SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CCIE Vocab
Start Test
Study First
Subjects
:
certifications
,
ccie
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. The term referring to a group of iBGP routers in a confederation - with the group members being assigned a hidden ASN for the purposes of loop avoidance.
granted window
PIM-SM
Layer 2 protocol tunneling
sub-AS
2. A name used for DS3 lines inside the European TDM hierarchy.
Yellow Alarm
MaxAge (OSPF)
Excess
E3
3. An enhanced version of WEP that is part of the 802.11i standard and has an automatic key-update mechanism that makes it much more secure than WEP. TKIP is not as strong as AES in terms of data protection.
VLSM
NCP
UDLD
Temporal Key Integrity Protocol
4. A DiffServ PHB - based on DSCP EF (decimal 46) - that provides low-latency queuing behavior as well as policing protection to prevent EF traffic from starving queues for other types of traffic.
routed interface
GRE
loopback circuitry
Expedited Forwarding
5. A process on a computing device that accepts SNMP requests - responds with SNMP-structured MIB data - and initiates unsolicited Trap messages back to an SNMP management station.
SNMP agent
Reliable Transport Protocol
Update (EIGRP)
edge LSR
6. A specification for the 64-bit interface ID in an IPv6 address - composed of the first half of a MAC address - hex FFFE - and the last half of the MAC.
EUI-64
Hello timer
dual-rate - three-color policer
LMI
7. The protocol used by content engines to manage traffic flow between routers configured for WCCP and between content engines. WCCP takes advantage of the fact that many web pages (and other content) are regularly accessed by users in a given network.
shaping rate
Web Cache Communication Protocol
802.11a
route reflector server
8. Secure Shell protocol used for character-oriented command-line access and configuration. A highly secure alternative to Telnet.
Point-to-Point Protocol
dense-mode protocol
SSH
SN
9. With EIGRP - the metric (distance) of a route as reported by a neighboring router.
Inter-Switch Link
inspection rule
reported distance
source-based distribution tree
10. In shaping and policing - commonly used to refer to the shaping or policing rate. For WAN services - a common reference to the bit rate defined in the WAN service business contract for each VC.
WRED
Inside Global address
committed information rate
cross-over cable
11. Prefix list.
variance
OAM
weighted round-robin
IP prefix list
12. A logical group of content engines running WCCP between them. The lead content engine determines the traffic distribution within the cluster - for optimum performance and scalability.
weight (BGP)
WCCP cluster
overlapping VPN
shaped round-robin
13. Digital Signal Level 3.
LAPF
802.11b
DS3
spread spectrum
14. Protects against problems caused by unidirectional links between two switches. Watches for loss of received Hello BPDUs - in which case it transitions to a loop-inconsistent state instead of transitioning to a forwarding state.
virtual LAN
CoS
Loop Guard
quartet
15. Superframe
PIR
SF
Holddown timer
transit router (OSPF)
16. Local Management Interface.
RMON collector
Link Access Procedure for Frame-Mode Bearer Services
mark probability denominator
LMI
17. In IPv6 DNS - the IPv6 equivalent of an IPv4 DNS A record.
AAAA
Digital Signal Level 1
prefix
low-latency queuing
18. A BGP process by which a router reapplies routing policy configuration (route maps - filters - and the like) based on stored copies of sent and received BGP Updates.
soft reconfiguration
Remote VLAN
Wi-Fi Protected Access
RTS/CTS
19. Alarm Indication Signal. With T1s - the practice of sending all binary 1s on the line in reaction to problems - to provide signal transitions and allow recovery of synchronization and framing.
MOSPF
AIS
RTP
Structure of Management Information
20. Context-Based Access Control.
CBAC
administratively scoped addresses
DSCP-to-threshold map
RSTP
21. For some encoding schemes - consecutive signals must use opposite polarity in an effort to reduce DC current. A BPV occurs when consecutive signals are of the same polarity.
outer label
Bipolar Violation
variable-length subnet masking
Trap (SNMP)
22. Differentiated Services Code Point.
DSCP
Dual FIFO
LSU
HSRP
23. Port Address Translation.
cross-over cable
PAT
Multicast Open Shortest Path First
stub network (OSPF)
24. Area 0; the area to which all other OSPF areas much connect in order for OSPF to work.
backbone area (OSPF)
Exterior Gateway Protocol
NTP
VRRP
25. Web Cache Communication Protocol.
Inform
WCCP
port security
route reflector
26. On a serial cable - the pin lead set by the DCE to imply that the DCE is ready to signal using pin leads
Data Set Ready
rendezvous point
active mode FTP
PE
27. A strategy for subnetting a classful network for which all masks/prefixes are the same value for all subnets of that one classful network.
dual stack
MPLS unicast
static length subnet masking
joining a group
28. The innermost MPLS header in an packet traversing an MPLS VPN - with the label value identifying the forwarding details for the egress PE's VRF associated with that VPN.
blocking state
VPN label
Goodbye (EIGRP)
subnet mask
29. With routing protocols - the measurement of favorability that determines which entry will be installed in a routing table if more than one router is advertising that exact network and mask.
strict priority
User Priority
metric
GLOP addressing
30. A method of providing dynamically configured spoke-to-spoke VPN connectivity in a hub-and-spoke network that significantly reduces configuration required on the spoke routers compared to traditional IPsec VPN environments.
Dynamic Multipoint VPN
Classless IP Addressing
hello interval
Hello (OSPF)
31. The list of entries learned by the switch DHCP snooping feature. The entries include the MAC address used as the device's DHCP client address - the assigned IP address - the VLAN - and the switch port on which the DHCP assignment messages flowed.
neighbor state
DHCP snooping binding database
MLS
provider edge
32. On a single computer - one layer provides a service to a higher layer. The software or hardware that implements the higher layer requests that the next lower layer perform the needed function.
NO_EXPORT
adjacent-layer interaction
SRTT
granted window
33. Carrier sense multiple access with collision detection. A media-access mechanism where devices ready to transmit data first check the channel for a carrier. If no carrier is sensed for a specific period of time - a device can transmit. If two devices
VRRP Master router
CSMA/CD
map class
NetFlow aggregator
34. A Cisco router feature in which the router works to prevent SYN attacks either by monitoring TCP connections flowing through the router - or by actively terminating TCP connection until the TCP connection is established and then knitting the client-s
Multicast Source Discovery Protocol (MSDP)
CE
Reply (EIGRP)
TCP intercept
35. In the PIM-SM design - the process by which a source DR - after it starts to receive the group traffic - encapsulates the multicast packets in the unicast packets and sends them to the RP.
source registration
U/L bit
feasible successor
LACP
36. In the context of SNMP - the Trap command is sent by an SNMP agent - to a manager - when the agent wants to send unsolicited information to the manager. Trap is not followed by a Response message from the receiving SNMP manager.
Feasible Distance
Slow Start Threshold
Trap (SNMP)
priority (OSPF)
37. Defines a particular behavior for FTP regarding the establishment of data TCP connections. In active mode - the FTP client uses the FTP PORT command - over the FTP control connection - to tell the FTP server the port on which the client should be lis
802.1Q
Expedited Forwarding
active mode FTP
Access Control Server
38. In switch port security - the process whereby the switch dynamically learns the MAC address(es) of the device(s) connected to a switch port - and then adds those addresses to the running configuration as allowed MAC addresses for port security.
Wi-Fi Protected Access
sticky learning
map class
exceed
39. A Frame Relay traffic shaping feature during which the shaping rate is reduced when the shaper notices congestion through the receipt of BECN or ForeSight messages.
marking down
adaptive shaping
active scanning
WCCP cluster
40. In the context of SNMP - the GetNext command is sent by an SNMP manager - to an agent - requesting the value of a single MIB variable. The GetNext request identifies a variable for which the manager wants the variable name and value of the next MIB l
VTP pruning
RTO
GetNext
Flush timer
41. From a Layer 1 perspective - the process of using special strings of electrical signals over a transmission medium to inform the receiver as to which bits are overhead bits - and which fit into individual subchannels.
AS_PATH prepending
RTS/CTS
authentication
framing
42. Retransmission Timeout.
RTO
DR
stub area
granted window
43. Copper cable with RJ-45 connectors in which a twisted pair at pins 1 -2 on the first end of the cable is connected to pins 3 -6 on the other end - with a second pair connected to pins 3 -6 on the first end and pins 1 -2 on the other end.
route redistribution
cross-over cable
AS number
Yellow Alarm
44. The notation in a Cisco IOS IP routing table that identifies the route used by that router as the default route.
gateway of last resort
sticky learning
stub network (OSPF)
administrative weight
45. Defined in RFC 2091 - the extensions define how RIP may send a full update once - and then send updates only when routes change - when an update is requested - or when a RIP interface changes state from down to up.
EAP
Triggered Extensions to RIP for On-Demand Circuits
Hold timer
Reply (EIGRP)
46. A 64-bit extension to the BGP NLRI field - used by MPLS for the purpose of making MPLS VPN customer routes unique in spite of the possibility of overlapping IPv4 address spaces in different customer networks.
Route Distinguisher
802.1Q-in-Q
broadcast address
variable-length subnet masking
47. A Cisco IOS interface software queue queuing strategy implemented automatically when using either form of Frame Relay fragmentation. The system then interleaves packets from the high-priority queue between fragments of the medium-priority queue.
Dual FIFO
private addresses
DHCP snooping
man-in-the-middle attack
48. The rate at which a policer limits the bits exiting or entering the policer.
Classic IOS Firewall
virtual LAN
policing rate
smurf attack
49. An MPLS VPN term referring to a router at a customer site that does not implement MPLS.
customer edge
egress PE
TDP
DD
50. The same thing as TCP code bits. See TCP code bits.
TCP flags
AIS
DSCP
Inside Local address