Network engineer interview questions

1. 2. 3. 4. 5.
6. What is a default gateway? - The exit-point from one network and entry-way into another network, often the router of the network. How do you set a default route on an IOS Cisco router? - ip route x.x.x.x [where x.x.x.x represents the destination address] What is the difference between a domain local group and a global group? - Domain local groups grant permissions to objects within the domain in which the reside. Global groups contain grant permissions tree or forest wide for any objects within the Active Directory. What is LDAP used for? - LDAP is a set of protocol used for providing access to information directories. What tool have you used to create and analyze packet captures? - Network Monitor in Win2K / Win2K3, Ethereal in Linux, OptiView Series II (by Fluke Networks). How does HSRP work? What is the significance of the IP address - The limited broadcast address is utilized when an IP node must perform a one-to-everyone delivery on the local network but the network ID is unknown. 1. 2. 3. 4. 5. 6. 7. 8. 9. 10. 11. 12. 13. 14. 15. 16. 17. 18. 19. 20. 21. 22. 23. 24. 25. 26. 27. User(s) are complaining of delays when using the network. What would you do? What are some of the problems associated with operating a switched LAN? Name some of the ways of combining TCP/IP traffic and SNA traffic over the same link. What sort of cabling is suitable for Fast Ethernet protocols? What is a Class D IP address? Why do I sometimes lose a server’s address when using more than one server? What is Firewall? How do I monitor the activity of sockets? How would I put my socket in non-blocking mode? What are RAW sockets? What is the role of TCP protocol and IP protocol. What is UDP? How can I make my server a daemon? How should I choose a port number for my server? Layers in TCP/IP How can I be sure that a UDP message is received? How to get IP header of a UDP message Writing UDP/SOCK_DGRAM applications How many bytes in an IPX network address? What is the difference between MUTEX and Semaphore? What is priority inversion? Different Solutions to dining philosophers problem. What is a message queue? Questions on Shared Memory. What is DHCP? Working of ping, telnet, gopher. Can I connect two computers to internet using same line ?


1. 2. 3.


Workers can not print from the printer, there user log on are correct and are allowed to print from that printer in active directory. How would you resolve this issue? What is the difference between hub and switch? Your hard drive is partitioned as follows: 8 gigs for OS drive C, 8 gigs for Hot Swappable dirve D and rest is free as dirve E. Your drive C crashes, how would you reboot your system without installing a new operating system? Your computer gives you “non-disk error” before you log on what would you do to make your computer work?

1. Workers can not print from the printer, there user logon are correct and are allowed to print from that printer in active directory. How would you resolve this issue? This is vague and could have multiple responses. Here are a few. 1. Verify printer is set as default. 2. Verify users have local privileges set properly to print. 3. Is print server delivering correct drivers? 4. Is local naming convention for printer correct? 5. If pre Win2000 workstation, naming convention must be less than 12 characters. 6. Make sure no viruses present. Some Viruses can shut down IPC shares and printing services. 2. What is the difference between hub and switch? A hub is not smart and allows all connected nodes/networks to communicate with each other. You a are limited to 10/100Mb half duplex operation on a hub. To hook two hubs togethor you would use a crossover cable. Most hubs also have a crossover port which will allow you to use a regular cable to hook two hubs/switches togethor. A switch on the other hand can be an OSI Model layer 2 or 3 device. A switch forwards information by mac address. The mack address is a hard coded alpha numeric number that is used to identify a network adapter. Whenever a call is made to another computer, the switch looks in it’s mac address table and see’s if this node is directly connected to the switch by looking it up in the mac address database. If it is not, however, if forwards it down all switch ports looking for the destination. A layer 2 switch is even smarter. It can actually route traffic based on it’s layer 3 address. It will look up the destination in it’s mac address table first, if does not find it, it will forward it by looking at the route table and send it on it’s merry way to it’s destination. A switch will also allow you to set a switch port at 10/100Mb full duplex to increase node communication speed. Hubs should be used in smaller networking environments and switches should be used whenever you need to segment your network or you are having problems with collisions on your ethernet network. If you have over a 100 clients in a location, it’s a good idea to uses switches. If you intend on using them both, you would normally use the switch as the backbone and the hubs as connections. Each hub would have it’s own switch port on the switch. I normally reccommend that if your going to use a switch in place of a hub then get rid of all your hubs and move completely to switches. This will allow for increased network performance, a more structured segmenting of the network, and better traffic control. Hubs, since they are not smart, send broadcasts down all ports unlike a switch, which can cause performance degradation on the network. This causes all clients/nodes to have to respond to the broadcast. 3. Your hard drive is partitioned as follows: 8 gigs for OS drive C, 8 gigs for Hot Swappable drive D and rest is free as drive E. Your drive C crashes, how would you reboot your system without installing a new operating system? This is also vague and poorly put together. It is represented as a single HDD but the reference to Hot

and can you give me an example of one? Why are proxy servers useful? What is web-caching? What is a firewall? Firewall is a device or a software which restricts the unauthorised accesses to and from the network………. 8. 13. 5. where the first partition is mirrored. Based on OS. 4. 3. Your computer gives you “non-disk error†ン before you log on what would you do to make your computer work? Again there are potentially multiple scenarios here. It is hard to tell how many physical disks there are based on the description? If it is hardware related and the first drive has literally crashed physically (head crash for example) the second drive may have an OS. As it is the only drive referred to as Hot Swappable.Swappable would infer a secondary device. Then it will reboot provided it has an OS.Guys its that simple no need to beat around the bush . boot from floppy and re-sys disk. this could have multiple responses as well. 1. 10. 7. 6. Perhaps he misunderstands the technology. 3. Make sure a non OS floppy is not present in A: 2. As it is unclear. or use CD to repair OS. 4. 3. 2. This is provided the HDD is ok and the partition is the only problem. Security 1. If Hot Swappable means a secondary physical drive. 12. you may be able to boot to one of the other partitions. Re-power up. If this is a single drive with an NT OS and it is setup with multiple boot partitions. 4. 14. 2. Make sure hard drive has not crashed. genrally. 11. how to manage a firewall What is a Denial of Service attack? What is a “spoofed” packet? What is a SYN Flood? What do you do if you are a victim of a DoS? What is GPG/PGP? What is SSH? What is SSL? How do you create certificates? What would you do if you discovered a UNIX or Network device on your network has been compromised? What would you do if you discovered a Windows system on your network has been comrpromised? What is DNS Hijacking? What is a log host? What is IDS or IDP. you may be able to remove the drive that crashed and change jumper settings on the second drive making it the primary drive. 16. then down the computer and swap the drives. You may be able to use the original OS CD or floppy disk and repair the OS installation. Here are a few. What is a firewall? Describe. 9. 1. 15.

Windows NT. the information is allowed through.. Otherwise it is discarded. 3. 9. 7. There is much more to VTP. but I assume in an interview you wouldn’t need to get as deep as VTP Pruning. 5. * Stateful inspection .Packets (small chunks of data) are analyzed against a set of filters. it is not allowed through. 2. If an incoming packet of information is flagged by the filters. the VLAN is distributed through all switches in the domain. Information traveling from inside the firewall to the outside is monitored for specific defining characteristics. TACACS+ services are maintained in a database on a TACACS+ daemon running on a UNIX. TACACS+ provides for separate and modular authentication. What is a wildcard mask. This reduces the need to configure the same VLAN everywhere. TACACS+ is a security application used with AAA that provides centralized validation of users attempting to gain access to a router or network access server. 5. authorization. When you configure a new VLAN on one VTP server. etc. Packets that make it through the filters are sent to the requesting system and all others are discarded. * Proxy service . 6. If the comparison yields a reasonable match.A firewall is simply a program or hardware device that filters the information coming through the Internet connection into your private network or computer system. then incoming information is compared to these characteristics. 9. and accounting facilities RADIUS is a distributed client/server system used with AAA that secures networks against unauthorized access. VTP transparent mode. Virtual trunking protocol allows easier management of VLANs over multiple switches by implementing VTP Server(s) and a VTP domain. Cisco-specific 1.A newer method that doesn’t examine the contents of each packet but instead compares certain key parts of the packet to a database of trusted information. 8. or Windows 2000 workstation.Information from the Internet is retrieved by the firewall and then sent to the requesting system and vice versa. 4. AAA means Authentication Authorization Accounting . Firewalls use one or more of three methods to control traffic flowing in and out of the network: * Packet filtering . and how is it different from a netmask? How do you configure a Cisco switch or router? What are the steps needed? How would I place an interface into trunking mode? How do you shutdown an interface on a router or switch? What is VTP? What is VMPS? What is SPAN/RSPAN? What is flow/netflow? What is TACACS? Radius? Ans: Where foo equals the interface you’d like to trunk/shutdown.

0 class b. What is VTP? virtual trunking protocol. 6. What is VMPS? VLAN membership policy server. remote switched port analyzer. which is used to authentication not a application. Ans: 1.255.255.. What is a wildcard mask. How do you shutdown an interface on a router or switch? en config t int s0/0 shutdown 5. and how is it different from a netmask? > netmask determines the subnet part of the ip address example 255. u see this in ospf. 8.255 here defines the host portion.0.255 . TACACS+ & RADIUS is protocol. set up on switches to manage vlans. A VLAN Membership Policy Server or “VMPS” is a network switch that contains a mapping of device information to VLAN. you can monitor traffic flowing to a port from another port. the netmask is 255. How do you configure a Cisco switch or router? What are the steps needed? >enable #configure terminal configs are slightly similar 3. What is SPAN/RSPAN? Switched port analyzer.6. What is flow/netflow? protocol for collecting IP information 9.0. What is TACACS? Radius? terminal access controller access control system remote access dial in user service . the 255.255 wildcard mask is the opposite. How would I place an interface into trunking mode? en config t int s0/0 switchport mode trunk encapsulation dot1q|isl 4. maps information regarding vlan 7. its a wild thing really 2. 0.

16. 2.0. enabled by aaa authentication. A binary “0″ over a particular digit in the subnet number says “Pay attention to this digit. whereas wildcard mask defines the allow or deny which is used in the access-list. 0.” A “1″ says “Ignore this digit. 15. 18. authorization. accounting provides a means of validation of users gaining access to a router accounting not used with radius. on router or switch to shutdown the interface commands are: router>enable router#config t router(config)#int s0 router(conf_if)# shutdown this will shut your active interface The wildcard mask is usually a string of binary digits shown over the subnet number. 7. 11. all the binary “0″s in a conventional subnet mask are replaced by “1″s and all the “1″s are replaced by “0″s. and collision? What is a broadcast storm? What is the purpose of VRRP? What is a VPN? What information about a peer would I need to establish a VPN? What is a full-class C in CIDR notation? What is a default route? What is a metric? What is a MAC address? What is ARP/RARP? Describe a TCP connection sequence What is MTU? What other TCP setting can you modify besides MTU to shorten packets? . 17. Netmask defines the class. 4. 8. 3.255 octet can be anything.0. 6. 12.” In a wildcard mask. 5. 1=ignore. 14. telling the router which parts of the subnet number to look at. 13. 9.255 represents… 0=match. for trunk mode in switch interface #int fa 0/1 #switchport trunk allow vlan (vlans you required seperated with coma) #switchport mode trunk [isl](encapsulation dot1q) Network administrator interview questions 1. Means. 10. What is the difference between layer 2 and layer 3 in the OSI model? What is the difference between a hub. Giant. and router? What is a VLAN? What is the difference between TCP and UDP? How do you distinguish a DNS problem from a network problem? What is a runt. so here in this wc mask all 0 octets should match exactly where as .

your room is packed with employees and ur company need to add 4 more persons to ur deptt. in such a case we can use TCP. TCP stands for Transmission Control works on Bus topolog resulting less speed. UDP-> Media Streaming. For this it uses the concept of ARP. question is say you are watching a movie…would you prefer that your movie comes. Does not Broadcast by default. Ques 9: VPN’s VPN(Virtual Private Network )… these are bascially the logical networks on the physical line… you can have many VPN oveer same line. and time is not a factor.. 2. The so-called “official” internet standard MTU is 576. we will get an acknowledgement. 3. Router.used to connect various machine on Lan.when the packet reaches say the bridge connection a LAN.What is the difference between TCP and UDP TCP is a connection oriented protocol. one broadcast domain & colliosion domains depends on no. Forward broadcast first time only.It forwards broadcast by default. Too small of an MTU size means relatively more overhead and more acknowledgements that have to be sent and handled.. The MTU determines the size of packets used by TCP for each transmission of data. Each computer is identified using its MAC/Physical address ( u can use the ipconfig -all option to get ur MAC address). Ques 2: Diffrence Betw. of ports.. The internet is addressed based on a logical addressing approach. 2. Address Resolution Protocol. Where will it be used : TCP -> Say you have a file transfer and you need to ensure that the file reaches intact. which means that everytime a packet is sent say from host A to B. Switch .how does it identify.or would you prefer the movie to keep streaming…Yes…The second option is definely better…. your dept. Hub. the solution is to create .. but the standard rating for ethernet is an MTU of 1500.. Also called Layer3 switch. Say.This is when we need UDP What is a MAC address? MAC is a machines Physical address. 2.but u need to wait a long time before you see the next frame ?. A layer2 device. Switch: 1. breaks up Broadcast domain. 3. which it uses over time to build up a table mapping from the Logical addresses to the Physical addresses. Router: 1.perfectly…. Need of VPN arises when your company need to increase the network but don’t want to buy any more switches. 4. which computer it needs to send the packet to. What is MTU The MTU is the “Maximum Transmission Unit” used by the TCP is a layer1 device.It supports one collision domain and one broadcast domain. 4. take an eg. Hub: 1. what will they do. 3. Too large of an MTU size may mean retransmissions if the packet encounters a router along its route that can’t handle that large a packet. Whereas UDP on the other hand. the question is.It is based on Star Topology giving 100mbps to every pc on Lan.. is a connection less protocol. The MTU is rated in “octets” or groups of 8 bits.

whenver a router with that network (IP) gets the msg...and the reverse thats the convertion of the Mac address to the IP address is called RARP ( Reverse Address Resolution Protocol) What is the difference between layer 2 and layer 3 in the OSI model? Layer 2 is responsible for switching data whereas Layer 3 is responsible for routing the data. VLANs are created to provide segmentation services traditionally provided by physical routers in LAN configurations.we need not give the single route. it encapsulate it with frame header (ATM header in case of ATM technology) and send it out for switching. Internet protocol make one IP packet with source IP and Destination IP and other relevant information. security. security. and traffic flow management. Routers in VLAN topologies provide broadcast filtering. VLANs provide segmentation based on broadcast domains. 6)A RUNT is a packet that is too small to traverse the network. VLANs address scalability. 3. It can then route packet through router to the destination. It allows users to work with certain applications. VLANs logically segment switched networks based on the functions. In english it is a direct tunnel into a remote network. printers. and network management. or applications of the organization regardless of the physical location or connections to the network. Network protocols such as Ethernet often require that packets be a minimum number of bytes in order to travel the network.. network drives and shares as if they where sitting in the that the persons can sit there and access to the required pcs. Layer3: With information gathered from user. we just have to set the default route command on the router and we set this command on the router of last resort…that is it discovers the near by routes itself. Runts are often the result of packet collisions along a busy network or can result from faulty hardware that is forming the packets or from corrupted data being sent across the network. What is a VPN? A VPN stands for Virtual Private Network. Layer2: Soon after it receives IP packet from layer 3. regardless of the physical connection or location. A giant is a packet that is too large to traverse the network. All workstations and servers used by a particular workgroup share the same VLAN. Ques 15: ARP: Stands for Address Resolution Protocol…whenever a request is sent by a node on one network to the node on another network the Physical address(MAC) is required and for this the IP address need to be flow over the network.. project teams. the required MAC address is sent through the network this process of converting the IP address to MAC address is Called ARP. Network protocols such as Ethernet often require that packets can not be over a specific number of bytes in order to travel the network. In case of ethernet it will send data to MAC address there by it can reach to exact destination. and create a specific VLAN of ur deptt. .VPN’s…you can configure the switch ports in other deptts. Ques 12: Default Route… While configuring the Routers we need to give the specific routes if we are configuring a Static route.and for Default.

All the following metrics have been used: •Path length •Reliability •Delay •Bandwidth •Load •Communication cost hat is the difference between layer 2 and layer 3 of OSI model? In the hirarchical design of the osi model .0 so CIDR notation is /16 For class C . or any other devices on the network.default subnet mask is 255. If you can ping other devices but can not ping the switch that sits in front of the DNS. then it will be a network issue. A severe broadcast storm can block all other network traffic. the port drops all broadcast traffic.0. switch.. What is a metric? Routing tables contain information used by switching software to select the best route.default subnet mask is 255. then it will most likely be a DNS issue. What is the difference between a hub. If a certain broadcast transmit threshold is reached. Sophisticated routing algorithms can base route selection on multiple metrics. router does seperate collision and broadcost domain What is a full-class C in CIDR notation? For class A . If your pings come back complete with 0% lost. on layer 2 . and router? Hub works on layer 1 of OSI model Swich works on layer 2 of OSI model Router works on layer 3 of OSI model Hub does not seperate collision and broadcost domain swich seperate collision domain but does not seperate broadcost domain..255. ARP works to resolve the IP address to mac address .On the layer two .255. Firewalls are one of the best ways to protect your network against broadcast storms. Routing algorithms have used many different metrics to determine the best route.0. Broadcast storms can usually be prevented by carefully configuring a network to block illegal broadcast messages.0 so CIDR notation is /8 For class B . and each response results in still more responses in a snowball effect.0.default subnet mask is 255.0 so CIDR notation is /24 . layer 3 is used fot the determinning the path of packet delivery and method of the packet to deliver. routers. resulting in a network meltdown.255.How do you distinguish a DNS problem from a network problem? The first thing to do is to ping any switches.. for that the routing and the routed protocol works . Broadcast storms can eventually lead to a complete loss of network connectivity as the packets proliferate. 7 Broadcast Storm A broadcast storm means that your network is overwhelmed with constant broadcast or multicast traffic. A state in which a message that has been broadcast across a network results in even more responses. packets are segmented to data enclosed with the mac address to which the data needs to deliver . combining them in a single (hybrid) metric.

255 From 172. The server then sends back the associated IP address of that machine.0.0 to 172.255. Instead of constructing network connections from scratch for each program they write. The socket opens the network connection for the program. These are known as private IP addresses. it uses a software component called a socket.e.255. and WINS servers) and to display configuration and statistical information.0. A server on the same network receives the packet and looks up the hardware address. allowing data to be read and written over the network.0 to 192. Address resolution refers to the ability of a station to resolve another station’s MAC (hardware) address given its IP address.255. you have a much greater chance of being shocked by a wall socket than by a networking socket. Because they are used for a number of different network protocols (i. When I ping an IP address the result comes out succesfull. For this reason. not hardware.255. USE HELP COMMAND FOR MORE INFORMATION (netsh/?) RARP:RARP is a TCP/ IP protocol term similar to ARP. In order to avoid address conflicts. the NIC has reserved certain addresses that will never be registered publicly.31. how to configure DNS in windows O/S with the command or stepes…. DNS servers.Private(Reserved) And Public IP’s? A computer on the Internet is identified by its IP address. Sockets are a key part of Unix and Windows-based operating systems. They make it easy for software developers to create network-enabled programs. default gateways. like a wall socket. So. The sockets allow the programs to use the operating system’s built-in commands to handle networking functions.? Netsh commands for Interface IP.16.255 From 192. developers can just include sockets in their programs.0 to 10. ping fails. ARP:Address Resolution Protocol.168. FTP. Essentially. HTTP. but when I ping with host name no result comes. IP addresses are publicly registered with the Network Information Centre (NIC). You can use commands in the Netsh Interface IP context to configure the TCP/IP protocol (including addresses.0. ARP is the protocol used by IP (as in TCP/IP) for address resolution.0. It is important to note that these sockets are software. RARP is the method that some machines use to determine their own IP address. It is used for machines that do not have the capability to store their own IP addresses locally.255 What is Socket? When a computer program needs to connect to a local or wide area network such as the Internet. and are found in the following ranges: From 10.168. many sockets can be open at one time. since they do not need to be accessed by the public. why? . Computers on private TCP/IP LANs however do not need public addresses. yes. a machine sends out a packet that includes a machine hardware address. telnet. and e-mail).

Yes .16. Open Shortest Path First (OSPF) is an open standards routing protocol that’s been implemented by a wide variety of network Name resolution is not happening. your only options are OSPF OSPF provides the following features: Consists of areas and autonomous systems Minimizes routing update traffic Allows scalability Supports VLSM/CIDR Has unlimited hop count Allows multi-vendor deployment (open standard) Characteristic of OSPF Type of protocol . Question 11 What is a full-class C in CIDR notation CIDR specifies an IP address range using a combination of an IP address and its associated network mask.On the network when you ping an IP address if ping request completed with 0% of loss that mean you are able to reach that Device(ip address) But when u ping hostname if u get the result as RTO that means Ping is been disabled for hostname in firewall or router If u get ping could not find the host address that means DNS issue. including Cisco. So your remaining options are basically RIPv1. If it’s a large network. Any comments are welcome What the Purpose of VLAN? VLANs can enhance network security. VLANs increase the number of broadcast domains while decreasing their size. If you have multiple routers and not all of them are Cisco. or OSPF. What is OSPF? Open Shortest Path First OSPF) is a non-proprietary link-state routing protocol limited to use with the TCP/IP stack. really.No Manual summarization . CIDR notation uses the following format xxx. Network adds. A group of users needing high security can be put into a VLAN so that no users outside of the VLAN can communicate with them.0.16.Link-state Classless support .Yes VLSM support .0.0.16. VLANs can be considered independent from their physical or geographic locations. then.0/16 This is a 256 class C = FIRST CLASS B Now they here are a few more Full Class C in CIDR notation can be represented by Example 10.0/17 is a 128 class C 10.0/16 is a 64 class C and so on. moves. RIPv2. and changes are achieved by configuring a port into the appropriate VLAN.Yes Auto summarization . As a logical grouping of users by function.

port stages and timing for convergence Draw the typical diagram and explain how diff types of STP work What ports are blocking or forwarding How it works if there are topology changes What are they Diff types Write an example if you want to allow and to deny… Well-known port numbers (DNS . the purpose of each LSA type What exact LSA type you can see in different areas How OSPF establishes neighboor relation.Triggered What is Spanning Tree protocol? In a Layer 2 environment (switching or bridging).Bandwidth Hop count limit . RSTP) Cisco .It is used to send data using ip address and by packets Network engineer interview questions OSPF Describe OSPF in your own words. MSTP. no routing protocols are used.Yes (using areas) Updates Event . making sure that no loops occur by shutting down any redundant links. DR.It is used to send data using mac address and by frames. ASBR. Instead. BDR. Difference between layer2 and layer3 Layer2:.Yes Hierarchical network .PVST/PVST+ root election Diff. the purpose of having each of them Types of OSPF LSA.Fast Peer authentication . ABR.Yes Route propagation . STP uses the spanning-tree algorithm (STA) to first create a topology database.Discontiguous support . The Spanning Tree Protocol (STP) provides network link redundancy so that a Layer 2 switched network can recover from failures without intervention in a timely manner. and active redundant paths are neither allowed nor desirable. Cool OSPF behavior in broadcast and nonbroadcast Draw the diagram of typical OSPF network and explain generally how it works. what the stages are If OSPF router is stucked in each stage what the problem is and how to troubleshoot it OSPF hierarchy in the single or multi areas. some form of bridging provides data transport between networks or switch ports. however.None Convergence .Multicast on change Path metric . OSPF areas.53 and etc…) What is that     QOS  . route redistribution and summarization         STP        ACLS How it works and the purpose Diff types (SSTP. It vigilantly monitors the network to find all links. Layer3:. then search out and destroy redundant links. election.

commands network security. how it works. Explain how to configure a host network interface (e. 15. What are the ways to troubleshoot the network. 18. What is the difference between a repeater. what is that. 14. 12. 8. and a late collision are and what causes each of them. broadcast address)? Describe Ethernet packet contents: min/max size. multicast. 10. Describe SONET. Describe the purpose and basic functionality of things like HSRP. unicast. 4.g. 11. The ATM is a technology of sending and recieving the packets and so it requires carriers such as SONET/SDH etc. The packet size of the ATM packet is fixed and is 53 bytes. What is your current IP address? Hoiw do you find that out on different OSs? Describe what a broadcast storm is. Describe the principle of multi-layer switching. 17. known/unknown traffic VRRP. bridge. techniques. ways to achieve it VLANs STP How a L2 switch works with broadcast. 16. Describe ATM and what are its current advantages and disadvantages. IP address. 9. 13. Describe TCP/IP and its protocols. 5. router? Relate this to the OSI model. Describe an Ethernet switch and where it fits into the OSI model. VRRP etc. a giant. What is a VLAN? What is an ELAN? What is the difference? Relate FDDI/ATM/SONET to the OSI model. . What are the maximum distances for CAT5 cabling? Describe UDP and TCP and the differences between the two. 2. Currently ATM is used in places where we require high speed data transfer. netmask. how it is diff from ACLs What problems with the network you had had and how you solved it. Describe the OSI model. 3. header. 7. How do you distinguish a DNS problem from a network problem? Describe the Bandwidth Delay problem. 19.                What is the diff b/w L2 and L3 QoS How it works Draw the typical network diagram you have to deal with explain how it works What part of it you are responsible firewall. #9 ATM is the short form for Asynchonous Transfer Mode. 6. how it works PIM sparse and dense modes NETWORK: SWITCHING: Interview questions for network engineer 1. Describe what a runt. GLBP port monitoring and mirroring L3 switch.

The packet size is too small and if u take the additional header that is attached then it will be huge. often with multiple paths between them. If it belongs to the local network. forming a larger individual network. Relation to OSI Layer Functions Bridges work with the MAC sublayer of the Data Link Layer. The ATM supports Quality of Service (QOS). it does not forward the data. Bridges use a routing table to determine whether data is destined for the local network or not. extending smaller networks into a larger. If you have an Ethernet network and a Token Ring network. the bridge sends it along. a bridge can join networks that use the same frame type but different media. It performs no processing of the frames or the data they contain. Each time the bridge receives data. Remember that the Data Link Layer is concerned with communicating on the local network only. it looks in the routing table to determine which physical network the destination address resides on. Bridges join two or more network segments together. 2. Routers operate at the Network Layer. 2. just like a repeater. they do not need any addressing data from the frame. bridges. They function similarly to a repeater. They use the . #2 Repeaters. Bridges use information from the MAC sublayer to make decisions on whether a packet is destined for the same network or another network. passing along even damaged frames. A repeater simply receives frames. the bridge does not pass it along. If that data is going to a computer on another segment. Bridges can not join dissimilar networks. Relation to OSI Layer Functions Because repeaters operate at the Physical Layer. If the data is destined for a computer on the same segment. it looks in its routing table to see whether or not the data is destined for a node on the local network. If it is not destined for the local network. They simply listen to all network traffic on one port and send it back out through one or more ports. However. single network. 3. and sends the data out onto that network. On a bridge. you must use a router. End to end is not ATM and so we still require ATM adapters and other equipments. The packet size small and constant so the latency is too small so that it can support real time data transfer. each one operates within a specific layer of the OSI model. you cannot use a bridge. except a bridge looks to see whether data it receives is destined for the same segment or another connected segment. All those erroneous broadcasts are forwarded faithfully by the repeater! Bridges operate at the Data Link Layer. and routers are devices used to link individual LANs together to form larger internetworks. and passes them along. then to choose which connected network it must go to. Repeaters operate at the Physical Layer of the OSI model. The MAC address is used by bridges to determine first if the destination is local or not. This can be especially problematic if one segment malfunctions and begins a broadcast storm. As the packet size is fixed switching can be implemented in Hardware and so it is very fast. ************* 1. Repeaters do not even look at the frames they are forwarding. Disadvantages. the routing table contains MAC addresses. They use the Data Link Layer and its physical addressing to join several networks into a single network efficiently. So the header size to the actual data send is less and so overhead is too much. Router: The Network Layer is concerned with network addressing for larger networks that consist of many physical networks.Advantages ********** 1. regenerates them.

Layer 2 router. Products referred to as IP switches and tag switches generally fall into this category. Wirespeed Routing . route calculation and frame forwarding are handled very differently here. Functions Routers divide larger networks into logically designed networks. This behavior eventually saturates the network. routing is not provided. Because they process so much information. rendering it used for security purpose and group departments. routing switch. Then it redirects traffic away from the routers and switches it based on its Layer 2 addresses. Vendors.addressing information provided at the network level to join the many networks together to form an internetwork. The term multilayer switch seems to be the best and most widely used description of this class of product that performs both Layer 3 routing and Layer 2 switching functions. they can link different physical network topologies. ATM-based cut-through routing offers several advantages such as improved support of LAN emulation and multi-vendor support in the form of the Multiprotocol Over ATM (MPOA) standard. The drawback to a router’s inherent intelligence is their speed. ATM-Based Cut-Through Routing . Layer 3 Learning Bridging CIn this architecture. In other words. Using advanced ASICs to perform Layer 3 routing in hardware. It is often referred to as packet-by-packet Layer 3 switching. The Network Layer provides addressing for internetworks. they risk sending packets in an endless loop between the two networks. it . Routers may seem a lot like bridges.Wirespeed architecture routes every packet individually. and at lower cost than traditional software-based routers built around general-purpose CPUs. routers tend to be slower than bridges. Multilayer switching is usually implemented through a fast hardware such as a higher-density ASICs (Application-Specific Integrated Circuits). Instead. and wirespeed router. which allow real-time switching and forwarding with wirespeed performance. Layer 3 switch. The following are some basic architecture approaches for the multiplayer switches: Generic Cut-Through Routing: In the multi-layer switching architecture Layer 3 routing calculations are done on the first packet in a data flow. and there is no industry standard yet on nomenclature. switching router. Multilayer switching is new. it uses IP “snooping” techniques to learn the MAC/IP address relationships of endstations from true routers that must exist elsewhere in the network. IP switch. Because routers operate at the Network Layer. While two bridges can connect two networks. and routers use this addressing information to determine how to pass along packets of data. and editors don’t agree about the specific meaning of terms such as multilayer switch. Relation to OSI Layer Functions Routers operate at the Network Layer of the OSI model. but they are much smarter. Following packets belonging to the same flow are switched at Layer 2 along the same route. Bridges cannot evaluate possible paths to the destination to determine the best route.This is a variation of generic cut-through routing which is based on ATM cells rather than frames. based on the mac address the vlan is configured in the switch ports Multilayer switching Multilayer switching is simply the combination of traditional Layer 2 switching with Layer 3 routing in a single product. Bridges also cannot use redundant paths. analysts. This can result in inefficient use of network resources. Vlan is virtual lan it used to put some interface in one broadcast domain and some interfaces in another.

Explain the contents of a routing table (default route. Explain how traceroute. The number of components in the system is unlimited. etc. No ACK is required for the data sent to the network.0 router(config)#no shut router(config)#exit router(config)#interface serial0 router(config-if)#ip adreess 20. next hop. cisco says invalid to broad cast adreess but rule can be broken by applyong comand #ip-subnet zero Network engineer/architect interview questions 1. conigure.0. In addition to basic IP routing. from a Input Module to a Personal Mixer. and tcpdump work and what they are used for? Describe a case where you have used these tools to troubleshoot. #11 Each A-Net component in a system can have up to 500 feet (150 meters) of Category 5e cable (UTP. but may not perform as well as solid wire at extreme distances. Also. used in a faster network.0. It provides error recovery & detection under Layer 4 of OSI adrees mask and broad cast router>enable router#config t router(config)#interface ethernet0/0 router(config-if)#ip adreess 10.0. Unshielded Twisted Pair) between it and the next A-Net component (for example.0. stranded and solid.0. Stranded wire is more flexible. 7. #11 Each A-Net component in a system can have up to 500 feet (150 meters) of Category 5e cable (UTP.0. or from one Personal Mixer to another in series). Cat-5e cable comes in two varieties. 2.0. The number of components in the system is unlimited. and multiple priority levels to assist in quality of service. 3. Q#12 .2 255. . the TCP works in reliable network which offers secured communication and no loss of data. What is the last major networking problem you troubleshot and solved on your own in the last year? What LAN analyzer tools are you familiar with and describe how you use them to troubleshoot and on what media and network types. from a Input Module to a Personal Mixer. the application like TFTP prefers using UDP for its transport layer communication.0. Its a connectionless protocol. stranded and solid. Also. it supports IP multicast routing. ping. but may not perform as well as solid wire at extreme distances. 6. VLAN segregation. 5.implements dynamic routing protocols such as OSPF and RIP.TCP is a connection oriented protocol which works on ACK based communication. Cat-5e cable comes in two varieties. Unshielded Twisted Pair) between it and the next A-Net component (for example.2 255. or from one Personal Mixer to another in series). Stranded wire is more flexible.0 router(config-if)no shut router(config-if)#clock rate 6400 router(config-if)#exit by this comand we can assign n/w adreess and ip mask. UDP is a User Datagram Protocol.) What routing protocols have you configured? Describe the commands to set up a route. 4.

frequent priority shifting. Describe how VoIP works. e. You need to retrieve a file from the file server for your word processing application. How do you manage a long term demanding stressful work environment? Have you worked in an assignment based environment. Describe methods of QoS. Application layer B. Describe what network statistics or measurement tools you are familiar with and how you have used them. etc.g. team or individual. spoofing. which is run from the file server. 20. Session layer D. 27. 22. Transport layer E. Presentation layer B. 10. What is a network management system? Describe how SNMP works. 28. . Static Routes? What do you see as current networking security issues (e. 9. Datalink layer 2. What routing problems have you troubleshot? How do you display a routing table on a Cisco? On a host? How do you use a routing table and for what? What is a route flap? What is a metric? When do you use BGP. 16.g. IGRP. 21. 19. Network layer E. How does ToS bit work? CCNA/Cisco admin interview questions 1.g. OSPF. Session layer D. 30.)? Describe a routing filter and what it does. 11.8. Datalink layer You are working in a word processing program. 18. which layer of the OSI model is responsible for this function? A. 15. Presentation layer C. 24. 17. Describe what a VPN is and how it works. 23. 25. Which layer of the OSI model would you investigate? A. 12. frequent interruptions. Application layer C. describe that environment. What do you use to write documentation? Editor? Mail reader? What platform (s) do you currently work on at your desk? How do you manage multiple concurrent high level projects? Describe a recent short term stressful situation and how you managed it. NFS mounting. work request/trouble ticket system. 14. 13. one time passwords. Describe an access list and what it does. and if so. Describe the working environment you are currently in. 26. e. Your data comes back to you in an unintelligible manner. 29.

Removable media 7. A. ESC-P B. write term C. Network layer B. Session layer C. C. Alt-P 9. It adds header and trailer information that is available to its counterpart on the system that will receive it. Which layer of the OSI model is responsible for code formatting and conversion and graphic standards. D. Routers can be configured using several sources. IP 4. Which commands will display the active configuration parameters? A. Select which of the following sources can be used. show version D. Flash D. Physical B. Which combination of keys will allow you to view the previous commands that you typed at the router? A. RAM/DRAM 8. MAC C. ROM B. Which memory component on a Cisco router contains the dynamic system configuration? A. Session E. display term . Console Port B. Transport layer D. Each layer of the OSI model uses compression to put the PDU from the upper layer into its data field. It adds header and trailer information that is available to its counterpart on the system that will receive it. Data always needs to be tunneled to its destination so encapsulation must be used. What are the two layers called? A. B. Presentation layer 5. Each layer of the OSI model uses encryption to put the PDU from the upper layer into its data field. You are working with graphic translations. show running-config B. Which is the best definition of encapsulation? A.3. Shift-P D. The IEEE subdivided the datalink layer to provide for environments that need connectionless or connection-oriented services. LLC D. Ctrl-P C. It adds header and trailer information that is available to its counterpart on the system that will receive it. Floppy disk E. 6. A. NVRAM C. TFTP Server D. Each layer of the OSI model uses encapsulation to put the PDU from the upper layer into its data field. Virtual Terminals C.

Router(config-if)#netmask-format { bitcount | decimal | hexadecimal } B. Which processes does TCP. The following selections show the command prompt and the configuration of the IP network mask. use? A. Source Port D. C. : E. but not UDP. PPP . Which layer is responsible for flow control with sliding windows and reliability with sequence numbers and acknowledgments? A.255″ accomplish? A. What does the command “IP name-server 255.10. Which two are correct? A. Acknowledgements C. which prompt tells you that you are in the privileged EXEC mode? A. Router(config-if)#IP netmask-format { bitcount | decimal | hexadecimal } D. Destination Port 15. You are configuring a router. # 11. ! D. @ B. Router#ip netmask-format { bitcount | decimal | hexadecimal } 13. Select which protocols use distance vector routing? A. OSPF B. D. Application C. It disables domain name lookup. RIP C. B. Windowing B. IGRP D. Router#term IP netmask-format { bitcount | decimal | hexadecimal } C. Internet D.255. This is an illegal command. The command is now defunct and has been replaced by “IP server-name ip any” 12. > C. Network Interface 14. Transport B. It sets the domain name lookup to be a local broadcast.255.

1 15.3 2) 2 3) 2&3 4) 4 5) 4 6) 1&2 7) 4 8) 2 9) 1&3 10) 5 11) 3 12) 3 13) 1 14) 1&2 15) 2&3 1) 5 2) 4 3) 2&3 4) 4 5) 3 6) 1 7) 4 8) 2 9) 1 10)3 11)2 13) 1 14)1 15)2 1.2.2 3. 2 6.4 15) 2. 1.3 3: 2.5 11.3 7. 4 12.1 10.3 1) 2 2) 1 3) 2.2. 4 8. 3. 2.2 2. 1 3. 1 10.2.4 5.1 14.4 6.2 9. 4 5. 5 11.2 8.4 12 13.2. the server will send back another packet with sequence "y". how does the three-way handshake work in opening connection? A: The client first sends a packet with sequence "x" to the server. 1 15.3 3. When the .4 4.2 8.4 6.4 5.3 1) 2 2) 3 3) 2&3 4) 4 5) 4 6) 1&2 7) 2 8) 3 9) 1&3 10) 5 11) 2 12) 1&3 13) 1 14) 1&2 15) 2 1. 1 14.3 4) 4 5) 4 6) 1 7) 3 8) 2 9) 1 10) 5 11) 3 12) 3 13) 1 14) 1.2 7.3 12.2.1 10.3 13.5 11. When the server receives this packet. acknowledging the request of the client.2 4.3 4.3 7.2 9.2 2.2 15: 2.1.3 4: 4 5: 4 6: 1. 3 13.1. 2 9.2 2.2 7: 4 8: 2 9: 1 10: 5 13: 1 14: 1.1.2 15.1 14.1 Networking and protocols interview questions Q: In the TCP client-servel model.

there are five bits for the subnetwork.x . fixed-size cells reduces queuing delay and can be switched quickly. A.0 This is regarding the question :Q: Given a Class B Network with subnet mask of 255.248. Q: Given a Class B Network with subnet mask of 255. Session.32. j < N. k++ ) C[i][j] = A[i][j]*B[k][j]. and Physical. matrix C) { int i. what is the subnet address? As the solution mentions. then AND them.255. what is the subnet address? A: Take the 2 addresses. Q: What is the purpose of exchanging beginning sequence numbers during the the connection in the TCP client-server model? A: To ensure that any data lost during data transfer can be retransmitted. meaning the subnetwork of the given IP has the value 16. for ( i = 1. They are Application. Network.40. } retrun. the client will then send an acknowledge back to the server for acknowledging that sequence "y" has been received. ATM provides Quality of Service and traffic shaping. From the given mask.32. So the sub-network would be 130. j++ ) { C[i][j] = 0. Q: How does Asynchronous Transfer Mode (ATM) work? A: ATM works by transmitting all traffic in small. The mentioned answer 130. These small. write them in binary form. in the third octet. Transport. Comments welcome.248. Data link. k < N.16. j. we need to AND the mask and IP. } . k. Name of seven layers in Open System Interconnection model.32. i++) for ( j = 1.40.32. for ( k = 0. At the port interface.0 and a packet addressed to 130. and vice versa. ATM switches convert cells into frames. matrix B.255.16. Presentation. ATM fits into layer 2 of the OSI model and provides functions for framing and error correction.client receives the acknowledgement from the server. fixed-sized cells.16.40.40. The first two octets we know represent the network address of the class B IP. The answer is 130.0 and a packet addressed to 130. What is the time complexity of matrix multiplication ? void Mult_Matrix(matrix A.0 would be true if the third octet in the mask was 255. i < N.40. Q2. Networking interview questions Q1.

Session Layer . What is the difference between an abstract class and an interface? A. Question 2: What is multiprogramming? Multiprogramming is a rapid switching of the CPU back and forth between processes. It can be written as the constant NULL form stlib. Question 3: Name the seven layers of the OSI Model and describe them briefly.attempts o make the physical link reliable and provides the means to activate. The goal is to completely fill the distance array so that for each vertex v. Physical Layer . What is the goal of the shortest distance algorithm ? A. The null pointer is a special C++ pointer value that can be used for any pointer that doesn’t pointer anywhere. Data Link Layer . What is the null pointer in C++ ? A. the value of distance[v] is the weight of the shortest path from start to v. An abstract class may have fields and some implemented methods. An interface has no implementation. . The time comlexity of matrix mulitiplication is O(N^3) Q3. Network Layer .provides a mechanism for the exchange of data between end system. Q5.provides the mechanism for controlling the dialogue between applications in end systems. only constants and method declarations. maintain. Network programming interview questions Question 1: How does the race condition occur? It occurs when two or more processes are reading or writing some shared data and the final result depends on who runs precisely when. and deactivate the link. Transport Layer .A.covers the physical interface between devices and the rules by which bits are passed from one to another.provides for the transfer of information between end systems across some sort communications network.h Q4.

TCP is designed to provide reliable communication across a variety of reliable and unreliable networks and internets. Question 4: What is the difference between TCP and UDP? TCP and UDP are both transport-level protocols. what is the problem? A.What is the meaning of the output MTU 1500 bytes? A. An organization connects two locations.STP has blocked one of the links between the switches. supporting two VLANs. Thus. VLANs added to Switch1 are not learned by Switch2.The maximum segment size that can traverse this interface is 1500 bytes. Inter-VLANs communication is not required. through two switches as shown.A router is required to route VTP advertisements between the switches.The links between the switches are access links. C. B.Switch2 should be configured as a VTP client.The minimum segment size that can traverse this interface is 1500 bytes. D. UDP is basically an unreliable service.VTP is Cisco proprietary and requires a different trunking encapsulation. Based on this information and the partial configurations in the exhibit. . so it has been decided to implement VTP. D. Question 5: What does a socket consists of? The combination of an IP address and a port number is called a socket. UDP provides a connectionless service for application-level procedures. Application Layer . Answer: D Question:2 Refer to the exhibit.The minimum packet size that can traverse this interface is 1500 bytes. E. The network is working properly and there is full connectivity.limiting connectivity. Both switches are configured as VTP servers in the same VTP domain.The maximum number of bytes that can traverse this interface per second is 1500. delivery and duplicate protection are not guareented.provides a means for application programs to access the OSI environment.defines the format of the data to be exchanged between applications and offers application programs a set of data transformation services. Question:1 Refer to the exhibit.Presentation Layer . The organization needs to add additional VLANs. C. B.

Answer: E Question:3 Which statement is correct about the internetwork shown in the diagram? A.0 255.ip route 10.0. Host A cannot access Server1.0. F.The maximum packet size that can traverse this interface is 1500 bytes.255. Based on the output from RouterA. s0/0/0 D. E.The maximum frame size that can traverse this interface is 1500 bytes. F.0 255.0 are unable to reach hosts in network bytes D.No collisions can occur in traffic between Host B and Host C.E.255.Switch 2 is the root bridge.2.191K bytes B.255.What is the largest configuration file that can be stored on this router? A.0. C.0 192.2 B.255.255.2. B.0 s0/0/0 E.1.0 255.0 255.Spaning Tree is not runing. what are two possible reasons for the failure?(Choose two) .0.2.1 C.168.ip route 192.If Fa0/1 is down on Switch3. Answer: C Question:4 Refer to the digram.168.255.ip route 192.168. D.255.If Fa0/0 is down on Router1.16384K bytes C.1.114688K bytes Answer: A Question:5 Refer to the exhibit. Answer: A Question:6 Refer to the exhibit Hosts in network 192.Host D and Server 1 are in the same network.0 192.ip route 192.Which command will created a default route on Router B to reach all networks beyond routerA? A.0 0. Host C cannot access Server2.ip route 0.0.

23. Which switch provides the spanning-tree designated port role for the network segment that services the printers? A.00:00: Answer: A Question:9 Refer to the exhibit. FastEthemet0/0 208. what information will Router_E contain in its routing table for the subnets[110/1] via 190.96[110/3] via 190.After link-state advertisements are received from Router_A.23.Interface S0/0 on RouterA is configured with an incorrect subnet mask.The cable that is connected to S0/0 on RouterA is faulty.[110/13] via 190.Interface S0/0 on RouterB is administratively down.149.The IP address that is configured on S0/0 of RouterB is not in the correct subnet.10.00:00:16. FastEthemet0/0 B.Switch1 B. B. F Question:7 Exhibit: A. C. 208.00:00:07.149. FastEthemet0/0 D. Serial1/0 208.23.96[110/13] via 190. E.64[110/3] via 190. The network is converged.172.149.64 and 208.96[110/13] via 190.23.10. Serial1/0 Answer: A . Serial1/0 208.149.23. Answer: E.The encapsulation that is configured on S0/0 of RouterB does not match the encapsulation that is configured on S0/0 of RouterA.96? A. Serial1/0 208.00:00: F.96[110/3] via 190.00:00:07.149.10.SWitch2 C. D.173. D.Interface S0/0 on RouterA is not receiving a clock signal from the CSU/DSU.23.00:00:16.173. Answer: A Question:8 Refer to the exhibit.10.64[110/13] via 190.173. Serial1/0 208.00:00:16.23. FastEthemet0/0 C.64[110/13] via 190. 208. 208.

what does this confirm? A.The PC has the TCP/IP protocol stack correctly imstalled. B. Router1 will strip off the destination IP address and replace it with the IP address of Host B. Router1 will forward the data frame out interface FastEthernet0/2.1 from the command line prompt on a PC. C.0. Router1 will strip off the source MAC address and replace it with the MAC address on the forwarding FastEthernet interface.Question:10 Exhibit: A. Host A is to send data to Host B. Router1 will strip off the destination MAC address and replace it with the MAC address of Host B. If a reply is received. E.The PC has connectivity with a local host. Answer: A.0. D. Router1 will strip off the source IP address and replace it with the IP address on the forwarding FastEthernet interface.11 Mbps C.The PC has connectivity up to Layer 5 of the OSI model.54 Mbps D. Answer: A Question:11 An administrator issues the command ping 127. F.) A.11b WLANs? A.The PC has connectivity with a Layer 3 device.The PC has a default gateway correctly configured D. B.10 Mbps B.100 Mbps Answer: B Question:13 Refer to the exhibit.C. How will Router1 handle the data frame received from Host A? (Choose three. E. Router1 will forward the data frame out interface FastEthernet0/1. C.F . Answer: E Question:12 What is the maximum data rate specified for IEEE 802.

There is a mismatch in the encapsulation type. Assure that the network server has adequate space for the IOS image. B. B.) A. Verify file naming and path requirements. Check that authentication for TFTP access to the server is set. C. Which interfaces are access ports? (Choose three. No keepalive messages are received. E. Answer: B. D. Adjust the TCP window size to speed up the transfer. Switch1 – Fa 0/2 B. What are possible causes for this interface status? (Choose three. Switch2 – Fa 0/3 D. The associate knows that the server in VLAN 4 provides the necessary resources to support the user hosts in the other VLANs.) .) A.D Question:16 The show interfaces serial 0/0 command resulted in the output shown in the graphic. Switch1 – Fa 0/9 C.C. Which two statements are correct regarding the router hardware? (Choose two. Make sure that the server can be reached across the network. Switch2 – Fa 0/4 E. Answer: A. Make sure that the server can store binary files.) A.C.Question:14 What should be done prior to backing up an IOS image to a TFTP server? (Choose three. F.F Question:17 Refer to the partial command output shown. D. No loopback address is set. Switch2 – Fa 0/8 F.D Question:15 A network associate is trying to understand the operation of the FLD Corporation by studying the network in the exhibit. No cable is attached to the interface. E. The clockrate is not set. The interface is shut down.C. The associate needs to determine which interfaces are access ports. Router – Fa 1/0 Answer: A. C. F.

Total RAM size is 32 KB. D. The network administrator failed to save the configuration. The boot system flash command is missing from the configuration. OSPF E. The router is configured with the boot system startup command.service password-encryption access-list1 permit 192. Total RAM size is 65536 KB (64 MB).255 login password cisco access-class 1 . Which set of commands will accomplish this task? A. For anyone viewing the configuration and issuing the show run command. A network administrator configures a new router and enters the copy starup-config running-config command on the router. EIGRP Answer: B.0. RIP v1 B.) A.F Question:20 A network administrator needs to allow only one Telnet connection to a router. When the router starts. BGP F. E.0. Answer: C. Answer: A Question:19 Which routing protocols can be used within the enterprise network shown in the diagram? (Choose three.D. F. Flash size is 32 KB. What is the cause of the problem? A.1. Flash size is 16384 KB (16 MB).0. E. C. B. The configuration register is set to 0*2100. IGRP D. Total RAM size is 16384 KB (16 MB). The configuration register is set to 0*2102. the password for Telnet access should be encrypted. RIP v2 C.E Question:18 Refer to the exhibit. D.0. Flash size is 65536 KB (64 MB). B. C.168.A. The network administrator powers down the router and sets it up at a remote location. it enters the system configuration dialog as shown.

service password-encryption line vty0 4 login password cisco Answer: C .service password-encryption line vty0 login password cisco D.enable password secret line vty0 login password cisco C.B.

Sign up to vote on this title
UsefulNot useful