hi friends i have some problem regarding technical round
ahr round plz tell me what should the right answer

technical questions
1 what is brouter
2 what is the menaing of 10 base2, 10 base 5 and 10baset
3 what is diffrence between bit rate and baud rate.
and this question was tooooooooooo much difficult to me
that
hr said to me that
rank me after the taking the all short of interview

Answers were Sorted based on User's Feedback



hi friends i have some problem regarding technical round ahr round plz tell me what should the rig..

Answer / jitendera sinha.it@gmil.com

hi i am jitendera sinha. and i am trying to give that answer
1 Brouter=bridge+router is called brouter.in another we can
say that the router which have both brifge nad router
property is called brouter.

2 10 base 2 is ethernet term trhat consern with datta
tratnsfer take place at speed of 10mbps/s having lenthg of
section 100 meter with two contiguish segment.

similary 10 base 5 is alswo a etehernet terme nad having
data transfer rate 10mbps havinf 5 continious segment
oflength 100 m
3 same as 1 and 2 but applyed for twisted cable

4 bit rate=numbaer of bit /sec is called bit rate
baud rate num
ber of bit/n


naswer of hr question-
if i will be there then i will say that sir as far my
consern u look very much anlaytical and methdical and pay a
silent view no ranking has be done
thanks
n=signal shift

Is This Answer Correct ?    1 Yes 0 No

hi friends i have some problem regarding technical round ahr round plz tell me what should the rig..

Answer / sohan

hi i am sohan any one have another answer about hr question
if yes then plz plz write

Is This Answer Correct ?    0 Yes 0 No

hi friends i have some problem regarding technical round ahr round plz tell me what should the rig..

Answer / jitendera sinha.

hi sir BhuvaneswariKulandaivelu
thnaks to making this answer bu sir i have readen in the
bok that max^m length of segment is 100 miter and u told
200 meter sir please clearfy it and having conituniusg
segment of 2

plz mail me on jitenderasinha.it2@gmail.com
















Other CCNA Interview Questions

Question Asked @ Answers

Which statement is true regarding Administrative distance?
A.) It is a metric B.) Number of hops between two routers
C.) Trustworthiness of the routing information D.) RIP
Administrative distance is 100 1
Which range of possible numbers do standard ipx access
lists have? A. 100 199 B. 600 699 C. 800 899 D. 1000-1099
1
Which OSI layer incorporates the MAC address and the LLC?
A.) Data link B.) Network C.) Physcial D.) Transport 2
Routers that have Flash memory typically have a ore loaded
copy of place IOS software. Which command should you use to
make a backup copy of the software image onto a given
network server? A. copy flash tftp B. save copy to tftp C.
write backup tftp D. write, backup -server-name- E. copy
backup to -server-name- 1
As a system administrator, you perform an extended ping at
the privileged EXEC prompt. As part of the display, you
see "Set DF bit in IP header? [yes] :" What would happen if
you answered no at the prompt. A. This lets the router
fragment the packet. B. It tells the router not to fragment
the packet. C. This lets the router direct the packet to
the destination it finds in its routing table. D. It tell
the router to send the packet to the next hop router. 1
Which two describe frame tagging? A.) Examines particular
info about each frame B.) A unique ID placed in the header
of each frame as it traverses the switch fabric C.) A user-
assigned ID defined to each frame D.) The building of
filter tables 1
If you are running Token Ring with Novell IPX routing,
which encapsulation should you use? A.) SAP B.) SNAP C.)
802.5 D.) 802.2 1
With distance vector routing protocols, it is never useful
to send the same routing update packet back out the same
interface that it was learned. This concept is called what?
A.) Holddown timers B.) Poison Reverse C.) Count to
infinity D.) Split Horizon E.) Link State 1
Which statement is true regarding full duplex? A.) Allows
for transmission and receiving of data simultaneously B.)
Only works in a multipoint configuration C.) Does not
affect the bandwidth D.) Allows for transmission and
receiving of data but not a the same time 1
Based upon the 1st octet rule identify the range for a
Class A address? A.) 1 - 126 B.) 192 - 223 C.) 128 - 191
D.) 1 - 191 1
When you enter router passwords during the setup dialog
what is the difference between enable and the enable secret
passwords? A. The enable password is encrypted B. The
enable secret password uses IPSec password authentication
C. The enable secret password cannot be seen as clear text
when viewing the configuration D. The enable secret
password acts as a backup in case the enable password is
compromised Wipro 6
Identify 2 HDLC characteristics? A.) Default serial
encapsulation B.) Open standard C.) Supports Stacker
compression D.) Supports point-to-point and multipoint 1
Using the access-list command, 'access-list 1 deny
2.2.2.2', what else must be done to stop host 2.2.2.2 from
sending any traffic out of physical interface E0, while
still allowing other traffic? A.) In global mode, Add a
line - 'access-list 1 permit 0.0.0.0 255.255.255.255' B.)
On interface E0, Add a line - 'access-group 1 in' C.) In
global mode, Add a line - 'access-list 1 permit all' D.) On
interface E0, Add a line - 'access-list 1 in' E.) On
interface E0, Add a line - 'access-list 1 out' F.) On
interface E0, Add a line - 'ip access-group 1' 1
Which command will display the encapsulation type on
interface serial 0? A.) show interface s0 B.) show all C.)
show int s0 encap D.) show encap s0 E.) show encap 1
Identify the 3 major functions at layer 3 of the OSI model?
A.) Forwarding process B.) Logical addressing C.) End-to-
end connections D.) Path selection E.) MAC address
examination F.) Network monitoring 1
Identify 3 IP routing protocols? A.) RIP B.) AURP C.) OSPF
D.) IGRP E.) ARP F.) ICMP 2
You are conferring a Frame Relay router with subinterfaces
on interface Serial 0 Which subinterfaces numbers could you
use for this configuration? A. 1 and 2 B. 0 2 and 0 3 C. 1
0 and 1 1 D. 0 1 a and 0 1 1
Identify the hardware component used to store buffers,
tables, running-configuration etc? A.) NVRAM B.) ROM C.)
RAM D.) Flash 2
Whith the hierarchical numbering of IP addressing what
determines the spoon of the address that will identify the
network number? A. subnet mask B. dots between octets C.
class of the first octet D. assignments of DHCP E.
address

Is This Answer Correct ?    0 Yes 0 No

hi friends i have some problem regarding technical round ahr round plz tell me what should the rig..

Answer / mahesh

we hve 3 types of cables
1.coaxil
2.Twistedpair
3.Fiber optic
the coaxil cable is classifed as (clasifed on the basis of
network segment)
a.10 base 2, the length is exactly 185 meters not 200m
10mbps baseband signal,also called thinnet
b.10 base5, can support upto 500m ,aslo called thicknet

for 10 base t which is twistedpair cable has max length of
100meters
-----------------------------------------------------------


Which statement is true regarding Administrative distance?
A.) It is a metric B.) Number of hops between two routers
C.) Trustworthiness of the routing information D.) RIP
Administrative distance is 100 1

ANSWER IS C:

Which range of possible numbers do standard ipx access
lists have? A. 100 199 B. 600 699 C. 800 899 D. 1000-1099

ANSWER IS C:800-899(STANDERD)
900-999(EXTENDED)

Which OSI layer incorporates the MAC address and the LLC?
A.) Data link B.) Network C.) Physcial D.) Transport

ANS B:

Routers that have Flash memory typically have a ore loaded
copy of place IOS software. Which command should you use to
make a backup copy of the software image onto a given
network server? A. copy flash tftp B. save copy to tftp C.
write backup tftp D. write, backup -server-name- E. copy
backup to -server-name- 1

ANS A:

As a system administrator, you perform an extended ping at
the privileged EXEC prompt. As part of the display, you
see "Set DF bit in IP header? [yes] :" What would happen if
you answered no at the prompt. A. This lets the router
fragment the packet. B. It tells the router not to fragment
the packet. C. This lets the router direct the packet to
the destination it finds in its routing table. D. It tell
the router to send the packet to the next hop router. 1

ANS A: IT TELS ROUTER TO FRAGMENT PACKET


With distance vector routing protocols, it is never useful
to send the same routing update packet back out the same
interface that it was learned. This concept is called what?
A.) Holddown timers B.) Poison Reverse C.) Count to
infinity D.) Split Horizon E.) Link State

ANS D: SPLIT HORIZON

Which statement is true regarding full duplex? A.) Allows
for transmission and receiving of data simultaneously B.)
Only works in a multipoint configuration C.) Does not
affect the bandwidth D.) Allows for transmission and
receiving of data but not a the same time

ANS A:

Based upon the 1st octet rule identify the range for a
Class A address? A.) 1 - 126 B.) 192 - 223 C.) 128 - 191
D.) 1 - 191

ANS A:

When you enter router passwords during the setup dialog
what is the difference between enable and the enable secret
passwords? A. The enable password is encrypted B. The
enable secret password uses IPSec password authentication
C. The enable secret password cannot be seen as clear text
when viewing the configuration D. The enable secret
password acts as a backup in case the enable password is
compromised Wipro

ANS C:

Identify 2 HDLC characteristics? A.) Default serial
encapsulation B.) Open standard C.) Supports Stacker
compression D.) Supports point-to-point and multipoint 1

ANS A,D

Is This Answer Correct ?    0 Yes 0 No

hi friends i have some problem regarding technical round ahr round plz tell me what should the rig..

Answer / bhuvaneswarikulandaivelu

The name 10BASE2 is otherwise known as thinnet. The 10
comes from the maximum transmission speed of 10 Mbit/s
(millions of bits per second). The BASE stands for baseband
signalling(signals having frequencies zero or very near to
zero), and the 2 represents the maximum segment length of
200 meters

Is This Answer Correct ?    0 Yes 1 No

Post New Answer

More CCNA Interview Questions

What do you understand by redundancy?

0 Answers  


When the router runs out of buffer space, this is called ________. A. Source Quench B. Redirect C. Information Request D. Low Memory

2 Answers  


HIGH MY ALL FRIENDS. CURRENTLY I AM WORKING DESKTOP SUPPORT ENGINEER IN mahindra & mahindra lTD.I AM CERTIFIED IN CCNA SINCE 28 DEC 2009.BUT I HAVE NOT RECEIVED CCNA CERTIFICATE. PLEASE HELP ME ..HOW RECEIVE THE CCNA CERTIFICATE.IF ANY INFORMATION IS AVAILABLE PLS SEND INFORMATION TO MY GMAIL ID.MY ID---- ngawde.cisco@gmail.com ngawde@yahoo.com

1 Answers   MAHINDRA,


Which of the following describe full-duplex transmission? A.) Uses a single wire B.) Data transmission in both directions, but only one way at a time C.) Uses a point-to-point connection from the transmitter of the transmitting station to the receiver of the receiving station D.) Data transmission in only one direction

2 Answers  


how to find network ID from IP address?without using network calc...

12 Answers   Idea, Karbon, NIIT,






What is the mau?

0 Answers  


Which protocol resolves an IP address to a MAC address? A.) DHCP B.) RARP C.) ARP D.) NBP E.) DNS

3 Answers  


How do areas benefit a link state inter network?

0 Answers  


The -- terminal no editing -- command will perform what function? A.) Edit the contents of NVRAM B.) Allows access to the terminal port C.) Stops the advanced editing feature D.) Enable password functions

1 Answers  


Identify the correct pair of Novell Ethernet encapsulation and Cisco terminology? A.) Ethernet II, Snap B.) Ethernet 802.3, Novell-Ether C.) Ethernet SNAP, Arpa D.) Ethernet 802.2, Snap

1 Answers  


Which two statements about a reliable connection oriented data transfer are true? (Choose two) A. recipients acknolwedge receipt of data B. when tankers are filled to capacity, datagrams are discarded and not retransmitted C. windows are used to control the amount in outstanding unacknowledged data segments D. if the sender a timer expires before receipt of an acknowledgement the sender drops the connection E. The receiving device waits for acknowledgements from the sending device before accepting more data segments

1 Answers  


Identify the following command to configure a secret password to 'cisco'? A.) Router(config)#enable password cisco secret B.) Router(config)#enable secret cisco C.) Router(config)#enable secret password cisco D.) Router(config)#set secret = cisco

1 Answers  


Categories