Test your basic knowledge |

CCIE Vocab

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. The process of forwarding packets through a router. Also called IP forwarding.






2. An alternative software loaded into a Cisco router - used for basic IP connectivity; most useful when Flash memory is broken and you need IP connectivity to copy a new IOS image into Flash memory.






3. A process on a computing device that issues requests for SNMP MIB variables from SNMP agents - receives and processes the MIB data - and accepts unsolicited Trap messages from SNMP agents.






4. WRED compares this setting to the average queue depth to decide whether packets should be discarded. No packets are discarded if the average queue depth falls below this minimum threshold.






5. Records client authentication and roaming events - which are sent to the CiscoWorks Wireless LAN Solution Engine (WLSE) to monitor client associations to specific access points.






6. Differentiated Services.






7. A Layer 3 forwarding path through a router that does not optimize the forwarding path through the router.






8. An Internet standard authentication protocol that uses clear-text passwords and a two-way handshake to perform authentication over a PPP link.






9. A switch feature in which the switch examines DHCP messages and - for untrusted ports - filters all messages typically sent by servers and inappropriate messages sent by clients. It also builds a DHCP snooping binding table that is used by DAI and IP






10. When subnetting a class A - B - or C address - the subnet for which all subnet bits are binary 1.






11. UniDirectional Link Detection.






12. An FRF standard for LFI for VoFR (FRF.11) VCs - in which all voice frames are interleaved in front of data frames' fragments.






13. The first 6 bits of the DS field - used for QoS marking.






14. The PPP function for fragmenting packets - plus interleaving delay-sensitive later-arriving packets between the fragments of the first packet.






15. Point-to-Point Protocol.






16. A dotted-decimal number used to help define the structure of an IP address. The binary 0s in the mask identify the host portion of an address - and the binary 1s identify either the combined network and subnet part (when thinking classfully) or the n






17. The MD5-encoded password defined by the enable secret command.






18. A technology that sends a high-speed data stream over multiple subcarriers simultaneously. It is highly immune to multipath interference. 802.11a and 802.11g specify the use of OFDM.






19. An OSPF area into which external (type 5) LSAs are not introduced by its ABRs; instead - the ABRs originate and inject default routes into the area.






20. A wireless LAN physical layer that is backward compatible with 802.11b and operates at up to 54-Mbps data rates using OFDM in the 2.4-GHz band.






21. A term referring to the processes and bits in the data stream used to manage the Telco TDM hierarchy.






22. Prefix list.






23. Inside telcos' original TDM hierarchy - the smallest unit of transmission at 64 kbps.






24. An optimized Layer 3 forwarding path through a router. Fast switching optimizes routing table lookup by creating a special - easily searched table of known flows between hosts.






25. An 802.1d STP transitory port state in which the port does not send or receive frames - but does learn the source MAC addresses from incoming frames.






26. The characterization of how far EIGRP Query messages flow away from the router that first notices a failed route and goes active for a particular subnet.






27. A WRED process by which WRED does not discard packets during times in which a queue's minimum threshold has not been passed.






28. A strategy for subnetting a classful network for which masks/prefixes are different for some subnets of that one classful network.






29. A type of spread spectrum that spreads RF signals over the frequency spectrum by representing each data bit by a longer code. 802.11b specifies the use of DSSS.






30. In MPLS VPNs - an entity in a single router that provides a means to separate routes in different VPNs. The VRF includes per-VRF instances of routing protocols - a routing table - and an associated CEF FIB.






31. Neighbor Discovery Protocol.






32. Operates in dense mode and depends on its own unicast routing protocol that is similar to RIP to perform its multicast functions.






33. An optimized Layer 3 forwarding path through a router or switch. CEF optimizes routing table lookup by creating a special - easily searched tree structure based on the contents of the IP routing table. The forwarding information is called the Forward






34. An event in which a new packet arrives - needing to be placed into a queue - and the queue is full






35. Cell Loss Priority.






36. An FRF standard for LFI for data (FRF.3) VCs.






37. A network/subnet to which only one OSPF router is connected.






38. The mandatory contention-based 802.11 access protocol that is also referred to as CSMA/CA.






39. A 16-bit number set with a router config-register command. It is used to set several low-level features related mainly to accessing the router and what the router does when powered on.






40. Reliable Transport Protocol.






41. A method of providing dynamically configured spoke-to-spoke VPN connectivity in a hub-and-spoke network that significantly reduces configuration required on the spoke routers compared to traditional IPsec VPN environments.






42. Enhanced Local Management Interface.






43. A term referring to the MQC class-map command and its related subcommands - which are used for classifying packets.






44. A term referring generically to a server that performs many AAA functions. It also refers to the software product Cisco Secure Access Control Server.






45. The portion of PPP focused on features that are unrelated to any specific Layer 3 protocol.






46. A type of OSPF NSSA area for which neither external (type 5) LSAs are introduced - nor type 3 summary LSAs; instead - the ABRs originate and inject default routes into the area. External routes can be injected into a totally NSSA area.






47. Inter-Switch Link.






48. In the PIM-SM design - the process by which a source DR - after it starts to receive the group traffic - encapsulates the multicast packets in the unicast packets and sends them to the RP.






49. Database Description.






50. Data terminal equipment.