SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CCIE Vocab
Start Test
Study First
Subjects
:
certifications
,
ccie
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Defined in RFC 1631 - a method of translating IP addresses in headers with the goal of allowing multiple hosts to share single public IP addresses - thereby reducing IPv4 public address depletion.
Network Address Translation
MPLS VPNs
PQ
policing rate
2. A style of attack in which an ICMP Echo is sent with a directed broadcast (subnet broadcast) destination IP address - and a source address of the host that is being attacked. The attack can result in the Echo reaching a large number of hosts - all of
smurf attack
HDB3
configuration register
Outside Local address
3. A method for how a TCP sender grows its calculated CWND variable - thereby growing the allowed window for the connection. Slow Start grows CWND at an exponential rate.
encoding
SMI
Slow Start
LSR
4. Diffusing Update Algorithm.
going active
Inside Global address
DUAL
LACP
5. Gateway Load Balancing Protocol.
nested policy maps
GLBP
stub network (OSPF)
input event
6. Network Control Protocol.
NCP
LSA
Get (SNMP)
request-to-send/clear-to-send
7. A term used in this book to refer to a route that is included in a larger summary route.
Bipolar 8 Zero Substitution
QV
Alternate state
component route
8. A term referring to the process of applying the Message Digest 5 (MD5) algorithm to a string - resulting in another value. The original string cannot be easily computed even when the hash is known - making this process a strong method for storing pas
MD5 hash
feasible successor
port security
NBAR
9. Excess Burst.
Be
split horizon
Area Border Router
superior BPDU
10. An NTP mode in which an NTP host does not adjust its clock - but in which it sends NTP messages to clients so that the clients can update their clocks based on the server's clock.
Zone-based IOS firewall
provider router
NTP server mode
SPAN
11. A characterization of a BGP path attribute in which all BGP implementations must support and understand the attribute (well known) - but BGP Updates can either include the attribute or not depending on whether a related feature has been configured (d
proxy ARP
Clear To Send
straight-through cable
well-known discretionary
12. Assured Forwarding. A set of DiffServ PHBs that defines 12 DSCP values - with four queuing classes and three drop probabilities within each queuing class.
Dynamic Multipoint VPN
AF
Inform
NAT
13. In the PIM-SM design - the process by which a source DR - after it starts to receive the group traffic - encapsulates the multicast packets in the unicast packets and sends them to the RP.
Access Control Server
source registration
DR election (OSPF)
AIS
14. A type of spread spectrum that spreads RF signals over the frequency spectrum by representing each data bit by a longer code. 802.11b specifies the use of DSSS.
Inside Local address
authenticator
direct sequence spread spectrum
Ready To Send
15. The same thing as TCP code bits. See TCP code bits.
collision domain
Hello (EIGRP)
TCP flags
IPv4
16. EAP over LAN.
Forwarding Information Base
port security
EAPoL
sticky learning
17. A BGP path attribute that is communicated throughout a single AS to signify which route of multiple possible routes is the best route to be taken when leaving that AS. A larger value is considered to be better.
access link
DSR
LOCAL_PREF
backup designated router
18. A mapping between each DSCP value and a WRED threshold - often used in Cisco LAN switches when performing WRED.
Extensible Authentication Protocol
DSCP-to-threshold map
MaxAge (OSPF)
E1
19. With routing protocols - the process by which the router receiving a routing update determines if the routing update came from a trusted router.
loopback circuitry
Neighbor Advertisement
AGGREGATOR
authentication
20. Label Distribution Protocol.
Yellow Alarm
hardware queue
FRF.5
LDP
21. A set of all devices that receive broadcast frames originating from any device within the set. Devices in the same VLAN are in the same broadcast domain.
CLP
Wi-Fi Protected Access
Web Cache Communication Protocol
broadcast domain
22. A feature of Ethernet NICs. When the NIC transmits an electrical signal - it "loops" the transmitted electrical current back onto the receive pair. By doing so - if another NIC transmits a frame at the same time - the NIC can detect the overlapping r
MIB walk
loopback circuitry
TDP
RTS
23. Each 802.11 station periodically sends a probe request frame on each RF channel and monitors probe response frames that all access points within range send back. Stations use the signal strength of the probe response frames to determine which access
RARP
no drop
remaining bandwidth
active scanning
24. On a serial cable - the pin lead set by the DTE to tell the DCE that the DTE wants to send data.
Ready To Send
listening state
provider edge
dual token bucket
25. In OSPF - a router that is prepared to take over the designated router.
AS_PATH prepending
backup designated router
generic traffic shaping (GTS)
Hello (OSPF)
26. In IP routing - a term referring to the building of IP routing tables by IP routing protocols.
Internet Group Management Protocol
Forward Explicit Congestion Notification
Expedited Forwarding
control plane
27. Any OSPF neighbor for which the database flooding process has completed.
MLP
Goodbye (EIGRP)
fully adjacent (OSPF)
PVST+
28. A conceptual model used by shapers and policers to represent their internal logic.
WFQ
token bucket
source DR
FRF.9
29. With private VLANs - a secondary VLAN in which the ports can send and receive frames only with promiscuous ports in the primary VLAN.
RSPAN
isolated VLAN
PPP
Inverse ARP
30. Controls the distribution of multicast traffic for the private multicast address range 239.0.0.0 to 239.255.255.255 by configuring a filter and applying it on the interfaces.
local computation
designated port
FRF.12
administrative scoping
31. Inverse ARP.
same-layer interaction
FHSS
IGMP snooping
InARP
32. A route that is created to represent one or more smaller component routes - typically in an effort to reduce the size of routing and topology tables.
SVC
WRED
summary route
EGP
33. A method for how a TCP sender grows its calculated CWND variable - thereby growing the allowed window for the connection. Congestion Avoidance grows CWND linearly.
Congestion Avoidance
AS_PATH prepending
pruning
User Priority
34. An MQC configuration style by which one policy map calls a second policy map. For example - a shaping policy map can call an LLQ policy map to implement LLQ for packets shaped by CB Shaping.
triggered updates
Classic IOS Firewall
nested policy maps
fragmentation
35. A Frame Relay traffic shaping feature during which the shaping rate is reduced when the shaper notices congestion through the receipt of BECN or ForeSight messages.
Measured Round-Trip Time
SCP
adaptive shaping
full drop
36. Bootstrap Router.
BSR
native VLAN
data plane
Link Control Protocol
37. Weighted tail drop.
NetFlow aggregator
Lead Content Engine
CEF
WTD
38. An FRTS configuration construct - configured with the map-class frame-relay global configuration command.
WTD
map class
Protocol Independent Multicast sparse-mode routing protocol
optional transitive
39. Dynamic Trunking Protocol.
NS
DTP
single-rate - three-color policer
IGMPv3 Host Membership Report
40. The process of taking routes known through one routing protocol and advertising those routes with another routing protocol.
link-state routing protocol
Reverse ARP
route redistribution
Web Cache Communication Protocol
41. Multicast addresses that are not assigned by IANA.
LCP
transient multicast group
software queue
Retransmission Timeout
42. The difference between the measured signal power and the noise power that a particular receiver sees at a given time. Higher SNRs generally indicate better performance.
queue starvation
LOCAL_AS
NLRI
signal-to-noise ratio
43. The portions of PPP focused on features that are related to specific Layer 3 protocols.
CE
RPF check
dual token bucket
Network Control Protocol
44. A message sent by a host when it wants to leave a group - addressed to the All Multicast Routers address 224.0.0.2.
sequence number (WFQ)
policy map
IGMPv2 Leave
adaptive shaping
45. As defined in RFC 3623 - graceful restart allows for uninterrupted forwarding in the event that an OSPF router's OSPF routing process must restart. The router does this by first notifying the neighbor routers that the restart is about to occur; the n
Layer 2 payload compression
Data-link connection identifier
CEF
graceful restart (OSPF)
46. Cisco-proprietary STP feature in which switches use messaging to confirm the loss of Hello BPDUs in a switch's Root Port - to avoid having to wait for maxage to expire - resulting in faster convergence.
WEP
COMMUNITY
BackboneFast
LSA type (OSPF)
47. A set of parameters for CBAC to perform in its traffic inspection process.
LSU
inspection rule
confederation eBGP peer
B8ZS
48. A Cisco-proprietary protocol used to dynamically negotiate whether the devices on an Ethernet segment want to form a trunk and - if so - which type (ISL or 802.1Q).
MULTI_EXIT_DISC (MED)
Dynamic Trunking Protocol
NTP server mode
eBGP
49. In PIM-SM - the path of the group traffic that flows from the RP to the routers that need the traffic. It is also called the root-path tree (RPT) - because it is rooted at the RP.
shared distribution tree
community VLAN
LSA
P router
50. The most significant bit in the most significant byte of an Ethernet MAC address - its value implies that the address is a unicast MAC address (binary 0) or not (binary 1).
IP prefix list
I/G bit
customer edge
LFI
Sorry!:) No result found.
Can you answer 50 questions in 15 minutes?
Let me suggest you:
Browse all subjects
Browse all tests
Most popular tests
Major Subjects
Tests & Exams
AP
CLEP
DSST
GRE
SAT
GMAT
Certifications
CISSP go to https://www.isc2.org/
PMP
ITIL
RHCE
MCTS
More...
IT Skills
Android Programming
Data Modeling
Objective C Programming
Basic Python Programming
Adobe Illustrator
More...
Business Skills
Advertising Techniques
Business Accounting Basics
Business Strategy
Human Resource Management
Marketing Basics
More...
Soft Skills
Body Language
People Skills
Public Speaking
Persuasion
Job Hunting And Resumes
More...
Vocabulary
GRE Vocab
SAT Vocab
TOEFL Essential Vocab
Basic English Words For All
Global Words You Should Know
Business English
More...
Languages
AP German Vocab
AP Latin Vocab
SAT Subject Test: French
Italian Survival
Norwegian Survival
More...
Engineering
Audio Engineering
Computer Science Engineering
Aerospace Engineering
Chemical Engineering
Structural Engineering
More...
Health Sciences
Basic Nursing Skills
Health Science Language Fundamentals
Veterinary Technology Medical Language
Cardiology
Clinical Surgery
More...
English
Grammar Fundamentals
Literary And Rhetorical Vocab
Elements Of Style Vocab
Introduction To English Major
Complete Advanced Sentences
Literature
Homonyms
More...
Math
Algebra Formulas
Basic Arithmetic: Measurements
Metric Conversions
Geometric Properties
Important Math Facts
Number Sense Vocab
Business Math
More...
Other Major Subjects
Science
Economics
History
Law
Performing-arts
Cooking
Logic & Reasoning
Trivia
Browse all subjects
Browse all tests
Most popular tests