Cisco Questions & Answers 12

  • Uploaded by: Asad
  • 0
  • 0
  • May 2020
  • PDF

This document was uploaded by user and they confirmed that they have the permission to share it. If you are author or own the copyright of this book, please report to us by using this DMCA report form. Report DMCA


Overview

Download & View Cisco Questions & Answers 12 as PDF for free.

More details

  • Words: 2,980
  • Pages: 16
Back to Questions Page what is the subnet for the host ip

Question address 172.16.210.0/22

Rank

Answer Posted By

Question Submitted By :: Guest This Interview Question Asked @ IBM , Microland I also faced this Question!!

© ALL Interview .com

Answer

the given ip address is 172.16.210.0/22 scince it is class b address the it orignal mask should be 26 but given mask it 22 that is there is 6 bit of sunating 128+64+32+16+8+4=252 block size=256-252=4 now 210/4= 52 and remnder is 2(no matter) that is 52*4=208 thus subnet for the given host ip adress must be 172.16.208.0/22 thanks

0

Jitendera Kumar Sinah

Answer

the given ip address is 172.16.210.0/22 scince it is class b address the it orignal mask should be 16 but given mask it 22 that is there is 6 bit of sunating 128+64+32+16+8+4=252 block size=256-252=4 now 210/4= 52 and remnder is 2(no matter) that is 52*4=208 thus subnet for the given host ip adress must be 172.16.208.0/22 thanks

0

Jitendera Kumar Sinah

Answer

i have done little typo mistake .in place of 16 i have written 26 in first answer.so i think on that basic i am wrong

0

Jitendera Sinha

which of the following address represent unicast address A 224.1.5.2 B ffff.ffff.ffff.ffff

Question

C 192.168.24.59/30

Rank

D 255.255.255.255

Answer Posted By

E 172.138.128.255 plz tell what should be answer plz tell with explanation

Question Submitted By :: Guest This Interview Question Asked @ IPsoft , Jetking I also faced this Question!! Answer

answer should be e

© ALL Interview .com

0

Jitendera Kuamr Sinha

0

Shahin

224.1.5.2 it is a multicast address opton b is broad cast adress opton c look like unicast but if we do suntaing then it has find thhat it is not unicast optod d is also a broad cast address hence option e should be unicast

Answer

Option A is unicast address.

Answer

hi sachin how do you say that option A is correct because if i am not mistaking ip address starting with 224 network id is reserved for multi casting so i think you are wrong.

5

Jitendera Kumar Sinha

224.0.0.0 224.0.0.255(special “wellknown” multicast addresses) 224.0.1.0 238.255.255.255 (Globallyscoped (Internet-wide) multicast addresses). 239.0.0.0 239.255.255.255 (Administratively-scoped (local) multicast addresses.) so what do you think.are you wrong or wright.so as far as my knowledge is concern option A is not going to be answers. thanks mail me your thinking about that discussions. on [email protected]

what are the port numbers for

Question DNS,FTP,TELNET,SMTP,NNTP

Rank

Answer Posted By

Question Submitted By :: Hithesh This Interview Question Asked @ Airtel I also faced this Question!! Answer

protocol

port number

ftp data

20

ftp program

21

telnet

23

dns

53

nntp

119

smtp

25

© ALL Interview .com

5

Jitendera Kumar Sinha

Answer

Question

dns =53 ftp= 20 telnet=23 smtp=25 nntp=119

0

Hi,can anyone explain me in brief about ccna security. waiting for your answer

Rakesh Kumar Agrawal

Rank

Answer Posted By

Question Submitted By :: Hithesh I also faced this Question!! Answer

HI this is jitendera here. i am a ccna and planing for ccna secur.to being a ccna secur u should have completed ccna.after that u can go through ccna secur.this is a important part of network admin and security.if you want that book? then go to esnips.com type three cspfa

© ALL Interview .com

0

Jitendera Sinha

0

Jitu

and download the pdf whose size is 24 mb this is the complete book covreing ccan secur,cspa,csvpn and csi

Answer

Question

ccsp_complete_study_guide.pdf this is the link in esnips.com

what is difference between 1 pap and chap(quite easy but need on line answer) 2 chap and ms-chap(plz describe briefly) now i have posted the question is there any one to help me?

Rank

Answer Posted By

Question Submitted By :: Jitendera Kumar Sinha I also faced this Question!! Answer

Question

is there any guy who can help me.i searched it on the net but i cannot understand plz place the answer looking toward you. jitendera sinha

friends i have 3ree prob which is asked in ibm india in technical round 1 what is ftp(this was easy i had answered) 2 why we use ftp(i think it is a tough one) 3 how can we enable ftp in the widows xp. friend i need these question answer as soon as possible if it is possible to reply within the eveing then i always obeyliged to you i am espacily looking towards the jitendera sinha who make most of the valuable answer

© ALL Interview .com

0

Jitendea Sinha

Rank

Answer Posted By

loking toward you nidhi mall

Question Submitted By :: Nidhi This Interview Question Asked @ IBM , Ibm I also faced this Question!! Answer

thanks nidhi,for that question ok i am going to explain question 2 and 3rd if you needed first answer too then plz intimate me through that. ok your second question why we use ftp at firstely tell me what do you do if you want to send 24 mb file by internet what would you do i know what are u thinking u r thinking that u will zip it,but as you know that most of the site doesnot allow to send the file whose size is more then 5 mb then what do u do? think think think......... think.........

© ALL Interview .com

5

Jitendera Sinha

no answer? your 2nd question nawer is residing in that question.to solving the above prob that is to send the large file across the network ftp is used now urs 3rd question i am writing the step 1 go to control panell 2 go to add remove program 3 go to add remove windows component 4 click on iis 5 click on ftp click ok close the winow after closing that window u get another window insert urs xp cd in cd rom specify the location now ftp is enabled thanks by jitendera sinha

Answer

amazing.thanks jitendera do u know u help me lot i canot explain my fillng. really u r best,thanks a lot,wow.one day we ever meet,thanks a very very thanks to you thanks a lot and i didn't need first question answer once again thanks thanks thanks thanks

0

Nidhi

Answer

thanks is not needed,and i am not best,i just tried to explain.if that is going to help then its my pleasure.by the way thanks does not needed becoz it might be possible that it make me proudy,once again i am not the best,thanks take care

0

Jitendera Sinha

Question What does a router change in a packet when it forwards a packet to the next hop?

Rank

Answer Posted By

* A: Destination physical address * B: Destination network address * C: Destination network address and the destination physical address

Question Submitted By :: Nidhi Mall This Interview Question Asked @ Microland I also faced this Question!!

© ALL Interview .com

Answer

A: Destination physical address

0

Sudeep_mib

Answer

destination network address

0

Jawad

Answer

sudeep mall is coreect

0

Purbi Sinha

Answer

sudeep is correct option is A here is the explanation Let's say that we have Host A and Host D. Host A sends a packet to Host D, which Host D is on a different network. Host A applies both the logical address and logical device address before sending the packet. The source network layer address is also added to the packet, so the receiving device can reply if it needs to. Then Host A adds it's own device address (which in this example is 10.) Instead of adding the device address of Host D, it uses the next router in the path (which it's address is 20.) Now the packet is sent and is received by the next router. Router B examines the destination address and recognizes the address is addressed to it. The router strips off the data link addresses and examines the destination device of the

5

Jitendera Kumar Sinha

network layer. It recognizes the address to be on a different network. Since Router C is the next router in the path, Router B sends the packet to it. So Router B applies it's own device address (20) and uses Router C device address as the destination address (30) Router B sends the packet to Router C. Router C sees that it's addressed to it. Router C strips off the data link addresses and examines the destination device of the network. It recognizes that the packet is sent to Host D. Router C applies it's own device address and applies the destination address of Host D (40) Router C sends the packet to Host D. The data link addresses are removed. The original source and destination addresses are contained in the packet at the network layer. hope this article help those people who marked it wrong

Answer

(10.0.0.1) (10.0.0.2) S0 S0 (R1)------------------------(R2) !E0/1 (0ACF:AAA1:000A) ! E0/1 (1ACF:BBA1:010A) !IP - 172.16.1.100 ! IP 172.17.1.100 ! ! ! ! ! ! (Host A) (Host B) E0 (ABC0:ABB1:00A0) E0 (CAA0:ABE1:110A) IP - 172.16.1.1 IP 172.17.1.1 Just assume this is a network & all interfaces having their Layer 2 & Layer 3 addresses. Now Host A want to send some data to Host B.

5

Mr.shahin07

Now wat wud be the Layer 2 & Destination address.

3 source &

a) Packet leaving Host A. Layer 3 Source add - 172.16.1.1 Layer 3 Destination add - 172.17.1.1 Layer 2 Source add - ABC0:ABB1:00A0 (E0 of Host A) Layer 2 Destination add - 0ACF:AAA1:000A (E0/1 of R1) b) Packet leaving Router R1 Layer 3 Source add - 172.16.1.1 Layer 3 Destination add - 172.17.1.1 Layer (E0/1 Layer (E0/1

2 Source add - 0ACF:AAA1:000A of R1) 2 Destination add - 1ACF:BBA1:010A of R2)

c) Packet leaving Router R2 Layer 3 Source add - 172.16.1.1 Layer 3 Destination add - 172.17.1.1 Layer (E0/1 Layer (E0/1

2 Source add - 1ACF:BBA1:010A of R2) 2 Destination add - CAA0:ABE1:110A of R2)

So every time DESTINATION PHYSICAL ADDRESS is changed. Hi guys, i just share wat i know. Let me if i m wrong. Your feedback is important for me. With Thanx & Regards Shahin Ahmed

Answer

ha ha thanks shain for supporting me and providing the scenario based explanation people don't like to read theory so this article help them more.i mark it as excellent

0

Jitendera Kumar Sinha

Answer

Question

but sahin if u make your answer with three router (R1 R2 and R3)and host off R1 want to send the data to R3 through R2 then it will easy to understandble.meanwhile it is excellent

HI friends. i need a suggestion and looking towards you foryours valuable suggestion friends i have completed ccna now i want to done red het linux system admnistration and networking i am liitle bit confuse betwwen them which one is better for me for job point of view reply soon waiting for your reply

0

Jitendera Kumar Sinha

Rank

Answer Posted By

Question Submitted By :: Jitendera Sinha I also faced this Question!! Answer

Question

friends i am little bit confude between ccnp and red hat Linux system admin and networking. what i have to do plz tell looking towards you jitendera sinha

Request any body to explain the parameters of Ipsec vpn tunnel while creating a tunnel in Cisco ASA.

© ALL Interview .com

0

Jitendera Sinha

Rank

Answer Posted By

Question Submitted By :: Prasad.giri This Interview Question Asked @ HCL I also faced this Question!! Answer

In tunnel mode, the entire IP packet (data and IP header) is encrypted and/or authenticated. It is then encapsulated into a new IP packet with a new IP header. Tunnel mode is used to create Virtual Private Networks for

© ALL Interview .com

0

Jitendera Sinha

network-to-network communications (e.g. between routers to link sites), host-to-network communications (e.g. remote user access), and host-to-host communications (e.g. private chat). and the parameter are Parameter Value Name VPN Policy This must match the policy on the other gateway Local Endpoint This is usually a subnet entity. Remote Endpoint This is usually a subnet entity Local Gateway Remote Gateway i donot know more than that how ever plz tell me that.. is that topic in the ccna course

Answer

is the answer given by jitendera kumar sinha is correct?.plz answer it.jitendera sinha provided lots of answer and i think all are correct but rigt now he seems to confused

0

Sohaan [HCL Infosystems Ltd]

Answer

is there any one who can say that those answer is write or not. plz if not then provide the wright answer by

0

Jitendera Sinha [HCL Infosystems Ltd]

nidhi mall

Question

what the exact definition of Ethernet.plz reply as soon soon as possible

Rank

Answer Posted By

Question Submitted By :: Jitenderas Sinha I also faced this Question!!

© ALL Interview .com

Answer

Ethernet is A technology where all devices share same bandwidth.

0

Maaun

Answer

Ethernet is a phisical media tat provides bandwidth of 10 mbps.

0

Shridh

Answer

thsnks to all you for providing the answers thanks again jitendera sinha

0

Jitendera Sinha

Answer

A type of high-speed network for interconnecting computing devices. Ethernet can be either 10 or 100 Mbps (Fast Ethernet). Ethernet is a trademark of Xerox Corporation, Inc.

0

Sudeep_mib

Answer

actually ethernet is a connectivity of lan family

0

Pradeep Yadav

Answer

Ethernet is a standard communication

0

Shahin

protocol embedded in software & hardware, intended for building local area networking. Ethernet is a popular Data link layer & physical layer technology for Local Area Network. It is less expensive & widely used LAN technology. First Ethernet was created in 1960's at UNIVERSITY OF HAWAII for its ALOHA network. First experimental Ethernet was created 1970's by BOB METCALFE & DAVID BOGGS of PALO ALTO RESEARCH CENTER (PARC) & speed was 2.94 Mbps. In 1980's DIGITAL, INTEL & XEROX (DIX) jointly created Ethernet, which is known as ETHERNET Version 1.0 In 1983, IEEE introduce Ethernet along with some modification on DIX Ethernet. which is known as IEEE's Ethernet.

what are loops in switches

Question excactly...and how does it gets created???

Rank

Answer Posted By

Question Submitted By :: Shridh I also faced this Question!! Answer

what is loop it is difficult to explain without any diagram. but i am trying my best to explain it without any diagram ok firstly understand that what is loop loop is a cycle. it is difficult to understand from that explanation. now let there 3ree switch a , b ,c.which are connected with each other.now for back up for that connection we provide

© ALL Interview .com

5

Jitendera Sinha

alternate path that is called redundancy(suppose that you know)ok as if a user want to communicate with another user in to the network then multiple packet is generated.and these packet travel through each path within the network.due to this a loop is formed diagarm a---------b--------c <-----------------> lower one is alternate path between a to c.now if a want to communicate with c then packet travel through both path and crated loop now in some cases stp is enabled but loop also formed it is due to An STP loop is created when an STP blocking port in a redundant topology erroneously transitions to the forwarding state. This usually happens because one of the ports of a physically redundant topology (not necessarily the STP blocking port) no longer receives STP BPDUs. In its operation, STP relies on continuous reception or transmission of BPDUs based on the port role. The designated port transmits BPDUs, and the nondesignated port receives BPDUs. thanks i think this article may help you with best regards jitendera sinha

Question what is flow control,.

Rank

Answer Posted By

Question Submitted By :: Purbi I also faced this Question!! Answer

In computer networking, flow control is

© ALL Interview .com

0

Ajaz Ahmad

the process of managing the rate of data transmission between two nodes to prevent a fast sender from over running a slow receiver. This should be distinguished from congestion control, which is used for controlling the flow of data when congestion has actually occurred Posted By Ajaz Ahmad Wani Network Engineer [email protected]

Answer

flow control is the process in which it prevent the sender to overflow the buffer of receiver

Wani

0

Jitendera Sinha

jitendera sinha

Answer

Jeetendra just want to correct you with your last step i.e 3rd step after receiving ACK(reply for request) the sender(or 1st node) sendsback ACK again that as confirmation for starting the session

0

Nikhil Maggu

Answer

Flow control ensure that one device doesn't overflow another device with too much data in one connection.

0

Mr.shahin07

Rank

Answer Posted

Commonly used flow control technique are - Buffer, Ready/Not Ready signal & windowing.

Question what is secure hand shake protocol

By Question Submitted By :: Purbi Sinha I also faced this Question!!

© ALL Interview .com

Answer

it is also know as ssh protocol it work on 3ree step let supoose that machine 1 want to comunicate withe machine 2 then what process take place. step 1 node one send the request to the node to and wiat for ack step 2.node 2 accept the request and send the ack step 3 node 1 acccept the request and send the request again and communucation get stared

0

Jitender Sinha

Answer

Jeetu just want to correct you with your 3rd step i.e after receiving ACK back the sender(or 1st node) sends back ACK/confirmation[Not request] as to confirm start of the session

0

Nikhil Maggu

Rank

Answer Posted By

Question please name some routed protocol. Question Submitted By :: Purbi Sinha I also faced this Question!! Answer

ip ,ipx and appletalk is nae of some riuted protocol

© ALL Interview .com

Related Documents


More Documents from ""