hi friends i have some problem regarding technical round
ahr round plz tell me what should the right answer
technical questions
1 what is brouter
2 what is the menaing of 10 base2, 10 base 5 and 10baset
3 what is diffrence between bit rate and baud rate.
and this question was tooooooooooo much difficult to me
that
hr said to me that
rank me after the taking the all short of interview
Answers were Sorted based on User's Feedback
Answer / jitendera sinha.it@gmil.com
hi i am jitendera sinha. and i am trying to give that answer
1 Brouter=bridge+router is called brouter.in another we can
say that the router which have both brifge nad router
property is called brouter.
2 10 base 2 is ethernet term trhat consern with datta
tratnsfer take place at speed of 10mbps/s having lenthg of
section 100 meter with two contiguish segment.
similary 10 base 5 is alswo a etehernet terme nad having
data transfer rate 10mbps havinf 5 continious segment
oflength 100 m
3 same as 1 and 2 but applyed for twisted cable
4 bit rate=numbaer of bit /sec is called bit rate
baud rate num
ber of bit/n
naswer of hr question-
if i will be there then i will say that sir as far my
consern u look very much anlaytical and methdical and pay a
silent view no ranking has be done
thanks
n=signal shift
Is This Answer Correct ? | 1 Yes | 0 No |
Answer / sohan
hi i am sohan any one have another answer about hr question
if yes then plz plz write
Is This Answer Correct ? | 0 Yes | 0 No |
Answer / jitendera sinha.
hi sir BhuvaneswariKulandaivelu
thnaks to making this answer bu sir i have readen in the
bok that max^m length of segment is 100 miter and u told
200 meter sir please clearfy it and having conituniusg
segment of 2
plz mail me on jitenderasinha.it2@gmail.com
Other CCNA Interview Questions
Question Asked @ Answers
Which statement is true regarding Administrative distance?
A.) It is a metric B.) Number of hops between two routers
C.) Trustworthiness of the routing information D.) RIP
Administrative distance is 100 1
Which range of possible numbers do standard ipx access
lists have? A. 100 199 B. 600 699 C. 800 899 D. 1000-1099
1
Which OSI layer incorporates the MAC address and the LLC?
A.) Data link B.) Network C.) Physcial D.) Transport 2
Routers that have Flash memory typically have a ore loaded
copy of place IOS software. Which command should you use to
make a backup copy of the software image onto a given
network server? A. copy flash tftp B. save copy to tftp C.
write backup tftp D. write, backup -server-name- E. copy
backup to -server-name- 1
As a system administrator, you perform an extended ping at
the privileged EXEC prompt. As part of the display, you
see "Set DF bit in IP header? [yes] :" What would happen if
you answered no at the prompt. A. This lets the router
fragment the packet. B. It tells the router not to fragment
the packet. C. This lets the router direct the packet to
the destination it finds in its routing table. D. It tell
the router to send the packet to the next hop router. 1
Which two describe frame tagging? A.) Examines particular
info about each frame B.) A unique ID placed in the header
of each frame as it traverses the switch fabric C.) A user-
assigned ID defined to each frame D.) The building of
filter tables 1
If you are running Token Ring with Novell IPX routing,
which encapsulation should you use? A.) SAP B.) SNAP C.)
802.5 D.) 802.2 1
With distance vector routing protocols, it is never useful
to send the same routing update packet back out the same
interface that it was learned. This concept is called what?
A.) Holddown timers B.) Poison Reverse C.) Count to
infinity D.) Split Horizon E.) Link State 1
Which statement is true regarding full duplex? A.) Allows
for transmission and receiving of data simultaneously B.)
Only works in a multipoint configuration C.) Does not
affect the bandwidth D.) Allows for transmission and
receiving of data but not a the same time 1
Based upon the 1st octet rule identify the range for a
Class A address? A.) 1 - 126 B.) 192 - 223 C.) 128 - 191
D.) 1 - 191 1
When you enter router passwords during the setup dialog
what is the difference between enable and the enable secret
passwords? A. The enable password is encrypted B. The
enable secret password uses IPSec password authentication
C. The enable secret password cannot be seen as clear text
when viewing the configuration D. The enable secret
password acts as a backup in case the enable password is
compromised Wipro 6
Identify 2 HDLC characteristics? A.) Default serial
encapsulation B.) Open standard C.) Supports Stacker
compression D.) Supports point-to-point and multipoint 1
Using the access-list command, 'access-list 1 deny
2.2.2.2', what else must be done to stop host 2.2.2.2 from
sending any traffic out of physical interface E0, while
still allowing other traffic? A.) In global mode, Add a
line - 'access-list 1 permit 0.0.0.0 255.255.255.255' B.)
On interface E0, Add a line - 'access-group 1 in' C.) In
global mode, Add a line - 'access-list 1 permit all' D.) On
interface E0, Add a line - 'access-list 1 in' E.) On
interface E0, Add a line - 'access-list 1 out' F.) On
interface E0, Add a line - 'ip access-group 1' 1
Which command will display the encapsulation type on
interface serial 0? A.) show interface s0 B.) show all C.)
show int s0 encap D.) show encap s0 E.) show encap 1
Identify the 3 major functions at layer 3 of the OSI model?
A.) Forwarding process B.) Logical addressing C.) End-to-
end connections D.) Path selection E.) MAC address
examination F.) Network monitoring 1
Identify 3 IP routing protocols? A.) RIP B.) AURP C.) OSPF
D.) IGRP E.) ARP F.) ICMP 2
You are conferring a Frame Relay router with subinterfaces
on interface Serial 0 Which subinterfaces numbers could you
use for this configuration? A. 1 and 2 B. 0 2 and 0 3 C. 1
0 and 1 1 D. 0 1 a and 0 1 1
Identify the hardware component used to store buffers,
tables, running-configuration etc? A.) NVRAM B.) ROM C.)
RAM D.) Flash 2
Whith the hierarchical numbering of IP addressing what
determines the spoon of the address that will identify the
network number? A. subnet mask B. dots between octets C.
class of the first octet D. assignments of DHCP E.
address
Is This Answer Correct ? | 0 Yes | 0 No |
Answer / mahesh
we hve 3 types of cables
1.coaxil
2.Twistedpair
3.Fiber optic
the coaxil cable is classifed as (clasifed on the basis of
network segment)
a.10 base 2, the length is exactly 185 meters not 200m
10mbps baseband signal,also called thinnet
b.10 base5, can support upto 500m ,aslo called thicknet
for 10 base t which is twistedpair cable has max length of
100meters
-----------------------------------------------------------
Which statement is true regarding Administrative distance?
A.) It is a metric B.) Number of hops between two routers
C.) Trustworthiness of the routing information D.) RIP
Administrative distance is 100 1
ANSWER IS C:
Which range of possible numbers do standard ipx access
lists have? A. 100 199 B. 600 699 C. 800 899 D. 1000-1099
ANSWER IS C:800-899(STANDERD)
900-999(EXTENDED)
Which OSI layer incorporates the MAC address and the LLC?
A.) Data link B.) Network C.) Physcial D.) Transport
ANS B:
Routers that have Flash memory typically have a ore loaded
copy of place IOS software. Which command should you use to
make a backup copy of the software image onto a given
network server? A. copy flash tftp B. save copy to tftp C.
write backup tftp D. write, backup -server-name- E. copy
backup to -server-name- 1
ANS A:
As a system administrator, you perform an extended ping at
the privileged EXEC prompt. As part of the display, you
see "Set DF bit in IP header? [yes] :" What would happen if
you answered no at the prompt. A. This lets the router
fragment the packet. B. It tells the router not to fragment
the packet. C. This lets the router direct the packet to
the destination it finds in its routing table. D. It tell
the router to send the packet to the next hop router. 1
ANS A: IT TELS ROUTER TO FRAGMENT PACKET
With distance vector routing protocols, it is never useful
to send the same routing update packet back out the same
interface that it was learned. This concept is called what?
A.) Holddown timers B.) Poison Reverse C.) Count to
infinity D.) Split Horizon E.) Link State
ANS D: SPLIT HORIZON
Which statement is true regarding full duplex? A.) Allows
for transmission and receiving of data simultaneously B.)
Only works in a multipoint configuration C.) Does not
affect the bandwidth D.) Allows for transmission and
receiving of data but not a the same time
ANS A:
Based upon the 1st octet rule identify the range for a
Class A address? A.) 1 - 126 B.) 192 - 223 C.) 128 - 191
D.) 1 - 191
ANS A:
When you enter router passwords during the setup dialog
what is the difference between enable and the enable secret
passwords? A. The enable password is encrypted B. The
enable secret password uses IPSec password authentication
C. The enable secret password cannot be seen as clear text
when viewing the configuration D. The enable secret
password acts as a backup in case the enable password is
compromised Wipro
ANS C:
Identify 2 HDLC characteristics? A.) Default serial
encapsulation B.) Open standard C.) Supports Stacker
compression D.) Supports point-to-point and multipoint 1
ANS A,D
Is This Answer Correct ? | 0 Yes | 0 No |
Answer / bhuvaneswarikulandaivelu
The name 10BASE2 is otherwise known as thinnet. The 10
comes from the maximum transmission speed of 10 Mbit/s
(millions of bits per second). The BASE stands for baseband
signalling(signals having frequencies zero or very near to
zero), and the 2 represents the maximum segment length of
200 meters
Is This Answer Correct ? | 0 Yes | 1 No |
Which of the following can reply to a Novell Get Nearest Server (GNS) request? A.) Local Novell server B.) Remote Novell Printer C.) Cisco router D.) Novell client
Utilizing RIP, what is the limit when it comes to number of hops?
What are the different types of passwords that you can use in cisco routers?
Given an IP host address of 172.16.2.160 and a shored mask of 255.255.255.192 to which shored does the host belong? A. 172.16.2.32 B. 172.16.2.64 C. 172.16.2.96 D. 172.16.2.128 E. 172.16.2.192
Which protocol carries messages such as destination Unreachable, Time Exceeded, Parameter Problem, Source Quench, Redirect, Echo, Echo Reply, Timestamp, Information Request, Information Reply, Address Request, and Address Reply? A. ICMP B. UDP C. TCP D. TFTP E. FTP
if i had a video conferencing device why should it is needed to configure a static IP for that,will it not work on the local lan.
How do we do encryption and authentication in L2TP?
Identify 3 IP applications? A.) AURP B.) ARP C.) Telnet D.) SMTP E.) DNS F.) RARP
What are the job opportunities i will get once i complete my CCNA certification.
What is the draw back of ospf protocol?
Hi all, Sorry, but i want to say that right now i have around two years experience and doing the job as a network engineer(ccna certified).but i want switch job so please can tell me any opportunity.
Briefly explain the conversion steps in data encapsulation.