SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CCIE Vocab
Start Test
Study First
Subjects
:
certifications
,
ccie
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. An OSPF router that connects to the backbone area and to one or more non-backbone area.
feasible successor
Area Border Router
TACACS+
D4 framing
2. A vendor consortium that formerly worked to further Frame Relay common vendor standards.
RP
Frame Relay Forum
MD5 hash
Dead Time/Interval
3. A conceptual model used by CB Policing when using an excess burst.
Password Authentication Protocol
dual token bucket
FRF.9
NTP client mode
4. When a PIM-SM router switches from RPT to SPT - it sends a PIM-SM Prune message for the source and the group with the RP bit set to its upstream router on the shared tree. RFC 2362 uses the notation PIM-SM (S - G) RP-bit Prune for this message.
Network Control Protocol
RADIUS
PIM-SM (S -G) RP-bit Prune
authentication
5. In 802.1X - the computer that stores usernames/passwords and verifies that the correct values were submitted before authenticating the user.
authentication server
aggregate route
SNMP manager
LSU
6. A single instance of STP that is applied to multiple VLANs - typically when using the 802.1Q trunking standard.
Common Spanning Tree
Slow Start Threshold
priority (OSPF)
nested policy maps
7. A basic form of traffic shaping that is applied to an interface or subinterface. By default - it shapes all traffic leaving the interface - but can be modified by using an access control list. The access list controls only what traffic is shaped; GTS
Network Address Translation
generic traffic shaping (GTS)
loopback circuitry
WTD
8. A method for optimizing the flow of multicast IP packets passing through a LAN switch. The switch using IGMP snooping examines IGMP messages to determine which ports need to receive traffic for each multicast group.
aggregate route
IGMP snooping
link-state database
adaptive shaping
9. A category used by a policer to classify packets relative to the traffic contract. The bit rate implied by all conforming packets is within the traffic contract.
totally stubby area
RXBOOT
conform
FHSS
10. A type of IPv4 and IPv6 traffic designed primarily to provide one-to-many connectivity but unlike broadcast - has the capability to control the scope of traffic distribution.
dual token bucket
pulse code modulation
multicast
Forward Explicit Congestion Notification
11. A characterization of a BGP path attribute in which all BGP implementations must support and understand the attribute (well known) - and all BGP Updates must include the attribute (mandatory).
Multi-VRF CE
Wireless LAN Threat Defense Solution
MLD
well-known mandatory
12. A Cisco-proprietary protocol that defines how to perform authentication between an authenticator (for example - a router) and an authentication server that holds a list of usernames and passwords.
DSCP-to-CoS map
TACACS+
WCCP cluster
rendezvous point
13. An attack similar to a smurf attack - but using packets for the UDP Echo application instead of ICMP.
transient multicast group
WTD
fraggle attack
Extended Superframe
14. A route that is created to represent one or more smaller component routes - typically in an effort to reduce the size of routing and topology tables.
upstream router
confederation eBGP peer
summary route
SN
15. In switch port security - the process whereby the switch dynamically learns the MAC address(es) of the device(s) connected to a switch port - and then adds those addresses to the running configuration as allowed MAC addresses for port security.
generic traffic shaping (GTS)
protocol data unit
sticky learning
IPv6
16. Cisco Group Management Protocol.
CGMP
virtual LAN
Network Time Protocol
Modified Deficit Round-Robin
17. A BGP process by which a router reapplies routing policy configuration (route maps - filters - and the like) based on stored copies of sent and received BGP Updates.
AS_PATH length
RTS
soft reconfiguration
outer label
18. Virtual LAN.
VLAN
distance vector
I/G bit
VLAN filtering
19. In TCP - a TCP host sets the TCP header's Window field to the number of bytes it allows the other host to send before requiring an acknowledgement. In effect - the receiving host - by stating a particular window size - grants the sending host the rig
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
20. With routing protocols - the measurement of favorability that determines which entry will be installed in a routing table if more than one router is advertising that exact network and mask.
Maximum Response Time
component route
metric
link-local
21. A term generally describing characteristics about BGP paths that are advertised in BGP Updates.
LMI
source DR
LSP
path attribute
22. An optimized Layer 3 forwarding path through a router or switch. CEF optimizes routing table lookup by creating a special - easily searched tree structure based on the contents of the IP routing table. The forwarding information is called the Forward
Cell Loss Priority
data communications equipment
Cisco Express Forwarding
interface ID
23. IP multicast address range from 224.0.0.0 through 239.255.255.255.
RTO
multicast IP address range
wireless LAN controller
AS_PATH
24. A neighbor state that signifies the other router has reached neighbor status - having passed the parameter check. The FIB entry details the information needed for forwarding: the next-hop router and the outgoing interface - in an optimized mtrie stru
backup designated router
MIB-I
Forwarding Information Base
Maximum Response Time
25. The first 48 bits of an IPv6 global address - used for efficient route aggregation.
RPVST+
global routing prefix
proxy ARP
LOCAL_PREF
26. An NTP mode in which an NTP host does not adjust its clock - but in which it sends NTP messages to clients so that the clients can update their clocks based on the server's clock.
NTP server mode
stub area
Alternate state
inner label
27. A well-known discretionary BGP path attribute that flags a route as being a summary route.
VLAN filtering
AS number
ATOMIC_AGGREGATE
administratively scoped addresses
28. A reserved value for the BGP COMMUNITY path attribute that implies that the route should not be advertised outside the local confederation sub-AS.
provider router
Goodbye (EIGRP)
NO_EXPORT
LOCAL_AS
29. The destination VLAN for an RSPAN session.
MPD
Query (EIGRP)
FT
Remote VLAN
30. The PDU used by a particular layer of a networking model - with x defining the layer.
Layer x PDU
wireless LAN controller
encapsulation replication
RP
31. A protection against problems caused by unidirectional links between two switches. Uses messaging between switches to detect the loop - err-disabling the port when the link is unidirectional.
DTP
NS
UniDirectional Link Detection
SSM
32. Prefix list.
IP prefix list
Cisco Group Management Protocol
Virtual Router Redundancy Protocol
RXBOOT
33. The Cisco IOS feature by which special short key sequences can be used to move the cursor inside the current command line to more easily change a command.
CQ
listening state
UDLD
enhanced editing
34. A feature of Ethernet NICs. When the NIC transmits an electrical signal - it "loops" the transmitted electrical current back onto the receive pair. By doing so - if another NIC transmits a frame at the same time - the NIC can detect the overlapping r
full duplex
loopback circuitry
PDU
Virtual Router Redundancy Protocol
35. The portion of PPP focused on negotiating IP features
AS_SEQUENCE
LCP
routed interface
IP Control Protocol
36. In BGP - a configuration construct in which multiple neighbors' parameters can be configured as a group - thereby reducing the length of the configuration. Additionally - BGP performs routing policy logic against only one set of Updates for the entir
multicast IP address structure
FRF.11-c
Expedited Forwarding
peer group
37. A characterization of a BGP path attribute in which all BGP implementations must support and understand the attribute (well known) - but BGP Updates can either include the attribute or not depending on whether a related feature has been configured (d
multicast
VLAN Trunking Protocol
Cisco Group Management Protocol
well-known discretionary
38. A type of OSPF packet used to acknowledge LSU packets.
ARP
Link-State Acknowledgment
RD
IGMPv3 Host Membership Report
39. When a wireless station connects to an access point - the access point assigns an association ID (AID) to the station. Various protocols - such as power-save mode - make use of the association ID.
MPLS VPNs
association ID
distance vector
Dead Time/Interval
40. In IPv6 DNS - the IPv6 equivalent of an IPv4 DNS A record.
link-state advertisement
AAAA
Ack (EIGRP)
path attribute
41. A VC that is set up dynamically when needed. An SVC can be equated to a dial-on-demand connection in concept.
switched virtual circuit
inspection rule
Bipolar Violation
CIR
42. An NTP mode in which an NTP host adjusts its clock in relation to an NTP server's clock.
Wireless LAN Threat Defense Solution
weighted fair queuing
Outside Local address
NTP client mode
43. A queuing scheduler's logic by which - if a particular queue has packets in it - those packets always get serviced next.
IGMPv2 Host Membership Report
strict priority
framing
loopback circuitry
44. A process on a computing device that accepts SNMP requests - responds with SNMP-structured MIB data - and initiates unsolicited Trap messages back to an SNMP management station.
SNMP agent
well-known discretionary
Neighbor Discovery Protocol
MRTT
45. An architecture and set of documents that defines Cisco's best recommendations for how to secure a network.
SAFE Blueprint
permanent multicast group
private addresses
Next Hop field
46. Three core security functions.
Tc
authentication - authorization - and accounting
triggered updates
CTS
47. A Cisco-proprietary feature by which multiple routers can provide interface IP address redundancy - as well as cause a set of clients to load-balance their traffic across multiple routers inside the GLBP group.
Report Suppression mechanism
full drop
Gateway Load Balancing Protocol
prefix list
48. Any occurrence that could change a router's EIGRP topology table - including a received Update or Query - a failed interface - or the loss of a neighbor.
LSRefresh
area (OSPF)
Rapid Per-VLAN Spanning Tree Plus
input event
49. Area Border Router. An OSPF router that connects to the backbone area and to one or more non-backbone areas.
Link Control Protocol
Response (SNMP)
Tag Distribution Protocol
ABR
50. An MQC configuration style by which one policy map calls a second policy map. For example - a shaping policy map can call an LLQ policy map to implement LLQ for packets shaped by CB Shaping.
DCD
nested policy maps
ORIGIN
Web Cache Communication Protocol