Test your basic knowledge |

CCIE Vocab

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A TCP variable used as the basis for a TCP sender's timer defining how long it should wait for a missing acknowledgement before resending the data.






2. Another term for Port Address Translation. See PAT.






3. Extensible Authentication Protocol.






4. A well-known discretionary BGP path attribute that flags a route as being a summary route.






5. In 802.1X - the computer that stores usernames/passwords and verifies that the correct values were submitted before authenticating the user.






6. Secure Shell protocol used for character-oriented command-line access and configuration. A highly secure alternative to Telnet.






7. The range 239.0.0.0 through 239.255.255.255 that IANA has assigned for use in private multicast domains.






8. The first 48 bits of an IPv6 global address - used for efficient route aggregation.






9. Assured Forwarding. A set of DiffServ PHBs that defines 12 DSCP values - with four queuing classes and three drop probabilities within each queuing class.






10. The content engine in a WCCP cluster - which determines how traffic will be distributed within the cluster.






11. Jargon referring to a policer action through which - instead of discarding an out-of-contract packet - the policer marks a different IPP or DSCP value - allowing the packet to continue on its way - but making the packet more likely to be discarded la






12. A method for how a TCP sender grows its calculated CWND variable - thereby growing the allowed window for the connection. Slow Start grows CWND at an exponential rate.






13. When subnetting a class A - B - or C address - the subnet for which all subnet bits are binary 0.






14. Static length subnet masking.






15. A Cisco router feature in which the router works to prevent SYN attacks either by monitoring TCP connections flowing through the router - or by actively terminating TCP connection until the TCP connection is established and then knitting the client-s






16. A set of rules by which BGP examines the details of multiple BGP routes for the same NLRI and chooses the single best BGP route to install in the local BGP table.






17. An IPv6/IPv4 tunneling method that allows isolated IPv6 domains to be connected over an IPv4 network.






18. An FRF standard for payload compression.






19. The protocol used by content engines to manage traffic flow between routers configured for WCCP and between content engines. WCCP takes advantage of the fact that many web pages (and other content) are regularly accessed by users in a given network.






20. Weighted fair queuing.






21. Switched virtual circuit.






22. The common set of IOS configuration commands that is used with each QoS feature whose name begins with "Class-Based."






23. Uses Modular QoS CLI to control the amount and type of traffic handled by the router or switch control plane. Class maps identify traffic types - and then a service policy applied to the device control plane sets actions for each type of traffic.






24. A Cisco-proprietary feature. After a Cisco multicast router receives IGMP Join or Leave messages from hosts - it communicates to the connected Cisco switches - telling them which hosts (based on their unicast MAC addresses) have joined or left each m






25. Multicast addresses that are not assigned by IANA.






26. A workstation or server configured to collect and present RMON data for reporting purposes.






27. An IPv6 migration strategy in which a host or router supports both IPv4 and IPv6 natively.






28. An 802.11 frame that access points or stations in ad hoc networks send periodically so that wireless stations can discover the presence of a wireless LAN and coordinate use of certain protocols - such as power-save mode.






29. A term used with Cisco LAN switches - referring to a DSCP value used when making QoS decisions about a frame. This value may not be the actual DSCP value in the IP header encapsulated inside the frame.






30. Distance Vector Multicast Routing Protocol.






31. A 1-byte field in the IP header - originally defined by RFC 791 for QoS marking purposes.






32. When a PIM-SM router switches from RPT to SPT - it sends a PIM-SM Prune message for the source and the group with the RP bit set to its upstream router on the shared tree. RFC 2362 uses the notation PIM-SM (S - G) RP-bit Prune for this message.






33. Defined in RFC 2289 - a mechanism by which a shared key and a secret key together feed into a hash algorithm - creating a password that is transmitted over a network. Because the shared key is not reused - the hash value is only valid for that indivi






34. Spanning Tree Protocol.






35. A term referring to the process of applying the Message Digest 5 (MD5) algorithm to a string - resulting in another value. The original string cannot be easily computed even when the hash is known - making this process a strong method for storing pas






36. Defined in RFCs 1517-1520 - a scheme to help reduce Internet routing table sizes by administratively allocating large blocks of consecutive classful IP network numbers to ISPs for use in different global geographies. CIDR results in large blocks of n






37. The 802.1X function implemented by a switch - in which the switch translates between EAPoL and RADIUS messages in both directions - and enables/disables ports based on the success/failure of authentication.






38. In the PIM-SM design - the process by which a PIM-SM router can build the SPT between itself and the source of a multicast group and take advantage of the most efficient path available from the source to the router as long as it has one directly conn






39. A NAT term describing an IP address representing a host that resides outside the enterprise network - with the address being used in packets outside the enterprise network.






40. A process whereby a switch - when making a forwarding decision - uses not only Layer 2 logic but other OSI layer equivalents as well.






41. With RIP - the regular interval at which updates are sent. Each interface uses an independent timer - defaulting to 30 seconds.






42. A group of devices on one or more LANs that are configured (using management software) so that they can communicate as if they were attached to the same wire - when - in fact - they are located on a number of different LAN segments. Because VLANs are






43. The destination VLAN for an RSPAN session.






44. The notation in a Cisco IOS IP routing table that identifies the route used by that router as the default route.






45. In IP routing - a term referring to the building of IP routing tables by IP routing protocols.






46. Class-Based Weighted Fair Queuing.






47. Wi-Fi Protected Access. A security standard that includes both TKIP and AES and was ratified by the Wi-Fi Alliance.






48. Neighbor Advertisement.






49. The specific frequency subband on which the radio card or access point is operating. The RF channel is set in the access point or ad hoc stations.






50. An interface on a Cisco IOS-based switch that is treated as if it were an interface on a router.