Cisco Netwoking Interview Questions & Answers

  1. The access list range is 100 – 199.
  1. X.121 is a x.25 layer 3 add. standard.
  1. It is a composite metric. There are updates every 60 seconds and it is a poison reverse.
  1. There are three different kinds of access lists. These are standard, extended and named.
  1. It can be configured by TFTP, Nvram or Console
  1. It is a kind of flow control.
  1. Input sap filter and output sap filters can be used for the same.
  1. It is the layer 4 transport protocol and has no handshaking.
  1. It can be done by boot system commands and config register.
  1. switch, repeater and bridge.
  1. Username and password is sent in clear text and The authentication controls remote node.
  1. Cut through is the switching method used to examine it.
  1. The full form of RARP is Reverse Address Resolution Protocol. It is used to start remote O/S load sequence.
  1. It stands for Service Advertising Protocol and it is used to advertise services.
  1. The default values are bandwidth and delay.
  1. HDLC is the default serial encapsulation
  1. It is used to determine the MAC Address of a workstation.
  1. It is used to identify the PVC in frame relay network.
  1. Determines the path, multiplexing and management of sessions.
  1. The bandwidth is increased and collision domains are created. Also it helps forward traffic using mac address.
  1. To save the bandwidth by reducing overhead and to connect to a non cisco router.
  1. It transports both voice and data, and same as X.25
  1. Multiple unequal paths, autonomous system number, etc.
  1. Authentication messages and local router challenges
  1. 6 DNS Servers can be specified with one command.
  1. The “trace [protocol] [destination]” is used to discover routes that packets will travel to their destination hosts. TTL (Time to Live) is used to report destination route information.
  1. It sets the domain name lookup to be a local broadcast.
  1. dotted decimal, hexadecimal and bit count formats can be used.
  1. It is the condition when the router lacks any more buffer space.
  1. It is used to carry messages like destination unreachable, source quench, parameter problem, time exceeded, timestamp, address reply and address request.
  1. The network testing is found in IP Options field.
  1. It is used for dial on demand routing. DDR provides routing for low volume and periodic traffic.
  1. Source Port – 16 bits, Destination Port – 16 bits, Length – 16 Bits, Checksum – 16 bits, Data
  1. The cisco routers checks whether the packet is routable or bridgeable
  1. One Access list per port, per protocol is allowed.
  1. The router checks the corresponding bit value.
  1. We can use the Modem, CSU/DSU and TA/NT1 for this.
  1. These are Switched services, Using protocols connecting peer to peer devices and Interface front end to IBM Enterprise Data center computers.
  1. It contains the Flag, Address, Control, Proprietary, Data, FCS and Flag.
  1. It monitors data dropped on a link.
  1. It helps avoid frame looping.
  1. It is used to provide load balancing across multiple links.
  1. These are link establishment phase, authentication phase and the network layer protocol phase.
    1. Novell-Ether is the default IPX Ethernet encapsulation.