You are on page 1of 14

CCNA Interview Questions for Freshers

1. Explain Routing.

Routing is basically a process of establishing the routes that data packets take on their way to
the destination. It is a process of selecting a path across one or more networks to move a data
packet from source to destination. Routing is generally performed in many types of networks
such as circuit-switched networks, computer networks, etc. It is considered as one of the most
essential features in a network and is done by a device called routers.

In the above diagram, the data packet moves from Computer A to Computer B. There are two
paths available:

1st- Network 1, 3, and 5


2nd- Network 2 and 4

It depends upon network routers to make a choice whether to pass through 1st or 2nd. The 1st
one is a long path but might be faster at forwarding packets whereas the 2nd one is a shorter
path. These are the kinds of choices that routers have to make constantly.

2. What do you mean by data packets?

Data packet is a unit of data that is made into a single package for transmission over a network.
They are also referred to as a network layer package and are also used by IP protocol as they
contain the IP information which is attached to each packet. They contain much essential
information like email messages, website data, and VoIP (Voice-over-IP) calls. Each data packet
has a unique numeric identification number that defines the packet number and order.

3. What do you mean by routers? Write its major functions.

Router is a networking device that is used to forward data packets along with a network from
source to destination. The devices are specially designed to receive, analyse, and forward data
packets between computer networks. It examines a destination IP address of a data packet and
uses its headers and routing table to determine the best way or route for transferring the
packets. There are some popular companies that develop routers like HP, Juniper, Nortel, Cisco,
etc.
Functions of Routers:

 Send and receive data on computer networks.


 Used to create local networks of devices
 Helps to connect multiple devices to the Internet.
 Allows users to configure the port as per their requirements in the network.
 Filter unwanted interference, and carry out the process of data encapsulation and
decapsulation.
 Used to segment network traffic.
 Prevent network bottlenecks simply by isolating portions of a network.
 Reduce excessive traffic.

4. Name types of routes that are available in routers.

Types of routes available in routers include:

Static Route: This route is also known as a non-adaptive route. It is either directly configured on
an active interface of the router or manually added to the routing table by an administrator.

Default Route: In this, the router is configured to send all packets towards a single router, and
it does not matter whether or not it belongs to a specific network. It is especially used when
networks deal with a single exit point.

Dynamic Route: This route is also known as the adaptive route. It makes automatic adjustments
of the routes as per the current state of the route in the routing table and also uses routing
protocols to find network destinations.

5. What do you mean by Switching?

Switching is a process in computer networks that enable us to interconnect links to form a larger
network. It works at the DLL frame and uses hardware address or mac address of devices on LAN
(Local Area Network) to segment a network.
6. Name two ports of Switches.

The two ports of switches include:

Access Port: It connects network hosts to a single VLAN and only carries the traffic of one VLAN.
In this, traffic is sent and received in native format without any VLAN tagging. Access ports are
basically used to connect switch ports with computers with a minimum of 10 Mbps speed.

Trunk Port: It generally connects to another switch and is able to interact with several other
VLANs. By default, it is a member of all VLANs in the VLAN database. The trunk port is basically
used for multiple connections between the switch to switch and switch to routers.

7. Name different IPX access list.

There are basically two different IPX access lists as given below:

Standard: Used to filter the source or destination IP address.

Extended: Uses source and destination IP addresses, protocol, socket, and port when fileting a
network.

8. What is the main objective of Data Link Layer and Transport Layer?

Data Link Layer: It is the 2nd layer of the OSI model which is generally responsible for
transferring the datagram across an individual link. It is considered one of the most complicated
layers and also has complex functionalities and liabilities. It also ensures that the appropriate
physical protocol is assigned to the data.

Transport Layer: It is the 4th layer of the OSI model which is responsible for providing
transparent transfer of data among end-users, thus providing reliable data transfer services to
the top layers. Its main objective is to deliver the entire message from source to destination.
9. What do you mean by 100BaseFX?

100BaseFX is basically an Ethernet media standard for Ethernet over fiber optic cables, rather
than twisted-pair cables. It is a version of Fast Ethernet that makes use of fiber optic cables as
the main transmission medium. Here, 100 refers to 100Mbps data speed that means it carries
data traffic at 100 Mbps in LAN.

10. Name the LAN Switching method that is mostly used in CISCO Catalyst 5000?

Store and forward switching method is mostly used by CISCO Catalyst 5000 because it stores the
entire frame to its buffers and executes a CRC check before deciding whether to forward that
data frame or not.
11. Name different memories that are used in CISCO routers.

Different memories that are used in CISCO router include:

 NVRAM (Non-volatile RAM): It is used to store startup configuration files. It also retains its
content even after a device is restarted or powered down.
 DRAM (Dynamic Random-Access Memory): It is used to store configuration files that are
being executed. It loses its content when a device is restarted.
 ROM (Read Only Memory): It is used to store a bootstrap program that initializes a boot
process. It also runs and maintains instructions for POST diagnostics.
 Flash Memory: It is used to store CISCO IOS. It can also be used to store other files such as
backup configuration files.

12. Write difference between tracert and traceroute.

Tracert: It is a Command Prompt command that is used to show various details about the path
that a packet takes from the source computer to the specified destination computer. It only uses
ICMP (Internet Control Message Protocol) echo requests. It can be used on a PC. This command
is generally used in Windows NT-based OS.

Traceroute: As the name suggests, it is a command that is used to trace the records of the path
that a packet takes from the source computer to the specified destination computer. It uses UDP
(User Datagram Protocol) echo requests. Traceroute command can be used on a router or switch.
This command is generally used in UNIX OS.

13. Explain HDLC.

HDLC (High-Level Data Link Control) is a group of communication protocols that usually
provides reliable delivery of data frames over communication or network link. It is a proprietary
protocol for CISCO and is the default encapsulation operated within CISCO routers. It also
ensures the error-free transmission of data and can provide both connection-oriented and
connectionless services.

14. What do you mean by DLCI?

DLCI (Data Link Connection Identifier) is basically a frame relay 10-bit-wide link-local virtual
circuit normally assigned by frame relay service to uniquely identify each virtual circuit that is
present on the network. It simply identifies which logical circuit the data travels over.

15. Name router command that is used to display RAM content and NVRAM
Content.

The router command that is used to display RAM content is “Show run/show running-config",
and the router command that is used to display NVRAM content is “Show start/show start-
config".
16. What do you mean by Frame relay?

Frame relay is basically a packet switching technology typically used to transfer data between
geographically separated LANs or across WANs. It simply provides connection-oriented
communication by developing and maintaining virtual circuits. It is cost-effective technology and
is generally used to join two or more routers with a single interface. It works on the data link
layer and physical layer of the OSI model.

17. What are three possible ways of data transmission in CCNA?

Three possible ways of data transmission in CCNA include:

Simplex: The Communication is unidirectional in Simplex mode, as on a single-direction road.


Just one of the two devices on a connection can communicate, the other can just get. The
simplex mode can utilize the whole limit of the channel to send information one way.

Half Duplex: Each station can transmit and receive in Half-duplex mode, however not
simultaneously. At the point when one device is sending, the other can just receive, and the
other way around. The half-duplex mode is utilized in situations where there is no requirement
for communication both ways simultaneously. The whole limit of the channel can be used for
every direction.
Full Duplex: Both stations can send and receive all the while in full-duplex mode. Signals that
are going in one direction share the capacity of the connection with signals going another way
IN this type of mode. This sharing can happen in two ways:

 Either the connection should contain two truly separate transmission ways, one for sending
and the other for receiving.
 The capacity is split between signals going in two ways.

Full-duplex mode is utilized when communication both ways are required constantly. The limit or
capacity of the channel, anyway, should be split between the two directions.

18. What do you mean by MTU?

MTU (Maximum Transmission Unit) is considered the largest size frame or packet that a
network-connected device will accept. Its default size is 1500 bytes which is the largest Ethernet
standard unit. TCP (Transmission Control Protocol) generally uses MTU to determine the
maximum size of each packet in any transmission.

19. What are different types of cables used in routing?

There are basically three different types of cables used in routing:

Straight Cable: These cables are used to connect different group devices. It is especially used in
LAN to connect different devices such as computers to a network hub like a router, PC and
switch, router and switch, etc. Its ultimate goal is to connect a host to the client.

Cross Cable: These cables are used to connect the same group of devices. It is considered one of
the most commonly used cable formats for network cables. It is especially used when two similar
devices need to be connected. Cross cables are also known as cross-wired cables.

Rollover Cable: These cables are used to connect the console port of the computer. This cable is
specially designed flat to help distinguish it from other types of cables. It generally allows
programmers to connect to network devices and can also manipulate the programming
whenever needed. Rollover cables are also known as Yost cable, Cisco cable, or a Console cable.

20. Explain network latency.

Network latency basically represents the delay in communication over a network. It simply refers
to the performance of one device when it communicates with another. It is the time taken for
some data to go from the source to its destination across the network. Network latency can be
affected by bandwidth speed, cabling, network card performance, and congestion.

21. What do you mean by User mode and Privileged mode?

User Mode: User mode is generally used to view the configurations of the routers. It allows us to
view basic system information, check router status, connect to remote devices, etc. User mode is
mostly used to perform regular tasks on the router when we are using a Cisco router.

Privileged Mode: Privileged mode is generally used to view all the configurations on the router.
It allows you to change configurations that are less important. Privileged mode is mostly used to
perform high-level tasks on the routers such as making configurations and debugging.

22. What do you mean by Windows in terms of networking?

In terms of networking, the window is the number of segments that are allowed to be transferred
from the source to the destination before any acknowledgment is sent.

23. What is the function of an LLC sublayer?

LLC (Logical Link Control) is basically the upper sublayer of the data link layer and acts as an
interface between the network layer and MAC sublayer of the data link layer of the OSI model.
This sublayer provides the logic for data link as it controls the synchronization, flow control,
multiplexing, and also error checking functions of the data link layer. It simply provides optional
services to an application developer.

CCNA Interview Questions for Experienced

24. What do you mean by EIGRP? Mention some metrics of EIGRP Protocol.

EIGRP (Enhanced Interior Gateway Routing Protocol) is referred to as Cisco's IGP (Interior
Gateway Protocol) that is used on a computer network especially for automating routing
decisions and configurations. This protocol is suited for different topologies and media. It is
mostly used on a router to share routes with other routers within the same autonomous system.

EIGRP Protocol generally includes the following metrics:

 Bandwidth
 Load
 Delay
 Reliability
 MTU
 Maximum Transmission Unit

25. What is CDP? Write its functions.

CDP (Cisco Discovery Protocol) is a Layer 2, media-independent, and network-independent


protocol that runs on all the Cisco devices that helps us to discover Cisco devices on the
network. This protocol works on the basis of MAC address. It also facilitates the management of
Cisco devices by discovering these devices, identifying how to configure them, and allowing
systems to learn about each other using different network-layer protocols. Some of its functions
include:

 Collects information about directly connected neighbouring devices.


 Find adjacent Cisco devices.
 Find out port numbers, IP addresses, router models, switch models, interface details, iOS details,
device ID-hostname.
 Simplifies the process of keeping an up-to-date inventory of Cisco network devices.
 Share information about other directly connected Cisco equipment like OS version, IP
addresses.

26. What do you mean by VLAN? Write its main objective.

VLAN (Virtual Local Area Network) is basically a logical group of workstations, services, or
network devices that communicate with one another on a separate physical LAN. It improves the
network performance or applies some additional security features. It also allows several networks
to work virtually as if they were a LAN sharing a single broadcast domain.
27. What are the benefits of using VLAN?

There are several advantages of using VLAN:

 Removes latency and traffic load on the network


 Saves network resources and increases network efficiency
 Reduces IT cost and the incidence of collisions
 Improve network security and performance
 Ensure network flexibility and provide easier management
 Make it easier to relocate a network or a network device
 Increase the number of broadcast domains while decreasing the size of broadcast domains.
 Establish broadcast domains in switched networks.

28. What do you mean by a broadcast domain and a collision domain?

Broadcast Domain: As the name suggests, a Broadcast domain is a logical set of reachable
computer systems without having a router. In this type of domain, traffic flows all over the
network. In this scenario, when a device sends a broadcast message, then all the other devices
present in its broadcast domain have to pay attention to it.

Collision Domain: As the name suggests, a Collision domain is a part of a network where packet
collisions can take place when being sent on a shared medium or through repeaters. In this
scenario, when a device sends a message to a network, then all other devices present in its
collision domain have to pay attention to it, whether or not it was destined for them.

29. Explain BootP.

BootP (Bootstrap Protocol or Boot Program) is defined as a computer networking protocol


that is being used by a client for obtaining an IP address of a server PC. In a network, BootP is
generally used for booting diskless workstations. These diskless workstations use BootP to get
their own IP address as well as the server’s IP address. It was originally designed to replace RARP
(Reverse Address Resolution Protocol), also known as RFC 903.
30. What do you mean by route poisoning?

Route poisoning refers to a method that prevents certain networks from sending data packets to
path destinations that have already become invalid. This method is being employed by distance
vector routing protocols like RIPv2 whenever they see any invalid route to prevent routing loops.
It is generally used to overcome large routing loops and informs all the connected routers in a
network about the path that is invalid by saying that it has a hop count that exceeds the
maximum allowable.

31. Write difference between static and dynamic IP addressing.

Static IP address: Static IP address, as the name suggests, is simply an IP address that doesn’t
change. It remains the same until the device is decommissioned or the network architecture is
changed.

Dynamic IP address: Dynamic IP address, as the name suggests, is simply an IP address that
changes over time. It is mostly used because IPv4 does not provide enough static IP addresses to
go around.
Static vs Dynamic IP address:

Static IP address Dynamic IP address


This IP address is generally provided by ISP (Internet This IP address is generally provided by DHCP
Service Provider). (Dynamic Host Configuration Protocol).
The address does not change whenever a device is
The address changes over time whenever a
assigned a static IP address by the network
device is assigned a dynamic IP address.
administrator.
It is less secure and more difficult to designate as It is more secure and easy to designate as
compared to dynamic IP addresses. compared to static IP addresses.
It is more appropriate for a business. It is more appropriate for a home network.
These are costlier to deploy and more difficult to These are cheaper to deploy and easier to
manage as compared to dynamic IP addresses. manage as compared to static IP addresses.
It is more suitable for dedicated services like mail, It is more suitable for a large network that
VPN and FTP servers, etc. requires internet access to all devices.
It is mostly used where computational data is less It is mostly used where data is more
confidential. confidential and requires higher security.

32. What is network congestion? When network congestion happens?

Network congestion is a situation that occurs when a network node is overloaded with data or
traffic and can cause a common problem for admins. It usually occurs when the network is
carrying or exchanging more data than the network devices like routers and switches can
accommodate. It is a result of an internet route becoming too full when many users try using the
same bandwidth. This condition is true in big networks that do not resort to network
segmentation.

33. What are two types of networks in CCNA?

Two types of networks in CCNA includes:

Server-based network: Client-Server networks can also be referred to as Server-Based networks.


A server is a node that provides services to clients. In this, a Centralized server is used to store
the data because its management is centralized.

Peer-to-Peer network: A peer-to-peer network is also known as a computer-to-computer


network or P2P. Peers are nodes or computer systems that are connected to one another. Every
node in this kind of network is connected to another node.

34. What are types of passwords that can be used in CISCO routers?

Different types of passwords that can be used in CISCO routers include:

 Enabled: This is a global command that disables privileged execution mode. The password is
not encrypted. To change it, one can use "enable password password".
 Enable Secret: In place of an enable password, this secret password is used. To change it, one
can use "enable secret password".
 AUX (Auxiliary): Passwords for auxiliary ports can be set using an auxiliary password. Through
a modem, a router can be accessed via this port.
 Console: Console port passwords are set using the console password.
 VTY (Virtual Terminal): For Telnet sessions into the router, you will need the virtual terminal
password. Passwords can be changed at any time. You can set it up when you configure the
router from the console.

35. Write difference between public IP and private IP.

Public IP Private IP
It is mostly used within a private network or LAN to
It is used on public networks. connect securely with other devices within the same
network.
It is usually assigned by a Service
It is usually assigned by a LAN administrator.
provider or IANA.
It is generally used to communicate It is generally used to communicate within the same
outside the network. network.
It can be known by searching “what is my It can be known by typing “ipconfig” on the command
IP” on google. prompt.
Its scope is global. Its scope is local to the present network.
These come with a cost and are
These are free of cost and are used to load network OS.
controlled by ISP.
It is routable and therefore,
It is not routable and therefore, communication among
communication among different users is
different users is not possible.
possible.
Address ranges to be used by private networks are:
It can be any number not included in the Class A: 10.0.0.0 - 10.255.255.255
reserved private IP address range. Class B: 172.16.0.0 - 172.31.255.255
Example: 202.60.23.1 Class C: 192.168.0.0 - 192.168.255.255
Example: 192.168.0.3

36. Write the main function of the application layer in networking?

The application layer is the topmost layer in the OSI model that is used by end-user software
such as web browsers and email clients. It is considered as the layer through which users interact.
It usually consists of some protocols that are more focused on process-to-process
communication across an IP Network. Some of its functions include:

 Manage data exchange in a peer-to-peer or a client-server networking model.


 Provide firm communication interface and end-user services.
 Enables users to access the network.
 Provide the basis for email forwarding and storage facilities.
 Allows access to global information about different services.
37. Explain PoE.

PoE (Power on Ethernet) generally refers to a technology that allows electric power to be
carried over the Ethernet cable that carries data. It passes the electric power supply to the
network through the cable rather than the power cords and minimizes the number of wires
required to install the network.

38. What do you mean by OSPF?

OSPF (Open Shortest Path First) is basically a popular link-state routing protocol for IP
networks that are used to connect to a large number of networks without any limitation on the
number of hops. It determines the best route for delivering the data packets within an IP
network. It has been implemented by a wide range of network vendors such as Cisco. It works
on Dijkstra Algorithm.

 Firstly, a shortest-path tree is constructed.


 Secondly, the routing table is populated with the resulting best paths.

39. Write difference between RIP and IGRP.

RIP (Routing Information Protocol) IGRP (Interior Gateway Routing Protocol)


It is a distance vector-based routing It is a distance vector-based interior gateway routing
protocol. protocol.
It is used to calculate the metric in terms of It is used to calculate the metric in terms of
Hop count. bandwidth, load, and delay.
It is an industry-standard dynamic protocol
It is a Cisco standard dynamic protocol and is mainly
and is mainly used for smaller-sized
used for medium to large-sized organizations.
organizations.
It is denoted by ‘R’ in the routing table and It is denoted by ‘I’ in the routing tables and supports
supports 15 routers max. 255 routers max.
We cannot create a separate administrative Using autonomous System numbers, we can create a
boundary in the network in the RIP routing separate administrative boundary in the network in
protocol. the IGRP routing protocol.

You might also like