Test your basic knowledge |

CCIE Vocab

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Multicast addresses that are not assigned by IANA.






2. With EIGRP - the metric value for the lowest-metric route to a particular subnet.






3. The low-order 4 bits of the configuration register. These bits direct a router to load either ROMMON software (boot field 0x0) - RXBOOT software (boot field 0x1) - or a full-function IOS image.






4. For some encoding schemes - consecutive signals must use opposite polarity in an effort to reduce DC current. A BPV occurs when consecutive signals are of the same polarity.






5. Aka minimum CIR.






6. Network Control Protocol.






7. A type of logic for how a router uses a default route. When a default route exists - and no more specific match is made between the destination of the packet and the routing table - the default route is used.






8. Sent by a PIM router to its upstream router to either request that the upstream router forward the group traffic or stop forwarding the group traffic that is currently being forwarded. If a PIM router wants to start receiving the group traffic - it l






9. A 1-byte field in the IP header - originally defined by RFC 791 for QoS marking purposes.






10. Variable-length subnet masking.






11. The ASN assigned to a confederation sub-AS.






12. A protection against problems caused by unidirectional links between two switches. Uses messaging between switches to detect the loop - err-disabling the port when the link is unidirectional.






13. A WRED process by which WRED discards all newly arriving packets intended for a queue - based on whether the queue's maximum threshold has been exceeded.






14. A type of spread spectrum that spreads RF signals over the frequency spectrum by transmitting the signal at different frequencies according to a hopping pattern. One of the original 802.11 physical layers used FHSS to offer data rates of 1 and 2 Mbps






15. Forward Explicit Congestion Notification.






16. An FRF standard for LFI for VoFR (FRF.11) VCs - in which all voice frames are interleaved in front of data frames' fragments.






17. A packet-scheduling algorithm used in Cisco switches that provides similar behavior to CBWFQ in shared mode and polices in shaped mode.






18. Used by WRED to calculate the maximum percentage of packets discarded when the average queue depth falls between the minimum and maximum thresholds.






19. Cisco-proprietary VLAN trunking protocol.






20. Jargon used to refer to the first of two buckets in the dual token bucket model; its size is Bc.






21. Bipolar 8 Zero Substitution. A serial-line encoding standard that substitutes Bipolar Violations in a string of eight binary 0s to provide enough signal transitions to maintain synchronization.






22. An MPLS term describing designs in which one or more MPLS customer sites can be reached from multiple other VPNs.






23. On a serial cable - the pin lead set by the DCE to imply a working link.






24. The practice of defining boundaries that determine how far multicast traffic will travel in your network.






25. A basic form of traffic shaping that is applied to an interface or subinterface. By default - it shapes all traffic leaving the interface - but can be modified by using an access control list. The access list controls only what traffic is shaped; GTS






26. Protocol Independent Multicast sparse-mode routing protocol.






27. Maximum Response Time.






28. A set of four hex digits listed in an IPv6 address. Each quartet is separated by a colon.






29. Regeneration of the Layer 2 encapsulation removed from frames forwarded in a SPAN session.






30. Secure Copy Protocol - one of the many ways of transferring files to and from Cisco IOS routers and switches.






31. Class of Service.






32. The protocol used by content engines to manage traffic flow between routers configured for WCCP and between content engines. WCCP takes advantage of the fact that many web pages (and other content) are regularly accessed by users in a given network.






33. An NTP mode in which an NTP host adjusts its clock in relation to an NTP server's clock.






34. Network Time Protocol.






35. A bit in the LAPF Frame Relay header that - when set to 1 - implies that the frame has experienced congestion.






36. In IPv6 - the Neighbor Discovery message used by an IPv6 node to send information about itself to its neighbors.






37. In the PIM-SM design - the process by which a source DR - after it starts to receive the group traffic - encapsulates the multicast packets in the unicast packets and sends them to the RP.






38. The most recent standardized set of generic SNMP MIB variables - defined in RFC 1213 and updated in RFCs 2011 through 2013.






39. Weighted round-robin.






40. A Cisco-proprietary protocol that defines how to perform authentication between an authenticator (for example - a router) and an authentication server that holds a list of usernames and passwords.






41. PIM-SM is a method of routing multicast packets that requires some intelligence in the network about the locations of receivers so that multicast traffic is not flooded into areas with no receivers. PIM Sparse Mode gets its name from the assumption t






42. A Cisco IOS queuing tool most notable for its scheduler - which always services the high-priority queue over all other queues.






43. In the context of SNMP - the Set command is sent by an SNMP manager - to an agent - requesting that the agent set a single identified variable to the stated value. The main purpose is to allow remote configuration and remote operation - such as shutt






44. When a wireless station connects to an access point - the access point assigns an association ID (AID) to the station. Various protocols - such as power-save mode - make use of the association ID.






45. Loss of Signal. A T1 alarm state that occurs when the receiver has not received any pulses of either polarity for a defined time period.






46. Jargon used by STP mostly when discussing the root election process; refers to a Hello with a lower bridge ID. Sometimes refers to a Hello with the same bridge ID as another - but with better values for the tiebreakers in the election process.






47. Source-specific multicast.






48. A route that is created to represent one or more smaller component routes - typically in an effort to reduce the size of routing and topology tables.






49. Boot Protocol. A standard (RFC 951) protocol by which a LAN-attached host can dynamically broadcast a request for a server to assign it an IP address - along with other configuration settings - including a subnet mask and default gateway IP address.






50. An 802.1d STP transitory port state in which the port does not send or receive frames - and does not learn MAC addresses - but does wait for STP convergence and for CAM flushing by the switches in the network.