Part 1 - Networking Interview Questions (Basic) : Q1) Explain The Seven Layers of The OSI Reference Model
Part 1 - Networking Interview Questions (Basic) : Q1) Explain The Seven Layers of The OSI Reference Model
This first part covers basic Networking Interview Questions and Answers.
Physical Layer: This layer converts data bits into radio signals. An
Data Link layer: At data link layer data packets are encoded and
Network Layer: This layer transfers variable length data from one node
Transport Layer: This layer transfers data between different nodes and
Application Layer: This is the last layer which both end user and
application interact with. This layer provides services like email, file
transfer, etc.
DNS stands for Domain Name System. It is a naming system which includes
physical nodes and its applications. DNS is a way of finding a resource easily
used by a person.
This cable can either be straight or crossover. Both these cables have different
arrangements which are required for different purposes. A straight cable can
outside the network. A firewall also works when you want to limit access to
network or going to a network have to pass through this firewall. Firewalls are
examined by security criteria and the messages which meet these criteria are
passed through the network. If the message does not fulfill the criteria then
the message is blocked and not sent to the network further. Firewalls can be
installed like any software and can be later customized as per needs for
Part 1 – CCNA Interview Questions (Basic)
Q1. What do you mean by Routing?
Answer:
Routing basically means the movement or transfer of information across the network.
The selected network can be either of two – inter or intra. There is always a source and a
destination needed for routing to take place. Routers are a dedicated device for the
process of routing to happen. The routers are nothing but the network layer device.
This is the basic CCNA Interview Questions asked in an interview. Routers are generally
share data, related resources like a printer, fax. There are 3 types of a network via LAN,
Topology refers to the pattern or layout of connection between the available network
system called as “hub”. The hub is either a switch or router. The good part about
this type of topology is that if the failure happened in any network then only that
part is affected and not the entire. On contrary, if the hub failed then entire
Ring Topology: Here every system has exactly two neighbors or connections for
damage the entire loop and take down the entire network.
This topology architect is of this kind. There is a common connection for all the
request to the desired device. Others can see the request, but the intended
Here only the hub devices can connect to the tree-bus network.
If the communication id bi-directional or both the directions then it’s a full-duplex and if
Layer 1 – Physical
Layer 3 – Network
Layer 4 – Transport
Layer 5 – Session
Layer 6 – Presentation
Layer 7 – Application
A Switch is used to receive the signal to create a frame. It forwards the packets between
various LAN segments. It is the platform for packet control when the data is sent at a
Data Link layer or Network layer of the OSI model. It supports a single broadcast
The router is a networking gateway device that is used to forward data packets to the
computer networks. A router is connected by at least a single LAN with its IP address or
In the hub, if anything comes in its port then it sends it out to the others. It is less
expensive and least complicated. It has a single collision domain and a single broadcast
domain.
This is the most popular CCNA Interview Questions asked in an interview. There are two
types of network:
Peer-to-Peer network
Server-based network
MAC address is Media Access Control address. It is stored in ROM and is uniquely
defined. It is identified as the Media Access Control layer in the network architecture.
Broadcast Domain
In the Broadcast Domain, all the juncture can reach each other by broadcast at the data
link layer and every device is ready to receive their respective data. It can bind to the
While broadcasting, massive data are broadcasted, hence the speed of receiving the
data is less and it also takes more time to receive the data of their address.
Collision Domain
In the Collision Domain, data collision occurs more due to sending of more frames
simultaneously.
If more than two frames are sent simultaneously then the data will collide with each
other in between and the information gets lost due to an occurrence of a collision and
the devices will not accept the data and due to this, the communication between the
Hence, the sender has to send the data again and like this, it will take more time to
Part 2 – Networking Interview Questions
(Advanced)
Q6) What is a proxy server and how to protect it?
Answer:
Proxy servers are servers that prevent external users who are not authorized to
access an IP address from accessing it. When data transmission comes into
picture IP addresses are required and so are DNS which route the correct IP
address to the domain name. Proxy servers also maintain the list of all
blacklisted websites so that all internal users are automatically prevented from
The IP address 127.0.0.1 is reserved for localhost connections. These local host
networks are reserved for biggest customers or some very important people
on the internet. To check whether the local host server is working fine you
must ping the server and check for its response. If it is not responsible then
the reason can be that the server is down or the network card is not in good
condition. 127.0.0.1 is a loopback connection and if you get a response for this
All three are terminologies of a how a network can be accessed. They define
the access levels for each user which is present inside and outside the
network.
Intranet: It limits access for users in the same organization. All users
the job of forwarding the data packets from one network to another and
Part 1 – CCNA Interview Questions (Basic)
Q1. What do you mean by Routing?
Answer:
Routing basically means the movement or transfer of information across the network.
The selected network can be either of two – inter or intra. There is always a source and a
destination needed for routing to take place. Routers are a dedicated device for the
process of routing to happen. The routers are nothing but the network layer device.
Q2. Briefly explain how Routers are classified?
Answer:
This is the basic CCNA Interview Questions asked in an interview. Routers are generally
connection of 2 or more computers (or devices). The connection must enable features to
share data, related resources like a printer, fax. There are 3 types of a network via LAN,
Topology refers to the pattern or layout of connection between the available network
system called as “hub”. The hub is either a switch or router. The good part about
this type of topology is that if the failure happened in any network then only that
part is affected and not the entire. On contrary, if the hub failed then entire
Ring Topology: Here every system has exactly two neighbors or connections for
These are generally preferred in colleges or schools. A failure in one network can
damage the entire loop and take down the entire network.
This topology architect is of this kind. There is a common connection for all the
request to the desired device. Others can see the request, but the intended
Here only the hub devices can connect to the tree-bus network.
Part 2 – CCNA Interview Questions (Advance
Q6. What does Half-duplex and Full-duplex means?
Answer:
If the communication id bi-directional or both the directions then it’s a full-duplex and if
Layer 1 – Physical
Layer 3 – Network
Layer 4 – Transport
Layer 5 – Session
Layer 6 – Presentation
Layer 7 – Application
A Switch is used to receive the signal to create a frame. It forwards the packets between
various LAN segments. It is the platform for packet control when the data is sent at a
Data Link layer or Network layer of the OSI model. It supports a single broadcast
The router is a networking gateway device that is used to forward data packets to the
computer networks. A router is connected by at least a single LAN with its IP address or
In the hub, if anything comes in its port then it sends it out to the others. It is less
expensive and least complicated. It has a single collision domain and a single broadcast
domain.
Q9. What are the different types of network in CCNA?
Answer:
This is the most popular CCNA Interview Questions asked in an interview. There are two
types of network:
Peer-to-Peer network
Server-based network
MAC address is Media Access Control address. It is stored in ROM and is uniquely
defined. It is identified as the Media Access Control layer in the network architecture.
Broadcast Domain
In the Broadcast Domain, all the juncture can reach each other by broadcast at the data
link layer and every device is ready to receive their respective data. It can bind to the
Broadcast Domain uses local network for broadcasting the data packets to the receiver.
While broadcasting, massive data are broadcasted, hence the speed of receiving the
data is less and it also takes more time to receive the data of their address.
Collision Domain
In the Collision Domain, data collision occurs more due to sending of more frames
simultaneously.
If more than two frames are sent simultaneously then the data will collide with each
other in between and the information gets lost due to an occurrence of a collision and
the devices will not accept the data and due to this, the communication between the
Hence, the sender has to send the data again and like this, it will take more time to
Set of devices connected to each other over the physical medium is known as a
A network topology is a physical structure of the network which defines how the
A router is a device which is responsible for sending data from source to destination
OSI model stands for Open System Interconnection. It’s a reference model which
describes that how different applications will communicate to each other over the
computer network.
Datalink Layer Data packet will be encoded and decoded into bits.
Application Layer An end user will interact with the Application layer.
Hub: Hub will broadcast all data to every port. It has a common connection point
Switch: Switch will create the dynamic connection and provide information to the
requesting port.
Router: Router is the devices which will be responsible for forwarding data
packets.
TCP/IP stands for Transmission control protocol and Internet protocol. It describes how
the data will get transmitted and routed from end to end communication.
Q9. Explain the different Layers of TCP/IP Model.
Answer:
Application Layer, Transport Layer, Network or Internet Layer, Network interface layer.
HTTP stands for Hyper Text Transfer Protocol and the port for this is 80. This protocol
TCP stands for Transfer control protocol and UDP stands for User Datagrams
protocol.
Answer:
DNS Stands for Domain Name System. It’s an internet address mapping process with
Proxy server prevents the external users which are unauthorized to access the network.
NIC stands for Network interface card. It is an adapter that will be installed on the
computer and because of that NIC, only that computer will interact with the network.
SLIP stands for Serial Line Interface Protocol. It is used for sending IP datagram over a
Timings: Explain the timing that how fast the data can be sent.
A decoder is a program which converts the encrypted data into its actual format.
Q22. What is the role of IEEE in the world of computer
network?
Answer:
IEEE full form is the Institute of Electrical and electronic Engineer which is used to define
and develop the standards which will be used over the network.
Here are some windows networking commands which are explained below
with examples
1. Ping
It is used detecting devices on network and troubleshooting network
problems. It will help to see the connection between your device and another
device on the network. If we receive a reply from the device then the device is
hostname. We have searched for the Amazon website. 0% data loss while
sending the number of packages. Success result is present n round trip times
in milliseconds.
2. Ipconfig
It will find network information local devices like IP Address and
default gateway.
We can see the above information. You can see Media State as Media
3. Ipconfig/release
Gives current IP address but if we are not connected to the Wi-Fi and media is
6. getmac
It will give you the MAC address of the network interface. People might use
this to control which device can connect to the network. Each device has a
7. Tracert
when we face any network issue and to troubleshoot this issue Traceroute will
send that is the route of the packet from server to server as hope. It will show
a delay between user and hop. The IP address of the hop will be shown.
You can see three latency reading per hop is there because tracert will send 3
packets per hop but if any of the latency gets lost then it will not show correct
image. You can see hat latency is not given that is the reason request time out.
8. nslookup
It stands for name server lookup. When we want to know the IP address of the
domain we can use this command. Fact is if we run this command over and
over, we will get different IP addresses for a website like google, yahoo,
Flipkart because these domains have spread to different machines. You can
see in the below image IP address is different for the same domain name.
the first IP address is: 13.227.188.78
we can find out the domain name with the help of IP address by entering the
IP address in the web browser and see where it leads to. Success ratio to this is
not 100% because not all IP addresses will show the domain name and they
huge college campus network, then this tool is useful because it provides an
By running this command, will show the number of active connections on the
system. The active connection is about port (TCP) is open and ready to accept
TIME_WAIT (can see in the above image)- local endpoint (your system) has
adapter on the system because it provides plenty of context within the shell-
Q1) How do configure a cisco router to route ipx?
Answer:To initial things to enable ipx routing using by ipx routing protocol.
Answer:
Standard
Extended
Q3)What is subnetting?
Answer:A layered network offers of many advantages. Allow the administartors to make the change
Answer:
Answer:
Using dotted-deciaml
Using binary
Using hexadeciaml
Q10)Expand of HDLC?
Q11)What is Bandwidth?
Answer:To refer the transmission capacity of a medium. will measure how much of volume a
transmission channel.
Answer:
Answer:Segments are section of a data stream that comes from the upper OSI layers.
Answer:
Q17)Expand DLCI?
Secret
virtual
Terminal
Console
Auxillary
Answer:Segmenting a network would help network traffic and ensures that high bandwith.
Q20)How do access the identifying the router information?
Answer:
Answer:To use computer networking protocol use to deploy an ip address to network devices from a
configuration.
Answer:
Class a: 10.0.0.0-10.0.0.255
Class b:172.16.0.0-172.31.0.0
Class c:192.168.0.0-192.168.0.255
Answer:
Telnet
Aux
Console
Q26)Mention the matric of eigrp protocol?
Answer:
Bandwidth
Load
Delay
Reliability
Mtu
Answer:Ctrl+shift+F6 and x.
became a invalid.
Q31)Define DMZ?
Answer:
Answer:0.0.0.255
Answer:255.255.0.0
Q40)Expand BGP?
Answer:
Answer:Physical layer
Answer:
Distance vector
Link-state
Balanced hybrid
Q48)What is ad of extended EIGPR?
Answer:Ad= 170
Answer:Will check the next hop attributes to determine next hop is accessible.
Answer:Rip broadcast its routing table after reach 30 sec OSPF only entries the update of missing
Answer: Network all in all terms implies a gathering of gadgets, associated with the assistance of a
few media so as to share a few assets from a source to a goal and networking is a procedure of
Answer: Directions connected on client mode can’t impact the switch while a few directions of benefit
mode can change the arrangements. In client mode, no setup can be made. We can just check the
reachability and some essential directions in that mode. While in Privilege mode we can spare,
gadgets.
transmit the most extreme measure of information starting with one point then onto the next over a
Answer: Communicate area is where if a communicated edge is sent, each gadget focuses and gets
the information. While in Collision area, odds of information crash is greatest. Like in Hub , if at least
two send traffic in the meantime, information will crash in the middle of and none of the gadgets will
Answer: In a network, flooding is the sending by a switch of a parcel from any hub to each other hub
connected to the switch with the exception of the hub from which the bundle arrived. Flooding is an
approach to disseminate directing data refreshes rapidly to each hub in a substantial network.
Answer: A network convention that enables a client on one PC to sign onto another PC .it utilizes
printer or any sort of gadget that is equipped for sending and getting the information over the
network.
Answer: A wide area network (WAN) is a network that exists over a vast scale land area. A WAN
associates diverse littler networks, including neighborhood (LANs) and metro area networks (MANs).
This guarantees PCs and clients in a single area can speak with PCs and clients in different areas..
Answer: In Cut-Through LAN exchanging, when the switch gets the information outline, it will
promptly send it out again and forward it to the following network portion in the wake of perusing the
goal address.
Answer: An association between two hubs of the system is alluded as point to point organize and
that interface which associates the two hubs is point to point connect. Point-to-point convention is
generally utilized for the heavier and quicker connections essential for broadband correspondences.
Answer: A virtual private system (VPN) expands a private system over an open system, and
empowers clients to send and get information crosswise over shared or open systems as though
their processing gadgets were specifically related with the private system. Applications running over
the VPN may Therefore profit by the usefulness, security, and the executives of the private system.
starting with one assigned point then onto the next. In a few conditions idleness is estimated by
sending a parcel that is come back to the sender; the round-trip time is viewed as the dormancy.
Answer: With the assistance of subnetting we can break a huge system into littler systems and allot
IP delivers to those systems without changing our significant system. It helps in using our IP tends to
Answer: BGP is an outside entryway convention used to interface at least two diverse independent
frameworks. It is broadly being utilized to course the traffic of Internet. It can likewise work for inner
AS yet we have better conventions for inside network. It has Administrative separation of 20 for outer
demonstration like a solitary framework and empower high accessibility and, now and again, stack
Answer: DOS (Disk Operating System) is a working framework that keeps running from a hard plate
drive. The term can likewise allude to a specific group of circle working frameworks, most generally
help workstation, PC, and, in a few occasions, more seasoned terminal that are associated on a
neighborhood (LAN).
Answer: Gateway-to-Gateway convention is currently out of date. This was being utilized for steering
Answer: On the off chance that one workstation on the system endures a glitch, it can cut down the
whole system. Another downside is that when there are modifications and reconfigurations should
have been performed on a specific piece of the system, the whole system must be briefly brought
down also.
Answer: Multi-homed have is characterized as a hub associated with more than one systems. Like a
PC can be associated with both Home system and a VPN. These sort of hosts can be doled out with
Answer: OSPF represents Open Shortest Path First. It is a connection state directing convention that
can associate an expansive number of systems without having any confinement to number of jumps.
It utilizes Dijkstra Algorithm and thinks about Cost as its measurement. It has AD of 110 and
utilizations the ideas of Areas, Router-id, Process-id and Virtual connection for availability.
directing it is difficult to associate at least two systems situated at various or same land territories.
Answer: Convention is set of guidelines on which a sender and a beneficiary consents to transmit
the information. Conventions are in charge of information correspondence in the middle of systems
Answer: Edge transfer is a bundle exchanging media transmission benefit intended for cost-
proficient information transmission for discontinuous traffic between neighborhood (LANs) and
Switches bolster full duplex information exchange correspondence. As layer 2 conventions headers
have no data about system of information parcel so switches can’t forward information based or
arranges and that is the reason switches can’t be utilized with vast systems that are partitioned in
sub systems.
Switches can stay away from circles using spreading over tree convention. Switches can have 24-48
ports and can be for all intents and purposes boundless ports since they don’t partition speed
dissimilar to Hubs.
Switches
Switches are the system gadgets that work at Layer-3 of OSI demonstrate.
As layer-3 conventions approach legitimate location (IP addresses) so switches have the ability to
Switches are typically utilized as a sending system components in Wide Area Networks.
incentive as per the quantity of set or disconnected bits in a message and sends it alongside each
message outline. At the collector end, a similar checksum work (recipe) is connected to the message
edge to recover the numerical esteem. On the off chance that the got checksum esteem coordinates
the sent esteem, the transmission is viewed as fruitful and mistake free. A checksum may likewise
Answer: Excess is a strategy for safeguarding system accessibility if there should be an occurrence
of system or way disappointment. For the most part alluded as reinforcement ways in a systems.
Answer: Multicast IP Routing conventions are utilized to appropriate information (for instance,
send a solitary duplicate of information to a solitary multicast address, which is then dispersed to a
Q79) What are the criteria essential for a compelling and productive
system?
Answer:
Execution
It can be estimated from numerous points of view, including transmit time and reaction time.
Dependability
Security
Security issues incorporate shielding information from unapproved access and infection
Answer: Switch doesn’t communicate on every one of the ports. They can be overseen and vlans
taxi be made. They are quick, can store MAC addresses. They additionally don’t isolate the speed
on every port.
The principle favorable position of utilizing switches is that each switch port has its very own impact
space which expels the occurance of crash of casings. It advances the bundles dependent on the
goal address, along these lines eleminating superfluous sending of parcels to all ports as in center
points.
Answer: Clog happens when transfer speed is lacking and arrange information traffic surpasses
limit.
Q82) Does a bridge divide a network into smaller segments?
Answer: No, What an extension really does is to take the huge system and channel it, without
Answer: Control over Ethernet or PoE pass electric power alongside information on contorted match
Ethernet cabling. This enables a solitary link to give the two information association and electric
capacity to gadgets, for example, remote passageways, IP cameras, and VoIP telephones. It limits
crosswise over various areas share PC preparing capacity. This is rather than a solitary, brought
together server overseeing and giving handling ability to every associated framework. PCs that
involve the appropriated information handling system are situated at various areas yet
Q87) When were OSI show created and why its standard called 802.XX,
etc?
Answer: OSI display was created in February1980 that why these additionally known as802.XX
Answer: Means “Shared.” In a P2P arrange, the “peers” are PC frameworks which are associated
with one another by means of the Internet. Documents can be shared specifically between
frameworks on the system without the need of a focal server. At the end of the day, every PC on a
Answer: Ping is an utility used to test the availability in the system. It represents Packet Internet
Answer: Steady SPF is more proficient than the full SPF calculation, in this manner permitting OSPF
to meet quicker on another steering topology in response to a system occasion. The steady SPF is
structured so that it just updates the influenced hubs without revamping the entire tree. This
outcomes in a quicker combination and spares CPU cycles on the grounds that the unaffected hubs
don’t should be prepared. Concerning the best practice ISPF would have to a greater extent an
Gradual SPF gives more prominent enhancements in combination time for systems with a high
number of hubs and connections. Gradual SPF additionally gives a huge preferred standpoint when
the adjustments in the system topology are further far from the foundation of the SPT; for instance,
the bigger the system the more critical the effect. A fragment of 400-1000 hubs should see
upgrades. In any case, it may be difficult to confirm in a sent generation arrange without some sort of
office or instrument to gauge the start to finish delay. For more data, allude to OSPF Incremental
SPF.
Answer: The OSPF Shortest Path First Throttling highlight makes it conceivable to design SPF
planning for millisecond interims and to possibly postpone SPF estimations amid system insecurity.
SPF is planned to figure the Shortest Path Tree (SPT) when there is an adjustment in topology.
Where:
spf-begin—Initial postponement to plan a SPF count after a change, in milliseconds. Range is from 1
to 600000.
spf-hold—Minimum hold time between two back to back SPF computations, in milliseconds. Range
is from 1 to 600000.
Answer: OSPF sends all notices utilizing multicast tending to. Aside from Token Ring, the multicast
IP delivers are mapped to MAC-level multicast addresses. Cisco maps Token Ring to MAC-level
communicate addresses.
Answer: Cisco OSPF just backings TOS 0. This implies switches course all parcels on the TOS 0
Answer: The counterbalance list direction does not work for OSPF. It is utilized for separation vector
conventions, for example, Interior Gateway Routing Protocol (IGRP), Routing Information Protocol
Answer: OSPF creates a default just on the off chance that it is arranged utilizing the direction
default-data begin and if there is a default organize in the case from an alternate procedure. The
default course in OSPF is 0.0.0.0. In the event that you need an OSPF-empowered switch to create
a default course regardless of whether it doesn’t have a default course itself, utilize the direction
Q98) When I issue the show ip ospf neighbor order, for what reason do I
just observe FULL/DR and FULL/BDR, with every single other neighbor
demonstrating 2-WAY/DROTHER?
Answer: To decrease the measure of flooding on communicate media, for example, Ethernet, FDDI,
and Token Ring, the switch turns out to be full with just assigned switch (DR) and reinforcement
assigned switch (BDR), and it demonstrates 2-WAY for every single other switch.
Preferred standpoint: Lower cost, unwavering quality, enhanced execution, diminished handling
Answer: This message is identified with the DBD trade process, which utilizes a grouping number for
the synchronization of the database. For reasons unknown an awful grouping number was
accounted for in the DBD parcel. This may happen as a result of transient conditions, which
Answer: TCP is reliable protocol and UDP is unreliable protocol. In general TCP give reliability and
acknowledgement for packet delivered while UDP does not provide acknowledgement.
Answer: we have 7 layers in OSI Model ( application , presentation, session, transport, network, data
, physical). Upeer layes are grouped as ( application , presentation, session) middle layer network
Answer: We have 4 layers in TCP protocol. Taken reference from Osi model. Names as
Answer: Physical layer convert electrical signal into binary form as 1 or 0. This is sort of physical
Answer: Here Physcial address of device is called as Mac address received from device. It provide
Answer: It Provide unique identifier in term of ip address as to enable communication between two
Answer: Transport layer provides two type of facility as TCP or UDP port. A per reqirement of
Answer: It provide Facility to Recived data from application to encrypt or decrypt the data. It provide
Answer: We user send some request if everyone is listening then it is term as broadcast domain.
Every user will get packet but only specific user is able to reply to request.
Answer: Collision domain mean we use Network in which data transmission and receiving
happening at same time. Packet get corrpted. This technology maily used in Hub devices.
Answer: When we are doing either transmission or receiving then it is called half duplex while full
duplex means that when transmission and receiving happens on same time
Answer: Vlan is a virtual Lan. In layman language it is switch inside switch. We segregate our switch
port into different Vlan to divide single broad cast domain into different broadcast domain.
Answer: We can communicate between two Vlan with the help of Router. Without router we can’t do
Answer: By default all port of switch is part of native vlan. By-default Native is 1.
Answer: Purpose to create different vlan is to separate single broadcast domain into many different
broadcast domain. Link we can make four port part of engineering deptt or 4 port of IT depptt.
Answer: VTP is vlan tracking protocol. We generally create vlan on server and all created vlan
replicate to client.
1. Server
2. Transparent
3. Client.
Answer: No , Transparent does not participate in VTP process. But it passes the vlaan information to
Answer: Vlan.dat file contain all information of created vlan. If we delete vlan.dat file from Device
Answer: Spanning tree protocol is used to avoid loop in switching environment. By this mechanism
Blocking
Listening
Learning
Forwarding
Answer: STP elect Root bridge based on Priority and mac address. Lower the priority wins the race.
If we have same priority configured then we have other option as MAC address as tie breaker.
Answer: All prot on Root bridge is called Designated port. Which send BPDU from Root bridge.
While port directly connected to other switch is root port. It Receive BPDU sent by Root bridge.
Answer: Rapid spanning tree protocol I advance version of STP. As STP converge time I too low. As
Answer: It is common spanning tree protocol. It create one instance of spanning tree.
Answer: Per-vlan spanning tree protocol. We can utilized our Distribution router by creating per vlan
Answer: RIP stand for Routing information protocol. It is classfull protocol as it send complete
routing table every 30 min. It have 2 version. RIP ver 1 and RIP ver 2. IT is outdated protocol.
Answer: Eigrp stands for Enhanced interior gateway protocol. IT have both distance vector and link
AREA type
Area
Network
Authentication
hello/dead interval
Answer: Area 0 in Ospf I called as Backbone area as to avoid loop mechanism every are must pass
Answer: ABR is Area boarder router and ASBR is autonomus system boarder router.
Answer:
Unicast mean one way communication. Device A sending packet to device B.
Confg #Login
Answer: Internet
Answer: 0.0.9
Answer: 15
Q157) Once how many seconds EIGRP WAN interfaces sends Hello?
Answer: 60
Answer: 5
Answer: 90
Answer: OSPF
Answer: No
Q165) What is the protocol used by network devices to find out the MAC
address of neighboring devices?
Answer: ARP
Answer: VLAN 1
Answer: NVRAM
Answer: Yes
Q174) Which layer in the OSI stack does the DHCP belong to?
Answer: CDP
Q177) What is the command to view the contents of the flash memory?
Q178) How do you check the IOS version running on a Cisco device?
Q179) What are the three packets which make up the 3-way handshake
process?
Answer: 48
Q182) How do you find the MAC address of a computer?
Answer: Class C
Q186) What are the different protocols http uses for encryption?
Answer: 21
Answer: UDP 69
Answer: 20 bytes
Q191) To which layer does the NetBIOS protocol belong to is the OSI
model?
Answer: Socket
Answer: FF:FF:FF:FF:FF:FF:FF:FF
Q195) What are the port numbers the DHCP server uses?
Answer: FE80::/10
machine via seven types of layer. These seven types of layers are:
Answer: Switch can pass single broadcast domain whereas router can pass Multicast or Unicast
Answer: The main reason for having a subnet mask in Networking is to avoid IP wastage in the
Network.
Answer: Ethernet Channel increases the bandwidth which is done by combining the links. PAGP
FROM TO
0.0.0.0 127.255.255.255
128.0.0.0 191.255.255.255
192.0.0.0 223.255.255.255
224.0.0.0 239.255.255.255
240.0.0.0 247.255.255.255
248.0.0.0 251.255.255.255
252.0.0.0 255.255.255.255
Q206) What is Private address range and Class?
Answer:
multiple broadcasts.
Answer: VTP can be used for transferring VLAN information from one switch to other switches.
1. VTP v1
2. VTP v2
3. VTP v3
Q211) What is the difference between VTP Version 1, VTP version 2 and
VTP version 3?
Answer: VTP version 2 is same as VTP version 1 only difference comes with the support of Token
Ring Topology. VTP Version 3 can support Extended VLAN 0-4094, Private VLAN, and MSTP.
Answer: Revision number is used for changing or editing in the VLAN, it will be incremented by 1.
For the security reason while adding new switches we should always check the revision number.
Answer: The various states in STP are Listening, Learning, Forwarding, Blocking and Disable.
Answer: Best path to reach from Root bridge to the destination is known as Root Port.
Answer: The port which is sending the BPDU packet is called Designated port.
Answer: When an attacker is trying to send a BPDU packet with ‘0’ priority values by any tool then
port will consider it as error invisible state. This is the working of BPDU Guard.
Answer: When the root port undergoes down alternate link up without any delay it is known as Uplink
fast.
Q220) What is the port number used for FTP, TELNET and SMTP?
Answer: These are the port number for their corresponding protocols:
21-FTP
23-TELNET
25-SMTP
Answer: Redundancy can be explained as if one network device goes down then the backup will
Answer: The protocols used in Redundancy are HSRP, VRRP and GLBP.
Answer: Active: The Router that owns the virtual IP and MAC address is in active. Standby: It is the
Answer: MSTP is open standard for fast convergence and to avoid load.
1-STATIC
120-RIP
90 EIGRP INTERNAL
170 EIGRP EXTERNAL
OSPF 110
Answer: OSPF uses two multicast address for DR and BDR communication and other router
communications.
Point to point
Broad cast
Non broadcast
Answer: When successor goes down there is no feasible successor to reset the connection it will
Answer: OSPF is link state routing protocol whereas the EIGRP is an advanced vector protocol.
Answer: Best path to reach the destination is decided by the successor in EIGPR.
Answer: Feasible successor in EIGRP is the backup path for the successor.
condition in EIGRP.
Answer: AS: Routers having same administration and policy are in same autonomous system and it
Hello
Update
Query
Request
Ask
Answer: The types of LSA are 1, 2, 3, 5 and 7 which are mostly used.
Answer: Router ID is used to identify the routers and to avoid loop in the OSPF network.
Answer: Root guard is a feature which receives BPDU in the port it will consider as an inconsistent
state.
Answer: Unique ID for the Router in the OSPF topology is known as Router ID.
Q251) What is the ratio of Hello timer to Dead timer in the OSPF
topology?
Answer: 1:4 is the ratio of Hello timer to Dead timer in the OSPF topology.
Answer: Area 0 is the numbering given to the backbone area in an OSPF topology.
Q256) Can a router within the Backbone area be configured with OSPF
summarization?
Answer: Router within the Backbone area can’t be configured with OSPF summarization.
Answer: If you see your own AS number in the AS path you don’t accept it since you have a loop.
Answer: When a BGP router receives an update from another internal BGP router, then it will not
forward this information to another internal BGP router, it is called BGP split horizon.
Q276) What is the port in a Private VLAN which can communicate with
all other Ports?
Answer: Promiscuous Port the port in a Private VLAN which can communicate with all other Ports.
Answer: Switch port without the forward delay and blocking timer is known as port fast.
Q291) What are the different load balancing methods for VRRP?
Answer: The different load balancing methods for VRRP are as follows: Round-Robin, Host-
Q292) Which protocol is used for Load balancing and high availability?
Answer: The protocol used for Load balancing and high availability is GLBP.
Q297) What is the Loop Address used for local testing purpose?
Answer: The Local Loop Address used for local testing purpose is 127.0.0.1
Segment Fragmentation
Numbering Segment
Multi Tasking
Flow control
Answer: DHCP stands for Dynamic Host Configuration Protocol. It is based on the DORA concept.
Straight Cable
Cross Cable
Answer: The two types of routes are Static Route and Dynamic Route.
Answer: Distance vector is the protocol used for sending Periodic updates after every 30 seconds.
Answer: SWITCH is the process to use the hardware of MAC address for understanding.
Access Port
Trunk Port
SERVER MODE
CLIENT MODE
TRANSPARENT MODE
Answer: STP is the short form of Spanning Tree Protocol, which is used to understand the Loop
Address.
Answer: ACL stands for Access List Control. It is the list of commands used to filter the packets in a
router.
STANDARD ACL
EXTENDED ACL
NAMED ACL
Q318) Write the Router command used for displaying the RAM contents.
Answer: The Router command used for displaying the RAM contents is-
Q319) Write the command used for displaying the NVRAM contents.
Answer: The Router command used for displaying the NVRAM contents is-
Answer: APIPA stands for Automatic Private IP Addressing. The range of APIPA is from 169.254.0.1
to 169.255.255.254.
Answer: SNMP is a Network Management Application which runs inside the management service
Answer: OSPF stands for Open Shortest Path First. Secondly Routing Tables is populated.
Answer: The major functions of SNMPV3 are Authentication, Encryption and Message Integrity.
Highest Priority
Highest Router ID
Highest IP Address
Answer: BPDU Guard is used for protecting the Switch port which is using the Port fast.
Q329) What are the two types of protocols used in Ethernet Channel?
Answer: The two types of protocols used in Ethernet Channel are PAGP (Port Aggregation Protocol)
Answer: There are two types of modes in LACP i.e. Active mode and Passive mode.
Answer: There are two types of modes in PAGP i.e. Auto mode and Desirable mode.
Answer: The router command used for enabling IPV6 is UNICASTING ROUTING.
Q336) What is Administrative Distance?
Answer: ISATAP stands for Intra Site Automatic Tunnel Addressing Protocol.
Answer: Network Congestion takes place when two users try to use the same bandwidth.
Answer: Windows networking terms refer to the number of segments that are allowed to the
destination.
NVRAM
DRAM
Flash Memory
Answer: It is the Ethernet to make use of Fiber optic cables in the main transmission medium.
Speaking
Listening
Disable
Standby
Active
Root port
Designated Port
Blocking port
Answer: A Window alludes to the quantity of sections that is permitted to be sent from source to goal
Conclusion
Recommended Articles