SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CCIE Vocab
Start Test
Study First
Subjects
:
certifications
,
ccie
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Typically used by protocols that perform flow control (like TCP) - a TCP window is the number of bytes that a sender can send before it must pause and wait for an acknowledgement of some of the yet-unacknowledged data.
window
peer group
NA
subnet number
2. Management Information Base.
LDP
multi-action policing
MIB
Neighbor Type
3. A route that is used for forwarding packets when the packet does not match any more specific routes in the IP routing table.
default route
FHSS
FECN
NTP
4. Virtual LAN.
Network Address Translation
VLAN
passive (EIGRP)
Data-link connection identifier
5. The multicast IP address 224.0.0.6 - listened for by DR and BDR routers.
All OSPF DR Routers
authentication - authorization - and accounting
neighbor (EIGRP)
WLSE
6. A logical concept that represents the path over which frames travel between DTEs. VCs are particularly useful when comparing Frame Relay to leased physical circuits.
EGP
DS0
SPF algorithm
virtual circuit
7. Data terminal equipment.
TCP code bits
CIDR
AF
DTE
8. Policing in which a single rate is metered - and packets are placed into one of three categories (conform - exceed - or violate).
single-rate - three-color policer
Network Control Protocol
quartet
penultimate hop popping (PHP)
9. Reported distance or Route Distinguisher.
RD
limiting query scope (EIGRP)
Data-link connection identifier
Network Based Application Recognition
10. A dotted-decimal number that represents a subnet. It is the lowest numeric value in the range of IP addresses implied by a subnet number and prefix/mask.
subnet number
AutoQos
CSMA/CD
WFQ
11. The process of taking the payload inside a Layer 2 frame - including the headers of Layer 3 and above - compressing the data - and then uncompressing the data on the receiving router.
Layer 2 payload compression
pruning
RA
Hot Standby Router Protocol
12. An MPLS term referring to the MPLS label just before the IP header. Also called the VPN label when implementing MPLS VPNs.
Loss of Frame
inner label
discarding state
ROMMON
13. Burst With shaping and policing - the number of additional bits that may be sent after a period of relative inactivity.
ingress PE
Bc bucket
Excess
VRRP Master router
14. A BGP feature that overcomes the requirement of a full mesh of iBGP peers inside a single AS by separating the AS into multiple sub-autonomous systems.
IP routing
confederation
passive (EIGRP)
joining a group
15. An optional contention-free 802.11 access protocol that requires the access point to poll wireless stations before they are able to send frames. Not commonly implemented.
BGP Update
component route
point coordination function
FEC
16. Cisco IOS IP Service Level Agent feature. Provides for router-generated information useful for verifying network performance on a scheduled basis - and the associated reporting functions.
IP SLA
single-rate - two-color policer
DR
MLD
17. The second most significant bit in the most significant byte of an Ethernet MAC address - a value of binary 0 implies that the address is a Universally Administered Address (UAA) (also known as Burned-In Address [BIA]) - and a value of binary 1 impli
Response (SNMP)
U/L bit
sequence number (OSPF)
ABR
18. An early T1 framing standard.
socket
distance vector
Superframe
broadcast domain
19. PIM-DM is a method of routing multicast packets that depends on a flood-and-prune approach. PIM Dense Mode gets its name from the assumption that there are many receivers of a particular multicast group - close together (from a network perspective).
Protocol Independent Multicast dense-mode routing protocol
DSCP-to-CoS map
infrastructure mode
Dynamic Host Configuration Protocol
20. The password required by the enable command. Also - this term may specifically refer to the password defined by the enable password command.
authentication method
enable password
summary route
collision domain
21. Exterior Gateway Protocol.
LSA type (OSPF)
EGP
Link Control Protocol
LCP
22. A characterization of a BGP path attribute in which all BGP implementations must support and understand the attribute (well known) - and all BGP Updates must include the attribute (mandatory).
well-known mandatory
spread spectrum
stuck-in-active
maximum reserved bandwidth
23. A set of all devices for which any frame sent by one of the devices would collide with any frames transmitted at the same time by any of the other devices in the set.
UDLD
collision domain
TCP flags
OAM
24. A TCP variable that defines the largest number of bytes allowed in a TCP segment's Data field. The calculation does not include the TCP header. With a typical IP MTU of 1500 bytes - the resulting default MSS would be 1460. TCP hosts must support an M
Maximum Segment Size
neighbor (OSPF)
SVC
maximum reserved bandwidth
25. A Cisco-proprietary feature. After a Cisco multicast router receives IGMP Join or Leave messages from hosts - it communicates to the connected Cisco switches - telling them which hosts (based on their unicast MAC addresses) have joined or left each m
CIR
Cisco Group Management Protocol
LACP
ARP
26. The process of sending an infinite-metric route in routing updates when that route fails.
MLD
straight-through cable
route poisoning
SVC
27. In the context of SNMP - the Get command is sent by an SNMP manager - to an agent - requesting the value of a single MIB variable identified in the request. The Get request identifies the exact variable whose value the manager wants to retrieve. Intr
Get (SNMP)
Digital Signal Level 1
Neighbor Discovery Protocol
neighbor state
28. In PIM-SM - the path of the group traffic that flows from the RP to the routers that need the traffic. It is also called the root-path tree (RPT) - because it is rooted at the RP.
querier election
policing rate
component route
shared distribution tree
29. A technology that sends a high-speed data stream over multiple subcarriers simultaneously. It is highly immune to multipath interference. 802.11a and 802.11g specify the use of OFDM.
active scanning
virtual LAN
MSS
orthogonal frequency division multiplexing
30. An MQC-based feature of IOS that is used to classify and mark packets for QoS purposes.
Class-Based Marking
FD
TTL scoping
Goodbye (EIGRP)
31. A neighbor state that signifies the other router has reached neighbor status - having passed the parameter check.
smurf attack
2Way (OSPF)
EUI-64
NTP server mode
32. Cisco-proprietary VLAN trunking protocol.
proxy ARP
Inter-Switch Link
Red Alarm
OAM
33. With EIGRP - the timer used to determine when a neighboring router has failed - based on a router not receiving any EIGRP messages - including Hellos - in this timer period.
Hold timer
hardware queue
MPLS VPNs
priority queuing
34. A multicast routing protocol whose default action is to flood multicast packets throughout a network.
dense-mode protocol
TDM
Classless IP Addressing
weighted fair queuing
35. A method of Link Fragmentation and Interleaving (LFI) over interfaces that natively use Frame Relay encapsulation. The routers first build MLP-style PPP headers - which are then encapsulated inside a Frame Relay header. The PPP headers are then used
superior BPDU
IP Control Protocol
Bipolar Violation
Frame Relay LFI Using Multilink PPP (MLP)
36. A method of applying a mathematical formula - with input including a private key - the message contents - and sometimes a shared text string - with the resulting digest being included with the message. The sender and the receiver perform the same mat
designated port
Message Digest 5
static length subnet masking
Auto-RP
37. A protocol used for reliable multicast and unicast transmissions. Used by EIGRP.
control plane
CBAC
IGMPv1 Host Membership Report
Reliable Transport Protocol
38. Enhances RP redundancy by providing a method for RPs to exchange multicast source information - even between multicast domains.
confederation identifier
service policy
Multicast Source Discovery Protocol (MSDP)
sub-AS
39. Dynamic Multipoint VPN.
Message Digest 5
maximum threshold
FRF.9
DMVPN
40. An administrative setting - included in Hellos - that is the first criteria for electing a DR. The highest priority wins - with values from 1-255 - with priority 0 meaning a router cannot become DR or BDR.
priority (OSPF)
flash updates
E1 route (OSPF)
Virtual Routing and Forwarding table
41. A Cisco IOS queuing tool most notable for its reservation of a minimum bandwidth for each queue.
Hot Standby Router Protocol
DCD
ACE
custom queuing
42. Network Based Application Recognition.
NBAR
TCP header compression
Reliable Transport Protocol
All OSPF Routers
43. A name used for DS3 lines inside the North American TDM hierarchy.
U/L bit
SPAN
Neighbor Type
T3
44. An FRF standard for payload compression.
FRF.9
Multicast Listener Discovery
NLRI
SMI
45. Orthogonal frequency division multiplexing.
OFDM
NEXT_HOP
AF
DSCP
46. Network Address Translation-Protocol Translation.
backbone area (OSPF)
signal-to-noise ratio
IP SLA responder
NAT-PT
47. Challenge Handshake Authentication Protocol.
CHAP
Local Management Interface
ND
U/L bit
48. Ethernet MAC address that represents all devices on the LAN.
administratively scoped addresses
DR
component route
broadcast address
49. An alternative software loaded into a Cisco router - used for low-level debugging and for password recovery.
TCP SYN flood
Zone-based IOS firewall
ROMMON
congestion window
50. A strategy for subnetting a classful network for which all masks/prefixes are the same value for all subnets of that one classful network.
dense-mode protocol
static length subnet masking
link-state database
dual token bucket