Test your basic knowledge |

CCIE Vocab

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Advanced Encryption Standard A superior encryption mechanism that is part of the 802.11i standard and has much stronger security than TKIP.






2. Cisco Wireless LAN Solution Engine.






3. Wired Equivalent Privacy.






4. Three core security functions.






5. Inside telcos' original TDM hierarchy - the smallest unit of transmission at 64 kbps.






6. Pulse code modulation.






7. The multicast addresses assigned by IANA.






8. Link Access Procedure for Frame-Mode Bearer Services.






9. The process of breaking a frame into pieces - sending some of the fragments - and then sending all or part of a different packet - all of which is done to reduce the delay of the second packet.






10. An MPLS VPN term referring to the more efficient choice of popping the outer label at the second-to-last (penultimate) LSR - which then prevents the egress PE from having to perform two LFIB lookups to forward the packet.






11. A NAT term describing an IP address representing a host that resides outside the enterprise network - with the address being used in packets inside the enterprise network.






12. Class-Based Weighted Fair Queuing.






13. A route that is used for forwarding packets when the packet does not match any more specific routes in the IP routing table.






14. A NAT term describing an IP address representing a host that resides inside the enterprise network - with the address being used in packets inside the enterprise network.






15. On a serial cable - the pin lead set by the DTE to imply that the DTE is ready to signal using pin leads.






16. A wireless LAN physical layer that operates at up to 54-Mbps data rates using OFDM in the 5-GHz band.






17. An interface on a Cisco IOS-based switch that is treated as if it were an interface on a switch.






18. An optional contention-free 802.11 access protocol that requires the access point to poll wireless stations before they are able to send frames. Not commonly implemented.






19. A reserved value for the BGP COMMUNITY path attribute that implies that the route should not be advertised to any other peer.






20. A BGP feature that overcomes the requirement of a full mesh of iBGP peers inside a single AS by separating the AS into multiple sub-autonomous systems.






21. A feature of Ethernet NICs. When the NIC transmits an electrical signal - it "loops" the transmitted electrical current back onto the receive pair. By doing so - if another NIC transmits a frame at the same time - the NIC can detect the overlapping r






22. Virtual LAN.






23. Data terminal equipment.






24. A T1 alarm state that occurs when the receiver can no longer consistently identify the frame. See LOF.






25. Ethernet MAC address that represents a single NIC or interface.






26. A term referring to the MQC policy-map command and its related subcommands - which are used to apply QoS actions to classes of packets.






27. In two-rate policing - the second and higher rate defined to the policer.






28. Used by a policer to classify packets relative to the traffic contract. These packets are considered to be above the traffic contract in all cases.






29. A process on a computing device that accepts SNMP requests - responds with SNMP-structured MIB data - and initiates unsolicited Trap messages back to an SNMP management station.






30. The process of running the SPF algorithm against the LSDB - with the result being the determination of the current best route(s) to each subnet.






31. Challenge Handshake Authentication Protocol.






32. A characterization of a BGP path attribute in which all BGP implementations must support and understand the attribute (well known) - but BGP Updates can either include the attribute or not depending on whether a related feature has been configured (d






33. An attack by which the attacker initiates many TCP connections to a server - but does not complete the TCP connections - by simply not sending the third segment normally used to establish the connection. The server may consume resources and reject ne






34. Wi-Fi Protected Access. A security standard that includes both TKIP and AES and was ratified by the Wi-Fi Alliance.






35. In the PIM-SM design - the central distribution point to which the multicast traffic is first delivered from the source designated router.






36. Mark probability denominator.






37. An optional transitive BGP path attribute used to store 32-bit decimal values. Used for flexible grouping of routes by assigning the group the same COMMUNITY value. Other routers can apply routing policies based on the COMMUNITY value. Used in a larg






38. An FRF standard for payload compression.






39. In switch port security - the process whereby the switch dynamically learns the MAC address(es) of the device(s) connected to a switch port - and then adds those addresses to the running configuration as allowed MAC addresses for port security.






40. Context-Based Access Control.






41. Data Terminal Ready.






42. Distance Vector Multicast Routing Protocol.






43. Version 4 of the IP protocol - which is the generally deployed version worldwide (at publication) - and uses 32-bit IP addresses.






44. Virtual Router Redundancy Protocol.






45. Reliable Transport Protocol.






46. A Cisco-proprietary STP implementation - created many years before IEEE 802.1s and 802.1w - that speeds convergence and allows for one STP instance for each VLAN.






47. Digital Signal Level 0.






48. A time value that each wireless station must set based on the duration value found in every 802.11 frame. The time value counts down and must be equal to zero before a station is allowed to access the wireless medium. The result is a collision-avoida






49. Excess Burst.






50. Area Border Router. An OSPF router that connects to the backbone area and to one or more non-backbone areas.