Explore topic-wise InterviewSolutions in .

This section includes InterviewSolutions, each offering curated multiple-choice questions to sharpen your knowledge and support exam preparation. Choose a topic below to get started.

1.

In EIGRP best path is known as the successor, where as backup path is known as __________(a) Feasible successor(b) Back-up route(c) Default route(d) There is no backup route in EIGRPThis question was addressed to me during an interview for a job.My enquiry is from EIGRP topic in section Point to Point Protocol & Error Detection of Computer Network

Answer» CORRECT answer is (a) Feasible successor

To elaborate: Feasible successor is the BACKUP path. The backup path is used alternatively used whenever the best path FAILS. It is not used PRIMARILY because it is comparatively EXPENSIVE than the best path.
2.

EIGRP uses the ____________ algorithm for finding shortest path.(a) SPF(b) DUAL(c) Linkstat(d) Djikstra’sThe question was asked in an interview.This interesting question is from EIGRP topic in portion Point to Point Protocol & Error Detection of Computer Network

Answer»

Right choice is (b) DUAL

The explanation is: EIGRP USES the DUAL algorithm for finding SHORTEST path. DUAL stands for diffusing UPDATE algorithm and it is used to PREVENT routing LOOPS by recalculating routes globally.

3.

Administrative distance for external EIGRP route is _______(a) 90(b) 170(c) 110(d) 100This question was posed to me in an interview.Origin of the question is EIGRP topic in chapter Point to Point Protocol & Error Detection of Computer Network

Answer»

Correct choice is (b) 170

The BEST explanation: Routers use the METRIC of administrative distance to SELECT the best path when there are different ROUTES to the same destination from two different routing protocols as it is a measure of RELIABILITY of routing protocols. Administrative distance for external EIGRP is 170.

4.

For default gateway, which of following commands will you use on a Cisco router?(a) IP default network(b) IP default gateway(c) IP default route(d) Default networkThe question was asked in an internship interview.My question is from EIGRP in division Point to Point Protocol & Error Detection of Computer Network

Answer»

Right answer is (a) IP default network

To explain: IP default network COMMAND is used to find the default gateway in CISCO ROUTER. If the router finds routes to the node, it considers the routes to that node for INSTALLATION as the gateway to it.

5.

The EIGRP metric values include:(a) Delay(b) Bandwidth(c) MTU(d) All of the mentionedThis question was addressed to me during an online exam.Query is from EIGRP topic in section Point to Point Protocol & Error Detection of Computer Network

Answer» CORRECT option is (d) All of the mentioned

To explain: The EIGRP metric values are Delay, Bandwidth, and MTU. MTU stands for Maximum Transmission Unit. They are combined together to give the overall EIGRP COST in K-values.
6.

Administrative distance for internal EIGRP is ______(a) 90(b) 170(c) 110(d) 91I have been asked this question in unit test.This intriguing question comes from EIGRP in section Point to Point Protocol & Error Detection of Computer Network

Answer»

Correct option is (a) 90

For explanation: Routers use the metric of administrative distance to select the BEST path when there are DIFFERENT ROUTES to the same destination from two different routing PROTOCOLS as it is a measure of reliability of routing protocols. Administrative distance for internal EIGRP is 90.

7.

EIGRP sends a hello message after every ___________ seconds.(a) 5 seconds (LAN), 60 seconds (WAN)(b) 5 seconds (LAN), 5 seconds (WAN)(c) 15s(d) 180sThe question was asked in a job interview.This intriguing question originated from EIGRP topic in division Point to Point Protocol & Error Detection of Computer Network

Answer»

The correct answer is (a) 5 seconds (LAN), 60 seconds (WAN)

Easy explanation: EIGRP routers broadcast the HELLO PACKETS frequently to familiarize with the NEIGHBORS. EIGRP routers send the hello MESSAGE after every 5 seconds on LAN, and every 60 seconds on WAN.

8.

EIGRP can support ____________(a) VLSM/subnetting(b) Auto summary(c) Unequal cast load balancing(d) All of the mentionedThe question was posed to me during a job interview.This is a very interesting question from EIGRP in division Point to Point Protocol & Error Detection of Computer Network

Answer» CORRECT option is (d) All of the mentioned

Explanation: EIGRP supports variable and fixed length SUBNETTING, Auto SUMMARY, and Unequal cast load balancing to provide efficient routing FUNCTIONALITY on Cisco routers.
9.

EIGRP metric is ________(a) K-values(b) Bandwidth only(c) Hop Count(d) Delay onlyThis question was addressed to me during an interview.This interesting question is from EIGRP in division Point to Point Protocol & Error Detection of Computer Network

Answer»

Right OPTION is (a) K-values

The EXPLANATION: EIGRP metric is K-values which are INTEGERS from 0 to 128. They are USED to calculate the overall EIGRP cost with bandwidth and delay metrics.

10.

EIGRP is a routing protocol design by Cisco.(a) True(b) FalseI had been asked this question in quiz.My question is based upon EIGRP in division Point to Point Protocol & Error Detection of Computer Network

Answer»

The correct CHOICE is (a) True

To EXPLAIN: EIGRP stands for Enhanced INTERIOR GATEWAY Routing Protocol is a routing protocol designed by Cisco. It is available only on Cisco routers.

11.

The link necessarily begins and ends with this phase. During the ______ phase, the LCP automata will be in INITIAL or STARTING states.(a) Link-termination phase(b) Link establishment phase(c) Authentication phase(d) Link dead phaseI have been asked this question in my homework.The origin of the question is PPP in section Point to Point Protocol & Error Detection of Computer Network

Answer»

Right answer is (d) LINK DEAD phase

The EXPLANATION: The link necessarily begins and ENDS with the link dead phase. During this phase, the LCP automata will be in the initial or its final state. The link is non-functioning or inactive during the link dead phase.

12.

Choose the correct statement from the following.(a) PPP can terminate the link at any time(b) PPP can terminate the link only during the link establishment phase(c) PPP can terminate the link during the authentication phase(d) PPP can terminate the link during the callback control phaseThis question was addressed to me in semester exam.The doubt is from PPP topic in section Point to Point Protocol & Error Detection of Computer Network

Answer»

Right OPTION is (a) PPP can terminate the link at any TIME

For explanation I would say: PPP ALLOWS TERMINATION of the link at any time in any phase because it works on the data link layer which is the layer in control of the link of the communication.

13.

A family of network control protocols (NCPs) ____________(a) Are a series of independently defined protocols that provide a dynamic(b) Are a series of independently-defined protocols that encapsulate(c) Are a series of independently defined protocols that provide transparent(d) The same as NFSThis question was addressed to me in an online interview.Question is taken from PPP topic in division Point to Point Protocol & Error Detection of Computer Network

Answer»

Right ANSWER is (b) Are a series of independently-defined PROTOCOLS that encapsulate

The explanation is: The family of NETWORK CONTROL protocols (NCPS) is a series of independently-defined protocols that encapsulate the data flowing between the two nodes. It provides means for the network nodes to control the link traffic.

14.

A Link Control Protocol (LCP) is used for ____________(a) Establishing, configuring and testing the data-link connection(b) Establishing and configuring different network-layer protocols(c) Testing the different network-layer protocols(d) Provides for multiplexing of different network-layer protocolsThe question was asked in examination.This question is from PPP in division Point to Point Protocol & Error Detection of Computer Network

Answer»

The correct choice is (a) Establishing, configuring and testing the data-link connection

Explanation: The Link Control PROTOCOL (LCP) is the part of PPP that is used for establishing, configuring and testing the data-link connection. The other TWO COMPONENTS are Network Control Protocol and Encapsulation.

15.

The PPP encapsulation ____________(a) Provides for multiplexing of different network-layer protocols(b) Requires framing to indicate the beginning and end of the encapsulation(c) Establishing, configuring and testing the data-link connection(d) Provides interface for handling the capabilities of the connection/link on the networkI got this question during an interview.Enquiry is from PPP topic in chapter Point to Point Protocol & Error Detection of Computer Network

Answer»

Correct answer is (a) Provides for multiplexing of DIFFERENT network-layer protocols

Explanation: ENCAPSULATION is a PART of PPP which provides MEANS for multiplexing of different network-layer protocols. The other two parts of PPP are Link Control Protocol and Network Control Protocol.

16.

PPP consists of ________components(a) Three (encapsulating, the Domain Name system)(b) Three (encapsulating, a link control protocol, NCP)(c) Two (a link control protocol, Simple Network Control protocol)(d) One (Simple Network Control protocol)This question was posed to me in a job interview.The query is from PPP in division Point to Point Protocol & Error Detection of Computer Network

Answer»

Correct choice is (b) Three (encapsulating, a LINK control PROTOCOL, NCP)

Easiest explanation: PPP consists of three components namely Link Control Protocol (LCP), Network Control Protocol (NCP), and ENCAPSULATION. LCP and NCP are the PPP PROTOCOLS which provide interface for HANDLING the capabilities of the connection/link on the network and encapsulation provides for multiplexing of different network-layer protocols.

17.

PPP provides the _______ layer in the TCP/IP suite.(a) Link(b) Network(c) Transport(d) ApplicationI have been asked this question in a national level competition.My query is from PPP topic in portion Point to Point Protocol & Error Detection of Computer Network

Answer»

The correct answer is (a) LINK

The explanation is: PPP provides function of the link LAYER in the TCP/IP suite. It focuses on the link between two NODES that is GOING to be used by the USERS to communicate. It can use pre-installed phone line for the purpose.

18.

The PPP protocol _________(a) Is designed for simple links which transport packets between two peers(b) Is one of the protocols for making an Internet connection over a phone line(c) Is designed for simple links which transport packets between two peers and making an Internet connection over a phone line(d) Is used for sharing bandwidthThis question was posed to me in an interview for internship.Enquiry is from PPP topic in division Point to Point Protocol & Error Detection of Computer Network

Answer»

Correct choice is (C) Is designed for simple LINKS which TRANSPORT packets between two peers and making an INTERNET connection over a phone line

To explain: The PPP protocol is designed for handling simple links which transport packets between two peers. It is a standard protocol that is used to make an Internet connection over phone lines.

19.

Which protocol does the PPP protocol provide for handling the capabilities of the connection/link on the network?(a) LCP(b) NCP(c) Both LCP and NCP(d) TCPThis question was posed to me in a national level competition.This question is from PPP in section Point to Point Protocol & Error Detection of Computer Network

Answer»

Right OPTION is (c) Both LCP and NCP

To explain: LCP stands for Link Control Protocol and NCP stands for Network Control Protocol. LCP and NCP are the PPP PROTOCOLS which provide interface for HANDLING the capabilities of the connection/link on the network.

20.

Both HDLC and PPP are Data link layer protocols.(a) True(b) FalseI have been asked this question by my school principal while I was bunking the class.My question is based upon PPP in portion Point to Point Protocol & Error Detection of Computer Network

Answer»

Right OPTION is (a) True

Easiest explanation: Both HDLC and PPP both are Data link LAYER PROTOCOL. HDLC STANDS for High level Data Link CONTROL and PPP stands for Point to Point Protocol.

21.

Which of the following is true of signature-based IDSes?(a) They alert administrators to deviations from “normal” traffic behavior(b) They identify previously unknown attacks(c) The technology is mature and reliable enough to use on production networks(d) They scan network traffic or packets to identify matches with attack-definition filesThis question was addressed to me in quiz.This interesting question is from Intrusion Detection Systems in portion Point to Point Protocol & Error Detection of Computer Network

Answer»

Right option is (d) They scan network traffic or packets to identify matches with attack-definition files

The EXPLANATION is: They are constantly updated with attack-definition files (signatures) that describe each type of known MALICIOUS ACTIVITY. They then scan network traffic for packets that MATCH the signatures, and then raise alerts to security administrators.

22.

Which of the following is used to provide a baseline measure for comparison of IDSes?(a) Crossover error rate(b) False negative rate(c) False positive rate(d) Bit error rateI got this question at a job interview.Enquiry is from Intrusion Detection Systems in chapter Point to Point Protocol & Error Detection of Computer Network

Answer»

Right option is (a) Crossover error rate

Easy EXPLANATION: As the sensitivity of systems may cause the false positive/negative rates to VARY, it’s critical to have some common measure that may be APPLIED across the BOARD.

23.

“Semantics-aware” signatures automatically generated by Nemean are based on traffic at which two layers?(a) Application layer and Transport layer(b) Network layer and Application layer(c) Session layer and Transport layer(d) Application layer and Session layerThe question was asked during an interview.I want to ask this question from Intrusion Detection Systems topic in portion Point to Point Protocol & Error Detection of Computer Network

Answer»

Correct answer is (d) APPLICATION layer and SESSION layer

The best explanation: NEMEAN AUTOMATICALLY generates “semantics-aware” signatures based on traffic at the session and application layers. These signatures are used to ensure that no malicious operation is contained in the traffic.

24.

When discussing IDS/IPS, what is a signature?(a) An electronic signature used to authenticate the identity of a user on the network(b) Attack-definition file(c) It refers to “normal,” baseline network behavior(d) It is used to authorize the users on a networkThis question was posed to me during an online interview.My enquiry is from Intrusion Detection Systems in portion Point to Point Protocol & Error Detection of Computer Network

Answer»

The CORRECT answer is (b) Attack-definition file

For explanation I would say: IDSES work in a manner similar to modern antivirus technology. They are constantly updated with attack-definition files (signatures) that describe each type of known malicious activity. Nemean is a popular signature GENERATION method for conventional computer NETWORKS.

25.

IDS follows a two-step process consisting of a passive component and an active component. Which of the following is part of the active component?(a) Inspection of password files to detect inadvisable passwords(b) Mechanisms put in place to reenact known methods of attack and record system responses(c) Inspection of system to detect policy violations(d) Inspection of configuration files to detect inadvisable settingsThis question was addressed to me during an interview.I need to ask this question from Intrusion Detection Systems topic in portion Point to Point Protocol & Error Detection of Computer Network

Answer»

The correct CHOICE is (b) Mechanisms PUT in place to reenact known methods of attack and RECORD system responses

For explanation I would say: Secondary components of MECHANISM are set in place to reenact known methods of attack and to record system responses. In passive components, the system I designed just to record the system’s responses in case of an intrusion.

26.

At which two traffic layers do most commercial IDSes generate signatures?(a) Application layer and Network layer(b) Network layer and Session Layer(c) Transport layer and Application layer(d) Transport layer and Network layerI had been asked this question in exam.Question is taken from Intrusion Detection Systems topic in division Point to Point Protocol & Error Detection of Computer Network

Answer»

Right choice is (d) TRANSPORT layer and Network layer

The best explanation: Most COMMERCIAL IDSes generate signatures at the network and transport LAYERS. These signatures are used to ensure that no malicious operation is contained in the traffic. Nemean generates signature at APPLICATION and session layer.

27.

What is the purpose of a shadow honeypot?(a) To flag attacks against known vulnerabilities(b) To help reduce false positives in a signature-based IDS(c) To randomly check suspicious traffic identified by an anomaly detection system(d) To enhance the accuracy of a traditional honeypotI have been asked this question in an interview for job.My enquiry is from Intrusion Detection Systems in chapter Point to Point Protocol & Error Detection of Computer Network

Answer»

Correct answer is (c) To randomly check suspicious traffic identified by an anomaly detection system

The best I can explain: “Shadow HONEYPOTS,” as researchers CALL them, share all the same CHARACTERISTICS of protected applications RUNNING on both the server and client side of a network and operate in conjunction with an ADS.

28.

One of the most obvious places to put an IDS sensor is near the firewall. Where exactly in relation to the firewall is the most productive placement?(a) Inside the firewall(b) Outside the firewall(c) Both inside and outside the firewall(d) Neither inside the firewall nor outside the firewall.I had been asked this question in an online interview.Origin of the question is Intrusion Detection Systems in chapter Point to Point Protocol & Error Detection of Computer Network

Answer»

Correct OPTION is (a) Inside the firewall

For explanation I would say: There are legitimate political, budgetary and research REASONS to want to see all the “ATTACKS” against your connection, but GIVEN the care and feeding any IDS requires, do yourself a favor and keep your NIDS sensors on the inside of the firewall.

29.

A false positive can be defined as ________(a) An alert that indicates nefarious activity on a system that, upon further inspection, turns out to represent legitimate network traffic or behavior(b) An alert that indicates nefarious activity on a system that is not running on the network(c) The lack of an alert for nefarious activity(d) Both An alert that indicates nefarious activity on a system that, upon further inspection, turns out to represent legitimate network traffic or behavior and An alert that indicates nefarious activity on a system that is not running on the networkI had been asked this question during an interview.I want to ask this question from Intrusion Detection Systems in portion Point to Point Protocol & Error Detection of Computer Network

Answer»

The CORRECT option is (d) Both An alert that indicates NEFARIOUS activity on a system that, UPON further inspection, turns out to represent LEGITIMATE network traffic or behavior and An alert that indicates nefarious activity on a system that is not running on the network

Best explanation: A FALSE positive is any alert that indicates nefarious activity on a system that, upon further inspection, turns out to represent legitimate network traffic or behavior.

30.

Which of the following is an advantage of anomaly detection?(a) Rules are easy to define(b) Custom protocols can be easily analyzed(c) The engine can scale as the rule set grows(d) Malicious activity that falls within normal usage patterns is detectedI had been asked this question during an interview for a job.My question is from Intrusion Detection Systems topic in portion Point to Point Protocol & Error Detection of Computer Network

Answer» RIGHT choice is (c) The engine can SCALE as the RULE set grows

The explanation is: Once a protocol has been built and a behavior defined, the engine can scale more QUICKLY and easily than the signature-based model because a NEW signature does not have to be created for every attack and potential variant.