PDF Download
CCNA INTERVIEW EXAM QUESTIONS
Actual Qs and Ans Expert-Verified Explanation
This Exam contains:
-Guarantee passing score -69 Questions and Answers -format set of multiple-choice -Expert-Verified Explanation
Question 1: How does cut-through LAN switching work?
Answer:
In Cut-Through LAN switching, as soon as the router receives the data frame, it will immediately send it out again and forward it to the next network segment after reading the destination address.
Question 2: What is a Frame Relay?
Answer:
Frame Relay is a WAN protocol that provides connection-oriented communication by creating and maintaining virtual circuits. It has a high performance rating and operates at the Data Link and Physical Layers.
Question 3: How does Hold-downs work?
Answer:
Hold-downs prevent regular update messages from reinstating a downed link by removing that link from update messages. It uses triggered updates to reset the hold-down timer.
Question 4: Differentiate full-duplex from half-duplex.
Answer:
In full-duplex, both the transmitting device and the receiving device can communicate simultaneously, that is, both can be transmitting and receiving at the same time. In the case of half-duplex, a device cannot receive while it is transmitting, and vice versa.
Question 5: Explain what is route poisoning?
Answer:
Route poisoning is a technique of preventing a network from transmitting packets through a route that has become invalid Question 6: What are the different types of passwords used in securing a CISCO router?
Answer:
There are actually five types of passwords that can be used. These are enable secret, enable, virtual terminal, console, and auxiliary.
Question 7: Mention what is the size of IP address?
Answer:
Size of IP address is 32 bit for IPv4 and 128 bit for IPv6
Question 8: Mention what is the matric of EIGRP protocol?
Answer:
EIGRP protocol consists of Bandwidth Load Delay Reliability MTU Maximum Transmission Unit
Question 9: Mention what is the difference between TCP and UDP?
Answer:
TCP and UDP both are protocols for sending files across computer network TCP (Transmission Control Protocol) TCP is connection oriented protocol. When connection lost during transferring files, the server would request the lost part. While transferring a message, there is no corruption while transferring a message The message will deliver in the order it is sent Data in TCP is read as a stream, where one packet ends, and another begins Example of TCP includes World Wide Web, file transfer protocol, e-mail, UDP (User Datagram Protocol) UDP is based on connectionless protocol. When you send data, there is no guarantee whether your transferred message will reach there without any leakage The message you sent may not be in the same order Packets are transmitted individually and are guaranteed to be whole if they arrive Example for UDP are VOIP (Voice Over Internet Protocol) TFTP ( Trivial File Transfer Protocol),
Question 10: Mention what is BOOTP?
Answer:
BOOTP is a computer networking protocol used to deploy an IP address to network devices from a configuration server.
Question 11: Differentiate Logical Topology from Physical Topology
Answer:
Logical Topology refers to the signal path through the physical topology. Physical Topology is the actual layout of the network medium.
Question 12: Differentiate User Mode from Privileged Mode
Answer:
User Mode is used for regular task when using a CISCO router, such as to view system information, connecting to remote devices, and checking the status of the router. On the other hand, privileged mode includes all options that are available for User Mode, plus more. You can use this mode in order to make configurations on the router, including making tests and debugging.
Question 13: Mention what are the ranges for the private IPS?
Answer:
Ranges for private IPS are
Class A: 10.0.0.0 - 10.0.0.255
Class B: 172.16.0.0 - 172.31.0.0
Class C: 192.168.0.0 - 192.168.0.255
Question 14: What is Routing?
Answer:
Routing is the process of finding a path on which data can pass from source to destination. Routing is done by a device called routers, which are network layer devices.
Question 15: What are the different IPX access lists?
Answer:
There are two access lists: Standard and Extended. Standard Access List can only filter the source or destination IP address. An Extended Access List uses the source and destination IP addresses, port, socket and protocol when filtering a network.
Question 16: What is Bandwidth?
Answer:
Bandwidth refers to the transmission capacity of a medium. It is a measure of how much volume a transmission channel can handle, and is measured in Kbps.
Question 17: How does RIP differ from IGRP?
Answer:
RIP relies on the number of hops in order to determine the best route to a network. On the other hand, IGRP takes consideration many factors before it decides the best route to take, such as bandwidth, reliability, MTU and hop count.Question 18: Mention what is the difference between dynamic IP and static IP addressing?
Answer:
Dynamically IP addresses are provided by DHCP server and static IP address are given manually.
Question 19: What's the simplest way to remotely configure a router?
Answer:
In cases when you need to configure a router remotely, the most convenient is to use the Cisco AutoInstall Procedure. However, the router must be connected to the WAN or LAN through one of the interfaces.
Question 20: How do you configure a Cisco router to route IPX?
Answer:
The initial thing to do is to enable IPX routing by using the "ipx routing" command. Each interface that is used in the IPX network is then configured with a network number and encapsulation method.
Question 21: How do you find valid hosts in a subnet?
Answer:
The best way to go about this is to use the equation 256 minus the subnet mask. The hosts that are considered valid are those that can be found between the subnets