1533160 ccna interview

Upload: neeraj-kumar-singh

Post on 05-Apr-2018

227 views

Category:

Documents


2 download

TRANSCRIPT

  • 8/2/2019 1533160 Ccna Interview

    1/29

    Routers:

    In 1992 main products of Cisco were Gateway Servers i.e.AGS Advanced Gateway ServerMGS Mid-Range Gateway Server

    IGS Integrated Gateway ServerCGS Compact Gateway ServerAGS+ - Advanced Gateway Server Plus

    Routers are of two types, Modular and Non-Modular1.ModularRouters will not have fix interfaces, can be added or removedwhenever required.2.Non-ModularRouters will have fix interfaces, cannot be added or removed, they arefixed.

    SERIES MODELSEach series will have different models Each models will havedifferent features or functions

    700 701,702,703,704,710 (supports ISDNTechnology)

    800 801,803,805,810 (supports ISDN+Leasedline connection)

    1000 1001,1003,1010,1011,10151100 1101,1102,1102,11151400 1401 - 1411

    1600170025002600360040005000700012000GSRGigabit Switched Routers

    Products of Cisco:RouterSwitchesBridgesBroutersRepeatersPIX Packet Information ExchangeVPN Concentrator

  • 8/2/2019 1533160 Ccna Interview

    2/29

    AAA Server Authentication, Authorizing, Accounting ServerIDS Intrusion Detection SystemPolicy ManagerFibre OpticsCRS Carrier Routing System (provides 9.6TeraBytes per second)

    CMTS or UBR Cable Modem Terminating SystemNetworkConnection of two or more nodes over the physical media is called asNetwork.

    NetworkingConnection of two or more nodes over the physical media and sharing theresources is called as Networking.

    Types of Network:

    1.Peer-to-Peer NetworkPeer meaning client, Operating system used as client are win95, 98,NT4.0Workstation, Win2000 prof, ME, XP prof.Workgroup is a small group of computers where no centralizedadministration and no security is provided.

    2.Server based NetworksServer is the one that serves the resources to clients.Client is the one that requests for the resources from server.Non-dedicated Server is the system that works both as client and server.

    Operating system used as server is WinNT 3.51, 4.0, Win2000server,Win2003server.DomainLogical group of computers where centralized administration and security isconcerned.Further types of network:

    PAN Personalized Area NetworkLAN Local Area NetworkCAN Campus Area Network or BAN Branch Area Network (within 2km

    diameter using FDDI)SAN Storage Area NetworkMAN Metropolitan Area Network (takes support of PSTN)WAN Wide Area Network (takes support of X.25, Frame-relay, ATM, Internet,ISDN)SoAN Solaris Area Network (network using satellite)WIRELESSINTERNET

  • 8/2/2019 1533160 Ccna Interview

    3/29

    EXTRANET Connection between different branchesINTRANET Connection within the branches

    LAN Requirements for Networking:Server, Client, NIC, Cable (Media), Switch, Topology, Protocol, Services.

    Media:There are 2 types of media1.Guided media (wired media) 2.UnGuided media (wireless media)

    1.Guided media (wired media)e.g. Co-axial cable, twisted pair cable, fibre optics cable

    Co-axial cable1.Maximum Distance 500mts2.Low response

    3.Less attenuation4.Speed 10Mbps5.Communication done is half duplex6.Connection done using BNC Bayonet Neil Concellmen Connector7.Registered Guage Standard (RG)

    RG 9,11,12 Thinnet Coaxial CableRG 58 Thicknet Coaxial CableRG 58/U, RG 58A/U Military NetworkRG 59 Dish NetworkRG 62 Arc Net

    Thicknet also called as 10base5 where 10 Bandwidth base Baseband and5 500mtsThinnet also called as 10base2 where 10 Bandwidth base Baseband and 2 200mts

    Twisted pair cable1.Maximum Distance 100mts2.Speed 10/100/1000Mbps3.Communication done is half / full duplex4.Connection done using RJ45 Connector

    10baseT Supports 10Mbps10baseTx Supports 10 or 100 Mbps100baseT Supports 100Mbps1000baseTx Supports 1Gbps

    4 pairs of wires, orange tip orange/white tap.

  • 8/2/2019 1533160 Ccna Interview

    4/29

    All orange/white, green/white, blue/white, brown/white provides grounding tothe orange, green, blue, brown wires.

    Types of Twisted pair cable1.Unshielded Twisted Pair Cable (UTP) 2.Shielded Twisted Pair Cable

    (STP)

    Categories of Twisted pair cablesCAT1 Telephone Networks (4Mbps)CAT2 Small Computer Networks, Telephone Networks

    (4Mbps)CAT3 LAN Ethernet (16Mbps)CAT4 Token Ring Network (40Mbps)CAT5 LAN Fast Ethernet (100Mbps)CAT5e & CAT6 LAN Fast Ethernet (1Gbps / 1000Mbps)

    Registered Jack (RJ Connectors)

    RJ11 TelephonesRJ12 Telephone Network, Modems, Small NetworksRJ45 Local Area Network

    Optical Fibre Cable1.Maximum Distance 3 to 10 Kms2.No EMI Electro Magnetic Interference3.Speed 100Mbps or Higher4.Connectors used are ST Straight Trip and SC Subscriber Connectors5.Two modes of communication Single mode (single beam) and Multiplemode (multiple beam)

    2.UnGuided media (wireless media)e.g. infrared, microwaves, radio wavesInfrared1.Introduced in 19852.Point-to-Point communication (distance between 2 computers should notbe more than 15mts)3.Multipoint communication (distance between 2 computers should not bemore than 30 mts)4.Maximum Bandwidth 11Mbps

    Microwaves1.Electromagnetic Waves > 1Mhz

    Radio Waves1.Introduced in 1998 for computers2.Electromagnetic Waves < 1Mhz3.Maximum frequency available now is 2Ghz

  • 8/2/2019 1533160 Ccna Interview

    5/29

    ProtocolsA set of rules for a particular type of communication.

    Two types of Protocols1.Connection Oriented 2.Connectionless Oriented

    Connection Oriented1.Follows the same path for data transfer2.Acknowledgement3.Reliable4.e.g. TCP, SPX, AppleTalk datagram protocol

    Connectionless Oriented1.Follows the path where less traffic is found2.No Acknowledgement3.Non-Reliable

    4.e.g. IP, IPX, UDP, AppleTalk protocol

    StandardsTwo types of Standards1.Defacto Standard 2.Dejuire Standard

    Defacto StandardStandard widely used by all is called as Defacto Standard.

    Dejuire Standard

    Standard defined by an organization is called as Dejuire Standard.

    Standard Organizations / Committees

    IEEE Institute of Electrical and Electronics EngineersIANA International Assigned Number AuthorityISO International Standards OrganizationITU-T International Telecommunication Union TelecommunicationStandardization SectorEIA / TIA Electronics Industry Association / Telecommunication IndustryAssociation

    ANSI American National Standards Institute

    Network SegmentationBreaking up a larger network into a number of smaller ones is called asNetwork Segmentation and is accomplished using Routers, Switches andBridges.

    Causes of LAN Traffic congestion

  • 8/2/2019 1533160 Ccna Interview

    6/29

    1.Too many hosts in a broadcast domain2.Broadcast storms3.Multicasting4.Low Bandwidth5.Adding Hubs for connectivity to the network

    6.A large amount of ARP and IPX Traffic.

    Broadcast DomainA group of devices receiving broadcast frames initiating from any devicewithin the group.

    Collision DomainThe network area in Ethernet over, which frames that have collided anddamaged.

    Broadcast Storms

    An undesired event on the network caused by the simultaneous transmissionof any number of broadcasts across the network.

    MulticastingAny communication between a single sender and multiple receivers.

    ARPAddress Resolution Protocol, the protocol that traces IP addresses to MACaddresses.

    IPX

    Internetwork Packet Exchange, layer 3 protocol used in Novell Netwarenetworks for transferring information from servers to workstations.

    RouterIts a layer 3 device that connects 2 different networks and routes packets ofdata from one network to another. It breaks up Broadcast domain as well asCollision Domain.

    Advantages of Router1.Router dont forward Broadcasts by default.2.Perform access control on the traffic that flows through the router i.e.

    Packet Filtering.3.Network Address Translation.4.Quality of Service for particular network traffic.5.Can be used as a DHCP relay agent.7.Connects different VLANs.

    DCE-Data Communications Equipment

  • 8/2/2019 1533160 Ccna Interview

    7/29

    The DCE supplies the physical connection to the network, forwards traffic,and provides a clocking signal to synchronize data transmission between DTEand DCE devices.

    DTE-Data Terminal Equipment

    Any device located at the end user i.e. network interface serving as adestination or source or both. DTE includes devices such as Multiplexers,routers, protocol translators and computers.

    Different Modes for configuring a router1.User Mode- some basic commands like ping, telnet can be done. Promptwill be Router >2.Execution or Privilege or Enable Mode- can view all configuration details,minimal commands like ping, telnet, and clock setting. Prompt will be Router#3.Global Configuration Mode- where all configurations are done. Prompt will

    be Router(config)#

    Sub Configuration Modes1.Interface configuration mode, prompt will be Router(config-if)#2.Router configuration mode, prompt will be Router(config-router)#3.Line configuration mode, prompt will be Router(config-line)#

    What is difference between Switch & Hub?Switch:Switches operate at Layer 2 Data Link Layer

    Address LearningForward / Filter decision using MAC addressLoop AvoidanceBreakup collision domains

  • 8/2/2019 1533160 Ccna Interview

    8/29

    Switches create separate collision domains but a single broadcast domain

    Hub:Hub operates at Layer 1 Physical LayerNo Filtering

    No AddressingHub creates single collision domain and single broadcast domainMake forwarding to all the ports when signal is arrivedWhat is PING utility?PING Packet Internet Gopher

    A utility that verifies connections to one or more remote hosts. The pingcommand uses the ICMP echo request and echo reply packets to determinewhether a particular IP system on a network is functional. Ping is useful fordiagnosing IP network or router failures.

    What is a VLAN? What does VLAN provide?VLAN Virtual Local Area NetworkVlan is a logical grouping or segmenting a network connected to administrativelydefined ports on a switch, they provide Broadcast control, Security and Flexibility.

    What is Subnetting? Why is it used?Used in IP Networks to break up larger networks into smaller subnetworks. It isused to reduce network traffic, Optimized network performance, and simplifymanagement i.e. to identify and isolate network problems.

    Difference between the Communication and Transmission?

    Communication is the process of sending and receiving data by means of a datacable that is connected externally.Transmission means the transfer of data from the source to the destination.

    What is RAID?A method used to standardize and categorize fault-tolerant disk systems. RAIDlevels provide various mixes of performance, reliability, and cost. Some serversprovide three of the RAID levels: Level 0 (striping), Level 1 (mirroring), and Level5 (striping & parity).

    What are 10Base2, 10Base5 and 10BaseT Ethernet LANs?10Base2 an Ethernet term meaning a maximum transfer rate of 10 Megabits persecond that uses baseband signaling, with a contiguous cable segment length of200 meters (185mts). Known as Thinnet.

  • 8/2/2019 1533160 Ccna Interview

    9/29

    10Base5 an Ethernet term meaning a maximum transfer rate of 10 Megabits persecond that uses baseband signaling, with a contiguous cable segment length of500 meters. Known as Thicknet.

    10BaseT an Ethernet term meaning a maximum transfer rate of 10 Megabits per

    second that uses two pairs of twisted-pair baseband signaling, with a contiguouscable segment length of 100 meters.

    What are the two types of Transmission Technology available?Point to Point and Broadcast

    What is point-to-point protocol?An industry standard suite of protocols for the use of point-to-point links totransport multiprotocol datagrams.

    What are the possible ways of data exchange?

    SimplexHalf-duplexFull-duplex

    What is difference between Baseband and Broadband Transmission?In a baseband transmission, the entire bandwidth of the cable is consumed by asingle signal.

    In broadband transmission, signals are sent on multiple frequencies, allowingmultiple signals to be sent simultaneously.

    What is Protocol Data Unit?The processes at each layer of the OSI model.Layers PDUTransport SegmentsNetwork Packets/DatagramsData Link FramesPhysical Bits

    What are major types of Networks and explain?Peer-to-Peer NetworkComputers can act as both servers sharing resources and as clients using theresources.

    Server-based NetworkProvide centralized control of network resources and rely on server computers toprovide security and network administration

    What is Passive Topology?

  • 8/2/2019 1533160 Ccna Interview

    10/29

    When the computers on the network simply listen and receive the signal, they arereferred to as passive because they dont amplify the signal in any way.

    What is Mesh Network?A network in which there are multiple network links between computers to

    provide multiple paths for data to travel.

    How Gateway is different from Routers?Gateway

    A device connected to multiple physical TCP/IP networks capable of routing ordelivering IP packets between them.

    RouterIts a layer 3 device that connects 2 different networks and routes packets of datafrom one network to another. It breaks up Broadcast domain as well as CollisionDomain.

    What is Brouter?Its a Hybrid device that combines the features of both bridges and routers.

    What is Subnet?A subdivision of an IP network.What is Frame relay, in which layer it comes?Frame relay is an industry standard, shared access, switched Data Link Layerencapsulation that services multiple virtual circuits and protocols betweenconnected mechanism.

    Frame relay is a packet-switched technology.

    What is Terminal Emulation, in which layer it comes?The use of software, installed on PC or LAN server, that allows the PC to functionas if it were dumb terminal directly attached to a particular type of mainframe.Telnet is also called as terminal emulation. It belongs to application layer.

    What is Beaconing?An FDDI frame or Token Ring frame that points to serious problem with the ring,such as a broken cable. The beacon frame carries the address of the stationthought to be down.

    What are NetBIOS and NetBEUI?NetBIOS Network Basic Input / Output System

    An application-programming interface (API) that can be used by programs on alocal area network (LAN). NetBIOS provides programs with a uniform set ofcommands for requesting the lower-level services required to manage names,conduct sessions, and send datagrams between nodes on a network.

  • 8/2/2019 1533160 Ccna Interview

    11/29

    NetBEUI NetBIOS Extended User InterfaceAn improved version of the NetBIOS protocol, a network protocol native toMicrosoft Networking. It is usually used in small, department-size local areanetworks (LANs) of 1 to 200 clients. It can use Token Ring source routing as its

    only method of routing.

    What is Cladding?A layer of a glass surrounding the center fiber of glass inside a fiber-optic cable.

    What is Attenuation?In communication weakening or loss of signal energy, typically caused bydistance.What is MAC address?The address for a device as it is identified at the Media Access Control (MAC)

    layer in the network architecture. MAC address is usually stored in ROM on thenetwork adapter card and is unique.

    What is ICMP?ICMP Internet Control Message ProtocolIt is a Network Layer Internet protocol, which can report errors and statusinformation. We can use the ping command to send ICMP echo requestmessages and record the receipt of ICMP echo reply messages. With thesemessages, we can detect network or host communication failures andtroubleshoot common TCP/IP connectivity problems.

    What is difference between ARP and RARP?ARP Address Resolution ProtocolThe protocol that traces IP addresses to MAC addresses.

    RARP Reverse Address Resolution ProtocolThe protocol within the TCP/IP stack that maps MAC addresses to IP addresses.

    What is the difference between TFTP and FTP application layer protocols?TFTP Trivial File Transfer Protocol

    A stripped down version of FTP, easy to use and fast. TFTP has no Directorybrowsing, no Authentication and insecure it can only send and receive files.

    FTP File Transfer ProtocolThe TCP/IP protocol used for transmitting files between network nodes. FTPallows access to both Directories and files, manipulating directories, typing filecontents and copying files between hosts.

    Explain 5-4-3 rule?

  • 8/2/2019 1533160 Ccna Interview

    12/29

    In a Ethernet network, between any two points on the network, there can be nomore than five network segments or four repeaters, and of those five segmentsonly three of segments can be populated.

    What MAU?

    MAU Multistation Access Unit

    What is the difference between routable and non- routable protocols?Routable protocols can work with a router and can be used to build largenetworks. Non-Routable protocols are designed to work on small, local networksand cannot be used with a router.

    What is logical link control?One of two sublayers of the data link layer of OSI reference model, as defined bythe IEEE 802 standard. This sublayer is responsible for error detection but notcorrection, flow control and framing.

    What is Virtual Channel?A logical circuit that is created by Virtual channel links. It carries data betweentwo endpoints in a network.

    The other name for Virtual Channel is Virtual Circuit.

    What is Virtual Path?Along any transmission path from a given source to a given destination, a groupof virtual circuits can be grouped together into what is called path.

    What is Packet Filter?

    What is multicast routing?Sending a message to a group multicast address is called multicasting, and itsrouting algorithm is called multicast routing.

    What is IGP (Interior Gateway Protocol)?Any protocol used by an internetwork to exchange routing data within anautonomous system. E.g. RIP, IGRP and OSPF.

    What is EGP (Exterior Gateway Protocol)?It is the protocol the routers in neighboring autonomous systems use to identifythe set of networks that can be reached within or via each autonomous system.

    What is Autonomous System?

  • 8/2/2019 1533160 Ccna Interview

    13/29

    A group of Networks under mutual administration that share the same routingmethodology. Autonomous Systems are subdivided by Areas and must beassigned an individual 16-bit number by the IANA.

    What is BGP (Border Gateway Protocol)?

    It is a protocol used to advertise the set of networks that can be reached withinan autonomous system. BGP enables this information to be shared with theautonomous system. This is newer than EGP (Exterior Gateway Protocol).

    What is Gateway-to-Gateway protocol?It is a protocol formerly used to exchange routing information between Internetcore routers.

    What is Kerberos?An authentication mechanism used to verify user or host identity. Kerberos usesencryption to prevent intruders from discovering passwords and gaining

    unauthorized access to files.What is OSPF (Open Shortest Path First)?OSPF is the first Open Standard Link State Routing Protocol.Its a Classless Routing Protocol meaning when updates are sent they send bothIP address and Subnet mask.

    Administrative Distance is 110.Metric used is Cost i.e. Cost= 108

    ---------------Bandwidth

    OSPF uses algorithm to build Routing Table called Dijisktra.

    Sends only Incremental and Triggered updates. Route updates sent within therouters will be secured with the help of MD5 encrypted password.Routing updates are sent as Multicast addresses i.e.

    224.0.0.5 SPF (all OSPF routers)224.0.0.6 Designated router and Backup Designated router

    OSPF maintains 3 types of Routing table i.e. Routing Table (Dijisktra), TopologyTable (SPF) and Neighborship Table.In OSPF Routers can be connected in two methods i.e.

    Point-to-Point LinkPoint to Multipoint Link

    In OSPF a single large Autonomous system is break into small areas. Thereshould be atleast one area by name Area 0. Its called as Backbone Area.The Router that connects more than one Area is called as Area Border Routers.The Router that connects to other Autonomous system is called as AutonomousSystem Boundary Router.

    Router ID

  • 8/2/2019 1533160 Ccna Interview

    14/29

    If the priority is set 1 to all the routers then there is a tie in priority, in this case itwill check if there is any loopback address is given to any router if not the routerwith highest value of IP address will be elected as Router ID.This router will be then called as Designated Router and the router with lessvalue of IP address after Designated Router will be called as Backup Designated

    Router.If a Router has all interfaces existing in single area than that router is called asInternal Router.Whenever a router send routing updates to DR and BDR it uses Destinationaddress as 224.0.0.6 and when DR send updates to all the routers it usesDestination address as 224.0.0.5.In OSPF routing updates are called as Link State Advertisements.If an OSPF router wants to send updates to other OSPF router then it shouldcarry 3 requirements i.e.Hello Packets ReceivedIt contains Area Id, Uptime, Password, Hello Interval, Dead Interval,

    Neighborship Table and Router Id.Point-to-Point Link Point to Multipoint LinkHalo Interval 10 Halo Interval 30Dead Interval 40 Dead Interval 120

    Adjacency BuiltIf both router interfaces belongs to same Area, same Password then Hallo andDead Intervals should be set same.

    Neighborship BuiltIf both routers are adjacent to each other then Neighborship is built in Routers.

    When one routerRA sends updates i.e. Link State Advertisements to otherrouterRB it will send that update to Topology Database of routerRB and will runan algorithm SPF on routerRB to create a new Topology Table. After that Dijisktra

    Algorithm is run to find the best path and that entry will be put in Routing Table.The router when sends Hallo packets to other router a Neighborship Table is seton that Router.

    What is SLIP (Serial Line Internet Protocol)?An industry standard serial encapsulation for point-to-point connections thatsupports only a single routed protocol, TCP/IP.

    What is RIP (Routing Information Protocol)?Rip run on any Routers hence called as Open Standard Distance Vector RoutingProtocol.Its a classful routing protocol meaning when updates are sent they send only IPaddress but not subnet mask.

  • 8/2/2019 1533160 Ccna Interview

    15/29

    Administrative Distance is 120.Metric used is Hop counts (number of routers to cross to reach the destination).Rip uses algorithm name Bellman Ford Algorithm to determine the best pathselection.Supports maximum 15 Hops.

    Supports 6 paths if there is a tie in metric i.e. same metric.

    RIP TimersRoute update timer 30secondsRoute invalid timer 180 secondsHolddown timer 180 secondsRoute flush timer 240 seconds

    What are the advantages and disadvantages of the three types of routingtables?

    What is the HELLO protocol used for?The HELLO protocol uses time instead of distance to determine optimal routing.It is an alternative to the Routing Information Protocol.

    What is the difference between interior and exterior neighbor gateways?Interior gateways connect LANs of one organization, whereas exterior gatewaysconnect the organization to the outside world.

    What protocol do DNS name servers use?

    DNS uses UDP for communication between servers. It offers a connectionlessdatagram service that guarantees neither delivery nor correct sequencing ofdelivered packets (much like IP).

    What is a DNS resource record?A resource record is an entry in a name server's database. There are severaltypes of resource records used, including name-to-address resolutioninformation. Resource records are maintained as ASCII files.

    BOOTP helps a diskless workstation boot. How does it get a message tothe network looking for its ip address?

    A protocol used primarily on TCP/IP networks to configure diskless workstations.BOOTP sends a UDP message with a subnetwork broadcast address and waitsfor a reply from a server that gives it the IP address.What is anonymous FTP and why would you use it?

    Anonymous FTP enables users to connect to a host without using a valid loginand password. Usually, anonymous FTP uses a login called anonymous or guest,with the password usually requesting the user's ID for tracking purposes only.

    Anonymous FTP is used to enable a large number of users to access files.

  • 8/2/2019 1533160 Ccna Interview

    16/29

    How do Data Link layer addresses and Network addresses differ? Give adescription of each.

    Besides the names suggesting that addresses reside at different layers, otherdifferences do exist. Data Link layer addresses are assigned by the manufacturer

    and identify the actual hardware device. A Network layer address is a logicaladdress assigned by the network administrator to identify a device running aNetwork layer protocol, such as IP.

    What are the differences or similarities, if any, between repeaters, hubs,and concentrators?

    First, they are all Physical layer devices. Repeaters regenerate and amplify thesignal traveling on the wire to extend the normal distance limitation of the signal.

    A repeater can connect two network segments. A hub and a concentrator are thesame thing, with hub being the more common term used today. Hubs are

    repeaters with 824 ports. When one machine attached to the hub sendsanything over the network, all the devices attached to the hub receive that signal.

    Describe, in general terms, the reasons for implementing LANsegmentation.

    It confines user traffic to a segment and addresses and solves distance limitationproblems. Segmentation also cuts down on the traffic generated by broadcastsand multicasts, and thereby increases performance. Because of the reduction ofthe size of the segment, collisions and overall traffic also are reduced.

    Which of the three switching methods is fastest, and why?

    Cut-Through switching is the fastest method because the switches read only thefirst six bytes of the frame before forwarding it.

    What services do bridges and switches provide?

    Bridges and switches can determine whether a frame is destined for the localnetwork segment or needs to be forwarded to another network segment basedon the destination MAC address.

    What are some of the advantages to using bridging and switching insteadof routing?

    Increased overhead and latency

    Reduced overhead and latency

  • 8/2/2019 1533160 Ccna Interview

    17/29

    Broadcast propagation

    Lower equipment costs

    Answer A is incorrect because it is a negative aspect of routing as compared to

    switching. Answer B is correct because bridges and switches look only atData Link layer information, whereas routers must process all the logicaladdress information in the route tables.Answer C is incorrect becauseswitches do not have this effect. Answer D is incorrect because switches are nowvery sophisticated and can cost as much as routers.

    What would be the best network segmentation device if you wanted toconnect two dissimilar networks, such as Ethernet and Token-Ring?

    A bridge or a switch

    A concentrator or a hub

    A router

    A gateway

    Answer A is incorrect because bridges and switches cant perform protocoltranslation. Answer B is incorrect because neither a concentrator nor a hub cansegment a network. Answer C is correct because routers can providetranslation between dissimilar protocols, among other things.Answer D isincorrect because a gateway functions as a translator, not a segmentation

    device.

    Why is overhead or latency associated with routers? (Choose all thatapply.)

    Routers must work at layer 3, which is inherently slower.

    Routers must examine the frame header before passing it.

    Routers must hold a frame for a given period of time for security purposes.

    Routers must translate the signal, but then the signal can cut through directly.

    Answer A is correct because resolving those addresses is more timeconsuming. Answer B is correct because the router must examine andconsider the frame header detail before passing it, which slowsprocessing.Answers C and D are incorrect because they are simply notaccurate.

  • 8/2/2019 1533160 Ccna Interview

    18/29

  • 8/2/2019 1533160 Ccna Interview

    19/29

    What is an advantage of having a VLAN (Virtual LAN)?

    Traffic control between VLANs is processor intensive.

    Broadcasts of multicast traffic are contained within one VLAN.

    Theyre more flexible because they enable device assignment only on a port-by-port basis.

    With VLANs, users are not inherently isolated by group.

    Answer A is incorrect because there is nothing more or less processor intensiveabout VLANs. Answer B is incorrect because there is no such thing as abroadcast of multicast traffic; the words broadcast and multicast are mutuallyexclusive. Answer C is correct because VLANs extend the flexibility of LANsby enabling the port-by-port isolation of users and assignment to distinct

    VLANs if desired.Answer D is incorrect because VLANs by their definitionsegment workgroups.

    Which two characteristics describe Store and Forward switching?

    The entire frame is copied into the buffer.

    The frame is forwarded based on the first six bytes.

    It provides higher throughput.

    It provides error checking.

    Answers A and D are correct because Store and Forward switching copiesthe entire frame into the buffer before forwarding, which also provides forerror checking. Answers B and C are incorrect because they describe Cut-Through.

    Which two characteristics describe Cut-Through switching?

    The entire frame is copied into the buffer.

    The frame is forwarded based on the first six bytes.

    It provides higher throughput.

    It provides error checking.

    Answers B and C are correct because Cut-Through switching providesforwarding based on what is contained in the first six bytes of the frame,

  • 8/2/2019 1533160 Ccna Interview

    20/29

    which provides higher throughput. Answers A and D are incorrect becausethey describe Store and Forward switching.

    Name the Cisco proprietary protocol that allows VLANs to be managedwithin domains.

    VTP (VLAN Trunking Protocol) allows multiple VLANs to be managed within asingle VTP domain.

    Name the three VTP modes in which a switch can operate.

    VTP switches operate in one of three modes: server, client, or transparent.

    Name the Cisco proprietary protocol used on Fast Ethernet VLAN trunklinks.

    ISL (Inter-Switch Link) protocol is used to encapsulate VLAN traffic over FastEthernet trunk links.

    At what layer of the OSI model do VLANs operate?

    VLANs operate at layer 2 of the OSI model.

    To allow Inter-VLAN communication, what does your router require?

    You need a router that has some kind of viable trunking connection, such as FastEthernet (ISL), and must be configured with subinterfaces.

    Choose one method of decreasing broadcasts across a switched network.

    Set up an Intra-LAN.

    Set up a workgroup banded by a server cluster.

    Set up a VLAN to isolate traffic.

    Set up a firewall to isolate traffic.

    Answers A and B are incorrect because they are simply false. Answer C iscorrect because each VLAN becomes its own broadcast domain.Answer Dis incorrect because a firewall is meant to shelter internal networks from intrusionfrom the outside.

    Choose two benefits of VLAN implementation.

    VLANs incorporate only one router per routed subnet.

  • 8/2/2019 1533160 Ccna Interview

    21/29

  • 8/2/2019 1533160 Ccna Interview

    22/29

    At which layer of the OSI model does ISL function?

    Data Link layer

    Network layer

    Physical layer

    LLC Data Link sublayer

    Answer A is correct because ISL functions at the Data Link layer of the OSImodel.Answers B and C are incorrect because ISL does not function at thoselayers of the OSI model. Answer D is incorrect because the specific sublayerdoes not have any distinction in this context.

    Which method is used by VTP to convey VLAN configuration information

    within its management domain?

    Through directed broadcasts

    Through LSAs local service advertisements

    Through multicast advertisements

    Through port flooding

    Answer C is correct because multicast advertisement convey configuration

    information to all connected switches in the same managementdomain.Answers A, B, and D is incorrect because they do not conveyinformation within management domains.

    In ATM LANE, what factor determines the type of trunking protocol used?

    The link type

    The encapsulation mode

    The density of VLANs

    The ATM LANE Module type

    Answer A is correct because the link type determines the type of trunkingprotocol used.Answers B and C are incorrect because they are simply false.

  • 8/2/2019 1533160 Ccna Interview

    23/29

    Answer D is incorrect because the ATM LANE Module is a hardware card anddoes not affect trunking protocols.

    What is VTP designed to do?

    It enables an administrator to manage VLANs across multiple trunk links.

    It enables an administrator to manage VLANs across dissimilar trunkingprotocols.

    It enables an administrator to merge the management duties of more than twotrunk links together.

    It is used to synchronize VTP advertisements across multiple trunk links.

    Answer A is incorrect because trunk links do not address the aspect of

    communication. Answer B is correct because VTP is designed to enable anadministrator to manage VLANs running dissimilar trunkingprotocols.Answer C is incorrect because a trunk link does not necessary entailmanagement duties on its own. Answer D is incorrect because it is simply false.

    What is a limitation of Intra-VLAN traffic?

    Communication is limited to VLANs directly connected to a router.

    Communication is limited to VLANs off the same switch backplane.

    Communication is limited to devices within the same VLAN.

    Communication is limited to devices between VLANs.

    Answer A is incorrect because VLANs are connected for Inter-VLANcommunication. Answer B is incorrect because the backplane is where traffic isactually switched, and it is a hardware component. Answer C is correctbecause that is the very definition of Intra-VLAN traffic. Answer D is incorrectbecause VLANs cannot talk to each other without a router.

    VTP (Virtual Trunking Protocol) exists at which layer and for what purpose?

    Layer 2, to maintain VLAN configuration consistency

    Layer 2, to maintain trunking protocol synchronization

  • 8/2/2019 1533160 Ccna Interview

    24/29

    Layer 2, to maintain domain synchronization

    Layer 3, to maintain access lists

    Answer A is correct because VTP operates at layer 2 and maintains VLAN

    configuration consistency.Although the OSI layer is correct, answers B and Care incorrect because the second portion of the answers is incorrect. Answer D isincorrect because VTP and switching do not operate at layer 3 and access listsare maintained on routers.

    What two basic steps are necessary to create access list filters?

    The first step is to build the list at global configuration mode using the access-listcommand followed by an access list number signifying the type. The second stepis to apply the list to an interface by using the [protocol type] access-groupcommand followed by the access list number and parameters.

    Identify the appropriate access list range values used to create accesslists.

    IP standard access list = 199

    IP extended access list = 100199

    IPX standard access list = 800899

    IPX extended access list = 900999

    IPX SAP filter = 10001099

    What is the purpose of a wildcard mask?

    To enable an administrator to apply an access list rule to a group of hosts orsubnets by masking off bits within an IP address, making the bit positions withinthe mask variable.

    Name the access list keywords.

    any = 0.0.0.0 255.255.255.255

    host = specific IP address of an end host (192.16.10.2 0.0.0.0)

  • 8/2/2019 1533160 Ccna Interview

    25/29

    How does the direction in which an access list is applied affect datagramprocessing?

    Access lists applied to an interface in an inbound direction determine whether adatagram received on an interface will be forwarded or blocked. Access lists

    applied to an interface in an outbound direction determine whether a datagramalready received will be forwarded out that interface.

    What is the access list number range used to identify an IP standardaccess list?

    0100

    1100

    199

    110

    101199

    Answer C is correct because the correct value range to identify an IPstandard access list is 199. Answers A, B, D, and E are incorrect becausethey are not ranges used to identify an IP standard access list.

    Which of the following represents the default wildcard mask value?

    0.0.0.0

    255.255.255.255

    0.0.255.255

    255.255.255.0

    Answer A is correct because, if unspecified, the default mask used is0.0.0.0. Answers B and C are incorrect because neither are the default mask.

    Answer D is incorrect because it is a regular mask, which is not used for wildcard

    masking.

    Write the command that would apply access list 100 to interface E0 in anoutbound direction. (Assume you are already at interface configurationmode of the Ethernet interface.)

    IP access-group 100 out

  • 8/2/2019 1533160 Ccna Interview

    26/29

    IP access-list 100 out

    IP access-group 100 in

    IP access-group E0 out

    Answer A is correct because IP access-group 100 out is the command thatwould apply access list 100 to interface E0 in an outbound direction.

    Answers B, C, and D are simply incorrect.

    Which of the following commands creates a standard IP extended accesslist that enables ping echo requests to be sent from any host on network166.10.0.0 to network 155.10.0.0?

    Access-list 12 permit IP 166.10.0.0.0.0.255.255 host 155.10.0.0

    Access-list 120 permit ICMP 166.10.0.0 0.0.255.155 155.10.0.0 0.0.0.255 eqecho

    Access-list 120 permit 166.10.0.0.0.0.255.255 host 155.10.0.0

    Access-list 120 permit ICMP 166.10.0.0 0.0.255.255 155.10.0.0 0.0.255.255 eqecho

    Answer A is incorrect because the access list number is not an extended listnumber. Also, the protocol type is IP not ICMP, and the destination is specifyingthe host keyword but using a subnet value instead, which is invalid. Answer B is

    incorrect because it uses an incorrect inverse mask for the destination network.Answer C is incorrect because it does not specify the protocol after the permitstatement and also is using the host keyword with the destinationnetwork.Answer D is correct because it uses a valid access list number andsyntax to forward ICMP echo requests.

    Write the command to view all access lists created on your routerregardless of protocol.

    show access-lists

    show ip access-lists

    show ipx interfaces

    show ipx servers

    Answer A is correct because show access-lists enables you to view allaccess lists created on your router regardless of protocol. Answers B, C,

  • 8/2/2019 1533160 Ccna Interview

    27/29

    and D are incorrect because these commands do not enable you to perform thatspecific function.

    Which of the following best describes the function of the following accesslist line?

    Access-list 87 permit 145.19.2.1 0.0.0.0 155.6.0.0 0.0.255.255

    Any host on subnet 155.6.0.0 can access host 145.19.2.1.

    It is an IPX standard access list allowing host 145.19.2.1 to access any host onsubnet 155.6.0.0.

    It is an extended IP access list allowing hosts on network 145.19.0.0 to accesshosts on network 145.19.0.0, which can access host 155.6.255.255.

    It is an IP standard access list enabling host 145.19.2.1 to access any host onsubnet 155.6.0.0.

    Answers A and C are incorrect because they do not state the actions of thisaccess list correctly. Answer B is incorrect because this is not an IPX standardlist.Answer D is correct because it correctly describes the access listbehavior.

    Which of the following commands applies IPX SAP filter 1010 to aninterface in the outbound direction?

    IPX access-group 1010 out

    IPX output-sap-filter 1010

    IPX output sap-filter 1010

    IPX-sap-filter 1010 out

    Answer A is incorrect because it is the syntax used to define a standard orextended list. Answer B is correct because it uses the correct syntax.

    Answer C is incorrect because it is missing the hyphen between the output and

    sap commands. Answer D is incorrect because it is a completely invalidcommand.

    Which command can you use to display a list of access list filtersconfigured on your router for IP only?

    show IP access-lists

  • 8/2/2019 1533160 Ccna Interview

    28/29

    show access-lists

    show IPX interfaces

    show IPX servers

    Answer A is correct because show IP access-lists enables you to display alist of access list filters configured on your router for IP only. Answers B, C,and D are incorrect because these commands do not enable that specificfunction.

    Write the command to bind IPX extended access list 901 to interface serial0 on an inbound direction.

    IPX access-group 901 in

    IPX access-group 901 S0 out

    IPX access-group 910 in

    IPX access-group 901 out

    Answer A is correct because IPX access-group 901 in is the command thatwill bind the IPX extended access list 901 to interface serial 0 on aninbound direction. Answers B, C, and D are incorrect because they are simplyfalse.

    Which two of the following commands will enable Telnet traffic from allhosts on network 166.10.0.0 to be forwarded to the Telnet server137.2.10.1?

    Access-list 110 permit TCP 166.10.0.0 0.0.255.255 host 137.2.10.1 eq Telnet

    Access-list 99 permit TCP 166.10.0.0 0.0.255.255 137.2.10.1 0.0.0.0. eq 23

    Access-list 110 permit TCP 166.10.0.0 0.0.255.255 137.2.10.1 0.0.0.0 eq 23

    Access-list 110 permit IP 166.10.0.0 0.0.255.255 137.2.10.1 0.0.0.0. eq 23

    Answers A and C are correct. The only difference between the two is thatAnswer A uses the host keyword and the Telnet keyword instead of a portnumber. Answer B is incorrect because the access list number is 99, which isused for standard lists. Answer D is incorrect because it uses IP instead of TCPafter the permit statement.

  • 8/2/2019 1533160 Ccna Interview

    29/29