Test your basic knowledge |

CCIE Vocab

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Secure Copy Protocol - one of the many ways of transferring files to and from Cisco IOS routers and switches.






2. In the context of SNMP - the Trap command is sent by an SNMP agent - to a manager - when the agent wants to send unsolicited information to the manager. Trap is not followed by a Response message from the receiving SNMP manager.






3. In MPLS - a term used to define a label that an LSR allocates and then advertises to neighboring routers. The label is considered "local" on the router that allocates and advertises the label.






4. Defines a particular behavior for FTP regarding the establishment of TCP data connections. In passive mode - an FTP server uses the FTP PORT command - over the FTP control connection - to tell the FTP client the port on which the server will be liste






5. With a routing update - or routing table entry - the portion of a route that defines the next router to which a packet should be sent to reach the destination subnet. With routing protocols - the Next Hop field may define a router other than the rout






6. With Spanning Tree Protocol - the single port on each LAN segment from which the best Hello BPDU is forwarded.






7. IP Control Protocol.






8. When a PIM-SM router switches from RPT to SPT - it sends a PIM-SM Prune message for the source and the group with the RP bit set to its upstream router on the shared tree. RFC 2362 uses the notation PIM-SM (S - G) RP-bit Prune for this message.






9. A queuing scheduler's logic by which - if a particular queue has packets in it - those packets always get serviced next.






10. Class Selector.






11. The MD5-encoded password defined by the enable secret command.






12. Each 802.11 station periodically sends a probe request frame on each RF channel and monitors probe response frames that all access points within range send back. Stations use the signal strength of the probe response frames to determine which access






13. A Cisco-proprietary messaging protocol used to negotiate the dynamic creation of PortChannels (EtherChannels) and to choose which ports can be placed into an EtherChannel.






14. An MPLS VPN term referring to any LSR that connects to customers to support the forwarding of unlabeled packets - as well as connecting to the MPLS network to support labeled packets - thereby making the LSR be on the edge between the provider and th






15. A Cisco router feature in which the router works to prevent SYN attacks either by monitoring TCP connections flowing through the router - or by actively terminating TCP connection until the TCP connection is established and then knitting the client-s






16. A 16-bit number set with a router config-register command. It is used to set several low-level features related mainly to accessing the router and what the router does when powered on.






17. A name used for DS1 lines inside the European TDM hierarchy.






18. In the context of SNMP - the GetNext command is sent by an SNMP manager - to an agent - requesting the value of a single MIB variable. The GetNext request identifies a variable for which the manager wants the variable name and value of the next MIB l






19. An early standard from AT&T for encoding analog voice as a digital signal for transmission over a TDM network. PCM requires 64 kbps - and is the basis for the DS0 speed.






20. Ethernet feature in which a NIC or Ethernet port can only transmit or receive at the same instant in time - but not both. Half duplex is required when a possibility of collisions exists.






21. Access Control Entry. An individual line in an ACL.






22. From one multicast router's perspective - the upstream router is another router that has just forwarded a multicast packet to that router.






23. A single instance of STP that is applied to multiple VLANs - typically when using the 802.1Q trunking standard.






24. A type of logic for how a router uses a default route. When a default route exists - and the class A - B - or C network for the destination IP address does not exist in the routing table - the default route is used. If any part of that classful netwo






25. Enhances RP redundancy by providing a method for RPs to exchange multicast source information - even between multicast domains.






26. An FRF standard for Frame Relay-to-ATM Service Interworking in which one DTE uses Frame Relay and one uses ATM.






27. A BGP feature that overcomes the requirement of a full mesh of iBGP peers inside a single AS by separating the AS into multiple sub-autonomous systems.






28. The two computers use a protocol with which to communicate with the same layer on another computer. The protocol defined by each layer uses a header that is transmitted between the computers to communicate what each computer wants to do.






29. A single label and link that is part of a complete LDP. See also label switched path.






30. Class-Based Weighted Fair Queuing.






31. A category used by a policer to classify packets relative to the traffic contract. With two-color policers - these packets are considered to be above the contract; for three-color - these packets are above the Bc setting - but within the Be setting.






32. Gateway Load Balancing Protocol.






33. A serial-line encoding standard like B8ZS - but with each set of four consecutive 0s being changed to include a Bipolar Violation to maintain synchronization.






34. Permanent virtual circuit.






35. Aka receiver's advertised window.






36. An optional transitive BGP path attribute that - for a summary route - lists the BGP RID and ASN of the router that created the summary.






37. Structure of Management Information.






38. The first 4 bits of the first octet must be 1110. The last 28 bits are unstructured.






39. With EIGRP - a timer started when a reliable (to be acknowledged) message is transmitted. For any neighbor(s) failing to respond in its RTO - the RTP protocol causes retransmission. RTO is calculated based on SRTT.






40. A T1 alarm state that occurs when a device has detected a local LOF/LOS/AIS condition. The device in Red alarm state then sends a Yellow alarm signal.






41. Version 4 of the IP protocol - which is the generally deployed version worldwide (at publication) - and uses 32-bit IP addresses.






42. A strategy for subnetting a classful network for which masks/prefixes are different for some subnets of that one classful network.






43. One-time password.






44. Maximum Response Time.






45. A reserved value for the BGP COMMUNITY path attribute that implies that the route should not be advertised outside the local AS.






46. A Cisco IOS queuing tool most notable for its scheduler - which always services the high-priority queue over all other queues.






47. The process of sending an infinite-metric route in routing updates when that route fails.






48. A 3-bit field in the first 3 bits of the ToS byte in the IP header - used for QoS marking.






49. Extensible Authentication Protocol.






50. When subnetting a class A - B - or C address - the subnet for which all subnet bits are binary 0.