Professional Documents
Culture Documents
Answer:To initial things to enable ipx routing using by ipx routing protocol.
Answer:
• Standard
• Extended
Q3)What is subnetting?
Answer:A layered network offers of many advantages. Allow the administartors to make
the change in one layer without changes in other layers.
Answer:
Answer:
• Using dotted-deciaml
• Using binary
• Using hexadeciaml
Q10)Expand of HDLC?
Q11)What is Bandwidth?
Answer:To refer the transmission capacity of a medium. will measure how much of
volume a transmission channel.
Answer:
Answer:Segments are section of a data stream that comes from the upper OSI layers.
Answer:
Q17)Expand DLCI?
• Secret
• virtual
• Terminal
• Console
• Auxillary
Answer:Segmenting a network would help network traffic and ensures that high
bandwith.
Answer:
Answer:
• Class a: 10.0.0.0-10.0.0.255
• Class b:172.16.0.0-172.31.0.0
• Class c:192.168.0.0-192.168.0.255
Answer:
• Telnet
• Aux
• Console
Answer:
• Bandwidth
• Load
• Delay
• Reliability
• Mtu
Answer:Ctrl+shift+F6 and x.
Q31)Define DMZ?
Q33)The CISCO IOS firewall feature act as a stateful or stateless packet filter?
Answer:
Answer:0.0.0.255
Answer:255.255.0.0
Q40)Expand BGP?
Answer:
Answer:Physical layer
Answer:
• Distance vector
• Link-state
• Balanced hybrid
Answer:Ad= 170
Answer:Will check the next hop attributes to determine next hop is accessible.
Answer:Rip broadcast its routing table after reach 30 sec OSPF only entries the update of
missing neighbor routing tables.
Become an CCNA Expert with Certification in 25hours
Q51) Define Network?
Answer: Network all in all terms implies a gathering of gadgets, associated with the
assistance of a few media so as to share a few assets from a source to a goal and
networking is a procedure of sharing the assets.
Answer: Directions connected on client mode can’t impact the switch while a few
directions of benefit mode can change the arrangements. In client mode, no setup can
be made. We can just check the reachability and some essential directions in that mode.
While in Privilege mode we can spare, erase and change the design documents.
Q54) What is the variance between broadcast domain and collision domain ?
Answer: In a network, flooding is the sending by a switch of a parcel from any hub to
each other hub connected to the switch with the exception of the hub from which the
bundle arrived. Flooding is an approach to disseminate directing data refreshes rapidly
to each hub in a substantial network.
Answer: A network convention that enables a client on one PC to sign onto another PC .it
utilizes TCP Port number 23
Answer: Gateway is a node of a network which can be utilized as a passage for other
network. It is a bit of equipment and not quite the same as default gateway.
Answer: A wide area network (WAN) is a network that exists over a vast scale land area. A
WAN associates diverse littler networks, including neighborhood (LANs) and metro area
networks (MANs). This guarantees PCs and clients in a single area can speak with PCs
and clients in different areas..
Answer: In Cut-Through LAN exchanging, when the switch gets the information outline,
it will promptly send it out again and forward it to the following network portion in the
wake of perusing the goal address.
Answer: An association between two hubs of the system is alluded as point to point
organize and that interface which associates the two hubs is point to point connect.
Point-to-point convention is generally utilized for the heavier and quicker connections
essential for broadband correspondences.
Answer: A virtual private system (VPN) expands a private system over an open system,
and empowers clients to send and get information crosswise over shared or open
systems as though their processing gadgets were specifically related with the private
system. Applications running over the VPN may Therefore profit by the usefulness,
security, and the executives of the private system.
Answer: System inactivity is an outflow of how much time it takes for a parcel of
information to get starting with one assigned point then onto the next. In a few
conditions idleness is estimated by sending a parcel that is come back to the sender; the
round-trip time is viewed as the dormancy.
Answer: With the assistance of subnetting we can break a huge system into littler
systems and allot IP delivers to those systems without changing our significant system. It
helps in using our IP tends to all the more effectively.
Answer: DOS (Disk Operating System) is a working framework that keeps running from a
hard plate drive. The term can likewise allude to a specific group of circle working
frameworks, most generally MSDOS (Microsoft Disk Operating System).
Answer: Gateway-to-Gateway convention is currently out of date. This was being utilized
for steering datagrams between web gateways. It utilizes Minimum jump Algorithm.
Answer: On the off chance that one workstation on the system endures a glitch, it can
cut down the whole system. Another downside is that when there are modifications and
reconfigurations should have been performed on a specific piece of the system, the
whole system must be briefly brought down also.
Answer: Multi-homed have is characterized as a hub associated with more than one
systems. Like a PC can be associated with both Home system and a VPN. These sort of
hosts can be doled out with various locations, one for each system.
Q72) What is OSPF?
Answer: OSPF represents Open Shortest Path First. It is a connection state directing
convention that can associate an expansive number of systems without having any
confinement to number of jumps. It utilizes Dijkstra Algorithm and thinks about Cost as
its measurement. It has AD of 110 and utilizations the ideas of Areas, Router-id, Process-
id and Virtual connection for availability.
Answer: Directing is a procedure of trading course data shape one switch to another.
Without directing it is difficult to associate at least two systems situated at various or
same land territories.
Answer: Edge transfer is a bundle exchanging media transmission benefit intended for
cost-proficient information transmission for discontinuous traffic between neighborhood
(LANs) and between endpoints in wide region systems (WANs).
Switches bolster full duplex information exchange correspondence. As layer 2
conventions headers have no data about system of information parcel so switches can’t
forward information based or arranges and that is the reason switches can’t be utilized
with vast systems that are partitioned in sub systems.
Switches can stay away from circles using spreading over tree convention. Switches can
have 24-48 ports and can be for all intents and purposes boundless ports since they
don’t partition speed dissimilar to Hubs.
Switches
Switches are the system gadgets that work at Layer-3 of OSI demonstrate.
As layer-3 conventions approach legitimate location (IP addresses) so switches have the
ability to forward information crosswise over systems.
Switches are undeniably more component rich when contrasted with switches.
Switches keep up directing table for information sending.
Switches have lesser port densities when contrasted with switches.
Switches are typically utilized as a sending system components in Wide Area Networks.
Q79) What are the criteria essential for a compelling and productive system?
Answer:
Execution
It can be estimated from numerous points of view, including transmit time and reaction
time.
Dependability
It is estimated by recurrence of disappointment, the time it takes a connection to
recuperate from a disappointment, and the system’s power.
Security
Security issues incorporate shielding information from unapproved access and infection
Answer: Switch doesn’t communicate on every one of the ports. They can be overseen
and vlans taxi be made. They are quick, can store MAC addresses. They additionally don’t
isolate the speed on every port.
The principle favorable position of utilizing switches is that each switch port has its very
own impact space which expels the occurance of crash of casings. It advances the
bundles dependent on the goal address, along these lines eleminating superfluous
sending of parcels to all ports as in center points.
Answer: Clog happens when transfer speed is lacking and arrange information traffic
surpasses limit.
Answer: No, What an extension really does is to take the huge system and channel it,
without changing the extent of the system.
Answer: Control over Ethernet or PoE pass electric power alongside information on
contorted match Ethernet cabling. This enables a solitary link to give the two information
association and electric capacity to gadgets, for example, remote passageways, IP
cameras, and VoIP telephones. It limits the quantity of wires required to introduce the
system.
Q87) When were OSI show created and why its standard called 802.XX, etc?
Answer: OSI display was created in February1980 that why these additionally known
as802.XX Standard 80 implies =1980 and 2means =February.
Answer: Means “Shared.” In a P2P arrange, the “peers” are PC frameworks which are
associated with one another by means of the Internet. Documents can be shared
specifically between frameworks on the system without the need of a focal server. At the
end of the day, every PC on a P2P organize turns into a record server just as a customer.
Answer: Ping is an utility used to test the availability in the system. It represents Packet
Internet Groper.it utilizes ICMP [internet Control message convention ]Protocol.
Answer: Steady SPF is more proficient than the full SPF calculation, in this manner
permitting OSPF to meet quicker on another steering topology in response to a system
occasion. The steady SPF is structured so that it just updates the influenced hubs without
revamping the entire tree. This outcomes in a quicker combination and spares CPU
cycles on the grounds that the unaffected hubs don’t should be prepared. Concerning
the best practice ISPF would have to a greater extent an effect for a substantial OSPF
area.
Gradual SPF gives more prominent enhancements in combination time for systems with
a high number of hubs and connections. Gradual SPF additionally gives a huge preferred
standpoint when the adjustments in the system topology are further far from the
foundation of the SPT; for instance, the bigger the system the more critical the effect. A
fragment of 400-1000 hubs should see upgrades. In any case, it may be difficult to
confirm in a sent generation arrange without some sort of office or instrument to gauge
the start to finish delay. For more data, allude to OSPF Incremental SPF.
Q93) Is there any component of OSPF convention for speedy combination and a
moderate re-intermingling of courses?
Answer: The OSPF Shortest Path First Throttling highlight makes it conceivable to design
SPF planning for millisecond interims and to possibly postpone SPF estimations amid
system insecurity. SPF is planned to figure the Shortest Path Tree (SPT) when there is an
adjustment in topology.
Sentence structure of the order under OSPF:
clocks throttle spf [spf-start] [spf-hold] [spf-max-wait] Where:
spf-begin—Initial postponement to plan a SPF count after a change, in milliseconds.
Range is from 1 to 600000.
spf-hold—Minimum hold time between two back to back SPF computations, in
milliseconds. Range is from 1 to 600000.
spf-max-pause—Maximum hold up time between two back to back SPF computations, in
milliseconds. Range is 1 to 600000.
For more data on the OSPF Throttling highlight, allude to OSPF Shortest Path First
Throttling.
Answer: OSPF sends all notices utilizing multicast tending to. Aside from Token Ring, the
multicast IP delivers are mapped to MAC-level multicast addresses. Cisco maps Token
Ring to MAC-level communicate addresses.
Answer: Cisco OSPF just backings TOS 0. This implies switches course all parcels on the
TOS 0 way, wiping out the need to compute nonzero TOS ways.
Q96) Does the balance list subcommand work for OSPF?
Answer: The counterbalance list direction does not work for OSPF. It is utilized for
separation vector conventions, for example, Interior Gateway Routing Protocol (IGRP),
Routing Information Protocol (RIP), and RIP adaptation 2.
Q97) Can an OSPF default be begun into the framework dependent on outer data on
a switch that does not itself have a default?
Answer: OSPF creates a default just on the off chance that it is arranged utilizing the
direction default-data begin and if there is a default organize in the case from an
alternate procedure. The default course in OSPF is 0.0.0.0. In the event that you need an
OSPF-empowered switch to create a default course regardless of whether it doesn’t have
a default course itself, utilize the direction default-data start dependably.
Q98) When I issue the show ip ospf neighbor order, for what reason do I just observe
FULL/DR and FULL/BDR, with every single other neighbor demonstrating 2-
WAY/DROTHER?
Answer: This message is identified with the DBD trade process, which utilizes a grouping
number for the synchronization of the database. For reasons unknown an awful
grouping number was accounted for in the DBD parcel. This may happen as a result of
transient conditions, which incorporates bundle misfortune or parcel defilement.
Answer: We have 4 layers in TCP protocol. Taken reference from Osi model. Names as
Appplcation , transport, internet , network. We are following TCP/Ip globally.
Answer: Physical layer convert electrical signal into binary form as 1 or 0. This is sort of
physical connection with two device with CAT 5 cable.
Answer: Here Physcial address of device is called as Mac address received from device. It
provide layer 2 connectivity to any network.
Answer: Transport layer provides two type of facility as TCP or UDP port. A per
reqirement of communication we can get services like this.
Answer: It provide Facility to Recived data from application to encrypt or decrypt the
data. It provide fragmentation of data packet.
Q109) What is function of application layer?
Answer: It is medium between Network or user. User Directly have access of Application
like service as TFTP, FTP, DNS, DHCP
Answer: We user send some request if everyone is listening then it is term as broadcast
domain. Every user will get packet but only specific user is able to reply to request.
Answer: Collision domain mean we use Network in which data transmission and
receiving happening at same time. Packet get corrpted. This technology maily used in
Hub devices.
Answer: When we are doing either transmission or receiving then it is called half duplex
while full duplex means that when transmission and receiving happens on same time
Answer: Vlan is a virtual Lan. In layman language it is switch inside switch. We segregate
our switch port into different Vlan to divide single broad cast domain into different
broadcast domain.
Answer: We can communicate between two Vlan with the help of Router. Without router
we can’t do communication between two VLan.
Answer: By default all port of switch is part of native vlan. By-default Native is 1.
Q118) What is purpose to create separate Vlan?
Answer: Purpose to create different vlan is to separate single broadcast domain into
many different broadcast domain. Link we can make four port part of engineering deptt
or 4 port of IT depptt.
Answer: VTP is vlan tracking protocol. We generally create vlan on server and all created
vlan replicate to client.
1. Server
2. Transparent
3. Client.
Answer: No , Transparent does not participate in VTP process. But it passes the vlaan
information to client act as transit device.
Answer: Vlan.dat file contain all information of created vlan. If we delete vlan.dat file
from Device then we will lose all instance of vlan.
Answer: Spanning tree protocol is used to avoid loop in switching environment. By this
mechanism we we block port to avoid loop in switches.
Answer:
• Blocking
• Listening
• Learning
• Forwarding
Answer: STP elect Root bridge based on Priority and mac address. Lower the priority wins
the race. If we have same priority configured then we have other option as MAC address
as tie breaker.
Answer: All prot on Root bridge is called Designated port. Which send BPDU from Root
bridge. While port directly connected to other switch is root port. It Receive BPDU sent
by Root bridge.
Answer: Rapid spanning tree protocol I advance version of STP. As STP converge time I
too low. As per Rapid spanning tree we get fast convergence.
Answer: It is common spanning tree protocol. It create one instance of spanning tree.
Answer: Per-vlan spanning tree protocol. We can utilized our Distribution router by
creating per vlan STP. Every vlan have its own instance of STP.
Answer: RIP stand for Routing information protocol. It is classfull protocol as it send
complete routing table every 30 min. It have 2 version. RIP ver 1 and RIP ver 2. IT is
outdated protocol.
Answer: Eigrp stands for Enhanced interior gateway protocol. IT have both distance
vector and link state functionality. It was cisco priority protocol. EIRGP protocol number
is 88
Answer: It reduce overhead on routing table and we can implement Area as per
customer demand.
• ASBR LSA
• AREA type
• Area
• Network
• Authentication
• hello/dead interval
Answer: Area 0 in Ospf I called as Backbone area as to avoid loop mechanism every are
must pass traffic from backbone area.
Answer: ABR is Area boarder router and ASBR is autonomus system boarder router.
Answer:
Unicast mean one way communication. Device A sending packet to device B.
Multicast when a group of people want update on multicast ip.
Broadcast when all device receive packet is called broadcast.
Answer: Internet
Get CCNA 100% Practical Training
Q151) What does ARP stand for?
Answer: 0.0.9
Answer: 15
Q157) Once how many seconds EIGRP WAN interfaces sends Hello?
Answer: 60
Q158) What are the 2 components an SNMP managed network consists of?
Q159) What is the command to see only connected routes in a router’s routing
table?
Answer: 5
Answer: 90
Answer: OSPF
Answer: No
Q165) What is the protocol used by network devices to find out the MAC address of
neighboring devices?
Answer: ARP
Answer: VLAN 1
Answer: NVRAM
Answer: Yes
Q174) Which layer in the OSI stack does the DHCP belong to?
Q175) What is the command used to configure a Cisco router as an NTP server?
Q176) Which protocol is used by Cisco devices to discover information about the
locally attached Cisco equipment?
Answer: CDP
Q177) What is the command to view the contents of the flash memory?
Q178) How do you check the IOS version running on a Cisco device?
Q179) What are the three packets which make up the 3-way handshake process?
Answer: 48
Answer: Class C
Q186) What are the different protocols http uses for encryption?
Answer: 21
Answer: UDP 69
Answer: 20 bytes
Q190) Which type of cable is used to connect 2 computers together to transfer data?
Q191) To which layer does the NetBIOS protocol belong to is the OSI model?
Answer: Socket
Q194) What is the ethernet broadcasts on which ARP request packets are sent on?
Answer: FF:FF:FF:FF:FF:FF:FF:FF
Q195) What are the port numbers the DHCP server uses?
Answer: FE80::/10
Answer: TCP/IP Layer in OSI is used to mainly transport packets from one machine to
another machine via seven types of layer. These seven types of layers are:
• Transport Layer
• Network layer
• Physical layer
Answer: Switch can pass single broadcast domain whereas router can pass Multicast or
Unicast address. Switch sends Frames and Router sends Packet or IP address.
Answer: The main reason for having a subnet mask in Networking is to avoid IP wastage
in the Network.
Q202) What is Ethernet channel? Which protocols are used in the Etherchannel?
Answer: Ethernet Channel increases the bandwidth which is done by combining the links.
PAGP AND LACP are the protocols used in Ethernet Channel.
0.0.0.0 127.255.255.255
128.0.0.0 191.255.255.255
192.0.0.0 223.255.255.255
224.0.0.0 239.255.255.255
240.0.0.0 247.255.255.255
248.0.0.0 251.255.255.255
252.0.0.0 255.255.255.255
Answer:
Private address Class
Answer: VTP can be used for transferring VLAN information from one switch to other
switches.
1. VTP v1
2. VTP v2
3. VTP v3
Q211) What is the difference between VTP Version 1, VTP version 2 and VTP version
3?
Answer: VTP version 2 is same as VTP version 1 only difference comes with the support
of Token Ring Topology. VTP Version 3 can support Extended VLAN 0-4094, Private
VLAN, and MSTP.
Answer: Revision number is used for changing or editing in the VLAN, it will be
incremented by 1. For the security reason while adding new switches we should always
check the revision number.
Answer: Best path to reach from Root bridge to the destination is known as Root Port.
Answer: The port which is sending the BPDU packet is called Designated port.
Answer: When an attacker is trying to send a BPDU packet with ‘0’ priority values by any
tool then port will consider it as error invisible state. This is the working of BPDU Guard.
Answer: When the root port undergoes down alternate link up without any delay it is
known as Uplink fast.
Q220) What is the port number used for FTP, TELNET and SMTP?
Answer: These are the port number for their corresponding protocols:
21-FTP
23-TELNET
25-SMTP
Answer: The protocols used in Redundancy are HSRP, VRRP and GLBP.
Answer: Active: The Router that owns the virtual IP and MAC address is in active.
Standby: It is the backup for active router.
Answer: If the active router goes down then backup router will become active and when
the active router comes up by PREMPT command it will remain in active state.
Answer: MSTP is open standard for fast convergence and to avoid load.
• 1-STATIC
• 120-RIP
• 90 EIGRP INTERNAL
• OSPF 110
Answer: The multicast addresses for OSPF are 224.0.0.5 and 224.0.0.6.
Answer: OSPF uses two multicast address for DR and BDR communication and other
router communications.
• Point to point
• Broad cast
• Non broadcast
Answer: When successor goes down there is no feasible successor to reset the
connection it will take 3 min. This is called EIGRP stuck in active state.
Answer: OSPF is link state routing protocol whereas the EIGRP is an advanced vector
protocol.
Answer: Best path to reach the destination is decided by the successor in EIGPR.
Answer: Feasible successor in EIGRP is the backup path for the successor.
Answer: FD of the Successor is greater than AD value of the other path. This is called
feasibility condition in EIGRP.
Answer: AS: Routers having same administration and policy are in same autonomous
system and it indicates the same number.
Q242) What are the various states in the EIGRP?
• Hello
• Update
• Query
• Request
• Ask
Answer: The types of LSA are 1, 2, 3, 5 and 7 which are mostly used.
Answer: Router ID is used to identify the routers and to avoid loop in the OSPF network.
Answer: Root guard is a feature which receives BPDU in the port it will consider as an
inconsistent state.
Answer: Unique ID for the Router in the OSPF topology is known as Router ID.
Q251) What is the ratio of Hello timer to Dead timer in the OSPF topology?
Answer: 1:4 is the ratio of Hello timer to Dead timer in the OSPF topology.
Q252) In an OSPF topology what is the numbering given to the backbone area?
Answer: Area 0 is the numbering given to the backbone area in an OSPF topology.
Q256) Can a router within the Backbone area be configured with OSPF
summarization?
Answer: Router within the Backbone area can’t be configured with OSPF summarization.
Q262) If your AS is a transit AS, IBGP should be configured on all the routers within
the AS. True or False?
Answer: True.
Answer: If you see your own AS number in the AS path you don’t accept it since you
have a loop.
Q264) What is BGP split horizon?
Answer: When a BGP router receives an update from another internal BGP router, then it
will not forward this information to another internal BGP router, it is called BGP split
horizon.
Answer: Promiscuous Port the port in a Private VLAN which can communicate with all
other Ports.
Answer: Switch port without the forward delay and blocking timer is known as port fast.
Q291) What are the different load balancing methods for VRRP?
Answer: The different load balancing methods for VRRP are as follows: Round-Robin,
Host-dependant and weighted.
Q292) Which protocol is used for Load balancing and high availability?
Answer: The protocol used for Load balancing and high availability is GLBP.
Answer: RTP (Reliable Transport Protocol) is the protocol which EIGRP uses for reliability.
Q297) What is the Loop Address used for local testing purpose?
Answer: The Local Loop Address used for local testing purpose is 127.0.0.1
• Numbering Segment
• Multi Tasking
• Flow control
Answer: DHCP stands for Dynamic Host Configuration Protocol. It is based on the DORA
concept.
• Straight Cable
• Cross Cable
Answer: The two types of routes are Static Route and Dynamic Route.
Answer: Distance vector is the protocol used for sending Periodic updates after every 30
seconds.
Answer: SWITCH is the process to use the hardware of MAC address for understanding.
• Trunk Port
• SERVER MODE
• CLIENT MODE
• TRANSPARENT MODE
Answer: STP is the short form of Spanning Tree Protocol, which is used to understand the
Loop Address.
Answer: ACL stands for Access List Control. It is the list of commands used to filter the
packets in a router.
• STANDARD ACL
• EXTENDED ACL
• NAMED ACL
Answer: Frame Relay: It is a type of Packet Switching technology used when there are
two or more routers in a single interface.
Q318) Write the Router command used for displaying the RAM contents.
Answer: The Router command used for displaying the RAM contents is-
SHOW RUN/SHOW RUNNING –CONFIG
Q319) Write the command used for displaying the NVRAM contents.
Answer: The Router command used for displaying the NVRAM contents is-
SHOW START/SHOW START –CONFIG
Answer: APIPA stands for Automatic Private IP Addressing. The range of APIPA is from
169.254.0.1 to 169.255.255.254.
Answer: SYSLOG is used for storing log files for popular servers.
Answer: OSPF stands for Open Shortest Path First. Secondly Routing Tables is populated.
Answer: The major functions of SNMPV3 are Authentication, Encryption and Message
Integrity.
• Highest Router ID
• Highest IP Address
Answer: BPDU Guard is used for protecting the Switch port which is using the Port fast.
• Disabled
• Blocking
• Listening
• Learning
• Forwarding
Q329) What are the two types of protocols used in Ethernet Channel?
Answer: The two types of protocols used in Ethernet Channel are PAGP (Port
Aggregation Protocol) and LACP (Link Aggregation Protocol).
Answer: There are two types of modes in LACP i.e. Active mode and Passive mode.
Answer: There are two types of modes in PAGP i.e. Auto mode and Desirable mode.
Answer: ISATAP stands for Intra Site Automatic Tunnel Addressing Protocol.
Answer: Network Congestion takes place when two users try to use the same bandwidth.
Answer: Windows networking terms refer to the number of segments that are allowed to
the destination.
• NVRAM
• DRAM
• Flash Memory
Answer: BOOTP is the protocol to boot disk less workstations connected to a network.
Answer: It is the Ethernet to make use of Fiber optic cables in the main transmission
medium.
• Speaking
• Listening
• Disable
• Standby
• Active
• Root port
• Designated Port
• Blocking port
Answer: A Window alludes to the quantity of sections that is permitted to be sent from
source to goal before an affirmation is sent back.