Cisco CCNA Interview Questions and Answers

Q1 : What is BootP?
A : BootP is a protocol that is used to boot diskless workstations that are connected to the network. It is short for Boot Program. Diskless workstations also use BootP in order to determine its own IP address as well as the IP address of the server PC.

Q2 : What is a Frame Relay?
A : Frame Relay is a WAN protocol that provides connection-oriented communication by creating and maintaining virtual circuits. It has a high-performance rating and operates at the Data Link and Physical Layers.

Q3 : What is subnetting?
A : Subnetting is the process of creating smaller networks from a big parent network. As a  part of a network, each subnet is assigned some additional parameters or identifier to indicate its subnet number.

Q4 : What does the show protocol display?
A : – routed protocols that are configured on the router
– the address assigned on each interface
– the encapsulation method that was configured on each interface

Q5 : What is HDLC?
A : HDLC stands for High-Level Data Link Control protocol. It is a propriety protocol of CISCO. It is the default encapsulation operated within CISCO routers.

Q6 : What is Bandwidth?
A : Bandwidth refers to the transmission capacity of a medium. It is a measure of how much volume a transmission channel can handle, and it is measured in Kbps.

Q7 : What are packets?
A : Packets are the results of data encapsulation. These are data that have been wrapped under the different protocols of the OSI layers. Packets are also referred to as datagrams.

Q8 : Give some benefits of LAN switching.
A : – allows full duplex data transmission and reception
– media rate adaption
– easy and efficient migration

Q9 : What is the purpose of the Data Link?
A : The job of the Data Link layer is to check messages are sent to the right device. Another function of this layer is framing.

Q10 : What is Route Poisoning?
A : Route Poisoning is the process of inserting a table entry of 16 to a route, making it unreachable. This technique is used in order to prevent problems caused by inconsistent updates on a route.

Q11 : What are the different types of passwords used in securing a CISCO router?
A : There are actually five types of passwords that can be used. These enable secret, virtual terminal, console, and auxiliary.

Q13 : What is MAC address?
A : MAC address stands for Media Access Control address. This is an address of a device which is identified as the Media Access Control Layer in the network architecture. The MAC address is unique and usually stored in ROM.

Q14 : What causes a triggered update to reset the router hold-down timer?
A : This may happen when the hold-down timer has already expired, or when the router received a processing task that incidentally was proportional to the number of links in the internetwork.

Q15 : Briefly explain the conversion steps in data encapsulation.
A : From a data transmitter’s point of reference, data from the end user is converted to segments. Segments are then passed on to the other layers and converted into packets or datagrams. These packets are then converted into frames before passing on to the network interface. Finally, frames are converted to bits prior to actual data transmission.

Q16 : What are the different types of passwords used in securing a CISCO router?
A : There are actually five types of passwords that can be used. These enable secret, virtual terminal, console, and auxiliary.

Q17 : How do you go to privileged mode? How do you switch back to user mode?
A : To access privileged mode, you enter the command “enable” on the prompt. In order to get back to user mode, enter the command “disable.”

Q18 : What is latency?
A : Latency is the amount of time delay that measures the point from which a network device receives a data frame to the time it sends it out again towards another network segment.

Q19 : What is the function of the Application Layer in networking?
A : The Application Layer supports the communication components of an application and provides network services to application processes that span beyond the OSI reference model specifications. It also synchronizes applications on the server and client.

Q20 : What is a Window in networking terms?
A : A Window refers to the number of segments that are allowed to be sent from source to destination before an acknowledgment is sent back.

Q21 : When does network congestion occur?
A : Network congestion occurs when too many users are trying to use the same bandwidth. This is especially true in big networks that do not resort to network segmentation.

Q22 : What is PoE?
A : PoE is said to be Power over Ethernet. It is used pass electric signal with data at a time.

Q23 : What are the possible ways of data transmission in CCNA?
A : These are the three possible ways of data transmission:
1. Simplex
2. Half-duplex
3. Full-duplex

Q24 : What is the key advantage of using switches?
A : When a switch receives a signal, it creates a frame out of the bits that were from that signal. With this process, it gains access and reads the destination address, after which it forwards that frame to the appropriate port. This is a very efficient means of data transmission, instead of broadcasting it on all ports.

Q25 : Which LAN switching method is used in CISCO Catalyst 5000?
A : CISCO Catalyst 5000  uses the Store-and-forward switching method. It stores the entire frame to its buffers and performs a CRC check before deciding whether or not to forward that data frame.