Network & Security Consultant - Interview Questions
Network & Security Consultant - Interview Questions
NETWORK &
SECURITY
CONSULTANT
Learn From Network & Security Consultant
--> Next-Generation Firewalls are nothing but in simple terms Traditional Firewall + IPS+
AMP +AV+Web Proxy.
--> Next-Generation Firewalls can filter the traffic based upon applications that are not possible in
Traditional Firewalls. ( Application Visibility & Control)
Ex: If you want to block Facebook Chat while allowing users to browse Facebook or you want to
block WhatsApp application which is only possible in Next-Generation Firewalls.
--> Next-Generation Firewalls are created to replace the Traditional Firewalls in the Firewall
Industry.
--> Traditional Firewall cannot check the data which is passing through firewall they can only
--> Below are the advantages of Next-Generation Firewalls compared to Traditional Firewalls:
1) Next-Generation Firewalls can even inspect SSL/ SSH encrypted traffic by doing SSL/SSH
Decryption.
3) Next-Generation Firewalls can also detect Malware and Viruses in the network.
Read More
Ans:
RIPv1 :
1) no support for VLSM and summarization
RIPV2:
Ans:
5) Less bandwidth
Ans:
Floating Static route: A static route with an administrative distance more than 1.
Ans:
The protocol is a set of rules which define how to exchange the data between 2 devices.
Ans:
Switch
1) Hardware-based
4) Faster
5) Multiple Ports
Bridge:
1) Software-based
4) Slower
5) Two Ports
Ans:
Wired LAN:
2) Full Duplex
3) Uses CSMA/CD
4) Faster
5) Less Flexible
6) More Secure
Wireless LAN
2) Half-Duplex
3) Uses CSMA/CD
4) Slower
5) More Flexible
6) Less Secure
Ans:
IPv4:
5) Less Mobility
https://www.kareemccie.com/search/label/Interview Questions 5/46
4/15/22, 4:32 PM Network & Security Consultant: Interview Questions
6) Each Device will have only one IPV4 address assigned to it.
IPv6
5) More Mobility
6) Each Device will have only Two IPv6 addresses assigned to it.
9) What is VLAN?
Ans:
VLAN is a method of dividing one broadcast domain into smaller Broadcast domains.
Ans:
1) Packet Forwarding: To move the data from one network to another network
2) Packet Switching: To move the data from one interface to another interface in/between the
routers.
3) Packet Filtering: Router can also filter the packets like a firewall with the help of ACL.
Ans:
1) Learning the MAC address with the help of Source MAC address
2) Forwarding data with the help of the destination MAC address
Ans:
Fixed Router
2) Not upgradable
4) Less Cost
Modular Router
2) Upgradable
4) More Cost
Ans:
Ans:
A Switch is a networking device that provides communication within the same network.
15) What is the difference between a collision domain and Broadcast Domain?
A:
Collision Domain:
https://www.kareemccie.com/search/label/Interview Questions 7/46
4/15/22, 4:32 PM Network & Security Consultant: Interview Questions
--> 1 Collision domain per hub/ 1 collision domain per switch port/ 1 collision domain per router
port.
Broadcast Domain:
--> Area of the network where broadcast sent by one device will be received all other devices.
--> 1 Broadcast domain per hub/ 1 Broadcast domain per switch port/ 1 Broadcast domain per
router port.
A:
Class C: 192.168.0.0-192.168.255.255
17) What is the difference between a static routing protocol and a dynamic routing protocol?
A:
A:
Private IP address:
Public IP address
--> Not possible to use the same IPv4 address in different places.
A:
A:
Summarization is a method of combining multiple smaller networks into one large network.
A:
A:
Supernetting: Combining one or more classful networks into one large network
Summarization: Combining one or more classless networks into one large network
A:
A:
APIPA stands for Automatic Private IP address. It is used to assign the IP address to the network
devices when the DHCP Server is not reachable.
A:
ISL
Dot1q
A:
HDLC:
PPP
A:
Tracert: Protocol used in windows operating systems to find the number of hops between source
and destination.
Traceroute: Protocol used in Linux operating systems to find the number of hops between source
and destination.
A:
A:
Service password-encryption is used to encrypt all the passwords stored in the running
configuration file of the Cisco device.
30) What is the difference between physical topology and logical topology?
A:
https://www.kareemccie.com/search/label/Interview Questions 12/46
4/15/22, 4:32 PM Network & Security Consultant: Interview Questions
Physical Topology: Refers to how the network devices are physically connected
Logical Topology: Refers to how communication takes place within the network.
A:
32) What are the different protocol data units of the OSI Reference Model?
A:
33) What are the devices work on Physical, Data Link and Network Layers of OSI Model?
A:
A:
A Firewall is a networking device that filters incoming/outgoing traffic that enters/leaves the
network.
https://www.kareemccie.com/search/label/Interview Questions 13/46
4/15/22, 4:32 PM Network & Security Consultant: Interview Questions
35) What are the different types of interfaces available on the switch?
A:
1) Lan Interface
2) Administrative Interface
36) What is the difference between Routed Protocol and Routing Protocol?
Ans:
Routing Protocol
Routed Protocol
Ans:
Static: 1
Internal EIGRP: 90
IGRP 100
OSPF 110
RIP 120
External BGP 20
38) What are the different types of interfaces available on the router?
Ans:
1) Lan Interface: ->This interface is used to connect the router to a LAN device.
2) Wan Interface:-> This interface is used to connect the router to wan device.
Ans:
1) Unmanageable Switch:
à Less cost
2) Manageable Switch:
à More cost.
40) What are the key advantages of using switches instead of hubs?
A:
41) What is the difference between User Mode and Privilege Mode in Cisco IOS?
A:
User Mode:
--> Basic Troubleshooting tasks such as PING, Traceroute can be done in this mode.
--> Basic status of a network device such as router or switch can be checked in this mode.
Privilege Mode:
--> Advanced status of a network device such as router or switch can be checked in this
mode using show commands.
Multi-Layer Switch
4) Faster
Router:
4) Slower
NTP--------------123
SNMP------------161
POP---------------110
https://www.kareemccie.com/search/label/Interview%20Questions
Read More
Q) What are the maximum number of routers that can be present in a GLBP group?
A: 5
Q) What are the GLBP default Hello and Hold Down Timers?
A: GLBP supports load balancing whereas HSRP and VRRP do not support load balancing.
A: Yes
A:
Disabled
Initial
Listen
Speak
Standby
Active
Q) What are the different types of load balancing methods supported by GLBP?
A:
1) Round Robin
2) Weighted
3) Host Dependent
4) None
https://www.kareemccie.com/search/label/Interview%20Questions
Read More
Q) What is the maximum number of HSRP groups that can be created in the router?
A:256
A:0000.5E00.01XX
Q) What are the maximum number of routers that can be present in a group?
A: 255
A: IP Protocol 112
Q) What are the VRRP default Hello and Hold Down Timers?
Q) If Master router LAN interface is up but the line protocol is down, In this case, whether Backup
router will become Master router?
A: Yes Backup router will become the Master router if the interface is up but the line protocol is
down.
Q) If you perform traceroute, which IP address you will see in the reply (Physical or virtual IP )?
A: Physical IP address
A: Yes
Read More
Q) What is Etherchannel?
--> We can utilize all the links as STP will not block the link.
--> Redundancy ( The Etherchannel continues to work till all the links go down).
A: It goes into Suspended state when the above requirements do not match.
--> Dynamic Etherchannel checks all the parameters which were mentioned above before forming
the EtherChannel.
--> There is a less chance of loop if we use dynamic EtherChannel instead of static EtherChannel.
https://www.kareemccie.com/search/label/Interview Questions 22/46
4/15/22, 4:32 PM Network & Security Consultant: Interview Questions
PAGP
Desirable ( The interface which is configured in the mode will actively try to form the
EtherChannel)
Auto ( The interface which is configured in the mode will passively try to form the EtherChannel)
LACP
Active ( The interface which is configured in the mode will actively try to form the EtherChannel)
Passive ( The interface which is configured in the mode will passively try to form the
EtherChannel)
OFF ( The interface does not try to form the EtherChannel in this mode)
Q) Is it possible to configure the Etherchannel between two different devices such as Router and
Switch or Switch and Server?
A: Yes
--> Dst-ip
--> Src-ip
--> Dst-mac
--> Src-mac
--> Dst-port
https://www.kareemccie.com/search/label/Interview Questions 23/46
4/15/22, 4:32 PM Network & Security Consultant: Interview Questions
--> Src-port
--> Src-dst-ip
--> Src-dst-mac
--> Src-dst-port
A: 128
Q)
Md.Kareemoddin
CCIEE# 54579
Read More
IPSEC VPN
--> Requires a client software on every endpoint for Remote Access VPN.
SSL VPN
--> Does not require client software on every endpoint for Remote Access VPN.
--> Provides granular access up to the application layer ( Users can get the access only specific
resources that are required according to security policy).
--> Uses Third-Party Authentication makes less secure compared to IPSEC VPN.
--> Well suited for Remote Access VPN and Web-based Applications.
Md.Kareemoddin
CCIE # 54759
Read More
Read More
--> Control Provisioning of Wireless Access Points is a standard Protocol that enables a wireless
lan controller to manage access point.
Read More
1) Port Channels are always created between two directly connected devices, not between non
directly connected devices.
2) Port Channel does not increase the speed, simply they will increase the throughput( The traffic
between device A to device B always goes via only one link, even though if you have four links in
the ether channel).
Read More
Basically VSS and Vpc both are used to create multi chasis etherchannel
1) vPC is Nexus switch specific feature,however,VSS is created using 6500 series switches
2) In VSS there will be single control plane for both the switches, where as in vPC there will be separate control
plane for every switch.
3) VSS can support L3 port-channels across multiple chassis,however, vpc is used for L2 port-channels only.
4) VSS supports both PAgP and LACP,however, VPC only supports LACP.
5) VSS mainly used for campus environment whereas VPC is used for Data Center environment.
6) In VSS, only one logical switch has be managed from management and configuration point of view.That
means, when the switches are put into VSS, now there is only one IP which is used to access the switch. They
are not managed as separate switches and all configuration are done on active switch.
-They are managed similar to what we do in stack in 3750 switches,however, in vPC, the switches are managed
separately. That means both switches will have separate IP by which they can be accessed,monitored and
managed. Virtually they will appear a single logical switch from port-channel point of view only to downstream
devices.
-As i said, VSS is single management and single configuration, we can not use them for HSRP active and
standby purpose because they are no longer 2 seperate boxes. Infact HSRP is not needed, right? one single IP
can be given to L3 interface and that can be used as gateway for the devices in that particular vlan and we will
still have redundancy as being same ip assigned on a group of 2 switches.
- If one switch fails, another can take over.,however, in vPC as i mentioned above devices are separately
configured and managed, we need to configure gateway redundancy same as in traditional manner.
Read More
à
Configuration of Manual NAT is done under global configuration mode whereas
Auto NAT
configuration is done under Network Object mode.
à
Auto NAT only allows you to translate source address and Manual NAT we can translate both
Source and Destination Address.
à Auto NAT is also called as Object NAT and Manual NAT is also called as Twice NAT.
à
We can only use network object in Auto NAT, whereas we can use both network
object and
network object group in Manual NAT.
à
Manual NAT is more flexible compared to Auto NAT.
à
In Auto NAT, Nat rules are automatically ordered. In Manual NAT, Nat rules are
manually
ordered.
à
Auto NAT is easy to configure compared to MANUAL NAT.
Note: It is recommended
to use Auto NAT unless you need more features of Manual NAT.
Read More
--> IKEV2 is more scalable by using proposals which automatically creates the different
combinations of policies or security associations.
--> IKEv2 supports EAP authentication whereas IKEv1 does not support.
--> IKEv2 is having built-in NAT traversal whereas IKEv1 is having optional.
--> IKEv2 supports MOBIKE where IKEv1 does not support.( MOBIKE allows IKEv2 to be used in
Mobile platforms).
--> IKEv1 requires symmetric authentication (both have to use the same method of authentication),
whereas IKEv2 uses Asymmetric Authentication ( Means one side RSA, another side can be pre-
shared-key).
--> IKEv2 allows you to use separate keys for each direction which provides more security
compared to IKEv1.
--> IKEv2 provides more security by having the support for more algorithms compared to IKEv1.
--> Flex VPN will work with the only IKEv2, not with IKEv1.
--> IKEV2 supports 4 messages whereas IKEv1 works in two modes ( Main Mode -- 6 messages
and Aggressive Mode -- 3 messages).
Read More
3) Area ID
6) Authentication
--> Adjacent Routers are the routers that exchanged hello messages, LSA and have synchronized
LSDB.
---> Neighbor Routers are the routers that exchanged only hello messages.
1) DOWN
2) INIT
3) 2-WAY
4) EXSTART
5) EXCHANGE
6) LOADING
7) FULL
7) If there are routers present in the area, which router does the conversion of LSA7 to LSA 5 in
OSPF ?
12) What is the difference between OSPF and IS-IS and which one is preferred?
A:
1) IS-IS does not support Virtual links whereas OSPF supports the virtual link concept.
3)IS-IS Supports only simple authentication whereas OSPF supports simple authentication ( Clear
Text) as well as MD-5 Authentication.
5) OSPF routers form neighbor relationships only if hello and hold down timers match whereas in
IS-IS hello interval and hold down timer need not match to form a neighbor relationship.
Ans:
2) BMA
3) NBMA
4) point to multipoint
Ans:
1) Router LSA
2) Network LSA
3) Summary LSA
EIGRP OSPF
17) One side MTU is 1500 and another side MTU is 1600. Does it affect the neighbor
relationship in OSPF?
18)
Read More
Q) What is MPLS?
A: MPLS is a forwarding mechanism which allows the router to forwarding packets based upon
labels instead of IP Address.
A: MPLS is called as Multi Protocol because it supports all the protocols like Ethernet, Frame-
Relay , X.25 and forwards packets based upon Labels.
A: MPLS is called as Layer 2.5 Technology because the router inserts MPLS Header in between
Layer 2 and Layer 3 Header.
iii) MPLS supports the forwarding of non-IP protocols, because MPLS technologies are applicable
to any network layer protocol.
Q) What is LDP?
A: LDP is a Labelling Protocol used to share label information with other routers and create label
forwarding table.
A: LDP runs on port number 646 ( UDP port number for discovery of LDP neighbors and TCP port
for exchanging the label information.
A: 1) IP CEF
A: Penultimate hop popping is a method of reducing label lookups on egress router. It is basically
done by the one hop before the egress router.
Q) What is the difference between Per Platform Label Space and Per Interface Label Space?
A: Per Platform label space indicates the labels assigned based upon the destination network and
Per Interface label space indicates the labels assigned based upon the destination network and
interface.
A: No
A: TTL Propagation is a method of copying the TTL value from IP Header to MPLS header.
A: LDP IGP Synchronization allows the router not to forward the packets on the link where ldp is
down but IGP is enabled.
A: --> Implicit Null ( Label 3) is used to indicate the other router to remove label before sending
the packets ( PHP).
--> Explicit Null ( Label 0) is used for QOS and disables PHP behavior.
Read More
Q) What is Multicast?
A: Multicast is a method of sending the data from one source to so many receivers.
IGMP Snooping & CGMP - Provides the communication between Router & Switch
Q) What is IGMP?
A: IGMP is a protocol which enables the host to join particular group by signalling the router.
A: --> In IGMPV1 there are only 2 messages are used ( Membership Query and Membership
Report) whereas in IGMPV2 there is one more message extra( Query, Report and Leave).
A: Multicast Distribution Tree specifies the path between source and Receiver in which multicast
traffic should be forwarded. There are mainly two types of Multicast Distribution Trees
1) Source Tree
2) Shared Tree
A: Source Tree
--> Uses Source as the Root of the Multicast Tree and Receivers are acting like branches.
--> It is also known as Shortest Path Tree because it uses the shortest path between source and
receiver.
--> Every Router in Source Tree will add (S,G) Entries in multicast routing table.
--> Uses Rendezvous Point as the Root of the Multicast Tree and shortest path tree will be created
between i) Source & RP ii) Receiver & RP
--> It is also known as Root Path Tree or Core Based Tree.
--> Every Router in Source Tree will add (*,G) Entries in multicast routing table.
Q) What is PIM?
A: PIM is a protocol used between the routers to forward multicast traffic. PIM works in two
https://www.kareemccie.com/search/label/Interview Questions 38/46
4/15/22, 4:32 PM Network & Security Consultant: Interview Questions
modes
--> Mostly used in routing protocols such as EIGRP/OSPF for sending hello packets.
Source-Specific Multicast
--> Used for Discovering the unicast address of the server who is generating the multicast traffic.
--> GLOP Multicast address is used by companies who have their own Public AS Number.
--> If a company owns Public AS Number 21544 then in order to get the Multicast address for the
company:
2) Convert Hexa Decimal of the first two digits 54 to Decimal and the last two digits 28 to
Decimal.
Read More
Q) What is Access-List?
A: Access-List is going to Filter incoming as well as outgoing traffic on the router interface.
4) NAT
3)VPN
4)TCP Intercept
A: 1) Standard ACL only checks Source IP address, Extended ACL checks Source IP, Destination
IP and Protocol also for filtering traffic.
2) Standard ACL can be created using number (1-99,1300-1399) and Extended ACL can be
created using number(100-199,2000-2699).
3) Two way communication is blocked in Standard ACL, One way communication is stopped
in Extended ACL.
4) Standard ACL implemented near to destination, Extended ACL implemented near to Source.
A: 1) Numbered ACL is created by using number, Named ACL is created by using name,
A: Drop traffic
https://www.kareemccie.com/search/label/Interview Questions 42/46
4/15/22, 4:32 PM Network & Security Consultant: Interview Questions
A: Case Sensitive
A: Traffic that is generated by the router itself, ACL is going to filter only transit traffic.
Read More
SEARCH
Follow me on Linkedin
Mahmmad Kareemoddin
Mahmmad Kareemoddin
Network Security Consultant & F5
Expert
Hewlett Packard Enterprise | SR Engineering
College
View profile
Pages
Home
DISCLAIMER
PRIVACY Page
CONTACT US
Followers
Followers (254)
Next
Popular Posts
What is FlexConnect?
--> Flex Connect is a wireless
solution which allows you to
HSRP States
1) Initial State: When the Interface goes in up
state. 2) Learn State: The router is trying to
learn Virtual IP address 3) Listen State...
Menu
Security
Wireless
Voice
Data Center
Interview Questions
F5
Switching
Troubleshooting
About Me
Kareem