP host does not adjust its clock - but in which it sends NTP messages to clients so that the clients can update their clocks based on the server's clock.






11. A characterization of a BGP path attribute in which all BGP implementations must support and understand the attribute (well known) - but BGP Updates can either include the attribute or not depending on whether a related feature has been configured (d






12. Assured Forwarding. A set of DiffServ PHBs that defines 12 DSCP values - with four queuing classes and three drop probabilities within each queuing class.






13. In the PIM-SM design - the process by which a source DR - after it starts to receive the group traffic - encapsulates the multicast packets in the unicast packets and sends them to the RP.






14. A type of spread spectrum that spreads RF signals over the frequency spectrum by representing each data bit by a longer code. 802.11b specifies the use of DSSS.






15. The same thing as TCP code bits. See TCP code bits.






16. EAP over LAN.






17. A BGP path attribute that is communicated throughout a single AS to signify which route of multiple possible routes is the best route to be taken when leaving that AS. A larger value is considered to be better.






18. A mapping between each DSCP value and a WRED threshold - often used in Cisco LAN switches when performing WRED.






19. With routing protocols - the process by which the router receiving a routing update determines if the routing update came from a trusted router.






20. Label Distribution Protocol.






21. A set of all devices that receive broadcast frames originating from any device within the set. Devices in the same VLAN are in the same broadcast domain.






22. A feature of Ethernet NICs. When the NIC transmits an electrical signal - it "loops" the transmitted electrical current back onto the receive pair. By doing so - if another NIC transmits a frame at the same time - the NIC can detect the overlapping r






23. Each 802.11 station periodically sends a probe request frame on each RF channel and monitors probe response frames that all access points within range send back. Stations use the signal strength of the probe response frames to determine which access






24. On a serial cable - the pin lead set by the DTE to tell the DCE that the DTE wants to send data.






25. In OSPF - a router that is prepared to take over the designated router.






26. In IP routing - a term referring to the building of IP routing tables by IP routing protocols.






27. Any OSPF neighbor for which the database flooding process has completed.






28. A conceptual model used by shapers and policers to represent their internal logic.






29. With private VLANs - a secondary VLAN in which the ports can send and receive frames only with promiscuous ports in the primary VLAN.






30. Controls the distribution of multicast traffic for the private multicast address range 239.0.0.0 to 239.255.255.255 by configuring a filter and applying it on the interfaces.






31. Inverse ARP.






32. A route that is created to represent one or more smaller component routes - typically in an effort to reduce the size of routing and topology tables.






33. A method for how a TCP sender grows its calculated CWND variable - thereby growing the allowed window for the connection. Congestion Avoidance grows CWND linearly.






34. An MQC configuration style by which one policy map calls a second policy map. For example - a shaping policy map can call an LLQ policy map to implement LLQ for packets shaped by CB Shaping.






35. A Frame Relay traffic shaping feature during which the shaping rate is reduced when the shaper notices congestion through the receipt of BECN or ForeSight messages.






36. Bootstrap Router.






37. Weighted tail drop.






38. An FRTS configuration construct - configured with the map-class frame-relay global configuration command.






39. Dynamic Trunking Protocol.






40. The process of taking routes known through one routing protocol and advertising those routes with another routing protocol.






41. Multicast addresses that are not assigned by IANA.






42. The difference between the measured signal power and the noise power that a particular receiver sees at a given time. Higher SNRs generally indicate better performance.






43. The portions of PPP focused on features that are related to specific Layer 3 protocols.






44. A message sent by a host when it wants to leave a group - addressed to the All Multicast Routers address 224.0.0.2.






45. As defined in RFC 3623 - graceful restart allows for uninterrupted forwarding in the event that an OSPF router's OSPF routing process must restart. The router does this by first notifying the neighbor routers that the restart is about to occur; the n






46. Cisco-proprietary STP feature in which switches use messaging to confirm the loss of Hello BPDUs in a switch's Root Port - to avoid having to wait for maxage to expire - resulting in faster convergence.






47. A set of parameters for CBAC to perform in its traffic inspection process.






48. A Cisco-proprietary protocol used to dynamically negotiate whether the devices on an Ethernet segment want to form a trunk and - if so - which type (ISL or 802.1Q).






49. In PIM-SM - the path of the group traffic that flows from the RP to the routers that need the traffic. It is also called the root-path tree (RPT) - because it is rooted at the RP.






50. The most significant bit in the most significant byte of an Ethernet MAC address - its value implies that the address is a unicast MAC address (binary 0) or not (binary 1).







Sorry!:) No result found.

Can you answer 50 questions in 15 minutes?


Let me suggest you:



Major Subjects



Tests & Exams


AP
CLEP
DSST
GRE
SAT
GMAT

Most popular tests