InterviewSolution
This section includes InterviewSolutions, each offering curated multiple-choice questions to sharpen your knowledge and support exam preparation. Choose a topic below to get started.
| 1. |
In EIGRP best path is known as the successor, where as backup path is known as __________(a) Feasible successor(b) Back-up route(c) Default route(d) There is no backup route in EIGRPThis question was addressed to me during an interview for a job.My enquiry is from EIGRP topic in section Point to Point Protocol & Error Detection of Computer Network |
|
Answer» CORRECT answer is (a) Feasible successor To elaborate: Feasible successor is the BACKUP path. The backup path is used alternatively used whenever the best path FAILS. It is not used PRIMARILY because it is comparatively EXPENSIVE than the best path. |
|
| 2. |
EIGRP uses the ____________ algorithm for finding shortest path.(a) SPF(b) DUAL(c) Linkstat(d) Djikstra’sThe question was asked in an interview.This interesting question is from EIGRP topic in portion Point to Point Protocol & Error Detection of Computer Network |
|
Answer» Right choice is (b) DUAL |
|
| 3. |
Administrative distance for external EIGRP route is _______(a) 90(b) 170(c) 110(d) 100This question was posed to me in an interview.Origin of the question is EIGRP topic in chapter Point to Point Protocol & Error Detection of Computer Network |
|
Answer» Correct choice is (b) 170 |
|
| 4. |
For default gateway, which of following commands will you use on a Cisco router?(a) IP default network(b) IP default gateway(c) IP default route(d) Default networkThe question was asked in an internship interview.My question is from EIGRP in division Point to Point Protocol & Error Detection of Computer Network |
|
Answer» Right answer is (a) IP default network |
|
| 5. |
The EIGRP metric values include:(a) Delay(b) Bandwidth(c) MTU(d) All of the mentionedThis question was addressed to me during an online exam.Query is from EIGRP topic in section Point to Point Protocol & Error Detection of Computer Network |
|
Answer» CORRECT option is (d) All of the mentioned To explain: The EIGRP metric values are Delay, Bandwidth, and MTU. MTU stands for Maximum Transmission Unit. They are combined together to give the overall EIGRP COST in K-values. |
|
| 6. |
Administrative distance for internal EIGRP is ______(a) 90(b) 170(c) 110(d) 91I have been asked this question in unit test.This intriguing question comes from EIGRP in section Point to Point Protocol & Error Detection of Computer Network |
|
Answer» Correct option is (a) 90 |
|
| 7. |
EIGRP sends a hello message after every ___________ seconds.(a) 5 seconds (LAN), 60 seconds (WAN)(b) 5 seconds (LAN), 5 seconds (WAN)(c) 15s(d) 180sThe question was asked in a job interview.This intriguing question originated from EIGRP topic in division Point to Point Protocol & Error Detection of Computer Network |
|
Answer» The correct answer is (a) 5 seconds (LAN), 60 seconds (WAN) |
|
| 8. |
EIGRP can support ____________(a) VLSM/subnetting(b) Auto summary(c) Unequal cast load balancing(d) All of the mentionedThe question was posed to me during a job interview.This is a very interesting question from EIGRP in division Point to Point Protocol & Error Detection of Computer Network |
|
Answer» CORRECT option is (d) All of the mentioned Explanation: EIGRP supports variable and fixed length SUBNETTING, Auto SUMMARY, and Unequal cast load balancing to provide efficient routing FUNCTIONALITY on Cisco routers. |
|
| 9. |
EIGRP metric is ________(a) K-values(b) Bandwidth only(c) Hop Count(d) Delay onlyThis question was addressed to me during an interview.This interesting question is from EIGRP in division Point to Point Protocol & Error Detection of Computer Network |
|
Answer» Right OPTION is (a) K-values |
|
| 10. |
EIGRP is a routing protocol design by Cisco.(a) True(b) FalseI had been asked this question in quiz.My question is based upon EIGRP in division Point to Point Protocol & Error Detection of Computer Network |
|
Answer» The correct CHOICE is (a) True |
|
| 11. |
The link necessarily begins and ends with this phase. During the ______ phase, the LCP automata will be in INITIAL or STARTING states.(a) Link-termination phase(b) Link establishment phase(c) Authentication phase(d) Link dead phaseI have been asked this question in my homework.The origin of the question is PPP in section Point to Point Protocol & Error Detection of Computer Network |
|
Answer» Right answer is (d) LINK DEAD phase |
|
| 12. |
Choose the correct statement from the following.(a) PPP can terminate the link at any time(b) PPP can terminate the link only during the link establishment phase(c) PPP can terminate the link during the authentication phase(d) PPP can terminate the link during the callback control phaseThis question was addressed to me in semester exam.The doubt is from PPP topic in section Point to Point Protocol & Error Detection of Computer Network |
|
Answer» Right OPTION is (a) PPP can terminate the link at any TIME |
|
| 13. |
A family of network control protocols (NCPs) ____________(a) Are a series of independently defined protocols that provide a dynamic(b) Are a series of independently-defined protocols that encapsulate(c) Are a series of independently defined protocols that provide transparent(d) The same as NFSThis question was addressed to me in an online interview.Question is taken from PPP topic in division Point to Point Protocol & Error Detection of Computer Network |
|
Answer» Right ANSWER is (b) Are a series of independently-defined PROTOCOLS that encapsulate |
|
| 14. |
A Link Control Protocol (LCP) is used for ____________(a) Establishing, configuring and testing the data-link connection(b) Establishing and configuring different network-layer protocols(c) Testing the different network-layer protocols(d) Provides for multiplexing of different network-layer protocolsThe question was asked in examination.This question is from PPP in division Point to Point Protocol & Error Detection of Computer Network |
|
Answer» The correct choice is (a) Establishing, configuring and testing the data-link connection |
|
| 15. |
The PPP encapsulation ____________(a) Provides for multiplexing of different network-layer protocols(b) Requires framing to indicate the beginning and end of the encapsulation(c) Establishing, configuring and testing the data-link connection(d) Provides interface for handling the capabilities of the connection/link on the networkI got this question during an interview.Enquiry is from PPP topic in chapter Point to Point Protocol & Error Detection of Computer Network |
|
Answer» Correct answer is (a) Provides for multiplexing of DIFFERENT network-layer protocols |
|
| 16. |
PPP consists of ________components(a) Three (encapsulating, the Domain Name system)(b) Three (encapsulating, a link control protocol, NCP)(c) Two (a link control protocol, Simple Network Control protocol)(d) One (Simple Network Control protocol)This question was posed to me in a job interview.The query is from PPP in division Point to Point Protocol & Error Detection of Computer Network |
|
Answer» Correct choice is (b) Three (encapsulating, a LINK control PROTOCOL, NCP) |
|
| 17. |
PPP provides the _______ layer in the TCP/IP suite.(a) Link(b) Network(c) Transport(d) ApplicationI have been asked this question in a national level competition.My query is from PPP topic in portion Point to Point Protocol & Error Detection of Computer Network |
|
Answer» The correct answer is (a) LINK |
|
| 18. |
The PPP protocol _________(a) Is designed for simple links which transport packets between two peers(b) Is one of the protocols for making an Internet connection over a phone line(c) Is designed for simple links which transport packets between two peers and making an Internet connection over a phone line(d) Is used for sharing bandwidthThis question was posed to me in an interview for internship.Enquiry is from PPP topic in division Point to Point Protocol & Error Detection of Computer Network |
|
Answer» Correct choice is (C) Is designed for simple LINKS which TRANSPORT packets between two peers and making an INTERNET connection over a phone line |
|
| 19. |
Which protocol does the PPP protocol provide for handling the capabilities of the connection/link on the network?(a) LCP(b) NCP(c) Both LCP and NCP(d) TCPThis question was posed to me in a national level competition.This question is from PPP in section Point to Point Protocol & Error Detection of Computer Network |
|
Answer» Right OPTION is (c) Both LCP and NCP |
|
| 20. |
Both HDLC and PPP are Data link layer protocols.(a) True(b) FalseI have been asked this question by my school principal while I was bunking the class.My question is based upon PPP in portion Point to Point Protocol & Error Detection of Computer Network |
|
Answer» Right OPTION is (a) True |
|
| 21. |
Which of the following is true of signature-based IDSes?(a) They alert administrators to deviations from “normal” traffic behavior(b) They identify previously unknown attacks(c) The technology is mature and reliable enough to use on production networks(d) They scan network traffic or packets to identify matches with attack-definition filesThis question was addressed to me in quiz.This interesting question is from Intrusion Detection Systems in portion Point to Point Protocol & Error Detection of Computer Network |
|
Answer» Right option is (d) They scan network traffic or packets to identify matches with attack-definition files |
|
| 22. |
Which of the following is used to provide a baseline measure for comparison of IDSes?(a) Crossover error rate(b) False negative rate(c) False positive rate(d) Bit error rateI got this question at a job interview.Enquiry is from Intrusion Detection Systems in chapter Point to Point Protocol & Error Detection of Computer Network |
|
Answer» Right option is (a) Crossover error rate |
|
| 23. |
“Semantics-aware” signatures automatically generated by Nemean are based on traffic at which two layers?(a) Application layer and Transport layer(b) Network layer and Application layer(c) Session layer and Transport layer(d) Application layer and Session layerThe question was asked during an interview.I want to ask this question from Intrusion Detection Systems topic in portion Point to Point Protocol & Error Detection of Computer Network |
|
Answer» Correct answer is (d) APPLICATION layer and SESSION layer |
|
| 24. |
When discussing IDS/IPS, what is a signature?(a) An electronic signature used to authenticate the identity of a user on the network(b) Attack-definition file(c) It refers to “normal,” baseline network behavior(d) It is used to authorize the users on a networkThis question was posed to me during an online interview.My enquiry is from Intrusion Detection Systems in portion Point to Point Protocol & Error Detection of Computer Network |
|
Answer» The CORRECT answer is (b) Attack-definition file |
|
| 25. |
IDS follows a two-step process consisting of a passive component and an active component. Which of the following is part of the active component?(a) Inspection of password files to detect inadvisable passwords(b) Mechanisms put in place to reenact known methods of attack and record system responses(c) Inspection of system to detect policy violations(d) Inspection of configuration files to detect inadvisable settingsThis question was addressed to me during an interview.I need to ask this question from Intrusion Detection Systems topic in portion Point to Point Protocol & Error Detection of Computer Network |
|
Answer» The correct CHOICE is (b) Mechanisms PUT in place to reenact known methods of attack and RECORD system responses |
|
| 26. |
At which two traffic layers do most commercial IDSes generate signatures?(a) Application layer and Network layer(b) Network layer and Session Layer(c) Transport layer and Application layer(d) Transport layer and Network layerI had been asked this question in exam.Question is taken from Intrusion Detection Systems topic in division Point to Point Protocol & Error Detection of Computer Network |
|
Answer» Right choice is (d) TRANSPORT layer and Network layer |
|
| 27. |
What is the purpose of a shadow honeypot?(a) To flag attacks against known vulnerabilities(b) To help reduce false positives in a signature-based IDS(c) To randomly check suspicious traffic identified by an anomaly detection system(d) To enhance the accuracy of a traditional honeypotI have been asked this question in an interview for job.My enquiry is from Intrusion Detection Systems in chapter Point to Point Protocol & Error Detection of Computer Network |
|
Answer» Correct answer is (c) To randomly check suspicious traffic identified by an anomaly detection system |
|
| 28. |
One of the most obvious places to put an IDS sensor is near the firewall. Where exactly in relation to the firewall is the most productive placement?(a) Inside the firewall(b) Outside the firewall(c) Both inside and outside the firewall(d) Neither inside the firewall nor outside the firewall.I had been asked this question in an online interview.Origin of the question is Intrusion Detection Systems in chapter Point to Point Protocol & Error Detection of Computer Network |
|
Answer» Correct OPTION is (a) Inside the firewall |
|
| 29. |
A false positive can be defined as ________(a) An alert that indicates nefarious activity on a system that, upon further inspection, turns out to represent legitimate network traffic or behavior(b) An alert that indicates nefarious activity on a system that is not running on the network(c) The lack of an alert for nefarious activity(d) Both An alert that indicates nefarious activity on a system that, upon further inspection, turns out to represent legitimate network traffic or behavior and An alert that indicates nefarious activity on a system that is not running on the networkI had been asked this question during an interview.I want to ask this question from Intrusion Detection Systems in portion Point to Point Protocol & Error Detection of Computer Network |
|
Answer» The CORRECT option is (d) Both An alert that indicates NEFARIOUS activity on a system that, UPON further inspection, turns out to represent LEGITIMATE network traffic or behavior and An alert that indicates nefarious activity on a system that is not running on the network |
|
| 30. |
Which of the following is an advantage of anomaly detection?(a) Rules are easy to define(b) Custom protocols can be easily analyzed(c) The engine can scale as the rule set grows(d) Malicious activity that falls within normal usage patterns is detectedI had been asked this question during an interview for a job.My question is from Intrusion Detection Systems topic in portion Point to Point Protocol & Error Detection of Computer Network |
|
Answer» RIGHT choice is (c) The engine can SCALE as the RULE set grows The explanation is: Once a protocol has been built and a behavior defined, the engine can scale more QUICKLY and easily than the signature-based model because a NEW signature does not have to be created for every attack and potential variant. |
|