Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                

CCNA Interview

Download as doc, pdf, or txt
Download as doc, pdf, or txt
You are on page 1of 8

1. What is the subnet mask 10.2.1.3/22?

2. What is the administrative distance of EIGRP, eBGP, iBGP?

Administrative distance is the measure used by Cisco routers to select the best path when there are two or more different routes to the same destination from two different routing protocols.
EIGRP (Summary Route) 5 & internal 90, external 170

eBGP= 20,

iBGP=200

DHCP=254 3. What is your favorite routing Protocol?

While there is often a right tool for the job, all routing protocols have their strengths and weaknesses, and I dont believe that there is a clear-cut best routing protocol that is the right tool for every network. Thus, to help you select the most appropriate routing protocol for your network, I am going to examine the pros and cons of the best-known routing protocols and offer some guidance on when it makes sense to use one or the other.
4. In EIGRP, what is a Stuck in Active route?
Stuck In Active means. Basically, if a router tries to find a successor, but doesnt get an answer back within 3 minutes, it flags this error

5. In OSPF, what is a totaly stubby area? What does Area Zero do?
A stubby area ignores external routes (O E1, O E2), and permits both inter and intra area routes (O IA and O). The path to the external routes is replaced by a default route injected by the ABR. without an area 0 you are in danger of a routing loop

6. Which internal routing protocol would use if you needed to route between Cisco and nonCisco equipment?

WRT54G router

try this 1. connect the modem's ethernet port to the internet port of your WRT54G router 2. connect the pc to the regular port 1 2 3 or 4 on the back of your router 3. turn off the modem, hold the routers reset button for 30 seconds then release it 4. restart the computer 5. access the routers setup page by opening internet explorer, then type - http://192.168.1.1 6. once youre prompted with a login, leave username blank password "admin" 7. go to MAC ADDRESS CLONE tab, enable this option, click CLONE YOUR PC'S MAC, then save settings 8. go back to setup tab, make sure internet connection type is set to - Automatic Configuration DHCP 9. change the part where it says LAN IP address to 192.168.2.1 10.power off the router, then the computer for 1 minute 11. power on the modem first, then the router, lastly the computer (make sure you have the lights stable on the device before turning ON the next one... 12. try to get online after that

7. Explain what a 3-way handshake is in TCP?


The TCP three-way handshake in Transmission Control Protocol (also called the TCP-handshake; three message handshake and/or SYN-SYN-ACK) is the method used by TCP set up a TCP/IP connection over an Internet Protocol based network SYN-SYN-ACK" (or more accurately SYN, SYN-ACK, ACK) because there are three messages transmitted by TCP to negotiate and start a TCP session between two computers

8. What is a VLAN trunking protocol?


VLAN Trunking Protocol (VTP) is a Cisco proprietary protocol that propagates the definition of Virtual Local Area Networks (VLAN) on the whole local area network.[1] To do this, VTP carries VLAN information to all the switches in a VTP domain.

9. What is the different between 802.1q and ISL?


The short answer is that ISL is a pre-standard cisco proprietary protocol whereas 802.1q is an IEEE standard

10. Explain what is an Ether-Channel?

EtherChannel provides incremental trunk speeds between Fast Ethernet, Gigabit Ethernet, and 10 Gigabit Ethernet. EtherChannel combines multiple Fast Ethernet up to 800Mbps, Gigabit Ethernet up to 8Gbps , and 10 Gigabit Ethernet up to 80Gbps.

11. What do you need to do to setup a VTP domain?


All switches must have: 1. same the VTP domain name, unless the network design insists for different VTP domains 2. must run same VTP version 3. same VTP password, if any. 4. same configuration revision number and it should also be the highest in the domain 5. When you move a VTP mode of a switch from Transparent to Server on the VTP Transparent switch , it should exist on the Server switch

12. What is Spanning Tree used for?


The Spanning Tree Protocol (STP) is a network protocol that ensures a loop-free topology for any bridged Ethernet local area network. The basic function of STP is to prevent bridge loops and the broadcast radiation that results from them. Spanning Tree Protocol (STP) is standardized as IEEE 802.1D. As the name suggests, it creates a spanning tree within a mesh network of connected layer-2 bridges

13. What is a root bridge and why do you need one?


The Root bridge (switch) is a special bridge at the top of the Spanning Tree (inverted tree). The branches (Ethernet connections) are then branched out from the root switch, connecting to other switches in the Local Area Network (LAN).

14. What is needed on a router interface to allow DHCP to function on a subnet?

Components Used
This document is not restricted to specific software and hardware versions.

Additional Information
If definitions are helpful to you, use these vocabulary terms to get you started:

AddressThe unique number ID assigned to one host or interface in a network. SubnetA portion of a network sharing a particular subnet address.

Subnet maskA 32-bit combination used to describe which portion of an address refers to the subnet and which part refers to the host. InterfaceA network connection.

15. Describe what a stateful firewall is? In computing, a stateful firewall (any firewall that performs stateful packet inspection (SPI) or stateful inspection) is a firewall that keeps track of the state of network connections (such as TCP streams, UDP communication) traveling across it. The firewall is programmed to distinguish legitimate packets for different types of connections. Only packets matching a known active connection will be allowed by the firewall; others will be rejected. 16. What is HSRP? Is this an open standard?

Yes

Short for Hot Standby Routing Protocol, a proprietary protocol from Cisco. for establishing a fault-tolerant default gateway , HSRP is not a routing protocol as it does not advertise IP routes or affect the routing table in any way.

17. In a PIX/ASA, what are security levels used for?

PIX (hardware firewall) is used for Home appliances / SAN(Small Area Network) ASA (Anti-malware Security Appliance) used for small to midsize companies.
18. What two things are needed in a PIX/ASA firewall to allow traffic to pass from a higher

security level to a lower security level?

Linux IPCOP firewall with a dmz interface Two things are:


high-to-low is allowed by default unless a specific access-list/outbound denies it.
low-to-high is allowed only if there is an access-list/conduit that allows the connection

19. In IPSec VPNs, what is diffe helman? What is it used for?


This key can then be used to encrypt subsequent communications using a symmetric key cipher It is a specific method of exchanging cryptographic keys

20. In an IPSec tunnel, what is main mode?

Transport mode and Tunnel mode

Transport Mode
Transport mode is the default and should be used when you want to secure data transmission within a network. It will secure traffic from endpoint to endpoint

Tunnel Mode Tunnel mode is used when you need to secure data transmission between two networks. It will secure the IP traffic from one network's border router to the other

APIPA (Automatic Private IP Addressing)


an automatically self-configure an IP address and subnet mask when a DHCP server isn't available.

Baseband
Baseband transmissions typically use digital signaling over a single wire; the transmissions themselves take the form of either electrical pulses or light

Broadband

Broadband uses analog signals in the form of optical or electromagnetic waves over multiple transmission frequencies

UTP = Unshielded Twisted Pair STP = Shielded Twisted Pair


STP is the basic standard and so is compatible with all versions (including PVST and PVST+)

In RSTP, if a link is added /lost, the adaptation time is reduced to three hello times, which has a default value of 2 seconds for a total of 6 seconds In STP, if the topology changes either because of a new link added or a link lost, it can take anywhere between 30 to 50 seconds in order to adapt to the new topology and provide the least cost path.

Access Point (AP)


A communication hub for users of a wireless device to connect to a wired LAN. wireless security and for extending the physical range

How to increase number of LAN ports on a router ?


If neither device has an Uplink port, you most likely need to use a Crossover cable and plug it into any port on both the router and the switch/hub.

NetBIOS is an acronym for Network Basic Input/Output System. It provides


services related to the session layer of the OSI model allowing applications on separate computers to communicate over a local area network.

NetBEUI
Pronounced net-booey, NetBEUI is short for NetBios Extended User Interface. It is an enhanced version of the NetBIOS protocol used by network operating systems such as LAN Manager, LAN Server, Windows for Workgroups, Windows 95 and Windows NT.

PING utility (Packet Internet Gopher)


Ping is a computer network administration utility used to test the reachability of a host on an Internet Protocol (IP) network and to measure the round-trip time for messages sent from the originating host to a destination computer.

Routing Tables 1. Fixed table must be manually modified every time there is a change. 2. Dynamic table changes its information based on network traffic, reducing the amount of manual maintenance. 3. Fixed central table lets a manager modify only one table, which is then read by other devices. The fixed central table reduces the need to update each machine's table, as with the fixed table. Note : Dynamic table causes the fewest problems for a network administrator, although
the table's contents can change without the administrator being aware of the change.

RAID (redundant array of independent disks, originally


redundant array of inexpensive disks[1][2]) is a storage technology that combines multiple disk drive components into a logical unit. Data is distributed across the drives in one of several ways called "RAID levels", depending on what level of redundancy and performance (via parallel communication) is required.

What are 10Base2, 10Base5 and 10BaseT Ethernet LANs?


10Base2An Ethernet term meaning a maximum transfer rate of 10 Megabits per second that uses baseband signaling, with a contiguous cable segment length of 100 meters and a maximum of 2 segments. 10Base5An Ethernet term meaning a maximum transfer rate of 10 Megabits per second that uses baseband signaling, with 5 continuous segments not exceeding 100 meters per segment. 10BaseTAn Ethernet term meaning a maximum transfer rate of 10 Megabits per second that uses baseband signaling and twisted pair cabling.

You might also like