Test your basic knowledge |

CCIE Vocab

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. An OSPF router that connects to the backbone area and to one or more non-backbone area.






2. A vendor consortium that formerly worked to further Frame Relay common vendor standards.






3. A conceptual model used by CB Policing when using an excess burst.






4. When a PIM-SM router switches from RPT to SPT - it sends a PIM-SM Prune message for the source and the group with the RP bit set to its upstream router on the shared tree. RFC 2362 uses the notation PIM-SM (S - G) RP-bit Prune for this message.






5. In 802.1X - the computer that stores usernames/passwords and verifies that the correct values were submitted before authenticating the user.






6. A single instance of STP that is applied to multiple VLANs - typically when using the 802.1Q trunking standard.






7. A basic form of traffic shaping that is applied to an interface or subinterface. By default - it shapes all traffic leaving the interface - but can be modified by using an access control list. The access list controls only what traffic is shaped; GTS






8. A method for optimizing the flow of multicast IP packets passing through a LAN switch. The switch using IGMP snooping examines IGMP messages to determine which ports need to receive traffic for each multicast group.






9. A category used by a policer to classify packets relative to the traffic contract. The bit rate implied by all conforming packets is within the traffic contract.






10. A type of IPv4 and IPv6 traffic designed primarily to provide one-to-many connectivity but unlike broadcast - has the capability to control the scope of traffic distribution.






11. A characterization of a BGP path attribute in which all BGP implementations must support and understand the attribute (well known) - and all BGP Updates must include the attribute (mandatory).






12. A Cisco-proprietary protocol that defines how to perform authentication between an authenticator (for example - a router) and an authentication server that holds a list of usernames and passwords.






13. An attack similar to a smurf attack - but using packets for the UDP Echo application instead of ICMP.






14. A route that is created to represent one or more smaller component routes - typically in an effort to reduce the size of routing and topology tables.






15. In switch port security - the process whereby the switch dynamically learns the MAC address(es) of the device(s) connected to a switch port - and then adds those addresses to the running configuration as allowed MAC addresses for port security.






16. Cisco Group Management Protocol.






17. A BGP process by which a router reapplies routing policy configuration (route maps - filters - and the like) based on stored copies of sent and received BGP Updates.






18. Virtual LAN.






19. In TCP - a TCP host sets the TCP header's Window field to the number of bytes it allows the other host to send before requiring an acknowledgement. In effect - the receiving host - by stating a particular window size - grants the sending host the rig

Warning: Invalid argument supplied for foreach() in /var/www/html/basicversity.com/show_quiz.php on line 183


20. With routing protocols - the measurement of favorability that determines which entry will be installed in a routing table if more than one router is advertising that exact network and mask.






21. A term generally describing characteristics about BGP paths that are advertised in BGP Updates.






22. An optimized Layer 3 forwarding path through a router or switch. CEF optimizes routing table lookup by creating a special - easily searched tree structure based on the contents of the IP routing table. The forwarding information is called the Forward






23. IP multicast address range from 224.0.0.0 through 239.255.255.255.






24. A neighbor state that signifies the other router has reached neighbor status - having passed the parameter check. The FIB entry details the information needed for forwarding: the next-hop router and the outgoing interface - in an optimized mtrie stru






25. The first 48 bits of an IPv6 global address - used for efficient route aggregation.






26. An NTP mode in which an NTP host does not adjust its clock - but in which it sends NTP messages to clients so that the clients can update their clocks based on the server's clock.






27. A well-known discretionary BGP path attribute that flags a route as being a summary route.






28. A reserved value for the BGP COMMUNITY path attribute that implies that the route should not be advertised outside the local confederation sub-AS.






29. The destination VLAN for an RSPAN session.






30. The PDU used by a particular layer of a networking model - with x defining the layer.






31. A protection against problems caused by unidirectional links between two switches. Uses messaging between switches to detect the loop - err-disabling the port when the link is unidirectional.






32. Prefix list.






33. The Cisco IOS feature by which special short key sequences can be used to move the cursor inside the current command line to more easily change a command.






34. A feature of Ethernet NICs. When the NIC transmits an electrical signal - it "loops" the transmitted electrical current back onto the receive pair. By doing so - if another NIC transmits a frame at the same time - the NIC can detect the overlapping r






35. The portion of PPP focused on negotiating IP features






36. In BGP - a configuration construct in which multiple neighbors' parameters can be configured as a group - thereby reducing the length of the configuration. Additionally - BGP performs routing policy logic against only one set of Updates for the entir






37. A characterization of a BGP path attribute in which all BGP implementations must support and understand the attribute (well known) - but BGP Updates can either include the attribute or not depending on whether a related feature has been configured (d






38. A type of OSPF packet used to acknowledge LSU packets.






39. When a wireless station connects to an access point - the access point assigns an association ID (AID) to the station. Various protocols - such as power-save mode - make use of the association ID.






40. In IPv6 DNS - the IPv6 equivalent of an IPv4 DNS A record.






41. A VC that is set up dynamically when needed. An SVC can be equated to a dial-on-demand connection in concept.






42. An NTP mode in which an NTP host adjusts its clock in relation to an NTP server's clock.






43. A queuing scheduler's logic by which - if a particular queue has packets in it - those packets always get serviced next.






44. A process on a computing device that accepts SNMP requests - responds with SNMP-structured MIB data - and initiates unsolicited Trap messages back to an SNMP management station.






45. An architecture and set of documents that defines Cisco's best recommendations for how to secure a network.






46. Three core security functions.






47. A Cisco-proprietary feature by which multiple routers can provide interface IP address redundancy - as well as cause a set of clients to load-balance their traffic across multiple routers inside the GLBP group.






48. Any occurrence that could change a router's EIGRP topology table - including a received Update or Query - a failed interface - or the loss of a neighbor.






49. Area Border Router. An OSPF router that connects to the backbone area and to one or more non-backbone areas.






50. An MQC configuration style by which one policy map calls a second policy map. For example - a shaping policy map can call an LLQ policy map to implement LLQ for packets shaped by CB Shaping.