what is the default ad value of the interface directly
coneted to router.

as for exmaple ad value of ospf is 90 then from ehternet
the network is conected whta is difault value of that
directly conected interface.


what is the defalt ad value of bgp


whta is access llist and how many type of access list

what is vlan

what is vpn

how e congigure the router

what is mpls

these are the question skrd to me at tcs i have replyed all
ecxept the first one



what is the default ad value of the interface directly coneted to router. as for exmaple ad val..

Answer / shahin

a. Default AD value of directly connected interface is 0 (Zero).

b. AD value of BGP is

Internal BGP (IBGP) - 200
External BGP (EBGP) - 20

c. Access-list is a set of rules which allow/deny flow of
traffic moving through the routers.
or else we can say, ACL is method of making a router as a
packet filtering firewall.

- It is layer 3 security which control flow of traffic.
- It doesn't filter the traffic originated by router itself.
- Generally ACL is implemented in distribution layer router.
- It is created on gobal configuration mode.

In terms of identification, ACL are of two types -

a. Name ACL.
b. Number ACL.

In terms of traffic filtering, ACL are of two types -

a. Standard ACL.
b. Extended ACL.


d. The process of building a logical topology over a
physical network for the purpose of performance, security &
efficient use of bandwidth.


Rest of question, i'll answer next time....!!!

Is This Answer Correct ?    7 Yes 0 No

Post New Answer

More CCNA Interview Questions

Which command do you use to set the Secret password to 'roundwood'? A.) enable login roundwood B.) enable password roundwood C.) enable privilege roundwood D.) enable secret= roundwood E.) enable secret login roundwood F.) enable secret roundwood

1 Answers  


When you enter router passwords during the setup dialog what is the difference between enable and the enable secret passwords? A. The enable password is encrypted B. The enable secret password uses IPSec password authentication C. The enable secret password cannot be seen as clear text when viewing the configuration D. The enable secret password acts as a backup in case the enable password is compromised

8 Answers   Wipro,


What are the differnt memory use in cisco router?

0 Answers  


Identify the IPX standard access-list number range? A.) 600 - 699 B.) 1000 - 1099 C.) 1 - 99 D.) 100 - 199 E.) 800 - 899

1 Answers  


When a router knows the IP address, but does not know the MAC address of the device it wishes to contact, it uses the ARP (Address resolution protocol) to determine the MAC address. After it learns the MAC address, it stores this information in the ARP cache. What is the command to view the ARP cache? A.) sh mac B.) show cache C.) show arp D.) sh arp interfaces E.) show ip cache

2 Answers  






Which statement about the Point to Point Protocol (PPP) is true? A. PPP supports TCP/IP but not Novell IPX B. PPP is being phased out of existence by the Serial Line Internet Protocol (SLIP) C. PPP providces router to router and host to network connections over both synchronous and asynchronous circuits D. PPP is an ITU T and ANSI standard that defines the process for sending data over a packet switched data network (PSDN)

2 Answers  


What are two functions of the ICMP protocol? (Choose two) A. to map IP addresses to Ethernet addresses B. to map common names to network addresses C. to forward SNMP alerts to management consoles D. to generate an echo reply in response to a ping test E. to send a host or pod unreachable message from a router to the source of an undeliverable packet

1 Answers  


Which of the following is a valid extended IP access-list? A.) router(config)# access-list 101 permit tcp host 172.16.30.0 any eq 21 log B.) router# access-list 101 permit tcp host 172.16.30.0 any eq 21 log C.) router(config)# acess-list 101 permit any any 172.16.30.0 D.) router(config)# access-list 101 permit ip host 172.16.30.0 any eq 21 log

2 Answers   HCL,


4. What is a disadvantage to using bridges in your network? A. Filters by MAC address B. Stops broadcast storms C. Doesn't stop broadcast storms D. Can only use up to 4 bridges in any LAN

3 Answers   NCTC,


A ISDN PRI circuit can be described as which of the following? A.) 24 B channels and 1-64Kbps D channel B.) 23 B channels and 1-64Kbps D channel C.) 2-D channels and 1-C channel D.) 2-64Kbps B channels and 1-16Kbps D channel

1 Answers  


Which type of switching is considered to be 'wire speed?' A.) Cut-Through B.) Multiplexed C.) Inverted D.) Layer 4 E.) Store and Forward F.) Layer 3

2 Answers  


what is full form of rst,smtps & http?

2 Answers   HCL,


Categories