CCNP ENCOR Vocab Flashcards

1
Q

802.1p

A

An IEEE specification that defines the use of the 3-bit Priority Code Point (PCP) field to provide different classes of service. The PCP field is contained within the TCI field, which is part of the 802.1Q header.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

802.1Q

A

An IEEE specification that defines two 2-byte fields, Tag Protocol Identifier (TPID) and Tag Control Information (TCI), that are inserted within an Ethernet frame.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

802.1x

A

An IEEE standard for port-based network access control (PNAC) that provides an authentication mechanism for local area networks (LANs) and wireless LANs (WLANs).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

access control list (ACL)

A

mechanism that provides packet classification for quality of service
(QoS), routing protocols, and basic firewall functionality.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

access layer

A

The network layer that gives endpoints and users direct access to the network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

access port

A

A switch port that is configured for only one specific VLAN and generally connects end-user devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

address family

A

A major classification of type of network protocol, such as IPv4, IPv6, or
VPNv4.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

address resolution protocol (ARP)

A

protocol that resolves a MAC address to a specific
IP address.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

administrative distance

A

rating of trustworthiness for a route. Generally, it is associated
with the routing process that installs the route into the RIB.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

AMP for Networks

A

AMP running on Cisco Secure Firewall appliances and dedicated Cisco
AMP appliances for network malware defense.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

amplitude

A

height from the top peak to the bottom peak of a signal’s waveform; also
known as the peak-to-peak amplitude.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

anchor controller

A

The original controller a client was associated with before a Layer 3 intercontroller roam. An anchor controller can also be used for tunneling clients on a guest WLAN or with a static anchor. Traffic is tunneled from the client’s current controller (the foreign controller) back to the anchor.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

application programming interface (API)

A

A set of functions and procedures used for configuring
or monitoring computer systems, network devices, or applications that involves programmatically interacting through software. It can be used for connecting to individual devices or multiple devices simultaneously.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

area border router (ABR)

A

A router that connects an OSPF area to Area 0 (that is, the backbone
area).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

AS_Path

A

BGP attribute used to track the autonomous systems a network has been advertised through as a loop-prevention mechanism.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

AS path access control list (ACL)

A

An ACL based on regex for identifying BGP routes based on the AS path and used for direct filtering or conditional matching in a route map.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

atomic aggregate

A

BGP path attribute which indicates that a prefix has been summarized,
and not all of the path information from component routes was included in the aggregate.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

authentication, authorization, and accounting (AAA)

A

An architectural framework that enables secure network access control for users and devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

authentication server (AS)

A

An 802.1x entity that authenticates users or clients based on
their credentials, as matched against a user database. In a wireless network, a RADIUS server is an AS.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

authenticator

A

An 802.1x entity that exists as a network device that provides access to the network. In a wireless network, a WLC acts as an authenticator.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

autonomous AP

A

A wireless AP operating in a standalone mode, such that it can provide a
fully functional BSS and connect to the DS.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

autonomous system (AS)

A

A set of routers running the same routing protocol under a single
realm of control and authority.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

backbone area

A

The OSPF Area 0, which connects to all other OSPF areas. The backbone area is the only area that should provide connectivity between all other OSPF areas.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

backup designated router (BDR)

A

A backup pseudonode that maintains the network segment’s
state to replace the DR in the event of its failure.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
band
A contiguous range of frequencies.
26
bandwidth
The range of frequencies used by a single channel or a single RF signal.
27
beamwidth
A measure of the angle of a radiation pattern in both the E and H planes, where the signal strength is 3 dB below the maximum value.
28
BGP community
A well-known BGP attribute that allows for identification of routes for later actions such as identification of source or route filtering/modification.
29
BGP multihoming
method of providing redundancy and optimal routing that involves adding multiple links to external autonomous systems.
30
BPDU filter
STP feature that filters BPDUs from being advertised/received across the configured port.
31
BPDU guard
STP feature that places a port into an ErrDisabled state if a BPDU is received on a portfast-enabled port.
32
bridge protocol data unit (BPDU)
A network packet that is used to identify a hierarchy and notify of changes in the topology.
33
broadcast domain
A portion of a network where a single broadcast can be advertised or received.
34
building block
A distinct place in the network (PIN) such as the campus end-user/endpoint block, the WAN edge block, the Internet edge block, or the network services block. The components of each building block are the access layer, the distribution layer, and/or the core (backbone) layer. Also known as a network block or a place in the network (PIN).
35
CAPWAP
standards-based tunneling protocol that defines communication between a lightweight AP and a wireless LAN controller.
36
carrier signal
The basic, steady RF signal that is used to carry other useful information.
37
channel
An arbitrary index that points to a specific frequency within a band.
38
Cisco Advanced Malware Protection (AMP)
Cisco malware analysis and protection solution that goes beyond point-in-time detection and provides comprehensive protection for organizations across the full attack continuum: before, during, and after an attack.
39
Cisco Express Forwarding (CEF)
method of forwarding packets in hardware through the use of the FIB and adjacency tables. CEF is much faster than process switching.
40
Cisco Identity Services Engine (ISE)
Cisco security policy management platform that provides highly secure network access control to users and devices across wired, wireless, and VPN connections. It allows for visibility into what is happening in the network, such as who is connected (endpoints, users, and devices), which applications are installed and running on endpoints (for posture assessment), and much more.
41
Cisco SAFE
A framework that helps design secure solutions for the campus, data center, cloud, WAN, branch, and edge.
42
Cisco Secure Client
VPN client that is an 802.1x supplicant that can perform posture validations and that provides web security, network visibility into endpoint flows within Cisco Secure Network Analytics, and roaming protection with Cisco Umbrella.
43
Cisco Secure Email
Cisco solution that enables users to communicate securely via email and helps organizations combat email security threats with a multilayered approach across the attack continuum.
44
Cisco Secure Firewall
next-generation firewall (NGFW) with legacy firewall capabilities such as stateful inspection as well as integrated intrusion prevention, application-level inspection, and techniques to address evolving security threats, such as advanced malware and application- layer attacks.
45
Cisco Secure Malware Analytics
malware sandbox solution.
46
Cisco Secure Network Analytics
Cisco collector and aggregator of network telemetry data (NetFlow data) that performs network security analysis and monitoring to automatically detect threats that manage to infiltrate a network as well as threats that originate within a network.
47
Cisco Secure Web Appliance
An all-in-one web gateway that includes a wide variety of protections that can block advanced threats from both suspicious and legitimate websites.
48
Cisco Talos
The Cisco threat intelligence organization
49
Cisco TrustSec
next-generation access control enforcement solution developed by Cisco that performs network enforcement by using Security Group Tags (SGTs) instead of IP addresses and ports. In SD-Access, Cisco TrustSec Security Group Tags are referred to as Scalable Group Tags.
50
Cisco Umbrella
Cisco solution that blocks requests to malicious Internet destinations (domains, IP addresses, URLs) using Domain Name System (DNS).
51
Client density
The relative number of client devices served by an AP and its antenna, as determined by the antenna’s RF coverage pattern.
52
collision domain
set of devices in a network that can transmit data packets that can collide with other packets sent by other devices (that is, devices that can detect traffic from other devices using CSMA/CD).
53
command-line interface (CLI)
A text-based user interface for configuring network devices individually by inputting configuration commands.
54
Common Spanning Tree (CST)
single spanning-tree instance for the entire network, as defined in the 802.1D standard.
55
configuration BPDU
The BPDU that is responsible for switches electing a root bridge and communicating the root path cost so that a hierarchy can be built.
56
container
isolated environment where containerized applications run. It contains the application along with the dependencies that the application needs to run. It is created by a container engine running a container image.
57
container image
file created by a container engine that includes application code along with its dependencies. Container images become containers when they are run by a container engine.
58
content addressable memory (CAM)
high-performance table used to correlate MAC addresses to switch interfaces that they are attached to.
59
control plane policing (CoPP)
policy applied to the control plane of a router to protect the CPU from high rates of traffic that could impact router stability
60
cookbook
Chef container that holds recipes.
61
core layer
network layer, also known as the backbone, that provides high-speed connectivity between distribution layers in large environments.
62
Datagram Transport Layer Security (DTLS)
communications protocol designed to provide authentication, data integrity, and confidentiality for communications between two applications, over a datagram transport protocol such as User Datagram Protocol (UDP). DTLS is based on TLS, and it includes enhancements such as sequence numbers and retransmission capability to compensate for the unreliable nature of UDP. DTLS is defined in IETF RFC 4347.
63
dBd
dB-dipole, the gain of an antenna, measured in dB, as compared to a simple dipole antenna.
64
dBi
dB-isotropic, the gain of an antenna, measured in dB, as compared to an isotropic reference antenna.
65
dBm
dB-milliwatt, the power level of a signal measured in dB, as compared to a reference signal power of 1 milliwatt.
66
dead interval
The amount of time required for a hello packet to be received for the neighbor to be deemed healthy. Upon receipt, the value resets and decrements toward zero.
67
decibel (dB)
logarithmic function that compares one absolute measurement to another.
68
demodulation
The receiver’s process of interpreting changes in the carrier signal to recover the original information being sent.
69
dipole
An omnidirectional antenna composed of two wire segments.
70
designated port (DP)
network port that receives and forwards BPDUs to other downstream switches.
71
OSPF designated router (DR)
A pseudonode to manage the adjacency state with other routers on the broadcast network segment.
72
DevNet
single place to go to enhance or increase skills with APIs, coding, Python, and even controller concepts.
72
PIM designated router (DR)
Protocol Independent-Sparse Mode (PIM-SM) router that is elected in a LAN segment when multiple PIM-SM routers exist to prevent the sending of duplicate multicast traffic into the LAN or the RP.
73
direct sequence spread spectrum (DSSS)
wireless LAN method in which a transmitter uses a single fixed, wide channel to send data.
73
Differentiated Services Code Point (DSCP)
6-bit field within the DiffServ field that allows for classification of up to 64 values (0 to 63).
73
Differentiated Services (DiffServ)
field that uses the same 8 bits of the IP header that were previously used for the ToS and IPv6 Traffic Class fields. This allows it to be backward compatible with IP Precedence. The DiffServ field is composed of a 6-bit Differentiated Services Code Point (DSCP) field that allows for classification of up to 64 values (0 to 63) and a 2-bit Explicit Congestion Notification (ECN) field.
74
directional antenna
A type of antenna that propagates an RF signal in a narrow range of directions.
75
directly attached static route
static route that defines only the outbound interface for the next-hop device.
76
discontiguous network
OSPF network where Area 0 is not contiguous and generally results in routes not being advertised pervasively through the OSPF routing domain.
77
distance vector routing protocol
protocol that selects the best path based on next hop and hop count. Distance-vector routing protocols use the Bellman–Ford algorithm to calculate the best route Examples: RIP, RIPv2, IGRP, EIGRP
78
distribute list
list used for filtering routes with an ACL for a specific BGP neighbor.
79
distribution layer
network layer that provides an aggregation point for the access layer and acts as a services and control boundary between the access layer and the core layer.
80
downstream
Away from the source of a tree and toward the receivers.
81
downstream interface
interface that is used to forward multicast traffic down the tree, also known as the outgoing interface (OIF).
82
dynamic rate shifting (DRS)
mechanism used by an 802.11 device to change the modulation coding scheme (MCS) according to dynamic RF signal conditions.
83
Dynamic Trunking Protocol (DTP)
protocol that allows for the dynamic negotiation of trunk ports.
84
E plane
“elevation” plane, which passes through an antenna that shows a side view of the radiation pattern.
85
eBGP session
BGP session maintained with BGP peers from a different autonomous system.
86
effective isotropic radiated power (EIRP)
resulting signal power level, measured in dBm, of the combination of a transmitter, cable, and an antenna, as measured at the antenna.
87
egress tunnel router (ETR)
router that de-encapsulates LISP-encapsulated IP packets coming from other sites and destined to EIDs within a LISP site.
88
Embedded Event Manager (EEM)
An on-box automation tool that allows scripts to automatically execute, based on the output of an action or an event on a device.
89
embedded WLC deployment
wireless network design that places a WLC in the access layer, co-located with a LAN switch stack, near the APs it controls.
90
endpoint
device that connects to a network, such as a laptop, tablet, IP phone, personal computer (PC), or Internet of Things (IoT) device.
91
endpoint identifier (EID)
The IP address of an endpoint within a LISP site.
92
enhanced distance vector routing protocol
routing protocol that selects the best path based on next hop, hop count, and other metrics, such as bandwidth and delay.
93
equal-cost multipathing
installation of multiple best paths from the same routing protocol with the same metric that allows for load-balancing of traffic across the paths.
94
ERSPAN
Encapsulated Remote Switched Port Analyzer, a tool for capturing network traffic on a remote device and sending the traffic to the local system via Layer 3 (routing) toward a local port that would be attached to some sort of traffic analyzer.
95
EtherChannel bundle
logical interface that consists of physical member links to increase a link’s bandwidth while preventing forwarding loops.
96
Extensible Authentication Protocol (EAP)
standardized authentication framework defined by RFC 4187 that provides encapsulated transport for authentication parameters.
97
Extensible Markup Language (XML)
human-readable data format that is commonly used with web services.
98
feasibility condition
an EIGRP condition under which, for a route to be considered a backup route, the reported distance received for that route must be less than the feasible distance calculated locally. This logic guarantees a loop-free path.
99
feasibility successor
an EIGRP route that satisfies the feasibility condition and is maintained as a backup route.
100
feasible distance
an EIGRP metric value for the lowest-metric path to reach a destination
101
Firepower Threat Defense (FTD) software image
single unified image in which the ASA software image and the Cisco Secure IPS image are merged. It is supported on all Cisco Secure Firewall and ASA 5500-X appliances (except the 5585-X).
102
first-hop redundancy protocol
protocol that creates a virtual IP address on a router or a multilayer device to ensure continuous access to a gateway when there are redundant devices.
103
first-hop router (FHR)
router that is directly attached to the source, also known as the root router. It is responsible for sending register messages to the RP.
104
floating static route
static route with an elevated AD so that it is used only as a backup in the event that a routing protocol fails or a lower-AD static route is removed from the RIB.
105
foreign controller
The current controller that a client is associated with after a Layer 3 intercontroller roam. Traffic is tunneled from the foreign controller back to an anchor controller so that the client retains connectivity to its original VLAN and subnet.
106
forward delay
amount of time that a port stays in a listening and learning state.
107
Forwarding Information Base (FIB)
The hardware programming of a forwarding table. The FIB uses the RIB for programming.
108
frequency
The number of times a signal makes one complete up and down cycle in 1 second.
109
fully specified static route
A static route that specifies the next-hop IP address and the outbound interface.
110
gain
A measure of how effectively an antenna can focus RF energy in a certain direction.
111
GitHub
An efficient and commonly adopted way of using version control for code and sharing code repositories.
112
grain
In SaltStack, code that runs on nodes to gather system information and report back to the master.
113
H plane
The “azimuth” plane, which passes through an antenna that shows a top-down view of the radiation pattern.
114
hello interval
The frequency at which hello packets are advertised out an interface.
115
hello packets
Packets that are sent out at periodic intervals to detect neighbors for establishing adjacency and ensuring that neighbors are still available.
116
hello time
The time interval for which a BPDU is advertised out of a port.
117
hello timer
The amount of time between the advertisement of hello packets and when they are sent out an interface.
118
hertz (Hz)
A unit of frequency equaling one cycle per second.
119
host pool
The IP subnet, SVI, and VRF information assigned to a group of hosts that share the same policies.
120
hypervisor
Virtualization software that creates VMs and performs the hardware abstraction that allows multiple VMs to run concurrently.
121
iBGP session
A BGP session maintained with BGP peers from the same autonomous system.
122
IGMP snooping
A mechanism to prevent multicast flooding on a Layer 2 switch.
123
in phase
The condition when the cycles of two identical signals are in sync with each other.
124
incoming interface (IIF)
The only type of interface that can accept multicast traffic coming from the source. It is the same as the RPF interface.
125
ingress tunnel router (ITR)
A router that LISP-encapsulates IP packets coming from EIDs that are destined outside the LISP site.
126
inside global
The public IP address that represents one or more inside local IP addresses to the outside.
127
inside local
The actual private IP address assigned to a device on the inside network(s).
128
integrated antenna
very small omnidirectional antenna that is set inside a device’s outer case.
129
inter-area route
An OSPF route learned from an ABR from another area. These routes are built based on type 3 LSAs.
130
intercontroller roaming
Client roaming that occurs between two APs that are joined to two different controllers.
131
interface priority
The reference value for an interface to determine preference for being elected as the designated router.
132
internal spanning tree (IST)
The first MSTI in the MST protocol. The IST is responsible for building a CST across all VLANs, regardless of their VLAN membership. The IST contains advertisements for other MSTIs in its BPDUs.
133
Internet Group Management Protocol (IGMP)
The protocol used by receivers to join multicast groups and start receiving traffic from those groups.
134
Internet Key Exchange (IKE)
A protocol that performs authentication between two endpoints to establish security associations (SAs), also known as IKE tunnels. IKE is the implementation of ISAKMP using the Oakley and Skeme key exchange techniques.
135
Internet Protocol Security (IPsec)
A framework of open standards for creating highly secure VPNs using various protocols and technologies for secure communication across unsecure networks such as the Internet.
136
Internet Security Association and Key Management Protocol (ISAKMP)
A framework for authentication and key exchange between two peers to establish, modify, and tear down SAs that is designed to support many different kinds of key exchanges. ISAKMP uses UDP port 500 to communicate between peers.
137
intra-area route
An OSPF route learned from a router within the same area. These routes are built based on type 1 and type 2 LSAs.
138
intracontroller roaming
Client roaming that occurs between two APs joined to the same controller.
139
IP SLA
An on-box diagnostic tool that executes probes to monitor network devices and application performance.
140
isotropic antenna
An ideal, theoretical antenna that radiates RF equally in every direction.
141
JavaScript Object Notation (JSON)
Notation used to store data in key/value pairs that is said to be easier to work with and read than XML.
142
K values
Values that EIGRP uses to calculate the best path.
143
LACP interface priority
An attribute assigned to a switch port on an LACP primary switch to identify which member links are used when there is a maximum link.
144
LACP system priority
An attribute in an LACP packet that provides priority to one switch over another to control which links are used when there is a maximum link.
145
last-hop router (LHR)
A router that is directly attached to the receivers, also known as a leaf router. It is responsible for sending PIM joins upstream toward the RP or to the source after an SPT switchover.
146
Layer 2 forwarding
The forwarding of packets based on the packets’ destination Layer 2 addresses, such as MAC addresses.
147
Layer 2 roam
An intercontroller roam where the WLANs of the two controllers are configured for the same Layer 2 VLAN ID; also known as a local-to-local roam.
148
Layer 3 forwarding
The forwarding of packets based on the packets’ destination IP addresses.
149
Layer 3 roam
An intercontroller roam where the WLANs of the two controllers are configured for different VLAN IDs; also known as a local-to-foreign roam. To support the roaming client, a tunnel is built between the controllers so that client data can pass between the client’s current controller and its original controller.
150
lightweight AP
A wireless AP that performs real-time 802.11 functions to interface with wireless clients, while relying on a wireless LAN controller to handle all management functions.
151
link budget
The cumulative sum of gains and losses measured in dB over the complete RF signal path; a transmitter’s power level must overcome the link budget so that the signal can reach a receiver effectively.
152
link-state routing protocol
A routing protocol that contains a complete view of the topology, where every router can calculate the best path based on its copy of the topology. Examples: OSPF, IS-IS
153
LISP router
router that performs the functions of any or all of the following: ITR, ETR, PITR, and/or PETR.
154
LISP site
A site where LISP routers and EIDs reside.
155
load-balancing hash
An algorithm for balancing network traffic across member links.
156
Loc-RIB table
The main BGP table that contains all the active BGP prefixes and path attributes that is used to select the best path and install routes into the RIB.
157
local bridge identifier
A combination of the advertising switch’s bridge system MAC, the system ID extension, and the system priority of the local bridge.
158
local mode
The default mode of a Cisco lightweight AP that offers one or more functioning BSSs on a specific channel.
159
Locator/ID Separation Protocol (LISP)
routing architecture and data and control plane protocol that was created to address routing scalability problems on large networks.
160
MAC address table
A table on a switch that identifies the switch port and VLAN with which a MAC address is associated for Layer 2 forwarding.
161