Download as doc
Download as doc
You are on page 1of 5

1.What are the Timer of RIP, IGRP, EIGRP and OSPF Routing Protocol?

2.What is the 5-4-3-2-1 rule of network design?


3. Which STP state populates the MAC address table but doesn't forward data frames? A. Blocking B.
Listening C. Learning D. Forwarding
4.. Which STP state prevents the use of looped paths? A. Blocking B. Listening C. Learning D. Forwarding
5. When is Frame Tagging used? A. When you install repeaters in your network B. When you install bridges
in your network C. When you install routers in your network D. When you use Switches configured with
multiple VLANS
6 What is an advantage to using switches in your network? A. Addressing of hosts by DHCP B. Ease of
administration C. Stops broadcast storms D. Works like a repeater iGate 1 109 6. Which device can
create smaller networks and stop broadcast storms by default? A. Repeater B. Bridge C. Router D. Gateway
2 172 5. What is an advantage of using routers in your network? (Choose all that apply) A. Stops
broadcast storms B. Reduces downtime on your network C. Creates internetworks D. Can filter by logical
address 3 105 4. What is a disadvantage to using bridges in your network? A. Filters by MAC address
B. Stops broadcast storms C. Doesn't stop broadcast storms D. Can only use up to 4 bridges in any LAN 1 70
3. What does a bridge use to segment a network? A. IP Addresses B. Broadcasts C. Application data D.
Media Access Control addresses 0 42 2. What are the valid ways to segment a LAN? (Choose all that
apply) A. Repeater B. Bridge C. Switch D. Router 1 76 1. What is an advantage to LAN segmentation?
A. Provides multiprotocol support B. Decreases security C. Decreases broadcasts D. Increases broadcasts 1
72 what is 5-4-3 rule? 0 58 what is unike ip address 1 402 How we ping ICMP a NIC with a
correct IP address but with wrong MAC address Do all NIC's can run inpromiscuous mode
what is 5-4-3 rule? 58 How we put NIC in promiscuous mode when using MS windows, can any one tell
me in detail
What key do you use to view the last command? A.) Ctrl+X B.) Ctrl+Z C.) Ctrl+E D.) Ctrl+P 1 What does
the parameter -- LOG -- do on an IPX access list? A.) The log keyword is not a valid option. B.) Read the
LOG to figure out what traffic to deny. C.) Logs the creation of the access list. D.) Logs IPX access control
list violations whenever a packet matches a particular access list entry. E.) Ensures the IPX protocol places a
log in the fireplace. 1 Which layer is responsible for providing mechanisms for multiplexing upper-layer
application, session establishment, and tear down of virtual circuits? A.) Session B.) Network C.) Physical D.)
Transport E.) Application F.) Presentation 1 Identify the keystroke to position the cursor to the beginning of a
command line? A.) Ctrl-A B.) Ctrl-Ins C.) Ctrl-B D.) Ctrl-Z 1 Which of the following is a characteristic of a
switch, but not of a router? A.) Switches forward packets based on the IPX or IP address in the frame B.)
Switches forward packets based on the IP address in the frame C.) Switches forward packets based on the
MAC address in the frame D.) Switches forward packets based only on the IP address in the packet 1 Identify
the true statement regarding subnetting? A.) Allows for more host address B.) Borrow bits from the network
portion of the address C.) Allows for unlimited number of networks D.) Borrow bits from the host portion of
the address 1 Identify the command to configure the router to boot from an IOS located on a TFTP server?
A.) boot system tftp IOS.exe 172.16.5.1 B.) boot system tftp 172.16.5.1 IOS.exe C.) boot system flash tftp
172.16.5.1 D.) boot system IOS.exe 172.16.5.1 1 Which of the following use PVCs at layer 2? A.) X.25 B.)
HDLC C.) Frame relay D.) ISDN 1 What ISDN protocol specifies concepts, terminology, and services? A.) Q
B.) S C.) I D.) E 1 Which Distance Vector characteristic can help to speed up convergence? A.) Triggered
Updates. B.) Split Horizon. C.) Poison Reverse. D.) Hold Down timers. E.) Inverse ARP. 1 Identify the
default serial encapsulation? A.) ISDN B.) HDLC C.) SDLC D.) Frame Relay E.) PPP 1 You want to segment
a network. The network is running SNA and Netbios. Which device should NOT be used to segment the
network? A.) A store and forward switch. B.) A router. C.) A Catalyst 5000. D.) A cut-through switch. E.) A
bridge. 1 Identify the true statement regarding subnetting? A.) Allows for more host address B.) Borrow bits
from the network portion of the address C.) Allows for unlimited number of networks D.) Borrow bits from
the host portion of the address 1 Identify the 3 Internet layer IP protocols? A.) NetBios B.) IPX C.) ARP D.)
IP E.) RARP 1 Which layer defines bit synchronization? A.) Application B.) Network C.) Transport D.)
Physical E.) Session F.) Session 1 Eight stations connected to separate 10 Mobs pods on a Layer 2 switch will
give each station how many Mobs of bandwidth? A. 1.25 B. 4 C. 16 D. 10 E. 80 1 WHAT IS DIFFERENCE
BETWEEN FAST ETHERNET AND ETHERNET PORT? Bank-Of-India4 What is the default interval for
SAP updates? A.) 60 seconds B.) 15 seconds C.) 30 seconds D.) 120 seconds 1 Which of the following
describe full-duplex transmission? A.) Uses a single wire B.) Data transmission in only both directions, but
only one way at a time C.) Uses a point-to-point connection from the transmitter of the transmitting station to
the receiver of the receiving station D.) Data transmission in only one direction 1 Which routing protocols
uses connection-oriented routing updates? A.) IGRP B.) UDP C.) RIP D.) IP E.) BGP 1

Which 3 statements describe default encapsulation and LMI type configuration? A.) There are only four
encapsulations and 3 LMI type options B.) The LMI type config term options C.) In release 11.3 the LMI type
is autosensed D.) The default LMI is Cisco E.) IETF encap must be configured unless the connecting routers
are both cisco 1 Which command specifies a second subinterface on serial interface 0? A. interface s 0.2
point-to-point B. interface 2 s.0 point-to-point C. suberinterface 2.s 0 point-to-point D. interface s 0 sub 2
point-to-point E. interface s 0.1 point-to-point sub 2 1 What's the default CDP holdtime in seconds for Cisco
routers? A.) 30 seconds B.) 180 seconds C.) 90 seconds D.) 60 seconds 3 Identify the purpose of the Trace
command? A.) Explorer packet transmitting routing information B.) Test connectivity C.) Determine the path
a packet is taking through the network D.) Transmits user data when buffers are full 1 Which statement about
switched and routed data flows is correct? A. Switches create a single collision domain and a single broadcast
domain. Routers provide separate collision domains B. Switches create separate collision domains but a single
broadcast domain. Routers provide a separate broadcast domain C. Switches create a single collision domain
and separate broadcast domains. Routers provide a separate broadcast domain as well D. Switches create
separate collision domains and separate broadcast domains. Routers provide separate collision domains 1
Which IP host address range is allowable given an IP address of 172.37.2.56 and 12 bits of subnetting A.
172.37.2.48 to 172.37.2.63 B. 172.37.2.48 to 172.37.2.62 C. 172.37.2.49 to 172.37.2.62 D. 172.37.2.49 to
172.37.2.63 E. 172.37.2.55 to 172.37.2.126 1 Identify the 2 commands that will display the status and
information about interface E0 only? A.) show interface ethernet E0 B.) show interface E0 C.) show E0 D.)
show int E0 E.) show interface 1 Which show command should you use to view Frame Relay Local
Management Interface (LMI) Frame statistics? A. show lmi B. show ip route C. show interface D. show
statistics E. show frame-relay lmi 1 What does -1 mean in an extended IPX access-list? A.) Any IP address
B.) Deny all C.) Deny host D.) Any host or any network 1 What is the command to allow you to type Tokyo
instead of the IP address 172.16.30.1 to access a router named Tokyo? A.) config t, ip host Tokyo 172.16.30.1
B.) config t, ip hostname Tokyo 172.16.30.1 C.) config t, hostname Tokyo 172.16.30.1 D.) config t, ip
hostname 172.16.30.1 Tokyo 1 Identify the default IPX serial encapsulation? A.) Novell-Ether B.) SDLC C.)
SNAP D.) HDLC 1 What is VLSM? Why we Create? When we Create? Implement VLSM with example? 3
You want to segment a network. The network is running SNA and Netbios. Which device should NOT be used
to segment the network? A.) A store and forward switch. B.) A router. C.) A Catalyst 5000. D.) A cut-through
switch. E.) A bridge. 1 What IP command would you use to test the entire IP stack? A.) Stack-test B.) Arp C.)
Telnet D.) Ping E.) Trace 1 What is the routing algorithm used by RIP and IGRP? A.) OSPF B.) Link-state
C.) Dynamic D.) Distance Vector 2 What are the 2 functions of the Data Link Mac layer? A.) Handles access
to shared media B.) Manages protocol access to the physical network medium C.) Provides SAPs for higher
level protocols D.) Allows multiple devices to uniquely identify one another on the data link layer 1 What
command will not display the status of to1? A.) show int to1 B.) show to1 C.) show interface to1 D.) show
interface 1 What is the most common layer 2 device? A. Hub B. Router C. Switch D. Repeater Wipro2 Which
OSI layer incorporates the MAC address and the LLC? A.) Data link B.) Network C.) Physcial D.) Transport
2 Identify the purpose of the wildcard mask? A.) Match a certain portion of the IP address while ignoring the
rest of the address B.) Determine the class of the IP address C.) Determine the network portion of an IP
address D.) Hide the host portion of an IP address 1

CCNA INTERVIEW QUESTIONS

HOME TUTORIALS FAQs ARTICLES CAREERS BOOKS DISCUSSION CHAT GUESTS


Ans C D
Full duplex ethernet requires that the NIC supports full-duplex, and loopback and collision detection are disabled.

229 Which layer is responsible for determining if sufficient resources for the intended communication exists?

A.) Application
B.) Network
C.) Session
D.) Presentation
E.) Transport

Ans A
The Application layer is responsible for determining if sufficient resources for the intended communication exists.

230 What are the 2 functions of the Data Link Mac layer?
A.) Handles access to shared media
B.) Manages protocol access to the physical network medium
C.) Provides SAPs for higher level protocols
D.) Allows multiple devices to uniquely identify one another on the data link layer

Ans B D
Media Access Control (MAC) -The MAC sublayer manages protocol access to the physical network medium. The IEEE
specification defines MAC addresses, which allow multiple devices to uniquely identify one another at the data link laye
231 Describe End to End network services: (Choose all that apply)

A.) Best Route selection


B.) Accomplished Segment by Segment, each segment is autonomous
C.) Flow Control & Data Integrity
D.) Best efforts packet delivery

Ans A B C D
All of the above End to End network services.

232 Which of the following provide correct information about a protocol at the transport layer of the OSI model?

A.) UDP - Provides Connectionless datagrams service


B.) TCP - Provides Connection Oriented Services
C.) SMTP - Provides Mail Exchange
D.) IP - Route determination
E.) TCP - Provides Flow Control and Error Checking
F.) FTP - Transfers of Files

Ans A B E
Only TCP and UDP work at the Transport layer of the above choices. IP is a Network layer protocol. SMTP and FTP are
layer protocols.

233 Which protocol works at the Internet layer and is responsible for making routing decisions?
SAP Tutorials ABAP tutorials SAP Functional Software Testing Tutorials J2EE
Resources Jobs in INDIA

site contact info@pdftutorials.com All of the product names here are trademarks of their respective companies. Use
information on this site at your own risk. Information furnished in the site is collected from various sites and posts from
users. This site does not host any files on its server. If any compliants about the posts please contact us at
info@pdftutorials.com, we are ready to move the posts.

You might also like