CCNA Interview Questions and Answersdocx
CCNA Interview Questions and Answersdocx
1) What is Routing?
Routing is the process of finding a path on which data can pass from source to
destination. Routing is done by a device called routers, which are network layer
devices.
The job of the Data Link layer is to check messages are sent to the right device.
Another function of this layer is framing.
When a switch receives a signal, it creates a frame out of the bits that was extracted
from that signal. With this process, it gains access and reads the destination
address, after which it forwards that frame to the appropriate port. This is a very
efficient means of data transmission, instead of broadcasting it on all ports.
Network congestion occurs when too many users are trying to use the same
bandwidth. This is especially true in big networks that do not resort to network
segmentation.
A Window refers to the number of segments that is allowed to be sent from source to
destination before an acknowledgement is sent back.
Not really. What a bridge actually does is to take the large network and filter it,
without changing the size of the network.
This model uses the Store-and-forward switching method. It stores the entire frame
to its buffers and performs a crc check before deciding whether or not to forward that
data frame.
The LLC sublayer, short for Logical Link Control, can provide optional services to an
application developer. One option is to provide flow control to the Network layer by
using stop/start codes. The LLC can also provide error correction.
RIP relies on the number of hops in order to determine the best route to a network.
On the other hand, IGRP takes consideration many factors before it decides the best
route to take, such as bandwidth, reliability, MTU and hop count.
BootP is a protocol that is used to boot diskless workstations that are connected to
User Mode is used for regular task when using a CISCO router, such as to view
system information, connecting to remote devices, and checking the status of the
router. On the other hand, privileged mode includes all options that are available for
User Mode, plus more. You can use this mode in order to make configurations on the
router, including making tests and debugging.
This is Ethernet that makes use of fiber optic cable as the main transmission
medium. The 100 stands for 100Mbps, which is the data speed.
In full-duplex, both the transmitting device and the receiving device can communicate
simultaneously, that is, both can be transmitting and receiving at the same time. In
the case of half-duplex, a device cannot receive while it is transmitting, and vice
versa.
MTU stands for Maximum Transmission Unit. It refers to the maximum packet size
that can be sent out onto the data line without the need to fragment it.
In Cut-Through LAN switching, as soon as the router receives the data frame, it will
immediately send it out again and forward it to the next network segment after
reading the destination address.
Latency is the amount of time delay that measures the point from which a network
device receives a data frame to the time it sends it out again towards another
network segment.
19) Utilizing RIP, what is the limit when it comes to number of hops?
The maximum limit is 15 hop counts. Anything higher than 15 indicates that the
network is considered unreachable.
The initial thing to do is to enable IPX routing by using the “ipx routing” command.
Each interface that is used in the IPX network is then configured with a network
number and encapsulation method.
There are two access lists: Standard and Extended. Standard Access List can only
filter the source or destination IP address. An Extended Access List uses the source
and destination IP addresses, port, socket and protocol when filtering a network.
VLANs allow the creation of collision domains by groups other than just physical
Subnetting is the process of creating smaller networks from a big parent network.
Being a part of a network, each subnet is assigned some additional parameters or
identifier to indicate its subnet number.
25) What are the advantages of a layered model in the networking industry?
Presentation layer supports many standards, which ensures that data is presented
correctly. These include PICT, TIFF and JPEG for graphics, MIDI, MPEG and
QuickTime for Video/Audio.
In cases when you need to configure a router remotely, the most convenient is to use
the Cisco AutoInstall Procedure. However, the router must be connected to the WAN
or LAN through one of the interfaces.
31) How do you go to privileged mode? How do you switch back to user mode?
To access privileged mode, you enter the command “enable” on the prompt. In order
to get back to user mode, enter the command “disable”
HDLC is short for High Level Data Link Control protocol, and is a propriety protocol of
CISCO. It is the default encapsulation operated within CISCO routers.
Internetworks are created when networks are connected using routers. Specifically,
the network administrator assigns a logical address to every network that connects to
the router.
Packets are the results of data encapsulation. These are data that has been wrapped
under the different protocols of the OSI layers. Packets are also referred to as
datagrams.
Segments are sections of a data stream that comes from the upper OSI layers and
ready for transmission towards the network. Segments are the logic units at the
Transport Layer.
The best way to go about this is to use the equation 256 minus the subnet mask. The
hosts that are considered valid are those that can be found between the subnets.
DLCI, or Data Link Connection Identifiers, are normally assigned by a frame relay
service provider in order to uniquely identify each virtual circuit that exists on the
network.
From a data transmitter’s point of reference, data from the end user is converted to
segments. Segments are then passed on to the other layers and converted into
packets or datagrams. These packets are then converted into frames before passing
on to the network interface. Finally, frames are converted to bits prior to actual data
transmission.
43) What are the different types of passwords used in securing a CISCO router?
There are actually five types of passwords that can be used. These are enable
secret, enable, virtual terminal, console, and auxiliary.
44) Why is network segmentation a good idea when managing a large network?
For a network administration, segmenting a network would help ease network traffic
and ensures that high bandwidth is made available at all times for all users. This
translates to better performance especially for a growing network.
45) What are the things that can be accessed in a CISCO router’s identifying
information?
The hostname and the Interfaces. The hostname is the name of your router. The
Interfaces are fixed configurations that refer to the router ports.
Logical Topology refers to the signal path through the physical topology. Physical
47) What causes a triggered update to reset the router hold-down timer?
This may happen when the hold-down timer has already expired, or when the router
received a processing task that incidentally was proportional to the number of links in
the internetwork.
48) In configuring a router, what command must be used if you want to delete the
configuration data that is stored in the NVRAM?
A. erase running-config
B. erase startup-config
C. erase nvram
D. delete nvram
Correct Answer: B. erase startup-config
49) Referring to the commands shown, what command must next be used on the branch
router prior to traffic being sent to the router router?
50) When configuring a router utilizing both physical and logical interfaces, what factor
must be considered in determining the OSPF router ID?
51) Mention what is the difference between the switch, hub, and router?
A data packet consists of sender’s information, recipient’s information, and the data
contained. It also has the numeric identification number that defines the packet
number and order. When data is send across the network, that information is
segmented into data packets. In short, data packets carry the information and
routing configuration for your transferred message.
57. Mention what is the difference between dynamic IP and static IP addressing?
Dynamically IP addresses are provided by DHCP server and static IP address are
given manually.
58. Mention what are the ranges for the private IPS?
• Telnet (IP)
• AUX (Telephone)
• Console (Cable)
60. Explain what is EIGRP?
EIGRP stands for Enhanced Interior Gateway Routing Protocol; it is a routing protocol
designed by Cisco Systems. It is availed on a router to share routes with other
routers within the same autonomous system. Unlike other routers like RIP, EIGRP
only sends incremental updates, decreasing the workload on the router and the
amount of data that needs to be transferred.
63. Mention what command you must use if you want to delete or remove the
configuration data that is stored in the NVRAM?
Erase startup- coding is the command you must use if you want to delete the
configuration data that is stored in the NVRAM
TCP and UDP both are protocols for sending files across computer network
Full duplex means that the communication can occur in both directions at the same
time, while half duplex means that the communication can occur in one direction at
time.
69. What route entry will be assigned to dead or invalid route in case of RIP?
In the case of RIP table entry 16 hops will be assigned to dead or invalid route
making it unreachable