Test your basic knowledge |

CCIE Vocab

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A Cisco IOS configuration tool for RIP and EIGRP for which the list matches routes in routing updates - and adds a defined value to the sent or received metric for the routes. The value added to the metric is the offset.






2. The Cisco IOS feature by which special short key sequences can be used to move the cursor inside the current command line to more easily change a command.






3. A characterization of a BGP path attribute in which BGP implementations are not required to support the attribute (optional) - and for which if a router receives a route with such an attribute - the router should forward the attribute unchanged (tran






4. With shaping - the number of bits allowed to be sent every Tc. Also defines the size of the token bucket when Be = 0.






5. Finish time.






6. Sent by a PIM router - by default every 30 seconds - on every interface on which PIM is configured to discover neighbors - establish adjacency - and maintain adjacency.






7. Each 802.11 station periodically sends a probe request frame on each RF channel and monitors probe response frames that all access points within range send back. Stations use the signal strength of the probe response frames to determine which access






8. Weighted random early detection.






9. The actual number of packets in a queue at a particular time.






10. A category used by a policer to classify packets relative to the traffic contract. The bit rate implied by all conforming packets is within the traffic contract.






11. Maximum Response Time.






12. Policing in which a single rate is metered - and packets are placed into one of three categories (conform - exceed - or violate).






13. A group of devices on one or more LANs that are configured (using management software) so that they can communicate as if they were attached to the same wire - when - in fact - they are located on a number of different LAN segments. Because VLANs are






14. A router that should either permanently or temporarily not be used as a transit router. Can wait a certain time after OSPF process start - or after BGP notifies OSPF that BGP has converged - before ceasing to be a stub router.






15. Network Layer Protocol ID is a field in the RFC 2427 header that is used as a Protocol Type field in order to identify the type of Layer 3 packet encapsulated inside a Frame Relay frame.






16. A logical concept that represents the path over which frames travel between DTEs. VCs are particularly useful when comparing Frame Relay to leased physical circuits.






17. Boot Protocol. A standard (RFC 951) protocol by which a LAN-attached host can dynamically broadcast a request for a server to assign it an IP address - along with other configuration settings - including a subnet mask and default gateway IP address.






18. A BGP path attribute that lists the next-hop IP address used to reach an NLRI.






19. In shaping and policing - commonly used to refer to the shaping or policing rate. For WAN services - a common reference to the bit rate defined in the WAN service business contract for each VC.






20. With RIP - a per-route timer (default 180 seconds) that begins when a route's metric changes to a larger value.






21. Ethernet process by which devices attached to the same cable negotiate their speed and the duplex settings over the cable.






22. The specific frequency subband on which the radio card or access point is operating. The RF channel is set in the access point or ad hoc stations.






23. The range 233.0.0.0 through 233.255.255.255 that IANA has reserved (RFC 2770) on an experimental basis. It can be used by anyone who owns a registered autonomous system number to create 256 global multicast addresses.






24. A small FIFO queue associated with each router's physical interface - for the purpose of making packets available to the interface hardware - removing the need for a CPU interrupt to start sending the next packet out the interface.






25. An Internet standard authentication protocol that uses clear-text passwords and a two-way handshake to perform authentication over a PPP link.






26. An 802.1d STP transitory port state in which the port does not send or receive frames - but does learn the source MAC addresses from incoming frames.






27. An intrusion detection system that safeguards the wireless LAN from malicious and unauthorized access.






28. Multilink PPP.






29. An alternative software loaded into a Cisco router - used for low-level debugging and for password recovery.






30. Gateway Load Balancing Protocol.






31. From the perspective of one routing protocol - a route that was learned by using route redistribution.






32. A serial-line encoding standard that substitutes Bipolar Violations in a string of eight binary 0s to provide enough signal transitions to maintain synchronization.






33. With a routing update - or routing table entry - the portion of a route that defines the next router to which a packet should be sent to reach the destination subnet. With routing protocols - the Next Hop field may define a router other than the rout






34. Operates in dense mode and depends on its own unicast routing protocol that is similar to RIP to perform its multicast functions.






35. An optimized Layer 3 forwarding path through a router or switch. CEF optimizes routing table lookup by creating a special - easily searched tree structure based on the contents of the IP routing table. The forwarding information is called the Forward






36. Extensible Authentication Protocol.






37. Local Management Interface.






38. A conceptual model used by shapers and policers to represent their internal logic.






39. Assured Forwarding. A set of DiffServ PHBs that defines 12 DSCP values - with four queuing classes and three drop probabilities within each queuing class.






40. Inside telcos' original TDM hierarchy - the smallest unit of transmission at 64 kbps.






41. With EIGRP - a route that is not a successor route - but that meets the feasibility condition; can be used when the successor route fails - without causing loops.






42. IP Control Protocol.






43. Aka network layer reachability information.






44. Loss of Signal. A T1 alarm state that occurs when the receiver has not received any pulses of either polarity for a defined time period.






45. Any OSPF neighbor for which the database flooding process has completed.






46. An Internet standard serial data-link protocol - used on synchronous and asynchronous links - that provides data-link framing - link negotiation - Layer 3 interface features - and other functions.






47. With private VLANs - a secondary VLAN in which the ports can send and receive frames with each other - but not with ports in other secondary VLANS.






48. A DiffServ PHB that defines eight values that provide backward compatibility with IP Precedence.






49. Mark probability denominator.






50. Carrier sense multiple access with collision detection. A media-access mechanism where devices ready to transmit data first check the channel for a carrier. If no carrier is sensed for a specific period of time - a device can transmit. If two devices