Certifications Interview Questions
Questions Answers Views Company eMail

What are 3 ways to provide login access to router? A.) Console B.) TFTP C.) Rlogin D.) Auxiliary Port E.) X Windows F.) Telnet

2 4062

Which of the following statements are true? A.) Store and forward switching creates variable latency through the switch B.) Cut through switching creates variables latency through the switch C.) Cut through switching works at wire speed D.) Store and forward switching works at wire speed

1 3915

Which of the following can reply to a Novell Get Nearest Server (GNS) request? A.) Local Novell server B.) Remote Novell Printer C.) Cisco router D.) Novell client

1 2958

Identify the 3 kinds of routes IGRP advertises? A.) Interior B.) Dynamic C.) System D.) Exterior

1 3148

What is the routing metric used by RIP? A.) Route poisoning B.) Split horizon C.) Hop Count D.) TTL

1 3312

What is the default encapsulation and frame type on an Ethernet interface when enabling Novell? A.) SNAP B.) Ethernet_II C.) 802.2 D.) 802.3 E.) SAP F.) Novell-ether

2 7701

What is true when creating static route? A.) The mask parameter is optional B.) The administrative distance is required C.) The gateway parameter is required D.) The administrative distance is optional

1 4080

Of the following switching types, which one has the highest latency? A.) Cut-through B.) None C.) Store-and-forward D.) Fragment Free

1 4298

What does the IPX maximum-path command do? A.) Allows you to disable the TTL on an IPX packet B.) This parameter is only used in NLSP routing C.) Sets the maximum metric that can appear in the routing table D.) Configures round robin load sharing over multiple equal metric paths (parallel paths)

1 3332

What does -1 mean in an extended IPX access-list? A.) Any IP address B.) Deny all C.) Deny host D.) Any host or any network

1 3042

What parameter is used with statically assigned routers to tell packets which interface to use to reach a distant network? A.) Mask B.) Subnet C.) Default gateway D.) Interface

1 3069

Which of the following protocols are used to get an IP address from a known MAC address? A.) BootP B.) TCP C.) IP D.) ARP E.) RARP F.) ICMP

3 5686

What does the Spanning Tree Algorithm (STA) do? A.) Restore lost frames B.) Builds routing tables for routing through an internetwork C.) Forward packets through a switch D.) STA is implemented by STP to prevent loops

2 4965

IP extended access lists use which of the following as a basis for permitting or denying packets? A.) destination address B.) all of the above C.) protocol D.) source address E.) port

3 4379

What is the extended IPX access list range? A.) 901-1000 B.) 100-199 C.) 900-999 D.) 1000-1000

2 4665


Un-Answered Questions { Certifications }

Where can I get LAtest qtp 2010 exam questions ?

2048


difference between layer 3 switch and router

2223


what command you must use if you want to delete or remove the configuration data that is stored in the NVRAM?

754


What are the types of communication in ipv6 ?

620


Which command we use for ping in ipv6?

714






Define the virtual channel?

609


If bandwidth will increase what will happen?

745


Which feature should a routing protocol have to support vlsm?

693


Tell me how many fillers we can put in one ip of ipv6?

649


What is ccna?

675


What are the different types of passwords used in securing a CISCO router?

683


Which type for communication switch do?

693


what are the different symmetric algorithms?

1588


In which protocol you manually enable route summarization?

757


In which protocol supenetting is enable by default?

718