CiscoNetworking Q&A

[vc_row][vc_column css_animation=”fadeInLeft”][vc_column_text css=”.vc_custom_1563441864102{background-color: #1e73be !important;}”]

Cisco Netwoking Interview Questions & Answers

[/vc_column_text][/vc_column][/vc_row][vc_row][vc_column css_animation=”fadeInLeft” width=”1/2″][vc_tta_accordion color=”peacoc” active_section=”1″][vc_tta_section title=”What Is The Access List Range For Extended Ip Access List?” tab_id=”1563441894606-a9edb0d6-74ff”][vc_column_text]

  1. The access list range is 100 – 199.

[/vc_column_text][/vc_tta_section][vc_tta_section title=”Name A X.25 Addressing Standard?” tab_id=”1563441894621-06bbc1a9-5bb0″][vc_column_text]

  1. X.121 is a x.25 layer 3 add. standard.

[/vc_column_text][/vc_tta_section][vc_tta_section title=”List Three Important Properties Of Igrp?” tab_id=”1563441911692-10adf00d-56f0″][vc_column_text]

  1. It is a composite metric. There are updates every 60 seconds and it is a poison reverse.

[/vc_column_text][/vc_tta_section][vc_tta_section title=”Where Can The Backup Configuration File Be Found?” tab_id=”1563441912487-3191c49b-4457″][vc_column_text]

  1. It is stored in the NVRAM.

[/vc_column_text][/vc_tta_section][vc_tta_section title=”What Are The Three Features Of Ip Access Lists?” tab_id=”1563441913070-6515df2d-c1e6″][vc_column_text]

  1. There are three different kinds of access lists. These are standard, extended and named.

[/vc_column_text][/vc_tta_section][vc_tta_section title=”How Can A Router Be Configured?” tab_id=”1563441913619-76bdc0f8-5d61″][vc_column_text]

  1. It can be configured by TFTP, Nvram or Console

[/vc_column_text][/vc_tta_section][vc_tta_section title=”Which Mechanism Takes Place In A Traffic Light?” tab_id=”1563441914195-9534d550-6c01″][vc_column_text]

  1. Flow control

[/vc_column_text][/vc_tta_section][vc_tta_section title=”What Is Windowing?” tab_id=”1563441914807-883ed77c-ebbe”][vc_column_text]

  1. It is a kind of flow control.

[/vc_column_text][/vc_tta_section][vc_tta_section title=”Which Filters Are Used To Control Sap Traffic?” tab_id=”1563441916049-9eadfe28-c98c”][vc_column_text]

  1. Input sap filter and output sap filters can be used for the same.

[/vc_column_text][/vc_tta_section][vc_tta_section title=”Which Hardware Component Is Used To Store Buffers, Tables, Etc.?” tab_id=”1563441916539-79a7b737-7af0″][vc_column_text]1.RAM[/vc_column_text][/vc_tta_section][vc_tta_section title=”What Are The Important Features Of Udp?” tab_id=”1563441916966-c06a0590-a963″][vc_column_text]

  1. It is the layer 4 transport protocol and has no handshaking.

[/vc_column_text][/vc_tta_section][vc_tta_section title=”What Is The Number Range Of Ipx Access List?” tab_id=”1563441917499-92536733-0a46″][vc_column_text]

  1. The range is 800-899

[/vc_column_text][/vc_tta_section][vc_tta_section title=”Name The Osi Layer Which Helps Ensure Packet Delivery?” tab_id=”1563441918036-d8fed0b2-60ae”][vc_column_text]

  1. Network layer.

[/vc_column_text][/vc_tta_section][vc_tta_section title=”How Can You Vary The Router Boot Sequence?” tab_id=”1563441918507-e0ca304f-8330″][vc_column_text]

  1. It can be done by boot system commands and config register.

[/vc_column_text][/vc_tta_section][vc_tta_section title=”Which Hardware Is Necessary For Broadcasts?” tab_id=”1563441919135-1b24f070-0d50″][vc_column_text]

  1. switch, repeater and bridge.

[/vc_column_text][/vc_tta_section][vc_tta_section title=”What Are The Important Characteristics Of Ppp Pap Authentication?” tab_id=”1563441920439-8600fe43-ebc3″][vc_column_text]

  1. Username and password is sent in clear text and The authentication controls remote node.

[/vc_column_text][/vc_tta_section][vc_tta_section title=”Which Switching Method Is Used To Examine The Destination Mac Address?” tab_id=”1563441921006-a627c101-df2f”][vc_column_text]

  1. Cut through is the switching method used to examine it.

[/vc_column_text][/vc_tta_section][vc_tta_section title=”What Is The An Important Feature Of Rarp.?” tab_id=”1563441921539-ac712b49-89bb”][vc_column_text]

  1. The full form of RARP is Reverse Address Resolution Protocol. It is used to start remote O/S load sequence.

[/vc_column_text][/vc_tta_section][vc_tta_section title=”Which Protocol Helps Test The Connectivity Without Configuration Of Layer 3 Protocols?” tab_id=”1563441922212-2fde0c38-64cd”][vc_column_text]

  1. CDP protocol

[/vc_column_text][/vc_tta_section][vc_tta_section title=”What Is The Use Of Ipx Sap?” tab_id=”1563441922705-ea0ab1b3-63c8″][vc_column_text]

  1. It stands for Service Advertising Protocol and it is used to advertise services.

[/vc_column_text][/vc_tta_section][vc_tta_section title=”List The Default Values In Eigrp Metric?” tab_id=”1563441923184-66a33448-22c4″][vc_column_text]

  1. The default values are bandwidth and delay.

[/vc_column_text][/vc_tta_section][vc_tta_section title=”What Is The Default Serial Encapsulation?” tab_id=”1563441923787-530db6e9-20a7″][vc_column_text]

  1. HDLC is the default serial encapsulation

[/vc_column_text][/vc_tta_section][vc_tta_section title=”What Is The Use Of Arp?” tab_id=”1563441924247-61656beb-6823″][vc_column_text]

  1. It is used to determine the MAC Address of a workstation.

[/vc_column_text][/vc_tta_section][vc_tta_section title=”What Is The Use Of Dlci?” tab_id=”1563441925432-8d5d5b30-dd76″][vc_column_text]

  1. It is used to identify the PVC in frame relay network.

[/vc_column_text][/vc_tta_section][vc_tta_section title=”Important Features Of Osi Layer 3 – Network Layer?” tab_id=”1563441926375-791aa030-264a”][vc_column_text]

  1. Determines the path, multiplexing and management of sessions.

[/vc_column_text][/vc_tta_section][vc_tta_section title=”List The Important Characteristics Of Switches?” tab_id=”1563441926868-2e5ff385-e9ed”][vc_column_text]

  1. The bandwidth is increased and collision domains are created. Also it helps forward traffic using mac address.

[/vc_column_text][/vc_tta_section][vc_tta_section title=”Which Osi Layer Is Used For Physical Address And Network Topology?” tab_id=”1563441927336-e7d97f7f-9099″][vc_column_text]

  1. The Data link layer serves this purpose.

[/vc_column_text][/vc_tta_section][vc_tta_section title=”Why Do We Have To Disable Cdp?” tab_id=”1563441927980-bb003acb-6f68″][vc_column_text]

  1. To save the bandwidth by reducing overhead and to connect to a non cisco router.

[/vc_column_text][/vc_tta_section][vc_tta_section title=”What Are The Important Characteristics Of Isdn?” tab_id=”1563441928532-2e6d60ae-c2b0″][vc_column_text]

  1. It transports both voice and data, and same as X.25

[/vc_column_text][/vc_tta_section][vc_tta_section title=”List The Important Characteristics Of Igrp?” tab_id=”1563441929181-f04c09fd-4d2d”][vc_column_text]

  1. Multiple unequal paths, autonomous system number, etc.

[/vc_column_text][/vc_tta_section][vc_tta_section title=”What Is The Range Of Extended Ip Access List?” tab_id=”1563441930772-2fd0ec5a-02d2″][vc_column_text]

  1. The range is 100-199

[/vc_column_text][/vc_tta_section][/vc_tta_accordion][/vc_column][vc_column css_animation=”fadeInRight” width=”1/2″][vc_tta_accordion color=”peacoc” active_section=”1″][vc_tta_section title=”Which Hardware Component Is Used To Store Backup Configuration?” tab_id=”1563441938597-b0f68b06-fa35″][vc_column_text]

  1. NVRAM is used for this.

[/vc_column_text][/vc_tta_section][vc_tta_section title=”Which Is The Ipx Serial Encapsulation By Default?” tab_id=”1563441938625-01504932-cb9e”][vc_column_text]1.HDLC[/vc_column_text][/vc_tta_section][vc_tta_section title=”Important Features Of Ppp Chap Authentication?” tab_id=”1563441950836-1397cb1e-8bef”][vc_column_text]

  1. Authentication messages and local router challenges

[/vc_column_text][/vc_tta_section][vc_tta_section title=”How Many Dns Servers Can Be Specified With One Command?” tab_id=”1563441951356-a1477ab1-85f9″][vc_column_text]

  1. 6 DNS Servers can be specified with one command.

[/vc_column_text][/vc_tta_section][vc_tta_section title=”What Is The Use Of Cisco Ios Exec Command Trace?” tab_id=”1563441951844-b7b58721-272d”][vc_column_text]

  1. The “trace [protocol] [destination]” is used to discover routes that packets will travel to their destination hosts. TTL (Time to Live) is used to report destination route information.

[/vc_column_text][/vc_tta_section][vc_tta_section title=”What Is The Use Of “ip Name-server 255.255.255.255?” tab_id=”1563441952260-0ad801aa-9fa3″][vc_column_text]

  1. It sets the domain name lookup to be a local broadcast.

[/vc_column_text][/vc_tta_section][vc_tta_section title=”Which Format Is Useful For Configuring The Subnet Mask For An Ip Address?” tab_id=”1563441952810-924620ea-c87e”][vc_column_text]

  1. dotted decimal, hexadecimal and bit count formats can be used.

[/vc_column_text][/vc_tta_section][vc_tta_section title=”Which Process Is Used To Find An Ip Address From A Mac Address?” tab_id=”1563441953199-b105baf5-db4e”][vc_column_text]

  1. RARP Process

[/vc_column_text][/vc_tta_section][vc_tta_section title=”What Is Source Quench?” tab_id=”1563441953752-d86efb21-32fa”][vc_column_text]

  1. It is the condition when the router lacks any more buffer space.

[/vc_column_text][/vc_tta_section][vc_tta_section title=”What Is Icmp Protocol?” tab_id=”1563441954272-44df3b37-7ce0″][vc_column_text]

  1. It is used to carry messages like destination unreachable, source quench, parameter problem, time exceeded, timestamp, address reply and address request.

[/vc_column_text][/vc_tta_section][vc_tta_section title=”Name Any Two Protocols Which Can Exist In The Protocol Field Of An Ip Packet.?” tab_id=”1563441955513-08a5be82-345c”][vc_column_text]

  1. These are TCP and UDP Protocols.

[/vc_column_text][/vc_tta_section][vc_tta_section title=”Which Field In The Ip Packet Has Network Testing?” tab_id=”1563441955996-5655199d-cc50″][vc_column_text]

  1. The network testing is found in IP Options field.

[/vc_column_text][/vc_tta_section][vc_tta_section title=”How Does The Internet Layer Know How To Handle An Ip Packet?” tab_id=”1563441956573-11e14253-3521″][vc_column_text]

  1. The type of service tells it.

[/vc_column_text][/vc_tta_section][vc_tta_section title=”What Is The Use Of Ddr On Cisco Routers?” tab_id=”1563441957057-2f0ccf00-673f”][vc_column_text]

  1. It is used for dial on demand routing. DDR provides routing for low volume and periodic traffic.

[/vc_column_text][/vc_tta_section][vc_tta_section title=”Cisco Router Has Two Types Of Access Lists?” tab_id=”1563441957485-65e48fc1-d0f0″][vc_column_text]

  1. Standard and Extended

[/vc_column_text][/vc_tta_section][vc_tta_section title=”What Do You Know About The Udp Datagram Format?” tab_id=”1563441957909-e301b44f-e824″][vc_column_text]

  1. Source Port – 16 bits, Destination Port – 16 bits, Length – 16 Bits, Checksum – 16 bits, Data

[/vc_column_text][/vc_tta_section][vc_tta_section title=”When Using Access Lists, What Does A Cisco Router Check First?” tab_id=”1563441958345-a2452ba8-beb0″][vc_column_text]

  1. The cisco routers checks whether the packet is routable or bridgeable

[/vc_column_text][/vc_tta_section][vc_tta_section title=”How Many Access Lists Are Allowed Per Interface?” tab_id=”1563441958850-963755e1-90eb”][vc_column_text]

  1. One Access list per port, per protocol is allowed.

[/vc_column_text][/vc_tta_section][vc_tta_section title=”What Happens If We Set A Wildcard Mask Bit To 0 In Cisco Routers?” tab_id=”1563441959297-554c1997-cbc3″][vc_column_text]

  1. The router checks the corresponding bit value.

[/vc_column_text][/vc_tta_section][vc_tta_section title=”Which Abbreviation Is Used To Tell The Router To Check All Numbers?” tab_id=”1563441959751-71bc0382-5108″][vc_column_text]

  • host

[/vc_column_text][/vc_tta_section][vc_tta_section title=”Which Service Is Used To Get Data From Multiple Sources And Allocate Bandwidth On One?” tab_id=”1563441960741-89fa0cee-12db”][vc_column_text]

  1. TDM or Time Domain Multiplexing

[/vc_column_text][/vc_tta_section][vc_tta_section title=”How Can We Convert The User Data From Dte To Wan Service Form?” tab_id=”1563441961193-9363baec-de70″][vc_column_text]

  1. We can use the Modem, CSU/DSU and TA/NT1 for this.

[/vc_column_text][/vc_tta_section][vc_tta_section title=”Which Are The Different Forms Of Wan Services Accessed By Cisco Routers?” tab_id=”1563441961625-2503224d-cc7e”][vc_column_text]

  1. These are Switched services, Using protocols connecting peer to peer devices and Interface front end to IBM Enterprise Data center computers.

[/vc_column_text][/vc_tta_section][vc_tta_section title=”What Are The Cisco Hdlc Protocol.?” tab_id=”1563441962056-4003f82b-2e70″][vc_column_text]

  1. It contains the Flag, Address, Control, Proprietary, Data, FCS and Flag.

[/vc_column_text][/vc_tta_section][vc_tta_section title=”What Is The Quality Protocol?” tab_id=”1563441962481-43b5cc83-0b1b”][vc_column_text]

  1. It monitors data dropped on a link.

[/vc_column_text][/vc_tta_section][vc_tta_section title=”What Is Magic Number?” tab_id=”1563441962897-852f7015-1113″][vc_column_text]

  1. It helps avoid frame looping.

[/vc_column_text][/vc_tta_section][vc_tta_section title=”What Is The Use Of Multilink Protocol Mp?” tab_id=”1563441964166-ab8020e4-ac42″][vc_column_text]

  1. It is used to provide load balancing across multiple links.

[/vc_column_text][/vc_tta_section][vc_tta_section title=”Which Authentication Method Is Preferred To Set Up A Session?” tab_id=”1563441964709-5c34e86d-7681″][vc_column_text]CHAP[/vc_column_text][/vc_tta_section][vc_tta_section title=”Which Compression Protocols Are Used For Ppp?” tab_id=”1563441965186-0af2ab68-ea73″][vc_column_text]

  1. Stac and Predictor

[/vc_column_text][/vc_tta_section][vc_tta_section title=”Name And Explain The Phases Of Ppp Session Establishment.?” tab_id=”1563441965625-6fac5e66-ce07″][vc_column_text]

  1. These are link establishment phase, authentication phase and the network layer protocol phase.

[/vc_column_text][/vc_tta_section][vc_tta_section title=”Name The Default Ipx Ethernet Encapsulation?” tab_id=”1563441966154-19484f26-572c”][vc_column_text]

    1. Novell-Ether is the default IPX Ethernet encapsulation.

[/vc_column_text][/vc_tta_section][/vc_tta_accordion][/vc_column][/vc_row]

WhatsApp us