Test your basic knowledge |

CCIE Vocab

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. The combination of PVST+ and Rapid Spanning Tree. It provides subsecond convergence time and is compatible with PVST+ and MSTP.






2. Measured Round-Trip Time.






3. A numeric value between 0 and 32 (inclusive) that defines the number of beginning bits in an IP address for which all IP addresses in the same group have the same value. Alternative: The number of binary 1s beginning a subnet mask - written as a deci






4. A Cisco-proprietary protocol - used by LAN switches to communicate VLAN configuration.






5. Used by RRs to denote the RID of the iBGP neighbor that injected the NLRI into the AS.






6. Jargon used to refer to the second of two buckets in the dual token bucket model; its size is Be.






7. Database Description.






8. A 16-bit number set with a router config-register command. It is used to set several low-level features related mainly to accessing the router and what the router does when powered on.






9. A characterization of a BGP path attribute in which BGP implementations are not required to support the attribute (optional) - and for which if a router receives a route with such an attribute - the router should remove the attribute before advertisi






10. A Cisco-proprietary messaging protocol used to negotiate the dynamic creation of PortChannels (EtherChannels) and to choose which ports can be placed into an EtherChannel.






11. Border Gateway Protocol.






12. With routing protocols - the process by which the router receiving a routing update determines if the routing update came from a trusted router.






13. Also called VLAN trunking - a method (using either the Cisco ISL protocol or the IEEE 802.1Q protocol) to support carrying traffic between switches for multiple VLANs that have members on more than one switch.






14. The protocol used by content engines to manage traffic flow between routers configured for WCCP and between content engines. WCCP takes advantage of the fact that many web pages (and other content) are regularly accessed by users in a given network.






15. Neighbor Solicitation.






16. When a PIM-SM router switches from RPT to SPT - it sends a PIM-SM Prune message for the source and the group with the RP bit set to its upstream router on the shared tree. RFC 2362 uses the notation PIM-SM (S - G) RP-bit Prune for this message.






17. A T1 alarm state that occurs when a device receives a Yellow Alarm signal. This typically means that the device on the other end of the line is in a Red Alarm state.






18. Controls the distribution of multicast traffic by checking the TTL values configured on the interfaces. It forwards the multicast packet only on those interfaces whose configured TTL value is less than or equal to the TTL value of the multicast packe






19. A BGP path attribute that is communicated throughout a single AS to signify which route of multiple possible routes is the best route to be taken when leaving that AS. A larger value is considered to be better.






20. A Cisco IOS queuing tool that uses MQC configuration commands and reserves a minimum bandwidth for each queue.






21. The first 48 bits of an IPv6 global address - used for efficient route aggregation.






22. A WRED process by which WRED discards all newly arriving packets intended for a queue - based on whether the queue's maximum threshold has been exceeded.






23. With EIGRP - for a particular route - the case in which the RD is lower than the FD.






24. The protocol used in IPv6 for many functions - including address autoconfiguration - duplicate address detection - router - neighbor - and prefix discovery - neighbor address resolution - and parameter discovery.






25. Multilink PPP.






26. With PIM on a multiaccess network - the PIM router with the highest IP address on the subnet. It is also the IGMPv1 Querier. The DR is responsible for the following tasks: - Sending PIM register and PIM join and prune messages toward the RP to infor






27. WRED is a method of congestion avoidance that works by dropping packets before the output queue becomes completely full. WRED can base its dropping behavior on IP Precedence or DSCP values to drop low-priority packets before high-priority packets.






28. An 802.1w RSTP port state in which the port is an alternative Designated Port on some LAN segment.






29. A basic form of traffic shaping that is applied to an interface or subinterface. By default - it shapes all traffic leaving the interface - but can be modified by using an access control list. The access list controls only what traffic is shaped; GTS






30. In IPv6 - an address used in the Neighbor Discovery (ND) process. The format for these addresses is FF02::1:FF00:0000/104 - and each IPv6 host must join the corresponding group for each of its unicast and anycast addresses.






31. Bipolar 8 Zero Substitution. A serial-line encoding standard that substitutes Bipolar Violations in a string of eight binary 0s to provide enough signal transitions to maintain synchronization.






32. An Internet standard authentication protocol that uses clear-text passwords and a two-way handshake to perform authentication over a PPP link.






33. A process on a computing device that issues requests for SNMP MIB variables from SNMP agents - receives and processes the MIB data - and accepts unsolicited Trap messages from SNMP agents.






34. Extended Superframe.






35. Class Selector.






36. Another name for Superframe.






37. The condition in which a route has been in an EIGRP active state for longer than the router's Active timer.






38. A BGP peer connection between two routers inside the same ASN - but in different confederation sub-autonomous systems.






39. An enhanced version of T1 framing - as compared with the earlier Superframe (D4) standard.






40. Often used synonymously with neighbor - but with emphasis on the fact that all required parameters match - allowing routing updates to be exchanged between the routers.






41. Used by WRED to calculate the rate at which the average queue depth changes as compared with the current queue depth. The larger the number - the slower the change in the average queue depth.






42. An FRF standard for LFI for data (FRF.3) VCs.






43. The IP address to which Label Distribution Protocol (LDP) sends LDP Hellos. Also used in IP multicast to send packets to all multicast routers.






44. The second byte of the IP header - formerly known as the ToS byte and redefined by DiffServ.






45. Each 802.11 station periodically sends a probe request frame on each RF channel and monitors probe response frames that all access points within range send back. Stations use the signal strength of the probe response frames to determine which access






46. A PPP feature used to load balance multiple parallel links at Layer 2 by fragmenting frames - sending one frame over each of the links in the bundle - and reassembling them at the receiving end of the link.






47. A predefined VC. A PVC can be equated to a leased line in concept.






48. Weighted tail drop.






49. The All OSPF Routers multicast IP address - listened for by all OSPF routers.






50. An EIGRP message that identifies neighbors - exchanges parameters - and is sent periodically as a keepalive function. Hellos do not require an Ack.