Test your basic knowledge |

CCIE Vocab

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. An EIGRP message that is used to acknowledge reliable EIGRP messages - namely Update - Query - and Reply messages. Acks do not require an Ack.






2. Management Information Base.






3. A router that is not an ABR or ASBR in that all of its interfaces connect to only a single OSPF area.






4. Dynamic Multipoint VPN.






5. In TCP - a TCP host sets the TCP header's Window field to the number of bytes it allows the other host to send before requiring an acknowledgement. In effect - the receiving host - by stating a particular window size - grants the sending host the rig






6. Quantum value.






7. In the context of SNMP - the Set command is sent by an SNMP manager - to an agent - requesting that the agent set a single identified variable to the stated value. The main purpose is to allow remote configuration and remote operation - such as shutt






8. The most recent standardized set of generic SNMP MIB variables - defined in RFC 1213 and updated in RFCs 2011 through 2013.






9. In BGP - either external BGP (eBGP) - confederation eBGP - or internal BGP (iBGP). The term refers to a peer connection - and whether the peers are in different ASs (eBGP) - different confederation sub-ASs (confederation eBGP) - or in the same AS (iB






10. A BGP ASN whose value is between 64 -512 and 65 -535. These values are not assigned for use on the Internet - and can be used for private purposes - typically either within confederations or by ISPs to hide the ASN used by some customers.






11. A BGP term referring to an IP prefix and prefix length.






12. A set of four hex digits listed in an IPv6 address. Each quartet is separated by a colon.






13. A 64-bit extension to the BGP NLRI field - used by MPLS for the purpose of making MPLS VPN customer routes unique in spite of the possibility of overlapping IPv4 address spaces in different customer networks.






14. A Cisco-proprietary protocol - used by LAN switches to communicate VLAN configuration.






15. A calculation of the length of the AS_PATH PA - which includes 1 for each number in the AS_SEQ - 1 for an entire AS_SET segment - and possibly other considerations.






16. Measured Round-Trip Time.






17. An EIGRP message that is used by a router to notify its neighbors when the router is gracefully shutting down.






18. In the context of SNMP - the Get command is sent by an SNMP manager - to an agent - requesting the value of a single MIB variable identified in the request. The Get request identifies the exact variable whose value the manager wants to retrieve. Intr






19. UniDirectional Link Detection.






20. The process of successive neighboring routers exchanging LSAs such that all routers have an identical LSDB for each area to which they are attached.






21. Protects against problems caused by unidirectional links between two switches. Watches for loss of received Hello BPDUs - in which case it transitions to a loop-inconsistent state instead of transitioning to a forwarding state.






22. Provider edge.






23. The multicast addresses assigned by IANA.






24. A style of attack in which an ICMP Echo is sent with a directed broadcast (subnet broadcast) destination IP address - and a source address of the host that is being attacked. The attack can result in the Echo reaching a large number of hosts - all of






25. With EIGRP - a route that is not a successor route - but that meets the feasibility condition; can be used when the successor route fails - without causing loops.






26. Orthogonal frequency division multiplexing.






27. Auto-Rendezvous Point. Cisco-proprietary protocol that can be used to designate an RP and send RP-Announce messages that advertise its IP address and groups. Also - it can be used to designate a mapping agent that interprets what IP address RP is adv






28. A VC that is set up dynamically when needed. An SVC can be equated to a dial-on-demand connection in concept.






29. The process of running the SPF algorithm against the LSDB - with the result being the determination of the current best route(s) to each subnet.






30. An effort to reduce the query scope with EIGRP - using route summarization or EIGRP stub routers.






31. A BGP router that forwards iBGP-learned routes to other iBGP routers.






32. In shaping and policing - commonly used to refer to the shaping or policing rate. For WAN services - a common reference to the bit rate defined in the WAN service business contract for each VC.






33. Digital Signal Level 1.






34. The process of forwarding packets through a router. Also call IP routing.






35. A state variable kept by a router for each known neighbor or potential neighbor.






36. Network Layer Protocol ID is a field in the RFC 2427 header that is used as a Protocol Type field in order to identify the type of Layer 3 packet encapsulated inside a Frame Relay frame.






37. Challenge Handshake Authentication Protocol.






38. Three core security functions.






39. A Cisco-proprietary STP implementation - created many years before IEEE 802.1s and 802.1w - that speeds convergence and allows for one STP instance for each VLAN.






40. A queuing scheduler's logic by which - if a particular queue has packets in it - those packets always get serviced next.






41. A mechanism used by TCP senders to limit the dynamic window for a TCP connection - to reduce the sending rate when packet loss occurs. The sender considers both the advertised window size and CWND - using the smaller of the two.






42. An attack by which the attacker initiates many TCP connections to a server - but does not complete the TCP connections - by simply not sending the third segment normally used to establish the connection. The server may consume resources and reject ne






43. On a serial cable - the pin lead set by the DTE to imply that the DTE is ready to signal using pin leads.






44. Service set identifier.






45. With routing protocols - the measurement of favorability that determines which entry will be installed in a routing table if more than one router is advertising that exact network and mask.






46. A protocol - defined in RFC 2865 - that defines how to perform authentication between an authenticator (for example - a router) and an authentication server that holds a list of usernames and passwords.






47. A designated router that is directly connected with a source of the multicast group.






48. A 3-bit field in an ISL header used for marking frames. Also - used generically to refer to either the ISL CoS field or the 802.1Q User Priority field.






49. A neighbor state that signifies the other router has reached neighbor status - having passed the parameter check. The FIB entry details the information needed for forwarding: the next-hop router and the outgoing interface - in an optimized mtrie stru






50. Virtual LAN.