Test your basic knowledge |

CCIE Vocab

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. The term referring to a group of iBGP routers in a confederation - with the group members being assigned a hidden ASN for the purposes of loop avoidance.






2. A name used for DS3 lines inside the European TDM hierarchy.






3. An enhanced version of WEP that is part of the 802.11i standard and has an automatic key-update mechanism that makes it much more secure than WEP. TKIP is not as strong as AES in terms of data protection.






4. A DiffServ PHB - based on DSCP EF (decimal 46) - that provides low-latency queuing behavior as well as policing protection to prevent EF traffic from starving queues for other types of traffic.






5. A process on a computing device that accepts SNMP requests - responds with SNMP-structured MIB data - and initiates unsolicited Trap messages back to an SNMP management station.






6. A specification for the 64-bit interface ID in an IPv6 address - composed of the first half of a MAC address - hex FFFE - and the last half of the MAC.






7. The protocol used by content engines to manage traffic flow between routers configured for WCCP and between content engines. WCCP takes advantage of the fact that many web pages (and other content) are regularly accessed by users in a given network.






8. Secure Shell protocol used for character-oriented command-line access and configuration. A highly secure alternative to Telnet.






9. With EIGRP - the metric (distance) of a route as reported by a neighboring router.






10. In shaping and policing - commonly used to refer to the shaping or policing rate. For WAN services - a common reference to the bit rate defined in the WAN service business contract for each VC.






11. Prefix list.






12. A logical group of content engines running WCCP between them. The lead content engine determines the traffic distribution within the cluster - for optimum performance and scalability.






13. Digital Signal Level 3.






14. Protects against problems caused by unidirectional links between two switches. Watches for loss of received Hello BPDUs - in which case it transitions to a loop-inconsistent state instead of transitioning to a forwarding state.






15. Superframe






16. Local Management Interface.






17. In IPv6 DNS - the IPv6 equivalent of an IPv4 DNS A record.






18. A BGP process by which a router reapplies routing policy configuration (route maps - filters - and the like) based on stored copies of sent and received BGP Updates.






19. Alarm Indication Signal. With T1s - the practice of sending all binary 1s on the line in reaction to problems - to provide signal transitions and allow recovery of synchronization and framing.






20. Context-Based Access Control.






21. For some encoding schemes - consecutive signals must use opposite polarity in an effort to reduce DC current. A BPV occurs when consecutive signals are of the same polarity.






22. Differentiated Services Code Point.






23. Port Address Translation.






24. Area 0; the area to which all other OSPF areas much connect in order for OSPF to work.






25. Web Cache Communication Protocol.






26. On a serial cable - the pin lead set by the DCE to imply that the DCE is ready to signal using pin leads






27. A strategy for subnetting a classful network for which all masks/prefixes are the same value for all subnets of that one classful network.






28. The innermost MPLS header in an packet traversing an MPLS VPN - with the label value identifying the forwarding details for the egress PE's VRF associated with that VPN.






29. With routing protocols - the measurement of favorability that determines which entry will be installed in a routing table if more than one router is advertising that exact network and mask.






30. A method of providing dynamically configured spoke-to-spoke VPN connectivity in a hub-and-spoke network that significantly reduces configuration required on the spoke routers compared to traditional IPsec VPN environments.






31. The list of entries learned by the switch DHCP snooping feature. The entries include the MAC address used as the device's DHCP client address - the assigned IP address - the VLAN - and the switch port on which the DHCP assignment messages flowed.






32. On a single computer - one layer provides a service to a higher layer. The software or hardware that implements the higher layer requests that the next lower layer perform the needed function.






33. Carrier sense multiple access with collision detection. A media-access mechanism where devices ready to transmit data first check the channel for a carrier. If no carrier is sensed for a specific period of time - a device can transmit. If two devices






34. A Cisco router feature in which the router works to prevent SYN attacks either by monitoring TCP connections flowing through the router - or by actively terminating TCP connection until the TCP connection is established and then knitting the client-s






35. In the PIM-SM design - the process by which a source DR - after it starts to receive the group traffic - encapsulates the multicast packets in the unicast packets and sends them to the RP.






36. In the context of SNMP - the Trap command is sent by an SNMP agent - to a manager - when the agent wants to send unsolicited information to the manager. Trap is not followed by a Response message from the receiving SNMP manager.






37. Defines a particular behavior for FTP regarding the establishment of data TCP connections. In active mode - the FTP client uses the FTP PORT command - over the FTP control connection - to tell the FTP server the port on which the client should be lis






38. In switch port security - the process whereby the switch dynamically learns the MAC address(es) of the device(s) connected to a switch port - and then adds those addresses to the running configuration as allowed MAC addresses for port security.






39. A Frame Relay traffic shaping feature during which the shaping rate is reduced when the shaper notices congestion through the receipt of BECN or ForeSight messages.






40. In the context of SNMP - the GetNext command is sent by an SNMP manager - to an agent - requesting the value of a single MIB variable. The GetNext request identifies a variable for which the manager wants the variable name and value of the next MIB l






41. From a Layer 1 perspective - the process of using special strings of electrical signals over a transmission medium to inform the receiver as to which bits are overhead bits - and which fit into individual subchannels.






42. Retransmission Timeout.






43. Copper cable with RJ-45 connectors in which a twisted pair at pins 1 -2 on the first end of the cable is connected to pins 3 -6 on the other end - with a second pair connected to pins 3 -6 on the first end and pins 1 -2 on the other end.






44. The notation in a Cisco IOS IP routing table that identifies the route used by that router as the default route.






45. Defined in RFC 2091 - the extensions define how RIP may send a full update once - and then send updates only when routes change - when an update is requested - or when a RIP interface changes state from down to up.






46. A 64-bit extension to the BGP NLRI field - used by MPLS for the purpose of making MPLS VPN customer routes unique in spite of the possibility of overlapping IPv4 address spaces in different customer networks.






47. A Cisco IOS interface software queue queuing strategy implemented automatically when using either form of Frame Relay fragmentation. The system then interleaves packets from the high-priority queue between fragments of the medium-priority queue.






48. The rate at which a policer limits the bits exiting or entering the policer.






49. An MPLS VPN term referring to a router at a customer site that does not implement MPLS.






50. The same thing as TCP code bits. See TCP code bits.