COMPREHENSIVE TEST SCRIPT 2026
SOLUTIONS VERIFIED
◉ AAA Server. Answer: Server providing authentication,
authorization and accounting services
◉ Access Control Entry (ACE). Answer: One line in an access control
list (ACL)
◉ access interface. Answer: A LAN network design term that refers
to a switch interface connected to end-user devices
◉ access layer. Answer: In a Campus LAN design, the switches that
connect directly to end-point devices
◉ access link (WAN). Answer: A physical link between a service
provider and its customer
◉ access rate. Answer: The speed at which bits are sent over an
access link
◉ accounting. Answer: In security, the recording of access attempts
,◉ ACI. Answer: Application Centric Infrastructure
◉ ACL. Answer: Access Control List
◉ Active Directory. Answer: A popular set of identity and directory
services from Microsoft, used in part to authenticate users
◉ administrative distance. Answer: In Cisco routers, a means for one
router to choose between multiple routes to reach the same subnet
when those routes are learned by different routing protocols.
◉ agent. Answer: Generally, an additional software process or
component running in a computing device for some specific purpose
◉ agent-based architecture. Answer: An architecture that uses a
software agent inside the device being managed
◉ agentless architecture. Answer: An architecture that does not
need a software agent
◉ amplification attack. Answer: A reflection attack that leverages a
service on the reflector to generate and reflect huge volumes of reply
traffic to the victim
,◉ Ansible. Answer: A popular configuration management
application
◉ Ansible inventory. Answer: Device host names along with
information about each device
◉ Ansible playbook. Answer: Files with actions and logic about what
Ansible should do
◉ anti-replay. Answer: Preventing a man in the middle from copying
and later replaying the packets sent by a legitimate user, for the
purpose of appearing to be a legitimate user
◉ antivirus. Answer: Software that monitors files transferred by any
means, to look for content that can be used to place a virus into the
computer
◉ APIC. Answer: Application Policy Infrastructure Controller
◉ APIC-EM. Answer: Application Policy Infrastructure Controller -
Enterprise Module
, ◉ Application Centric Infrastructure (ACI). Answer: Cisco's data
center SDN solution
◉ Application Policy Infrastructure Controller - Enterprise Module
(APIC-EM). Answer: The software that plays the role of controller in
an enterprise network of Cisco devices
◉ application programming interface (API). Answer: A software
mechanism that enables software components to communicate with
each other
◉ application signature. Answer: With Network Based Application
Recognition (NBAR), the definition of a combination of matchable
fields that identify as characteristics of a specific application
◉ Application Visibility and Control (AVC). Answer: A firewall device
with advance features (IPS, malware detection, VPN termination,
etc.)
◉ application-specific integrated circuit (ASIC). Answer: An
integrated circuit (chip) designed for a specific purpose of
application.
◉ AR. Answer: Access Rate