Explore topic-wise InterviewSolutions in .

This section includes InterviewSolutions, each offering curated multiple-choice questions to sharpen your knowledge and support exam preparation. Choose a topic below to get started.

51.

What Is T1?

Answer»

T1 is a line from TELECOMMUNICATION Company with a data transmission rate of 1.544 MBPS.

T1 is a line from Telecommunication Company with a data transmission rate of 1.544 Mbps.

52.

What Is The Basic Unit Of T-carrier System?

Answer»

The basic UNIT of T-carrier system is DSO with transmission RATE of 64 kbits/sec used for one VOICE circuit.

The basic unit of T-carrier system is DSO with transmission rate of 64 kbits/sec used for one voice circuit.

53.

Explain Pri Service.

Answer»

The PRI service operates at 23 B-channels and one D-channel in North America and Japan. In Europe, Australia, and other PARTS of the world, ISDN PRI SERVICES provide 30 B-channels plus one D-channel at 64 kbps.

The PRI service operates at 23 B-channels and one D-channel in North America and Japan. In Europe, Australia, and other parts of the world, ISDN PRI services provide 30 B-channels plus one D-channel at 64 kbps.

54.

Explain The Bri Service.

Answer»
  • The BRI service works with TWO B-channels and ONE D- channel (2B+D).
  • The BRI B-channel service CARRIES user data and operates at 64 kbps.
  • The BRI D-channel service operates at 16 kbps and carries control and signalling INFORMATION.

55.

What Types Of Services Are Associated With Isdn?

Answer»

Basic RATE Interface (BRI) and PRIMARY Rate Interface (PRI) are the two services associated with ISDN.

Basic Rate Interface (BRI) and Primary Rate Interface (PRI) are the two services associated with ISDN.

56.

Explain Isdn.

Answer»

ISDN is a DIGITAL telephony and data-transport service OFFERED by TELEPHONE carriers.

ISDN is a digital telephony and data-transport service offered by telephone carriers.

57.

When Do You Use Bgp, Igrp, Ospf, And Static Route?

Answer»
  •  BGP is used when there are number of routers in a network, such as in an Internet SERVICE Provider (ISP) network environment
  •  IGRP is used when the network is small, such as in a small company
  •  OSPF is used when there are many departments in a company that need to communicate with each other
  •  Static route is used for small office or home office environment.

58.

Which Protocols Supports Vlsm?

Answer»

The CLASSLESS routing protocols SUPPORTS VLSM; for example, RIPV2, EIGRP, OSPF, and IS-IS.

The classless routing protocols supports VLSM; for example, RIPv2, EIGRP, OSPF, and IS-IS.

59.

Give Some Examples Of Classful And Classless Routing Protocols.

Answer»

CLASSFUL ROUTING protocols are RIPV1 and IGRP; WHEREAS, classless routing protocols are RIPv2, EIGRP, OSPF, and Intermediate System To Intermediate System (IS-IS).

Classful routing protocols are RIPv1 and IGRP; whereas, classless routing protocols are RIPv2, EIGRP, OSPF, and Intermediate System To Intermediate System (IS-IS).

60.

What Is The Difference Between Classful And Classless Routing Protocol?

Answer»

The CLASSFUL routing protocol does not send the SUBNET mask information with routing updates; WHEREAS, CLASSLESS routing protocol SENDS the subnet mask with the routing updates.

The classful routing protocol does not send the subnet mask information with routing updates; whereas, classless routing protocol sends the subnet mask with the routing updates.

61.

What Is The Difference Between Eigrp And Igrp?

Answer»

The difference between EIGRP and IGRP is as follows:

  •  EIGRP is a classless routing PROTOCOL; whereas, IGRP is a CLASSFUL routing protocol
  •  EIGRP CONSUMES much less bandwidth; whereas, IGRP consumes comparatively more bandwidth
  •  EIGRP USES a 32 bit VALUE metric; whereas, IGRP uses a 24 bit value metric

The difference between EIGRP and IGRP is as follows:

62.

Which Eigrp Information Is Stored In Ram By Using The Hello And Update Packets?

Answer»

The NEIGHBOUR, topology, and ROUTING INFORMATION are STORED in RAM by USING the hello and update packets.

The neighbour, topology, and routing information are stored in RAM by using the hello and update packets.

63.

Which Route Will The Router Choose By Default When The Table Has Static, Rip, And Igrp Route?

Answer»

The router will choose the static ROUTE by default as it has least administrative DISTANCE of count 1.

The router will choose the static route by default as it has least administrative distance of count 1.

64.

What Are The Parameters Used By Igrp For Finding The Best Path?

Answer»

The BANDWIDTH and DELAY of line PARAMETERS are used by IGRP to FIND the best path.

The bandwidth and delay of line parameters are used by IGRP to find the best path.

65.

When You Use The Debug Ip Rip Command And Get A Metric16, What Does It Mean?

Answer»

The METRIC16 equals 16 hops on RIP, which IMPLIES that the router is INACCESSIBLE, as the maximum permissible HOP for RIP is 15.

The metric16 equals 16 hops on RIP, which implies that the router is inaccessible, as the maximum permissible hop for RIP is 15.

66.

What Does Ripv2 Uses To Prevent Routing Loops?

Answer»

RIPV2 uses split HORIZONS, route poisoning, and holddown TIMERS to PREVENT routing LOOPS.

RIPv2 uses split horizons, route poisoning, and holddown timers to prevent routing loops.

67.

What Packet Formats Are Used In Eigrp?

Answer»

The PACKET formats USED in EIGRP are Hello/Acks, Updates, Queries, REPLIES, and REQUESTS.

The packet formats used in EIGRP are Hello/Acks, Updates, Queries, Replies, and Requests.

68.

What Is The Difference Between Ripv1 And Ripv2?

Answer»

RIPv1 uses BROADCAST and does not support Variable Length Subnet Mask (VLSM); WHEREAS, RIPv2 uses MULTICAST and supports VLSM.

RIPv1 uses broadcast and does not support Variable Length Subnet Mask (VLSM); whereas, RIPv2 uses multicast and supports VLSM.

69.

What Is Black Hole?

Answer»

Black HOLE occurs when a SOURCE is not informed that a PACKET did not reach the destination and the packet is SILENTLY dropped from the network.

Black hole occurs when a source is not informed that a packet did not reach the destination and the packet is silently dropped from the network.

70.

What Are The Default Administrative Distances Of Rip, Igrp, Eigrp, And Ospf Routing Protocols?

Answer»

The DEFAULT Administrative Distances for the routing PROTOCOLS are given as follows:

  •  RIP-120
  •  IGRP- 100
  •  EIGRP- 90
  •  OSPF- 110

The default Administrative Distances for the routing protocols are given as follows:

71.

What Are The Timers Of Rip, Interior Gateway Routing Protocol (igrp), Enhanced Interior Gateway Routing Protocol (eigrp), And Ospf Routing Protocols?

Answer»

The timers for routing PROTOCOLS are as FOLLOWS:

  •  RIP - 30 seconds
  •  IGRP- 90 seconds
  •  EIGRP- 2 seconds
  •  OSPF-10 seconds

The timers for routing protocols are as follows:

72.

Explain Holddown Timer.

Answer»

When a router detects that a NETWORK is unreachable and unstable, the holddown TIMER prevents a router from receiving the ROUTE until the network appears to be stable, that is, until either an interface stops CHANGING state (flapping) or a better route is learned.

When a router detects that a network is unreachable and unstable, the holddown timer prevents a router from receiving the route until the network appears to be stable, that is, until either an interface stops changing state (flapping) or a better route is learned.

73.

Explain Route Poisoning.

Answer»

The route poisoning is another solution to ROUTING loops, where a router LEARNS about a bad route, which has an INFINITE (oo) route metric. The router INFORMS other routers that a particular route is no longer reachable and should be REMOVED from their routing tables.

The route poisoning is another solution to routing loops, where a router learns about a bad route, which has an infinite (oo) route metric. The router informs other routers that a particular route is no longer reachable and should be removed from their routing tables.

74.

Explain Split Horizon.

Answer»

Split HORIZON is a solution to ROUTING loop, where the routing information cannot be SENT back in the same direction it CAME from.

Split horizon is a solution to routing loop, where the routing information cannot be sent back in the same direction it came from.

75.

What Is A Hop Count? What Is The Maximum Hop Count For Rip?

Answer»

Hop count is the DISTANCE between the source network and the destination network. The MAXIMUM hop count for RIP is 15.

Hop count is the distance between the source network and the destination network. The maximum hop count for RIP is 15.

76.

How Does Router Share Information In Distance Vector Routing?

Answer»

In the Distance VECTOR routing, also known as Bellman-Ford algorithms, the router REQUESTS its neighbouring router to send all or some PORTION of its routing table, which then combines the received entries with its own TABLES to COMPLETE the router's routing table.

In the Distance Vector routing, also known as Bellman-Ford algorithms, the router requests its neighbouring router to send all or some portion of its routing table, which then combines the received entries with its own tables to complete the router's routing table.

77.

When Do You Get The Destination Unreachable Error?

Answer»

The destination unreachable ERROR occurs when a ROUTER cannot FORWARD the packets because the destination is unreachable or a SERVICE is unavailable.

The destination unreachable error occurs when a router cannot forward the packets because the destination is unreachable or a service is unavailable.

78.

When Do You Get The Request Timed Out Error?

Answer»

You get the request timed out error when the packet is LOST on the way back to the originating HOST

You get the request timed out error when the packet is lost on the way back to the originating host

79.

What Is The Difference Between Static And Dynamic Routing?

Answer»

In the static ROUTING, the ROUTES are manually ADDED to the routing table; whereas, in the dynamic routing, the routes are DYNAMICALLY added to the routing table with the changes in network topology.

In the static routing, the routes are manually added to the routing table; whereas, in the dynamic routing, the routes are dynamically added to the routing table with the changes in network topology.

80.

What Is The Role Of Arp?

Answer»

ARP DETERMINES which MAC address gets packets for a given IP address.

ARP determines which MAC address gets packets for a given IP address.

81.

What Is The Difference Between Bit And Byte?

Answer»

A BIT is a SINGLE numeric VALUE that encodes a single unit of digital information. It can be either 1 or 0. A sequence of EIGHT bits forms one BYTE.

A bit is a single numeric value that encodes a single unit of digital information. It can be either 1 or 0. A sequence of eight bits forms one byte.

82.

What Is The Difference Between Interior And Exterior Gateways?

Answer»

Interior gateways connect organization's LAN; whereas, EXTERIOR gateways connect the organization to the OUTSIDE WORLD.

Interior gateways connect organization's LAN; whereas, exterior gateways connect the organization to the outside world.

83.

List The Examples Of Private Ip Addresses.

Answer»

The EXAMPLES of PRIVATE IP ADDRESSES are as FOLLOWS:

  •  10.0.0.0 ... 10.255.255.255
  •  172.16.0.0 ... 172.31.255.255
  •  192.168.0.0 ... 192.168.255.255

The examples of private IP addresses are as follows:

84.

What Is Network Address Translations (nat)?

Answer»

NAT enables multiple hosts on a PRIVATE network to ACCESS the Internet USING a single public IP address.

NAT enables multiple hosts on a private network to access the Internet using a single public IP address.

85.

Which Command Is Used To Find The Subnet Mask?

Answer»

The COMMAND to CHECK the SUBNET MASK is IPCONFIG.

The command to check the subnet mask is ipconfig.

86.

Name The Parts Of Ip Address.

Answer»

There are THREE parts of IPv4 ADDRESS: network, SUBNET, and host.

There are three parts of IPv4 address: network, subnet, and host.

87.

What Is The Purpose Of Trace Command?

Answer»

The trace COMMAND is USED to CHECK the CURRENT route to the destination address.

The trace command is used to check the current route to the destination address.

88.

How Many Tcp Segments Are Exchanged To Establish And Terminate Tcp Connection?

Answer»

A three-way CONNECTION is REQUIRED to ESTABLISH the connection and a four-way connection is required to TERMINATE the TCP connection.

A three-way connection is required to establish the connection and a four-way connection is required to terminate the TCP connection.

89.

What Is The Full Form Of Ftp And Tftp? At Which Layer Do They Work On?

Answer»

FTP stands for File Transfer PROTOCOL and WORKS at the application layer; WHEREAS, TFTP stands for Trivial File Transfer Protocol and works at the application layer.

FTP stands for File Transfer Protocol and works at the application layer; whereas, TFTP stands for Trivial File Transfer Protocol and works at the application layer.

90.

Which Layer Of The Osi Model Does Ip, Tcp, And Udp Work On?

Answer»

IP works on the network LAYER; WHEREAS, TCP and UDP WORK on the transport layer.

IP works on the network layer; whereas, TCP and UDP work on the transport layer.

91.

Is Icmp A Layer 2 Or Layer 3 Protocol?

Answer»

ICMP is a LAYER 3 PROTOCOL because it CONTROLS and MANAGES Internet Protocol.

ICMP is a Layer 3 protocol because it controls and manages Internet Protocol.

92.

Give The Full Forms Of Tcp, Udp, Ip, And Icmp.

Answer»
  • TCP STANDS for Transmission Control PROTOCOL
  • UDP stands for User Datagram Protocol
  • IP stands for Internet Protocol
  • ICMP stands for Internet Control Message Protocol.

93.

Can You Configure Existing Hubs In A Company As Part Of The Vlan Architecture?

Answer»

Yes, existing hubs in a company can be configured as a part of the VLAN architecture. If you WANT to REASSIGN individual station to VLAN, the station must be relocated to the corresponding hub because a hub SEGMENT connected to a switch PORT can be assigned to only one VLAN. Hubs can be broken down into smaller groups to provide GREATER micro segmentation and VLAN flexibility for assigning individual users to VLAN groups.

Yes, existing hubs in a company can be configured as a part of the VLAN architecture. If you want to reassign individual station to VLAN, the station must be relocated to the corresponding hub because a hub segment connected to a switch port can be assigned to only one VLAN. Hubs can be broken down into smaller groups to provide greater micro segmentation and VLAN flexibility for assigning individual users to VLAN groups.

94.

What Is Dynamic Trunking Protocol (dtp)?

Answer»

DTP is a PROTOCOL USED for the purpose of negotiating trunking on a LINK between two VLAN-aware switches. It ALSO negotiates the TYPE of trunking encapsulation to be used.

DTP is a protocol used for the purpose of negotiating trunking on a link between two VLAN-aware switches. It also negotiates the type of trunking encapsulation to be used.

95.

What Is Vlan Trunking Protocol (vtp)?

Answer»

VTP is a Cisco proprietary Layer 2 messaging protocol, and MANAGES addition, DELETION, and RENAMING of VLANs. It reduces administration in a SWITCHED network.

VTP is a Cisco proprietary Layer 2 messaging protocol, and manages addition, deletion, and renaming of VLANs. It reduces administration in a switched network.

96.

What Are The Different Types Of Vlan Implementation Methods?

Answer»

The DIFFERENT types of VLAN IMPLEMENTATION methods are as FOLLOWS:
a. Port-centric
b. Static
c. DYNAMIC

The different types of VLAN implementation methods are as follows:
a. Port-centric
b. Static
c. Dynamic

97.

What Is Frame Tagging?

Answer»

In frame TAGGING, each frame is assigned a unique VLAN ID. In other words, the primary function of frame tagging is to tag a frame with a user-defined VLAN ID. The ID is RECOGNIZED and examined by each SWITCH prior to any broadcast to other switches, routers, or end devices. When the frame exits the network, the switch REMOVES the ID before the frame is transmitted to the target end device.

In frame tagging, each frame is assigned a unique VLAN ID. In other words, the primary function of frame tagging is to tag a frame with a user-defined VLAN ID. The ID is recognized and examined by each switch prior to any broadcast to other switches, routers, or end devices. When the frame exits the network, the switch removes the ID before the frame is transmitted to the target end device.

98.

What Is Frame Filtering?

Answer»

Frame FILTERING is used on a Layer 2 switch to provide more bandwidth. A filtering table is DEVELOPED for each switch to share the address table information. A switch reads the DESTINATION hardware address of a frame and then looks for this address in the filter table. It then sends the frame to the port where the destination hardware address is located, and the other PORTS do not SEE the frame.

Frame filtering is used on a Layer 2 switch to provide more bandwidth. A filtering table is developed for each switch to share the address table information. A switch reads the destination hardware address of a frame and then looks for this address in the filter table. It then sends the frame to the port where the destination hardware address is located, and the other ports do not see the frame.

99.

What Is Virtual Local Area Network (vlan)?

Answer»

VLAN is a logical grouping of devices or users grouped by function, department, or APPLICATION, REGARDLESS of their PHYSICAL segment location. It can be used to reduce COLLISIONS by creating separate broadcast DOMAINS in a switched network.

VLAN is a logical grouping of devices or users grouped by function, department, or application, regardless of their physical segment location. It can be used to reduce collisions by creating separate broadcast domains in a switched network.

100.

What Is Broadcast Storm?

Answer»

Broadcast storm is a state in which a message that has been broadcast across a network results in greater number of RESPONSES, and each response results in still more responses. This situation ARISES because one or more network devices send JABBER packets constantly; thereby, increasing the traffic. A severe broadcast storm BLOCKS all other network traffic that can lead to network down situation. Broadcast storms can be PREVENTED by configuring a network to block illegal broadcast messages.

Broadcast storm is a state in which a message that has been broadcast across a network results in greater number of responses, and each response results in still more responses. This situation arises because one or more network devices send jabber packets constantly; thereby, increasing the traffic. A severe broadcast storm blocks all other network traffic that can lead to network down situation. Broadcast storms can be prevented by configuring a network to block illegal broadcast messages.