1
EIGRP Interview Questions
2
Networking Question and Answer
3
Basic CCNA Job Interview Questions
4
Autonomous System (AS)
5
Why we use Trunk Port

EIGRP Interview Questions

1: Is EIGRP a distance vector or a link state routing protocol?

*** EIGRP is a Hybrid routing protocol,it have features of both distance vector
and link state routing protocol.

2: What is the maximum configured bandwidth EIGRP will use on a link?
Can this percentage be changed?

EIGRP Rules Interview Questions

*** By default, EIGRP uses no more than 50% of the link’s bandwidth, based on
the bandwidth configured on the router’s interface. This percentage to be
changed with the command ip bandwidth-percent eigrp.

3: How do EIGRP and IGRP differ in the way they calculate the composite
metric?

*** EIGRP and IGRP use the same formula to calculate their composite metrics, but EIGRP scales the metric by a factor of 256.

4: In the context of EIGRP, what does the term reliable delivery mean?
Which two methods ensure reliable delivery of EIGRP packets?

*** Reliable delivery means EIGRP packets are guaranteed to be delivered, and
they are delivered in order. RTP uses a reliable multicast, in which received
packets are acknowledged, to guarantee delivery; sequence numbers are used
to ensure that they are delivered in order.

5: Which mechanism ensures that a router is accepting the most recent
route entry?

*** Sequence numbers ensure that a router is receiving the most recent route
entry.

6: What is the multicast IP address used by EIGRP?

*** EIGRP uses the multicast address 224.0.0.10.

7: At what interval, by default, are EIGRP Hello packets sent?

*** The default EIGRP Hello interval is 5 seconds, except on some slow-speed
(T1 and below) interfaces, where the default is 60 seconds.

8: What is the default hold time?

*** The EIGRP default hold time is three times the Hello interval.

9: What is the difference between the neighbor table and the topology
table?

*** The neighbor table stores information about EIGRP-speaking neighbors; the
topology table lists all known routes that have feasible successors.

10: What is the feasibility condition?

*** The feasibility condition is the rule by which feasible successors are chosen
for a destination. The feasibility condition is satisfied if a neighbor’s advertised
distance to a destination is lower than the receiving router’s feasible distance to
the destination. In other words, a router’s neighbor meets the feasibility condition
if the neighbor is metrically closer to the destination than the router. Another way
to describe this is that the neighbor is “downstream” relative to the destination

Back

Networking Question and Answer

1: What information must be stored in the route table?

* At a minimum, each entry of the routing table must include a destination
address and the address of a next-hop router or an indication that the destination
address is directly connected.

Networking Interview Questions

2: What does it mean when a route table says that an address is variably

subnetted?

**Variably subnetted means that the router knows of more than one subnet mask
for subnets of the same major IP address.

3: What are discontiguous subnets?

** Discontiguous subnets are two or more subnets of a major IP network address
that are separated by a different major IP address.

4: What command is used to examine the route table in a Cisco router?

** show ip route is used to examine the routing table of a Cisco router.

5: What are the two bracketed numbers associated with the non-directly
connected routes in the route table?

**The first bracketed number is the administrative distance of the routing protocol
by which the route was learned. The second number is the metric of the route.

6: When static routes are configured to reference an exit interface instead
of a next-hop address, in what way will the route table be different?

**When a static route is configured to reference an exit interface instead of a
next-hop address, the destination address will be entered into the routing table
as directly connected.

7: What is a summary route? In the context of static routing, how are
summary routes useful?

**A summary route is a single route entry that points to multiple subnets or major
IP addresses. In the context of static routes, summary routes can reduce the
number of static routes that must be configured.

8: What is an administrative distance?

**An administrative distance is a rating of preference for a routing protocol or a
static route. Every routing protocol and every static route has an administrative
distance associated with it. When a router learns of a destination via more than
one routing protocol or static route, it will use the route with the lowest
administrative distance.

9: What is a floating static route?

** A floating static route is an alternative route to a destination. The
administrative distance is set high enough that the floating static route is used
only if a more-preferred route becomes unavailable.

10: What is the difference between equal-cost and unequal-cost load
sharing?

**Equal-cost load sharing distributes traffic equally among multiple paths with
equal metrics. Unequal-cost load sharing distributes packets among multiple
paths with different metrics. The traffic will be distributed inversely proportional to
the cost of the routes

Back

Basic CCNA Job Interview Questions

1: What is unicast and how does it work?

Unicast is a one-to-one transmission method. A single frame is sent from the
source to a destination on a network. When this frame is received by the switch,
the frame is sent on to the network, and the network passes the frame to its
destination from the source to a specific destination on a network.

ccna interview questions

2: What is multicast and how does it work?

** Multicast is a one-to-many transmission method. A single frame is sent from
the source to multiple destinations on a network using a multicast address. When
this frame is received by the switch, the frame is sent on to the network and the
network passes the frame to its intended destination group.

3:  What is broadcast and how does it work?

** Broadcast is a one-to-all transmission method. A single frame is sent from the
source to a destination on a network using a multicast address. When this frame
is received by the switch, the frame is sent on to the network. The network
passes the frame to all nodes in the destination network from the source to an
unknown destination on a network using a broadcast address. When the switch
receives this frame, the frame is sent on to all the networks, and the networks
pass the frame on to all the nodes. If it reaches a router, the broadcast frame is
dropped.

4: What is fragmentation?

** Fragmentation in a network is the breaking down of a data packet into smaller
pieces to accommodate the maximum transmission unit (MTU) of the network.

5: What is MTU? What’s the MTU for traditional Ethernet?

** MTU is the acronym for maximum transmission unit and is the largest frame
size that can be transmitted over a network. Messages longer than the MTU
must be divided into smaller frames. The network layer (Layer 3) protocol
determines the MTU from the data link layer (Layer 2) protocol and fragments the
messages into the appropriate frame size, making the frames available to the
lower layer for transmission without further fragmentation. The MTU for Ethernet
is 1518 bytes.

6: What is a MAC address?

** A MAC address is the physical address of a network device and is 48 bits (6
bytes) long. MAC addresses are also known as physical addresses or hardware
addresses.

7:  What is the difference between a runt and a giant, specific to traditional
Ethernet?

** In Ethernet a runt is a frame that is less than 64 bytes in length, and a giant is
a frame that is greater than 1518 bytes in length. Giants are frames that are
greater than the MTU used, which might not always be 1518 bytes.

8: What is the difference between store-and-forward and cut-through
switching?

** Cut-through switching examines just the frame header, determining the output
switch port through which the frame will be forwarded. Store-and-forward
examines the entire frame, header and data payload, for errors. If the frame is
error free, it is forwarded out its destination switch port interface. If the frame has
errors, the switch drops the frame from its buffers. This is also known as
discarding the frame to the bit bucket.

9: What is the difference between Layer 2 switching and Layer 3 switching?

* * Layer 2 switches make their forwarding decisions based on the Layer 2 (data
link) address, such as the MAC address. Layer 3 switches make their forwarding
decisions based on the Layer 3 (network) address.

10: What is the difference between Layer 3 switching and routing?

** The difference between Layer 3 switching and routing is that Layer 3 switches
have hardware to pass data traffic as fast as Layer 2 switches. However, Layer 3
switches make decisions regarding how to transmit traffic at Layer 3 in the same
way as a router. A Layer 3 switch cannot use WAN circuits or use routing
protocols; a router is still required for these functions.

Back

Autonomous System (AS)

1. What is an Autonomous System?

An Autonomous System (AS) is a group of IP networks operated by one or more network operator/s which has a single and clearly defined external routing policy. Exterior routing protocols are used to exchange routing information between Autonomous Systems.

2.When should an Autonomous System be created?

An AS needs to be created if a network connects to more than one AS with different routing policies. Some common examples of Autonomous Systems are networks connected to two or more upstream service providers or exchange points, networks peering locally at exchange points.

3.What is an Autonomous System Number?

A public AS has a globally unique number, an Autonomous System number (ASN), associated with it; this number is used in both the exchange of exterior routing information (between neighboring Autonomous Systems), and as an identifier of the AS itself.

There are two types of Autonomous System numbers; Public AS numbers and Private AS numbers.

4.When is a Public Autonomous System number required?

A Public AS number is required only when an AS is exchanging routing information with other Autonomous Systems on the public Internet. That is, all routes originating from an AS is visible on the Internet.

5. Am I eligible for a Public Autonomous System Number?

An organisation is eligible for an ASN assignment if it:

  • is multihomed (this includes organisations connected to a public Internet Exchange Point); and
  • has a single, clearly defined routing policy that is different from its providers’ routing policies.

An organisation will also be eligible if it can demonstrate that it will meet the above criteria upon receiving an ASN (or within a reasonably short time thereafter).

6. When can I use a Private Autonomous System number?

A Private AS number should be used if an AS is only required to communicate via BGP with a single provider. As the routing policy between the AS and the provider will not be visible in the Internet, a Private AS Number can be used for this purpose.

The IANA has reserved AS64512 through to AS65535 to be used as private ASNs.

7. I plan to change my upstream providers – can I take my ASN with me?

This depends on how you received that ASN. If you got it directly from APNIC or an NIR, then it is portable and you can take it with you to whichever providers you choose (subject to the agreement you signed with APNIC or the NIR).

However if got your ASN from an LIR, you can only use it while you continue to receive connectivity from the LIR. In other words, if you decide to no longer use that LIR as one of your upstream providers, then you will have to return the ASN.

Back

Why we use Trunk Port

Question : We can connect two switches via Ethernet cable why we use trunk port between switches ?

Ans:

Trunk links are required to pass VLAN information between switches. A port on a Cisco switch is either an access port or a trunk port. Access ports belong to a single VLAN and do not provide any identifying marks on the frames that are passed between switches. Access ports also carry traffic that comes from only the VLAN assigned to the port. A trunk port is by default a member of all the VLANs that exist on the switch and carry traffic for all those VLANs between the switches. To distinguish between the traffic flows, a trunk port must mark the frames with special tags as they pass between the switches. Trunking is a function that must be enabled on both sides of a link. If two switches are connected together, for example, both switch ports must be configured for trunking, and they must both be configured with the same tagging mechanism (ISL or 802.1Q).

Back

Copyright © 2024. Created by IT Learning. Powered by DumpsForAll | Terms of Use | Privacy Policy