InterviewSolution
This section includes InterviewSolutions, each offering curated multiple-choice questions to sharpen your knowledge and support exam preparation. Choose a topic below to get started.
| 101. |
What Do You Understand By Csma/cd? |
|
Answer» CSMA/CD stands for CARRIER Sense Multiple ACCESS with Collision DETECTION. It is used to IMPROVE CSMA performance by terminating transmission as soon as a collision is detected. CSMA/CD stands for Carrier Sense Multiple Access with Collision Detection. It is used to improve CSMA performance by terminating transmission as soon as a collision is detected. |
|
| 102. |
What Is The Role Of Cyclic Redundancy Check (crc)? |
|
Answer» CRC is an ERROR checking algorithm that DETECTS errors during DATA TRANSMISSION. CRC is an error checking algorithm that detects errors during data transmission. |
|
| 103. |
What Is Collision Domain? |
|
Answer» A collision DOMAIN is that PART of the network where each STATION can view other station's TRAFFIC, which can be both unicast and BROADCAST. A collision domain is that part of the network where each station can view other station's traffic, which can be both unicast and broadcast. |
|
| 104. |
How Is Interface Represented? |
|
Answer» The Interface is represented by slot_#/port_#; The Interface is represented by slot_#/port_#; |
|
| 105. |
What Is Store And Forward Mode? |
|
Answer» In the store and forward mode, the SWITCH WAITS till the entire data frame is received, before forwarding the frame to the destined INTERFACE. In the store and forward mode, the switch waits till the entire data frame is received, before forwarding the frame to the destined interface. |
|
| 106. |
What Is Cut-through (real Time) Mode? |
|
Answer» In the cut-through MODE, the switch waits till the destination HARDWARE address is received and verified with the MAC FILTER table, before forwarding the frame to the destined interface. In the cut-through mode, the switch waits till the destination hardware address is received and verified with the MAC filter table, before forwarding the frame to the destined interface. |
|
| 107. |
Name The Lan Switch Types. |
|
Answer» The LAN SWITCH TYPES are cut-through, fragment FREE, and STORE and forward. The LAN switch types are cut-through, fragment free, and store and forward. |
|
| 108. |
List The Different States Of Spanning Tree Port. |
|
Answer» The states of spanning TREE PORT are blocking, LISTENING, learning, forwarding, and DISABLED. The states of spanning tree port are blocking, listening, learning, forwarding, and disabled. |
|
| 109. |
What Is A Root Bridge? |
|
Answer» The root bridge is the bridge with the smallest (or lowest) bridge ID in a SPANNING TREE. Each bridge has a UNIQUE ID and a configurable priority number. The bridge ID contains both the numbers. The root bridge is the bridge with the smallest (or lowest) bridge ID in a spanning tree. Each bridge has a unique ID and a configurable priority number. The bridge ID contains both the numbers. |
|
| 110. |
How Does Spanning Tree Works? |
|
Answer» Spanning tree uses spanning tree algorithm to FIND redundant links in the LAN by SELECTING the best paths. It puts all the links in either forwarding or blocking STATE. The links without a redundant LINK and the best links with a redundant link would be in the forwarding state. The redundant links that were not as good as the SELECTED links would be in the blocking state. Spanning tree uses spanning tree algorithm to find redundant links in the LAN by selecting the best paths. It puts all the links in either forwarding or blocking state. The links without a redundant link and the best links with a redundant link would be in the forwarding state. The redundant links that were not as good as the selected links would be in the blocking state. |
|
| 111. |
What Is Spanning Tree Protocol (stp)? |
|
Answer» STP is a LINK MANAGEMENT protocol that works on Layer 2 and provides path REDUNDANCY while preventing UNDESIRABLE LOOPS in the network. STP is a link management protocol that works on Layer 2 and provides path redundancy while preventing undesirable loops in the network. |
|
| 112. |
What Are The Functions Of Layer 2 Switching? |
|
Answer» The THREE functions of LAYER 2 SWITCHING are as FOLLOWS: The three functions of Layer 2 switching are as follows: |
|
| 113. |
What Is The Difference Between Layer 2 And Layer 3 Switching? |
|
Answer»
|
|
| 114. |
What Is Switching? |
|
Answer» SWITCHING is the process of TAKING an INCOMING FRAME from one interface and sending the frame out through ANOTHER interface. Switching is the process of taking an incoming frame from one interface and sending the frame out through another interface. |
|
| 115. |
Why Layer 2 Switches Cannot Replace The Routers? |
|
Answer» LAYER 2 switches cannot BREAK the broadcast domain and this causes the performance issues and limits the size of the network. In addition, switches broadcast and multicast, BESIDE the SLOW convergence of spanning tree, which can cause major PROBLEMS as the network grows. Layer 2 switches cannot break the broadcast domain and this causes the performance issues and limits the size of the network. In addition, switches broadcast and multicast, beside the slow convergence of spanning tree, which can cause major problems as the network grows. |
|
| 116. |
Which Table Is Used By Switches To Determine The Segment On Which A Datagram Needs To Be Transmitted? |
|
Answer» Switches uses MAC ADDRESS table to determine the SEGMENT on which a datagram needs to be TRANSMITTED. Switches uses MAC address table to determine the segment on which a datagram needs to be transmitted. |
|
| 117. |
Give Some Examples Of Packet Switching Technology. |
|
Answer» FOLLOWING are the EXAMPLES of PACKET SWITCHING technology:
Following are the examples of packet switching technology: |
|
| 118. |
Which Technology Is Used By Switches To Build And Maintain Their Filter Table? |
|
Answer» The Application SPECIFIC Integrated CIRCUITS (ASICS) technology is used by SWITCHES to build and maintain their filter table. The Application Specific Integrated Circuits (ASICs) technology is used by switches to build and maintain their filter table. |
|
| 119. |
What Is A Switch? |
|
Answer» Switch is a device that ENABLES multiple physical LAN segments to be interconnected into a single larger network. Switches work at the DATA link LAYER of the OSI MODEL. Switch is a device that enables multiple physical LAN segments to be interconnected into a single larger network. Switches work at the data link layer of the OSI model. |
|
| 120. |
Why Is Switching Implementation Preferred Over Bridging? |
|
Answer» Switching implementations are preferred over bridging because of SUPERIOR THROUGHPUT PERFORMANCE, higher port density, LOWER per-port cost, and greater FLEXIBILITY. Switching implementations are preferred over bridging because of superior throughput performance, higher port density, lower per-port cost, and greater flexibility. |
|
| 121. |
What Is The Difference Between A Bridge And A Switch? |
|
Answer»
|
|
| 122. |
At Which Layer Does Point-to-point (ppp), Serial Line Internet Protocol (slip), Point-to-point Tunneling Protocol (pptp), Layer 2 Tunneling Protocol (l2tp) Protocols Work? |
|
Answer» PPP, SLIP, PPTP, L2TP WORK at the DATA LINK LAYER. PPP, SLIP, PPTP, L2TP work at the data link layer. |
|
| 123. |
Give Examples Of Application Layer Protocols. |
|
Answer» The examples of APPLICATION layer protocols are SIP, SSI, DNS, FTP, GOPHER, HTTP, DHCP, SMTP, SNMP, TELNET, RIP, and BGP. The examples of application layer protocols are SIP, SSI, DNS, FTP, Gopher, HTTP, DHCP, SMTP, SNMP, Telnet, RIP, and BGP. |
|
| 124. |
What Is Address Resolution Protocol (arp)? |
|
Answer» ARP is a PROTOCOL which maps an IP address to a physical MACHINE address that is RECOGNIZED in the local network. ARP is a protocol which maps an IP address to a physical machine address that is recognized in the local network. |
|
| 125. |
What Is The Difference Between Tcp And Udp? |
|
Answer» TCP is a connection-oriented PROTOCOL; WHEREAS, UDP is a connection-less protocol. TCP is a connection-oriented protocol; whereas, UDP is a connection-less protocol. |
|
| 126. |
Why Do We Use Routers? |
|
Answer» ROUTERS are USED to COMMUNICATE between SEVERAL NETWORKS. Routers are used to communicate between several networks. |
|
| 127. |
At Which Layer Packet Sequencing, Acknowledgments, And Requests For Retransmission Take Place? |
|
Answer» The packet sequencing, acknowledgments, and requests for RETRANSMISSION TAKE PLACE at the TRANSPORT layer. The packet sequencing, acknowledgments, and requests for retransmission take place at the transport layer. |
|
| 128. |
Which Layer Handles Bit Synchronization? |
|
Answer» BIT SYNCHRONIZATION is HANDLED at the PHYSICAL LAYER. Bit synchronization is handled at the physical layer. |
|
| 129. |
At Which Layer The Mac Address Is Translated Into Logical Address? |
|
Answer» The MAC address is translated into LOGICAL address at the NETWORK LAYER. The MAC address is translated into logical address at the network layer. |
|
| 130. |
At Which Layer The Packets Are Formed? |
|
Answer» The PACKETS are FORMED at the NETWORK LAYER from the FRAMES. The packets are formed at the network layer from the frames. |
|
| 131. |
Which Layer Handles The Formatting Of Application Data So That It Will Be Readable By The Destination System? |
|
Answer» The FORMATTING of application DATA takes PLACE at the presentation LAYER. The formatting of application data takes place at the presentation layer. |
|
| 132. |
What Is The Difference Between Media Access Control (mac) Sub Layer And Logical Link Control (llc) Sub Layer? |
|
Answer» The data link layer has two SUB LAYERS: MAC and LLC. The MAC sub layer defines how to transmit data on the physical layer; whereas, the LLC sub layer logically identifies different protocols and ENCAPSULATES them. The data link layer has two sub layers: MAC and LLC. The MAC sub layer defines how to transmit data on the physical layer; whereas, the LLC sub layer logically identifies different protocols and encapsulates them. |
|
| 133. |
At Which Layer Internet Protocol (ip) Is Implemented? |
|
Answer» At the NETWORK LAYER the IP is IMPLEMENTED. At the network layer the IP is implemented. |
|
| 134. |
Which Layer Establishes, Maintains, And Terminates Communications Between Applications Located On Different Devices? |
|
Answer» The session layer establishes, MAINTAINS, and TERMINATES COMMUNICATIONS between applications located on DIFFERENT devices. The session layer establishes, maintains, and terminates communications between applications located on different devices. |
|
| 135. |
At Which Layer Does Error Detection And Recovery Take Place? |
|
Answer» Error detection and recovery TAKE PLACE at the transport LAYER. Error detection and recovery take place at the transport layer. |
|
| 136. |
Which Address Is Used By The Network Layer To Route The Data? |
|
Answer» The network LAYER uses the LOGICAL ADDRESS to route the data. The network layer uses the logical address to route the data. |
|
| 137. |
At Which Layer Does Encryption Takes Place? |
|
Answer» ENCRYPTION TAKES PLACE at the PRESENTATION LAYER. Encryption takes place at the presentation layer. |
|
| 138. |
At Which Layer Does Flow Control Takes Place? |
|
Answer» FLOW control takes PLACE at the TRANSPORT LAYER. Flow control takes place at the transport layer. |
|
| 139. |
At Which Layer Does Transmission Control Protocol (tcp) And User Datagram Protocol (udp) Work? |
|
Answer» TCP and UDP WORK at the TRANSPORT LAYER. TCP and UDP work at the transport layer. |
|
| 140. |
At Which Layer Does Musical Instrument Digital Interface (midi) And Joint Photographic Experts Group (jpeg) Work? |
|
Answer» MIDI and JPEG WORK at the PRESENTATION LAYER. MIDI and JPEG work at the presentation layer. |
|
| 141. |
Name The Layers Of The Osi Model From The Top-to-down Manner. |
|
Answer» APPLICATION, presentation, session, transport, network, data link, and PHYSICAL. Application, presentation, session, transport, network, data link, and physical. |
|
| 142. |
At Which Layer Of The Osi Model Bits Are Packaged Into Frames? |
|
Answer» Bits are packaged into FRAMES at the DATA link LAYER of the OSI MODEL. Bits are packaged into frames at the data link layer of the OSI model. |
|
| 143. |
What Is Tcp/ip Model? |
|
Answer» The TCP/IP model describes a set of guidelines and IMPLEMENTATION of specific networking protocols to enable computers to communicate over a NETWORK. It has four layers: network, INTERNET, TRANSPORT, and APPLICATION. The TCP/IP model describes a set of guidelines and implementation of specific networking protocols to enable computers to communicate over a network. It has four layers: network, Internet, transport, and application. |
|
| 144. |
What Is The Role Of Transport Layer? |
|
Answer» The TRANSPORT LAYER ensures the reliable DELIVERY of the complete file or MESSAGE. The transport layer ensures the reliable delivery of the complete file or message. |
|
| 145. |
At What Layer Does Router Work? |
|
Answer» The ROUTER WORKS at the NETWORK LAYER of the OSI model. The router works at the network layer of the OSI model. |
|
| 146. |
At What Layer Does Bridges And Switches Work? |
|
Answer» The BRIDGES and switches work at the DATA link layer, that is, Layer 2 of the OSI REFERENCE MODEL. The bridges and switches work at the data link layer, that is, Layer 2 of the OSI Reference Model. |
|
| 147. |
At What Layer Does Hubs, Repeaters, Network Adapters Work? |
|
Answer» The HUBS, repeaters, and network ADAPTERS work at the PHYSICAL layer of the OSI Reference MODEL. The hubs, repeaters, and network adapters work at the physical layer of the OSI Reference Model. |
|
| 148. |
What Is The Main Function Of Distribution Layer? |
|
Answer» The main functions of the distribution LAYER are as FOLLOWS:
The main functions of the distribution layer are as follows: |
|
| 149. |
What Is The Main Function Of Core Layer? |
|
Answer» The MAIN FUNCTION of the core LAYER is to provide FAULT isolation and backbone connectivity. The main function of the core layer is to provide fault isolation and backbone connectivity. |
|
| 150. |
Name The Three Layers Of Cisco Three-layer Hierarchical Model. |
|
Answer» The three LAYERS of Cisco Three-LAYER Hierarchical Model are core layer, distribution layer, and LOCAL ACCESS layer. The three layers of Cisco Three-Layer Hierarchical Model are core layer, distribution layer, and local access layer. |
|