Skip to main content

CCNA QUESTION & ANSWER



A. What are two benefits of implementing a VLSM addressing scheme? (Choose two.)

allows efficient use of address space

supports hierarchical addressing capability

supports only one subnet mask length throughout the entire network

allows efficient use of larger routing tables to eliminate the need for route summarization

solves the problem of discontiguous networks with classful routing protocols

B. When running NAT, what is the purpose of address overloading?

limit the number of hosts that can connect to the WAN

allow multiple inside addresses to share a single global address

force hosts to wait for an available address

allow an outside host to share inside global addresses

1. What is the Network ID for the IP address 192.168.12.6, assuming default subnet mask?
A: 192.168.12.0

2. What is the Node ID for the IP address 192.168.12.6, assuming default subnet mask?
A: 0.0.0.6

3. What is the Network ID for the IPX address 2c.0000.0c56.de34?
A: 2c

4. What is the Node ID for the IPX address 2c.0000.0c56.de34?
A: 0000.0c56.de34

5. In what order do the five steps of Data Encapsulation take place?
A: 1) User information is converted to data.
2) Data is converted to segments.
3) Segments are converted to packets or datagrams.
4) Packets or datagrams are converted to frames.
5) Frames are converted to bits.

6. What kind of services are provided by the Presentation layer?
A: PICT, JPEG, MIDI, MPEG, ASCII and EBCDIC

7. What kind of services are provided by the Session layer?
A: NFS, SQL, RPC and NetBIOS

8. How do you enable a Banner on a Cisco Router?
A: Router(Config)# banner motd #

9. Which three protocols are correctly matched to their respective transport layer function?
A: TCP = connection oriented
TCP = three way handshake
UDP = no sequence and acknowledgment

10. What are the two ways to display IPX address information on interface Ethernet1?
A: show ipx interface Ethernet1
show interface Ethernet1

11. Which IP-class provides the fewest numbers of Hosts?
A: Class C

12. How do you change the Console password on a router to be sharon?
A: Router(config)# line con 0
Router(config-line)# login
Router(config-line)# password sharon


13. How are the ISDN protocols defined?
A: I - stands for concepts, terminology and services
E - stands for existing telephone network
Q - stands for switching and signaling

14. Your are configuring RIP on your router. What happens when you enter the command
“Router(config-router)# network 175.76.3.0”?
A: RIP has been enabled on the 175.76.3.0 network.

15. What is the command to show both source and destination addresses for IPX?
A: debug IPX routing activity

16. How do you log into User EXEC mode?
A: Press enter and enter userid and the password if necessary.

17. What command instructs the router to load the IOS from Read Only Memory ?
A: boot system rom

18. What is the Frame Relay configuration command for the second subinterface?
A: interface s0.2 point-to-point

19. What is the command level where you enter the access list command?
A: Router(config)#

20. How are routing loops prevented? (Choose four)
A: Route Poisoning
Hold downs
Split horizon
Triggered Updates

21. What's the default subnet mask for a Class A IP address?
A: 255.0.0.0

22. What's the default subnet mask for a Class B IP address?
A: 255.255.0.0

23. What's the default subnet mask for a Class C IP address?
A: 255.255.255.0

24. Troy Technologies has an employee that is working at home. This employee runs big client
server applications and must quickly transfer large files. What solution would be the most cost
effective?
A: Install an ISDN connection at the employee’s house.


25. What is half duplexing?
A: Frames feed into a single cable in one direction at a time.

26. What are the three main methods of flow control?
A: Windowing
Buffering
Source Quench Messaging

27. What are the correct encapsulation types for frame-relay?
A: Cisco & Ietf

28. In IOS editing mode, how do you return to the beginning of command line?
A: Ctrl + a

29. What type of WAN protocol uses PVCs?
A: Frame Relay

30. Given the following IP address: 162.53.21.12
You plan for no more than 126 hosts on the subnet that includes this address. What subnet mask
would you use?
A: 255.255.255.128



31. How would you backup the IOS image to a TFTP server?
A: copy flash tftp

32. What command would you use to get totally out of config mode and return to PRIV mode on the
router?
A: ctrl + z

33. How does "Store-and-Forward" LAN switching method work?
A: Switch waits for the whole frame before forwarding.
Latency varies with different frame sizes.

34. You have a class B IP address with a 12 bit subnet. How many subnets and hosts are available?
A: 4094 subnets, 14 hosts

35. You have the following access list command:
access-list 800 permit 3d 4a
You also have the following interface configurations:
interface Ethernet 0
ipx network 4a
ipx access-group 800 out
interface Ethernet 1
ipx network 3d
interface Ethernet 2
ipx network 5c
Which two statements are true?
A: Traffic from network 3d for network 4a will be forwarded our e0.
The access list is applied to an outgoing interface and filters outbound traffic


36. Match the IPX Frame Type with the correct IOS encapsulation?
A: IPX Frame Type Cisco Encapsulation Type
Ethernet_802.3 Novell-ether (Default)
Ethernet_802.2 Sap
Ethernet_II Arpa
Ethernet_Snap Snap
Token Ring Sap (Default)
Token Ring_Snap Snap
Fddi_Snap Snap (Default)
Fddi_802.3 Sap
Fddi_Raw Novell-fddi
HDLC HDLC (Default)

37. Router configuration can be done by what four methods?
A: Memory (NVRAM)
Terminal (Console)
Network (TFTP)
Overwrite


38. To make a router boot from a file called FRED on the TFTP server at IP address 171.59.117.19,
which command should be entered?
A: Router(config)# boot system TFTP fred 171.59.117.19

39. How do you change the Auxiliary password to Cisco?
A: Router(config)# line aux 0
Router(config-line)# login
Router(config-line)# password Cisco

40. How do you change the Virtual Terminal password to CCIE?
A: Router(config)# line vty 0 4
Router(config-line)# login
Router(config-line)# password CCIE

41. Which statement describes a difference between STP and RSTP?

RSTP is proprietary while STP is defined by IEEE.

RSTP defines four port states while STP defines five port states.

When a topology changes, RSTP reconfigures the spanning tree in less than 1 second.

STP is more commonly used in large switched enterprise networks that require faster recovery.



42. In an enterprise network, why would voice traffic typically require a dedicated VLAN?

It guarantees end-to-end delivery for voice traffic.

It guarantees higher bandwidth for voice traffic.

It separates voice traffic from data traffic so data traffic does not impact voice traffic.

It provides backup support for voice traffic because voice traffic is more critical than data traffic.


43 How does a VPN work to support remote user productivity?
It uses SSL to encrypt remote user logins to the corporate intranet.
It uses secure Telnet for remote user connections to internal network devices.
It creates a virtual circuit that allows real-time communications between any two Internet endpoints.


Comments

Popular posts from this blog

Information Security Interview Questions & Answers

The number of Information Security related jobs are growing extensively…. There is a huge requirement for skilled InfoSec professionals across the globe.. the jobs positions are available for freshers, experienced guys and top management (typically CISO .HCL,BPLetc)… This post is my attempt to collect typical InfoSec interview question and answers to help those looking out opportunities in this field… I’ll keep on updating the questions regularly.. You can also share/contribute any questions you might have faced during your InfoSec interviews…. Category I: General Security Concepts / Network Security / OS Security 1) Is there any difference between Information Security and IT Security? If yes, please explain the difference. Ans- Yes. Information Security and IT Security are both different terms often used interchangeably. IT Security focuses on purely technical controls (like implementing antivirus, firewall, hardening systems etc) while Information Security is more wider ter...

8 pair usage for data in Cat 6 Wire in Networking

Today I Post the Cat6 wire pair use in Networking ,we all know 8 pair in cat 6 and but no idea how any pair use in Networking .only 4 pair Use in networking , Like this Photo, If 4 pair not work in cat6 wire we use another 4 Pair same wire Save time and Money 

MCSE INTERVIEW QUESTIONS AND ANSWER

MCSE INTERVIEW QUESTIONS AND ANSWER ,VERY USEFULL OUR NEXT JOB INTERVIEW MCSE Questions and Answers: :  1 :: What is the use of IGMP protocol?  Internet Group Management Protocol: - It allows internet hosts to participate in multicasting. The IGMP messages are used to learn which hosts is part of which multicast groups. The mechanism also allow a host to inform its local router, that it wants to receive messages.  2 :: What are Ping and Tracert?  Ping and tracert are the commands used to send information to some remote computers to receive some information. Information is sent and received by packets. Ping I particularly used to check if the system is in network or not. It also gives packet lost information. In windows ping command is written as ping ip_address Tracert is called as trace route. It is used to track or trace the path the packet takes from the computer where the command is given until the destination. In windows ping command is written as trac...