Test your basic knowledge |

CCIE Vocab

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. With OSPF - the encapsulation of OSPF messages inside IP - to a router with which no common subnet is shared - for the purpose of either mending partitioned areas or providing a connection from some remote area to the backbone area.






2. The second most significant bit in the most significant byte of an Ethernet MAC address - a value of binary 0 implies that the address is a Universally Administered Address (UAA) (also known as Burned-In Address [BIA]) - and a value of binary 1 impli






3. Sent by a PIM router to its upstream router to either request that the upstream router forward the group traffic or stop forwarding the group traffic that is currently being forwarded. If a PIM router wants to start receiving the group traffic - it l






4. A style of attack in which an ICMP Echo is sent with a directed broadcast (subnet broadcast) destination IP address - and a source address of the host that is being attacked. The attack can result in the Echo reaching a large number of hosts - all of






5. Receivers subscribe to an (S -G) channel when they request to join a multicast group. That is - they specify the unicast IP address of their multicast source and the group multicast address. SSM is typically used in very large multicast deployments s






6. Local Management Interface.






7. The portions of PPP focused on features that are related to specific Layer 3 protocols.






8. From a Layer 1 perspective - the process of using special strings of electrical signals over a transmission medium to inform the receiver as to which bits are overhead bits - and which fit into individual subchannels.






9. A set of all devices that receive broadcast frames originating from any device within the set. Devices in the same VLAN are in the same broadcast domain.






10. Weighted tail drop.






11. Database Description.






12. A BGP process by which a router reapplies routing policy configuration (route maps - filters - and the like) based on stored copies of sent and received BGP Updates.






13. With EIGRP - the metric value for the lowest-metric route to a particular subnet.






14. A term generally describing characteristics about BGP paths that are advertised in BGP Updates.






15. An attack similar to a smurf attack - but using packets for the UDP Echo application instead of ICMP.






16. In TCP - a TCP host sets the TCP header's Window field to the number of bytes it allows the other host to send before requiring an acknowledgement. In effect - the receiving host - by stating a particular window size - grants the sending host the rig

Warning: Invalid argument supplied for foreach() in /var/www/html/basicversity.com/show_quiz.php on line 183


17. Jargon used to refer to the first of two buckets in the dual token bucket model; its size is Bc.






18. RFC 1918-defined IPv4 network numbers that are not assigned as public IP address ranges - and are not routable on the Internet. Intended for use inside enterprise networks.






19. Bootstrap Router.






20. A set of DiffServ PHBs that defines 12 DSCP values - with four queuing classes and three drop probabilities within each queuing class.






21. An NTP mode in which two or more NTP servers mutually synchronize their clocks.






22. The first 6 bits of the DS field - used for QoS marking.






23. Class Selector.






24. A single instance of STP that is applied to multiple VLANs - typically when using the 802.1Q trunking standard.






25. Wired Equivalent Privacy.






26. A method of providing dynamically configured spoke-to-spoke VPN connectivity in a hub-and-spoke network that significantly reduces configuration required on the spoke routers compared to traditional IPsec VPN environments.






27. A field within a route entry in a routing update - used to associate a generic number with the route. It is used when passing routes between routing protocols - allowing an intermediate routing protocol to pass information about a route that is not n






28. Differentiated Services.






29. Protocol Independent Multicast sparse-mode routing protocol.






30. Superframe






31. Request-to-send/clear-to-send.






32. A T1 alarm state that occurs when a device receives a Yellow Alarm signal. This typically means that the device on the other end of the line is in a Red Alarm state.






33. A name used for DS1 lines inside the North American TDM hierarchy.






34. A T1 alarm state that occurs when the receiver can no longer consistently identify the frame.






35. With private VLANs - a secondary VLAN in which the ports can send and receive frames only with promiscuous ports in the primary VLAN.






36. Variable name for the time interval used by shapers and by CAR.






37. Generic routing encapsulation.






38. With OSPF - the OSPF router that wins an election amongst all current neighbors. The DR is responsible for flooding on the subnet - and for creating and flooding the type 2 LSA for the subnet.






39. Reduces the bandwidth necessary for radio management information - such as access point status messages - that is sent across the network by eliminating redundant management information.






40. A conceptual model used by CB Policing when using an excess burst.






41. The process of taking routes known through one routing protocol and advertising those routes with another routing protocol.






42. A term referring to the MQC service-policy command - which is used to enable a policy map on an interface.






43. Message Digest 5.






44. Router ID.






45. Cisco IOS Embedded Event Manager - a feature that monitors events on a router and reports their results. Principally intended to increase availability - EEM provides flexible - granular detection and alerting functions.






46. In 802.1X - the computer that stores usernames/passwords and verifies that the correct values were submitted before authenticating the user.






47. A router that should either permanently or temporarily not be used as a transit router. Can wait a certain time after OSPF process start - or after BGP notifies OSPF that BGP has converged - before ceasing to be a stub router.






48. Link Access Procedure for Frame-Mode Bearer Services.






49. A reserved value for the BGP COMMUNITY path attribute that implies that the route should not be advertised to any other peer.






50. A method for optimizing the flow of multicast IP packets passing through a LAN switch. The switch using IGMP snooping examines IGMP messages to determine which ports need to receive traffic for each multicast group.