Test your basic knowledge |

CCIE Vocab

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Used to reserve network resources for a flow as it traverses the network. A device that creates an RSVP reservation guarantees that it can provide the bandwidth - latency - or other resources that are requested by RSVP.






2. Link-state advertisement.






3. Each 802.11 station passively monitors each RF channel for a specific amount of time and listens for beacons. Stations use the signal strengths of found beacons to determine the access point or ad hoc network with which to attempt association.






4. In the PIM-SM design - the process by which a PIM-SM router can build the SPT between itself and the source of a multicast group and take advantage of the most efficient path available from the source to the router as long as it has one directly conn






5. Similar to an appliance firewall - in that interfaces are placed into security zones. Traffic is allowed between interfaces in the same zone. You can apply policies to filter and control traffic between zones.






6. A Frame Relay traffic shaping feature during which the shaping rate is reduced when the shaper notices congestion through the receipt of BECN or ForeSight messages.






7. A router that is not an ABR or ASBR in that all of its interfaces connect to only a single OSPF area.






8. Regeneration of the Layer 2 encapsulation removed from frames forwarded in a SPAN session.






9. In MPLS VPNs - an entity in a single router that provides a means to separate routes in different VPNs. The VRF includes per-VRF instances of routing protocols - a routing table - and an associated CEF FIB.






10. Advanced Encryption Standard A superior encryption mechanism that is part of the 802.11i standard and has much stronger security than TKIP.






11. An IPv6/IPv4 tunneling method that allows isolated IPv6 domains to be connected over an IPv4 network.






12. Enhanced Local Management Interface.






13. Time-division multiplexing.






14. Neighbor Advertisement.






15. A small FIFO queue associated with each router's physical interface - for the purpose of making packets available to the interface hardware - removing the need for a CPU interrupt to start sending the next packet out the interface.






16. An STP timer that dictates how long a switch should wait when it ceases to hear Hellos.






17. Defined in RFC 1293 - this protocol allows a Frame Relay-attached device to react to a received LMI "PVC up" message by announcing its Layer 3 addresses to the device on the other end of the PVC.






18. Cell Loss Priority.






19. A queuing scheduler concept - much like CQ's scheduler - in which queues are given some service in sequence. This term is often used with queuing in Cisco LAN switches.






20. Dynamic Trunking Protocol.






21. For some encoding schemes - consecutive signals must use opposite polarity in an effort to reduce DC current. A BPV occurs when consecutive signals are of the same polarity.






22. A network/subnet over which two or more OSPF routers have become neighbors - thereby being able to forward packets from one router to another across that network.






23. The Cisco IOS Router IP Traffic Export feature - intended for intrusion detection - exports IP traffic that has signs of an attack - such as duplicate IP packets simultaneously received on two or more of a router's interfaces.






24. A BGP path attribute that is communicated throughout a single AS to signify which route of multiple possible routes is the best route to be taken when leaving that AS. A larger value is considered to be better.






25. Ethernet process by which devices attached to the same cable negotiate their speed and the duplex settings over the cable.






26. Data Terminal Ready.






27. An OSPF router that connects to the backbone area and to one or more non-backbone area.






28. An address type in IPv6 networks that is used only on the local link and never beyond that scope.






29. A set of four hex digits listed in an IPv6 address. Each quartet is separated by a colon.






30. The protocol used by content engines to manage traffic flow between routers configured for WCCP and between content engines. WCCP takes advantage of the fact that many web pages (and other content) are regularly accessed by users in a given network.






31. Weighted tail drop.






32. Static length subnet masking.






33. The one VLAN on an 802.1Q trunk for which the endpoints do not add the 4-byte 802.1Q tag when transmitting frames in that VLAN.






34. In the context of SNMP - the Trap command is sent by an SNMP agent - to a manager - when the agent wants to send unsolicited information to the manager. Trap is not followed by a Response message from the receiving SNMP manager.






35. Layer x PDU.






36. Policing in which two rates are metered - and packets are placed into one of three categories (conform - exceed - or violate).






37. A bit inside the Frame Relay header that - when set - implies that congestion occurred in the direction opposite (or backward) as compared with the direction of the frame.






38. A term referring to the MQC class-map command and its related subcommands - which are used for classifying packets.






39. Service set identifier.






40. Access Control Entry. An individual line in an ACL.






41. With EIGRP - the metric (distance) of a route as reported by a neighboring router.






42. The process - defined by FRF.5 and FRF.8 - for combining ATM and FR technologies for an individual VC.






43. A standard (RFC 2131) protocol by which a host can dynamically broadcast a request for a server to assign to it an IP address - along with other configuration settings - including a subnet mask and default gateway IP address. DHCP provides a great de






44. Maximum Response Time.






45. Digital Signal Level 0.






46. A characterization of a network attack in which packets flow to the attacker - and then out to the true recipient. As a result - the user continues to send data - increasing the chance that the attacker learns more and better information.






47. A 16-bit number set with a router config-register command. It is used to set several low-level features related mainly to accessing the router and what the router does when powered on.






48. In an IOS confederation configuration - the actual ASN as seen by eBGP peers.






49. Extended Superframe.






50. Digital Signal Level 3.