Test your basic knowledge |

CCIE Vocab

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A style of attack in which an ICMP Echo is sent with a directed broadcast (subnet broadcast) destination IP address - and a source address of the host that is being attacked. The attack can result in the Echo reaching a large number of hosts - all of






2. Also called VLAN trunking - a method (using either the Cisco ISL protocol or the IEEE 802.1Q protocol) to support carrying traffic between switches for multiple VLANs that have members on more than one switch.






3. An EIGRP message that informs neighbors about routing information. Update messages require an Ack.






4. Generic routing encapsulation.






5. Cisco-proprietary STP feature in which a switch port monitors for STP BPDUs of any kind - err-disabling the port upon receipt of any BPDU.






6. An 802.1d STP port state in which the port sends and receives frames.






7. Multiple Spanning Trees.






8. A BGP neighbor state in which the BGP neighbors have stabilized and can exchange routing information using BGP Update messages.






9. The IP address to which Label Distribution Protocol (LDP) sends LDP Hellos. Also used in IP multicast to send packets to all multicast routers.






10. The actual number of packets in a queue at a particular time.






11. A term generally describing characteristics about BGP paths that are advertised in BGP Updates.






12. A router feature used when a router sees an ARP request searching for an IP host's MAC - when the router believes the IP host could not be on that LAN because the host is in another subnet. If the router has a route to reach the subnet where the ARP-






13. Temporal Key Integrity Protocol.






14. An IPv6/IPv4 tunneling method that is designed for transporting IPv6 packets within a site where a native IPv6 infrastructures is not available.






15. A BGP message that includes withdrawn routes - path attributes - and NLRI.






16. Ethernet MAC address that represents a single NIC or interface.






17. A BGP router that forwards iBGP-learned routes to other iBGP routers.






18. Superframe






19. The characterization of how far EIGRP Query messages flow away from the router that first notices a failed route and goes active for a particular subnet.






20. A BGP path attribute that is communicated throughout a single AS to signify which route of multiple possible routes is the best route to be taken when leaving that AS. A larger value is considered to be better.






21. The mandatory contention-based 802.11 access protocol that is also referred to as CSMA/CA.






22. The ASN assigned to a confederation sub-AS.






23. The 802.1X driver that supplies a username/password prompt to the user and sends/receives the EAPoL messages.






24. Network Control Protocol.






25. Committed Burst.






26. A single label and link that is part of a complete LDP. See also label switched path.






27. Authentication - authorization - and accounting.






28. A state for a route in an EIGRP topology table that indicates that the router is actively sending Query messages for this route - attempting to validate and learn the current best route to that subnet.






29. A method of Link Fragmentation and Interleaving (LFI) over interfaces that natively use Frame Relay encapsulation. The routers first build MLP-style PPP headers - which are then encapsulated inside a Frame Relay header. The PPP headers are then used






30. Time Interval.






31. A method that creates three thresholds per egress queue in the Cisco 3560 switch. Traffic is divided into the three queues based on CoS value - and given different likelihoods (weight) for tail drop when congestion occurs based on which egress queue






32. A routing protocol feature by which the routing update includes only routes that have changed - rather than include the entire set of routes.






33. Link-state database.






34. The most significant bit in the most significant byte of an Ethernet MAC address - its value implies that the address is a unicast MAC address (binary 0) or not (binary 1).






35. Ready To Send.






36. An FRF standard for Frame Relay-to-ATM Service Interworking in which one DTE uses Frame Relay and one uses ATM.






37. Method by which a dense-mode routing protocol distributes multicast traffic from a source to all the segments of a network. Also called shortest-path tree (SPT) - because it uses the shortest routing path from the source to the segments of the networ






38. A set of rules by which BGP examines the details of multiple BGP routes for the same NLRI and chooses the single best BGP route to install in the local BGP table.






39. In the context of SNMP - the Response command is sent by an SNMP agent - back to a manager - in response to any of the three types of Get requests - or in response to a Set request. It is also used by a manager in response to a received Inform comman






40. Digital subscriber line - a common Internet service type for residential and business customers.






41. A switch feature in which the switch examines DHCP messages and - for untrusted ports - filters all messages typically sent by servers and inappropriate messages sent by clients. It also builds a DHCP snooping binding table that is used by DAI and IP






42. A BGP peer connection between two routers inside the same ASN - but in different confederation sub-autonomous systems.






43. Spanning Tree Protocol.






44. Each 802.11 station passively monitors each RF channel for a specific amount of time and listens for beacons. Stations use the signal strengths of found beacons to determine the access point or ad hoc network with which to attempt association.






45. A field in the IP header that is decremented at each pass through a Layer 3 forwarding device.






46. The portion of PPP focused on negotiating IP features






47. Point-to-Point Protocol.






48. A Cisco-proprietary Layer 2 protocol that enables a router to communicate to a switch which multicast group traffic the router does and does not want to receive from the switch.






49. The term to describe a router that is neither the DR nor the BDR on a subnet that elects a DR and BDR.






50. Controls the distribution of multicast traffic for the private multicast address range 239.0.0.0 to 239.255.255.255 by configuring a filter and applying it on the interfaces.