Test your basic knowledge |

CCIE Vocab

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. The RMON function of tracking a particular variable. RMON events trigger RMON alarms.






2. With EIGRP - a timer started when a reliable (to be acknowledged) message is transmitted. For any neighbor(s) failing to respond in its RTO - the RTP protocol causes retransmission. RTO is calculated based on SRTT.






3. IP routing The simplest MPLS application - involving the advertisement of an IGP to learn IP routes - and LDP or TDP to advertise labels.






4. Defined in RFC 2289 - a mechanism by which a shared key and a secret key together feed into a hash algorithm - creating a password that is transmitted over a network. Because the shared key is not reused - the hash value is only valid for that indivi






5. Low-latency queuing.






6. Network Address Translation-Protocol Translation.






7. Controls the distribution of multicast traffic for the private multicast address range 239.0.0.0 to 239.255.255.255 by configuring a filter and applying it on the interfaces.






8. A routing protocol feature by which the routing update includes only routes that have changed - rather than include the entire set of routes.






9. On a serial cable - the pin lead set by the DCE to tell the DTE that the DTE is allowed send data.






10. With RIP - a per-route timer - which is reset and grows with the Invalid timer. When the Flush timer mark is reached (default 240 seconds) - the router removes the route from the routing table - and now accepts any other routes about the failed subne






11. Sequence number.






12. With some routing protocols - the time period between successive Hello messages.






13. A method of Link Fragmentation and Interleaving (LFI) over interfaces that natively use Frame Relay encapsulation. The routers first build MLP-style PPP headers - which are then encapsulated inside a Frame Relay header. The PPP headers are then used






14. A NAT term describing an IP address representing a host that resides inside the enterprise network - with the address being used in packets outside the enterprise network.






15. A switch feature in which the switch examines DHCP messages and - for untrusted ports - filters all messages typically sent by servers and inappropriate messages sent by clients. It also builds a DHCP snooping binding table that is used by DAI and IP






16. Each 802.11 station periodically sends a probe request frame on each RF channel and monitors probe response frames that all access points within range send back. Stations use the signal strength of the probe response frames to determine which access






17. A state variable kept by a router for each known neighbor or potential neighbor.






18. Defines a particular wireless LAN. The SSID configured in the radio card must match the SSID in the access point before the station can connect with the access point.






19. Any OSPF neighbor for which the database flooding process has completed.






20. The process of taking the IP and TCP headers of a packet - compressing them - and then uncompressing them on the receiving router.






21. A set of packets in an MPLS network for which the MPLS network will apply the exact same forwarding behavior.






22. Cisco Express Forwarding.






23. An EIGRP message that is used to ask neighboring routers to verify their route to a particular subnet. Query messages require an Ack.






24. External BGP.






25. An architecture and set of documents that defines Cisco's best recommendations for how to secure a network.






26. The process of breaking a frame into pieces - sending some of the fragments - and then sending all or part of a different packet - all of which is done to reduce the delay of the second packet.






27. Request-to-send/clear-to-send.






28. The rate at which a policer limits the bits exiting or entering the policer.






29. A predefined VC. A PVC can be equated to a leased line in concept.






30. Router-Port Group Management Protocol.






31. Cisco Group Management Protocol.






32. A BGP message that includes withdrawn routes - path attributes - and NLRI.






33. Pulse code modulation.






34. A tunneling protocol that can be used to encapsulate many different protocol types - including IPv4 - IPv6 - IPsec - and others - to transport them across a network.






35. Provider router.






36. A serial-line encoding standard that substitutes Bipolar Violations in a string of eight binary 0s to provide enough signal transitions to maintain synchronization.






37. In shaping and policing - the definition of parameters that together imply the allowed rate and bursts.






38. With a routing update - or routing table entry - the portion of a route that defines the next router to which a packet should be sent to reach the destination subnet. With routing protocols - the Next Hop field may define a router other than the rout






39. An optional transitive BGP path attribute that - for a summary route - lists the BGP RID and ASN of the router that created the summary.






40. A small FIFO queue associated with each router's physical interface - for the purpose of making packets available to the interface hardware - removing the need for a CPU interrupt to start sending the next packet out the interface.






41. A table inside a router that holds the path attributes and NLRI known by the BGP implementation on that router.






42. Class Selector.






43. Discard Eligible.






44. A Cisco IOS feature that provides reporting information to a NetFlow aggregator based on traffic flows.






45. An optional contention-free 802.11 access protocol that requires the access point to poll wireless stations before they are able to send frames. Not commonly implemented.






46. A method of providing dynamically configured spoke-to-spoke VPN connectivity in a hub-and-spoke network that significantly reduces configuration required on the spoke routers compared to traditional IPsec VPN environments.






47. An IOS feature in which multiple routing tables and routing forwarding instances exist in a single router - with interfaces being assigned to one of the several VRFs. This feature allows separating of routing domains inside a single router platform.






48. Peak information rate.






49. Burst With shaping and policing - the number of additional bits that may be sent after a period of relative inactivity.






50. The IEEE standardized protocol for VLAN trunking.