Ccna All Interview Q & A
Ccna All Interview Q & A
Contact Us
Looking for the CCNA interview Questions to prepare for the CCNA interview? Well, you
have landed to the very right place. Cisco Certified Network Associate popularly
known as CCNA is a certification exam that qualifies IT professionals to perform various
entry-level tasks within the IT industry. The CCNA certification deals with validating the
skill, ability and expertise of an individual to fix, configure and troubleshoot networks.
In this blog we have listed the most frequently asked CCNA interview questions and
answers to ace your interview with confidence.
Download PDF
#2. How many layers are there in an OSI reference model? Name
them.
There are 7 layers in an OSI (Open Systems Interconnection) reference model. They
are:
1. Physical layer
2. Data link layer
3. Network layer
4. Transport layer
5. Session layer
6. Presentation layer
7. Application layer
#3. Explain HDLC.
HDLC (High-Level Data Link Control) is a group of communication protocols that usually
provides reliable delivery of data frames over communication or network link. It is a
proprietary protocol for CISCO and is the default encapsulation operated within CISCO
routers. It also ensures the error-free transmission of data and can provide both
connection-oriented and connectionless services.
Subnetting is when smaller networks are created from a larger parent network. Each
subnet is given an identifier or certain parameters within the network to indicate its
subnet number.
Spanning Tree Protocol (STP) is a protocol which prevents layer 2 loops. STP
enables switches to become more aware of each other so that they can negotiate a
Loop-free path through the network. It chooses a reference point (Route Bridge) in the
network and calculates all the paths that are no longer useful (known as redundant
links) to that reference point. Then it selects one path to forward frames and blocks
other redundant paths. When blocking happens, loops are prevented.
Queueing delay
Packet Loss
Slow Network
Blocking of new connections
Low throughput
Ways to fix network congestion :
1. Divide your network into subnets that can be resized to meet traffic.
2. TCP/IP settings should be adjusted to balance packet send/request speeds.
3. Upgrade your Internet plan to allow for more devices and increased bandwidth.
#16. What is the difference between User Mode and Privileged
Mode?
User Mode is commonly utilized for performing regular tasks on a CISCO router. For
example, User Mode may be used to connect to remote devices or check the status of a
router.
Privileged Mode is used to perform higher-level tasks on the router such as debugging
and making configurations. Privileged Mode also includes all of the options that are
available for use in User Mode.
Bandwidth
Load
Delay
Reliability
MTU
Maximum Transmission Unit
#19. What are the different memories used in a CISCO router?
Different memories used in a CISCO router are:
Cat 3 – used for voice & data communication .Category?3 cable, commonly known
as?Cat 3?or?station wire .carry data up to 10?Mbit/s.
Cat 4 – It is used in telephone networks which can transmit voice and data up to 16?
Mbit/s
Cat 5 – The cable provides performance of up to 100?MHz and Cat?5 is also used to
carry other signals such as?telephony and?video.Cat5 does not support exact 100 MHz
. but Cat5e provide exact 100 MHz bandwidth.
Cat7– ?Ethernet cable is the newest cable category, operating at speeds of 10 Gb/s at
100 meters of cable and transmitting frequencies up to 600 Mhz.
Qus2 :- What is APIPA
Ans :- Automatic Private IP addressing with this , A DHCP client can automatically
configured an IP address & subnet mask when no DHCP server is available .
SWITCH? Single Broadcast Domain and Multiple Collision Domain. But can also
separate Broadcast Domain by using VLAN’s
A?broadcast domain?is a logical division of a computer network, in which all nodes can
reach other by broadcast at the data link layer.
Application Layer
Presentation Layer
Session Layer
Transport Layer
Network Layer
Data Link Layer
Physical Layer
TCP/IP came 10 years before then OSI Model and it actually works in real scenarios.
Consist 4 layers —
Application Layer
Transport Layer
Internet layer
Network Interface layer/Link Layer /Network Link Layer
Qus7:- Port numbers of TCP and UDP Protocole
Ans:- Server provide their services on the basis of port numbers .we have two types of
connections ?
Telnet ? 23
SMTP – 25
DNS-53
Firewall separate the internal (private) & external (public) network.It establishes a
barrier between a trusted internal network and untrusted external network.
Types of firewall —
network firewalls?or?host-based firewalls
Types of Routing ?
Static Routing
Default Routing
Dynamic routing
Interior gateway routing protocol
Distance vector routing
RIP,RIPV2
OSPF ,IS-IS
Advance Distance vector routing
224.0.0.6 – AllDRouters: Used to send OSPF messages to all OSPF DRs (the DR and
the BDR) on the same network. All OSPF routers except the DR use this address when
sending Link State Update and Link State Acknowledgment packets to the DR.
Query
Reply
Acknowledgment
It uses Reliable Transport Protocol with 88 protocol number
AD value of OSPF is 110 and multicast address is 224.0.0.5 &224.0.0.6 .It maintain
the 3 tables ? Neighbor table , Database table and Routing table .
Hello pkt
DOWN
INIT
2-WAY
ExSTART
EXCHANGE
LOADING
FULL
Qus13:- Maximum HOP Count in RIP, EIGRP and OSPF
Ans:-RIP , EIGRP and OSPF all three are Dynamic Routing Protocol .
If logical interface loopback is configured ,the highest IP address of the logical interface
is Router-ID .
If we add one more loopback 20.1.1.1 higher than 1.1.1.1, here 20.1.1.1 will become
your Router-ID
10^7/(Min Bandwidth)
Sum of delays/10
Metric =( Bandwidth + Delay)*256
Qus17:- Working of Switch
Switch is an interconnecting device with 16 or 24 ports in common. All other devices are
connected to these ports. Whenever any machine sends packet to any other machine,
source machine send packet to switch, switch then forwards it to destination machine.
Each packet which comes to switch contains source and destination physical address in
it, on basis of which switch forwards packet to other machine. Switch always sent
packet based on destination MAC address. Its process is as follows:
1. When switch receives a packet from any device, it checks for its destination MAC
address.
2. Then switch compares destination MAC address with its MAC Address Table for
corresponding MAC address.
a. If MAC Address is found, packet is sent out to port against which MAC Address was
matched.
b. If entry is not found, Unknown unicasts (when the switch doesn’t have a port mapping
for a destination mac address in the frame) are treated like broadcasts by Layer Two
devices, and are flooded out of all ports except the port on which the frame originated.
Now question comes, how does switch knows on which port destination machine is
connected? — For this switch uses one table in its cache memory called MAC Address
table or Forwarding Table in which switch stores that at which port which machine is
connected by storing its physical address (MAC Address). So table contains two
columns (Physical Address and Port Number) and rows equal to number of ports in
switch.
When switch is turned ON, by default there is no entry in MAC address table, as
communication starts, based on devices involved entries are created in table.
To obtain MAC address, ARP performs following process: (ARP request by host
machine)
1. Source machine generate ARP REQUEST packet with source MAC address (of this
machine), source IP address (of this machine) and destination IP address and forwards
this packet to switch.
2. Switch receives the incoming packet and reads the source MAC address and checks
its MAC address table, if entry for packet at incoming port is found then it checks its
MAC address with the source MAC address and updates it, if entry not found then
switch add and entry for incoming port with MAC address.
3. All ARP REQUEST packets are broadcasted in network, so switch broadcast ARP
REQUEST packet in network, because destination for ARP packet will be
255.255.255.255. (Broadcast are those packets which are sent to everyone in network
except the sender, only in network to which it belongs, it cannot span multiple networks)
4. All devices in network receives ARP packet and compare their own IP address with
the destination IP address in that packet.
5. Only the machine which matches the both will reply with ARP reply packet. This
packet will have source IP of this machine (which was destination machine in previous
packet, as now its replying this machine will be the source machine) , source MAC
address, destination MAC address (same as source MAC address in REQUEST
packet) and destination IP address (same as source IP address in REQUEST packet).
6. Then switch reads the ARP reply message and add entry in its MAC Address Table
for port number on which it has received packet by reading its source MAC address field
and forwards that packet to destination machine (source machine in REQUEST packet)
as its MAC is indestination MAC address.
7. Further host machine add destination machine entry into its ARP table. This using
ARP resolution switch and other devices in network obtain MAC address of any other
device in a network. Remember ARP works on broadcast, so it works only in single
network.
Types of VLANs ?
Default VLAN
Native VLAN
DATA VLAN
VOICE VLAN
PRIVATE VLAN
MANAGEMENT VLAN
ISL ? Inter Switch Link is Cisco proprietary protocol. That is 30 bytes in length. It add 30
bytes info in it’s frame that obviously increase the size of frame. Even cisco also
recommend to use IEEE 802.IQ for encapsulation.
IEEE DOT1Q/802.1Q ? It is open standard .defined by IEEE . All vendor support this .it
add 4 byte tag to the original frame .it doesn’t tag frames that belong to native VLAN.
Qus23 :- Why VTP is needed ? Their modes and which mode use
extended vlan ?
Ans :- Virtual Trunking Protocol use for propagate VLAN Database . Database
creates in Vlan.dat file and store in flash memory.
VTP Modes ?
Server Mode ?can not use extended vlan , by default VTP is in server mode
The main use of NAT is to limit the no. of public addresses an organization or company
must use for both economy and security purpose.
Types of NAT
Static NAT
Dynamic NAT
Port Address Translation PAT
Qus27:- In Ether Channel /Port Channel /Link Aggregation, two
switches are connected. On one switch lacP is running and on
another switch pagP is running. Will they be able to establish
communication?
Ans :-
“NO” all ports in an ether channel must use the same protocol , you can not use two
protocols on two ends . In other words pagP and lacP are not compatible so , both ends
of a channel must use the same protocol .
1. Numbered
2. Named
Numbered Standard Access list range is from 1-99
It blocks a network, host and subnet.
All services are blocked
Implement closest to the destination
Packet filtering is based on only source IP address.
Numbered Extended Access list range is from 100-99.
Can block a network, host, subnet and services.
Can block any specific service as per requirement
Implement closest to the source
Packet filtering is based on source, destination address and protocol and
port number.
“Named Access-List mainly preferable because it has editing feature”
Broadcast
Multicast
Unicast
IPV6 ?
Multicast
Unicast
Anycast ? Good feature in IPV6
“IPV6 is 128 bit long , having 8 octets/blocks . Each block contain 16 bits . It got
implemented to reduce address shortage in IPV4” IP address is given to every
device in the network and it is used to identify the device with in the network.
Qus30:- STP States and how Root Bridge, Root port and
Designated Port got select?
Ans : – Spanning Tree Protocol is a loop prevention technique defined by IEEE
82.1d .Switches run STP by default , Switches use spanning tree algorithm STA to
decide which port should be shut down.
STP States ?
Disable
Blocking
Listening
Learning
Forwarding
The selection of Root Bridge is based on Bridge_ID , Bridge_ID consist bridge priority
and MAC address .by default priority is 32768. If all switches have same priority then
root bridge selection will be based on MAC address. Bridge_ID go in BPDU packet.
Every switch share Bridge protocol data unit (BPDU) after 2 seconds.
The ports that are connected directly with Root Bridge become root port.