Ccna 60 Interview Questions&answers

  • Uploaded by: Mohamad Siblini
  • 0
  • 0
  • January 2021
  • PDF

This document was uploaded by user and they confirmed that they have the permission to share it. If you are author or own the copyright of this book, please report to us by using this DMCA report form. Report DMCA


Overview

Download & View Ccna 60 Interview Questions&answers as PDF for free.

More details

  • Words: 2,793
  • Pages: 15
Loading documents preview...
LATEST 60 CCNA INTERVIEW QUESTIONS WITH ANSWERS

myccnaclub.blogspot.com

1) What are the two types of IP addresses available? There are two types, namely IPv4 and IPv6 IPv4- 32 bit address and IPv6-128 bit address.

2) Which IP address is used for loopback address and for what purpose? 127.0.0.1 is used for loopback address and also for local testing purposes. Loopback means looping to our own systems, checking our own systems. It is used to test whether TCP/IP stack is correctly installed.

3) What do you mean by OSI layers? Open System Interconnection (OSI) layers. 

It is a set of rules used to describe how to make networks.



Whenever we design new network or hardware device, we have to follow OSI reference model.



There are seven layers, which means seven set of rules; they are designed by ISO (international standard organization).



It tells what are the services/ports/applications used.

4) What are the major functions of transport layer? 

Segment fragmentation



Numbering segmenting



Reliable and unreliable data delivery



Error detection & error correction



Flow control



Multi tasking



Windowing

5) What is data encapsulation and data de-encapsulation? 

When data is sent from a higher layer to a lower layer, each layer adds some information to the original data; this is called as encapsulation. The information added is called as header.



When data is sent from lower layer to higher layer, each layer will remove information from the other layer. This is called as de-encapsulation.

6) What are the major functions of routers? a) Packet switching- all incoming data is switched to packets. It deals only with packets (data with IP address) b) Packet filtering- router sends and receives only packets. It is used in WAN, so all incoming packets are filtered mainly for security. c) Internetwork communication- joining of two or more networks. d) Path selection- router is used to select the shortest and best path from source to destination. e) QoS- Quality of Service: QoS is the ability of the n/w to provide better or special service to a set of users or applications.

7) What is the main purpose of DHCP? 

DHCP is dynamic host configuration protocol.



DHCP allows devices to acquire their addressing information dynamically.



DHCP is actually based on bootstrap protocol (bootp).



It is built on a client/server model and defines two components.

1. Server- delivering host configuration information 2. Client- requesting and acquiring host configuration information

8) What are the two types of cables available? 

Straight through cable



Crossover cable

9) Which registry key is used in normal mode of router and what registry key is used to recover password? 

The registry key used in normal mode is 0x2102 to 0x210f.



To recover password we have to use the registry key 0x2142.

10) Define CDP and its functions? 

CDP is Cisco discovery protocol



It is a layer 2 protocol



It works based on mac addresses.(h/w addresses)



It is used to find adjacent Cisco devices.



It is a Cisco proprietary protocol means used to find only the neighbouring Cisco devices.

It is used to find out 1. IP addresses 2. Port numbers 3. iOS details 4. Router models 5. Switch models 6. Interface details 7. Device ID- hostname

11) What are the two types of routes available in routers?

A) Static or Static default Static, if one route is fixed for transmission it will stay fixed. If that link is down it cannot connect and reach the destination even if there are alternate paths. Static route is used for smaller networks. Symbol of static is “s”. Static default– it sends data to unknown destination + specified n/w.ex in isp we can have different connections. It uses 0.0.0.0 as the address for connection. Symbol of static default is “s*”. B) Dynamic route It will choose the path by itself. Paths are found by the routing protocols. Chooses the best or main path. If that path fails, it will find out the next alternate path. Routing protocols like RIP/EIGRP/OSPF decide the paths.

12) What is distance vector? Explain with example. Distance Vector Protocols send periodic updates every 30 secs or at some time interval to the adjacent routers. In case if there is a link failure immediately they inform to update only after 30 secs. For example, RIP routing information protocol is a distance vector protocol. Here distance indicates length between two routers and vector means in which link direction the link is connected between them.

13) What is the administrative distance of RIP, EIGRP and OSPF? The administrative distance for: 

RIP: 120.



EIGRP: 90



OSPF: 110

14) What is switching? Switching is the process of using the hardware address/mac address of devices on a LAN to segment a n/w. Switches break up large collision domains into smaller ones and that a collision domain is a n/w segment with two or more devices sharing the same bandwidth. Switch is a layer device and deals with frames (data with mac address).

15) What is meant by VLAN and what is its purpose? A VLAN is a logical and orderly alignment of network users and resources. These are connected to ports on a switch which are administratively defined. It is used to segment big networks and connect with routers for security purposes. For joining two different networks or virtual VLANs, we need routers.

16) What happens if there is no VLAN in switch ports? If there is no VLAN in switches, it can lead to a broadcast storm; as all ports will start broadcasting. By default all ports in switches are in VLAN1 and they can send and receive data within VLAN1. We can also create multiple VLANs and join them using routers.

17) What are the two ports of switches? 1. Access port 2. Trunk port 

An Access port belongs to and carries the traffic of only one VLAN. We can pass only single VLAN information. It is used to connect switch ports with computers with minimum speed of 10Mbps.



A Trunk port is used for multiple connections between switch to routers and switch to switch.

Switch to router- minimum speed: 100mbps. It is used for inter VLAN communications, when connected with the router.

18) What is VTP? VTP is VLAN trunking protocol. It is used to allow VLAN information to be automatically propagated throughout the switching environment.

19) What are the various of modes in VTP?

There are three modes in VTP: 

Server mode



Client mode



Transparent mode

Default mode is server. 

Server mode- Full control over VLAN creations and modifications for their domains.



Client mode- VTP clients do not allow the administrator to create, change or delete any VLAN’s; instead they listen to the VTP’s advertisements from other switches and modify their VLAN configuration accordingly.



Transparent mode- VTP transparent mode switches will not participate in VTP advertisements. It can create and delete VLAN’s that are local only to itself. It will not propagate to other switches, and will not advertise its own VLAN configuration.

20) Define STP. Why is it used? STP (Spanning Tree Protocol) was created by digital equipment corporation. The new version was created by IEEE which is 802.1d. STP is a bridge-to-bridge protocol used to maintain a loop free n/w. Redundant links between switches are a good idea because they help prevent complete network failures in the event one link stops working.

21) How many bits are available in IPv6? 

IPv6 contains 128 bits with 8 groups. It has n/w part and host part. Each group has 16 bits.



So 8*16=128, it is in hexadecimal format (00ff). There are 32 hexadecimal numbers.



Each groups(4 hex digits) are separated by colon.

22) What are the multicast addresses used in IPv4 and IPv6 by different protocols?



OSPF (IPv4)=224.0.0.5,224.0.0.6



OSPF(IPv6)=ff02::5/ff02::6



RIP (IPv4)=224.0.0.9



RIPng(IPv6)=ff02::9



EIGRP(IPv4)=224.0.0.10



EIGRP(IPv6)=ff02::10

23) What is EUI in IPv6? EUI is Extended Unique Identifier 64. It is an interface ID, which is typically composed of mac addresses. We can create a EUI-64 interface in a 48 bit mac address by inserting the “0xfffe” between the upper three bytes and lower three bytes of the mac address.

24) What do you mean by global unicast address in IPv6? 

Global unicast addresses are IPv6 public addresses, which can be used globally as public addresses and are unique in nature; e.g. 2000::1, 3001::1



Any address which begins with hex 2 or 3.

25) What are the major differences between IPv4 and IPv6 addressing? IPv4 address is 32 bit address and IPv6 is 128 bit address. In IPv4 only 232 addresses are available which is 4.3 billion addresses out of which only 3.7 billion are actually usable (many are reserved like class d,e and private). In IPv6 many millions of addresses are there, it has 3.4*1038 addresses.

26) What is ACL and what are the major types available? ACL (Access Control List) is a list of commands/statements used in routers to filter packets. There are three types of ACL: 1. Standard 2. Extended 3. Named

27) What is WAN and what is the main purpose? 

WAN (Wide Area Network); used to connect between two cities.



WANs connect remote sites over large geographic area.



Connection requirements vary depending on user requirements, cost, and availability.

28) What are the major protocols used in WAN? 

Point-to-Point Protocol (PPP)



Serial Line Internet Protocol (SLIP)



High-level Data Link Control Protocol (HDLC)- The default protocol.

29) What is frame relay? Frame relay is a packet switching technology; it is used to join two or more routers with a single interface. It is cheaper in cost and belongs to ISP.

30) What is LMI? LMI (Local Management Interface) is a signaling standard that is used between the routers and frame relay switches. It allows for passing information about the operation and status of the virtual circuit between the provider’s n/w and the DTE (Data Circuit-terminating equipment).

31) Define PAP and CHAP. 

PAP- Password Authentication Protocol



CHAP- Challenge Handshake Authentication Protocol



PAP sends username and password checks and validates users.



CHAP- challenge message passes and replies with username and password so no other router can come inside.

32) How many collision domains and broadcast domains are available in router, switch and hub? Router- Each port has one separate collision domain and one separate broadcast domain. Switch- Each port has one separate collision domain but all ports have one single broadcast domain. Hub- All ports have one collision domain and one broadcast domain.

33) Which router command is used to display RAM contents? Show run/show running-config

34) Which router command is used to display NVRAM (Non-volatile random-access memory) contents? Show start/show start-config.

35) What does the command "show version" do? It displays iOS version, RAM space availability, and process speed.

36) What is the subnet mask of the following IP addresses- 10.0.0.1, 160.1.1.1 and 200.2.2.2? 

10.0.0.1- 255.0.0.0



160.1.1.1- 255.255.0.0



200.2.2.2- 255.255.255.0

37) What is broadcasting and which addresses are used for broadcasting?



Broadcasting means passing data to all devices in the n/w. In a n/w if there are 5 systems, and we send data to all 5 systems; it is broadcasting.



Both receiving and sending by all devices.



Broadcasting IP address: 255.255.255.255 or 255.255.255.255/32



Broadcasting MAC address: ffff:ffff:ffff or ff:ff:ff:ff:ff:ff

38) What is multicasting and which addresses are used for multicasting? In a Network if there are 10 Machines and if we send datas to more than one machine but not all 10 Machines it is called Multicasting. For example sending datas to some 5 machines instead of all 10 Machines. Class D IP address is used for Multicasting ranging from 224.x.x.x to 239.x.x.x and the MAC address starting from 0100:5EXX:XXXX series where 0100:5E is the Organizationally Unique Identifier Address.

39) Which IP addresses can be given as private addresses? 

Class a- 10.0.0.0 to 10.255.255.255



Class b- 172.16.0.0 to 172.31.255.255



Class c- 192.168.0.0 to 192.168.255.255

40) What is APIPA? APIPA is Automatic Private IP Addressing. Ranges= 169.254.0.1 to 169.255.255.254 (class b) Auto configuration enabled, this means APIPA is set in the system. It is used to automatically assign private IP addresses for home/small business n/ws that contains a single subnet, has no DHCP server and is not using static IP address.

41) What is Syslog and why is it used? Syslog server is a popular server used to store log information- port no: 514. It can be configured easily. It can store a large volume of data. By default logging, messages are sent to the router’s console port. It can also be sent to Syslog.

42) What is NTP and what is its purpose? NTP - Network Time Protocol. It is an open standard that allows you to synchronize your router’s time with a centralized time server. It is implemented mostly while using Syslog on the networks. Its port No. is 123, it uses the UDP (User Datagram Protocol).

43) What is SNMP and what are its main functions? 

SNMP is used for network traffic management-port No.: 161.



SNMP contains three elements-

1. Network management application (SNMP manager) 2. SNMP agents (running inside a managed device) 3. MIB (Management Information Base), database object that describes the information in a predetermined format; that the agent can use to populate the data.

44) On what algorithm does OSPF work? OSPF works on Dijkstra Algorithm. 

First a shortest path tree is constructed.



Secondly Routing table is populated with the resulting best paths.

45) What are the major functions of SNMPv3? 1. Authentication 2. Encryption 3. Message integrity 

It uses HMAC-SHA for security.

46) What is EIGRP? EIGRP- Enhanced Interior Gateway Routing Protocol. It is a balanced hybrid protocol, a Cisco proprietary protocol.

The symbol of EIGRP is D. DUAL (Diffusing Update Algorithm). If primary route fails, EIGRP can use backup or feasible routes.

47) What is OSPF? OSPF (Open Shortest Path First). It is an open standard routing protocol that has been implemented by a wide range of network vendors, including Cisco. It supports multi vendors like Cisco, Alcatel, Juniper, 3Com routers. Administrative distance of OSPF is 110, symbol is O.

48) In what ways can we choose DR in OSPF? 1. Highest priority 2. Highest router ID 3. Highest IP address

49) What do you mean by BPDU Guard in switch? BPDU Guard is used to protect the integrity of switch ports that have portfast enabled. By default, BPDU guard is disabled; it is mainly used to shut the port in an error condition.

50) What are the major states in switch? 1. Disabled 2. Blocking 3. Listening 4. Learning 5. Forwarding

51) What are the two protocols used in EtherChannel? EtherChannels can be negotiated between two switches to provide some dynamic link configuration. Two protocols are available to negotiate bundled links in catalyst switchesPAgP (Port Aggregation Protocol), LACP (Link Aggregation Control Protocol). PAgP can be used only in Cisco devices but LACP can be used in other vendors also.

52) What are the modes of LACP? There are two modes of LACP: a) passive mode, and b) active mode.

53) What are the modes of PAGP? There are two modes of PAGP, namely- Auto and Desirable.

54) What are the seven layers available in OSI model? 

Layer 7- Application Layer



Layer 6- Presentation Layer



Layer 5- Session Layer



Layer 4- Transport Layer



Layer 3- Network Layer



Layer 2- Data Link Layer



Layer 1- Physical Layer

55) What is HSRP? Hot Standby Router Protocol (HSRP). HSRP is a redundancy protocol developed by Cisco to provide gateway redundancy without any additional configuration on the end devices in the subnet. User Datagram Protocol (UDP) port 1985 is used by HSRP active and standby routers to send Hello messages. These hello messages are forwarded to multicast address 224.0.0.2 to communicate between routers in the HSRP group.

56) What is VLSM? VLSM (Variable Length Subnet Mask) is used to apply a different subnet mask to a same class address.

57) What is the subnet mask of 192.168.100.1/28? The subnet mask of 192.168.100.1/28 is 255.255.255.240.

58) Which router command is used to enable IPv6? IPv6 unicast-routing

59) What do you mean by administrative distance? It is used to find which routing protocol is trusted. We can have any number of routing protocols. Each of them can have different paths, values ranging from 0 to 255.

60) What is ISATAP? Intra-site Automatic Tunnel Addressing Protocol (ISATAP). It uses virtual links to connect IPv6 localities together within a site that is primarily using IPv4.

Related Documents

Ccna-
January 2021 4
Ccna
January 2021 4
Ccna 01
January 2021 3
Ccna-icnd
January 2021 1
Curso Ccna
January 2021 1

More Documents from "Osvaldo Gislene"