Explore topic-wise InterviewSolutions in .

This section includes InterviewSolutions, each offering curated multiple-choice questions to sharpen your knowledge and support exam preparation. Choose a topic below to get started.

51.

In File Transfer Protocol, data transfer cannot be done in __________(a) stream mode(b) block mode(c) compressed mode(d) message modeThis question was posed to me in homework.This interesting question is from Ports topic in chapter Networking of Computer Network

Answer»

The correct ANSWER is (d) message MODE

To elaborate: In Stream mode, the data is TRANSFERRED in a continuous stream. In Block mode, data is transferred after being DIVIDED into SMALLER blocks. In Compressed mode, data is transferred after being compressed using some compression algorithm.

52.

The File Transfer Protocol is built on __________(a) data centric architecture(b) service oriented architecture(c) client server architecture(d) connection oriented architectureThe question was asked in an internship interview.I would like to ask this question from Ports topic in chapter Networking of Computer Network

Answer»

The correct answer is (c) CLIENT server architecture

To ELABORATE: The FTP connection includes a Server and a Client which WISH to share files. The server can have MULTIPLE clients at the same time while the client COMMUNICATES with only one server at a time.

53.

In Active mode FTP, the client initiates both the control and data connections.(a) True(b) FalseThe question was asked by my college director while I was bunking the class.This interesting question is from Ports in chapter Networking of Computer Network

Answer»

Correct option is (b) False

Explanation: In Passive mode of FTP, the CLIENT initiates both DATA and CONTROL CONNECTIONS, while in Active mode, the client initiates the control connection and then the server initiates the data connection.

54.

In FTP protocol, a client contacts a server using ______ as the transport protocol.(a) Transmission control protocol(b) User datagram protocol(c) Datagram congestion control protocol(d) Stream control transmission protocolThe question was posed to me in an internship interview.I'm obligated to ask this question of Ports in chapter Networking of Computer Network

Answer»

Correct option is (a) Transmission CONTROL PROTOCOL

For explanation: The clients USE the Transmission Control Protocol for FTP as it’s more reliable than UDP, DCCP, and SCTP, and RELIABILITY of file transfer is required to be as high as possible for FTP.

55.

FTP server listens for connection on which port number?(a) 20(b) 21(c) 22(d) 23The question was posed to me in an international level competition.The origin of the question is Ports in portion Networking of Computer Network

Answer»

The correct OPTION is (b) 21

To elaborate: Port 20 is used for FTP data. Port 22 is used for SSH REMOTE login. Port 23 is used for TELNET.

56.

In HTTP pipelining __________(a) multiple HTTP requests are sent on a single TCP connection without waiting for the corresponding responses(b) multiple HTTP requests cannot be sent on a single TCP connection(c) multiple HTTP requests are sent in a queue on a single TCP connection(d) multiple HTTP requests are sent at random on a single TCP connectionI got this question in my homework.Enquiry is from Ports topic in chapter Networking of Computer Network

Answer»

Right option is (a) multiple HTTP requests are SENT on a SINGLE TCP connection without waiting for the corresponding responses

The BEST I can explain: HTTP pipelining helps the client make multiple requests without having to waiting for each response, thus saving a lot of time and bandwidth for the client.

57.

HTTP client requests by establishing a __________ connection to a particular port on the server.(a) User datagram protocol(b) Transmission control protocol(c) Border gateway protocol(d) Domain host control protocolI have been asked this question in a job interview.This intriguing question originated from Ports topic in section Networking of Computer Network

Answer»

The correct ANSWER is (b) Transmission control protocol

To elaborate: HTTP clients perform requests using a TCP connection, because the TCP connection provides a more reliable service. UDP is not a reliable protocol, border gateway protocol is used on top of TCP, while domain host control protocol is a network LAYER protocol.

58.

In the network HTTP resources are located by __________(a) Uniform resource identifier(b) Unique resource locator(c) Unique resource identifier(d) Union resource locatorI got this question in an interview for job.My question is based upon Ports in division Networking of Computer Network

Answer»

The CORRECT option is (a) UNIFORM RESOURCE IDENTIFIER

For explanation: The Uniform Resource Identifier is a name and locator for the resource to be located by the HTTP. The URLs and URNs are DERIVED through the identifier.

59.

HTTP is ________ protocol.(a) application layer(b) transport layer(c) network layer(d) data link layerThis question was posed to me by my school principal while I was bunking the class.This interesting question is from Ports topic in portion Networking of Computer Network

Answer»

Correct option is (a) APPLICATION layer

Explanation: HTTP is an Application layer PROTOCOL used to DEFINE how messages are formatted and transmitted through the World WIDE Web.

60.

Multiple objects can be sent over a TCP connection between client and server in a persistent HTTP connection.(a) True(b) FalseThis question was addressed to me in homework.The query is from Ports in chapter Networking of Computer Network

Answer»

Right option is (a) True

The best explanation: Persistent CONNECTIONS are KEPT active after completing TRANSACTION so that MULTIPLE objects can be sent over the same TCP connection.

61.

Cryptographic hash function takes an arbitrary block of data and returns _________(a) fixed size bit string(b) variable size bit string(c) both fixed size bit string and variable size bit string(d) variable sized byte stringThe question was asked in an online quiz.Origin of the question is Cryptography topic in section Networking of Computer Network

Answer»

Correct answer is (a) fixed size bit string

The explanation is: Cryptographic hash functions are used in digital signatures and message authentication codes. The only ISSUE with it is that it returns the same hash VALUE every time for a message making it VULNERABLE to ATTACKERS to EVALUATE and break the cipher.

62.

ElGamal encryption system is __________(a) symmetric key encryption algorithm(b) asymmetric key encryption algorithm(c) not an encryption algorithm(d) block cipher methodThe question was posed to me during an online interview.This key question is from Cryptography topic in portion Networking of Computer Network

Answer»

Correct choice is (b) ASYMMETRIC key encryption algorithm

To elaborate: The ELGamal encryption system was MADE by Taher Elgamal in the year 1985 and is an asymmetric key algorithm. It is POPULARLY used in PGP and other systems.

63.

Voice privacy in GSM cellular telephone protocol is provided by _______(a) A5/2 cipher(b) b5/4 cipher(c) b5/6 cipher(d) b5/8 cipherI had been asked this question during an online exam.The question is from Cryptography in chapter Networking of Computer Network

Answer» RIGHT answer is (a) A5/2 CIPHER

The EXPLANATION: The A5/2 cipher was published in the YEAR 1996 and was cryptanalysed in the same year within a month. It’s use was discontinued from the year 2006 as it was really weak.
64.

Which one of the following is a cryptographic protocol used to secure HTTP connection?(a) stream control transmission protocol (SCTP)(b) transport layer security (TLS)(c) explicit congestion notification (ECN)(d) resource reservation protocolThis question was addressed to me by my college professor while I was bunking the class.I'm obligated to ask this question of Cryptography in division Networking of Computer Network

Answer» CORRECT CHOICE is (b) transport LAYER security (TLS)

To elaborate: TLS has strong message authentication and key-material generation to prevent eavesdropping, TAMPERING and message forgery. It has been used since the year 1996.
65.

Cryptanalysis is used __________(a) to find some insecurity in a cryptographic scheme(b) to increase the speed(c) to encrypt the data(d) to make new ciphersI had been asked this question by my college professor while I was bunking the class.I would like to ask this question from Cryptography in chapter Networking of Computer Network

Answer»

Correct option is (a) to find some insecurity in a cryptographic scheme

Explanation: Cryptanalysis is a field of study in which a cryptographic scheme is intentionally tried to breach in order to find flaws and insecurities. It is USED to MAKE SURE that the scheme is least vulnerable to ATTACKS.

66.

What is data encryption standard (DES)?(a) block cipher(b) stream cipher(c) bit cipher(d) byte cipherI had been asked this question in an online interview.Origin of the question is Cryptography topic in chapter Networking of Computer Network

Answer» CORRECT OPTION is (a) block cipher

The explanation is: DES is a symmetric key block cipher in which the block size is 64 bits and the key size is 64 bits. It is VULNERABLE to some attacks and is hence not that popularly used.
67.

In cryptography, the order of the letters in a message is rearranged by __________(a) transpositional ciphers(b) substitution ciphers(c) both transpositional ciphers and substitution ciphers(d) quadratic ciphersThis question was addressed to me during an online exam.The query is from Cryptography in division Networking of Computer Network

Answer»

Correct ANSWER is (a) transpositional ciphers

Explanation: In transposition ciphers, the ORDER of LETTERS in a plaintext message is SHUFFLED using a pre-defined method. Some of such ciphers are Rail fence cipher and Columnar transposition.

68.

Which one of the following algorithm is not used in asymmetric-key cryptography?(a) rsa algorithm(b) diffie-hellman algorithm(c) electronic code book algorithm(d) dsa algorithmI got this question in final exam.My question is from Cryptography topic in portion Networking of Computer Network

Answer»

Correct answer is (C) ELECTRONIC code book algorithm

Easiest explanation: Electronic code book algorithm is a block cipher method in which each block of text in an encrypted MESSAGE CORRESPONDS to a block of data. It is not feasible for block sizes smaller than 40 bits.

69.

In asymmetric key cryptography, the private key is kept by __________(a) sender(b) receiver(c) sender and receiver(d) all the connected devices to the networkI got this question in an international level competition.My question is from Cryptography in chapter Networking of Computer Network

Answer»

The correct answer is (B) receiver

The best I can explain: The PRIVATE key is KEPT only by the receiver of the message. Its AIM is to MAKE sure that only the intended receiver can decipher the message.

70.

In cryptography, what is cipher?(a) algorithm for performing encryption and decryption(b) encrypted message(c) both algorithm for performing encryption and decryption and encrypted message(d) decrypted messageThe question was posed to me in exam.My question comes from Cryptography in portion Networking of Computer Network

Answer»

Right answer is (a) algorithm for PERFORMING ENCRYPTION and DECRYPTION

The best I can explain: Cipher is a METHOD to implement encryption and decryption of messages travelling in a network. It’s USED to increase the confidentiality of the messages.

71.

Which routing protocol implements the diffusing update algorithm?(a) IS-IS(b) IGRP(c) EIGRP(d) OSPFI got this question by my college director while I was bunking the class.My question is based upon RIP v2 in division Networking of Computer Network

Answer»

Right CHOICE is (c) EIGRP

To explain I would say: The diffusing UPDATE algorithm (DUAL) is used to maintain backup routes to a destination for when the PRIMARY ROUTE fails. EIGRP routing protocol implements the diffusing update algorithm.

72.

Which protocol maintains neighbor adjacencies?(a) RIPv2 and EIGRP(b) IGRP and EIGRP(c) RIPv2(d) EIGRPI have been asked this question in an online interview.My question is taken from RIP v2 in portion Networking of Computer Network

Answer»

Right option is (C) RIPv2

Explanation: NEIGHBOR adjacency refers to the formal handshake performed by neighboring routers. It is to be done before the router share any routing information. RIP V2 maintains neighbor ADJACENCIES.

73.

What does administrative distance rank?(a) Metrics(b) Sources of routing information(c) Router reliability(d) Best pathsThe question was asked in an interview for job.Question is from RIP v2 in section Networking of Computer Network

Answer»

Right answer is (b) SOURCES of routing information

For explanation I would SAY: Sources of routing information is the administrative DISTANCE rank. It is USED by routers to SELECT the best path when there are different routes to the same destination. It’s used only two different routing protocols are being used.

74.

Which is a reason for avoiding doing route redistribution on two routers between the same two routing domains?(a) Higher cost of two routers(b) Routing feedback(c) Cisco IOS incompatibility(d) Not possible to use two routersThe question was asked in an internship interview.My enquiry is from RIP v2 in chapter Networking of Computer Network

Answer»

The CORRECT option is (b) Routing feedback

Explanation: Routing feedback is an anomaly in which the routing protocols go back and forth between one route and ANOTHER. Routing feedback is a reason for avoiding doing route redistribution on two ROUTERS between the same two routing DOMAINS.

75.

Which two routing protocols can be redistributed into OSPF by a Cisco router?(a) IP EIGRP and AppleTalk EIGRP(b) AppleTalk EIGRP and RIPv2(c) RIPv2 and IP EIGRP(d) IPX RIP & AppleTalk EIGRPThe question was asked by my school teacher while I was bunking the class.My doubt is from RIP v2 topic in section Networking of Computer Network

Answer»

Right option is (c) RIPv2 and IP EIGRP

For EXPLANATION I would say: OSPF stands for OPEN SHORTEST Path FIRST. It is a Link state routing protocol. IP EIGRP and RIPv2 can be redistributed into OSPF by a CISCO router.

76.

Which of the situations might not require multiple routing protocols in a network?(a) When a new Layer 2-only switch is added to the network(b) When you are migrating from one routing protocol to another(c) When you are using routers from multiple vendors(d) When there are host-based routers from multiple vendorsThis question was posed to me in class test.My enquiry is from RIP v2 in chapter Networking of Computer Network

Answer»

Right choice is (a) When a new Layer 2-only switch is ADDED to the network

The BEST I can EXPLAIN: Multiple routing protocols are required only when we need to migrate from one routing protocol to another, or when we are using routers from multiple VENDORS, or when there are host-based routers from multiple vendors. Routing is not a layer-2 function so we don’t require multiple routing protocols when new layer-2 switch is added.

77.

Which of the following is true regarding RIPv2?(a) It has a lower administrative distance than RIPv1(b) It converges faster than RIPv1(c) It has the same timers as RIPv1(d) It is harder to configure than RIPv1I got this question in semester exam.My enquiry is from RIP v2 topic in chapter Networking of Computer Network

Answer»

Right choice is (c) It has the same timers as RIPv1

For EXPLANATION I WOULD say: RIPV2 is PRETTY much just like RIPv1. It has the same administrative DISTANCE and timers and is configured just like RIPv1.

78.

What is route poisoning?(a) It sends back the protocol received from a router as a poison pill, which stops the regular updates. The use of variable length subnet masks is permitted(b) It is information received from a router that can’t be sent back to the originating router.RIPv2 supports classless routing(c) It prevents regular update messages from reinstating a route that has just come up(d) It describes when a router sets the metric for a downed link to infinityThis question was posed to me in semester exam.The doubt is from RIP v2 in portion Networking of Computer Network

Answer»

The correct option is (d) It describes when a ROUTER sets the metric for a downed LINK to infinity

Easy explanation: When a network goes down, the distance-vector routing protocol initiates ROUTE POISONING by advertising the network with a metric of 16, or unreachable.

79.

Which statement is true regarding classless routing protocols?(a) The use of discontinuous networks is not allowed(b) The use of variable length subnet masks is permitted(c) RIPv1 is a classless routing protocol(d) RIPv2 supports classless routingThe question was posed to me during an internship interview.Question is taken from RIP v2 in division Networking of Computer Network

Answer» CORRECT choice is (b) The USE of variable length SUBNET masks is permitted

Easy explanation: Classful routing means that all hosts in the internetwork use the same mask. Classless routing means that you can use Variable Length Subnet Masks (VLSMs) and can also SUPPORT DISCONTINUOUS networking.
80.

Where should we use default routing?(a) On stub networks- which have only one exit path out of the network(b) Which have more than one exit path out of the network(c) Minimum five exit paths out of the network(d) Maximum five exit paths out of the networkThis question was addressed to me in unit test.My enquiry is from RIP v1 in chapter Networking of Computer Network

Answer» CORRECT CHOICE is (a) On stub NETWORKS- which have only one exit PATH out of the network

Explanation: We MUST use default routing on stub networks. They have only one exit path out of the network, so there can be no specific path decided for such networks.
81.

Which statement is true regarding classless routing protocol?(a) The use of discontinuous networks is not allowed(b) Use of variable length subnet masks is permitted(c) RIPv1 is a classless routing protocol(d) IGRP supports classes routing within the same autonomous systemThis question was addressed to me in unit test.This interesting question is from RIP v1 topic in chapter Networking of Computer Network

Answer»

Correct answer is (b) USE of VARIABLE length subnet masks is PERMITTED

The best explanation: Use of variable length subnet masks is permitted in classless ROUTING protocols. Also use of discontinuous networks is ALLOWED in such routing protocols. RIPv1 is a classful routing protocol but RIPv2 is classless routing protocol.

82.

_________ is the default administrative distance of RIP.(a) 0(b) 90(c) 120(d) 130I had been asked this question in final exam.My doubt stems from RIP v1 in portion Networking of Computer Network

Answer»

The correct choice is (c) 120

The explanation is: The default administrative distance is the default count of NUMBERS assigned to arbitrary routes to a destination. The default administrative distance of RIP is 120. It is used to find the shortest ROUTE amongst the NUMBER of PATHS available.

83.

Which protocol gives a full route table update every 30 seconds?(a) IEGRP(b) RIP(c) ICMP(d) IPThis question was posed to me in an international level competition.My doubt is from RIP v1 topic in chapter Networking of Computer Network

Answer»

Correct choice is (b) RIP

To explain: RIP gives a full ROUTE table UPDATE EVERY 30 seconds. The broadcasted routing table can be used by other routers to FIND the shortest path AMONG the network devices.

84.

Default administrative distance of a static route is ________(a) 0(b) 90(c) 100(d) 1The question was posed to me in exam.The question is from RIP v1 in chapter Networking of Computer Network

Answer»

Right answer is (d) 1

The explanation is: 1 is the default administrative distance of Static ROUTE. It is used by ROUTERS to select the best path when there are DIFFERENT routes to the same destination. It’s used only two different routing protocols are being used.

85.

You type debug IP rip on your router console and see that 172.16.10.0 is being advertised to you with a metric of 16. What does this mean?(a) The route is 16 hops away Debug IP rip(b) The route has a delay of 16 microseconds Debug IP route(c) The route is inaccessible(d) The route is queued at 16 messages a secondThis question was addressed to me during a job interview.The query is from RIP v1 topic in section Networking of Computer Network

Answer»

Correct option is (c) The route is inaccessible

Easy explanation: You cannot have 16 HOPS on a RIP network by DEFAULT, because the MAX default hops POSSIBLE is 15. If you receive a route advertised with a metric of 16, this means it is inaccessible.

86.

Two connected routers are configured with RIP routing. What will be the result when a router receives a routing update that contains a higher-cost path to a network already in its routing table?(a) The updated information will be added to the existing routing table Debug IP rip(b) The update will be ignored and no further action will occur Debug IP route(c) The updated information will replace the existing routing table entry(d) The existing routing table entry will be deleted from the routing table and all routers will exchange routing updates to reach convergenceI had been asked this question by my college professor while I was bunking the class.My doubt is from RIP v1 in division Networking of Computer Network

Answer»

The correct option is (b) The update will be ignored and no further action will occur Debug IP route

The explanation: When a routing update is received by a ROUTER, the router first checks the administrative DISTANCE (AD) and always chooses the route with the lowest AD. However, if two routes are received and they both have the same AD, then the router will choose the one route with the lowest metrics, or in RIP’s case, hop COUNT.

87.

Which command displays RIP routing updates?(a) Show IP route(b) Debug IP rip(c) Show protocols(d) Debug IP routeThe question was asked during an internship interview.This key question is from RIP v1 in division Networking of Computer Network

Answer»

Correct option is (b) Debug IP rip

The best I can explain: The debug IP rip command is USED to show the Internet Protocol (IP) ROUTING INFORMATION Protocol (RIP) updates being sent and received on the router. It VERIFIES that the updates are being broadcasted and not multicasted.

88.

How often does a RIPv1 router broadcast its routing table by default?(a) Every 30 seconds(b) Every 60 seconds(c) Every 90 seconds(d) RIPv1 does not broadcast periodicallyThe question was posed to me by my school principal while I was bunking the class.This intriguing question originated from RIP v1 in chapter Networking of Computer Network

Answer»

Correct CHOICE is (a) Every 30 seconds

To ELABORATE: RIPV1 router broadcasts its ROUTING table every 30 seconds by default. The broadcasted routing table can be used by other routers to find the shortest path among the network devices.

89.

Which routing protocol has a maximum network diameter (hop count) of 15?(a) RIPv1(b) RIPv2(c) EIGRP(d) Both RIPv1 and RIPv2The question was posed to me by my school principal while I was bunking the class.The doubt is from RIP v1 topic in section Networking of Computer Network

Answer» CORRECT answer is (d) Both RIPv1 and RIPV2

Explanation: Both RIPv1 and RIPv2 SUPPORT a maximum hop COUNT of 15 because they use 4-bits to store this value. RIPv1 USES classful routing whereas RIPv2 uses classless routing. The routing updates are broadcasted over the network. It notifies routers about the update so that they update their own routing tables.
90.

In Novell’s use of RIP, there are two metrics used to make routing decisions. Select the correct metrics.(a) Ticks & Hops(b) Hops & Loops(c) Loops & Counts(d) Counts & TicksI got this question in homework.The origin of the question is IP Routing in section Networking of Computer Network

Answer»

The correct answer is (a) TICKS & Hops

To explain I would say: It first USES ticks (which is about 1/18 sec.); if there is a tie, it uses hops; if hops are equal, then it uses an administratively assigned TIEBREAKER.

91.

Novell’s implementation of RIP updates routing tables every _________ seconds.(a) 60(b) 90(c) 10(d) 30The question was posed to me in an international level competition.My question is based upon IP Routing in section Networking of Computer Network

Answer»

Right option is (a) 60

The best I can explain: NOVELL’s RIP updates routing TABLES every 60 seconds, APPLE’s RTMP is every 10 seconds, routers ARP every 60 seconds, IGRP signal every 90 seconds, and Banyan VINES signals every 90 seconds.

92.

To prevent Service Advertisements (SAPs) from flooding a network, Cisco routers do not forward them. How are services advertised to other networks?(a) Each router builds its own SAP table and forwards that every 60 seconds(b) Each router assigns a service number and broadcasts that(c) SAPs aren’t necessary with Cisco routers(d) Cisco routers filter out all SAPsThis question was posed to me in homework.Question is from IP Routing topic in division Networking of Computer Network

Answer»

Right OPTION is (a) Each router builds its own SAP table and forwards that every 60 seconds

The explanation: Cisco routers build SAP TABLES and FORWARD the table every 60 seconds. All SAPs can’t befiltered even with 4.x since NDS and time synchronization uses SAPs.

93.

By default, Cisco routers forward GNS SAPs to remote networks.(a) False(b) TrueThis question was posed to me during an online exam.This intriguing question originated from IP Routing in portion Networking of Computer Network

Answer»

Correct option is (a) False

To explain I would SAY: GNS is NOVELL’s protocol to Get Nearest Server. If there is a server on the local network,that server will RESPOND. If there isn’t, the Cisco router has to be configured to forward theGNS SAP.

94.

You want to enable both arpa and snap encapsulation on one router interface. How do you do this?(a) The interface can handle multiple encapsulation types with no extra configuration(b) Assign two network numbers, one for each encapsulation type(c) Enable Novell-ether to run multiple encapsulation types(d) Both arpa and snap are enabled by default so you don’t have to configure anythingThis question was posed to me in homework.My question is based upon IP Routing in division Networking of Computer Network

Answer»

The correct choice is (b) Assign two NETWORK numbers, one for each encapsulation type

The best explanation: To assign multiple network numbers, you USUALLY use sub interfaces. A SAMPLE CONFIGURATION follows: IPXEthernet 0.1 IPX encapsulation novell-ether ipx network 9e interface ethernet 0.2 ipx encapsulation sap ipx network 6C

95.

What does the “IPX maximum-paths 2” command accomplish?(a) It enables load sharing on 2 paths if the paths are equal metric paths(b) It sets up routing to go to network 2(c) It is the default for Cisco IPX load sharing(d) It enables load sharing on 2 paths if the paths are unequal metric pathsThis question was addressed to me in unit test.My question is taken from IP Routing topic in chapter Networking of Computer Network

Answer»

Correct OPTION is (a) It enables load sharing on 2 paths if the paths are equal metric paths

To elaborate: It enables load sharing on 2 paths if the paths are equal metric paths. The default is 1 path and the maximum is 512 paths. The VALUE must always be greater than 1 and must be a NATURAL number.

96.

The “IPX delay number” command will allow an administrator to change the default settings. What are the default settings?(a) For LAN interfaces, one tick; for WAN interfaces, six ticks(b) For LAN interfaces, six ticks; for WAN interfaces, one tick(c) For LAN interfaces, zero ticks; for WAN interfaces, five ticks(d) For LAN interfaces, five ticks; for WAN interfaces, zero TicksThe question was posed to me during an internship interview.My doubt is from IP Routing in chapter Networking of Computer Network

Answer»

Correct answer is (a) For LAN interfaces, one tick; for WAN interfaces, six ticks

The explanation: Tick is basically the update rate of CLIENTS in the NETWORK. The IPX DELAY NUMBER will GIVE the ticks at a certain time. The default ticks are–for LAN interfaces, one tick, and for WAN interfaces, six ticks.

97.

As a system administrator, you want to debug IGRP but are worried that the “debug IP IGRP transaction” command will flood the console. What is the command that you should use?(a) Debug IP IGRP event(b) Debug IP IGRP-events(c) Debug IP IGRP summary(d) Debug IP IGRP eventsI had been asked this question at a job interview.My question is taken from IP Routing in section Networking of Computer Network

Answer» RIGHT answer is (d) Debug IP IGRP EVENTS

The best explanation: The “debug IP IGRP events” is USED to DISPLAY a short summary of IGRP routing information. You can append an IP address onto EITHER console’s command-line to see only the IGRP updates from a neighbor. The command will only give a short summary and hence won’t flood the command line.
98.

Which NetWare protocol provides link-state routing?(a) NLSP(b) RIP(c) SAP(d) NCPI have been asked this question during an online interview.This is a very interesting question from IP Routing in division Networking of Computer Network

Answer»

The correct choice is (a) NLSP

For explanation I would say: NetWare Link SERVICES Protocol (NLSP) provides link-state routing. SAP (Service Advertisement Protocol) advertises network services. NCP (NetWare CORE Protocol) provides client-to-server connections and applications. RIP is a DISTANCE vector routing protocol. NLSP was developed by Novell to replace RIP routing protocols.

99.

Which NetWare protocol works on layer 3–network layer—of the OSI model?(a) IPX(b) NCP(c) SPX(d) NetBIOSThis question was posed to me in an online interview.This question is from IP Routing in section Networking of Computer Network

Answer»

Right answer is (a) IPX

For explanation I would say: IPX (Internetwork Packet Exchange) is the NetWare network LAYER 3 protocol used for transferring INFORMATION on LANS that use Novell’s NetWare.

100.

NetWare IPX addressing uses a network number and a node number. Which statement is not true?(a) The network address is administratively assigned and can be up to 16 hexadecimal digits long(b) The node address is always administratively assigned(c) The node address is usually the MAC address(d) If the MAC address is used as the node address, then IPX eliminates the use of ARPThis question was posed to me in quiz.Enquiry is from IP Routing in chapter Networking of Computer Network

Answer»

Correct choice is (b) The NODE ADDRESS is always ADMINISTRATIVELY assigned

To elaborate: The NETWORK address can be up to 16 hexadecimal digits in length. The node number is 12 hexadecimal digits. The node address is usually the MAC address. An example IPX address is 4a1d.0000.0c56.de33. The network part is 4a1d. The node part is 0000.0c56.de33. The network number is assigned by the system administrator of the Novell network and the MAC address/node address is not assigned by the administrator.