Test your basic knowledge |

CCIE Vocab

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. An 802.11 frame that access points or stations in ad hoc networks send periodically so that wireless stations can discover the presence of a wireless LAN and coordinate use of certain protocols - such as power-save mode.






2. The most significant bit in the most significant byte of an Ethernet MAC address - its value implies that the address is a unicast MAC address (binary 0) or not (binary 1).






3. Out of Frame.






4. A multicast routing protocol that forwards the multicast traffic only when requested by a downstream router.






5. Three core security functions.






6. Router ID.






7. Excess Burst.






8. Calculated measurement based on the actual queue depth and the previous average. Designed to allow WRED to adjust slowly to rapid changes of the actual queue depth.






9. A reserved value for the BGP COMMUNITY path attribute that implies that the route should not be advertised to any other peer.






10. When subnetting a class A - B - or C address - the subnet for which all subnet bits are binary 0.






11. An FRTS configuration construct - configured with the map-class frame-relay global configuration command.






12. VTP pruning.






13. PIM-SM is a method of routing multicast packets that requires some intelligence in the network about the locations of receivers so that multicast traffic is not flooded into areas with no receivers. PIM Sparse Mode gets its name from the assumption t






14. A term referring to the process of applying the Message Digest 5 (MD5) algorithm to a string - resulting in another value. The original string cannot be easily computed even when the hash is known - making this process a strong method for storing pas






15. A mapping between each DSCP value and a WRED threshold - often used in Cisco LAN switches when performing WRED.






16. An FRF standard for Frame Relay-to-ATM Service Interworking in which one DTE uses Frame Relay and one uses ATM.






17. Direct sequence spread spectrum.






18. Quantum value.






19. Virtual LAN.






20. Cisco IOS IP Service Level Agent feature. Provides for router-generated information useful for verifying network performance on a scheduled basis - and the associated reporting functions.






21. Advanced Encryption Standard A superior encryption mechanism that is part of the 802.11i standard and has much stronger security than TKIP.






22. A 3-bit field in an ISL header used for marking frames. Also - used generically to refer to either the ISL CoS field or the 802.1Q User Priority field.






23. A message sent by the multicast router - by default every 60 seconds - on each of its LAN interfaces to determine whether any host wants to receive multicast traffic for any group.






24. Layer 2 payload compression.






25. An OSPF external route for which internal OSPF cost is not added to the cost of the route as it was redistributed into OSPF.






26. An optimized Layer 3 forwarding path through a router or switch. CEF optimizes routing table lookup by creating a special - easily searched tree structure based on the contents of the IP routing table. The forwarding information is called the Forward






27. The algorithm used by OSPF and IS-IS to compute routes based on the LSDB.






28. Retransmission Timeout.






29. Copper cable with RJ-45 connectors in which a twisted pair at pins 1 -2 on the first end of the cable is connected to pins 3 -6 on the other end - with a second pair connected to pins 3 -6 on the first end and pins 1 -2 on the other end.






30. Password Authentication Protocol.






31. Controls the distribution of multicast traffic for the private multicast address range 239.0.0.0 to 239.255.255.255 by configuring a filter and applying it on the interfaces.






32. Part of the Cisco IOS Firewall feature set - CBAC inspects traffic using information in the higher-layer protocols being carried to decide whether to open the firewall to specific inbound traffic. CBAC supports both UDP and TCP and multiple higher-la






33. The Cisco IOS feature by which special short key sequences can be used to move the cursor inside the current command line to more easily change a command.






34. Management Information Base.






35. A serial-line encoding standard that substitutes Bipolar Violations in a string of eight binary 0s to provide enough signal transitions to maintain synchronization.






36. A standard (RFC 903) protocol by which a LAN-attached host can dynamically broadcast a request for a server to assign it an IP address. See also ARP.






37. The signal strength of the RF signal at the output of the radio card or access point transmitter - before being fed into the antenna. Measured in milliwatts - watts - or dBm.






38. With EIGRP - a timer started when a reliable (to be acknowledged) message is transmitted. For any neighbor(s) failing to respond in its RTO - the RTP protocol causes retransmission. RTO is calculated based on SRTT.






39. Network Control Protocol.






40. In BGP - a set of routers inside a single administrative authority - grouped together for the purpose of controlling routing policies for the routes advertised by that group to the Internet.






41. With EIGRP - a router sharing the same primary subnet - with which Hellos are exchanged - parameters match - and with which routes can be exchanged.






42. Challenge Handshake Authentication Protocol.






43. A neighbor state that signifies the other router has reached neighbor status - having passed the parameter check. The FIB entry details the information needed for forwarding: the next-hop router and the outgoing interface - in an optimized mtrie stru






44. Address Resolution Protocol. Defined in RFC 826 - a protocol used on LANs so that an IP host can discover the MAC address of another device that is using a particular IP address.






45. An Internet standard authentication protocol that uses clear-text passwords and a two-way handshake to perform authentication over a PPP link.






46. EIGRP jargon meaning that EIGRP has placed a route into active status.






47. A logical group of content engines running WCCP between them. The lead content engine determines the traffic distribution within the cluster - for optimum performance and scalability.






48. On a serial cable - the pin lead set by the DTE to tell the DCE that the DTE wants to send data.






49. Inter-Switch Link.






50. A type of AS_PATH segment consisting of an unordered list of ASNs consolidated from component subnets of a summary BGP route.