Upload
rajbeer-dalal
View
213
Download
0
Embed Size (px)
Citation preview
Back to Questions Page
Question
4. What is a disadvantage to using bridges in your network? A. Filters by MAC addressB. Stops broadcast storms C. Doesn't stop broadcast storms D. Can only use up to 4 bridges in any LAN
Rank Answer Posted By
Question Submitted By :: KapilasdhirI also faced this Question!! © ALL Interview .com
Answer c.doesn't stop broadcast storm
0 Kushal Singh
Bisht
Answer Answer: C
Even though the 5-4-3 rule specifies you can only have 4 bridges in a network, that is not really adisadvantage. The disadvantage to bridging is that it filters by MAC address and cannot create separate networks like a router can. This means that if a broadcast storm was to take place a bridge will forward the frames.
0 Kapilasdhir [Pioneer]
Question
3. What does a bridge use to segment a network? A. IP Addresses B. Broadcasts C. Application data D. Media Access Control addresses
Rank Answer Posted By
Question Submitted By :: KapilasdhirI also faced this Question!! © ALL Interview .com
Answer Answer:- C Application data
0 Bhisham
Answer Answer: D
Bridges can only read frames and filters by MAC (hardware)
0 Kapilasdhir [Pioneer]
address.
Question
2. What are the valid ways to segment a LAN? (Choose all that apply) A. Repeater B. Bridge C. Switch D. Router
Rank Answer Posted By
Question Submitted By :: KapilasdhirI also faced this Question!! © ALL Interview .com
Answer c.Switch
0 Hiresh
Answer Answer: B, C, D
Repeaters do not segment the network, but rather extend the distance a LAN can run
0 Kapilasdhir [Pioneer]
Question
1. What is an advantage to LAN segmentation? A. Provides multiprotocol support B. Decreases security C. Decreases broadcasts D. Increases broadcasts
Rank Answer Posted By
Question Submitted By :: KapilasdhirI also faced this Question!! © ALL Interview .com
Answer A
2 Shashi Sinha
Answer Answer: C
LAN segmentation decreases broadcast propagation to all segments.
0 Kapilasdhir [Pioneer]
Question what is 5-4-3 rule? Rank Answer Posted By Question Submitted By :: Kapilasdhir
I also faced this Question!! © ALL Interview .com
Answer 5-4-3 rule means ring topology methods
0 Bhisham
Question what is unike ip address Rank Answer Posted By Question Submitted By :: Govind_chandrakar
I also faced this Question!! © ALL Interview .com
Answer It might be unique IP Address. Every IP Address should be unique in its network, whether it is Local or it is on Internet, we must have to provide an unique IP address to the system.
0 Chandresh_kumar
QuestionHow we ping ICMP a NIC with a correct IP address but withwrong MAC addressDo all NIC's can run inpromiscuous mode
Rank Answer Posted By
Question Submitted By :: AsimaraeenThis Interview Question Asked @ Cisco , Hcl
I also faced this Question!! © ALL Interview .com
Answer Thanks abdullah and prakash, plz read my question carefully ur answers are not relevant acco
0 Asim
Answer In computing, promiscuous mode or
promisc mode is a configuration of a network card that makes the card pass all traffic it receives to the central processing unit rather than just packets addressed to it — a feature normally used for packet sniffing.
Each packet includes the hardware (Media Access Control) address. When a network card receives a packet, it checks if the address is its own. If not, the card normally drops the packet. But in promiscuous mode, the card doesn't drop
0 Abdullah [Buraq It]
the packet, thus allowing the computer to read all packets.
Answer In computing, promiscuous mode or
promisc mode is a configuration of a network card that makes the card pass all traffic it receives to the central processing unit rather than just packets addressed to it — a feature normally used for packet sniffing.
Each packet includes the hardware (Media Access Control) address. When a network card receives a packet, it checks if the address is its own. If not, the card normally drops the packet. But in promiscuous mode, the card doesn't drop the packet, thus allowing the computer to read all packets.
0 Prakash Parmar [Buraq It]
QuestionHow we put NIC in promiscuous mode when using MS windows,can any one tell me in detail
Rank Answer Posted By
Question Submitted By :: AsimaraeenThis Interview Question Asked @ Cisco , Ibm
I also faced this Question!! © ALL Interview .com
Answer it is very lenthy to explan
buti try to expianfrom ccontrol paneelactivate network bridging after instalation of nic card
vereyfiin cmd modetyopeshow netsh bridge
if that succesfull thenu have put the nic in premisious mode
0 Jitendera Sinha
Questionhow to troubleshoot when protocols is down and link is not getting up
Rank Answer Posted By
Question Submitted By :: Mohd Arshad AyubThis Interview Question Asked @ HCL , Sify
I also faced this Question!! © ALL Interview .com
Answer just write a command "sh ip protocol" if link is down checkthe ip address that u have put on serial interface orethernet interface or chk the clock rate at the end of dce!!!!!thats it
0 Naveen Kumar Sharma
Answer just write a command "sh ip protocol" if
link is down checkthe ip address that u have put on serial interface orethernet interface or chk the clock rate at the end of dce
0 Pitass
Answer Chk modem connectivity frm service
provider end to customer end. Chk same network ip address is configured serial interfaces.Also chk same encapsulation configured both routers.
0 Senthil. K Hcl
Answer plz check encapsulation whether matching
with remote device or not...and check the clock rate....
0 Punit Gaur
Answer pls check following things
1- encapsulation mismatch2- keepalive mismatch 3- clockrate mismatch
0 Yusuf Shaikh
Questionwhy we give clock rate to DCE and not to DTEwhat is the difference in the two.
Rank Answer Posted By
Question Submitted By :: AmitI also faced this Question!! © ALL Interview .com
Answer Because DTE basically contained the router serial interfaceand DCE contained the isp router end ,and two dte cannotcommunicate directly atleast one DCE would be there forcommunication,and dce provide clocking forsynchronization,thats why we use back to back serial cablein industry its one end behave as DTE and its other endbehave as DCE.
0 Naveen Kumar Sharma
Answer Because all Cisco router are by default
DTE and it is the receiver side(RECEIVING THE CLOCK PULSE FROM DCE) of serial cable,basically connected the router serial interface,and DCE basically connnected the isp router end ,it is sender side(sending the clock pulse to DTE) of serial cable and 2 DTE Cannot communicate directly atleast one DCE would be there for communication
0 Naveen Agrawal
Questionwhat is the difference between a passive and active hub?? which is better ??
Rank Answer Posted By
Question Submitted By :: AbouleilaI also faced this Question!! © ALL Interview .com
Answer Passive hub will not regenerate the signal but active hub will regenerate the signal ....... so active hub is better.
0 Sachin
Answer active hub need electricity bt passive
hub didnt active hub copy and regnerate signals but passive only copy signals
0 Amit
Answer Passive Hubs
These hubs are nothing more than point contacts for the wires that make up the physical network. An example of this would be a punchdown block that is a simple plastic, unpowered box used to plug network cables into it.
Active HubsActive hubs are a little smarter than the passive hubs we saw. All You might also come across the term "concentrators" which are basically active hubs, concentrating and strengthening a signal as it enters and exits the hub.
It's also worth noting that today's active hubs are advertised as "hubs" or "repeaters". It is very rare you will see a hub with the word "active" on it!
These hubs usually come in configurations of 4, 8, 16 and 24 ports, providing link & activity leds (lights) to show which devices are currently connected, powered on and transmitting or receiving data.
Lastly, you might be interested knowing that all Ethernet hubs are active hubs.
jitendera kumar sinha
0 Jitendera Kuamr Sinha
Answer Passive Hubs
These hubs are nothing more than point contacts for the
0 Ravinder Gujjar
wires that make up the physical network. An example of this would be a punchdown block that is a simple plastic, unpowered box used to plug network cables into it. Active HubsActive hubs are a little smarter than the passive hubs we saw. All You might also come across the term "concentrators" which are basically active hubs, concentrating and strengthening a signal as it enters and exits the hub. It's also worth noting that today's active hubs are advertised as "hubs" or "repeaters". It is very rare you will see a hub with the word "active" on it! These hubs usually come in configurations of 4, 8, 16 and 24 ports, providing link & activity leds (lights) to show which devices are currently connected, powered on and transmitting or receiving data. Lastly, you might be interested knowing that all Ethernet hubs are active hubs.
Answer active hub is more smarter than passive
hub
0 Priyanka
Answer a passive hub is just a connector. it
connects the wirescoming from different branches.an active hub is actually a multiport repeater. it is usedto create connections between stations in a physical startopology.
0 Anshika
Question What is difference between standard and extended access-list Rank Answer Posted By
Question Submitted By :: Tarun Jhamb
This Interview Question Asked @ HCL , Vipro, Lab ExamI also faced this Question!! © ALL Interview .com
Answer standard IP access list provides basic packet filtering abilities, based on the source IP address of a packet only. As a general rule, apply standard IP access lists close to the destination network to which you wish to permit or deny access.Standard IP access lists fall into the numerical range 1-99Unlike standard IP access lists (which only allow you to filter packets based on their source IP address), extended IP access lists allow a much more granular level of control. Extended IP access lists allow filtering not only on source addresses, but also on destination addresses, protocols, and even applications, based on their port number. For example, you might choose to permit or deny a group of hosts from accessing a particular server, limit access to a telnet server to only a single host, or similar.Extended IP access lists are identified through their use of the 100-199 numerical range.
0 Gaurav Kumar Sharma
Answer In standard access-list the range area
is 0-99 but in case of extended access-list the range area is 100-199 and in standard access-list we cannot create permission on specific protocol like bloking the telnet or ftp......we can do that in extended access-list.
0 Sachin
Answer In standard access-list we can filter
the packet afterrouting.and it will applied on destination router.its dependonly on source ip address.
0 Naveen Kumar Sharma
but in case of extended access list we can filter the packetbefore routing,and it will applied on source router,itsdepend on source ip,destination ip,port and protocol.
Answer standard access list has range area of
0-99extended has 100-199.
0 Harsh Singh
Answer Standard access list basically used to
filter packets by IPaddress & is basically close to the destination router.(1-99)
Extended access list is used to filter packets based onaddress ,protocol & port no. dedicated for particularservices.(100-199)
0 Manoranjan
Answer When you enable standard access-list it
will block entire thing but extended access-list can block every port like ftp,telnet etc.Standard range is 1-99 and extended range is 100-199.
0 Nizam
Answer Standared IP access list is based on IP
address.Apply close to the destination that can only filter packet based on there source IP address.Numeric value from 1-99,1300-1399Extended IP access list is based on Port address.Apply close to source that can filter not only source address but also destination address based on there port number.Numeric
0 Awanish Kumar Sharma
value from 100-199.Allow more grangular level of controle.
Answer Difference between Standard ACL &
Extended ACL -
a) In Standard ACL, filtering is based on source IP address.where as in extended ACL, filtering is bases on Source IPaddress, Destination IP address, Protocol Type, Source PortNumber & Destination Port Number.
b) Standard ACL are used to block particular host or subnetwork. where as Extended ACL is used to block particularservices.
c)Standard ACL is implemented as possible closer todestination. where as Extended ACL is implemented aspossible closer to source.
d) Standard ACL is created from 1 - 99 & extended range 1300- 1999. where as Extended ACL is created from 100 - 199 &extended range 2000 - 2699.
e) In Standard ACL, two communication will be blocked, whereas in Extended ACL, one way communication will be blocked.
f) In Standard ACL, all services will be blocked. Where asin Extended ACL, particular services wil be blocked.
Hope this much of difference will help u guys. Keep postingnew question plzzzz....!!!
Thanking youShahin
0 Shahin
Question What is proxy-ARP and how it is used and configured Rank Answer Posted By
Question Submitted By :: Tarun JhambI also faced this Question!! © ALL Interview .com
Answer Proxy ARP (RFC 1027) is a way to make a machine physically located on one network appear to be logically part of a different physical network connected to the same router/firewall. Typically it allows us to hide a machine with a public IP address on a private network behind a router, and still have the machine appear to be on the public network "in front of" the router. The router "proxys" ARP requests and all network traffic to and from the hidden machine to make this fiction possible.
Consider a router with two interface cards, one connected to a public network PUBNET and one connected to a private network PRIVNET. We want to hide a server machine on the PRIVNET network but have it accessible from the PUBNET network. The IP address of the server machine lies in the PUBNET network, even though we are placing the machine on the PRIVNET network behind the router.
By enabling proxy ARP on the router, any machine on the PUBNET network that issues an ARP "who has" request for the server's MAC address will get a proxy ARP reply from the router containing the router's MAC address. This tells machines on the PUBNET network that they should be sending packets destined for the server via the router. The router forwards the packets from the machines on the PUBNET network to the server on the PRIVNET network.
Similarly, when the server on the PRIVNET network issues a "who has" request for any machines on the PUBNET network, the router provides its own MAC address via proxy ARP. This tells the server to send packets for
0 Jerald
machines on the PUBNET network via the router. The router forwards the packets from the server on the PRIVNET network to the machines on the PUBNET network.
The proxy ARP provided by the router allows the server on the PRIVNETnetwork to appear to be on the PUBNET network. It lets the router pass ARP requests and other network packets in both directions between the server machine and the PUBNET network, making the server machine appear to be connected to the PUBNET network even though it is on the PRIVNET network hidden behind the router.
Question To which layer ICMP belongs Rank Answer Posted By Question Submitted By :: ViniThis Interview Question Asked @ CMS
I also faced this Question!! © ALL Interview .com
Answer at layer 3 (network layer)
2 Sarfaraz
Answer Network layer
1 Sachin
Answer layer 3 network of osi
0 Kunal
Answer Network Layer(3) is belong to icmp
0 Dinesh
Answer icmp internet control message protocol
it works on network layer0 Amit
Answer icmp work with internet protocol (ip) at
layer 3 of osi model and inernet layer of tcp model..
0 Topgun
Answer network
0 Guest
Question How ICMP is used in ping and traceroute facilities Rank Answer Posted By
Question Submitted By :: ViniI also faced this Question!! © ALL Interview .com
Answer Internet Control Message Protocol (ICMP) pings and traceroute on the PIX Firewall are handled differently based on the version of PIX and ASA code.
Inbound ICMP through the PIX/ASA is denied by default. Outbound ICMP is permitted, but the incoming reply is denied by default.
** ASA/PIX does not support ICMP redirects, because it does not support asymmetric routing
0 Partha
Answer it is used in finding out the error
message like if data gram is not reaching to the destination.It is reliable protocol as compared to Internet protocol.
0 Sachin
Answer ICMP works on
echo-request n echo-reply0 Hasan
in network communications devices echo-request/reply's open open in network security devices echo-request/reply is close as inbound traffic is restricted by default.
so by this process of echo-request n echo-reply the PING and traceroute works and gives the information that the channel is established.