Explore topic-wise InterviewSolutions in .

This section includes InterviewSolutions, each offering curated multiple-choice questions to sharpen your knowledge and support exam preparation. Choose a topic below to get started.

1.

An ethernet frame that is less than the IEEE 802.3 minimum length of 64 octets is called _______(a) short frame(b) runt frame(c) mini frame(d) man frameI had been asked this question in semester exam.Query is from Ethernet topic in section Network Layer of Computer Network

Answer» RIGHT choice is (B) runt frame

To explain: An ethernet frame that is less than the IEEE 802.3 MINIMUM LENGTH of 64 octets is called a runt frame. Such frames are a RESULT of collisions or software malfunctions.
2.

What is interframe gap?(a) idle time between frames(b) idle time between frame bits(c) idle time between packets(d) idle time between networksI got this question in examination.My question is from Ethernet in division Network Layer of Computer Network

Answer»

Right option is (a) IDLE time between frames

The explanation: The inter-frame GAP is the idle time for the receiver between the INCOMING frame flow. The inter-frame gap must be as low as possible for idle CONNECTIONS.

3.

The maximum size of payload field in ethernet frame is __________(a) 1000 bytes(b) 1200 bytes(c) 1300 bytes(d) 1500 bytesI have been asked this question in a job interview.Question is taken from Ethernet in division Network Layer of Computer Network

Answer»

Correct ANSWER is (d) 1500 BYTES

Explanation: The minimum size of the payload FIELD is 40 bytes and the maximum size is 1500 bytes. If the payload size EXCEEDS 1500 bytes, the frame is called a jumbo frame.

4.

High speed ethernet works on _________(a) coaxial cable(b) twisted pair cable(c) optical fiber(d) unshielded twisted pair cableI had been asked this question during an online interview.This question is from Ethernet in portion Network Layer of Computer Network

Answer»

Right choice is (c) optical fiber

The best explanation: FAST Ethernet is mostly used in networks ALONG with Category 5 (Cat-5) copper twisted-pair cable, but it also works with fiber-optic cable. Based on the cable being used, There can be THREE TYPES of Fast Ethernet.

5.

A point-to-point protocol over ethernet is a network protocol for __________(a) encapsulating PPP frames inside ethernet frames(b) encapsulating ehternet framse inside PPP frames(c) for security of ethernet frames(d) for security of PPP framesThe question was asked in an interview for internship.The doubt is from Ethernet in chapter Network Layer of Computer Network

Answer» RIGHT answer is (a) encapsulating PPP FRAMES INSIDE ethernet frames

Best explanation: PPoE or Point-to-Point protocol over Ethernet was first introduced in 1999. It is popularly used by modern DAY Internet Service Providers for Dial-up connectivity.
6.

Ethernet in metropolitan area network (MAN) can be used as ___________(a) pure ethernet(b) ethernet over SDH(c) ethernet over MPLS(d) all of the mentionedThis question was posed to me during a job interview.My query is from Ethernet topic in division Network Layer of Computer Network

Answer»

The correct answer is (d) all of the mentioned

For explanation: A metropolitan area NETWORK (MAN) that is based on Ethernet STANDARDS is called an Ethernet MAN. It is commonly used to CONNECT nodes to the Internet. Businesses also use Ethernet MANS to connect their own offices to each other.

7.

What is autonegotiation?(a) a procedure by which two connected devices choose common transmission parameters(b) a security algorithm(c) a routing algorithm(d) encryption algorithmThis question was addressed to me in unit test.This intriguing question comes from Ethernet topic in division Network Layer of Computer Network

Answer» CORRECT answer is (a) a procedure by which two connected devices choose common transmission parameters

To EXPLAIN: autonegotiation is a procedure by which two connected devices choose common transmission parameters. It is a SIGNALING mechanism used in Ethernet over Twisted PAIR cables.
8.

MAC address is of ___________(a) 24 bits(b) 36 bits(c) 42 bits(d) 48 bitsThe question was asked in homework.This intriguing question originated from Ethernet in division Network Layer of Computer Network

Answer»

Right choice is (d) 48 bits

Best explanation: MAC address is LIKE a local address for the NIC that is USED to MAKE a local Ethernet (or wifi) network FUNCTION. It is of 48 bits.

9.

What is start frame delimeter (SFD) in ethernet frame?(a) 10101010(b) 10101011(c) 00000000(d) 11111111I had been asked this question during a job interview.This intriguing question comes from Ethernet in section Network Layer of Computer Network

Answer»

The correct option is (b) 10101011

For explanation: The START FRAME delimiter is a 1 BYTE field in the Ethernet frame that indicates that the PRECEDING bits are the start of the frame. It is always SET to 10101011.

10.

Ethernet frame consists of ____________(a) MAC address(b) IP address(c) Default mask(d) Network addressI had been asked this question during an interview for a job.The question is from Ethernet topic in portion Network Layer of Computer Network

Answer» RIGHT answer is (a) MAC address

Easy explanation: The Ethernet FRAME has a header that contains the source and destination MAC address. Each MAC address is of 48 bits.
11.

Choose the wrong statement from the following.(a) Nslookup is used to query a DNS server for DNS data(b) Ping is used to check connectivity(c) Pathping combines the functionality of ping with that of route(d) Ifconfig can configure TCP/IP network interface parametersI have been asked this question by my college director while I was bunking the class.I'd like to ask this question from Network Utilities in portion Network Layer of Computer Network

Answer»

The correct answer is (c) Pathping combines the FUNCTIONALITY of ping with that of route

For explanation I would say: Pathping combines the functionality of ping with that of TRACEROUTE (tracert). The Ping command is used to TEST connectivity between two nodes and the Tracert/Traceroute command is used to find the path i.e. the number of the routers that the packet has to GO through to REACH its destination.

12.

__________ allows checking if a domain is available for registration.(a) Domain Check(b) Domain Dossier(c) Domain Lookup(d) Domain registersI have been asked this question by my college professor while I was bunking the class.My enquiry is from Network Utilities in division Network Layer of Computer Network

Answer»

The CORRECT ANSWER is (a) Domain Check

For explanation I would say: There are billions of domains AVAILABLE for registration on the WORLD Wide Web, and many of them are already registered. So when one wants to register a domain, they need to check WHETHER the domain is available through a domain check.

13.

Which of the following is not related to ipconfig in Microsoft Windows?(a) Display all current TCP/IP network configuration values(b) ModifyDHCPsettings(c) Modify DNS settings(d) Trace the routers in the path to destinationI got this question during an online interview.This is a very interesting question from Network Utilities topic in division Network Layer of Computer Network

Answer»

Right option is (d) TRACE the routers in the path to DESTINATION

Easy explanation: The Tracert command is available on MICROSOFT WINDOWS to find the path i.e. the number of the routers that the packet has to go through to REACH its destination.

14.

If you want to find the number of routers between a source and destination, the utility to be used is ___________(a) route(b) Ipconfig(c) Ifconfig(d) TracerouteI have been asked this question during an online interview.This question is from Network Utilities topic in section Network Layer of Computer Network

Answer»

Right answer is (d) Traceroute

To explain: Traceroute command is AVAILABLE on LINUX OS to find the path i.e. the number of the routers that the PACKET has to go through to reach the destination. In Windows, Tracert command is USED to perform the function.

15.

__________ command is used to manipulate TCP/IP routing table.(a) route(b) Ipconfig(c) Ifconfig(d) TracerouteThis question was posed to me in my homework.My enquiry is from Network Utilities topic in chapter Network Layer of Computer Network

Answer»

The CORRECT choice is (a) route

Explanation: The route COMMAND is used to view and manipulate the TCP/IP ROUTING table in WINDOWS OS. The manipulations done in the routing table with the help of this command will count as static routes.

16.

ICMP is used in _________(a) Ping(b) Traceroute(c) Ifconfig(d) Both Ping & TracerouteI had been asked this question by my college professor while I was bunking the class.Question is from Network Utilities topic in division Network Layer of Computer Network

Answer»

Correct CHOICE is (d) Both Ping & TRACEROUTE

To explain: ICMP stands for INTERNET Control Message Protocol. ICMP operates over the IP packet to provide error reporting functionality, so in case the node is not active or there is no ROUTE, ICMP will be used to report the specific errors for Ping and Traceroute.

17.

Ping sweep is a part of _________(a) Traceroute(b) Nmap(c) Route(d) IpconfigThis question was posed to me in class test.The query is from Network Utilities in chapter Network Layer of Computer Network

Answer»

The correct choice is (b) Nmap

Explanation: A PING sweep is a method that can ESTABLISH a range of IP addresses which map to live hosts and are MOSTLY USED by network scanning tools like nmap. A ping sweep is basically a collective ping command execution on a range of IP addresses.

18.

Ping can _________(a) Measure round-trip time(b) Report packet loss(c) Report latency(d) All of the mentionedThis question was addressed to me during an online interview.This key question is from Network Utilities in chapter Network Layer of Computer Network

Answer»

Correct option is (d) All of the mentioned

The explanation is: PING (Packet Internet Groper) COMMAND is the best WAY to test connectivity between two nodes, whether it is Local Area Network (LAN) or Wide Area Network (WAN). Ping uses ICMP (Internet Control MESSAGE PROTOCOL) to communicate to other devices.

19.

A network management system can be divided into ___________(a) three categories(b) five broad categories(c) seven broad categories(d) ten broad categoriesI got this question during an internship interview.I want to ask this question from Network Management topic in division Network Layer of Computer Network

Answer»

Right choice is (b) five BROAD categories

Easy explanation: The five broad categories of NETWORK management are

FAULT Management

• Configuration Management

• Accounting (Administration)

PERFORMANCE Management

SECURITY Management.

20.

MIB is a collection of groups of objects that can be managed by __________(a) SMTP(b) UDP(c) SNMP(d) TCP/IPThe question was asked during an interview for a job.Origin of the question is Network Management in chapter Network Layer of Computer Network

Answer»

Right option is (c) SNMP

To explain: MIB stands for MANAGEMENT Information Base. Simple NETWORK management controls the group of objects in management information base. It is USUALLY used with SNMP (Simple Network Management Protocol).

21.

In Network Management System, maps track each piece of hardware and its connection to the _________(a) IP Server(b) Domain(c) Network(d) DataI have been asked this question in a job interview.Question is taken from Network Management topic in division Network Layer of Computer Network

Answer»

Correct option is (c) Network

The explanation is: Network is the main entity connecting different COMPONENTS in a place. A network map is made to track each component and its CONNECTION to the network to ENSURE BETTER network management.

22.

Which of the following networks supports pipelining effect?(a) Circuit-switched networks(b) Message-switched networks(c) Packet-switched networks(d) Stream-switched networksI have been asked this question in an internship interview.My enquiry is from Network Management in section Network Layer of Computer Network

Answer»

The correct answer is (C) Packet-SWITCHED networks

For explanation I would say: Packet switched network is most preferred for PIPELINING PROCESS. Pipelining exponentially reduces the time taken to transmit a large number of packets in the network.

23.

The physical connection between an end point and a switch or between two switches is __________(a) Transmission path(b) Virtual path(c) Virtual circuit(d) Transmission circuitI got this question in an international level competition.My enquiry is from Network Management topic in chapter Network Layer of Computer Network

Answer» CORRECT option is (a) Transmission path

The explanation: The physical connection between an end POINT and a switch or between two switches is transmission path. The transmission path is the physical ROADWAY that the packet needs to PROPAGATE in order to travel through the network.
24.

Control of users’ access to network resources through charges is the main responsibility of ______________(a) Reactive Fault Management(b) Reconfigured Fault Management(c) Accounting Management(d) Security ManagementThe question was asked in an interview for job.The question is from Network Management topic in section Network Layer of Computer Network

Answer»

Correct answer is (c) Accounting Management

The explanation: Control of users’ access to network resources through CHARGES is the main responsibility of accounting management. The accounting management creates a log of the users ACTIVITY on the network too and GOES hand-in-hand with the configurations management.

25.

In Network Management System, the term that is responsible for controlling access to network based on predefined policy is called ___________(a) Fault Management(b) Secured Management(c) Active Management(d) Security ManagementThis question was addressed to me in unit test.My question comes from Network Management in division Network Layer of Computer Network

Answer»

The CORRECT option is (d) Security Management

The best explanation: In Network Management System, the term that is RESPONSIBLE for controlling access to the network based on predefined POLICY is called security management. The security management ENSURES authentication, confidentiality and integrity in the network.

26.

Configuration management can be divided into two subsystems: reconfiguration and __________(a) Documentation(b) Information(c) Servers(d) EntityI had been asked this question in an internship interview.This question is from Network Management in portion Network Layer of Computer Network

Answer»

Right option is (a) Documentation

To explain I would say: The documentation subsystem of configuration MANAGEMENT HANDLES the log making and reporting functions of the configuration management. It also REPORTS the errors in the NETWORK caused by the configuration’s failure.

27.

Performance management is closely related to _________(a) Proactive Fault Management(b) Fault management(c) Reactive Fault Management(d) Preventive Fault ManagementI got this question in final exam.This interesting question is from Network Management topic in section Network Layer of Computer Network

Answer» CORRECT OPTION is (b) Fault management

The EXPLANATION: Fault management is really CLOSELY related to performance management. It is important to ensure that the network handles faults as effectively as it handles it’s normal functioning to achieve better performance management.
28.

Complex networks today are made up of hundreds and sometimes thousands of _________(a) Documents(b) Components(c) Servers(d) EntitiesThis question was posed to me in an internship interview.I'm obligated to ask this question of Network Management in portion Network Layer of Computer Network

Answer»

Right OPTION is (b) Components

Easiest explanation: Complex NETWORKS TODAY are made up of hundreds and sometimes THOUSANDS of components. For effective functioning of these thousands of components, GOOD network management is essential.

29.

A firewall needs to be __________ so that it can grow proportionally with the network that it protects.(a) Robust(b) Expansive(c) Fast(d) ScalableThe question was posed to me during an interview for a job.My doubt is from Firewalls topic in division Network Layer of Computer Network

Answer»

Right option is (B) Expansive

The explanation is: The firewall has to be expansive because a network is EXPECTED to GROW with time and if the firewall is unable to grow with it, the firewall won’t be able to HANDLE the GROWING network traffic flow and will hence fail.

30.

A stateful firewall maintains a ___________ which is a list of active connections.(a) Routing table(b) Bridging table(c) State table(d) Connection tableI had been asked this question in semester exam.Enquiry is from Firewalls in chapter Network Layer of Computer Network

Answer»

Right option is (a) Routing table

The explanation: The routing table basically gives the STATE of each CONNECTION i.e. WHETHER the connection is active or not. A routing table ensures the best performance for the stateful firewall.

31.

What tells a firewall how to reassemble a data stream that has been divided into packets?(a) The source routing feature(b) The number in the header’s identification field(c) The destination IP address(d) The header checksum field in the packet headerI got this question by my college director while I was bunking the class.Question is taken from Firewalls in chapter Network Layer of Computer Network

Answer»

Right answer is (a) The source routing feature

To explain I would say: The source routing feature PROVIDES a path address for the packet to help the firewall to REASSEMBLE the data STREAM that was divided into PACKETS. After reassembling, the firewall can then filter the stream.

32.

What is one advantage of setting up a DMZ with two firewalls?(a) You can control where traffic goes in three networks(b) You can do stateful packet filtering(c) You can do load balancing(d) Improved network performanceThe question was posed to me during an online exam.This intriguing question comes from Firewalls in section Network Layer of Computer Network

Answer»

The correct option is (c) You can do load BALANCING

Explanation: DMZ stands for De-Militarized Zone. In a topology with a single FIREWALL serving both INTERNAL and external users (LAN and WAN), it acts as a shared resource for these two zones. So load balancing can be done by adding ANOTHER firewall.

33.

A packet filter firewall filters at __________(a) Physical layer(b) Data link layer(c) Network layer or Transport layer(d) Application layerThis question was addressed to me by my college director while I was bunking the class.This key question is from Firewalls topic in portion Network Layer of Computer Network

Answer»

Right answer is (c) Network layer or TRANSPORT layer

Explanation: In computing, a firewall is a network security system that monitors and controls the incoming and outgoing network traffic based on predetermined security RULES.[1] A firewall TYPICALLY establishes a barrier between a trusted, secure internal network and ANOTHER OUTSIDE network, such as the Internet, that is assumed not to be secure or trusted.[2] Firewalls are often categorized as either network firewalls or host-based firewalls.

34.

A proxy firewall filters at _________(a) Physical layer(b) Data link layer(c) Network layer(d) Application layerI got this question in class test.Enquiry is from Firewalls topic in portion Network Layer of Computer Network

Answer»

The CORRECT answer is (d) APPLICATION layer

For explanation: The application firewall is typically built to control all network traffic on any layer up to the application layer. It is able to control APPLICATIONS or services specifically, unlike a stateful network firewall, which is – WITHOUT additional software – unable to control network traffic regarding a specific application. There are two PRIMARY categories of application firewalls, network-based application firewalls and host-based application firewalls.

35.

Which of the following is / are the types of firewall?(a) Packet Filtering Firewall(b) Dual Homed Gateway Firewall(c) Screen Host Firewall(d) Dual Host FirewallThe question was posed to me in an interview.The origin of the question is Firewalls topic in section Network Layer of Computer Network

Answer»

Right option is (a) Packet Filtering Firewall

To ELABORATE: A firewall can be a PC, a midrange, a mainframe, a UNIX workstation, a router, or combination of these. DEPENDING on the requirements, a firewall can CONSIST of ONE or more of the following functional components: Packet-filtering router

36.

A firewall is installed at the point where the secure internal network and untrusted external network meet which is also known as __________(a) Chock point(b) Meeting point(c) Firewall point(d) Secure pointThis question was posed to me in my homework.I'd like to ask this question from Firewalls topic in chapter Network Layer of Computer Network

Answer»

Right answer is (a) Chock point

Explanation: A firewall can be a PC, a router, a midrange, a mainframe, a UNIX workstation, or a combination of these that determines which INFORMATION or SERVICES can be accessed from the OUTSIDE and who is permitted to use the information and services from outside. Generally, a firewall is installed at the point where the secure internal network and UNTRUSTED external network meet, which is also known as a chokepoint.

37.

Network layer firewall has two sub-categories as _________(a) State full firewall and stateless firewall(b) Bit oriented firewall and byte oriented firewall(c) Frame firewall and packet firewall(d) Network layer firewall and session layer firewallThe question was asked in an online quiz.This interesting question is from Firewalls topic in division Network Layer of Computer Network

Answer»

Right answer is (a) State full firewall and stateless firewall

The explanation is: Most network layer firewalls can operate as stateful or stateless firewalls, creating two subcategories of the standard network layer firewall. Stateful firewalls have the advantage of being able to track packets over a period of time for greater analysis and accuracy — but they require more memory and operate more slowly. Stateless firewalls do not analyze PAST traffic and can be useful for SYSTEMS where SPEED is more important than security, or for systems that have very specific and LIMITED needs. For example, a computer that only needs to connect to a particular backup server does not need the extra security of a stateful firewall.

38.

Network layer firewall works as a __________(a) Frame filter(b) Packet filter(c) Content filter(d) Virus filterThe question was posed to me in homework.I'd like to ask this question from Firewalls topic in division Network Layer of Computer Network

Answer» RIGHT choice is (b) PACKET filter

The explanation: As you know, firewalls are AVAILABLE as hardware appliances, as software-only, or a combination of the TWO. In every case, the purpose of a firewall is to ISOLATE your trusted internal network (or your personal PC) from the dangers of unknown resources on the Internet and other network connections that may be harmful. The firewall prevents unauthorized access to your internal, trusted network from outside threats.
39.

Which of the following is false with respect to the datagram networks?(a) Number of flows of packets are not limited(b) Packets may not be in order at the destination(c) Path is not reserved(d) Delay is the same for all packets in a flowI have been asked this question by my college director while I was bunking the class.Origin of the question is Datagram Networks in section Network Layer of Computer Network

Answer»

The correct CHOICE is (d) Delay is the same for all PACKETS in a flow

The best I can explain: The delay of each packet in a datagram network is DIFFERENT as each packet might TAKE a different route to the DESTINATION. This happens because there is no pre-decided route for the packets.

40.

The probability of the error in a transmitted block _________ with the length of the block(a) Remains same(b) Decreases(c) Increases(d) Is not proportionalThis question was posed to me in an international level competition.This interesting question is from Datagram Networks in division Network Layer of Computer Network

Answer»

Correct answer is (C) Increases

To ELABORATE: PROBABILITY of the error in a TRANSMITTED block increases with the length of the block. Hence, the blocks should be as short as possible for ideal transmission with low possibility of an error.

41.

During datagram switching, the packets are placed in __________ to wait until the given transmission line becomes available.(a) Stack(b) Queue(c) Hash(d) Routing tableThe question was asked in my homework.This is a very interesting question from Datagram Networks in portion Network Layer of Computer Network

Answer»

The correct CHOICE is (b) Queue

The best explanation: When there are too MANY packets to be transmitted and the transmission LINE GETS blocked while transmitting some packets, the remaining packets are stored in queue during delay and are served as first in first out. The delay is called as queuing delay.

42.

Which of the following is true with respect to the delay in datagram networks?(a) Delay is greater than in a virtual circuit network(b) Each packet may experience a wait at a switch(c) Delay is not uniform for the packets of a message(d) All of the mentionedThe question was asked in semester exam.I'm obligated to ask this question of Datagram Networks in chapter Network Layer of Computer Network

Answer»

Correct option is (d) All of the mentioned

Easiest explanation: The DELAY of each PACKET in a DATAGRAM network is different as each packet might take a different route to the destination. The delay includes the PROPAGATION delay and the processing delay that is induced at each stop/switch that the packet encounters in its JOURNEY.

43.

Which of the following remains same in the header of the packet in a datagram network during the entire journey of the packet?(a) Destination address(b) Source address(c) Checksum(d) PaddingI had been asked this question in a job interview.My query is from Datagram Networks topic in portion Network Layer of Computer Network

Answer»

Correct answer is (a) Destination address

To EXPLAIN I would say: Destination address remains same in the header during the ENTIRE JOURNEY of the packet. There is no pre-decided ROUTE for the packets so each datagram/packet is treated as an individual entity and routed independently through the network.

44.

The main contents of the routing table in datagram networks are ___________(a) Source and Destination address(b) Destination address and Output port(c) Source address and Output port(d) Input port and Output portI got this question in an interview.The query is from Datagram Networks topic in portion Network Layer of Computer Network

Answer»

The CORRECT choice is (b) Destination address and Output PORT

Explanation: Routing table CONTAINS destination address and output port to route the PACKETS to their destinations. The port address specifies the particular application that the packet has to be FORWARDED to after it has reached the destination.

45.

Datagrams are routed to their destinations with the help of ________(a) Switch table(b) Segments table(c) Datagram table(d) Routing tableThis question was addressed to me in semester exam.The origin of the question is Datagram Networks in section Network Layer of Computer Network

Answer»

The correct option is (d) Routing table

To explain I would say: Routing table is used to ROUTE the PACKETS to their destinations. The packet/datagram HEADER contains the DESTINATION header for the whole journey to source to the destination through the ROUTERS.

46.

Datagram networks mainly refers to _________(a) Connection oriented networks(b) Connection less networks(c) Telephone networks(d) InternetworkThis question was addressed to me in exam.This interesting question is from Datagram Networks in division Network Layer of Computer Network

Answer»

The CORRECT OPTION is (b) Connection less networks

To explain I WOULD say: The switch does not keep the INFORMATION about the connection state, hence it is connection less. There is no need for establishing a HANDSHAKE to begin the transmission in such networks.

47.

Packets in datagram switching are referred to as ________(a) Switches(b) Segments(c) Datagrams(d) Data-packetsI got this question by my college director while I was bunking the class.The above asked question is from Datagram Networks topic in portion Network Layer of Computer Network

Answer»

Correct option is (c) Datagrams

To ELABORATE: As the NAME SUGGESTS, in datagram SWITCHING packets are called as datagram. Each datagram/packet is treated as an individual entity and routed independently through the network.

48.

Datagram switching is done at which layer of OSI model?(a) Network layer(b) Physical layer(c) Application layer(d) Transport layerThis question was posed to me in an online quiz.My question comes from Datagram Networks topic in division Network Layer of Computer Network

Answer»

Right answer is (a) NETWORK layer

The explanation is: Datagram switching is NORMALLY DONE at network layer. In datagram switching, the datagram stream need not be in order as each datagram can take DIFFERENT routes to the destination.

49.

Which OSPF show command describes a list of OSPF adjacencies?(a) Show ip ospf interface(b) Show ip ospf(c) Show ip route(d) Show ip ospf neighborI got this question during a job interview.This question is from OSPF Configuration topic in chapter Network Layer of Computer Network

Answer»

The correct OPTION is (d) Show ip OSPF neighbor

For explanation: The “Show ip ospf neighbor” COMMAND is the OSPF show command that can describe a list of OSPF adjacencies i.e. the list of adjacent nodes or neighbors. The ROUTER will only communicate with its neighbors directly.

50.

Which two commands are required for basic OSPF configuration?(a) “[Network mask] area [area-id]” and “Router ospf [process-id]”(b) “[Wildcard-mask] area [area-id]” and “[Network mask] area [area-id]”(c) Only “Router ospf [process-id]”(d) “[Wildcard-mask] area [area-id]” and “Router ospf [process-id]”I got this question by my college professor while I was bunking the class.Question is from OSPF Configuration topic in chapter Network Layer of Computer Network

Answer»

The correct choice is (d) “[Wildcard-mask] area [area-id]” and “ROUTER ospf [process-id]”

To explain I would say: The “Router ospf [process-id]” command enables OSPF ROUTING PROTOCOL in the router and the “[Wildcard-mask] area [area-id]” command is used to select the INTERFACES that we want to include in the OSPF process. That is ENOUGH for the basic configuration of OSPF in a router.