0% found this document useful (0 votes)
1K views20 pages

CCNA Interview Questions You'll Most Likely Be Asked

CCNA Interview Questions You’ll Most Likely Be Asked is a perfect companion to stand ahead above the rest in today’s competitive job market. Rather than going through comprehensive, textbook-sized reference guides, this book includes only the information required immediately for job search to build an IT career. This book puts the interviewee in the driver’s seat and helps them steer their way to impress the interviewer.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
1K views20 pages

CCNA Interview Questions You'll Most Likely Be Asked

CCNA Interview Questions You’ll Most Likely Be Asked is a perfect companion to stand ahead above the rest in today’s competitive job market. Rather than going through comprehensive, textbook-sized reference guides, this book includes only the information required immediately for job search to build an IT career. This book puts the interviewee in the driver’s seat and helps them steer their way to impress the interviewer.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 20

CCNA Interview

Questions
Review these typical interview questions and think about how you would
answer them. Read the answers listed; you will find best possible answers
along with strategies and suggestions.
This page is intentionally left blank
Chapter 1

TCP/IP and OSI Networking


Models

1: What are the differences between TCP/IP and OCP Models?


Answer:
OSI or Open Systems Implementation is the theory and TCP/IP or
Transmission Control Protocol/Internet Protocol is its
implementation in practice. OSI comes with 7 layers while TCP/IP
combines the top 3 layers of OSI and comes with 4 layers. The
TCP/IP protocol was developed by the Department of Defence
and is tangible. But the OSI model was developed by International
Standards Organization and is not tangible.
2: Explain Broadcast, Multicast and Unicast.
Answer:
These are the different ways in which messages are sent in a
network of computers. Unicast in networking means some
message transmitted between two individual nodes in the

means one sender sends a message to many nodes, though not all,
in the network. In broadcast, one sender sends a message to all
nodes in the network.

3: What is OSI reference mode


Answer:
Network layer is layer 3 of the OSI reference model that defines
logical addressing, routing and path determination. Examples of
the protocols working at this layer are IP and IPX.

4: Which of the below are Transport layer protocols?


a) TCP
b) HTTP
c) IP
d) UDP
Answer:
a) TCP, d) HTTP

5
Answer:
Data encapsulation is the process of putting headers and trailers
into a new header and trailer. This process is repeated until
reaching layer 1 which is responsible for transmitting the data
over the transmission medium.

6: In which OSI reference model layer does HTTP operate?


a) Transport layer
b) Network layer
c) Application layer
d) Physical layer
Answer
c) Application layer

7: What is CSMA/CD and how does it work?


Answer:
When the data is transmitted by two or three nodes on a network
through the cable, there occurs collision. So, CSMA/CA (Carrier
Sense Multiple Access/ Collision Avoidance) is used. Before
transmitting the data on the cable, NIC (network Interface Card)
checks the cable if any transmission is going on; if no, it sends the
data or waits for the transmission to finish.
If two NIC senses the medium at the same time and send the data,
there occurs collision. Then the node detects the collision and

8: What are the two kinds of transport possible and give some
example?
Answer:
a) Reliable and unreliable are the two kinds of transport
possible
b) The transport varies according to the application
c) The reliable protocol is defined by TCP
d) The unreliable protocol is defined by UDP
e) Example:
UDP is used in SNMP
TCP is used in HTTP

9: How TCP ensures a reliable as well as controlled transport?


Answer:
a) The reliable transport is ensured by the assurance of data
delivery
b) The controlled transport is ensured by congestion control
which means when the resources are busy it does not send
the data

10: For an inherent requirement application which protocol


would be better to use at the transport layer?
Answer:
TCP protocol would be better to use because it resends the
acknowledgement when the packet is not received

11: When the client will declare that the server is unreachable if
the client sends data to a server?
Answer:
a) Even though the server does not send an acknowledgement,
the client will not declare the server that it is unreachable.
Instead, it resends the data packet until it reaches its
threshold value. Declares that the server is unreachable
b) If the client does not receive any acknowledgment after
reaching its threshold value, then it declares that the server
is unreachable

12: Why the windowing concept is introduced in TCP?


Answer:
In TCP, an acknowledgement is sent every time when a fragment
of data is received. This increases the traffic when a large amount
of data is sent. To avoid this, the windowing concept is
introduced.

13: List the TCP/IP port for following:


a) FTP
b) TELNET
c) HTTP
d) SNMP
e) POP3
Answer:
a) FTP-21
b) TELNET-23
c) HTTP-80
d) SNMP-25
e) POP3-110
14: What are the advantages of UDP over TCP?
Answer:
a) Both are transport layer protocols.UDP is a connectionless
protocol while TCP is a connection-oriented protocol.
b) UDP provides low overhead data delivery than TCP
c) UDP find applications in the Domain Name System (DNS),
Video Streaming, Voice over IP (VoIP) whereas TCP has
applications in Web Browsers, E-mail, File Transfers
Chapter 2

LAN Fundamentals

15: Explain the Token Ring Operation.


Answer:
In a Token Ring network, the stations are arranged in a ring
topology. Empty tokens that are circulated in the network are

that contains the details regarding the destination and the data.
This token is passed on in the network until it reaches the
intended destination. Different stations pass the token on to the
connected neighboring rings until it reaches the destination. More
information is added to the token by altering the T bit. Finally,
when the destination station receives the message, it sets the token
bit to 0 which then reaches the sender through the network. When
the sender receives the 0 token it confirms that the message has
reached the intended destination.
16: Explain FDDI
Answer:
FDDI is Fiber Distributed Data Interface, developed by the ANSI
to define a dual token ring network that carries data at a speed of
100+ Mbps through a Fiber medium which renders it faster and
safer. For smaller networks covering shorter distances, the CDDI
using Copper can be implemented successfully. But for larger
networks covering larger area, more expensive Fiber Optics cable
needs to be used which provides faster and more reliable data
transmission.

17: Which connector type is used in Ethernet cables?


a) RJ11
b) RJ12
c) RJ55
d) RJ45
Answer:
d) RJ45

18: What is broadcast MAC address and what is its value?


Answer:
The broadcast MAC address is a type of layer 2 address that is
used to deliver data to all devices in the same broadcast domain of
the sender. The source sends only one frame on the network and
the switch replicates it to all ports in the same broadcast domain
of the source. The broadcast MAC address has a value of
FFFF.FFFF.FFFF.
19
twisted.
Answer:
Ethernet cables contain 8 wires in 4 pairs groups. Each pair is
twisted so that the magnetic field created by one wire cancels out
the magnetic field created by the other wire. This enhances
performance and decreases transmission noise.

20: Describe how you can make an Ethernet cross-over cable.


Answer:
Ethernet cross-over cable is created by connecting Pins 1 and 2 on
one side of the cable to pins 3 and 6 on the other side. The other

4 wires of the 8 to send and receive data.

21: What typical cable type do you use to connect two switches
together?
a) Straight-through cable
b) Roll-over cable
c) Console cable
d) Cross-over cable
Answer:
d) Cross-over cable
22: What is the maximum cable length in Fast Ethernet (IEEE
802.3u) standard?
a) 100m
b) 200m
c) 50m
d) 500m
Answer:
a) 100m

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy