Test your basic knowledge |

CCIE Vocab

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. The specific frequency subband on which the radio card or access point is operating. The RF channel is set in the access point or ad hoc stations.






2. An IPv6 migration strategy in which a host or router supports both IPv4 and IPv6 natively.






3. With some routing protocols - the time period between successive Hello messages.






4. A type of IPv4 and IPv6 traffic designed primarily to provide one-to-many connectivity but unlike broadcast - has the capability to control the scope of traffic distribution.






5. Maximum Response Time.






6. Used by WRED to calculate the maximum percentage of packets discarded when the average queue depth falls between the minimum and maximum thresholds.






7. Bipolar Violation.






8. Defines a particular behavior for FTP regarding the establishment of TCP data connections. In passive mode - an FTP server uses the FTP PORT command - over the FTP control connection - to tell the FTP client the port on which the server will be liste






9. Link-State Update.






10. A process used in routers that are encrypting traffic to permit egress QoS actions to be taken on traffic that is being encrypted on that router. QoS pre-classification keeps a copy of each packet to be encrypted in memory long enough to take the app






11. A generic term that refers to the data structure used by a layer in a layered network architecture when sending data.






12. An administrative setting - included in Hellos - that is the first criteria for electing a DR. The highest priority wins - with values from 1-255 - with priority 0 meaning a router cannot become DR or BDR.






13. A network/subnet to which only one OSPF router is connected.






14. Provider router.






15. With EIGRP - for a particular route - the case in which the RD is lower than the FD.






16. The portion of PPP focused on features that are unrelated to any specific Layer 3 protocol.






17. Source-specific multicast.






18. Jargon used to refer to the first of two buckets in the dual token bucket model; its size is Bc.






19. The 802.1X driver that supplies a username/password prompt to the user and sends/receives the EAPoL messages.






20. A problem that occurs when an AS does not run BGP on all routers - with synchronization disabled. The routers running BGP may believe they have working routes to reach a prefix - and forward packets to internal routers that do not run BGP and do not






21. Digital subscriber line - a common Internet service type for residential and business customers.






22. Three core security functions.






23. Jargon used by STP mostly when discussing the root election process; refers to a Hello with a lower bridge ID. Sometimes refers to a Hello with the same bridge ID as another - but with better values for the tiebreakers in the election process.






24. Switched virtual circuit.






25. A contiguous group of data links that share the same OSPF area number.






26. In OSPF - a number assigned to each LSA - ranging from 0x80000001 and wrapping back around to 0x7FFFFFFF - which is used to determine which LSA is most recent.






27. Inside telcos' original TDM hierarchy - a unit that combines multiple DS1s into a single channel






28. A BGP path attribute that allows routers in one AS to set a value and advertise it into a neighboring AS - impacting the decision process in that neighboring AS. A smaller value is considered better. Also called the BGP metric.






29. A router that is not an ABR or ASBR in that all of its interfaces connect to only a single OSPF area.






30. Spanning Tree Protocol.






31. A standards-based way of helping routers find Rendezvous Points (RP). RPs notify BSRs of the groups they handle. BSRs in turn flood the group-to-RP mappings throughout the network. Each router individually determines which RP to use for a particular






32. RFC 1918-defined IPv4 network numbers that are not assigned as public IP address ranges - and are not routable on the Internet. Intended for use inside enterprise networks.






33. A commonly used name for Multi-VRF CE.






34. Link-State Acknowledgment.






35. In shaping and policing - commonly used to refer to the shaping or policing rate. For WAN services - a common reference to the bit rate defined in the WAN service business contract for each VC.






36. A bit in the Frame Relay header that - when set to 1 - means that if a device needs to discard frames - it should discard the frames with DE 1 first.






37. The portions of PPP focused on features that are related to specific Layer 3 protocols.






38. The portion of PPP focused on supporting the CDP protocol.






39. Point-to-Point Protocol over Ethernet. A convention often used as the data link protocol over Cable in which Ethernet is used as the data link protocol - but with PPP being encapsulated inside Ethernet. The combination gives the data link features of






40. Defined in RFC 2289 - a mechanism by which a shared key and a secret key together feed into a hash algorithm - creating a password that is transmitted over a network. Because the shared key is not reused - the hash value is only valid for that indivi






41. A term used in this book to refer to a route that is included in a larger summary route.






42. The process of taking a PDU from some other source and placing a header in front of the original PDU - and possibly a trailer behind it.






43. An MPLS term referring to the MPLS label just before the IP header. Also called the VPN label when implementing MPLS VPNs.






44. Extensible Authentication Protocol.






45. Provides dynamic inspection of traffic as it traverses the router. It uses Context-Based Access Control (CBAC) to look deeper into a packet than an access list can. It tracks outbound traffic and dynamically allows in responses to that traffic.






46. Used by RRs to denote the RID of the iBGP neighbor that injected the NLRI into the AS.






47. Jargon referring to a policer action through which - instead of discarding an out-of-contract packet - the policer marks a different IPP or DSCP value - allowing the packet to continue on its way - but making the packet more likely to be discarded la






48. Type of Service byte.






49. An interface on a Cisco IOS-based switch that is treated as if it were an interface on a switch.






50. Expedited Forwarding.