Professional Documents
Culture Documents
30 June, 2015
9:13 PM
I collected this questions from various books and online articles. Hope this will help you
while preparing for your interviews. If you want to know how to prepare for Network
Interview see this post
32 bits
IEEE standard for wireless networking?
802.11
New Section 2 Page 1
802.11
What is the range of class A address?
1-127
What is the range of class B address?
128-191
What is the range of class C address?
192-223
What is PoE (Power over Ethernet) ?
Power over Ethernet or PoE describes any of several standardized or ad-hoc systems which
pass electrical power along with data on Ethernet cabling. This allows a single cable to provide
both data connection and electrical power to devices such as wireless access points or IP
cameras.
equal access to the wire and can place data on the wire when the wire is free from traffic.
When a host want to place data on the wire, it will sense the wire to find whether there is a
signal already on the wire. If there is traffic already in the medium, the host will wait and if
there is no traffic, it will place the data in the medium. But, if two systems place data on the
medium at the same instance, they will collide with each other, destroying the data. If the data
is destroyed during transmission, the data will need to be retransmitted. After collision, each
host will wait for a small interval of time and again the data will be retransmitted, to avoid
collision again.
CSMA/CA (Carrier Sense Multiple Access/Collision Avoidance)
In CSMA/CA, before a host sends real data on the wire it will sense the wire to check if the
wire is free. If the wire is free, it will send a piece of dummy data on the wire to see whether
it collides with any other data. If it does not collide, the host will assume that the real data also
will not collide.
What is DHCP scope?
What is Checksum?
A simple error-detection scheme in which each transmitted message is accompanied by a
numerical value based on the number of set bits in the message. The receiving station then
applies the same formula to the message and checks to make sure the accompanying
numerical value is the same. If not, the receiver can assume that the message has errors and
needs to be re-sent.
What is Redundancy ?
for Power-on Self Test (POST) diagnostics. For ROM Software upgrades, the pluggable chips on
the motherboard should be replaced.
Flash Memory
Flash memory is an Electronically Erasable and Re-Programmable memory chip. The Flash
memory contains the full Operating System Image (IOS, Internetwork Operating System). This
allows you to upgrade the OS without removing chips. Flash memory retains content when
router is powered down or restarted.
RAM
RAM is very fast memory that loses its information when the router is shutdown or restarted.
On a router, RAM is used to hold running Cisco IOS Operating System, IOS system tables and
buffers RAM is also used to store routing tables, keep ARP cache, Performs packet buffering
(shared RAM). RAM Provides temporary memory for the router configuration file of the router
while the router is powered on.
RAM Stores running Cisco IOS Operating System, Active program and operating system
instructions, the Running Configuration File, ARP (Address Resolution Protocol) cache, routing
tables and buffered IP Packets.
NVRAM (Non-volatile Random Access Memory)
NVRAM is used to store the Startup Configuration File. This is the configuration file that IOS
reads when the router boots up. It is extremely fast memory and retains its content when the
router is restarted.
What are the different types of passwords used in securing a CISCO router?
Console
Aux
VTY
Enable password
Enable secret
In configuring a router, what command must be used if you want to delete the
What is 100BaseFX?
The "100" in the media type designation refers to the transmission speed of 100 Mbit/s, while
the "BASE" refers to baseband signalling. The letter following the dash ("T" or "F") refers to the
physical medium that carries the signal (twisted pair or fiber, respectively).
Differentiate full-duplex from half-duplex ?
Transport
Network
Provides IP Adressing
Finds best path to destination (routing)
Data Link
Physical
Network
Switches work at which OSI layer ?
Data Link
In which layer term "Frames" is used ?
Data Link
In which layer term "Packets" is used ?
Network
In which layer term "Segments" is used ?
Transport
Give some example for protocols work in Application layer ?
Telnet, FTP, DNS, SNMP, SMTP
What is CRC? Which layer CRC works ?
A cyclic redundancy check (CRC) is an error-detecting code commonly used in digital networks
and storage devices to detect accidental changes to raw data. Blocks of data entering these
systems get a short check value attached, based on the remainder of a polynomial division of
their contents. On retrieval the calculation is repeated, and corrective action can be taken
against presumed data corruption if the check values do not match.
TCP
UDP
Reliable
Connection Oriented
Opposite
Connection Oriented
Gives Acknowledgement
Does 3 way handshake
Error checking
Has heavy overhead
Slower
What is the port no of DNS and Telnet?
DNS=53 Telnet=23
Which service use both TCP and UDP ?
DNS
What is the port no of SMTP and POP3?
SMTP = 25 POP3= 110
Which one is reliable TCP or UDP ?
TCP
RIP Interview Questions
What is Route Poisoning?
Route poisoning is a method to prevent a router from sending packets through a route that
has become invalid within computer networks. Distance-vector routing protocols in computer
networks use route poisoning to indicate to other routers that a route is no longer reachable
and should not be considered from their routing tables. Unlike the split horizon with poison
reverse, route poisoning provides for sending updates with unreachable hop counts
immediately to all the nodes in the network.
When the protocol detects an invalid route, all of the routers in the network are informed that
the bad route has an infinite () route metric. This makes all nodes on the invalid route seem
infinitely distant, preventing any of the routers from sending packets over the invalid route.
What is Split Horizon ?
Split horizon is a method of preventing a routing loop in a network. The basic principle is
simple: Information about the routing for a particular packet is never sent back in the direction
from which it was received.
Utilizing RIP, what is the limit when it comes to number of hops?
15
What is the difference between RIP V1 and V2 ?
Rip V1
Broadcast
Rip V2
Multicast 244.0.0.9
(support VLSM)
No Authentication
Authentication
224.0.0.9
Administristative distance of RIP ?
120
Can we use RIP in a scenario having more than 15 routers ?
Yes as long as they are not consecutively linked. I.E Stick with star type topologies and you
should be ok.
What is the difference between RIP and RIPng?
Designated Port?
port cost.
What is BDPU ?what is the basics function of BPDU?
Bridge Protocol Data Units (BPDUs) are frames that contain information about the Spanning
tree protocol (STP). Switches send BPDUs using a unique MAC address from its origin port and
a multicast address as destination MAC (01:80:C2:00:00:00, or 01:00:0C:CC:CC:CD for Per
VLAN Spanning Tree). For STP algorithms to function, the switches need to share information
about themselves and their connections. What they share are bridge protocol data units
(BPDUs). BPDUs are sent out as multicast frames to which only other layer 2 switches or
bridges are listening. If any loops (multiple possible paths between switches) are found in the
network topology, the switches will co-operate to disable a port or ports to ensure that there
are no loops; that is, from one device to any other device in the layer 2 network, only one path
can be taken.
Using the default STP timers, how long does it take for a port to move from the
Step 1 : Elect Root Bridge - Lowest bridge priority, if there is a tie then switch with lowest
bridge ID
Step 2 : Elect Root Ports - Locate redundant paths to root bridge; block all but on root.
Root Path Cost is cumulative cost of path to root bridge. Ports directly connected to Root
Bridge will be root ports, otherwise lowest root path cost used.
Step 3 : Elect Designated Ports - Single port that sends and receives traffic from a switch
to and from Root Bridge - Lowest cost path to Root Bridge.
What is the difference between path cost and root path cost?
What is the difference between STP, MSTP, PVST and RSTP?
What is path cost?
Define selection criteria of STP root bridge.
What are the four spanning tree port states?
How to non bridge decide which port will elect as root port?
If a nonroot bridge has two redundant ports with the same root path cost, how does
the bridge choose which port will be the root port?
Port states of spanning tree protocol.
If the users face delay during initial login, what you will suggest to implement?
Why spanning tree BPDU filter is used?
Can I use BPDU filter on trunk ports?
Which port state is introduced by Rapid-PVST?
What is Spanning Tree Protocol (STP) PortFast?
What does STP do when it detects a topology change in the network due to a bridge or
link failure?
http://sysnetnotes.blogspot.in/2013/05/vlan-explained-with-interviewquestions.html
Server mode and change VLAN information in a VTP Server. The changes made in a switch in
server mode are advertised to the entire VTP domain.
Client Mode
VLAN Trunking Protocol (VTP) client mode switches listen to VTP advertisements from other
switches and modify their VLAN configurations accordingly. A network switch in VTP client
mode requires a server switch to inform it about the VLAN changes. We CANNOT create, add,
or delete VLANs in a VTP client.
Transparent Mode
VLAN Trunking Protocol (VTP) transparent mode switches do not participate in the VTP
domain, but VTP transparent mode switches can receive and forward VTP advertisements
through the configured trunk links.
What happens to interfaces when you delete a VLAN?
Which is the default mode of VTP ?
Server
what is VTP Pruning ?
VLAN Trunking Protocol (VTP) pruning is a feature in Cisco switches, which stops VLAN update
information traffic from being sent down trunk links if the updates are not needed. If the VLAN
traffic is needed later, VLAN Trunking Protocol (VTP) will dynamically add the VLAN back to the
trunk link.
What are two benefits of using VTP in a switching environment?
It maintains VLAN consistency across a switched network.
It allows VLAN information to be automatically propagated throughout the switching
environment.
Which VTP mode is capable of creating only local VLANs and does not synchronize
interface?
How do I stop individual interfaces from developing adjacency in an OSPF network?
What command is used to stop RIP routing updates from exiting out an interface but
still allow the interface to receive RIP route updates?
How Does the Passive Interface Feature Work in EIGRP?
New Section 2 Page 10
Support for multiple network layer protocols EIGRP supports AppleTalk which
redistributes routes learned from RTMP, IP redistributes routes learned from OSPF and
RIP, ISIS, EGP, and BGP, and Novell NetWare implementation redistributes routes learned
from Novell RIP or SAP.
MD5
What is the use of "variance" Command in EIGRP?
Unequal Cost Load Balancing
Internal and external Administrative distance in EIGRP ?
Internal = 90
External = 170
What is Feasible successor ?
A destination entry is moved from the topology table to the routing table when there is a
New Section 2 Page 11
A destination entry is moved from the topology table to the routing table when there is a
feasible successor. A feasible successor is a path whose reported distance is less than the
feasible distance, and it is considered a backup route.
What is Advertised distance ?
224.0.0.10
What is "Stuck in Active" ?
When a route is not available and the router does not have backup path to the
destination. It will search for alternative path. This time period is call SIA.
what is "Graceful shutdown" ?
With graceful shutdown, a goodbye message is broadcast when an eigrp routing process is
shutdown, to inform adjacent peers about the impending topology change. This feature allows
supporting EIGRP peers to synchronize and recalculate neighbour relationsships more
efficiently than would occur if the peers discovered the topology change after the hold time
expired.
what is "Goodbye" message recieved in EIGRP ?
Authentication
AS Number
K values
Subnet
What is a Wi Fi Hotspot?
What is IBSS,BSS and ESS ?
Why WPA encryption is preferred over WEP?
WEP
WPA
OSPF
Describe OSPF,Different types of routers in OSPF
How OSPF establishes neighbor relation
In OSPF, routers have to become neighbors first before exchanging link- state advertisements
(LSA).After configuring OSPF on routers it will start sending hello packets to each other.The
Hello packets also serve as keepalives to allow routers to quickly discover if a neighbor is
down. Hello packets also contain a neighbor field that lists the Router IDs of all neighbors the
router is connected to.
OSPF routers will only become neighbors if the following parameters within a Hello packet are
identical on each router:
a. Area ID
b. Subnet Mask
c. Hello Interval
d. Dead Interval
e. Authentication
DR /BDR Election
OSPF elect a Designated Router (DR) for each multi- access networks, accessed via multicast
address 224.0.0.6. For redundancy purposes, a Backup Designated Router (BDR) is also
elected.
DR and BDR election
The router with the highest priority becomes the DR; second highest becomes the BDR.
If there is a tie in priority, Whichever router has the highest Router ID will become the
DR.
By default router priority will be same.We can change it if we need it
Default priority on Cisco routers is 1.If we set Router priority is O, that router will not
participate in DR/BDR election
In FrameRelay (NBMA -non broadcast multi access) network ,HUB Must be elected as
DR .We can do this by changing router priority
OSPF Network Types
OSPFs functionality is different across several different network topology types. They
are mentioning below
status and cost of those links. Type 1 LSAs are generated by all routers
in OSPF, and are flooded to all other routers within the local area.
Network LSA (Type 2) Generated by all Designated Routers in OSPF, and
contains a list of all routers attached to the Designated Router.
Network Summary LSA (Type 3) Generated by all ABRs in OSPF, and
contains a list of all destination networks within an area. Type 3 LSAs are
sent between areas to allow inter-area communication to occur.
ASBR Summary LSA (Type 4) Generated by ABRs in OSPF, and contains a
route to any ASBRs in the OSPF system. Type 4 LSAs are sent from an
ABR into its local area, so that Internal routers know how to exit the
Autonomous System.
External LSA (Type 5) Generated by ASBRs in OSPF, and contain routes
to destination networks outside the local Autonomous System. Type 5
LSAs can also take the form of a default route to all networks outside the
local AS. Type 5 LSAs are flooded to all areas in the OSPF system.
Type 7 NSSA External LSAs - Used in stub areas in place of a type 5 LSA
OSPF Authentication
OSPF supports authentication to secure routing updates.We can use either clear-text or
an MD5 authentication with OSPF.
Clear Text Authentication
To configure clear-text authentication, the first step is to enable authentication for the
area, under the OSPF routing process:
MD5 Authentication
To configure MD5-hashed authentication, the first step is also to enable authentication
for the area under the OSPF process:
NOTE: Area authentication must be enabled on all routers in the area, and the
form of authentication must be identical (clear-text or MD5). The
authentication keys do not need to be the same on every router in the OSPF
area, but must be the same on interfaces connecting two neighbors.
From <http://sysnetnotes.blogspot.in/2013/09/ospf-authentication.html>
EIGRP
224.0.0.5
224.0.0.6
224.0.0.9 224.0.0.10
FF02::5
FF02::6
FF02::9
FF02::A
If OSPF router is stucked in each stage what the problem is and how to troubleshoot it
Filtering
What is access list. Explain difference between named and numbered access list
New Section 2 Page 16
What is access list. Explain difference between named and numbered access list
http://sysnetnotes.blogspot.com/2013/08/access-list-notes-numberedand-named-acl.html
From <http://sysnetnotes.blogspot.in/2013/06/ccna-ccnp-interview-questions_24.html>