Test your basic knowledge |

CCIE Vocab

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A routing protocol feature by which the routing update includes the entire set of routes - even if some or all of the routes are unchanged.






2. The information maintained by a router for each multicast entry in its multicast routing table - such as incoming interface - outgoing interface list - Uptime timer - Expire timer - etc.






3. An IEEE standard that - when used with EAP - provides user authentication before their connected switch port allows the device to fully use the LAN.






4. Differentiated Services.






5. A router that should not be used to forward packets between other routers. Other routers will not send Query messages to a stub router.






6. A Cisco-proprietary protocol that defines how to perform authentication between an authenticator (for example - a router) and an authentication server that holds a list of usernames and passwords.






7. A BGP feature that overcomes the requirement of a full mesh of iBGP peers inside a single AS by separating the AS into multiple sub-autonomous systems.






8. In the context of SNMP - the Set command is sent by an SNMP manager - to an agent - requesting that the agent set a single identified variable to the stated value. The main purpose is to allow remote configuration and remote operation - such as shutt






9. Cisco Group Management Protocol.






10. The process of installing a multicast application; also referred to as launching an application.






11. In shaping and policing - commonly used to refer to the shaping or policing rate. For WAN services - a common reference to the bit rate defined in the WAN service business contract for each VC.






12. A calculation of the length of the AS_PATH PA - which includes 1 for each number in the AS_SEQ - 1 for an entire AS_SET segment - and possibly other considerations.






13. The second byte of the IP header - formerly known as the ToS byte and redefined by DiffServ.






14. A message sent by each host - either in response to a router query or on its own - to all multicast groups for which it would like to receive multicast traffic. The destination address on the Report is 224.0.0.22 - and a host can specify the source a






15. The ASN assigned to a confederation sub-AS.






16. The RMON function of sending a notification to an RMON collector or the console. Triggered by an RMON event.






17. A T1 alarm state that occurs when a device receives a Yellow Alarm signal. This typically means that the device on the other end of the line is in a Red Alarm state.






18. A feature of Ethernet NICs. When the NIC transmits an electrical signal - it "loops" the transmitted electrical current back onto the receive pair. By doing so - if another NIC transmits a frame at the same time - the NIC can detect the overlapping r






19. An intrusion detection system that safeguards the wireless LAN from malicious and unauthorized access.






20. The first 6 bits of the DS field - used for QoS marking.






21. In TCP - a TCP host sets the TCP header's Window field to the number of bytes it allows the other host to send before requiring an acknowledgement. In effect - the receiving host - by stating a particular window size - grants the sending host the rig

Warning: Invalid argument supplied for foreach() in /var/www/html/basicversity.com/show_quiz.php on line 183


22. In the context of SNMP - the Get command is sent by an SNMP manager - to an agent - requesting the value of a single MIB variable identified in the request. The Get request identifies the exact variable whose value the manager wants to retrieve. Intr






23. Dynamic Trunking Protocol.






24. Ethernet MAC address that represents a single NIC or interface.






25. A type of OSPF packet used to exchange and acknowledge LSA headers. Sometimes called DBD.






26. An NTP client that assumes that a server will send NTP broadcasts - removing the requirement for the client to have the NTP server's IP address preconfigured.






27. A wireless LAN physical layer that operates at up to 11-Mbps data rates using DSSS in the 2.4-GHz band.






28. In BGP - a set of routers inside a single administrative authority - grouped together for the purpose of controlling routing policies for the routes advertised by that group to the Internet.






29. A BGP ASN whose value is between 64 -512 and 65 -535. These values are not assigned for use on the Internet - and can be used for private purposes - typically either within confederations or by ISPs to hide the ASN used by some customers.






30. An individual line in an ACL.






31. A 48-bit address that is calculated from a Layer 3 multicast address by using 0x0100.5E as the multicast vendor code (OUI) for the first 24 bits - always binary 0 for the 25th bit - and copying the last 23 bits of the Layer 3 multicast address.






32. Uses Modular QoS CLI to control the amount and type of traffic handled by the router or switch control plane. Class maps identify traffic types - and then a service policy applied to the device control plane sets actions for each type of traffic.






33. Finish time.






34. A dotted-decimal number used to help define the structure of an IP address. The binary 0s in the mask identify the host portion of an address - and the binary 1s identify either the combined network and subnet part (when thinking classfully) or the n






35. On a serial cable - the pin lead set by the DTE to tell the DCE that the DTE wants to send data.






36. Bipolar 8 Zero Substitution. A serial-line encoding standard that substitutes Bipolar Violations in a string of eight binary 0s to provide enough signal transitions to maintain synchronization.






37. With EIGRP - the timer used to determine when a neighboring router has failed - based on a router not receiving any EIGRP messages - including Hellos - in this timer period.






38. A problem that occurs when an AS does not run BGP on all routers - with synchronization disabled. The routers running BGP may believe they have working routes to reach a prefix - and forward packets to internal routers that do not run BGP and do not






39. Feasible distance.






40. A BGP path attribute that implies how the route was originally injected into some router's BGP table.






41. Classless interdomain routing.






42. The two computers use a protocol with which to communicate with the same layer on another computer. The protocol defined by each layer uses a header that is transmitted between the computers to communicate what each computer wants to do.






43. A Layer 3 forwarding path through a router that does not optimize the forwarding path through the router.






44. Alternate name for the SPF algorithm - named for its inventor - Edsger W. Dijkstra.






45. A BGP peer connection between two routers inside the same ASN - but in different confederation sub-autonomous systems.






46. A multicast routing protocol that operates in dense mode and depends on the OSPF unicast routing protocol to perform its multicast functions.






47. A definition that determines the data structure and information implied by a particular LSA.






48. A type of spread spectrum that spreads RF signals over the frequency spectrum by transmitting the signal at different frequencies according to a hopping pattern. One of the original 802.11 physical layers used FHSS to offer data rates of 1 and 2 Mbps






49. An EIGRP message that identifies neighbors - exchanges parameters - and is sent periodically as a keepalive function. Hellos do not require an Ack.






50. A term used with WFQ for the number assigned to a packet as it is enqueued into a WFQ. WFQ schedules the currently lowest SN packet next.