Test your basic knowledge |

CCIE Vocab

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Controls the distribution of multicast traffic for the private multicast address range 239.0.0.0 to 239.255.255.255 by configuring a filter and applying it on the interfaces.






2. A method for how a TCP sender grows its calculated CWND variable - thereby growing the allowed window for the connection. Congestion Avoidance grows CWND linearly.






3. A CBWFQ and LLQ term referring to the bandwidth on an interface that is neither reserved nor allocated via a priority command.






4. A Cisco IOS queuing tool that uses MQC configuration commands and reserves a minimum bandwidth for each queue.






5. The process of forwarding packets through a router. Also called IP forwarding.






6. A switch feature that examines incoming frames - comparing the source IP and MAC addresses to the DHCP snooping binding database - filtering frames whose addresses are not listed in the database for the incoming interface.






7. The process of taking the IP and TCP headers of a packet - compressing them - and then uncompressing them on the receiving router.






8. Message Digest 5.






9. With RIP - a per-route timer - which is reset and grows with the Invalid timer. When the Flush timer mark is reached (default 240 seconds) - the router removes the route from the routing table - and now accepts any other routes about the failed subne






10. The process of sending an infinite-metric route in routing updates when that route fails.






11. A term referring to the MQC policy-map command and its related subcommands - which are used to apply QoS actions to classes of packets.






12. PIM-DM is a method of routing multicast packets that depends on a flood-and-prune approach. PIM Dense Mode gets its name from the assumption that there are many receivers of a particular multicast group - close together (from a network perspective).






13. Version 4 of the IP protocol - which is the generally deployed version worldwide (at publication) - and uses 32-bit IP addresses.






14. With RIP - the regular interval at which updates are sent. Each interface uses an independent timer - defaulting to 30 seconds.






15. The command used to initialize a SPAN or RSPAN session on a Catalyst switch.






16. A list of interspersed alphanumeric literals and metacharacters that are used to apply complex matching logic to alphanumeric strings. Often used for matching AS_PATHs in Cisco routers.






17. A type of logic for how a router uses a default route. When a default route exists - and the class A - B - or C network for the destination IP address does not exist in the routing table - the default route is used. If any part of that classful netwo






18. An exterior routing protocol designed to exchange prefix information between different autonomous systems. The information includes a rich set of characteristics called path attributes - which in turn allows for great flexibility regarding routing ch






19. Sending a message from a single source or multiple sources to selected multiple destinations across a Layer 3 network in one data stream.






20. The password required by the enable command. Also - this term may specifically refer to the password defined by the enable password command.






21. WRED compares this setting to the average queue depth to decide whether packets should be discarded. No packets are discarded if the average queue depth falls below this minimum threshold.






22. A characterization of a network attack in which packets flow to the attacker - and then out to the true recipient. As a result - the user continues to send data - increasing the chance that the attacker learns more and better information.






23. A WRED process by which WRED discards all newly arriving packets intended for a queue - based on whether the queue's maximum threshold has been exceeded.






24. Label Switch Router.






25. A router feature used when a router sees an ARP request searching for an IP host's MAC - when the router believes the IP host could not be on that LAN because the host is in another subnet. If the router has a route to reach the subnet where the ARP-






26. A calculated TCP variable - used along with the TCP CWND variable - to dictate a TCP sender's behavior when it recognizes packet loss. As CWND grows after packet loss - the TCP sender increases CWND based on Slow Start rules - until CWND grows to be






27. The first 48 bits of an IPv6 global address - used for efficient route aggregation.






28. Advanced Encryption Standard A superior encryption mechanism that is part of the 802.11i standard and has much stronger security than TKIP.






29. The original standardized set of generic SNMP MIB variables - defined in RFC 1158.






30. An MPLS term describing designs in which one or more MPLS customer sites can be reached from multiple other VPNs.






31. A contiguous group of data links that share the same OSPF area number.






32. An exterior routing protocol that predates BGP. It is no longer used today.






33. Inter-Switch Link.






34. With RIP - a per-route timer that increases until the router receives a routing update that confirms the route is still valid - upon which the timer is reset to 0. If the updates cease - the Invalid timer will grow - until reaching the timer setting






35. An 802.1d STP port state in which the port has been administratively disabled.






36. Single-bit fields in the TCP header. For example - the TCP SYN and ACK code bits are used during connection establishment.






37. The term to describe a router that is neither the DR nor the BDR on a subnet that elects a DR and BDR.






38. Class-Based Marking.






39. From one perspective - DTE devices are one of two devices on either end of a communications circuit - specifically the device with less control over the communications. In Frame Relay - routers connected to a Frame Relay access link are DTE devices.






40. With Spanning Tree Protocol - the single port on each LAN segment from which the best Hello BPDU is forwarded.






41. The data structure used by OSPF to hold LSAs.






42. An OSPF timer that determines how long an LSA can remain in the LSDB without having heard a reflooded copy of the LSA.






43. Label switched path.






44. A type of spread spectrum that spreads RF signals over the frequency spectrum by transmitting the signal at different frequencies according to a hopping pattern. One of the original 802.11 physical layers used FHSS to offer data rates of 1 and 2 Mbps






45. A component of the IOS IP SLA feature. An IP SLA responder is a router configured to respond to a particular IP SLA message initiated by another router - allowing the routers to work together to provide performance information including UDP jitter an






46. Variable-length subnet masking.






47. The operating mode of shaped round-robin that provides a low-latency queue with policing.






48. In MPLS VPNs - an entity in a single router that provides a means to separate routes in different VPNs. The VRF includes per-VRF instances of routing protocols - a routing table - and an associated CEF FIB.






49. Rapid Spanning Tree Protocol.






50. A Cisco-proprietary messaging protocol used to negotiate the dynamic creation of PortChannels (EtherChannels) and to choose which ports can be placed into an EtherChannel.