some interview question ccna & basic networking

Upload: noorani-shaikh

Post on 08-Apr-2018

233 views

Category:

Documents


3 download

TRANSCRIPT

  • 8/6/2019 Some Interview Question CCNA & Basic Networking

    1/23

    Join & contribute @http://groups.google.com/group/just4it-guys

    Join & contribute @http://groups.google.com/group/just4it-guys

    ) What is unicast and how does it work?

    ** Unicast is a one-to-one transmission method. A single frame is sent from thesource to a destination on a network. When this frame is received by the switch,the frame is sent on to the network, and the network passes the frame to its

    destination from the source to a specific destination on a network.

    2) What is multicast and how does it work?

    ** Multicast is a one-to-many transmission method. A single frame is sent fromthe source to multiple destinations on a network using a multicast address. Whenthis frame is received by the switch, the frame is sent on to the network and thenetwork passes the frame to its intended destination group.

    3: What is broadcast and how does it work?

    ** Broadcast is a one-to-all transmission method. A single frame is sent from thesource to a destination on a network using a multicast address. When this frameis received by the switch, the frame is sent on to the network. The networkpasses the frame to all nodes in the destination network from the source to anunknown destination on a network using a broadcast address. When the switchreceives this frame, the frame is sent on to all the networks, and the networkspass the frame on to all the nodes. If it reaches a router, the broadcast frame isdropped.

    4: What is fragmentation?

    ** Fragmentation in a network is the breaking down of a data packet into smallerpieces to accommodate the maximum transmission unit (MTU) of the network.

    5:What is MTU? What's the MTU for traditional Ethernet?

    ** MTU is the acronym for maximum transmission unit and is the largest framesize that can be transmitted over a network. Messages longer than the MTUmust be divided into smaller frames. The network layer (Layer 3) protocoldetermines the MTU from the data link layer (Layer 2) protocol and fragments themessages into the appropriate frame size, making the frames available to thelower layer for transmission without further fragmentation. The MTU for Ethernetis 1518 bytes.

    6: What is a MAC address?

    ** A MAC address is the physical address of a network device and is 48 bits (6bytes) long. MAC addresses are also known as physical addresses or hardwareaddresses.

  • 8/6/2019 Some Interview Question CCNA & Basic Networking

    2/23

    Join & contribute @http://groups.google.com/group/just4it-guys

    Join & contribute @http://groups.google.com/group/just4it-guys

    7) What is the difference between a runt and a giant, specific to traditionalEthernet?

    ** In Ethernet a runt is a frame that is less than 64 bytes in length, and a giant isa frame that is greater than 1518 bytes in length. Giants are frames that are

    greater than the MTU used, which might not always be 1518 bytes.

    8: What is the difference between store-and-forward and cut-throughswitching?

    ** Cut-through switching examines just the frame header, determining the outputswitch port through which the frame will be forwarded. Store-and-forwardexamines the entire frame, header and data payload, for errors. If the frame iserror free, it is forwarded out its destination switch port interface. If the frame haserrors, the switch drops the frame from its buffers. This is also known asdiscarding the frame to the bit bucket.

    9: What is the difference between Layer 2 switching and Layer 3 switching?

    * * Layer 2 switches make their forwarding decisions based on the Layer 2 (datalink) address, such as the MAC address. Layer 3 switches make their forwardingdecisions based on the Layer 3 (network) address.

    10: What is the difference between Layer 3 switching and routing?

    ** The difference between Layer 3 switching and routing is that Layer 3 switcheshave hardware to pass data traffic as fast as Layer 2 switches. However, Layer 3

    switches make decisions regarding how to transmit traffic at Layer 3 in the sameway as a router. A Layer 3 switch cannot use WAN circuits or use routingprotocols; a router is still required for these functions.

    Materials About CCNA

    OSI

    (ISO) International organization for standardization

    Iso has designed a reference model called osi reference model(open system

    interconnection).It has 7 layers. It says Any n/w for comunication needs 7 layers

    7.Application layer:

    The user uses application layer to send the data The protocols@ this layer areftp,http,smtp(e-mail) telenet etc.

  • 8/6/2019 Some Interview Question CCNA & Basic Networking

    3/23

    Join & contribute @http://groups.google.com/group/just4it-guys

    Join & contribute @http://groups.google.com/group/just4it-guys

    6.Presentation layer:

    Presentation layer takes the data from application layer and presentIn differentformats for securing reason. The services offered @This layer areCompression

    decompressionCoding decodingEncryption - decryption

    5. Session layer:

    Establishing the session or the conectivity n/w n/w 1 & n/w 2 is doneBy thesession layer.It 1. Establishes a session2. maintains it &3. Terminates it b/w theapplication

    4. Transport layer:

    End-end connectivity during a session b/w two application is doneBy the

    transport layer. It also decides the type of connection like tcpor udp i.e.connection oriented or connection less.Services:SequencingFlow ctrl, errordetection & correctionTransport layer info + data is called segment

    3. Netwrok layer :

    Logical addressing is done at thenetwork layer i.e. source address &destinationaddress are attached to the data.Protocols @network layerRouted protocolsrouting protocolsEg: ip,ipx eg: rip,igrp,ospfRouted protocols: they always carrythe data along with themRouting protocol: they identify the path for routedprotocol tocarry the dataAt this layer routers & layer 3 switches forms packets.

    2.Data link layer:

    It has two Sub layersa)MAC{Media access control } b) LLC {logical link controlframing of data}Ip address is lik the pincode & MAC address is like housenumber.Here layer2 switches are used.Wab protocols used at this layer arePPP,HDLC,FP,X.25 etc.Here error checking CRC bits are added to thepacketsDLL info+ packets --> frames

    1. physical layer:

    Takes care of physical connectivity i.e connector,cable etc. hereFrames areconverted to bits (1s & 0s).The devices like hubs, repeaters,cables &connectors are used atthis layer

    Important Networking Q & A

    1: What information must be stored in the route table?

  • 8/6/2019 Some Interview Question CCNA & Basic Networking

    4/23

    Join & contribute @http://groups.google.com/group/just4it-guys

    Join & contribute @http://groups.google.com/group/just4it-guys

    ** At a minimum, each entry of the routing table must include a destinationaddress and the address of a next-hop router or an indication that the destinationaddress is directly connected.

    2: What does it mean when a route table says that an address is variably

    subnetted?

    **Variably subnetted means that the router knows of more than one subnet maskfor subnets of the same major IP address.

    3: What are discontiguous subnets?

    ** Discontiguous subnets are two or more subnets of a major IP network addressthat are separated by a different major IP address.

    4: What command is used to examine the route table in a Cisco router?

    ** show ip route is used to examine the routing table of a Cisco router.

    5: What are the two bracketed numbers associated with the non-directlyconnected routes in the route table?

    **The first bracketed number is the administrative distance of the routing protocolby which the route was learned. The second number is the metric of the route.

    6: When static routes are configured to reference an exit interface insteadof a next-hop address, in what way will the route table be different?

    **When a static route is configured to reference an exit interface instead of anext-hop address, the destination address will be entered into the routing tableas directly connected.

    7: What is a summary route? In the context of static routing, how aresummary routes useful?

    **A summary route is a single route entry that points to multiple subnets or majorIP addresses. In the context of static routes, summary routes can reduce thenumber of static routes that must be configured.

    8: What is an administrative distance?

    **An administrative distance is a rating of preference for a routing protocol or astatic route. Every routing protocol and every static route has an administrativedistance associated with it. When a router learns of a destination via more thanone routing protocol or static route, it will use the route with the lowestadministrative distance.

  • 8/6/2019 Some Interview Question CCNA & Basic Networking

    5/23

    Join & contribute @http://groups.google.com/group/just4it-guys

    Join & contribute @http://groups.google.com/group/just4it-guys

    9: What is a floating static route?

    ** A floating static route is an alternative route to a destination. Theadministrative distance is set high enough that the floating static route is used

    only if a more-preferred route becomes unavailable.

    10: What is the difference between equal-cost and unequal-cost loadsharing?

    **Equal-cost load sharing distributes traffic equally among multiple paths withequal metrics. Unequal-cost load sharing distributes packets among multiplepaths with different metrics. The traffic will be distributed inversely proportional tothe cost of the routes

    OSPF Q & A

    1: What is an OSPF neighbor?

    *** From the perspective of an OSPF router, a neighbor is another OSPF routerthat is attached to one of the first router's directly connected links.

    2: What is an OSPF adjacency?

    ***An OSPF adjacency is a conceptual link to a neighbor over which LSAs canbe sent.

    3: What is an LSA? How does an LSA differ from an OSPF Update packet?

    ***A router originates a link state advertisement to describe one or moredestinations. An OSPF Update packet transports LSAs from one neighbor toanother. Although LSAs are flooded throughout an area or OSPF domain,Update packets never leave a data link.

    4: What is a link state database? What is link state databasesynchronization?

    ***The link state database is where a router stores all the OSPF LSAs it knowsof, including its own. Database synchronization is the process of ensuring that allrouters within an area have identical link state databases.

    5: What is the default HelloInterval?

    ***The default OSPF HelloInterval is 10 seconds.

  • 8/6/2019 Some Interview Question CCNA & Basic Networking

    6/23

    Join & contribute @http://groups.google.com/group/just4it-guys

    Join & contribute @http://groups.google.com/group/just4it-guys

    6: What is the default RouterDeadInterval?

    ***The default RouterDeadInterval is four times the HelloInterval.

    7: What is a Router ID? How is a Router ID determined?

    ***A Router ID is an address by which an OSPF router identifies itself. It is eitherthe numerically highest IP address of all the router's loopback interfaces, or if noloopback interfaces are configured, it is the numerically highest IP address of allthe router's LAN interfaces.

    8: What is an area?

    ***An area is an OSPF sub-domain, within which all routers have an identical link

    state database.

    9: What is the significance of area 0?

    ***Area 0 is the backbone area. All other areas must send their inter-area trafficthrough the backbone.

    10: What is MaxAge?

    ***MaxAge, 1 hour, is the age at which an LSA is considered to be obsolete.

    EIGRP Q & A

    1: Is EIGRP a distance vector or a link state routing protocol?

    *** EIGRP is a Hybrid routing protocol,it have features of both distance vectorand link state routing protocol.

    2: What is the maximum configured bandwidth EIGRP will use on a link?Can this percentage be changed?

    *** By default, EIGRP uses no more than 50% of the link's bandwidth, based onthe bandwidth configured on the router's interface. This percentage to bechanged with the command ip bandwidth-percent eigrp.

    3: How do EIGRP and IGRP differ in the way they calculate the compositemetric?

  • 8/6/2019 Some Interview Question CCNA & Basic Networking

    7/23

    Join & contribute @http://groups.google.com/group/just4it-guys

    Join & contribute @http://groups.google.com/group/just4it-guys

    *** EIGRP and IGRP use the same formula to calculate their composite metrics,but EIGRP scales the metric by a factor of 256.

    4: In the context of EIGRP, what does the term reliable delivery mean?Which two methods ensure reliable delivery of EIGRP packets?

    *** Reliable delivery means EIGRP packets are guaranteed to be delivered, andthey are delivered in order. RTP uses a reliable multicast, in which receivedpackets are acknowledged, to guarantee delivery; sequence numbers are usedto ensure that they are delivered in order.

    5: Which mechanism ensures that a router is accepting the most recentroute entry?

    *** Sequence numbers ensure that a router is receiving the most recent routeentry.

    6: What is the multicast IP address used by EIGRP?

    *** EIGRP uses the multicast address 224.0.0.10.

    7: At what interval, by default, are EIGRP Hello packets sent?

    *** The default EIGRP Hello interval is 5 seconds, except on some slow-speed(T1 and below) interfaces, where the default is 60 seconds.

    8: What is the default hold time?

    *** The EIGRP default hold time is three times the Hello interval.

    9: What is the difference between the neighbor table and the topologytable?

    *** The neighbor table stores information about EIGRP-speaking neighbors; thetopology table lists all known routes that have feasible successors.

    10: What is the feasibility condition?

    *** The feasibility condition is the rule by which feasible successors are chosenfor a destination. The feasibility condition is satisfied if a neighbor's advertiseddistance to a destination is lower than the receiving router's feasible distance tothe destination. In other words, a router's neighbor meets the feasibility conditionif the neighbor is metrically closer to the destination than the router. Another wayto describe this is that the neighbor is "downstream" relative to the destination

  • 8/6/2019 Some Interview Question CCNA & Basic Networking

    8/23

    Join & contribute @http://groups.google.com/group/just4it-guys

    Join & contribute @http://groups.google.com/group/just4it-guys

    OSPF Q & A Part -II

    1: What are the five OSPF packet types? What is the purpose of each type?

    *** The five OSPF packet types, and their purposes, are:

    Hellos, which are used to discover neighbors, and to establish and maintainadjacencies

    Updates, which are used to send LSAs between neighbors

    Database Description packets, which a router uses to describe its link statedatabase to a neighbor during database synchronization

    Link State Requests, which a router uses to request one or more LSAs from aneighbor's link state database

    Link State Acknowledgments, used to ensure reliable delivery of LSAs

    2: What are LSA types 1 to 5 and LSA type 7? What is the purpose of eachtype?

    *** The most common LSA types and their purposes are:

    Type 1 (Router LSAs) are originated by every router and describe the originatingrouter, the router's directly connected links and their states, and the router\xd5 s

    neighbors.

    Type 2 (Network LSAs) are originated by Designated Routers on multiaccesslinks and describe the link and all attached neighbors.

    Type 3 (Network Summary LSAs) are originated by Area Border Routers anddescribe inter-area destinations.

    Type 4 LSAs (ASBR Summary LSAs) are originated by Area Border Routers todescribe Autonomous System Boundary Routers outside the area.

    Type 5 (AS External LSAs) are originated by Autonomous System BoundaryRouters to describe destinations external to the OSPF domain.

    Type 7 (NSSA External LSAs) are originated by Autonomous System BoundaryRouters within not-so-stubby areas.

    3: What are the four OSPF router types?

  • 8/6/2019 Some Interview Question CCNA & Basic Networking

    9/23

    Join & contribute @http://groups.google.com/group/just4it-guys

    Join & contribute @http://groups.google.com/group/just4it-guys

    ***The four OSPF router types are:

    # Internal Routers, whose OSPF interfaces all belong to the same area

    # Backbone Routers, which are Internal Routers in Area 0

    # Area Border Routers, which have OSPF interfaces in more than one area

    # Autonomous System Boundary Routers, which advertise external routes intothe OSPF domain

    4: What are the four OSPF path types?

    ***The four OSPF path types are:

    Intra-area paths

    Inter-area paths

    Type 1 external paths

    Type 2 external paths

    5: What are the five OSPF network types?

    *** The five OSPF network types are:

    i)Point-to-point networks

    ii) Broadcast networks

    iii) Non-broadcast multi-access (NBMA) networks

    iv) Point-to-multipoint networks

    v) Virtual links

    6: What is a Designated Router?

    ***A Designated Router is a router that represents a multiaccess network, andthe routers connected to the network, to the rest of the OSFP domain.

  • 8/6/2019 Some Interview Question CCNA & Basic Networking

    10/23

    Join & contribute @http://groups.google.com/group/just4it-guys

    Join & contribute @http://groups.google.com/group/just4it-guys

    7: How does a Cisco router calculate the outgoing cost of an interface?

    ***Cisco IOS calculates the outgoing cost of an interface as 108/BW, where BWis the configured bandwidth of the interface.

    8: What is a partitioned area?

    ***An area is partitioned if one or more of its routers cannot send a packet to thearea's other routers without sending the packet out of the area.

    9: What is a virtual link?

    *** A virtual link is a tunnel that extends an OSPF backbone connection througha non-backbone area.

    10: What is the difference between a stub area, a totally stubby area, and anot-so-stubby area?

    ***A stub area is an area into which no type 5 LSAs are flooded. A totally stubbyarea is an area into which no type 3, 4, or 5 LSAs are flooded, with the exceptionof type 3 LSAs to advertise a default route. Not-so-stubby areas are areasthrough which external destinations are advertised into the OSPF domain, butinto which no type 5 LSAs are sent by the ABR.

    11: What is the difference between OSPF network entries and OSPF routerentries?

    *** OSPF network entries are entries in the route table, describing IPdestinations. OSPF router entries are entries in a separate route table that recordonly routes to ABRs and ASBRs.

    12: Why is type 2 authentication preferable over type 1 authentication?

    ***Type 2 authentication uses MD5 encryption, whereas type 1 authenticationuses clear-text passwords.

    13: Which three fields in the LSA header distinguish different LSAs? Whichthree fields in the LSA header distinguish different instances of the sameLSA?

  • 8/6/2019 Some Interview Question CCNA & Basic Networking

    11/23

    Join & contribute @http://groups.google.com/group/just4it-guys

    Join & contribute @http://groups.google.com/group/just4it-guys

    ***The three fields in the LSA header that distinguish different LSAs are theType, Advertising Router, and the Link State ID fields. The three fields in the LSAheader that distinguish different instances of the same LSA are the SequenceNumber, Age, and Checksum fields

    Routing Information Protocol Version 2

    1: Which three fields are new to the RIPv2 message format?

    *** The Route Tag field, the Subnet Mask field, and the Next Hop field are RIPv2extensions that do not exist in RIPv1 messages. The basic format of the RIPmessage remains unchanged between the two versions; version 2 merely usesfields that are unused in version 1.

    2: Besides the extensions defined by the three fields of question 1, whatare the other two major changes from RIPv1?

    ***In addition to the functions that use the new fields, RIPv2 supportsauthentication and multicast updates.

    3: What is the multicast address used by RIPv2? What is the advantage ofmulticasting messages over broadcasting them?

    ***RIPv2 uses the multicast address 224.0.0.9. Multicasting of routing messagesis better than broadcasting because hosts and non-RIPv2 routers will ignore themulticast messages .

    4: What is the purpose of the Route Tag field in the RIPv2 message?

    *** When another routing protocol uses the RIPv2 domain as a transit domain,the protocol external to RIPv2 can use the Route Tag field to communicateinformation to its peers on the other side of the RIPv2 domain.

    5: What is the purpose of the Next Hop field?

    *** The Next Hop field is used to inform other routers of a next-hop address onthe same multiaccess network that is metrically closer to the destination than theoriginating router.

    6: What is the UDP port number used by RIPv2?

    ***RIPv2 uses the same UDP port number as RIPv1, port number 520.

    7: Which one feature must a routing protocol have to be a classless routingprotocol?

  • 8/6/2019 Some Interview Question CCNA & Basic Networking

    12/23

  • 8/6/2019 Some Interview Question CCNA & Basic Networking

    13/23

    Join & contribute @http://groups.google.com/group/just4it-guys

    Join & contribute @http://groups.google.com/group/just4it-guys

    1. What is a VLAN? When is it used?

    Answer: A VLAN is a group of devices on the same broadcast domain, such as alogical subnet or segment. VLANs can span switch ports, switches within aswitch block, or closets and buildings. VLANs group users and devices into

    common workgroups across geographical areas. VLANs help providesegmentation, security, and problem isolation.

    2. When a VLAN is configured on a Catalyst switch port, in how much ofthe campus network will the VLAN number be unique and significant?

    Answer: The VLAN number will be significant in the local switch. If trunking isenabled, the VLAN number will be significant across the entire trunking domain.In other words, the VLAN will be transported to every switch that has a trunk linksupporting that VLAN.

    3. Name two types of VLANs in terms of spanning areas of the campusnetwork.

    Answer: Local VLANEnd-to-end VLAN

    4. What switch commands configure Fast Ethernet port 4/11 for VLAN 2?

    Answer: interface fastethernet 4/11switchport mode accessswitchport access vlan 2

    5. Generally, what must be configured (both switch and end-user device)for a port-based VLAN?

    Answer: The switch port

    6. What is the default VLAN on all ports of a Catalyst switch?

    Answer: VLAN 1

    7. What is a trunk link?

    Answer: A trunk link is a connection between two switches that transports trafficfrom multiple VLANs. Each frame is identified with its source VLAN during its tripacross the trunk link.

    8. What methods of Ethernet VLAN frame identification can be used on aCatalyst switch trunk?

  • 8/6/2019 Some Interview Question CCNA & Basic Networking

    14/23

    Join & contribute @http://groups.google.com/group/just4it-guys

    Join & contribute @http://groups.google.com/group/just4it-guys

    Answer: 802.1QISL

    9. What is the difference between the two trunking methods? How many

    bytes are added to trunked frames for VLAN identification in each method?

    Answer: ISL uses encapsulation and adds a 26-byte header and a 4-byte trailer.802.1Q adds a 4-byte tag field within existing frames, without encapsulation.

    10. What is the purpose of the Dynamic Trunking Protocol (DTP)?

    Answer: DTP allows negotiation of a common trunking method betweenendpoints of a trunk link.

    11. What commands are needed to configure a Catalyst switch trunk port

    Gigabit 3/1 to transport only VLANs 100, 200 through 205, and 300 usingIEEE 802.1Q? (Assume that trunking is enabled and active on the portalready. Also assume that the interface gigabit 3/1 command already hasbeen entered.)

    Answer: switchport trunk allowed vlan 100, 200-205, 300

    12. Two neighboring switch trunk ports are set to the auto mode with ISLtrunking encapsulation mode. What will the resulting trunk mode become?

    Answer: Trunking will not be established. Both switches are in the passive autostate and are waiting to be asked to start the trunking mode. The link will remainan access link on both switches.

    13. Complete the following command to configure the switch port to useDTP to actively ask the other end to become a trunk:switchport mode _________________

    Answer: switchport mode dynamic desirable

    14. Which command can set the native VLAN of a trunk port to VLAN 100after the interface has been selected?

    Answer: switchport trunk native vlan 100

    15. What command can configure a trunk port to stop sending andreceiving DTP packets completely?

  • 8/6/2019 Some Interview Question CCNA & Basic Networking

    15/23

    Join & contribute @http://groups.google.com/group/just4it-guys

    Join & contribute @http://groups.google.com/group/just4it-guys

    Answer: switchport nonegotiate

    16. What command can be used on a Catalyst switch to verify exactly whatVLANs will be transported over trunk link gigabitethernet 4/4?

    Answer: show interface gigabitethernet 4/4 switchportorshow interface gigabitethernet 4/4 switchport trunk

    17. Suppose that a switch port is configured with the following commands.A PC with a nontrunking NIC card then is connected to that port. What, ifany, traffic will the PC successfully send and receive?

    interface fastethernet 0/12

    switchport trunk encapsulation dot1qswitchport trunk native vlan 10switchport trunk allowed vlan 1-1005switchport mode trunk

    Answer: The PC expects only a single network connection, using a single VLAN.In other words, the PC can't participate in any form of trunking. Only untagged orunencapsulated frames will be understood. Recall that an 802.1Q trunk's nativeVLAN is the only VLAN that has untagged frames. Therefore, the PC will becapable of exchanging frames only on VLAN 10, the native VLAN.

    Networking Basics

    1: What is the definition of a network?

    ** A network is a system of lines or channels that cross or interconnect, or agroup or system of electrical components and connecting circuitry designed tofunction in a specific manner.

    2: What are network models?

    ** Network models provide the guiding principles behind the development of

    network standards.

    3: What is a network standard, and why are there network standards?

    ** Network standards define the rules of network communication and are likelaws that must be followed for different equipment vendors to work together.

    4: What is a proprietary feature?

  • 8/6/2019 Some Interview Question CCNA & Basic Networking

    16/23

    Join & contribute @http://groups.google.com/group/just4it-guys

    Join & contribute @http://groups.google.com/group/just4it-guys

    ** If a vendor implements a feature that does not adhere to any networkstandards, it is called a proprietary feature.

    5: What are the three data transmission modes, and how do they operate?

    ** Simplex mode, half-duplex mode, and full-duplex mode. Simplex mode is one-way communication only. Half-duplex mode is two-way communication, but not atthe same time. Full-duplex mode is simultaneous two-way communication.

    6: List the major characteristics of a LAN.

    ** The primary characteristic of a LAN is its geographic coverage. LANs arefound in a small geographic area where there is a short distance betweenconnected computers, as in small offices or on each floor of a larger officebuilding. LANs enable the sharing of office resources, such as file servers for file

    sharing among users or print servers for shared printers.

    7: List the major characteristics of a MAN.

    ** MANs are found in a metropolitan, or citywide, geographic area,interconnecting two or more office buildings in a broader geographic region thana LAN would support, but not so broad that a WAN would be required.

    8: List the major characteristics of a WAN.

    ** WANS are found in broad geographic areas, often spanning states and

    countries, and are used to connect LANs and WANs together.

    9: What are the three parts of a frame? What is a function of each part?

    ** Header, data (or payload), trailer. The header is the beginning of the frame,significant in that the frame's source and destination are found in the frameheader. The payload is the data part of the frame, the user's information. Thetrailer identifies the end of the frame.

    10: What function in a network does cabling provide?

    ** Cabling provides the physical interconnection between network devices andnodes.

    11: List some examples of user data.

    ** Examples of user data include e-mail, web-browsing traffic, word-processeddocuments, spreadsheets, database updates.

  • 8/6/2019 Some Interview Question CCNA & Basic Networking

    17/23

    Join & contribute @http://groups.google.com/group/just4it-guys

    Join & contribute @http://groups.google.com/group/just4it-guys

    12: What is the best definition of network topology?

    ** Network topology refers to the physical or logical geometric arrangement ofinterconnected network devices.

    13: What is the best definition of network protocol?

    ** A network protocol is the communication rules and formats followed by allinterconnected devices on a network requiring communication with one another.

    14: What is the definition of network media?

    ** Network media refers to the physical component of a network. Communicationsignals traverse network media from source to destination. Some examples ofnetwork media are copper and fiber-optic cabling.

    15: What is a network origination point?

    ** A network connection has two ends: the origination and termination points.The origination point is the source of the datathe location from which the datais being sent.

    16: What is a network termination point?

    ** A network connection has two ends: the origination and termination points.The termination point is the destination of the datathe location to which thedata is being sent.

    Layer 3 Switching

    1. What might you need to implement interVLAN routing?

    ** One or more Layer 3 interfaces

    One or more SVIs

    Static routes

    A dynamic routing protocol

    2. Can interVLAN routing be performed over a single trunk link?

    ** Yes. Packets can be forwarded between the VLANs carried over the trunk.

    3. To configure an SVI, what commands are needed?

  • 8/6/2019 Some Interview Question CCNA & Basic Networking

    18/23

    Join & contribute @http://groups.google.com/group/just4it-guys

    Join & contribute @http://groups.google.com/group/just4it-guys

    ** First, make sure the VLAN is defined on the switch.

    interface vlan vlan-idip address ip-address maskno shutdown

    4. What command can verify the VLAN assignments on a Layer 2 port?

    ** show interface type mod/num switchport

    or

    show interface status

    5. A switch has the following interface configurations in its runningconfiguration:

    interface fastethernet 0/1switchport access vlan 5!interface vlan 5ip address 192.168.10.1 255.255.255.0no shutdown

    What is necessary for packets to get from the FastEthernet interface to theVLAN 5 SVI?

    Answer: Nothing. Both are assigned to VLAN 5, so normal Layer 2 transparentbridging will take care of all forwarding between the two.

    6. What is the source of FIB information?

    ** The routing table, as computed by the Layer 3 engine portion of a switch.

    7. How often is the FIB updated?

    ** As needed. It is downloaded or updated dynamically by the Layer 3 enginewhenever the routing topology changes or an ARP entry changes.

    8. What is meant by the term "CEF punt"?

    ** A packet can't be forwarded or switched by CEF directly because it needsfurther processing. The packet is "punted" to the Layer 3 engine, effectively

  • 8/6/2019 Some Interview Question CCNA & Basic Networking

    19/23

    Join & contribute @http://groups.google.com/group/just4it-guys

    Join & contribute @http://groups.google.com/group/just4it-guys

    bypassing CEF for a more involved resolution.

    9. What happens to the FIB when distributed CEF (dCEF) is used?

    ** It is simply replicated to each of the independent CEF engines. The FIB itself

    remains intact so that each engine receives a duplicate copy.

    10. What happens during a "CEF glean" process?

    ** The MAC address (ARP reply) for a next-hop FIB entry is not yet known. TheLayer 3 engine must generate an ARP request and wait for a reply before CEFforwarding can continue to that destination.

    11. What does a multilayer switch do to the IP TTL value just before apacket is forwarded?

    ** The TTL is decremented by one, as if a router had forwarded the packet.

    12. What is fallback bridging?

    ** On switch platforms that cannot multilayer-switch (route) all routable protocols,those protocols can be bridged transparently between VLANs instead.

    13. Is it possible for an SVI to go down? If so, for what reasons?

    ** Yes. The SVI can be shut down administratively with the shutdown command,as with any other interface. Also, if the VLAN associated with the SVI is not

    defined or active, the SVI will appear to be down

    OSPF Q & A in CCNP

    1: Which command in OSPF shows the network LSA information?

    ** The command show ip ospf [process-id area-id] database network displays thenetwork link-state information.

    2: What command would you use to create a totally stubby area?

    ** The command area area-id stub no-summary will create a totally stubby area.This is a subcommand to the router ospf process-id command. It is necessaryonly on the ABR, but all the other routers in the area must be configured as stubrouters.

    3: What is a virtual link, and what command would you use to create it?

    ** A virtual link is a link that creates a tunnel through an area to the backbone

  • 8/6/2019 Some Interview Question CCNA & Basic Networking

    20/23

    Join & contribute @http://groups.google.com/group/just4it-guys

    Join & contribute @http://groups.google.com/group/just4it-guys

    (Area 0). This allows an area that cannot connect directly to the backbone to doso virtually. The command to create the link is area area-id virtual-link router-id.Note that the area-id that is supplied is that of the transit area, and the router-id isthat of the router at the other end of the link. The command needs to beconfigured at both ends of the tunnel.

    4: Where would you issue the command to summarize IP subnets? State thecommand that is used.

    ** Summarization is done at area boundaries. The command to startsummarization is the area range command, with the syntax area area-id rangeaddress mask. To summarize external routes, use the summary-addresscommand on the ASBRs.

    5: How would you summarize external routes before injecting them into theOSPF domain?

    ** The command summary-address address mask is the command that youwould use.

    6: When is a virtual link used?

    ** A virtual link is used when an area is not directly attached to the backbonearea (Area 0). This may be due to poor design and a lack of understanding aboutthe operation of OSPF, or it may be due to a link failure. The most commoncause of an area separating from the backbone is link failure, which can alsocause the backbone to be segmented. The virtual link is used in these instances

    to join the two backbone areas together. Segmented backbone areas might alsobe the result of two companies merging.

    7: Give the command for defining the cost of a default route propagated into anarea.

    ** The command to define the cost of a default route propagated into anotherarea is area area-id default-cost cost.

    8: Give an example of when it would be appropriate to define a default cost.

    ** It is appropriate to define a default cost for the default route when a stub areahas more than one ABR. This command allows the ABR or exit point for the areato be determined by the network administrator. If this link or the ABR fails, theother ABR will become the exit point for the area.

    9: On which router is the area default cost defined?

    ** The default cost for the default route is defined on the ABR. The ABR will then

  • 8/6/2019 Some Interview Question CCNA & Basic Networking

    21/23

    Join & contribute @http://groups.google.com/group/just4it-guys

    Join & contribute @http://groups.google.com/group/just4it-guys

    automatically generate and advertise the route cost along with the default route.

    10: Give the command to configure a stub area and state on which router it isconfigured.

    ** The command syntax to configure a stub area is area area-id stub. Thiscommand is configured on the ABR connecting to the area and on all the routerswithin the area. Once the configuration is completed, the Hellos are generatedwith the E bit set to 0. All routers in the area will only form adjacencies with otherrouters that have the E bit set.

    11: What is the purpose of the area range command, and why is it configured onthe ABR?

    ** The area range command is configured on an ABR because it dictates thenetworks that will be advertised out of the area. It is used to consolidate and

    summarize the routes at an area boundary.

    12: Give the commands to configure a router to place subnets 144.111.248.0through to 144.111.255.0 in Area 1 and to put all other interfaces into Area 0.

    ** The commands are as follows:

    network 144.111.248.0 0.0.7.255 area 1

    network 0.0.0.0 255.255.255.255 area 0

    13: Give the syntax to summarize the subnets 144.111.248.0 to 144.111.254.255into another autonomous system.

    ** The syntax is as follows:

    summary-address 144.111.248.0 255.255.248.0

    14: Explain briefly the difference between the area range command and thesummary-address command.

    ** The area range command is used to summarize networks between areas andis configured on the ABR. The summary-address command is used tosummarize networks between autonomous systems and is configured on the

  • 8/6/2019 Some Interview Question CCNA & Basic Networking

    22/23

    Join & contribute @http://groups.google.com/group/just4it-guys

    Join & contribute @http://groups.google.com/group/just4it-guys

    ASBR.

    15: Explain the following syntax and what it will achieve: area 1 stub no-summary.

    ** The command area 1 stub no-summary creates a totally stubby area. Thenumber after the word area indicates the area that is being defined as a totallystubby area. This is necessary because the router might be an ABR withconnections to many areas. Once this command is issued, it preventssummarized and external routes from being propagated by the ABR into thearea. To reach the networks and hosts outside the area, routers must use thedefault route advertised by the ABR into the area.

    16: Why would you configure the routing process to log adjacency changes asopposed to turning on debug for the same trigger?

    ** The reason to configure the router process to log adjacency changes to syslogas opposed to running debug is an issue of resources. It takes fewer router andadministrator resources to report on a change of state as it happens than to havethe debugger running constantly. The debug process has the highest priority andthus everything waits for it.

    17: Give some of the common reasons that neighbors fail to form an adjacency.

    ** Many OSPF problems stem from adjacency problems that propagatethroughout the network. Many problems are often traced back to neighbordiscrepancies.

    If a router configured for OSPF routing is not seeing an OSPF neighbor on anattached network, do the following:

    - Make sure that both routers are configured with the same IP mask, MTU,Interface Hello timer, OSPF Hello interval, and OSPF dead interval.

    - Make sure that both neighbors are part of the same area and area type.

    - Use the debug and show commands to trace the problem.

    18: When configuring a virtual link, which routers are configured?

    ** The configuration is between the ABRs, where one of the ABRs resides inArea 0 and the other in the area that is disconnected from the backbone. Both ofthe ABRs are also members of the transit area. Having created the virtual link,both ABRs are now members of Area 0, the disconnected area, and the transitarea.

  • 8/6/2019 Some Interview Question CCNA & Basic Networking

    23/23

    Join & contribute @http://groups.google.com/group/just4it-guys

    Join & contribute @http://groups google com/group/just4it-guys

    19: What does the command area 1 default-cost 15 achieve?

    ** The command area 1 default-cost 15 will assign a cost of 15 to the defaultroute that is to be propagated into the stub area. This command is configured onthe ABR attached to the stub area.

    20: Explain what is placed in the parameters area-id and router-id for thecommand area area-id virtual-link router-id.

    ** The parameter area-id is the area ID of the transit area. So if the ABR in Area0 is creating a virtual link with the ABR in Area 3 through Area 2, the area IDstated in the command is Area 2. The router ID is the router ID of the router withwhom the link is to be formed and a neighbor relationship and adjacencyestablished.