Back to Questions Page

How can you add the 192.168.100.0/30 network to EIGRP

Ques without tion involving the

192.168.100.4/30 network as well?

Ra nk

Answer Posted By

Question Submitted By :: Jitendera Sinha I also faced this Question!! Ans wer
router>en router#config terminal router(config)#router eigrp 10 router(config-router)#network 192.168.100.4 © ALL Interview .com

6

Gjager

Ans wer

router(config)# router eigrp 10 router(config-router)#network 192.168.100.0 0.0.0.3

5

Shahin

Ans wer

hi If you gurs are thinking that i am wromg for that answer then please make the correct answer i think some guys are not able to under stand the problem what i am trying to ask i am asking tha if we want to implemnt eigrp on router and if i want to no include the address 192.168.100.4 then what wiil we do that is what should be comad for implemning that i know some of guy thinking that in eigrp no wild mask can be implemetded but my dear frinds it is poosible to make wild mask entry in the eigrp

0

Jitendera sinha,it

Ans wer

network 192.168.100.0 255.255.255.252 or network 192.168.100.0 0.0.0.3.

0

Deep

i m very weak in this type of tricky question. The owner has only one camel..1/3 banana 0 Jitendera .. What is the largest number of bananas that can be delivered at the market? Ra nk Answer Posted By Question Submitted By :: Jitu I also faced this Question!! Ans wer Surprise. Let us know buddy. gud question. The plantation owner has 3000 bananas that he wants to transport to the market by camel..Ques tion A banana plantation is located next to a desert. In real world you only get the less time aprox 5 min to solve the issue so this type of problem increase your menatl ability to solve the network issue and shain it is not permutaions and combinations this is simple mide freak try it self 0 Jitu(jiten dera Kumar Sinha) Ans wer 533.. Permutation & Combination weak hai mera. 0 Shahin Ans wer Hi this is not applicable for the your ccna syllabus but it is very usefull for the ccna exams becoz it msked you more treaky to solve the networking issue in limted time in exams.com 0 Guest Ans wer Hehehehehe.. Porbabilty & possibility. and eats one banana every kilometre it travels. © ALL Interview .when cisco introduced this type of question in their CCNA syllabus. across a 1000 kilometre stretch of desert.. which carries a maximum of 1000 bananas at any moment in time. No answer from me...

Ans wer 0. 0 Sumedh Why ESP Transport mode is not compatible with NAT????? Ques Though New IP Header in Tunnel mode & Original IP tion Header in Question Submitted By :: Shahin Transport mode are out of Authentication & Encryption.!!!! U knw why i m looking for u. Ra nk Answer Posted By I also faced this Question!! Ans wer http://publib. market is 1000KM away so camel eats 1*1000=1000 bananas.. of either all or part of the contents of a datagram. camel can carry max 1000 bananas.!!! Why Authentication Header (AH) is not compatible with the network that using NAT?????? Ra nk Answer Posted By Question Submitted By :: Shahin I also faced this Question!! Ans wer AH is a protocol that provides authentication. based on the values in the datagram. depends on the mode(tunnelor transport)and the version of IP (IPv4 or © ALL Interview .com 0 Jitendera Sinha ..htm Please refer that link © ALL Interview . on each trip he will carry 0 banana at the market.boulder.com 0 Jitu Ques tion Jitu.. as camel eats 1 banana per KM.ibm. through the addition of a header that is calculated. looking for u specially.com/infocenter/iseries/v6r1m 0/index. and the placement of the header. What parts of the datagram are used for the calculation. so it requires 6000 bananas for 3 trips. to come back from market to desert owner has to buy 1000 bananas for camel.jsp?topic=/rzaja/rzajaudpencap.

authentication will fail and the recipient will discard the packet. AH runs the entire IP packet. to hide your personal ip sometime theoretically it is a mechanism to convert private ip to public ip ______________________________________________________ _____ ******* The IPsec Authentication Header (AH) is a case in point. BHEL I also faced this Question!! Ans wer Client mode : Accepts. source spoofing. But NAT. © ALL Interview .generates. AH + NAT cannot work. This hash is used by the recipient to authenticate the packet.IPv6). including invariant header fields like source and destination address. by definition. Forwards vtp messages. Thanku Hope this will help to understand you the concepts. If any field in the original IP packet is modified. Jitendera sinha Ques tion what is the difference between client mode and server mode of vtp and what is the diffrence betwwen tarnsparent mode and server mode Ra nk Answer Posted By Question Submitted By :: Jitendera Sinha This Interview Question Asked @ IBM . and manin-the-middle attacks. tunnel or transport------tunel /\ / \ / \ tunel transport | | | | protect all data pkt protect only data portion now why it is not compatible with nat nat is mechanism.com 0 Naveen . Ergo. In the nat Ip filed is modified so some time Ah is not compatible with nat i am again saying SOME time. through a message digest algorithm to produce a keyed hash. \ modifies IP packets. AH is intended to prevent unauthorized modification.

modify and delete . but you can neglect the VTP Messages by Enabling Transperent Mode. information is not synchornized and is saved in nv ram 0 Anil Ans wer Client mode : Accepts. Transperent Mode is the mode in which you can Create VLAN's. Transperent Mode is the mode in 0 Kiran K. Forwards vtp messages.generates. Default VTP mode of every Cisco Switch is At Server mode you can create VLAN's Transperent Mode : In Cisco switch you cannot disable VTP.generates.At clientmode you cannot create VLAN's Server mode: Accepts.generates. But these Vlan informatation will not be sent to other switch as done in Server and Client mode Ans wer hi naveen are you confirmed about the transparent mode. Default VTP mode of every Cisco Switch is Server mode At Server mode you can create VLAN's Transperent Mode : In Cisco switch you cannot disable VTP.i also reply that but this is wrong In transparent mode switch act like a hub and it simply allow to pass the data within them self 0 Jitendera Kumar Sinha Ans wer In server mode we can change vlans modify and delete and also the information is synchorized and information is saved in nvram in client mode we cannot create modify. At clientmode you cannot create VLAN's Server mode: Accepts. Khadke . delete vlans information is synchronized and not saved in nvram in tranperent mode we can change . Forwards vtp messages. Forwards vtp messages. but you can neglect the VTP Messages by Enabling Transperent Mode.

In the case of Transparent we can create vlan 1-4096 (valid range 1-4094) also known as Extended Vlans.com 0 Brijesh . We can delete vlan. It has three default modes: 1. Client: In this mode we can only use the services of vlans but we can not create/modify/delete any vlan.. 2.. Server: In this mode we can create. modify any vlan/vlan data. delete. modified new and existing vlan in client mode we cant do it it only recivee vlan detail from server mode. In case of V1.. Transparent: In this mode the switch can forward the vlan from server to client etc.which you can Create VLAN's. 3. we have to create server configuration again when any Transparent Switch comes between the network.. also known as Standard Vlans. VTP (Vlan Trunking Protocol but this is not a purely trunking protocol it is Vlan Replication Protocol). 0 Tatyasah eb Ans wer We run vtp over trunk links also known as tagged links. NOTE: In the case of Server we can create default vlan 11005. Brijesh cisco.dat etc..brijesh@gmail. But these Vlan informatation will not be sent to other switch as done in Server and Client mode Ans wer in server mode in vtp we can create delet . This feature is available only in VTP V2. camparly in transever mode it dose not take part in modification creation vlans . it simply take vlan detail and transfer to other switch ..

2--Server mode 3--Transparent mode.Ques tion there is three mode of vtp let there are three switch s1 in server mode s2 in transparent mede and s3 in clint mode then will that tranparnt mode going to effect the network if yes then how and if no then what it will do Ra nk Answer Posted By Question Submitted By :: Jitendera Sinha This Interview Question Asked @ IBM I also faced this Question!! Ans wer yes because in transparent mode information is not synchorized © ALL Interview ..com 0 Guest Ans wer vtp stands for VLAN trunking protocol.. it have the three modes 1--User mode.it does not make effect it simply transfer vlan detail frm server to client according to its revission no. 0 Rohit ...com 0 Anil Ans wer No.. 0 Tatyasah eb Ques tion what is vtp there is three question regatding vpn but i know it is not conserned with that Ra nk Answer Posted By Question Submitted By :: Jitendera Sinha This Interview Question Asked @ IBM I also faced this Question!! Ans wer vtp stands fo r virtual trunking protocol © ALL Interview .....

such as Neighbor table.com 0 Shahin what is the distance betwwen link stae routing protocl and distance vector Ques who have the best convergence toplogy tion eigrp conatain 3 table name them what the toplogy table contain Ra nk Answer Posted By Question Submitted By :: Jitendera Sinha This Interview Question Asked @ IBM I also faced this Question!! Ans wer Difference between Distance Vector & Link-state Protocol are as followsa) Distance vector protocol uses distance or hop count as its metric to determine its best path to particular destination. © ALL Interview . EIGRP maintains separate set of information table. such as Neighbor table. IPX & Apple talk). cost as well as speed to determine its best path to particular destination. EIGRP also maintains separate set of information table.com 0 Shahin . where as link-state protocol using current congestion. For each AS. Topology table & Routing table for each Routed Protocol (IP. Topology table & Routing table.Ques can we configure multiple as on single router using tion eigrp Question Submitted By :: Jitendera Sinha This Interview Question Asked @ IBM I also faced this Question!! Ans wer Yes we can configure multiple AS on a single router using EIGRP. Ra nk Answer Posted By © ALL Interview .

!!! Ans wer shain your answer is correct but what about the second para of that question it is a completely theoretical answer. d) Distance vector protocol sends periodic updates after a regular interval. g) Distance vector protocol doesn't support VLSM & CIDR where as link-state protocol support VLSM & CIDR..e. e)Distance vector protocol sends it best route to other router. where as link state protocol sends its links to other routers. c) Distance vector protocol sends update using broadcast.b) Distance vector protocol works by using Bellman ford algorithm where as link-state protocol using Dijkstra algorithm. where as link state protocol is a classless protocol. Note: Link-state protocol (Such as OSPF) sends entire database after every 30 min. write down any where what i am writing here in the link state routing protocol the router send its routing table to only its link router.. where as link-state protocol sends updates if there is any changes in the network.e. doesn't sends subnet mask information along with routing updates. i. If anyone knows somemore points thn plzzzzzz include.in another way which is directly connected to it where ever in the distance vector whole routing table is delivered to the all router in the network. that is broad cast to all router 0 Jitendera Sina . where as link-state protocol sends updates using multicast. f) Distance vector protocol is a classfull protocol i. Thats all about difference between DV & LS. sends subnet mask information along with routing updates.

Go through "CCNP BSCI Official Exam Certification Guide.. i m not agree with u..its may be possible 0 Jitendera Kumar Sinha Ans wer Hey Buddy.. Ans wer ha ha I know u never be aggry with me but you may be wright but as far as my knowledge is concern i am wright but i will go through that book you also look in ccna todd lamle book i didn't remember page number right now but i think the topic is in the start of the book in chapter in which routing protocol started Please have a look or issme gussa kane ki koi baat nahi hai.. Fourth Edition Page 106".it is the best answer in any interview because its contain all information which you wrote above and i am agin saying to all of the student who are prepairing for the interview/ccna plz try to give the answer what ever some one is given or not or it is wrong or wright do not be affredd so say what you think this might be possible that here u could be wrong but it is better to be wrong here instead of in interview panel Ans wer Distance-vector routing protocols advertise routes to neighbors...mai galat ho saktha hun. I m not angry yaar.. 0 Shahin Jitu. but a link-state routing protocol advertises a list of its connections. i just wrote my point of view 0 Shahin .. the concept u wrote above..

* Eigrp is the classfull routing protocol. It's standardized. Ra nk Answer Posted By © ALL Interview . Most appropriate in large multi-vendor networks.. 0 Rohit . * Eigrp is the Distance Vector Routing Protocol. OSPF .Useful in Cisco-only networks of basically any size.com 0 Manikan dan Ans wer EIGRP * stands for Enhansed interior gateway routing protocol. hehehe. * Ospf is the Classless routing protocol.Useful everywhere. Don't think i m angry plzzzzzzzzzzz. It has a higher CPU load than EIGRP does. OSPF * OSPF stands for open shortest path first routing protocol.!! Ques what is the difference between eigrp and ospf tion Question Submitted By :: Jitendera Sinha This Interview Question Asked @ IBM I also faced this Question!! Ans wer EIGRP . I may be wrong lets take a look on respective books. * OSPF is the link state routing protocol.. EIGRP is an extremely robust and efficient protocol that suits nearly any need other than inter-organization routing. and it requires more granular control from an administration perspective. If my point of view hurt u thn i m xtremly srryyy for dat.. so it's not limited to a particular vendor.along with documentation.

Keep it Up.stp which protocol is used for detrming root port Ques In root tion bridge .Guest.while we connect between 2 swiches by a two trunk link a loop occur .com 0 Shahin Ques what is stp... tion Question Submitted By :: Jitendera Sinha This Interview Question Asked @ IBM I also faced this Question!! Ans wer Spanning TRee protocols Ra nk Answer Posted By © ALL Interview . Thank u very much for such anticipated answer. © ALL Interview .!!! 0 Shahin Ans wer Spanning tree protocol is layer 2 protocol ..com 0 Guest Ans wer Hi Mr.forwarding port and blocking port Ra nk Answer Posted By Question Submitted By :: Jitendera Sinha This Interview Question Asked @ IBM I also faced this Question!! Ans wer Bridge Protocol Data Unit (BPDU) is used.. Yahan pe kisi ko nehi pata STP stands for Spanning Tree protocol.stp used to avoid loop by blocking a link though its calculation still permitting reduntant connection 0 Noushad Ques what is ip address and what is the difference between Ra Answer .

com 0 Ani Ans wer Hi Anil you make your best but not fully correct this is partial and you are touching only the boundary of that answers ip address is used for network identifictaion.tion the ip address and mac address why we are not using mac address instead of ip address nk Posted By Question Submitted By :: Jitendera Sinha This Interview Question Asked @ IBM I also faced this Question!! Ans wer ip address is a 32 bit address which contain 4 octects separated by a dots mac address is a 48 bit address which can be configured on a nic card default in nework communication both are important with out one the other cannot be communicated if we are using ip addres to communicate means internally we use arp protocol to find out the mac address then only we can communicate © ALL Interview .where as mac address is used for the node identification. In any network that is either it is lan or wan ip address is defined for only the network identification i am giving here the example i think by this i hope that you can understand you have yours postal address that contain your name your father name your street name your district your state and your postal code so in this example your name and your street is your node(mac) address where you leave and your sate and district are the the network address that is ip how-: let if i am posting any thing to you by India post then what is the process at first the people will see from which state it concern it will send to that state now in that state people see that in which district so it will send to your district then from there it will reach to you same concepts with the ip address and mac address. 0 Jitendera Kumar Sinha .

after giving the answer most of them i am selected foro\ 2nd round Ra nk Answer Posted By . respectively. as such. These addresses are actually 32-bit binary numbers. but they serve different purposes. And by unique. or merely as “IP” is a code made up of numbers separated by three dots that identifies a particular computer on the Internet. consisting of the two subaddresses (identifiers) mentioned above which. identify the network and the host to the network.Hope this will help you Thank you jitendera kumar sinha Ans wer Thank to jitendera kumar sinha (clear example) First we want to know clear idea of ip and mac address Differences between of ip add and mac add It “IP address”. 0 Jagadies h what is bgp. and are visible in very different ways. as “IP number”. with an imaginary boundary separating the two. I do mean unique. A MAC (or Machine Access Control) address is best thought of as a unique serial number assigned to every network interface on every device. An IP address is. and what its attributes (thanks to sahin he sende me notes) Ques tion Please try to give answer it will help you in future. generally shown as 4 octets of numbers from 0-255 represented in decimal form instead of binary form. MAC and IP addresses are both key components to network. no two network cards anywhere should have the same MAC address.

com 0 Jagadies h . There are three possible types -. MANDATORY AS-path: A list of the Autonomous Systems (AS) numbers that a route passes through to reach the destination. Community: Used to group routes that share common © ALL Interview .. TRANSITIVE Aggregator: Specifies the router ID and AS of the router that originated an aggregate prefix. Atomic Aggregate: Set if a router advertises an aggregate causes path attribute information to be lost. It maintains a table of IP networks or 'prefixes' which designate .of interview thanks Question Submitted By :: Jitendera Sinha This Interview Question Asked @ IBM I also faced this Question!! Ans wer The Border Gateway Protocol (BGP) is the core routing protocol of the Internet. or Incomplete (origin unknown or learned in a different way). The AS-path attribute has a reverse-order list of AS passed through to get to the destination. DISCRETIONARY Local Preference: Defines the preferred exit point from the local AS for a specific route. As the update passes through an AS the AS number is inserted at the beginning of the list.IGP (route is internal to the AS). WELL-KNOWN. EGP (learned via EBGP). Used in conjunction with the atomic aggregate attribute. Origin: Indicates how BGP learned a particular route. Next-hop: The next-hop address that is used to reach the destination.. he attributes that are commonly used in the Cisco Implementation of BGP are as follows: WELL-KNOWN. OPTIONAL.

Coz the value of CCNA certification is decreased from recent yrs. 6-Atomic aggregate. OPTIONAL. This article discussed the BGP attributes with the intent of preparing you for those confusing questions on the BSCN or BSCI exams. So once u pass the exam.com 0 Shahin .properties so that policies can be applied at the group level. A list of path attributes is contained in BGP update messages. The attribute type codes used by Cisco are: 1-origin. Hopefully. are the job opportunities i will get once i Ques What complete tion my CCNA certification. Grab the opportunity watever u get. The attribute is variable length and consists of three fields: Attribute type consisting of a 1-byte attribute flags field and a 1-byte attribute code field. 2-AS-path. 4-MED. and a variable length attribute value field. Attribute length field that is 1 or 2 bytes. there is no more confusion on the various attributes that are used in the Cisco implementation of BGP. don't expect that u gonna get a high profile job. and 10-cluster list. 9-originator-ID. 8community. 5Local preference. NON-TRANSITIVE Multi-exit-discriminator (MED): Indicates the preferred path into an AS to external neighbors when multiple paths exist. © ALL Interview . Ra nk Answer Posted By Question Submitted By :: Guest I also faced this Question!! Ans wer To pass CCNA exam is very easy coz some f**king people utilize their money & taking CCNA certification on 2nd hand way. 7-aggregator. 3-Next-hop.

Cheers.but as you completed your ccna you have to get small job then in this job period you should try to learn more version of networking look i am a B.tech guy and i am also completed ccna but one i have stared my carrier with 3500/00 per month now i am getting more then that(don’t want to disclose it) becoz in that shot of period i used to learn more about the networking and practical knowledge is more valuable then the theoretical knowledge so get the correct base you can find job then after getting exposure company calls you directly Thanks ..Thanx man. Ans wer i am partially agree with the shain..