Test your basic knowledge |

CCIE Vocab

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Data-link connection identifier.






2. A state for a route in an EIGRP topology table that indicates that the router believes that the route is stable - and it is not currently looking for any new routes to that subnet.






3. An attack by which the attacker initiates many TCP connections to a server - but does not complete the TCP connections - by simply not sending the third segment normally used to establish the connection. The server may consume resources and reject ne






4. In shaping and policing - the definition of parameters that together imply the allowed rate and bursts.






5. Common Spanning Tree.






6. A term referring to how a router views a BGP peer relationship - in which the peer is in another AS.






7. An NTP mode in which an NTP host adjusts its clock in relation to an NTP server's clock.






8. A reserved value for the BGP COMMUNITY path attribute that implies that the route should not be advertised outside the local confederation sub-AS.






9. A characterization of a network attack in which packets flow to the attacker - and then out to the true recipient. As a result - the user continues to send data - increasing the chance that the attacker learns more and better information.






10. UniDirectional Link Detection.






11. With EIGRP - a route that is not a successor route - but that meets the feasibility condition; can be used when the successor route fails - without causing loops.






12. Designated router.






13. Point-to-Point Protocol.






14. A conceptual model used by shapers and policers to represent their internal logic.






15. Rapid Spanning Tree Protocol.






16. A neighbor state that signifies the other router has reached neighbor status - having passed the parameter check. The FIB entry details the information needed for forwarding: the next-hop router and the outgoing interface - in an optimized mtrie stru






17. An MPLS term referring to the first of several labels when an MPLS-forwarded packet has multiple labels (a label stack).






18. Orthogonal frequency division multiplexing.






19. The process by which neighboring OSPF routers examine their Hello messages and elect the DR. The decision is based on priority (highest) - or RID (highest) if priority is a tie.






20. Autonomous System Boundary Router. An OSPF router that redistributes routes from some other source into OSPF.






21. A queuing scheduler concept - much like CQ's scheduler - in which queues are given some service in sequence. This term is often used with queuing in Cisco LAN switches.






22. Cisco IOS router feature by which a route map determines how to forward a packet - typically based on information in the packet other than the destination IP address.






23. A number between 1 and 64 -511 (public) and 64 -512 and 65 -535 (private) assigned to an AS for the purpose of identifying a specific BGP domain.






24. An IPv6/IPv4 tunneling method that is designed for transporting IPv6 packets within a site where a native IPv6 infrastructures is not available.






25. Access Control Entry. An individual line in an ACL.






26. An ITU standard Frame Relay header - including the DLCI - DE - FECN - and BECN bits in the LAPF header - and a frame check in the LAPF trailer.






27. The rate at which a shaper limits the bits exiting the shaper.






28. A multicast routing protocol that forwards the multicast traffic only when requested by a downstream router.






29. A technology that enables frequency reuse. Two variants exist: frequency hopping (FHSS) and direct sequence (DSSS). Both techniques spread the signal power over a relatively wide portion of the frequency spectrum over time - to reduce interference be






30. A designated router that is directly connected with a source of the multicast group.






31. Variable-length subnet masking.






32. With some routing protocols - the time period between successive Hello messages.






33. Frame Relay Forum.






34. A term relating to Cisco LAN switch tail-drop logic - in which multiple tail-drop thresholds may be assigned based on CoS or DSCP - resulting in some frames being discarded more aggressively than others.






35. Dynamic ARP Inspection.






36. An optional contention-free 802.11 access protocol that requires the access point to poll wireless stations before they are able to send frames. Not commonly implemented.






37. An alternative software loaded into a Cisco router - used for basic IP connectivity; most useful when Flash memory is broken and you need IP connectivity to copy a new IOS image into Flash memory.






38. WRED compares this setting to the average queue depth to decide whether packets should be discarded. All packets are discarded if the average queue depth rises above this maximum threshold.






39. Cisco-proprietary STP feature in which a switch port - known to not have a bridge or switch attached to it - transitions from disabled to forwarding state without using any intermediate states.






40. With EIGRP - a timer started when a reliable (to be acknowledged) message is transmitted. For any neighbor(s) failing to respond in its RTO - the RTP protocol causes retransmission. RTO is calculated based on SRTT.






41. Extended Superframe.






42. The second most significant bit in the most significant byte of an Ethernet MAC address - a value of binary 0 implies that the address is a Universally Administered Address (UAA) (also known as Burned-In Address [BIA]) - and a value of binary 1 impli






43. Calculated measurement based on the actual queue depth and the previous average. Designed to allow WRED to adjust slowly to rapid changes of the actual queue depth.






44. A BGP feature by which a router learns iBGP routes - and then forwards them to other iBGP peers - reducing the required number of iBGP peers while also avoiding routing loops.






45. Secure Shell protocol used for character-oriented command-line access and configuration. A highly secure alternative to Telnet.






46. Data terminal equipment.






47. The RMON function of tracking a particular variable. RMON events trigger RMON alarms.






48. The information maintained by a router for each multicast entry in its multicast routing table - such as incoming interface - outgoing interface list - Uptime timer - Expire timer - etc.






49. The 802.1X function implemented by a switch - in which the switch translates between EAPoL and RADIUS messages in both directions - and enables/disables ports based on the success/failure of authentication.






50. A characterization of a BGP path attribute in which BGP implementations are not required to support the attribute (optional) - and for which if a router receives a route with such an attribute - the router should remove the attribute before advertisi