Test your basic knowledge |

CCIE Vocab

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Receiver's advertised window.






2. An IPv6/IPv4 tunneling method that is designed for transporting IPv6 packets within a site where a native IPv6 infrastructures is not available.






3. Maximum transmission unit.






4. An MPLS data structure used for forwarding labeled packets. The LFIB lists the incoming label - which is compared to the incoming packet's label - along with forwarding instructions for the packet.






5. Jargon used to refer to the first of two buckets in the dual token bucket model; its size is Bc.






6. An optional contention-free 802.11 access protocol that requires the access point to poll wireless stations before they are able to send frames. Not commonly implemented.






7. Measured Round-Trip Time.






8. Context-Based Access Control.






9. One of the two modes of MDRR - in which the priority queue is serviced between each servicing of the non-priority queues.






10. Policing in which a single rate is metered - and packets are placed into one of three categories (conform - exceed - or violate).






11. Label Distribution Protocol.






12. From a Layer 1 perspective - the process of using special strings of electrical signals over a transmission medium to inform the receiver as to which bits are overhead bits - and which fit into individual subchannels.






13. With routing protocols - the measurement of favorability that determines which entry will be installed in a routing table if more than one router is advertising that exact network and mask.






14. Also known as triggered updates.






15. Neighbor Solicitation.






16. Defined in RFC 1293 - this protocol allows a Frame Relay-attached device to react to a received LMI "PVC up" message by announcing its Layer 3 addresses to the device on the other end of the PVC.






17. A mechanism in which VLAN information can extend over another set of 802.1Q trunks by tunneling the original 802.1Q traffic with another 802.1Q tag. It allows a service provider to support transparent VLAN services with multiple customers - even if t






18. Spanning Tree Protocol.






19. Excess Burst.






20. A set of DiffServ PHBs that defines 12 DSCP values - with four queuing classes and three drop probabilities within each queuing class.






21. Forwarding Information Base.






22. A route that is created to represent one or more smaller component routes - typically in an effort to reduce the size of routing and topology tables.






23. A type of logic for how a router uses a default route. When a default route exists - and no more specific match is made between the destination of the packet and the routing table - the default route is used.






24. A term referring to the MQC policy-map command and its related subcommands - which are used to apply QoS actions to classes of packets.






25. A term used with WFQ for the number assigned to a packet as it is enqueued into a WFQ. WFQ schedules the currently lowest SN packet next.






26. The protocol used by content engines to manage traffic flow between routers configured for WCCP and between content engines. WCCP takes advantage of the fact that many web pages (and other content) are regularly accessed by users in a given network.






27. A set of packets in an MPLS network for which the MPLS network will apply the exact same forwarding behavior.






28. A serial-line encoding standard like B8ZS - but with each set of four consecutive 0s being changed to include a Bipolar Violation to maintain synchronization.






29. A process on a computing device that issues requests for SNMP MIB variables from SNMP agents - receives and processes the MIB data - and accepts unsolicited Trap messages from SNMP agents.






30. Router Advertisement.






31. A type of spread spectrum that spreads RF signals over the frequency spectrum by transmitting the signal at different frequencies according to a hopping pattern. One of the original 802.11 physical layers used FHSS to offer data rates of 1 and 2 Mbps






32. Database Description.






33. An integer setting for EIGRP and IGRP. Any FS route whose metric is less than this variance multiplier times the successor's metric is added to the routing table - within the restrictions of the maximum-paths command.






34. Access Control Entry. An individual line in an ACL.






35. Sent by a PIM-DM or PIM-SM router when it receives a multicast packet for a group on a LAN interface that is in the outgoing interface list for the group; includes the administrative distance of the unicast routing protocol used to learn the network






36. Defined in FRF.11 - an FR VC that uses a slightly varied header - as compared with FRF.3 data VCs - to accommodate voice payloads directly encapsulated inside the Frame Relay LAPF header.






37. Receivers subscribe to an (S -G) channel when they request to join a multicast group. That is - they specify the unicast IP address of their multicast source and the group multicast address. SSM is typically used in very large multicast deployments s






38. A generic term that refers to the data structure used by a layer in a layered network architecture when sending data.






39. The operating mode of shaped round-robin that provides a low-latency queue with policing.






40. Message sent by a PIM-DM router to its upstream router asking to quickly restart forwarding the group traffic; sent using the unicast address of the upstream router.






41. A mapping between each DSCP value and a corresponding CoS value - often used in Cisco LAN switches when performing classification for egress queuing.






42. In IPv6 - the Neighbor Discovery message used by an IPv6 node to request information about a neighbor or neighbors.






43. A T1 alarm state that occurs when the receiver can no longer consistently identify the frame.






44. Penultimate hop popping.






45. A method for optimizing the flow of multicast IP packets passing through a LAN switch. The switch using IGMP snooping examines IGMP messages to determine which ports need to receive traffic for each multicast group.






46. Border Gateway Protocol.






47. An EIGRP message that informs neighbors about routing information. Update messages require an Ack.






48. In TCP - a TCP host sets the TCP header's Window field to the number of bytes it allows the other host to send before requiring an acknowledgement. In effect - the receiving host - by stating a particular window size - grants the sending host the rig


49. A message sent by each host - either in response to a router query or on its own - to all multicast groups for which it would like to receive multicast traffic. The destination address on the Report is 224.0.0.22 - and a host can specify the source a






50. A component of the IOS IP SLA feature. An IP SLA responder is a router configured to respond to a particular IP SLA message initiated by another router - allowing the routers to work together to provide performance information including UDP jitter an