Sunteți pe pagina 1din 22

Top 70 CCNA Interview Questions & Answers

1) What is Routing?
Routing is the process of finding a path on which data can pass from source to destination.
Routing is done by a device called routers, which are network layer devices.

2) What is the purpose of the Data Link?


The job of the Data Link layer is to check messages are sent to the right device. Another function
of this layer is framing.

3) What is the key advantage of using switches?


When a switch receives a signal, it creates a frame out of the bits that were from that signal. With
this process, it gains access and reads the destination address, after which it forwards that frame
to the appropriate port. This is a very efficient means of data transmission, instead of
broadcasting it on all ports.

4) When does network congestion occur?


Network congestion occurs when too many users are trying to use the same bandwidth. This is
especially true in big networks that do not resort to network segmentation.

5) What is a Window in networking terms?


A Window refers to the number of segments that are allowed to be sent from source to
destination before an acknowledgment is sent back.

6) Does a bridge divide a network into smaller sections?


Not really. What a bridge actually does is to take the large network and filter it, without changing
the size of the network.

7) Which LAN switching method is used in CISCO Catalyst 5000?


CISCO Catalyst 5000 uses the Store-and-forward switching method. It stores the entire frame to
its buffers and performs a CRC check before deciding whether or not to forward that data frame.

8 ) What is the role of the LLC sublayer?


The LLC sublayer stands for Logical Link Control. It can provide optional services to an
application developer. One option is to provide flow control to the Network layer by using
stop/start codes. The LLC can also provide error correction.

9) How does RIP differ from IGRP?


RIP relies on the number of hops in order to determine the best route to a network. On the other
hand, IGRP takes consideration many factors before it decides the best route to take, such as
bandwidth, reliability, MTU and hop count.

10) What are the different memories used in a CISCO router?


Different memories used in a CISCO router are:

– NVRAM stores the startup configuration file


– DRAM stores the configuration file that is being executed
– Flash Memory – stores the Cisco IOS.

11) What is BootP?


BootP is a protocol that is used to boot diskless workstations that are connected to the network. It
is short for Boot Program. Diskless workstations also use BootP in order to determine its own IP
address as well as the IP address of the server PC.

12) What is the function of the Application Layer in networking?


The Application Layer supports the communication components of an application and provides
network services to application processes that span beyond the OSI reference model
specifications. It also synchronizes applications on the server and client.

13) Differentiate User Mode from Privileged Mode


User Mode is used for regular task when using a CISCO router, such as to view system
information, connecting to remote devices, and checking the status of the router. On the other
hand, privileged mode includes all options that are available for User Mode, plus more. You can
use this mode in order to make configurations on the router, including making tests and
debugging.

14) What is 100BaseFX?


This is Ethernet that makes use of fiber optic cable as the main transmission medium. The 100
stands for 100Mbps, which is the data speed.

15) Differentiate full-duplex from half-duplex.


In full-duplex, both the transmitting device and the receiving device can communicate
simultaneously, that is, both can be transmitting and receiving at the same time. In the case of
half-duplex, a device cannot receive while it is transmitting, and vice versa.

16) What is MTU?


MTU stands for Maximum Transmission Unit. It refers to the maximum packet size that can be
sent out onto the data line without the need to fragment it.

17) How does cut-through LAN switching work?


In Cut-Through LAN switching, as soon as the router receives the data frame, it will
immediately send it out again and forward it to the next network segment after reading the
destination address.

18) What is latency?


Latency is the amount of time delay that measures the point from which a network device
receives a data frame to the time it sends it out again towards another network segment.

19) Utilizing RIP, what is the limit when it comes to the number of hops?
The maximum limit is 15 hop counts. Anything higher than 15 indicates that the network is
considered unreachable.

20) What is a Frame Relay?


Frame Relay is a WAN protocol that provides connection-oriented communication by creating
and maintaining virtual circuits. It has a high-performance rating and operates at the Data Link
and Physical Layers.

21) How do you configure a Cisco router to route IPX?


The initial thing to do is to enable IPX routing by using the “IPX routing” command. Each
interface that is used in the IPX network is then configured with a network number and
encapsulation method.

22) What are the different IPX access lists?


There are two types of IPX access lists

1. Standard

2. Extended.

Standard Access List can only filter the source or destination IP address. An Extended Access
List uses the source and destination IP addresses, port, socket, and protocol when filtering a
network.

23) Explain the benefits of VLANs.


VLANs allow the creation of collision domains by groups other than just physical location.
Using VLANs, it is possible to establish networks by different means, such as by function, type
of hardware, protocol, among others. This is a big advantage when compared to conventional
LANs wherein collision domains are always tied to physical location.

24) What is subnetting?


Subnetting is the process of creating smaller networks from a big parent network. As a part of a
network, each subnet is assigned some additional parameters or identifier to indicate its subnet
number.

25) What are the advantages of a layered model in the networking industry?
A layered network offers many advantages. It allows administrators to make changes in one
layer without the need to make changes in the other layers. Specialization is encouraged,
allowing the network industry to make progress faster. A layered model also lets administrators
troubleshoot problems more efficiently.
26) Why is UDP lease favored when compared to TCP?
It’s because UDP is unreliable and unsequenced. It is not capable of establishing virtual circuits
and acknowledgments.

27) What are some standards supported by the Presentation layer?


Presentation layer supports many standards, which ensures that data is presented correctly. These
include PICT, TIFF, and JPEG for graphics, MIDI, MPEG and QuickTime for Video/Audio.

28) What’s the easiest way to remotely configure a router?


In cases when you need to configure a router remotely, the most convenient is to use the Cisco
AutoInstall Procedure. However, the router must be connected to the WAN or LAN through one
of the interfaces.

29) What does the show protocol display?


– routed protocols that is configured on the router
– the address assigned on each interface
– the encapsulation method that was configured on each interface

30) How do you depict an IP address?


It can be done in three possible ways:
– using Dotted-decimal. For example: 192.168.0.1
– using Binary. For example: 10000010.00111011.01110010.01110011
– using Hexadecimal. For example: 82 1E 10 A1

31) How do you go to privileged mode? How do you switch back to user mode?
To access privileged mode, you enter the command “enable” on the prompt. In order to get back
to user mode, enter the command “disable.”

32) What is HDLC?


HDLC stands for High-Level Data Link Control protocol. It is a propriety protocol of CISCO. It
is the default encapsulation operated within CISCO routers.

33) How are internetworks created?


Internetworks are created when networks are connected using routers. Specifically, the network
administrator assigns a logical address to every network that connects to the router.

34) What is Bandwidth?


Bandwidth refers to the transmission capacity of a medium. It is a measure of how much volume
a transmission channel can handle, and it is measured in Kbps.

35) How does Hold-downs work?


Hold-downs prevent regular update messages from reinstating a downed link by removing that
link from update messages. It uses triggered updates to reset the hold-down timer.

36) What are packets?


Packets are the results of data encapsulation. These are data that have been wrapped under the
different protocols of the OSI layers. Packets are also referred to as datagrams.

37) What are segments?


Segments are sections of a data stream that comes from the upper OSI layers and ready for
transmission towards the network. Segments are the logic units at the Transport Layer.

38) Give some benefits of LAN switching.


– allows full duplex data transmission and reception
– media rate adaption
– easy and efficient migration

39) What is Route Poisoning?


Route Poisoning is the process of inserting a table entry of 16 to a route, making it unreachable.
This technique is used in order to prevent problems caused by inconsistent updates on a route.

40) How do you find valid hosts in a subnet?


The best way to go about this is to use the equation 256 minus the subnet mask. The hosts that
are considered valid are those that can be found between the subnets.

41) What is DLCI?


DLCI, or Data Link Connection Identifiers, are normally assigned by a frame relay service
provider in order to uniquely identify each virtual circuit that exists on the network.

42) Briefly explain the conversion steps in data encapsulation.


From a data transmitter’s point of reference, data from the end user is converted to segments.
Segments are then passed on to the other layers and converted into packets or datagrams. These
packets are then converted into frames before passing on to the network interface. Finally,
frames are converted to bits prior to actual data transmission.

43) What are the different types of passwords used in securing a CISCO router?
There are actually five types of passwords that can be used. These enable secret, virtual terminal,
console, and auxiliary.

44) Why is network segmentation a good idea when managing a large network?
For a network administration, segmenting a network would help ease network traffic and ensures
that high bandwidth is made available at all times for all users. This translates to better
performance, especially for a growing network.
45) What are the things that can be accessed in a CISCO router’s identifying information?
The hostname and the Interfaces. The hostname is the name of your router. The Interfaces are
fixed configurations that refer to the router ports.

46) Differenate Logical Topology from Physical Topology


Logical Topology refers to the signal path through the physical topology. Physical Topology is
the actual layout of the network medium.

47) What causes a triggered update to reset the router hold-down timer?
This may happen when the hold-down timer has already expired, or when the router received a
processing task that incidentally was proportional to the number of links in the internetwork.

48) In configuring a router, what command must be used if you want to delete the
configuration data that is stored in the NVRAM?
A. erase running-config
B. erase startup-config
C. erase NVRAM
D. delete NVRAM
Correct Answer: B. erase startup-config

49) Referring to the commands shown, what command must next be used on the branch
router prior to traffic being sent to the router?
Hostname: Branch Hostname: Remote
PH# 123-6000, 123-6001 PH# 123-8000, 123-8001
SPID1: 32055512360001 SPID1: 32055512380001
SPID2: 32055512360002 SPID2: 32055512380002
ISDN switch-type basic ni
username Remote password cisco
interface bri0
IP address 10.1.1.1 255.255.255.0
encapsulation PPP
PPP authentication chap
ISDN spid1 41055512360001
ISDN spid2 41055512360002
dialer map IP 10.1.1.2 name Remote 1238001
dialer-list 1 protocol IP permit

Correct Answer: (config-if)# dialer-group 1

50) When configuring a router utilizing both physical and logical interfaces, what factor
must be considered in determining the OSPF router ID?
A. The highest IP address of any physical interface.
B. The lowest IP address of any logical interface.
C. The middle IP address of any logical interface.
D. The lowest IP address of any physical interface.
E. The highest IP address of any interface.
F. The highest IP address of any logical interface.
G. The lowest IP address of any interface.

Correct Answer: A. The highest IP address of any physical interface.

51) What is the difference between the switch, hub, and router?

Hub Switch Router

It is a device that filters and forwards packets


between LAN segments. Switches have a
single broadcast domain and multiple collision
Hub has a single broadcast domain and domains. It supports any packet protocol, as
collision domain. Anything comes in one port such it operates at the data link layer 2 and Router is a device which transm
is sent out to the others. layer 3 packets along networks.

52. What is the size of IP address?


Size of IP address is 32 bit for IPv4 and 128 bit for IPv6.

53. Mention what does data packets consist of?

A data packet consists of sender’s information, recipient’s information, and the data
contained. It also has the numeric identification number that defines the packet number and
order. When data is sent across the network, that information is segmented into data packets. In
short, data packets carry the information and routing configuration for your transferred message.

54. What is DHCP stand for?


DHCP stands for Dynamic Host Configuration Protocol. DHCP assigns an IP address
automatically to a given workstation client. You can also make static IPS for machines like
printers, servers, routers, and scanners.

55. Mention what BOOTP is?


BOOTP is a computer networking protocol used to deploy an IP address to network devices from
a configuration server.

56. Explain why UDP is lease favored when compared to TCP?


It is because UDP is un-sequenced and unreliable. It is not capable of creating virtual circuits and
acknowledgments

57. State the difference between dynamic IP and static IP addressing?


Dynamically IP addresses are provided by DHCP server, and static IP addresses are given
manually.

58. Mention the ranges for the private IP?


Ranges for private IP are

• Class A: 10.0.0.0 – 10.0.0.255


• Class B: 172.16.0.0 – 172.31.0.0
• Class C: 192.168.0.0 – 192.168.0.255

59. In how many ways you can access the router?


You can access it in three ways

• Telnet (IP)
• AUX (Telephone)
• Console (Cable)
60. What is EIGRP?
EIGRP stands for Enhanced Interior Gateway Routing Protocol; it is a routing protocol
designed by Cisco Systems. It is availed on a router to share routes with other routers within the
same autonomous system. Unlike other routers like RIP, EIGRP only sends incremental updates,
decreasing the workload on the router and the amount of data that needs to be transferred.

61. Mention what is the matric of EIGRP protocol?


EIGRP protocol consists of

• Bandwidth
• Load
• Delay
• Reliability
• MTU
• Maximum Transmission Unit

62. Mention what does the clock rate do?


Clockrate enables the routers or DCE equipment to communicate appropriately.

63. Mention what command you must use if you want to delete or remove the configuration
data that is stored in the NVRAM?
Erase startup- coding is the command you must use if you want to delete the configuration data
that is stored in the NVRAM

64. What is the difference between TCP and UDP?

TCP and UDP both are protocols for sending files across computer networks.

TCP (Transmission Control Protocol) UDP (User Datagram Protocol)

TCP is connection oriented protocol. When connection lost during


transferring files, the server would request the lost part. While UDP is based on connectionless protocol. When you sen
transferring a message, there is no corruption while transferring a no guarantee whether your transferred message will reach
message any leakage

The message will deliver in the order it is sent The message you sent may not be in the same order

Data in TCP is read as a stream, where one packet ends, and another Packets are transmitted individually and are guaranteed t
begins they arrive

Example of TCP includes World Wide Web, file transfer protocol, e- Example for UDP are VOIP (Voice Over Internet Protoc
mail, Trivial File Transfer Protocol),

65. Explain the difference between half-duplex and full-duplex?

Full duplex means that the communication can occur in both directions at the same time, while
half-duplex means that the communication can happen in one direction at a time.
66. What are the conversion steps of data encapsulation?

Conversion steps of data encapsulation includes

• Layer one, two and Three ( Application/presentation/session) : Alphanumeric input from


the user is converted into Data
• Layer Four (Transport): Data is converted into small segments
• Layer Five (Network): Data converted into packets or datagrams and Network header is
added
• Layer Six (Data Link): Datagrams or packets are built into frames
• Layer Seven (Physical): Frames are converted into bits

67. What command do we give if router IOS is stuck?


Cntrl+Shift+F6 and X is the command we give if router IOS is stuck.

68. What is route poisoning?


Route poisoning is a technique of preventing a network from transmitting packets through a
route that has become invalid.

69. What route entry will be assigned to dead or invalid route in case of RIP?
In the case of RIP table entry, 16 hops will be assigned to dead or invalid route making it
unreachable.

Top 50 Most Popular CCNA Interview Questions and


Answers
Last Updated:April 23, 2019
Frequently asked CCNA Interview Questions and Answers:
Top 50 most popularly asked interview questions and answers for cracking any CCNA
interview are listed in this article.

Firstly, we would recommend you to go through the tutorials of CCNA Series that we have
posted earlier, in order to get to know the basics of CCNA. These questions would help both
the fresher as well as experienced candidates in the interview preparation process.
Let’s take a look!!

Top 50 CCNA Interview Question and Answer


Given below is the list of most commonly asked CCNA Interview Questions and
Answers:
Q #1) What is Networking?
Ans: Networking is used to connect or operate with a network. It is the process of creating
and using wired or wireless networks for exchanging information, ideas, files and other
electronic communication.
Recommended read: Networking Interview Questions
Q #2) What does Protocol mean?
Ans: Protocol is defined as the rules that connect two or more devices to transfer the
information from one device to another. It helps to know how data is being transferred from
one network to another network for communication.
Q #3) What is OSI reference model?
Ans: OSI is a reference model that tells how information and data are communicated over a
network. It is a conceptual framework that understands the relationships of transmission.
Q #4) What are the different layers of OSI model?
Ans: Basically, there are 7 layers of OSI model. Each layer has its own functionality in the
OSI model.
They are:
• Layer 1 – Physical
• Layer 2 – Data Link Layer
• Layer 3 – Network
• Layer 4 – Transport
• Layer 5 – Session
• Layer 6 – Presentation
• Layer 7- Application
Q #5) What is a Switch and why we are using Switches?
Ans: Switch is used to receive the signal to create a frame. It forwards the packets
between various LAN segments. It supports packet control when the data is sent to Data
Link layer or Network layer of the OSI model.
While sending packets, a signal gets enabled and gets accessed by reading the destination
address and forwards the frame to appropriate frame, hence we use switches.

Q #6) What are Routers?


Ans: Routing is the process to find the path on which the information or data can pass from
the source to its destination. The device by which routing is done is called Routers.
Q #7) What is the difference between Switch, Routers, and Hub?
Ans: Switch
A Switch is used to receive the signal to create a frame. It forwards the packets between
various LAN segments. It is the platform for packet control when the data is sent at a Data
Link layer or Network layer of the OSI model. It supports single broadcast domain and
multiple collision domains.

Routers
The router is a networking gateway device that is used to forward data packets to the
computer networks. A router is connected by at least a single LAN with its IP address or
with LAN or WAN. A router supports two broadcast domains.

Hub
In the hub, if anything comes in its port then it sends it out to the others. It is less expensive
and least complicated. It has a single collision domain and single broadcast domain.

Q #8) What is Half duplex and Full duplex?


Ans: In half-duplex, transmission of information or communication is from one direction
only.
Example: Walkie-talkie
In full duplex, transmission of information or communication is from both the directions.

Example: Talking on the telephone.


Q #9) Define Network Congestion?
Ans: The process in which a network node is carrying more data which can’t be handled on
the network, and owing to which loss of packets or information happens on the network
node and the receiver can’t receive appropriate information is termed as Network
Congestion.
Q #10) What is the difference between LAN, MAN, and WAN?
Ans: LAN
It is a local area network where computers and network devices are connected with each
other, usually within the same area or building. Connections in LAN must be of high speed.

Example: Ethernet
MAN
It is metropolitan area network where the networks are connected widely within several
buildings in the same city.

Example: The IUB Network


WAN
It is a wide area network where the networks are limited to one enterprise or organization
and can be accessed by the public. It connects several LANs. Connection in WAN is high
speed and expensive too.

Example: Internet.
Q #11) Define IP Address?
Ans: Internet Protocol (IP Address) is a 32-bits to 128-bits identifier for a device on TCP/IP
protocol. IP address of a device must be uniquely defined for communication.
It has 2 principal functions which include host and location address. And it has two
versions which are IPv4 (32-bits) and IPv6 (128-bits).
Q #12) In how many ways can data be transferred in CCNA?
Ans: Data can be transferred in 3 ways:
• Simplex
• Half-duplex
• Full-duplex
Q #13) What is the difference between Unicast, Multicast, Broadcast, and Anycast?
Ans: Unicast: It is the exchange of messages between a single source and a single
destination. In Unicast, while sending packets from a sender, it contains data address of the
receiver so that it can go there directly.
Broadcast: It is the exchange of messages between one sender to possible multiple
receivers. It works only on a local network. Broadcasting of data can’t be done on the public
internet due to a massive amount of unrelated and unnecessary data.
Multicast: It is the exchange of messages between one sender and multiple receivers. In
multicast, the network settings determine your receiving clients and sort of broadcasting.
Anycast: It is the exchange of messages between one host to another host. It uses TCP
and UDP protocol. Copy of each data packet goes to every host that requests it.
Q #14) What are the different types of network in CCNA?
Ans: There are two types of network:
• Server-based network
• Peer-to-Peer network
Q #15) What is a Network subnet?
Ans: It is the subdivision of an IP address which is divided into two parts such as the
network prefix and the host identifier.
Q #16) Can IP address be assigned to Layer 2?
Ans: No, IP addresses cannot assign to Layer2.
Q #17) What is PING used for?
Ans: PING is packet Internet groper. It is used to test the reachability of a host on an
Internet protocol (IP) network. When any data is sent via the network through the IP
addresses, then it will PING the receiver to receive the data from the sender.
Q #18) What are the different class and ranges of IP address?
Ans: There are 5 different classes of IP address:
Class Range

A 1-126

B 127-191

C 192-223

D 224-239

E 240-254
Q #19) What is Private IP and Public IP?
Ans: Private IP
It is used within the local LAN.

Public IP
It is used across the Internet.

Q #20) Define Topology.


Ans: It is an arrangement of elements in a specific order.
The various types of Topology include:
• Bus
• Star
• Mesh
• Ring
• Hybrid
• Tree
Q #21) Define MAC Address.
Ans: MAC address is Media Access Control address. It is stored in ROM and is uniquely
defined. It is identified as Media Access Control layer in the network architecture.
Q #22) Why is VLAN used?
Ans: It is a Virtual LAN network which is used to make a separate domain in a single
switch.
Q #23) What are the different types of passwords that you can use in Cisco routers?
Ans: Different types of passwords that are used in Cisco routers are enabled, enable
secret, auxiliary (AUX), console and virtual terminal (VTY).
Q #24) How many types of memories are used in Cisco router?
Ans: Given below are the 3 different types of memory that are used:
• Flash memory – Store system IOS. It is electronically erasable and a re-
programmable memory chip.
• RAM – Store configuration file which is being executed. It loses its information when
a router is restarted or shut down.
• NVRAM – Store startup configuration file and IOS reads this file when the router
boots up.
• ROM – Read Only Memory. It saves the information if the router is shut down or
restarted. It maintains the instructions for POST diagnostics.
Q #25) What is meant ARP and RARP?
Ans: ARP is Address Resolution Protocol which is used to map an IP address to a physical
machine.
RARP is Reverse Address Resolution Protocol which is used to map MAC address to the IP
address.

Q #26) What are the different types of cables that are used in routing?
Ans: Three different types of cables that are used include:
• Straight cable – (switch-router)
• Cross cable – (PC-PC, switch-switch)
• Rollover cable – (Console port to computer)
Q #27) Define Logical Topology.
Ans: Logical Topology is the network from where the data packets are sent from the source
to destination, which we can see as well.
Q #28) What is the difference between static and dynamic IP addresses?
Ans: Static IP address won’t change over the time and is reserved statically whereas
dynamic IP address changes each time when you connect to the Internet.
Q #29) What is Peer to Peer network?
Ans: The P2P network is a distributed and decentralized network where individual nodes
i.e. Peers in the networks act as both suppliers and consumers of the resources.
Q #30) What is the IEEE standard for wireless networking?
Ans: IEEE 802.11
Q #31) What do you understand by ‘Protocol’ in networking?
Ans: A protocol enables two devices to connect and transmit the information or data to one
another.
Q #32) What do you understand by PoE (Power over Ethernet)?
Ans: It is defined by IEEE standard and it passes electric power supply to the network
devices over the existing data connection.
Q #33) What is OSPF? Describe it.
Ans: OSPF stands for Open Shortest Path First. It uses Dijkstra algorithm and is a link state
routing protocol which is used to connect to a large number of networks without having any
limitation on the number of hops.
Q #34) What does Multiple Access mean?
Ans: In Multiple Access, it allows more than one devices to transmit the data at the same
time.
For Example, Star or Mesh Topology.
Q #35) Explain the difference between Collision Domain and Broadcast Domain.
Ans: Broadcast Domain
In the Broadcast Domain, all the juncture can reach each other by broadcast at the data link
layer and every device is ready to receive their respective data. It can bind to the same LAN
segments or the other LAN segment.
Broadcast Domain uses local network for broadcasting the data packets to the receiver.
While broadcasting, massive data are broadcasted, hence the speed of receiving the data is
less and it also takes more time to receive the data of their address.

Collision Domain
In the Collision Domain, data collision occurs more due to sending of more frames
simultaneously.

If more than two frames are sent simultaneously then the data will collide with each other in
between and the information gets lost due to an occurrence of a collision and the devices
will not accept the data and due to this, the communication between the sender and
receiver side will collide.

Hence, the sender has to send the data again and like this, it will take more time to receive
the data at the receiver's side.

Q #36) Frame Relay Technology works on which layer of OSI model?


Ans: It works on Data Link Layer.
Q #37) What does Round Trip Time mean?
Ans: Round-trip time or round-trip delay is defined as the time taken by a signal to send the
data plus the time it receives the acknowledgment from the receiver of that signal.
Q #38) What is MTU and what is its size for transmission?
Ans: MTU stands for Maximum Transmission Unit and its size is 1500 bytes.
Q #39) What is the difference between CSMA/CD and CSMA/CA?
Ans: Carrier Sense multiple access with Collision detection (CSMA/CD) is a media
access control method which is used in local area networking. It uses early Ethernet
technology to overcome collision when it happened.
And Carrier sense multiple access with collision avoidance (CSMA/CA) is used in the
wireless network to avoid a collision.
Q #40) Define Autonomous System (AS).
Ans: It is either a single network or a group of networks that are managed by a single
directive. It is defined by a unique number or code and is called as an Autonomous system
number (ASN). Sometimes, it is also called as a routing domain.
Communication of networks within an AS is done by using Interior Gateway Protocol (IGP).

Q #41) Why do you use ‘Service Password Encryption’?


Ans: Service Password Encryption is used to encrypt plaintext password into type 7
password. Security is less and hence it can be easily decrypted.
Q #42) Explain DHCP scope.
Ans: Dynamic Host Configuration Protocol (DHCP) is used to automatically assign IP host
with its address to a client.
Q #43) Explain the difference between Tracert and Traceroute.
Ans: You would use tracert on a PC while you would use the command traceroute on a
router or switch.
Q #44) Why is Distributed Processing useful?
Ans: Distributed processing is useful because of its lower cost, improved performance,
reliability, and flexibility.
Q #45) What do you understand by Redundancy?
Ans: Redundancy is a method which provides backup paths in case of network or path
failure.
Q #46) What is Domain Name System (DNS)?
Ans: DNS is an internet service that translates domain names into IP addresses. Anything
connected to the internet i.e. mobile phones, laptops, websites etc. has an IP address which
is uniquely defined.
Q #47) Define Bandwidth.
Ans: Bandwidth is defined as the amount of data that can be transmitted or carried in a
fixed interval of time.
Q #48) Explain the basic difference between TCP/IP and OSI model.
Ans: OSI and TCP/IP protocol are different by their layers. In OSI model, there are 7 layers
whereas in TCP/IP there are 4 layers.

Q #49) What is the difference between ‘bit rate’ and ‘baud rate’?
Ans: A bit rate is defined as the total number of bits transmitted in one second
whereas baud ratedefines the number of signal unit per second that is required to
represent those bits.
Baud rate=bit rate / N,
where N = no. of bits represented by each signal shift.

Q #50) What do we check while configuring the server?


Ans:
• Check whether LAN is connected or not.
• The root should be in the NTFS format.
• The server should have a static IP address for communication.
Conclusion
These interview questions and answers will help anyone to crack a CCNA interview
successfully both at fresher as well as experience level.
And these are the most frequently asked questions and answers in the interview. I hope that
this article would have helped you to understand the basics and advanced concepts of
Networking.

CCNA Interview Questions


• (5.0)

• | 30344 Ratings

Bookmark this Post Email this Post 30364

If you're looking for CCNA Interview Questions for Experienced or Freshers, you are at right place.
There are lot of opportunities from many reputed companies in the world. According to research
CCNA has a salary ranges from $23,000 to $165,000. So, You still have opportunity to move ahead
in your career in CCNA Engineering. Mindmajix offers Advanced CCNA Interview Questions 2018
that helps you in cracking your interview & acquire dream career as CCNA Engineer.
Are you interested in taking up for CCNA Certification Training? Enroll for Free Demo on CCNA
Training!
Q. What is a network address? What is the purpose of each part of a network address?
Network addresses are the addresses used in packets. Each network address has a network part,
which identifies a particular data link, and a host or node part, which identifies a specific device on
the data link identified by the network part.
Q. What is Routing?
Routing is a process of finding a path to transfer data from source to destination.
Q. What is the advantage of VLAN?
VLAN facilitates you to create a collision domain by groups other than just physical location while in
conventional LAN domains are always tied to physical location.
Q. What are the advantages of LAN switching?
Following are the main advantages of LAN switching:
1. It allows full duplex data transmission and reception.
2. Media rate adaption.
3. Easy and efficient migration.
Q. What is the difference between private IP and public IP?
Public IP is used across internet while private IP is used within the local LAN.
Q. Explain the terms Unicast, Multicast, Broadcast and Multicast.
Unicast: It specifies one to one communication.
Multicast: It specifies one to a group communication.
Broadcast: It specifies one to all communication.
Multicast: It specifies one to nearest communication.
Q. What is the difference between static IP addressing and dynamic IP addressing?
Static IP addresses are reserved and they don't change over time while dynamic IP addresses can
be changed each time you connect to the internet.
Static IP addresses are given manually while dynamic IP addresses are provided by DHCP server.
Q. What is VLAN?
VLAN stands for Virtual Local Area Network.
Q. What is the difference between communication and transmission?
Communication is a process of sending and receiving data by an externally connected data cable
whereas transmission is a process of sending data from source to destination.
Q. What is the 2nd layer of OSI layer model?
Data link layer is the second layer of OSI model.
Q. What is the main difference between full and half duplex?
In full duplex, communication occurs from both side, while in half duplex communication occurs in
one direction.
Q. At which layer of OSI does frame relay technology work?
Frame relay work at Data link layer OSI model
Q. What is the passive topology in CCNA?
When the topology enables the computers on the network only to simply listen and receive the
signals, it is known as passive topology because they don't amplify the signals any way.
Q. Can you assign IP on layer 2?
No, you cannot assign IP addresses on layer 2.
Q. What are the possible ways of data transmission in CCNA?
These are the three possible ways of data transmission:
1. Simplex
2. Half-duplex
3. Full-duplex
Q. What is OSPF stand for?
Open Shortest Path First
Check Out CCNA Tutorials
Q. What is the difference between RIP and IGRP?
RIP depends on number of hops to determine the best route to the network while, IGRP considers
many factors before decides the best route to take i.e. bandwidth, reliability, MTU and hops count.
Q. What is the range of Class A?
1-126
Q. What is BootP?
BootP is a short form of Boot Program. It is a protocol that is used to boot diskless workstation
connected to the network. BootP is also used by diskless workstations to determine its own IP
address and also the IP addresses of server PC.
Q. What is Latency?
Latency is the amount of time delay. It is measured as the time difference between at the point of
time when a network receives the data and the time it is sent by another network.
Q. What is PoE?
PoE is said to be Power over Ethernet. It is used pass electric signal with data at a time.
Q. What is MAC address?
MAC address stands for Media Access Control address. This is an address of a device which is
identified as the Media Access Control Layer in the network architecture. The MAC address is
unique and usually stored in ROM.
Q. Can you use two different subnet IP’s on a WAN link?
Yes.
Q. What is the difference between ARP and RARP?
ARP stands for Address Resolution Protocol. ARP is a protocol that is used to map an IP address to
a physical machine address.
RAPR stands for Reverse Address Resolution Protocol. RARP is a protocol that is used to map a
MAC address to IP address.
Q. What is stub area?
A stub area is an area that does not accept routing updates from outside its autonomous system.
Q. What are the three sources of signal degradation on a data link?
The three sources of signal degradation on a data link are attenuation, interference, and distortion.
Attenuation is a function of the resistance of the medium. Interference is a function of noise entering
the medium. Distortion is a function of the reactive characteristics of the medium, which react
differently to different frequency components of the signal.
Q. What is Ping? What is the usage of Ping?
PING stands for Packet Internet Groper. It is computer network tool which is used to test whether a
particular host is reachable across an IP address or not.
Q. What are the different types of password used in securing a Cisco router?
There are five types of passwords can be set on a Cisco router:
1. Consol
2. Aux
3. VTY
4. Enable Password
5. Enable Secret
Q. Is HSRP is cisco proprietary or introduced by IEEE?
HSRP is Cisco’s proprietary
Q. What is the maximum value of administrative you can use?
255
Q. What does AAA stands for?
Authentication, authorization and accounting
Q. Which feature should a routing protocol have to support VLSM?
It should include subnet mask of each destination address.

S-ar putea să vă placă și