0% found this document useful (0 votes)
142 views22 pages

Interview Q&A

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
142 views22 pages

Interview Q&A

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 22

Interview Question for Networking Profile for Freshers and experienced

Version 1.0

Warning and Disclaimer


This book is designed to provide information about interview questions for networking profile for
freshers and experienced. Every effort bas been made to make this book as complete and as accurate
as possible, but no warranty or fitness is implied. The authers have neither liability nor responsibility to
any person or entity with respect to any loss or damage arising from the information contained in this
book.

Feedback Information
Reader’s feedback is a natural continuation of this process. If you have any comments regarding how we
could improve the quality of this book, or otherwise alter it to better suit your needs, you can contact us
through email at [email protected].

You can also visit to my youtube channel: www.youtube.com/cisconetworklearning

Dedications
I would like to dedicate this book to my Mom and Dad for their love, encouragement and continuous
support.

Acknowledgement
First, I would like to thank God for giving me the opportunity and ability to write, teach, and do what I
truly enjoy doing. Also , I would like to thank to my family, especially to fiancé for constant
encouragement and help.
1. What are the different layers of the OSI model.
Basically, there are 7 layers of the OSI model. Each layer has its own functionality in the OSI
model.
They are:
 Layer 1 – Physical
 Layer 2 – Data Link Layer
 Layer 3 – Network
 Layer 4 – Transport
 Layer 5 – Session
 Layer 6 – Presentation
 Layer 7- Application

2. What is the difference between TCP and UDP.


TCP and UDP both are protocols for sending files across computer networks.

TCP (Transmission Control Protocol) UDP (User Datagram Protocol)


TCP is connection oriented protocol. When UDP is based on connectionless protocol.
connection lost during transferring files, the server When you send data, there is no guarantee
would request the lost part. While transferring a whether your transferred message will
message, there is no corruption while transferring a reach there without any leakage
message
The message will deliver in the order it is sent The message you sent may not be in the
same order
Data in TCP is read as a stream, where one packet Packets are transmitted individually and
ends, and another begins are guaranteed to be whole if they arrive
Example of TCP includes World Wide Web, file Example for UDP are VOIP (Voice Over
transfer protocol, e-mail, Internet Protocol) TFTP ( Trivial File
Transfer Protocol),

3. What are the major function of Transport layer.


 Segment fragmentation
 Sequencing to segments
 Reliable and unreliable data delivery
 Error detection and error correction
 Flow control
 Multitasking
 Windowing
4. What is data encapsulation and data de-encapsulation.
Encapsulation: When data is sent from a higher layer to lower layer, each layer adds some
information to the original data, this is called an encapsulation. The information added is called
as header
De-encapsulation: When data is sent from a lower layer to higher layer, each layer remove
information from the other layer. This is called as an de-encapsulation

5. What will be the function of the application layer in the networking.


The application layer is used to support the communication components of application and it will
provide the network services to the application process that will span beyond the specifications
of the OSI reference model.

6. what is the protocol number of TCP.


Protocol number of TCP is 6

7. what is the protocol number of UDP.


Protocol number of UDP is 17

8. What is Port Number.


Each and every services having an unique number to differentiate the services
It is 16bit decimal number
Range of port numbers are 0-65535

9. what is port number of HTTP, HTTPS, Telnet, SSH, FTP, SMTP, POP3, IMAP, DNS
and DHCP.

 HTTP- 80
 HTTPS- 443
 Telnet- 23
 SSH- 22
 FTP- 20/21
 SMTP- 25
 POP3- 110
 IMAP- 143
 DNS- 53
 DHCP- 67/68

10. What is ARPA Protocol.


It is a layer 2 encapsulation protocol for ethernet technology.
11. What is MAC Address.
every ethernet port is having MAC address to differentiate the device in ethernet network or in
lan network
it is 48bit address
Always represent in the form of hexa decimal

12. What is IP Address.


IP address is a unique logical address that identifies a device on the internet or a local network
It is 32bit decimal address
It is devided into 5 different classes
Class A 1.0.0.0 - 126.255.255.255
127 is reserved for self Lan card troubleshooting
Class B. 128.0.0.0 - 191.255.255.255
Class C 192.0.0.0 - 223.255.255.255
Class D 224.0.0.0 - 239.255.255.255
Class D 240.0.0.0 - 255.255.255.255

13. Range of private ip address.


Class A = 10.0.0.1 - 10.255.255.255
Class B = 172.16.0.0 - 172.31.255.255
Class C = 192.168.0.0 - 192.168.255.255
APIPA= 169.254.0.0 - 169.254.255.255

14. What is the use of class D.


It is used to uniquely identify multicast groups.
It is used for multicasting, we can not assign these address to any device
But some protocol use these address by itself to share the information

15. What is the use of class E Address.


The class E IP addresses are reserved for experimental purpose only for R&D or study. IP
addresses in the class E ranges from 240.0. 0.0 to 255.255. 255.254.

16. IP works on which layer.


It works on layer3 (network layer)

17. MAC works on which layer.


It works on layer 2 (Data Link layer)
18. Lan card works on which layer.
Lan card works on layer 1 (physical layer)

19. Switch works on which layer.


Switch works on layer 2 (Data link layer)

20. Router works on which layer.


Router works on layer 2 (network layer)

21. What is loopback address.


It is used for Self Lan card testing
Its range is 127.0.0.0 to 127.255.255.255
A loopback address is a type of IP address that is used to test the communication or
transportation medium on a local network card and/or for testing network applications. Data
packets sent on a loopback address are re-routed back to the orginating node without any
alteration or modification.

22. Tell about the types of IP addresses used at the present time.
Answer: Two types of IP address is used including IPv4 and IPv6. IPv4 is 32-bit address and
IPv6 is 128-bit address.

23. Can you differentiate static IP address and dynamic IP address.


A static IP address is reserved and it will not change over time. On the other hand, a dynamic IP
address will be changed every time when you will connect to the internet. A static IP address is
provided manually while the dynamic IP address will be provided by the DHCP server.

24. What is subnetting.


It is a technique to divide large network into multiple small network

25. What is FLSM.


FLSM (full length subnetmask) is used to apply a same subnetmask to a same class addresses

26. What is VLSM.


VLSM (varriable length subnetmask) is used to apply a different subnetmask to a same class
addresses
27. What is summarization.
It is used to combine multiple subnetwork into a single network

28. What is manual summary.


The manual summarization is a process of creating a summary route that will be used to
represent multiple routes and can be used to reduce the sizes of routing tables in a network.

29. What is BootP.


BootP is a protocol that is used for the booting of diskless workstations connected to the
network. It is also known as a boot program. It is also used by diskless workstations to determine
its own IP address as well as IP address of server system.

30. Can you explain the terms multicast, unicast, and broadcast.
 Unicast: It is used to specify one to one communication.
 Multicast: It is used to specify one to group/many communication.
 Broadcast: It is used to specify one to all communication.

31. What can be the possible ways for data transmission.


There may be three possible ways for data transmission as given below:
 Simplex
 Half duplex
 Full duplex

32. What do you mean by PoE.


PoE stands for Power over Ethernet. it will be used to pass the electric signal with the data at a
time.

33. Can you differentiate the terms ARP and RARP.


ARP is used for Address Resolution Protocol that is used for the mapping of IP address to the
physical machine address. RARP means Reverse Address Resolution Protocol that is used for the
mapping of MAC address to the IP address.

34. What are the different kinds of passwords that are used to secure the Cisco router.
Mainly, 5 types of passwords are used to secure the Cisco router. These passwords are given
below:
 Consol
 Aux
 VTY
 Enable Password
 Enable Secret

35. What are the functions of CDP.


It is used to discover the directly connected devices
It is a cisco proprietary protocol

36. What is DHCP.


It stand for dynamic host configuration protocol
It is used to assign ip address to computers dynamically for time saving and for better
management of ip addressing.

37. What is DNS.


It stand for domain name system
It is used to convert IP address to name and name to IP address
it provide a unique name to every IP address in the network

38. What is straight cable.


It is used to connect two different devices like computer to switch

39. What is cross cable.


It is used to connect two same devices like computer to computer or switch to switch

40. What is console cable.


It is used to configure the device like router or switch

41. What is ARP protocol.


It is a layer 2 protocol
It stand for address resolution protocol
It resolve MAC address of any IP address

42. What is opcode of ARP request message.


Opcode for ARP request message is 1

43. What is opcode of arp response msg.


Opcode for ARP request message is 2
44. what is ICMP.
It stand for internet control message protocol
Ping used this protocol to check the connectivity between two network devices

45. What is protocol no of ICMP.


Protocol number of ICMP is 1

46. ICMP works on which layer.


It works on Layer 3

47. ARP works on which layer.


It works on Layer 2

48. What is gratuitous ARP.


It is used to check the IP address conflicts within the network

49. What is Subnetting.


It is used to devide large complex network into subnetwork

50. How many types of memories are used in Cisco router.


Given below are the 3 different types of memory that are used:
 Flash memory – Store system IOS. It is electronically erasable and a re-programmable
memory chip.
 RAM – Store configuration file which is being executed. It loses its information when a
router is restarted or shut down.
 NVRAM – Store startup configuration file and IOS reads this file when the router boots
up.
 ROM – Read Only Memory. It saves the information if the router is shut down or
restarted. It maintains the instructions for POST diagnostics.

51. What are the modes of router.


 User mode / enable mode
 Privilege mode
 Global configuration mode
 Interface configuration mode
 Line configuration mode
52. which ports are interface ports on router.
 Ethernet port
 Series port

53. which ports are line ports on router.


 Console port
 Vty port
 Aux port

54. What is console port.


It is used to configure the devices

55. what is VTY port.


It is used to enable telnet or ssh services on router or switch to get the remote access

56. what is difference between enable and enable secret password.


Enable password saved in plane text, enable secret saved in encrypted form
Enable password priority is low, enable secret priority is high

57. When does network congestion occur.


Network congestion occurs when too many users are trying to use the
same bandwidth.

58. What is latency.


Latency is the amount of time delay that measures the point from which a network device
receives a data frame to the time it sends it out again towards another network segment.

59. What is HDLC.


HDLC stands for High-Level Data Link Control protocol. It is a propriety protocol of CISCO. It
is the default encapsulation operated within CISCO routers.

60. What is Route Poisoning.


Route Poisoning is the process of inserting a table entry of 16 to a route, making it unreachable.
This technique is used in order to prevent problems caused by inconsistent updates on a route.
61. Mention what is the matric of EIGRP protocol.
EIGRP protocol consists of
 Bandwidth
 Load
 Delay
 Reliability
 MTU
 Maximum Transmission Unit

62. What are the conversion steps of data encapsulation.


Conversion steps of data encapsulation includes

 Layer one, two and Three ( Application/presentation/session) : Alphanumeric input from


the user is converted into Data
 Layer Four (Transport): Data is converted into small segments
 Layer Five (Network): Data converted into packets or datagrams and Network header is
added
 Layer Six (Data Link): Datagrams or packets are built into frames
 Layer Seven (Physical): Frames are converted into bits

63. What is routing.


Routing is the process to find the right path to transfer the data from source to the destination.

64. What is IGP protocol.


It stand for interior gateway protocol
It is used in within the same AS number

65. what is EGP Protocol.


It stand for exterior gateway protocol
It is used between different AS number

66. what is the register value in router.


The configuration register is a 16-bit number, represented in hexadecimal, which controls
everything from the way in which a CISCO router boots to whether or not it will process the
contents of the startup configuration file. By default, the configuration register on a router is set
to a value of 0x2102.
67. how to restore ios of router.
If there is no iOS in router than router boots in rommon mode. We will run these commands to
restore the iOS of router
 Router’s ethernet 0 port should be connected to the tftp server
 TFTP server should be having iOS file
 TFTP server IP address is 192.168.1.100

rommon 1 > IP_ADDRESS=192.168.1.1


rommon 2 > IP_SUBNET_MASK=255.255.255.0
rommon 3 > DEFAULT_GATEWAY=192.168.1.100
rommon 4 > TFTP_SERVER=192.168.1.100
rommon 5 > TFTP_FILE=c2600-i-mz.122-28.bin
rommon 7 > tftpdnld

68. what is three way handshake.


A three-way handshake is a method used in a TCP/IP network to create a connection between a
local host/client and server. It is a three-step method that requires both the client and server to
exchange SYN and ACK (acknowledgment) packets before actual data communication begins

69. what is administrative distance.


Administrative distance is the feature used by routers to select the best path when there are two
or more different routes to the same destination from two different routing
protocols. Administrative distance defines the reliability of a routing protocol

70. what is metric.


Router metrics are metrics used by a router to make routing decisions. A metric is typically
one of many fields in a routing table. ... A router metric is typically based on information such
as path length, bandwidth, load, hop count, path cost, delay, maximum transmission unit (MTU),
reliability

71. RIP works on which OSI layer.


Rip works on application layer (layer7)
It works on uDP Protocol
Its port number is 520

72. RIP uses which udp port number.


It uses UDP port number 520
73. what is classful routing protocol.
Classful routing protocols DO NOT send the subnet mask along with their updates.

74. what is classless routing protocol.


Classless routing protocols DO send the subnet mask along with their updates.

75. what is auto summary.


Auto summarization is a feature which allows Routing Information Protocol (RIP)
to summarize its routes to their classful networks automatically

76. what is protocol number of eigrp.


It uses protocol number 88

77. eigrp works on which osi layer.


It works on Layer 3

78. what are the difference between distance vector and link state routing protocol.
 Distance vector
Always share hop count along with prefix in update msg
Always share complete routing table information with the neighbour
Works on routing by romour
 Link state
Never share hop count along with prefix in update msg
It share partial information of routing table
it is having complete network information

79. what is dual algorithm.


Diffusing Update Algorithm (DUAL) is an algorithm used by EIGRP to select and maintain the
best route to each remote network. DUAL is also used for the following purposes:
 discover a backup route if there is one available.
 support for variable length subnet masks (VLSMs).
 perform dynamic route recoveries.
 query neighbors for unknown alternate routes.
 send out queries for alternate routes.

80. what is successor.


A successor is the route with the best metric to reach a destination (best path). That route is
stored in the routing table
81. what is feasible successor.
A feasible successor is a backup path to reach that same destination that can be used
immediately if the successor route fails. These backup routes are stored in the topology table.

82. what is FD in eigrp.


The Feasible Distance (FD) is the metric from the current router to the destination router.

83. what is RD/AD in eigrp.


The Advertised Distance (AD) is the Metric from a given neighbor to the destination router.

84. what is variance.


EIGRP provides a mechanism to load balance over unequal cost paths
through Variance Command. Variance is a number (1 to 128),

85. what is offset list.


An offset list is the mechanism for increasing incoming and outgoing metrics to routes learned
via EIGRP or Routing Information Protocol (RIP)
It is used for load balancing or for path manipulation

86. OSPF works in which layer.


It works on layer 3

87. what is protocol number of OSPF.


Its protocol number is 89

88. what is SPF algorithm.


Shortest path first
Used by ospf protocol for best path selection

89. what is cost.


Open Shortest Path First (OSPF) uses "Cost" as the value of metric and uses a Reference
Bandwidth of 100 Mbps for cost calculation. The formula to calculate the cost is Reference
Bandwidth divided by interface bandwidth

90. BGP works on which layer of OSI model.


It works on layer 7
91. what is TCP port number of BGP.
TCP port number 179

92. what is ad value of BGP.


20/200

93. what is AD value of RIP.


AD value of RIP is 120

94. what is AD value of EIGRP.


AD value of EIGRP is 90/170

95. what is AD value of OSPF.


AD value of OSPF is 110

96. what is IBGP Neighborship.


Neighborship between two bgp routers who are using same as number

97. what is EBGP Neighborship.


Neighborship between two bgp routers who are using different as number

98. what are the BGP attributes.


BGP Attributes are pieces of information that a BGP router attaches to describe different prefixes
included in it's BGP update messages. There is a variable sequence of BGP attributes in every
update message except for those that carries only withdrawn routes.

99. what is the use of open msg in bgp.


An OPEN message is sent after the TCP three-way handshake is completed. The BGP OPEN
message is used to open a BGP peering session. The OPEN message contains information about
the BGP neighbor initiating the session, and information about supported and negotiated options
including:
1. BGP Version number
2. AS Number
3. Hold Down Time value
4. BGP Identifier
5. Optional Parameters
6. Optional Parameters length (0-255 in bytes)
100. what is the use of keep alive msg in BGP.
Keepalive messages are exchanged every one-third of the Hold Timer agreed upon between the
two BGP routers. Cisco devices have a default Hold Time of 180 seconds, so the
default Keepalive interval is 60 seconds. If the Hold Time is set for zero, no Keepalive
messages are sent between the BGP neighbors.

101. what is notification msg in BGP.


NOTIFICATION messages are used to signal when something is wrong with the BGP session.
A NOTIFICATION will be sent when any of the following occurs: An unsupported option is
sent in an OPEN message. A peer fails to send an update or keepalive

102. what is the use of hello msg in eigrp.


Hello, the message is the first message
which is sent to a neighbor router in order to become an EIGRP neighbor. In EIGRP, Hello
message is responsible for: Hello, the message is used for neighbor discovery. It is used for Keep
alive purpose. It is always multicast on every type of link.

103. what is the use of hello msg in ospf.


The Hello message contains a list of information needed to form an OSPF neighbor relation
between two neighboring routers, the following a list of information contained the Hello
messages: OSPF Router ID. The router's ID which is configured or automatically selected
by OSPF (analyzed below) Hello Interval Timer.

104. what is query msg in eigrp.


A QUERY message looks similar to an UPDATE packet but contains metrics which make the
route unreachable. When a router looses its best route (successor) for a network and there is no
backup route (feasible successor) for it, the router sends an EIGRP query message to locate any
alternate routes for that network.

105. what is update msg in eigrp.


When a router receives an UPDATE packet it sends back an UPDATE with the same route but
with infinite metrics. UPDATE messages are also used to perform “poison reverse” by
advertising a “received” route with an infinite metric. Example, Router A and Router B
are EIGRP neighbors
106. what are the states in ospf.
The states are Down, Attempt, Init, 2-Way, Exstart, Exchange, Loading, and Full.

107. what is SIA state in eigrp.


The SIA state means that an EIGRP router has not received a reply to a query from one or more
neighbors within the time allotted (approximately 3 minutes). When this happens, EIGRP clears
the neighbors that did not send a reply and logs a DUAL-3-SIA error message for the route that
went active.

108. explain LSA 1 in OSPF.


LSA Type 1 (Router LSA) packets are sent between routers within the same area of origin and
do not leave the area. An OSPF router uses LSA Type 1 packets to describe its own interfaces
but also carries information about its neighbors to adjacent routers in the same area.

109. explain LSA 2 in ospf.


LSA Type 2 (Network LSA) packets are generated by the Designated Router (DR) to describe all
routers connected to its segment directly. LSA Type 2 packets are flooded between neighbors in
the same area of origin and remain within that area.

110. what are the DR and BDR election criteria in ospf.


 highest priority
 highest router id

111. what is DR and BDR in ospf.


OSPF uses a DR (Designated Router) and BDR (Backup Designated Router) on each multi-
access network. OSPF uses a DR (Designated Router) and BDR (Backup Designated Router) on
each multi-access network.

112. what is LSA 3 in ospf.


OSPF summary LSA (Type 3 LSA) ... Type 3 LSAs are generated by ABR. They represent
networks from an area and are sent to the rest of the areas in OSPF domain. Type 1 LSAs don't
cross area boundary, so Area Border Router (ABR) uses type 3 LSA to inform other areas about
networks learned in its area.
113. what is ABR router in ospf.
A router who’s minimum one interface is in backbone area and at least one interface is in regular
area
An area border router (ABR) is a kind of router that is located near the border between one or
more Open Shortest Path First (OSPF) areas. It is used to establish a connection between
backbone networks and the OSPF areas.

114. what are the election criteria of router id in ospf.


 manual configured
 highest ip address of loopback interface
 highest IP address of physical interface

115. what is backbone area.


The backbone area (also known as area 0 or area 0.0. 0.0) forms the core of an OSPF network.
All other areas are connected to it, either directly or through other routers. Inter-area routing
happens via routers connected to the backbone area and to their own associated areas.

116. what is regular area.


Regular (nonbackbone) areas can have several subtypes: standard area, stub area, totally
stubby area, not-so-stubby area (NSSA), and totally stubby NSSA. Standard Area – a
nonbackbone area that must be connected to the backbone area; it accepts intra-area, inter-area,
external and a default route.’

117. what is backbone router.


A router which all interfaces are only in area 0 will be backbone router

118. what is internal router.


A router who’s all interfaces are only in regular are will be internal router

119. what is ASBR router.


A router who will perform redistribution will become asbr router

120. what are the flag bits in LSA 1.


B= Indicate to ABR
E= indicate to ASBR
V= indicate to end point of virtual link
121. what is LSA 4 in OSPF.
It is generated by an ABR. It is flooded from area 0 into a non-transit area and vice versa. It
represents the ABR's reachability to ASBRs in other areas where in it includes cost but hides the
ABR's actual path to the destination

122. what is LSA 5 in OSPF.


OSPF creates a type 5 LSA for a subnet that is injected into OSPF from an external source. To
inject the route, the autonomous System Border Router (ASBR), which is by definition a router
that connects to a non-OSPF routing domain, uses the redistribute command.

123. what is LSA 7.


This is a type 7 LSA that is generated by an NSSA ASBR. Type 5 LSAs are not allowed in
NSSA areas, so the NSSA ASBR generates a type 7 LSA instead, which remains within the
NSSA. This type 7 LSA gets translated back into a type 5 by the NSSA ABR.

124. what is stub area.


It is used to filter LSA 4 and LSA 5 in any regular area
Abr router inject a default route in this area automatically in the form on LSA 3
We can’t configure stub area where virtual link configured
Also backbone area can’t be configured stub area
Redistribution is not allowed in this area

125. what is stub router in eigrp.


Stub routing is an EIGRP feature primarily designed to conserve local router resources, such as
memory and CPU, and improve network stability. The stub routing feature is most commonly
used in hub-and-spoke networks.

126. what is totally stub area.


It is used to filter LSA 3, LSA 4 and lea 5 in any regular area
ABR router inject a default route in this area automatically in the form on LSA 3
We can’t configure stub area where virtual link configured
Also backbone area can’t be configured stub area
Redistribution is not allowed in this area

127. what is NSSA area.


It is used to filter LSA 4 and LSA 5 in any regular area
Abr router inject a default route in this area manually in the form on LSA 7
We can’t configure stub area where virtual link configure
Also backbone area can’t be configured stub area
Redistribution is allowed in this area in the form of LSA 7
128. what is totally nssa area.
It is used to Filter LSA 3, LSA 4 and lea 5 in any regular area
Abr router inject a default route in this area manually in the form on LSA 7
We can’t configure stub area where virtual link configured
Also backbone area can’t be configured stub area
Redistribution is allowed in this area in the form of LSA 3

129. what is passive interface.


Passive-interface command is used in all routing protocols to disable sending updates out from a
specific interface

130. What is Mac Agging time.


The MAC aging time specifies the time before an entry ages and is discarded from
the MAC address table. The range is from 0 to 1000000; The default value is 300 seconds.
Entering the value 0 disables MAC aging. If a VLAN is not specified, the age specification
applies to all VLANs.

131. What is Trunk port.


A trunk port is a port that is assigned to carry traffic for all the VLANs that are accessible by a
specific switch, a process known as trunking. Trunk ports mark frames with unique identifying
tags – either 802.1Q tags or Inter-Switch Link (ISL) tags – as they move between switches.

132. What is native VLan.


A native vlan is the untagged vlan on an 802.1q trunked switchport. ... Basically if a switch
receives untagged frames on a trunkport, they are assumed to be part of the vlan that are
designated on the switchport as the native vlan

133. What is DTP.


Dynamic Trunking Protocol (DTP) is a Cisco proprietary trunking protocol, which is used to
automatically negotiate trunks between Cisco switches.

134. What is use of STP.


The Spanning Tree Protocol (STP) is a network protocol that builds a loop-free logical topology
for Ethernet networks

135. What is Portfast.


Enabling the PortFast feature causes a switch or a trunk port to enter the STP forwarding-state
immediately or upon a linkup event, thus bypassing the listening and learning states.
136. What is BPDU Guard.
BPDU Guard feature is used to protect the Layer 2 Spanning Tree Protocol (STP) Topology
from BPDU related attacks. ... When a BPDU Guard enabled port receive BPDU from the
connected device, BPDU Guard disables the port and the port state is changed to Errdisable state.

137. What is LLDP protocol.


Link Layer Discovery Protocol (LLDP) is a vendor independent link layer protocol used by
network devices for advertising their identity, capabilities to neighbors on a LAN segment.

138. What is gateway of last resort.


A Gateway of Last Resort or Default gateway is a route used by the router when no other known
route exists to transmit the IP packet. Known routes are present in the routing table. Hence, any
route not known by the routing table is forwarded to the default route.

139. What are the difference between layer3 switch and router.
Hardware - The key difference between layer 3 switch vs router lies in the hardware. The
hardware inside a layer 3 switch blends that of traditional switches and routers, improving some
of a router’s software logic with integrated circuit hardware to offer better performance for
LANs. Additionally, designed specifically for use on intranets, a layer 3 switch usually has no
WAN ports and features a traditional router usually gets. So layer 3 switch is most used to
support routing between VLANs.
Interfaces - Another difference regarding a layer 3 switch vs router is that a Layer 3 switch is
limited in interfaces it supported (usually just Ethernet for RJ45 and single mode/multimode
fiber). While a router have more options like SDH, SONET, E1/T1 etc. Moreover, routers were
devices that connected the LAN to the WAN and switches were just LAN devices.
Working Principle – Layer 3 switch looks at the MAC address of the destination host and sends
the frame only to that recipient. A router refers to the target IP address instead of its MAC
address, thus it generally provides more functionality than mere packet routing, such as IP
address assignment (DHCP) and firewall filtering.

140. What is DHCP snooping.


DHCP snooping can be configured on LAN switches to prevent from rogue DHCP servers.

141. What is dynamic ARP inspection.


Dynamic ARP Inspection (DAI
) is a security feature that validates Address Resolution Protocol (ARP) packets in a network.
DAI allows a network administrator to discard ARP packets with invalid MAC address
to IP address bindings
142. What is port security.
Port security is a layer two traffic control feature on Cisco Catalyst switches. It enables an
administrator configure individual switch ports to allow only a specified number of source MAC
addresses ingressing the port.

143. Which command used to enable ipv6 routing.


Ipv6 unicast-routing

144. What is HSRP.


Hot standby router protocol (HSRP) , it is a redundancy protocol developed by Cisco to provide
gateway redundancy without any additional configuration on the end devices in the subnet.
it is a layer 7 protocol and uses UDP port number 1985. It uses multicast address 224.0.0.2

145. What are the modes of PAGP.


Port aggregation protocol
There are two modes of PAGP, Namely - desirable and auto

146. What are the modes of LACP.


Link aggregation control protocol
There are two modes of PAGP, Namely - active and passive

147. What are the port states in stp.


 Disable
 Blocking
 Listening
 Learning
 Forwarding

148. What are the port roles in stp.


 Alternate
 desiganated port
 Root port

149. What is APIPA.


Automatic private IP address
Range 169.254.0.1 to 169.254.255.254
It is used to automatically assign IP address to the computers if there is no dhcp server or no
static address configured
150. How many collision domain and broadcast domain are available in Router, switch and
hub.
Router- each port has one separate collision domain and one separate broadcast domain
Switch- each port has one separate collision domain but all port has one broadcast domain
Hub- all ports have one collision domain and one broadcast domain

151. What are the major protocol used in wan.


HDLC
PPP
FRAME-RELAY

152. What is VTP.


Vlan trunking protocol
It is used to allow vlan information to be automatically propagated through out the switched
network

153. What are the various modes of vtp.


Server
Client
Transparent
Off

You might also like