Ccna Interview Preparation 1
-
Upload
tessafi1967 -
Category
Documents
-
view
219 -
download
1
Transcript of Ccna Interview Preparation 1
-
8/6/2019 Ccna Interview Preparation 1
1/17
CCNA
WRITTEN TEST Question Paper
1. What is Subnetting and its uses?
2. Differentiate between Routing Protocol and Routed Protocol , give some examples
for both.
Routing Protocols: the routing protocol is the protocol used to send update between the routersabout the networks that exist in the organization.
Example: RIP,OSPF,IS-IS,IGRP,EIGRP
OR: is used by routers to dynamically find all the network in the internetwork & make sure that all routers
have the same routing tables.
Routed Protocols : Once all the routers knows about all the networks a routed protocol can beused to send user data through the internetwork
Example: IP, IPX
3. Mention the use of IP Subnet- zero commands.
4. How will you find the number of IP addresses and number of host in the given IP
Subnet? 172.168.100.0126
5. Mention about RIP protocol and its timers and its use of timers?
RIP Timers
Route Update Timer- The routing-update timer clocks the interval between periodic routingupdates. It is usually set to 30 seconds.
Route Invalid TImer- The Route Invalid Timer determines the length of time (90 seconds)before a route is considered invalid. If it doesn't receive an update for the route it sets the routeas invalid and notifies its neighbors.
Route Flush Timer- The Route Flush Timer sets the time between when a route becomesinvalid and its removal from the routing table (240 seconds). Time must be longer than invalidtimer so it can tell its neighbors about the route.
6. Mention about Io1 rp protocol and its timers.
-
8/6/2019 Ccna Interview Preparation 1
2/17
7. Differentiate between RIP1 & RIP2
8. What is the Administrative distance (AD) value for RIP,IGRP,OSPF,BIGRP
Route Source Default Administrative Distance
Connected Interface 0
Static Route 1
EIGRP summary route 5
EIGRP 90
External EIGRP 170IGRP 100
OSPF 110
RIP 120
IS-IS 115
EGP 140
External BGP 20
Internal BGP 200
Unknown 255 (this route will never be used)
9. Mention the use of AD
Administrative Distance (AD): is used to rate the trustworthiness of routing informationreceived on a router from a neighbor router. An administrative Distance is an integer from 0 to 255,where 0
is the most trusted and 255 means no traffic will be passed via this route
10. How does IP communicate between two nodes shown in the figure.
-
8/6/2019 Ccna Interview Preparation 1
3/17
11. Mention the use of show IP Interface
This command enables you to see IP configuration of your router interface
12. How ISDN works and how to configure on router?
ISDN is actually a set of communication protocols proposed by telephone companiesthat allow them to carry a group of digital services that simultaneously convey data,text, voice,music, graphics, and video to end users, and it was designed to achievethis over the telephone systems already in place.
These are the benefits of ISDN:1)It can carry voice, video, and data simultaneously.2)Call setup is faster than with an analog modem.3)Data rates are faster than on an analog modem connection.4) ISDN offers Dial on Demand Routing, which means you only pay for the time thatyou use the link.5)Small office and home office sites can be economically supported with ISDN BRIservices.6)ISDN can be used as a backup service for a leased-line connection between theremote and central offices.7)ISDN provides a faster data transfer rate than modems by using the B channel.When multiple B channels are used, ISDN offer users more bandwidth on WANs.
13. Mention about PRI & BRI interfaces and its value
Basic Rate Interface (BRI)
ISDN Basic Rate Interface (BRI) service, also known as 2B+D, provides two Bchannels and one D channel. The BRI B-channel service operates at 64Kbps andcarries data, while the BRI D-channel service operates at 16Kbps and usually carriescontrol and signaling information. The total bandwidth for ISDN BRI is then 144Kbps(64 + 64 + 16 = 144).The D channel carries signaling information to setup and control calls.
Primary Rate Interface (PRI)ISDN Primary Rate Interface (PRI) servicealso known as 23B+Ddelivers 23 64KbpsB channels and one 64Kbps D channel, for a total bit rate of 1.544Mbps.
14. Mention about the use of ISDN switch type command
15. Mention the use of Dialer list command
-
8/6/2019 Ccna Interview Preparation 1
4/17
Dial-on-Demand Routing (DDR)
Dial-on-demand routing (DDR) is used to reduce WAN costs if you have to pay on a per-minute or per-
packet basis.DDR works when a packet received on an interface
1. The route to the destination network is determined to be across the dial-up connection.
2. Interesting packets dictate a DDR call.3. Dialer information is looked up and the call is placed.
4. Traffic is transmitted.
5. Call is terminated when no more interesting traffic is being transmitted over a link and the idle-timeout
period ends.
Configuring DDR
1. Define static routes, which specify how to get to the remote networks and whatinterface to use to get there.2. Specify the traffic that is considered interesting to the router.3. Configure the dialer information that will be used to dial the interface to get to theremote network.
Configuring Static RoutesRouterA(config)#ip route 172.16.50.0 255.255.255.0172.16.60.2RouterA(config)#ip route 172.16.60.2 255.255.255.255 bri0
What this does is tell the router how to get to network 172.16.50.0 through172.16.60.2.
The second line tells the router how to get to 172.16.60.2. This second IP routecommand is vital, as youll soon see; together with the dialer map command, it letsISDN know where to place the call.
16. What is Access list? Mention about the types
17. What is the use of SNMP protocol?
Simple Network Management Protocol.
The SNMP protocol is used by network management systems to communicate with
network elements.
The Simple Network Management Protocol (SNMP) is essentially a request-reply
protocol running over UDP (ports 161 and 162)
-
8/6/2019 Ccna Interview Preparation 1
5/17
18. What is VLAN?
What is VLAN: Creating Multiple virtual LANs across the switch is called as VLAN
19. Differentiate between Trunk line & Access Line
Access Link: Access link is a link that is part of only one Vlan,which is referred to as the native Vlan of
the port.Trunk Link : Trunk can carry multiple VLAN information across the switch. A trunk is used to connect
switches to other switches, or routers. Trunk links are supported on fastEthernet or Gigabit Ethernet only
20. What is supernetting?
Combining several IP network addresses into one IP address. Supernetting
reduces the number of entries in a routing table and is done in CIDR
addressing as well as internal networks.
21. What is leased lines? How it works?
Typically, these are referred to as apoint-to-point connection or dedicatedconnection.Which has been leased for private use. In some contexts, it's called a dedicated line.
22. How does trace route work?
Traceroute is the program that shows you the route over the network between two
systems, listing all the intermediate routers a connection must pass through to get to its
destination. It can help you determine why your connections to a given server might bepoor, and can often help you figure out where exactly the problem is. It also shows you
how systems are connected to each other, letting you see how your ISP connects to the
Internet as well as how the target system is connected.
23. Differentiate Straight Cable and Cross Cable
-
8/6/2019 Ccna Interview Preparation 1
6/17
24. Differentiate between Hub and Switches
25. Following in an illustration of two connected routers.R1 & R2 are 2 routers which
are connected by 2MBPS leased line and 128 KBPS ISDN, if there is failure of
2MBPS Leased line during transmission , then transmission should be taken over
by128KBPS How do you configure this condition?
26. What is subnetting?
27. Given a network e.g:172.16.23.0/20, how many sub networks are possible? and
what is the next subnet address after the zero subnet?
28.
a) Given a mesh kind of connection to 4-5 switches, how can you find the root bridge
and root port, which port will be in forward state and blocking state?
b) Please prepare the STP part, very important.
29. Which is better OSPF or EIGRP?
OSPF EIGRP
-
8/6/2019 Ccna Interview Preparation 1
7/17
Supports CIDR and VLSM, rapid
convergence, partial updates, neighbordiscovery
Supports CIDR and VLSM, rapid
convergence, partial updates, neighbordiscovery
Administrator can define route
summarization
Automatic route-summarization and user-
defined route summaries
Open standard; multivendor support Proprietary; Cisco routers only
Scalable; administratively defined
areas provide manageable hierarchy
Scalable, but no hierarchical design
Difficult to implement
Equal-cost load balancing
Easy to implement
Unequal-cost load balancing
30. What are the features of OSPF or EIGRP?
Features of EIGRP
Great for scaling current EIGRPReduction of dandthwidth
Route summarizationRoute redistribution
Dual Algorithm= Fast convergence
EIGRP user incremental update
Function in LAN & WAN
Supports VLSL: suppernetting
Metric based on Bandwidth/Delay
Load balance up to 6 equal & unequal paths
Provides support for multiple protocolsEasy to configure
Backward compatible with IGRP
OSPF Features
-
8/6/2019 Ccna Interview Preparation 1
8/17
Fast convergence: Whenever there is change in topology, it will send onlyTriggered updates.
It supports unlimited size:
Less bandth utilization
It user Dikjestra Algorithm to calculate best path to the destination
Cost will be calculate based on Bandth/Delay 10*8/Bandth-width
31. What are the features of distance vector?
Distance Vector Link-State
Sends its entire routing table at periodicintervals out of all interfaces (typically,this is based in seconds). It will also sendtriggered updates to reflect changes inthe network.
Sends incremental updates when achange isdetected.
RIP, IGRP, EIGRP ( Hybbid) OSPF, IS-ISTypically involves updates sent using abroadcast address to everyone on thelink.
Typically involves updates sent to thoserouters participating in the routingprotocol domain, via a multicast address.
Uses a metric based on how distant theremotenetwork is to the router. (IGRP does notconform to this as a proprietary solution.)
Is capable of using a complex metric
Has knowledge of the network based oninformation learned from its neighbors.
Has knowledge of the network based oninformation learned from every router inthe area.
Includes a routing table that is adatabase viewed from the perspective ofeach router.
Has a topological database that is thesame forevery router in the area. The routingtable that is built from this database isunique to each router.
Uses Bellman Ford algorithm for Uses the Dijkstra algorithm.
-
8/6/2019 Ccna Interview Preparation 1
9/17
calculating thebest path.Does not consume many routerresources, but is heavy in the use ofnetwork resources.
Uses many router resources, but isrelatively low in its demand for networkresources.
Maintains one domain in which all the
routes are known.
Has a hierarchical design of areas that
allow forsummarization and growth.Involves slower convergence becauseinformation of changes must come fromthe entire network (but indirectly). Eachrouting table on every intervening routermust be updated before the changesreach the remote end of the network.
Involves quicker convergence becausethe update is flooded immediatelythroughout the network.
32. How to check connectivity Ping and Trace route?
Trace route : Trace can be used to show the path a packet takes through theinternetwork to a remote host.
Ping:You can use ping to test network connectivity and test name resolution.
33. How does IP packet Flow?
34.What is ISDN? Mention the use of ISDN
35.What is leased line Configuration? How it works?
.
36. What is AD ? Mention AD for different protocols
37. Mention about the lease Line Components
38.What is the output of Show Interface and show version?
39.What is HDLC and PPP Authentication?
HDLC is the default encapsulation used by Cisco routers over synchronous serial links. HDLC is a
point-to-point protocol used on leased lines between Cisco devices & No authentication can be used
with HDLC. Its a data link layer protocol.
PPP AuthenticationYou have two methods to choose from to implement authentication:
PPP Authentication Protocol (PAP)
-
8/6/2019 Ccna Interview Preparation 1
10/17
Challenge Handshake Authentication Protocol (CHAP).
The authentication process is performed before the network and data link layerprotocols are negotiated for the PPP connection by NCP. If the authentication fails,then the serial data link connection will not come up. Authentication is optional andadds very little overhead to the connection.
PAP (PPP Authentication Protocol )
PAP is the simplest, but the least secure. During the authentication phase, PAP goesthrough a two-way handshake process. In this process, the source sends itsusername (or hostname) and password, in clear text, to the destination. Thedestination compares this information with a list of locally stored usernames andpasswords. If it finds a match, the destination sends back an acceptmessage.If itdoesnt find a match, it sends back a rejectmessage.PAP authentication process.
CHAP (Challenge Handshake Authentication Protocol )
Note: One big problem with PAP is that it sends the username and password acrosstheWAN connection in clear text. If someone is tapping into the WAN connection andeavesdropping on the PPP communication, theyll see the actual password that isbeingused. In other words, PAP is not a secure method of authentication.
CHAP, on the other hand, uses a one-way hash function based on the MessageDigest 5 (MD5) hashing algorithm to hash the password. This hashed value is thensent across the wire. In this situation, the actual password is never sent. Anyonetapping the wire will not be able to reverse the hash to come up with the originalpassword. This is why MD5 is referred to as a one-way functionit cannot be
reverseengineered.
CHAP uses a three-way handshake process to perform the authentication. First, thesourcesends its username (not its password) to the destination. The destination sends backa challenge, which is a random value generated by the destination.
The default encapsulation on Ciscos synchronous serial interfaces isHDLC
40.What is Vlan? Mention its types and basics.
What is VLAN: Creating Multiple virtual LANs across the switch is called as VLAN
Based on VLAN boundaries
1) End-to-End VLANs: VLANs are configured to allow membership based on
function,project,department and so on..
-
8/6/2019 Ccna Interview Preparation 1
11/17
Best feature of End-to-End VLANs is that users can be placed in a VLAN regardless of their
physical location.The administrator defines the port the user is connected to as a VALN member.
If user moves, the administrator defines their new port as a member of exiting VLAN
2) Local VLAN : Local VALN is configured by physical location and not by
function,project,department and so on. Local vlans are user in corporations that have centralizedservers.
Based on Members
1) Static VALN: Administrator Creates a VLAN and then assigns switch ports to it.The association
does not change until the administrator changes the port settings.
2) Dynamic VLAN: A dynamic VLAN will tell the switch port, which VLAN it belongs to,based
on the mac address of the device that connects to the port.
Dynamic VLAN will be configure by usingVLAN Management Police Server( VMPS)
It is a service to set up a database of MAC address that can be user for dynamic addressing of
VLAN.VMPS is a MAC-address-to-VLAN mapping database.
41.Mention about basic switching operation
42. Differentiate between broadcast, multicastand unicast.
43.What is STP and functionality of STP ?
STP is used to Prevent Layer 2 loops & Provide Redundancy
Electing a Root Bridge
Root Bridge: is one which runs Spanning tree protocol in layer 2 N/W
OR: The root bridge is the bridge with the best Bridge ID
The Root Bridge is chosen by an election process among all connectedswitches. Each switchhas a unique Bridge IDthat it uses to identify itself to other switches. TheBridge ID is an8-byte value that is made up of the following fields: Bridge Priority (2 bytes)The priority or weight of a switch in relation toall otherswitches. The priority field can have a value of 0 to 65,535 and defaults to32,768 MAC Address (6 bytes)The MAC address used to determine which isthe lowest ID
NotePort Cost: When a BPDU sent out a switch port, the BPDU is assigned a portcost
Path Cost: is the some of all the port costs,
Selecting Root Port
Root port: one which is very close to the Route Bridge & receives best BPDU
-
8/6/2019 Ccna Interview Preparation 1
12/17
OR: The link directly connected to the root bridge, or the shortest path to the root bridge.If more than one
link connects to the root bridge,then a port cost is determined by checking the bandwidth of each link.The
lower cost port becomes the root port.
44.Mention about Loops and Redundency
45.Mention about basic of multilayer Switching
46.Mention about HSRP and VRRP basic concepts
47.Discuss on IP subnet zero and IP classless.
48) What is full form of PING ?
ANS: Packet Internet Groper
49) In which layer the PING & Trace route works?
ANS: Network layer
50) What is default setting for UDLD?
UniDirectional Link Detection
UDLD is a Layer 2 protocol that enables devices connected through fiber-optic or
twisted-pair Ethernet cables to monitor the physical configuration of the cables and detectwhen a unidirectional link exists. All connected devices must support UDLD for the
protocol to successfully identify and disable unidirectional links. When UDLD detects a
unidirectional link, it disables the affected port and alerts you. Unidirectional links can
cause a variety of problems, including spanning-tree topology loops
51) What are the types of L2 switching?
Cut Through - fastest switching mode as only the destination address is copied. It will
then look up the address in its filter table and send the frame to the appropriate interface.
Store and Forward - the entire frame is copied into its buffer and checks for CyclicRedundancy Check (CRC). The frame is discarded if it contains a CRC error or if it is a
-
8/6/2019 Ccna Interview Preparation 1
13/17
runt (less than 64 bytes) If the frame does not contain any errors, the LAN switch looks
up the destination address in its forwarding, or switching, table and determines the
outgoing interface.
Fragment Free - The switch waits for the first 64 bytes to pass before forwarding the
frame. If the packet has an error, it usually occurs in the first 64 bytes of the frame.
Default mode for 1900 switches.
52) TCP & UDP works @ which OSI Layer?
52) How to find DCE & DTE interface in serial connection
A Cisco router is a DTE by default, but directly connecting two DTEs with a DCE/DTE
cable is not enough. In the following example, R1 and R3 are directly connected at theirSerial1 interfaces. The line goes up briefly after being opened, but the line protocol goes
down after about 30 seconds.
2d18h: %LINK-3-UPDOWN: Interface Serial1, changed state to up
2d18h: %LINEPROTO-5-UPDOWN: Line protocol on Interface Serial1, changed state todown
The problem is that one of the routers needs to act as the DCE in order for the line
protocol to come up and stay up. You could just go over and look at the DTE/DCE cableto see which router had the DCE end of the cable attached. OR the Female interface is the
DCE interface. In this example, though, we don't have physical access to the routers.
How can we tell which router has the DCE end of the cable attached?
R3#show controller serial 1
HD unit 1, idb = 0x1C44E8, driver structure at 0x1CBAC8
buffer size 1524 HD unit 1, V.35 DCE cable
The router with the DCE end of the cable needs to supply a clock rate to the DTE, and
we'll do just that with the interface-level clockrate command.
-
8/6/2019 Ccna Interview Preparation 1
14/17
R3#conf t
Enter configuration commands, one per line. End with CNTL/Z.
R3(config)#int serial1
R3(config-if)#clockrate 56000
1. introduce yourself?
2. hub & switch
3. collisin & broad cast domain
4. routing & routed protocols
5. explain the difference between EIGRP & ospf6. types of wan connection
7. explain frame-rely
8. problem on subnetting
9. vlan,wat is the need 4 it
10.vtp
VTP VLAN Trunk Protocol.
Benefits of VTP
VTP Modes of OperationsTo participate in a VTP management domain, each switch must be configuredto operate in oneof several modes. The VTP mode will determine how the switch processesand advertises VTPinformation. The following modes can be used:
Server modeVTP servers have full control over VLAN creation andmodification for
-
8/6/2019 Ccna Interview Preparation 1
15/17
their domains. All VTP information is advertised to other switches in thedomain, whileall received VTP information is synchronized with the other switches. Bydefault, a switchis in VTP server mode. Note that each VTP domain must have at least oneserver so that
VLANs can be created, modified, or deleted, and so that VLAN informationcan bepropagated.
Client modeVTP clients do not allow the administrator to create, change,or delete anyVLANs. Instead, they listen to VTP advertisements from other switches andmodify theirVLAN configurations accordingly.
Transparent modeVTP transparent switches do not participate in VTPdomain, but still receive & forward VTP advertisement through the configured
trunk links.
1. How is ur day begin in ur office?wat is ur day today
activities?
2. how will u trouble shoot a leased line?
3. which is coastlier leased line or ISDN?
4. VTP/VLAN
5. wat is a non-modular and modular router?6. explain lsa types of ospf
7. wat is a auxillary port in router?
8. how u will connect a auxillary port
9. how to connect a isdn line to router
10.wat is nt1,nt2,te
11.explain ospf in detail..
12.explain how tracert is working?
13.wat is supervisor engine in l3 switch?
14.can we configure a routing protocol on a 2950 switch?
why?
15.wat is stp?different port status of stp?
STP Port States
-
8/6/2019 Ccna Interview Preparation 1
16/17
STP Default Timers
1) What is your day 2-day activity
2) What is VLAN? How u will configure? In both Cat & IOS based config.
3) How to enable Ethernet port to the VLAN.
4) What is the default cost for OSPF?
5) Whats the command to see logs in the Cisco devices
6) Whats the command to see the neighbors?
7) Whats the command to see VLAN configuration?
8) Whats the command to see the interface details?
1) What is your role in present working company
2) Is the single port can be a part of 2 VLAN & how u will configure it
-
8/6/2019 Ccna Interview Preparation 1
17/17
3) What is auxiliaryvlan? How u will configure
4) Whats the difference between SupII & SupIV engine.
5)
1) Tell me something about working profile
2) How u will upgrade the IOS in WAN links
3) If the link between Bangalore to Mumbai is not working, how u will analyze?
4) What is Floating static route?
1) How u will say EIGRP is fast convergence2) If u have internal network why u want authentication in OSPF
3) What is FD & AD in EIGRP. How it calculates.
4) In a WAN Link if both Serial & line protocol is down...How u will troubleshoot5) whats the difference between stub area & not so stubby area ? Why we need this.
6) Why totally stub area blocks LSA-3,4,5....whats the use.
7) What are the types of OSPF8) What are the updates u will find in topology table in EIGRP
9) How u will conveince which protocol is good for the network
10) Once the neighbour relationship is established in OSPF, what is the next step?11) What is LSA 7 ? Why is changes to LSA-5 in ABR12) What is native VLAN?
13) Why u will create a VLAN in a switch
14) Why u want spanning tree?