Test your basic knowledge |

CCIE Vocab

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. An EIGRP message that informs neighbors about routing information. Update messages require an Ack.






2. Copper cable with RJ-45 connectors in which a twisted pair at pins 1 -2 on the first end of the cable is connected to pins 3 -6 on the other end - with a second pair connected to pins 3 -6 on the first end and pins 1 -2 on the other end.






3. A term used with WFQ for the number assigned to a packet as it is enqueued into a WFQ. WFQ schedules the currently lowest SN packet next.






4. An FRF standard for payload compression.






5. The OSPF data structure that describes topology information.






6. The RMON function of tracking a particular variable. RMON events trigger RMON alarms.






7. A Frame Relay traffic shaping feature during which the shaping rate is reduced when the shaper notices congestion through the receipt of BECN or ForeSight messages.






8. A switch feature that examines incoming frames - comparing the source IP and MAC addresses to the DHCP snooping binding database - filtering frames whose addresses are not listed in the database for the incoming interface.






9. UniDirectional Link Detection.






10. Weighted round-robin.






11. Source-specific multicast.






12. A set of all devices for which any frame sent by one of the devices would collide with any frames transmitted at the same time by any of the other devices in the set.






13. Forwarding Equivalence Class.






14. The same thing as TCP code bits. See TCP code bits.






15. A switch feature that limits the number of allowed MAC addresses on a port - with optional limits based on the actual values of the MAC addresses.






16. Auto-Rendezvous Point. Cisco-proprietary protocol that can be used to designate an RP and send RP-Announce messages that advertise its IP address and groups. Also - it can be used to designate a mapping agent that interprets what IP address RP is adv






17. Defines a particular behavior for FTP regarding the establishment of data TCP connections. In active mode - the FTP client uses the FTP PORT command - over the FTP control connection - to tell the FTP server the port on which the client should be lis






18. Wired Equivalent Privacy.






19. An Internet standard authentication protocol that uses secure hashes and a three-way handshake to perform authentication over a PPP link.






20. A term relating to Cisco LAN switch tail-drop logic - in which multiple tail-drop thresholds may be assigned based on CoS or DSCP - resulting in some frames being discarded more aggressively than others.






21. A predefined VC. A PVC can be equated to a leased line in concept.






22. Structure of Management Information.






23. In OSPF - a number assigned to each LSA - ranging from 0x80000001 and wrapping back around to 0x7FFFFFFF - which is used to determine which LSA is most recent.






24. A configuration tool in Cisco IOS that allows basic programming logic to be applied to a set of items. Often used for decisions about what routes to redistribute - and for setting particular characteristics of those routes






25. The 802.1X function implemented by a switch - in which the switch translates between EAPoL and RADIUS messages in both directions - and enables/disables ports based on the success/failure of authentication.






26. Dynamic Host Configuration Protocol.






27. In the PIM-SM design - the process by which a PIM-SM router can build the SPT between itself and the source of a multicast group and take advantage of the most efficient path available from the source to the router as long as it has one directly conn






28. With routing protocols - the measurement of favorability that determines which entry will be installed in a routing table if more than one router is advertising that exact network and mask.






29. A category used by a policer to classify packets relative to the traffic contract. With two-color policers - these packets are considered to be above the contract; for three-color - these packets are above the Bc setting - but within the Be setting.






30. Management Information Base.






31. A network/subnet over which two or more OSPF routers have become neighbors - thereby being able to forward packets from one router to another across that network.






32. An intrusion detection system that safeguards the wireless LAN from malicious and unauthorized access.






33. A subset of a classful IP network - as defined by a subnet mask - which used to address IP hosts on the same Layer 2 network in much the same way as a classful network is used.






34. Web Cache Communication Protocol.






35. A characterization of a BGP path attribute in which all BGP implementations must support and understand the attribute (well known) - and all BGP Updates must include the attribute (mandatory).






36. The characterization of how far EIGRP Query messages flow away from the router that first notices a failed route and goes active for a particular subnet.






37. A T1 alarm state that occurs when a device has detected a local LOF/LOS/AIS condition. The device in Red alarm state then sends a Yellow alarm signal.






38. Any OSPF neighbor for which the database flooding process has completed.






39. The SNMP specifications - standardized in RFCs - defining the rules by which SNMP MIB variables should be defined.






40. Backward Explicit Congestion Notification.






41. A serial-line encoding standard that sends alternating positive and negative 3-volt signals for binary 1 - and no signal (0 V) for binary 0.






42. Secure Shell protocol used for character-oriented command-line access and configuration. A highly secure alternative to Telnet.






43. The router in a VRRP group that is currently actively forwarding IP packets. Conceptually the same as an HSRP Active router.






44. Modular QoS CLI.






45. Used by WRED to calculate the maximum percentage of packets discarded when the average queue depth falls between the minimum and maximum thresholds.






46. With EIGRP - the metric (distance) of a route as reported by a neighboring router.






47. Single-bit fields in the TCP header. For example - the TCP SYN and ACK code bits are used during connection establishment.






48. Committed Burst.






49. A 3-tuple consisting of an IP address - port number - and transport layer protocol. TCP connections exist between a pair of sockets.






50. The definitions for a particular set of data variables - with those definitions following the SMI specifications. See also SMI.