YouTube Icon

Interview Questions.

Top 50 Cisco Network Engineer Interview Questions and answers - Jun 15, 2022

fluid

Top 50 Cisco Network Engineer Interview Questions and answers

Q1. List The Important Characteristics Of Igrp?
Numerous inconsistent ways, independent framework number, and so on.

Q2. What Are The Important Characteristics Of Isdn?
It trports both voice and information, and same as X.25

Q3. Which Abbreviation Is Used To Tell The Router To Check All Numbers?
have
Q4. How Might We Convert The User Data From Dte To Wan Service Form?
We can utilize the Modem, CSU/DSU and TA/NT1 for this.

Q5. Which Authentication Method Is Preferred To Set Up A Session?
CHAP

Q6. Which Mechanism Takes Place In A Traffic Light?
Stream control

Q7. What Is The Use Of Cisco Ios Exec Command Trace?
The "follow [protocol] [destination]" is utilized to find courses that bundles will go to their objective hosts. TTL (Time to Live) is utilized to report objective course data.

Q8. Which Hardware Component Is Used To Store Buffers, Tables, Etc.?
Smash

Q9. What Is Magic Number?
It evades outline circling.

Q10. What Are The Cisco Hdlc Protocol.?
It contains the Flag, Address, Control, Proprietary, Data, FCS and Flag.

Q11. What Is The Range Of Extended Ip Access List?
The reach is 100-199

Q12. What Is The Quality Protocol?
It screens information dropped on a connection.

Q13. What number of Access Lists Are Allowed Per Interface?
One Access list for every port, per convention is permitted.

Q14. How Might You Vary The Router Boot Sequence?
It tends to be finished by boot framework orders and config register.

Q15. What Are The Important Characteristics Of Ppp Pap Authentication?
Username and secret word is sent in clear message and The validation controls far off hub.

Q16. While Using Access Lists, What Does A Cisco Router Check First?
The cisco switches checks whether the bundle is routable or bridgeable

Q17. Which Osi Layer Is Used For Physical Address And Network Topology?
The Data interface layer fills this need.

Q18. What Is Source Quench?
It is the condition when the switch misses the mark on more cushion space.

Q19. Name The Default Ipx Ethernet Encapsulation?
Novell-Ether is the default IPX Ethernet exemplification.

Q20. Which Process Is Used To Find An Ip Address From A Mac Address?
RARP Process

Q21. What Is The Use Of Dlci?
It is utilized to distinguish the PVC in outline transfer organization.

Q22. How Might A Router Be Configured?
It very well may be designed by TFTP, Nvram or Console

Q23. Significant Features Of Ppp Chap Authentication?
Verification messages and nearby switch difficulties

Q24. What Is Icmp Protocol?
It is utilized to convey messages like objective inaccessible, source extinguish, boundary issue, time surpassed, timestamp, address answer and address demand.

Q25. What Do You Know About The Udp Datagram Format?
Source Port - 16 pieces, Destination Port - 16 pieces, Length - 16 Bits, Checksum - 16 pieces, Data

Q26. Name And Explain The Phases Of Ppp Session Establishment.?
These are connect foundation stage, verification stage and the organization layer convention stage.

Q27. What Are The Important Features Of Udp?
It is the layer 4 trport convention and has no handshaking.

Q28. What Is The An Important Feature Of Rarp.?
The full type of RARP is Reverse Address Resolution Protocol. It is utilized to begin distant O/S load arrangement.

Q29. What Is The Number Range Of Ipx Access List?
The reach is 800-899

Q30. For what reason Do We Have To Disable Cdp?
To save the transfer speed by lessening above and to interface with a non cisco switch.

Q31. Which Is The Ipx Serial Encapsulation By Default?
HDLC

Q32. List The Default Values In Eigrp Metric?
The default values are data transfer capacity and postponement.

Q33. What Is The Use Of Arp?
It is utilized to decide the MAC Address of a workstation.

Q34. Which Compression Protocols Are Used For Ppp?
Stac and Predictor

Q35. What Is The Access List Range For Extended Ip Access List?
The entrance list range is 100 - 199.

Q36. Which Format Is Useful For Configuring The Subnet Mask For An Ip Address?
dabbed decimal, hexadecimal and bit count configurations can be utilized.

Q37. Significant Features Of Osi Layer 3 - Network Layer?
Decides the way, multiplexing and the board of meetings.

Q38. What Is The Use Of Ddr On Cisco Routers?
It is utilized for dial on request directing. DDR gives steering to low volume and intermittent traffic.

Q39. What Is Windowing?
It is a sort of stream control.

Q40. What Is The Default Serial Encapsulation?
HDLC is the default sequential embodiment.

Q41. Which Are The Different Forms Of Wan Services Accessed By Cisco Routers?
These are Switched administrations, Using conventions associating shared gadgets and Interface front finish to IBM Enterprise Data focus PCs.

Q42. Which Protocol Helps Test The Connectivity Without Configuration Of Layer 3 Protocols?
CDP convention

Q43. What Is The Use Of Ipx Sap?
It represents Service Advertising Protocol and promoting services is utilized.

Q44. List Three Important Properties Of Igrp?
It is a composite measurement. There are refreshes at regular intervals and it is a toxin switch.

Q45. What Happens If We Set A Wildcard Mask Bit To 0 In Cisco Routers?
The switch checks the comparing bit esteem.

Q46. Which Hardware Component Is Used To Store Backup Configuration?
NVRAM is utilized for this.

Q47. Where Can The Backup Configuration File Be Found?
It is put away in the NVRAM.

Q48. Which Hardware Is Necessary For Broadcasts?
switch, repeater and scaffold.

Q49. What Are The Three Features Of Ip Access Lists?
There are three various types of access records. These are standard, expanded and named.

Q50. Which Switching Method Is Used To Examine The Destination Mac Address?
Slice through is the exchanging strategy used to look at it.




CFG