Test your basic knowledge |

CCIE Vocab

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. With EIGRP - a route that is not a successor route - but that meets the feasibility condition; can be used when the successor route fails - without causing loops.






2. A term referring to the process of applying the Message Digest 5 (MD5) algorithm to a string - resulting in another value. The original string cannot be easily computed even when the hash is known - making this process a strong method for storing pas






3. A Cisco 12000 series router feature that combines the key features of LLQ and CQ to provide similar congestion-management features.






4. A type of logic for how a router uses a default route. When a default route exists - and the class A - B - or C network for the destination IP address does not exist in the routing table - the default route is used. If any part of that classful netwo






5. The Cisco IOS feature by which special short key sequences can be used to move the cursor inside the current command line to more easily change a command.






6. A queue created by Cisco IOS as a result of the configuration of a queuing tool.






7. VLAN Trunking Protocol.






8. Point-to-Point Protocol over Ethernet. A convention often used as the data link protocol over Cable in which Ethernet is used as the data link protocol - but with PPP being encapsulated inside Ethernet. The combination gives the data link features of






9. Bootstrap Router.






10. A mechanism in which VLAN information can extend over another set of 802.1Q trunks by tunneling the original 802.1Q traffic with another 802.1Q tag. It allows a service provider to support transparent VLAN services with multiple customers - even if t






11. In the PIM-SM design - the process by which a source DR - after it starts to receive the group traffic - encapsulates the multicast packets in the unicast packets and sends them to the RP.






12. The data structure used by OSPF to hold LSAs.






13. A switch feature with which the switch watches ARP messages - determines if those messages may or may not be part of some attack - and filters those that look suspicious.






14. An 802.11 frame that access points or stations in ad hoc networks send periodically so that wireless stations can discover the presence of a wireless LAN and coordinate use of certain protocols - such as power-save mode.






15. Class of Service.






16. The most significant bit in the most significant byte of an Ethernet MAC address - its value implies that the address is a unicast MAC address (binary 0) or not (binary 1).






17. A BGP router that forwards iBGP-learned routes to other iBGP routers.






18. A Cisco-proprietary feature. After a Cisco multicast router receives IGMP Join or Leave messages from hosts - it communicates to the connected Cisco switches - telling them which hosts (based on their unicast MAC addresses) have joined or left each m






19. A process whereby a switch - when making a forwarding decision - uses not only Layer 2 logic but other OSI layer equivalents as well.






20. In MPLS VPNs - a 64-bit Extended Community path attribute attached to a BGP route for the purpose of controlling into which VRFs the route is added.






21. Diffusing Update Algorithm.






22. The structure inside telcos' original digital circuit build-out in the mid-1900s - based upon using TDM to combine and disperse smaller DS levels into larger levels - and vice versa.






23. With EIGRP - the metric (distance) of a route as reported by a neighboring router.






24. VTP process that prevents the flow of broadcasts and unknown unicast Ethernet frames in a VLAN from being sent to switches that have no ports in that VLAN.






25. An issue whereby parts of the RF signal take different paths from the source to the destination - which causes direct and reflected signals to reach the receiver at different times - and corresponding bit errors.






26. Defined in RFC 1631 - a method of translating IP addresses in headers with the goal of allowing multiple hosts to share single public IP addresses - thereby reducing IPv4 public address depletion.






27. Voice over Frame Relay.






28. Penultimate hop popping.






29. An OSPF area into which external (type 5) LSAs are not introduced by its ABRs; instead - the ABRs originate and inject default routes into the area.






30. Time-division multiplexing.






31. EAP over LAN.






32. The process by which neighboring OSPF routers examine their Hello messages and elect the DR. The decision is based on priority (highest) - or RID (highest) if priority is a tie.






33. The term to describe a router that is neither the DR nor the BDR on a subnet that elects a DR and BDR.






34. A Cisco switch feature that allows separation of ports as if they were in separate VLANs - while allowing the use of a single IP subnet for all ports.






35. Router ID.






36. An enhanced version of WEP that is part of the 802.11i standard and has an automatic key-update mechanism that makes it much more secure than WEP. TKIP is not as strong as AES in terms of data protection.






37. A method that creates three thresholds per egress queue in the Cisco 3560 switch. Traffic is divided into the three queues based on CoS value - and given different likelihoods (weight) for tail drop when congestion occurs based on which egress queue






38. A list of interspersed alphanumeric literals and metacharacters that are used to apply complex matching logic to alphanumeric strings. Often used for matching AS_PATHs in Cisco routers.






39. An NTP client that assumes that a server will send NTP broadcasts - removing the requirement for the client to have the NTP server's IP address preconfigured.






40. A BGP path attribute that implies how the route was originally injected into some router's BGP table.






41. Service set identifier.






42. A WFQ term referring to its drop logic - which is similar to tail-drop behavior.






43. Designated router.






44. The portions of PPP focused on features that are related to specific Layer 3 protocols.






45. Network Based Application Recognition.






46. In 802.1X - the computer that stores usernames/passwords and verifies that the correct values were submitted before authenticating the user.






47. A serial-line encoding standard like B8ZS - but with each set of four consecutive 0s being changed to include a Bipolar Violation to maintain synchronization.






48. WRED compares this setting to the average queue depth to decide whether packets should be discarded. No packets are discarded if the average queue depth falls below this minimum threshold.






49. For some encoding schemes - consecutive signals must use opposite polarity in an effort to reduce DC current. A BPV occurs when consecutive signals are of the same polarity.






50. A mapping between each DSCP value and a corresponding CoS value - often used in Cisco LAN switches when performing classification for egress queuing.