17
Back to Questions Page Questi on 4. What is a disadvantage to using bridges in your network? A. Filters by MAC address B. Stops broadcast storms C. Doesn't stop broadcast storms D. Can only use up to 4 bridges in any LAN Ran k Answer Posted By Question Submitted By :: Kapilasdhir I also faced this Question!! © ALL Interview .com Answer c.doesn't stop broadcast storm 0 Kushal Singh Bisht Answer Answer: C Even though the 5-4-3 rule specifies you can only have 4 bridges in a network, that is not really adisadvantage. The disadvantage to bridging is that it filters by MAC address and cannot create separate networks like a router can. This means that if a broadcast storm was to take place a bridge will forward the frames. 0 Kapilasdhir [Pioneer] Questi on 3. What does a bridge use to segment a network? A. IP Addresses B. Broadcasts C. Application data D. Media Access Control addresses Ran k Answer Posted By Question Submitted By :: Kapilasdhir I also faced this Question!! © ALL Interview .com Answer Answer:- C Application data 0 Bhisham

cisco 1

Embed Size (px)

Citation preview

Page 1: cisco 1

Back to Questions Page 

Question

4. What is a disadvantage to using bridges in your network? A. Filters by MAC addressB. Stops broadcast storms C. Doesn't stop broadcast storms D. Can only use up to 4 bridges in any LAN

Rank Answer Posted By  

 Question Submitted By :: KapilasdhirI also faced this Question!!     © ALL Interview .com

Answer c.doesn't stop broadcast storm

 0 Kushal Singh

Bisht 

  Answer Answer: C

Even though the 5-4-3 rule specifies you can only have 4 bridges in a network, that is not really adisadvantage. The disadvantage to bridging is that it filters by MAC address and cannot create separate networks like a router can. This means that if a broadcast storm was to take place a bridge will forward the frames.

 

0 Kapilasdhir [Pioneer]

  

Question

3. What does a bridge use to segment a network? A. IP Addresses B. Broadcasts C. Application data D. Media Access Control addresses

Rank Answer Posted By  

 Question Submitted By :: KapilasdhirI also faced this Question!!     © ALL Interview .com

Answer Answer:- C Application data

 0 Bhisham 

  

 Answer Answer: D

Bridges can only read frames and filters by MAC (hardware)

0 Kapilasdhir [Pioneer]

Page 2: cisco 1

address.

   

Question

2. What are the valid ways to segment a LAN? (Choose all that apply) A. Repeater B. Bridge C. Switch D. Router

Rank Answer Posted By  

 Question Submitted By :: KapilasdhirI also faced this Question!!     © ALL Interview .com

Answer c.Switch

 0 Hiresh 

  Answer Answer: B, C, D

Repeaters do not segment the network, but rather extend the distance a LAN can run

 

0 Kapilasdhir [Pioneer]

  

Question

1. What is an advantage to LAN segmentation? A. Provides multiprotocol support B. Decreases security C. Decreases broadcasts D. Increases broadcasts

Rank Answer Posted By  

 Question Submitted By :: KapilasdhirI also faced this Question!!     © ALL Interview .com

Answer A

 2 Shashi Sinha 

  Answer Answer: C

LAN segmentation decreases broadcast propagation to all segments.

 

0 Kapilasdhir [Pioneer]

  Question what is 5-4-3 rule? Rank Answer Posted By   Question Submitted By :: Kapilasdhir

Page 3: cisco 1

I also faced this Question!!     © ALL Interview .com

Answer 5-4-3 rule means ring topology methods

 0 Bhisham 

  Question what is unike ip address Rank Answer Posted By   Question Submitted By :: Govind_chandrakar

I also faced this Question!!     © ALL Interview .com

Answer It might be unique IP Address. Every IP Address should be unique in its network, whether it is Local or it is on Internet, we must have to provide an unique IP address to the system.

 

0 Chandresh_kumar 

  

QuestionHow we ping ICMP a NIC with a correct IP address but withwrong MAC addressDo all NIC's can run inpromiscuous mode

Rank Answer Posted By  

 Question Submitted By :: AsimaraeenThis Interview Question Asked @   Cisco , Hcl

I also faced this Question!!     © ALL Interview .com

Answer Thanks abdullah and prakash, plz read my question carefully ur answers are not relevant acco

 

0 Asim 

  Answer In computing, promiscuous mode or

promisc mode is a configuration of a network card that makes the card pass all traffic it receives to the central processing unit rather than just packets addressed to it — a feature normally used for packet sniffing.

Each packet includes the hardware (Media Access Control) address. When a network card receives a packet, it checks if the address is its own. If not, the card normally drops the packet. But in promiscuous mode, the card doesn't drop

0 Abdullah [Buraq It]

Page 4: cisco 1

the packet, thus allowing the computer to read all packets.

   Answer In computing, promiscuous mode or

promisc mode is a configuration of a network card that makes the card pass all traffic it receives to the central processing unit rather than just packets addressed to it — a feature normally used for packet sniffing.

Each packet includes the hardware (Media Access Control) address. When a network card receives a packet, it checks if the address is its own. If not, the card normally drops the packet. But in promiscuous mode, the card doesn't drop the packet, thus allowing the computer to read all packets.

 

0 Prakash Parmar [Buraq It]

  

QuestionHow we put NIC in promiscuous mode when using MS windows,can any one tell me in detail

Rank Answer Posted By  

 Question Submitted By :: AsimaraeenThis Interview Question Asked @   Cisco , Ibm

I also faced this Question!!     © ALL Interview .com

Answer it is very lenthy to explan

buti try to expianfrom ccontrol paneelactivate network bridging after instalation of nic card

vereyfiin cmd modetyopeshow netsh bridge

if that succesfull thenu have put the nic in premisious mode

 

0 Jitendera Sinha 

 

Page 5: cisco 1

 

Questionhow to troubleshoot when protocols is down and link is not getting up

Rank Answer Posted By  

 Question Submitted By :: Mohd Arshad AyubThis Interview Question Asked @   HCL , Sify

I also faced this Question!!     © ALL Interview .com

Answer just write a command "sh ip protocol" if link is down checkthe ip address that u have put on serial interface orethernet interface or chk the clock rate at the end of dce!!!!!thats it

 

0 Naveen Kumar Sharma 

  Answer just write a command "sh ip protocol" if

link is down checkthe ip address that u have put on serial interface orethernet interface or chk the clock rate at the end of dce

 

0 Pitass 

  Answer Chk modem connectivity frm service

provider end to customer end. Chk same network ip address is configured serial interfaces.Also chk same encapsulation configured both routers.

 

0 Senthil. K Hcl 

  Answer plz check encapsulation whether matching

with remote device or not...and check the clock rate....

 

0 Punit Gaur 

  Answer pls check following things

1- encapsulation mismatch2- keepalive mismatch 3- clockrate mismatch

 

0 Yusuf Shaikh 

Page 6: cisco 1

  

Questionwhy we give clock rate to DCE and not to DTEwhat is the difference in the two.

Rank Answer Posted By  

 Question Submitted By :: AmitI also faced this Question!!     © ALL Interview .com

Answer Because DTE basically contained the router serial interfaceand DCE contained the isp router end ,and two dte cannotcommunicate directly atleast one DCE would be there forcommunication,and dce provide clocking forsynchronization,thats why we use back to back serial cablein industry its one end behave as DTE and its other endbehave as DCE.

 

0 Naveen Kumar Sharma 

  Answer Because all Cisco router are by default

DTE and it is the receiver side(RECEIVING THE CLOCK PULSE FROM DCE) of serial cable,basically connected the router serial interface,and DCE basically connnected the isp router end ,it is sender side(sending the clock pulse to DTE) of serial cable and 2 DTE Cannot communicate directly atleast one DCE would be there for communication

 

0 Naveen Agrawal 

  

Questionwhat is the difference between a passive and active hub?? which is better ??

Rank Answer Posted By  

 Question Submitted By :: AbouleilaI also faced this Question!!     © ALL Interview .com

Answer Passive hub will not regenerate the signal but active hub will regenerate the signal ....... so active hub is better.

 

0 Sachin 

 

Page 7: cisco 1

 Answer active hub need electricity bt passive

hub didnt active hub copy and regnerate signals but passive only copy signals

 

0 Amit 

  Answer Passive Hubs

These hubs are nothing more than point contacts for the wires that make up the physical network. An example of this would be a punchdown block that is a simple plastic, unpowered box used to plug network cables into it.

Active HubsActive hubs are a little smarter than the passive hubs we saw. All You might also come across the term "concentrators" which are basically active hubs, concentrating and strengthening a signal as it enters and exits the hub.

It's also worth noting that today's active hubs are advertised as "hubs" or "repeaters". It is very rare you will see a hub with the word "active" on it!

These hubs usually come in configurations of 4, 8, 16 and 24 ports, providing link & activity leds (lights) to show which devices are currently connected, powered on and transmitting or receiving data.

Lastly, you might be interested knowing that all Ethernet hubs are active hubs.

jitendera kumar sinha

 

0 Jitendera Kuamr Sinha 

  Answer Passive Hubs

These hubs are nothing more than point contacts for the

0 Ravinder Gujjar 

Page 8: cisco 1

wires that make up the physical network. An example of this would be a punchdown block that is a simple plastic, unpowered box used to plug network cables into it. Active HubsActive hubs are a little smarter than the passive hubs we saw. All You might also come across the term "concentrators" which are basically active hubs, concentrating and strengthening a signal as it enters and exits the hub. It's also worth noting that today's active hubs are advertised as "hubs" or "repeaters". It is very rare you will see a hub with the word "active" on it! These hubs usually come in configurations of 4, 8, 16 and 24 ports, providing link & activity leds (lights) to show which devices are currently connected, powered on and transmitting or receiving data. Lastly, you might be interested knowing that all Ethernet hubs are active hubs.

   Answer active hub is more smarter than passive

hub

 

0 Priyanka 

  Answer a passive hub is just a connector. it

connects the wirescoming from different branches.an active hub is actually a multiport repeater. it is usedto create connections between stations in a physical startopology.

 

0 Anshika 

  

Question What is difference between standard and extended access-list Rank Answer Posted By  

 Question Submitted By :: Tarun Jhamb

Page 9: cisco 1

This Interview Question Asked @   HCL , Vipro, Lab ExamI also faced this Question!!     © ALL Interview .com

Answer standard IP access list provides basic packet filtering abilities, based on the source IP address of a packet only. As a general rule, apply standard IP access lists close to the destination network to which you wish to permit or deny access.Standard IP access lists fall into the numerical range 1-99Unlike standard IP access lists (which only allow you to filter packets based on their source IP address), extended IP access lists allow a much more granular level of control. Extended IP access lists allow filtering not only on source addresses, but also on destination addresses, protocols, and even applications, based on their port number. For example, you might choose to permit or deny a group of hosts from accessing a particular server, limit access to a telnet server to only a single host, or similar.Extended IP access lists are identified through their use of the 100-199 numerical range.

 

0 Gaurav Kumar Sharma 

  Answer In standard access-list the range area

is 0-99 but in case of extended access-list the range area is 100-199 and in standard access-list we cannot create permission on specific protocol like bloking the telnet or ftp......we can do that in extended access-list.

 

0 Sachin 

  Answer In standard access-list we can filter

the packet afterrouting.and it will applied on destination router.its dependonly on source ip address.

0 Naveen Kumar Sharma 

Page 10: cisco 1

but in case of extended access list we can filter the packetbefore routing,and it will applied on source router,itsdepend on source ip,destination ip,port and protocol.

   Answer standard access list has range area of

0-99extended has 100-199.

 

0 Harsh Singh 

  Answer Standard access list basically used to

filter packets by IPaddress & is basically close to the destination router.(1-99)

Extended access list is used to filter packets based onaddress ,protocol & port no. dedicated for particularservices.(100-199)

 

0 Manoranjan 

  Answer When you enable standard access-list it

will block entire thing but extended access-list can block every port like ftp,telnet etc.Standard range is 1-99 and extended range is 100-199.

 

0 Nizam 

  Answer Standared IP access list is based on IP

address.Apply close to the destination that can only filter packet based on there source IP address.Numeric value from 1-99,1300-1399Extended IP access list is based on Port address.Apply close to source that can filter not only source address but also destination address based on there port number.Numeric

0 Awanish Kumar Sharma 

Page 11: cisco 1

value from 100-199.Allow more grangular level of controle.

   Answer Difference between Standard ACL &

Extended ACL -

a) In Standard ACL, filtering is based on source IP address.where as in extended ACL, filtering is bases on Source IPaddress, Destination IP address, Protocol Type, Source PortNumber & Destination Port Number.

b) Standard ACL are used to block particular host or subnetwork. where as Extended ACL is used to block particularservices.

c)Standard ACL is implemented as possible closer todestination. where as Extended ACL is implemented aspossible closer to source.

d) Standard ACL is created from 1 - 99 & extended range 1300- 1999. where as Extended ACL is created from 100 - 199 &extended range 2000 - 2699.

e) In Standard ACL, two communication will be blocked, whereas in Extended ACL, one way communication will be blocked.

f) In Standard ACL, all services will be blocked. Where asin Extended ACL, particular services wil be blocked.

Hope this much of difference will help u guys. Keep postingnew question plzzzz....!!!

Thanking youShahin

 

0 Shahin 

  

Question What is proxy-ARP and how it is used and configured Rank Answer Posted By  

Page 12: cisco 1

 Question Submitted By :: Tarun JhambI also faced this Question!!     © ALL Interview .com

Answer Proxy ARP (RFC 1027) is a way to make a machine physically located on one network appear to be logically part of a different physical network connected to the same router/firewall. Typically it allows us to hide a machine with a public IP address on a private network behind a router, and still have the machine appear to be on the public network "in front of" the router. The router "proxys" ARP requests and all network traffic to and from the hidden machine to make this fiction possible.

Consider a router with two interface cards, one connected to a public network PUBNET and one connected to a private network PRIVNET. We want to hide a server machine on the PRIVNET network but have it accessible from the PUBNET network. The IP address of the server machine lies in the PUBNET network, even though we are placing the machine on the PRIVNET network behind the router.

By enabling proxy ARP on the router, any machine on the PUBNET network that issues an ARP "who has" request for the server's MAC address will get a proxy ARP reply from the router containing the router's MAC address. This tells machines on the PUBNET network that they should be sending packets destined for the server via the router. The router forwards the packets from the machines on the PUBNET network to the server on the PRIVNET network.

Similarly, when the server on the PRIVNET network issues a "who has" request for any machines on the PUBNET network, the router provides its own MAC address via proxy ARP. This tells the server to send packets for

0 Jerald 

Page 13: cisco 1

machines on the PUBNET network via the router. The router forwards the packets from the server on the PRIVNET network to the machines on the PUBNET network.

The proxy ARP provided by the router allows the server on the PRIVNETnetwork to appear to be on the PUBNET network. It lets the router pass ARP requests and other network packets in both directions between the server machine and the PUBNET network, making the server machine appear to be connected to the PUBNET network even though it is on the PRIVNET network hidden behind the router.

   Question To which layer ICMP belongs Rank Answer Posted By   Question Submitted By :: ViniThis Interview Question Asked @   CMS

I also faced this Question!!     © ALL Interview .com

Answer at layer 3 (network layer)

 2 Sarfaraz 

  Answer Network layer

 1 Sachin 

  Answer layer 3 network of osi

 0 Kunal 

  Answer Network Layer(3) is belong to icmp

 0 Dinesh 

  Answer icmp internet control message protocol

it works on network layer0 Amit 

Page 14: cisco 1

   Answer icmp work with internet protocol (ip) at

layer 3 of osi model and inernet layer of tcp model..

 

0 Topgun 

  Answer network

 0 Guest 

  

Question How ICMP is used in ping and traceroute facilities Rank Answer Posted By  

 Question Submitted By :: ViniI also faced this Question!!     © ALL Interview .com

Answer Internet Control Message Protocol (ICMP) pings and traceroute on the PIX Firewall are handled differently based on the version of PIX and ASA code.

Inbound ICMP through the PIX/ASA is denied by default. Outbound ICMP is permitted, but the incoming reply is denied by default.

** ASA/PIX does not support ICMP redirects, because it does not support asymmetric routing

 

0 Partha 

  Answer it is used in finding out the error

message like if data gram is not reaching to the destination.It is reliable protocol as compared to Internet protocol.

 

0 Sachin 

  Answer ICMP works on

echo-request n echo-reply0 Hasan 

Page 15: cisco 1

in network communications devices echo-request/reply's open open in network security devices echo-request/reply is close as inbound traffic is restricted by default.

so by this process of echo-request n echo-reply the PING and traceroute works and gives the information that the channel is established.