Test your basic knowledge |

CCIE Vocab

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. On a multiaccess network - when a PIM-DM or PIM-SM router receives a Prune message - it starts a 3-second timer. If it receives a Join message on the multiaccess network from another router before the timer expires - it considers the message as an ov






2. Reduces the bandwidth necessary for radio management information - such as access point status messages - that is sent across the network by eliminating redundant management information.






3. This term has two BGP-related definitions. First - it is the normal process in which a router - before sending an Update to an eBGP peer - adds its local ASN to the beginning of the AS_PATH path attribute. Second - it is the routing policy of purpose






4. A generic term that refers to the data structure used by a layer in a layered network architecture when sending data.






5. An MPLS VPN term referring to a router at a customer site that does not implement MPLS.






6. Network Based Application Recognition.






7. Boot Protocol. A standard (RFC 951) protocol by which a LAN-attached host can dynamically broadcast a request for a server to assign it an IP address - along with other configuration settings - including a subnet mask and default gateway IP address.






8. In BGP - a configuration construct in which multiple neighbors' parameters can be configured as a group - thereby reducing the length of the configuration. Additionally - BGP performs routing policy logic against only one set of Updates for the entir






9. Dynamic Host Configuration Protocol.






10. Neighbor Discovery Protocol.






11. A PPP feature used to load balance multiple parallel links at Layer 2 by fragmenting frames - sending one frame over each of the links in the bundle - and reassembling them at the receiving end of the link.






12. An enhanced version of WEP that is part of the 802.11i standard and has an automatic key-update mechanism that makes it much more secure than WEP. TKIP is not as strong as AES in terms of data protection.






13. Not-so-stubby area.






14. Link-State Acknowledgment.






15. A BGP feature that defines the IP TTL field value in packets sent between two eBGP peers. This feature is required when using IP addresses other than the interface IP address on the link between peers.






16. Area 0; the area to which all other OSPF areas much connect in order for OSPF to work.






17. A communication protocol between hosts and a multicast router by which routers learn of which multicast groups' packets need to be forwarded onto a LAN.






18. A Cisco IOS queuing tool that uses MQC configuration commands - reserves a minimum bandwidth for some queues - provides high-priority scheduling for some queues - and polices those queues to prevent starvation of lower-priority queues during interfac






19. The process of taking a PDU from some other source and placing a header in front of the original PDU - and possibly a trailer behind it.






20. Tag Distribution Protocol.






21. Bootstrap Router.






22. Committed information rate.






23. An MPLS term describing designs in which one or more MPLS customer sites can be reached from multiple other VPNs.






24. Secure Shell protocol used for character-oriented command-line access and configuration. A highly secure alternative to Telnet.






25. Message sent by a PIM-DM router to a downstream router when it receives a Graft message from the downstream router; sent using the unicast address of the downstream router.






26. A route that is used for forwarding packets when the packet does not match any more specific routes in the IP routing table.






27. Class-Based Marking.






28. In two-rate policing - the second and higher rate defined to the policer.






29. In the context of SNMP - the Response command is sent by an SNMP agent - back to a manager - in response to any of the three types of Get requests - or in response to a Set request. It is also used by a manager in response to a received Inform comman






30. A Cisco-proprietary LMI protocol - implemented in Cisco WAN switches and routers - through which the switch can inform the router about parameters for each VC - including CIR - Bc - and Be.






31. Forwarding Information Base.






32. On a single computer - one layer provides a service to a higher layer. The software or hardware that implements the higher layer requests that the next lower layer perform the needed function.






33. The 32-bit number used to represent an OSPF router.






34. Digital subscriber line - a common Internet service type for residential and business customers.






35. Extensible Authentication Protocol.






36. A WRED process by which WRED discards all newly arriving packets intended for a queue - based on whether the queue's maximum threshold has been exceeded.






37. The process of taking the payload inside a Layer 2 frame - including the headers of Layer 3 and above - compressing the data - and then uncompressing the data on the receiving router.






38. A Cisco IOS feature that provides reporting information to a NetFlow aggregator based on traffic flows.






39. A method of collecting traffic received on a switch port or a VLAN and sending it to specific destination ports on the same switch.






40. A vendor consortium that formerly worked to further Frame Relay common vendor standards.






41. A network/subnet over which two or more OSPF routers have become neighbors - thereby being able to forward packets from one router to another across that network.






42. In IP routing - a term referring to the process of forwarding packets through a router.






43. A term referring to the MQC service-policy command - which is used to enable a policy map on an interface.






44. Defined in RFC 2289 - a mechanism by which a shared key and a secret key together feed into a hash algorithm - creating a password that is transmitted over a network. Because the shared key is not reused - the hash value is only valid for that indivi






45. Virtual circuit.






46. An optional nontransitive BGP path attribute that lists the route reflector cluster IDs through which a route has been advertised - as part of a loop-prevention process similar to the AS_PATH attribute.






47. A 3-bit field in an 802.1Q header used for marking frames.






48. Policing in which two rates are metered - and packets are placed into one of three categories (conform - exceed - or violate).






49. A BGP router in an AS that uses route reflectors - but that is not aided by any RR server.






50. A term referring generically to ways in which a router or switch can determine whether a particular device or user should be allowed access.