Test your basic knowledge |

CCIE Vocab

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A strategy for subnetting a classful network for which all masks/prefixes are the same value for all subnets of that one classful network.






2. Priority queue and priority queuing.






3. Label Switch Router.






4. A Cisco-proprietary feature by which multiple routers can provide interface IP address redundancy - as well as cause a set of clients to load-balance their traffic across multiple routers inside the GLBP group.






5. A TCP variable that defines the largest number of bytes allowed in a TCP segment's Data field. The calculation does not include the TCP header. With a typical IP MTU of 1500 bytes - the resulting default MSS would be 1460. TCP hosts must support an M






6. Challenge Handshake Authentication Protocol.






7. Frequency hopping spread spectrum.






8. In the PIM-SM design - the process by which a PIM-SM router can build the SPT between itself and the source of a multicast group and take advantage of the most efficient path available from the source to the router as long as it has one directly conn






9. Jargon referring to a policer action through which - instead of discarding an out-of-contract packet - the policer marks a different IPP or DSCP value - allowing the packet to continue on its way - but making the packet more likely to be discarded la






10. A predefined VC. A PVC can be equated to a leased line in concept.






11. Link Control Protocol.






12. A tunneling protocol that can be used to encapsulate many different protocol types - including IPv4 - IPv6 - IPsec - and others - to transport them across a network.






13. A conceptual model used by shapers and policers to represent their internal logic.






14. A workstation or server configured to collect and present RMON data for reporting purposes.






15. The MD5-encoded password defined by the enable secret command.






16. A characterization of a BGP path attribute in which BGP implementations are not required to support the attribute (optional) - and for which if a router receives a route with such an attribute - the router should remove the attribute before advertisi






17. A type of OSPF packet used to exchange and acknowledge LSA headers. Sometimes called DBD.






18. Cisco IOS router feature by which a route map determines how to forward a packet - typically based on information in the packet other than the destination IP address.






19. An 802.1w RSTP port state in which the port is not forwarding or receiving; covers 802.1d port states disabled - blocking - and listening.






20. Superframe






21. A component that interfaces with a phone using IP and provides connections to the Public Switched Telephone Network (PSTN).






22. Cisco-proprietary STP feature in which a switch port monitors for incoming superior Hellos - and reacts to a superior Hello to prevent any switch connected to that port from becoming root.






23. An enhanced version of WEP that is part of the 802.11i standard and has an automatic key-update mechanism that makes it much more secure than WEP. TKIP is not as strong as AES in terms of data protection.






24. An EIGRP message that is used by neighbors to reply to a query. Reply messages require an Ack.






25. A 3-bit field in an 802.1Q header used for marking frames.






26. Message sent by a PIM-DM router to its upstream router asking to quickly restart forwarding the group traffic; sent using the unicast address of the upstream router.






27. From one perspective - DTE devices are one of two devices on either end of a communications circuit - specifically the device with less control over the communications. In Frame Relay - routers connected to a Frame Relay access link are DTE devices.






28. Excess Burst.






29. In Frame Relay - a link between a router and a Frame Relay switch.






30. WRED compares this setting to the average queue depth to decide whether packets should be discarded. All packets are discarded if the average queue depth rises above this maximum threshold.






31. A 3-tuple consisting of an IP address - port number - and transport layer protocol. TCP connections exist between a pair of sockets.






32. The portion of PPP focused on negotiating IP features






33. A multicast routing protocol that operates in dense mode and depends on the OSPF unicast routing protocol to perform its multicast functions.






34. A NAT term describing an IP address representing a host that resides outside the enterprise network - with the address being used in packets outside the enterprise network.






35. Multicast addresses that are not assigned by IANA.






36. Typically used by protocols that perform flow control (like TCP) - a TCP window is the number of bytes that a sender can send before it must pause and wait for an acknowledgement of some of the yet-unacknowledged data.






37. Records client authentication and roaming events - which are sent to the CiscoWorks Wireless LAN Solution Engine (WLSE) to monitor client associations to specific access points.






38. An E-LSR in an MPLS VPN network whose role in a particular discussion is to receive labeled packets from other LSRs and then forward the packets as unlabeled packets to CE routers.






39. An OSPF router that connects to the backbone area and to one or more non-backbone area.






40. Database Description.






41. A contiguous group of data links that share the same OSPF area number.






42. A reserved value for the BGP COMMUNITY path attribute that implies that the route should not be advertised outside the local AS.






43. A Layer 3 forwarding path through a router that does not optimize the forwarding path through the router.






44. A WRED process by which WRED discards all newly arriving packets intended for a queue - based on whether the queue's maximum threshold has been exceeded.






45. Enables a wireless client to securely roam between access points in the same subnet or between subnets with access point handoff times within 50 ms.






46. Cisco-proprietary VLAN trunking protocol.






47. A prestandard (at the time of publication) wireless LAN physical layer that offers data rates in the hundreds of megabits per second.






48. Designed to solve the problems of multicast duplication and multicast routing loops. For every multicast packet received - a multicast router examines its source IP address - consults its unicast routing table - determines which interface it would us






49. Used by a policer to classify packets relative to the traffic contract. These packets are considered to be above the traffic contract in all cases.






50. A neighbor state that signifies the other router has reached neighbor status - having passed the parameter check. The FIB entry details the information needed for forwarding: the next-hop router and the outgoing interface - in an optimized mtrie stru







Sorry!:) No result found.

Can you answer 50 questions in 15 minutes?


Let me suggest you:



Major Subjects



Tests & Exams


AP
CLEP
DSST
GRE
SAT
GMAT

Most popular tests