Test your basic knowledge |

CCIE Vocab

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. An address type in IPv6 networks that is used only on the local link and never beyond that scope.






2. An SPF calculation as a result of changes inside the same area as a router - for which the SPF run must examine the full LSDB.






3. Any other router - sharing a common data link - with which a router exchanges Hellos - and for which the parameters in the Hello pass the parameter-check process.






4. The multicast addresses assigned by IANA.






5. EIGRP jargon meaning that EIGRP has placed a route into active status.






6. Layer 2 payload compression.






7. The SNMP specifications - standardized in RFCs - defining the rules by which SNMP MIB variables should be defined.






8. A set of packets in an MPLS network for which the MPLS network will apply the exact same forwarding behavior.






9. An 802.1w RSTP port state in which the port is an alternative Designated Port on some LAN segment.






10. A dotted-decimal number used to help define the structure of an IP address. The binary 0s in the mask identify the host portion of an address - and the binary 1s identify either the combined network and subnet part (when thinking classfully) or the n






11. Bipolar 8 Zero Substitution. A serial-line encoding standard that substitutes Bipolar Violations in a string of eight binary 0s to provide enough signal transitions to maintain synchronization.






12. Data communications equipment.






13. With a routing update - or routing table entry - the portion of a route that defines the next router to which a packet should be sent to reach the destination subnet. With routing protocols - the Next Hop field may define a router other than the rout






14. The Cisco IOS Router IP Traffic Export feature - intended for intrusion detection - exports IP traffic that has signs of an attack - such as duplicate IP packets simultaneously received on two or more of a router's interfaces.






15. Alarm Indication Signal. With T1s - the practice of sending all binary 1s on the line in reaction to problems - to provide signal transitions and allow recovery of synchronization and framing.






16. Instead of advertising all routes out a particular interface - the routing protocol omits the routes whose outgoing interface field matches the interface out which the update would be sent.






17. CDP Control Protocol.






18. When multiple routers are connected to a subnet - only one should be sending IGMP queries. It is called a querier. IGMPv1 does not have any rules for electing a querier. In IGMPv2 and IGMPv3 - a router with the lowest interface IP address on the subn






19. A method of providing dynamically configured spoke-to-spoke VPN connectivity in a hub-and-spoke network that significantly reduces configuration required on the spoke routers compared to traditional IPsec VPN environments.






20. Authentication - authorization - and accounting.






21. The one VLAN on an 802.1Q trunk for which the endpoints do not add the 4-byte 802.1Q tag when transmitting frames in that VLAN.






22. The most significant bit in the most significant byte of an Ethernet MAC address - its value implies that the address is a unicast MAC address (binary 0) or not (binary 1).






23. A number between 1 and 64 -511 (public) and 64 -512 and 65 -535 (private) assigned to an AS for the purpose of identifying a specific BGP domain.






24. A single instance of STP that is applied to multiple VLANs - typically when using the 802.1Q trunking standard.






25. An FRF standard for LFI for VoFR (FRF.11) VCs - in which all voice frames are interleaved in front of data frames' fragments.






26. An OSPF timer that determines how long an LSA can remain in the LSDB without having heard a reflooded copy of the LSA.






27. The characterization of how far EIGRP Query messages flow away from the router that first notices a failed route and goes active for a particular subnet.






28. A term referring to the process of applying the Message Digest 5 (MD5) algorithm to a string - resulting in another value. The original string cannot be easily computed even when the hash is known - making this process a strong method for storing pas






29. Digital subscriber line - a common Internet service type for residential and business customers.






30. An administrative setting - included in Hellos - that is the first criteria for electing a DR. The highest priority wins - with values from 1-255 - with priority 0 meaning a router cannot become DR or BDR.






31. A term referring to how a router views a BGP peer relationship - in which the peer is in another AS.






32. Used by WRED to calculate the maximum percentage of packets discarded when the average queue depth falls between the minimum and maximum thresholds.






33. A PPP feature used to load balance multiple parallel links at Layer 2 by fragmenting frames - sending one frame over each of the links in the bundle - and reassembling them at the receiving end of the link.






34. With private VLANs - a secondary VLAN in which the ports can send and receive frames only with promiscuous ports in the primary VLAN.






35. With RIP - the advertisement of a poisoned route out an interface - when that route was formerly not advertised out that interface due to split horizon rules.






36. The process of sending an infinite-metric route in routing updates when that route fails.






37. A small FIFO queue associated with each router's physical interface - for the purpose of making packets available to the interface hardware - removing the need for a CPU interrupt to start sending the next packet out the interface.






38. A standards-based way of helping routers find Rendezvous Points (RP). RPs notify BSRs of the groups they handle. BSRs in turn flood the group-to-RP mappings throughout the network. Each router individually determines which RP to use for a particular






39. Provides dynamic inspection of traffic as it traverses the router. It uses Context-Based Access Control (CBAC) to look deeper into a packet than an access list can. It tracks outbound traffic and dynamically allows in responses to that traffic.






40. A standard (RFC 2131) protocol by which a host can dynamically broadcast a request for a server to assign to it an IP address - along with other configuration settings - including a subnet mask and default gateway IP address. DHCP provides a great de






41. DCE devices are one of two devices on either end of a communications circuit - specifically the device with more control over the communications. Frame Relay switches are DCE devices. DCEs are also known as data circuit-terminating equipment (DTE).






42. The two computers use a protocol with which to communicate with the same layer on another computer. The protocol defined by each layer uses a header that is transmitted between the computers to communicate what each computer wants to do.






43. A type of logic for how a router uses a default route. When a default route exists - and the class A - B - or C network for the destination IP address does not exist in the routing table - the default route is used. If any part of that classful netwo






44. An 802.1d STP port state in which the port does not send or receive frames - except for listening for received Hello BPDUs.






45. An optional transitive BGP path attribute that - for a summary route - lists the BGP RID and ASN of the router that created the summary.






46. A mechanism used by TCP senders to limit the dynamic window for a TCP connection - to reduce the sending rate when packet loss occurs. The sender considers both the advertised window size and CWND - using the smaller of the two.






47. An attack by which the attacker initiates many TCP connections to a server - but does not complete the TCP connections - by simply not sending the third segment normally used to establish the connection. The server may consume resources and reject ne






48. The specific frequency subband on which the radio card or access point is operating. The RF channel is set in the access point or ad hoc stations.






49. A Cisco IOS queuing tool most notable for its scheduler - which always services the high-priority queue over all other queues.






50. A conceptual model used by CB Policing when using an excess burst.