InterviewSolution
This section includes InterviewSolutions, each offering curated multiple-choice questions to sharpen your knowledge and support exam preparation. Choose a topic below to get started.
| 1. |
Name The Default Ipx Ethernet Encapsulation? |
|
Answer» Novell-Ether is the DEFAULT IPX ETHERNET ENCAPSULATION. Novell-Ether is the default IPX Ethernet encapsulation. |
|
| 2. |
Name And Explain The Phases Of Ppp Session Establishment.? |
|
Answer» These are link ESTABLISHMENT phase, AUTHENTICATION phase and the NETWORK LAYER PROTOCOL phase. These are link establishment phase, authentication phase and the network layer protocol phase. |
|
| 4. |
Which Authentication Method Is Preferred To Set Up A Session? |
|
Answer» CHAP CHAP |
|
| 5. |
What Is The Use Of Multilink Protocol Mp? |
|
Answer» It is USED to PROVIDE LOAD BALANCING ACROSS multiple links. It is used to provide load balancing across multiple links. |
|
| 7. |
What Is The Quality Protocol? |
|
Answer» It MONITORS DATA DROPPED on a LINK. It monitors data dropped on a link. |
|
| 8. |
What Are The Cisco Hdlc Protocol.? |
|
Answer» It contains the Flag, Address, CONTROL, PROPRIETARY, Data, FCS and Flag. It contains the Flag, Address, Control, Proprietary, Data, FCS and Flag. |
|
| 9. |
Which Are The Different Forms Of Wan Services Accessed By Cisco Routers? |
|
Answer» These are Switched services, Using protocols connecting PEER to peer DEVICES and INTERFACE front END to IBM Enterprise Data center computers. These are Switched services, Using protocols connecting peer to peer devices and Interface front end to IBM Enterprise Data center computers. |
|
| 10. |
How Can We Convert The User Data From Dte To Wan Service Form? |
|
Answer» We can USE the MODEM, CSU/DSU and TA/NT1 for this. We can use the Modem, CSU/DSU and TA/NT1 for this. |
|
| 11. |
Which Service Is Used To Get Data From Multiple Sources And Allocate Bandwidth On One? |
|
Answer» TDM or TIME DOMAIN MULTIPLEXING TDM or Time Domain Multiplexing |
|
| 12. |
Which Abbreviation Is Used To Tell The Router To Check All Numbers? |
| Answer» | |
| 13. |
What Happens If We Set A Wildcard Mask Bit To 0 In Cisco Routers? |
|
Answer» The ROUTER CHECKS the CORRESPONDING BIT VALUE. The router checks the corresponding bit value. |
|
| 14. |
How Many Access Lists Are Allowed Per Interface? |
|
Answer» One ACCESS list PER PORT, per protocol is ALLOWED. One Access list per port, per protocol is allowed. |
|
| 15. |
When Using Access Lists, What Does A Cisco Router Check First? |
|
Answer» The CISCO routers checks WHETHER the packet is routable or BRIDGEABLE The cisco routers checks whether the packet is routable or bridgeable |
|
| 16. |
What Do You Know About The Udp Datagram Format? |
|
Answer» SOURCE Port - 16 bits, DESTINATION Port - 16 bits, Length - 16 Bits, CHECKSUM - 16 bits, Data Source Port - 16 bits, Destination Port - 16 bits, Length - 16 Bits, Checksum - 16 bits, Data |
|
| 18. |
What Is The Use Of Ddr On Cisco Routers? |
|
Answer» It is used for DIAL on demand routing. DDR provides routing for LOW volume and periodic traffic. It is used for dial on demand routing. DDR provides routing for low volume and periodic traffic. |
|
| 19. |
How Does The Internet Layer Know How To Handle An Ip Packet? |
|
Answer» The type of service tells it. |
|
| 20. |
Which Field In The Ip Packet Has Network Testing? |
|
Answer» The network TESTING is FOUND in IP OPTIONS field. The network testing is found in IP Options field. |
|
| 21. |
Name Any Two Protocols Which Can Exist In The Protocol Field Of An Ip Packet.? |
|
Answer» These are TCP and UDP PROTOCOLS. These are TCP and UDP Protocols. |
|
| 22. |
What Is Icmp Protocol? |
|
Answer» It is used to carry messages like destination UNREACHABLE, SOURCE quench, PARAMETER PROBLEM, time exceeded, timestamp, address reply and address request. It is used to carry messages like destination unreachable, source quench, parameter problem, time exceeded, timestamp, address reply and address request. |
|
| 23. |
What Is Source Quench? |
|
Answer» It is the CONDITION when the ROUTER LACKS any more BUFFER SPACE. It is the condition when the router lacks any more buffer space. |
|
| 24. |
Which Process Is Used To Find An Ip Address From A Mac Address? |
|
Answer» RARP Process |
|
| 25. |
Which Format Is Useful For Configuring The Subnet Mask For An Ip Address? |
|
Answer» DOTTED DECIMAL, HEXADECIMAL and BIT count formats can be used. dotted decimal, hexadecimal and bit count formats can be used. |
|
| 26. |
What Is The Use Of “ip Name-server 255.255.255.255? |
|
Answer» It SETS the domain NAME LOOKUP to be a LOCAL broadcast. It sets the domain name lookup to be a local broadcast. |
|
| 27. |
What Is The Use Of Cisco Ios Exec Command Trace? |
|
Answer» The “trace [PROTOCOL] [destination]” is USED to discover routes that packets will travel to their destination hosts. TTL (TIME to Live) is used to report destination route INFORMATION. The “trace [protocol] [destination]” is used to discover routes that packets will travel to their destination hosts. TTL (Time to Live) is used to report destination route information. |
|
| 28. |
How Many Dns Servers Can Be Specified With One Command? |
|
Answer» 6 DNS SERVERS can be SPECIFIED with ONE command. 6 DNS Servers can be specified with one command. |
|
| 29. |
Important Features Of Ppp Chap Authentication? |
|
Answer» AUTHENTICATION MESSAGES and LOCAL ROUTER CHALLENGES Authentication messages and local router challenges |
|
| 30. |
Which Is The Ipx Serial Encapsulation By Default? |
|
Answer» HDLC HDLC |
|
| 31. |
Which Hardware Component Is Used To Store Backup Configuration? |
|
Answer» NVRAM is used for this. |
|
| 32. |
What Is The Range Of Extended Ip Access List? |
|
Answer» The RANGE is 100-199 The range is 100-199 |
|
| 33. |
List The Important Characteristics Of Igrp? |
|
Answer» MULTIPLE unequal PATHS, autonomous SYSTEM NUMBER, etc. Multiple unequal paths, autonomous system number, etc. |
|
| 34. |
What Are The Important Characteristics Of Isdn? |
|
Answer» It TRANSPORTS both VOICE and DATA, and same as X.25 It transports both voice and data, and same as X.25 |
|
| 35. |
Why Do We Have To Disable Cdp? |
|
Answer» To save the bandwidth by REDUCING overhead and to CONNECT to a non CISCO router. To save the bandwidth by reducing overhead and to connect to a non cisco router. |
|
| 36. |
Which Osi Layer Is Used For Physical Address And Network Topology? |
|
Answer» The DATA LINK LAYER SERVES this PURPOSE. The Data link layer serves this purpose. |
|
| 37. |
List The Important Characteristics Of Switches? |
|
Answer» The BANDWIDTH is increased and collision domains are CREATED. Also it helps forward traffic USING mac ADDRESS. The bandwidth is increased and collision domains are created. Also it helps forward traffic using mac address. |
|
| 38. |
Important Features Of Osi Layer 3 - Network Layer? |
|
Answer» DETERMINES the PATH, MULTIPLEXING and MANAGEMENT of SESSIONS. Determines the path, multiplexing and management of sessions. |
|
| 39. |
What Is The Use Of Dlci? |
|
Answer» It is USED to IDENTIFY the PVC in FRAME relay NETWORK. It is used to identify the PVC in frame relay network. |
|
| 40. |
What Is The Default Serial Encapsulation? |
|
Answer» HDLC is the DEFAULT SERIAL ENCAPSULATION. HDLC is the default serial encapsulation. |
|
| 41. |
List The Default Values In Eigrp Metric? |
|
Answer» The DEFAULT VALUES are BANDWIDTH and DELAY. The default values are bandwidth and delay. |
|
| 42. |
What Is The Use Of Ipx Sap? |
|
Answer» It stands for Service ADVERTISING PROTOCOL and it is used to ADVERTISE SERVICES. It stands for Service Advertising Protocol and it is used to advertise services. |
|
| 43. |
Which Protocol Helps Test The Connectivity Without Configuration Of Layer 3 Protocols? |
|
Answer» CDP protocol |
|
| 44. |
What Is The An Important Feature Of Rarp.? |
|
Answer» The full form of RARP is Reverse ADDRESS RESOLUTION Protocol. It is used to START REMOTE O/S LOAD sequence. The full form of RARP is Reverse Address Resolution Protocol. It is used to start remote O/S load sequence. |
|
| 45. |
Which Switching Method Is Used To Examine The Destination Mac Address? |
|
Answer» CUT through is the SWITCHING METHOD USED to EXAMINE it. Cut through is the switching method used to examine it. |
|
| 46. |
What Are The Important Characteristics Of Ppp Pap Authentication? |
|
Answer» USERNAME and password is SENT in CLEAR text and The authentication controls remote NODE. Username and password is sent in clear text and The authentication controls remote node. |
|
| 47. |
Which Hardware Is Necessary For Broadcasts? |
|
Answer» switch, repeater and bridge. |
|
| 48. |
How Can You Vary The Router Boot Sequence? |
|
Answer» It can be done by BOOT system COMMANDS and config REGISTER. It can be done by boot system commands and config register. |
|
| 50. |
What Is The Number Range Of Ipx Access List? |
|
Answer» The RANGE is 800-899 The range is 800-899 |
|