Monday, July 4, 2022
HomeWordPress DevelopmentPrime 50 CCNA Interview Questions and Solutions

Prime 50 CCNA Interview Questions and Solutions


CCNA is a certification that proves your potential to know, use, and handle Cisco networks. The CCNA certification gives you with the abilities obligatory for optimizing and administering Cisco networking sources in a company. With this credential, you may transfer on to higher-level certifications such because the MCSA or MCDBA. 

The advantages of acquiring CCNA embrace:

  • Improved job prospects: A well-rounded CCNA certification signifies that you’ve got data about community applied sciences and their functions – two necessary components when looking for employment in data expertise (IT) fields.  
  • Elevated data base: Realizing how one can administer Cisco networks permits IT, professionals, extra flexibility when deploying techniques inside a company, they now not want somebody who solely understands {hardware} configurations.

On this article, we’ll see the highest 50 CCNA interview questions with their solutions. 

CCNA-Interview-Questions-and-Answers

1. Identify any two ports of Switches. 

  • Entry Port: An entry port is a form of connection on a change that can be utilized to attach a digital machine on VLAN unaware. This port delivers the digital machine with connectivity by a change that’s VLAN conscious with out requiring it to assist VLAN tagging.
  • Combo Port: These ports are used to attach units to the change. Switches are related to a port that known as a combo port. These ports will be assigned to totally different combos of units. A tool mixture is a bunch of a number of units used to transmit or obtain information. In different phrases, a combo port generally is a single interface with two entrance ends, resembling an RJ45 connector and an SFP module connector (additionally referred to as MiniGBIC).

2. What are three doable methods of information transmission in CCNA?

  • Simplex Mode: Simplex mode is type of a unidirectional path throughout the communication is one-way. Just one of the two units will ship and the opposite will obtain. 
  • Half-Duplex Mode: Each station will broadcast and obtain data in half-duplex mode, nonetheless, it isn’t on the similar time. as soon as the system transmits information.
  • Full-Duplex Mode:  Every station will broadcast and obtain data at an similar time in full-duplex mode. Alerts touring in a single path share the hyperlink’s functionality with indicators touring throughout the totally different instructions in full-duplex mode:
    • Both the connection or the receiver should have two bodily unbiased transmission routes.
    • However, capacitance is split by indicators transferring in each instructions.

For extra particulars please check with the Transmission Modes in Laptop Networks (Simplex, Half-Duplex, and Full-Duplex) article.

3. Identify totally different IPX entry lists.

There are three IPX Entry lists:

  • Customary Entry checklist: The entry checklist is created utilizing the supply IP handle. These ACLs enable or deny the entire protocol suite. They don’t differentiate between the IP site visitors resembling TCP, UDP, HTTPS, and many others. By utilizing digits 1-99 or 1300-1999, the router will perceive it as a regular ACL and set the handle because the supply IP handle.
  • Prolonged Entry-list: It’s a sort of Entry-list that’s primarily used as it may differentiate IP site visitors. the entire site visitors won’t be permitted or denied like in the usual entry checklist. ACL makes use of each supply and vacation spot IP addresses and likewise port numbers to differentiate IP site visitors. In such a ACL, we will additionally point out which IP site visitors ought to be allowed or denied. These use vary of numbers 100-199 and 2000-2699.
  • Reflexive Entry checklist: Reflexive Entry-list will be outlined as an entry checklist that permits solely the responses of the packets on periods created throughout the community from the surface community.

For extra particulars please check with the Entry-Lists (ACL) article.

4. What do you imply by 100BaseFX?

100BASE-FX is one other variation of the 100Base-T regular with the exception that it’s a fast LAN i.e sending over fiber. Like varied requirements, 100Base makes use of two wires or on this case strings for information transmission: one for reception (RX), whereas the opposite for transmission (TX).

For extra particulars please check with the Quick Ethernet and Gigabit Ethernet article.

5. Identify the LAN Switching technique that’s largely utilized in CISCO Catalyst 5000?

The shop-and-forward switching method is utilized by the CISCO Catalyst 5000 and subsequently it shops your entire body in its buffers and performs a CRC (Cyclic Redundancy Verify)  earlier than deciding whether or not or to not transmit this data body.

For extra particulars please check with the Message switching strategies article.

6. Identify totally different recollections which might be utilized in CISCO routers.

The totally different recollections which might be utilized in Cisco routers are given beneath:

  • Flash Reminiscence 
  • RAM ( Random Entry Reminiscence ) 
  • ROM (Learn Solely Reminiscence)
  • NVRAM (Non-Unstable Random Entry Reminiscence)

For extra particulars please check with the totally different recollections utilized in a CISCO router article.

7. What’s the distinction between tracert and traceroute?

Traceroute is a characteristic or a utility that data the route (specific passage PCs at every bounce) by way of the group between your PC and a predetermined goal PC and the Tracert monitoring is a fast scan that reveals plenty of monitoring data of any community or system that may be obtained in a bundle from a PC or gadget.

For extra particulars please check with the Distinction between Ping and Traceroute article

8. What do you imply by DLCI?

DLCI (Knowledge Hyperlink Connection Identifier) is the amount of a private or switched digital circuit in a body relay community, located throughout the body header, the DLCI subject identifies that logical circuit the info travels over, and every DLCI features a dedicated data price (CIR) related to it.

For extra particulars please check with the Native Administration Interface (LMI)

9 . Identify router command that’s used to show RAM content material and NVRAM Content material.

To Present, the elements of NVRAM or level to the association file assigned to the CONFIG_FILE variable, we use the present startup-config command.

For extra particulars please check with the Cisco Router primary instructions article.

10. Outline Body relay?

Body relay is a expertise that gives quick and dependable information transmission in Web networks. It’s a standards-based networking expertise that gives a path for information packets from one level on the community to a different.

For extra particulars please check with the How does Body Relay Work article.

11. Distinction between Person mode and Privileged mode in Cisco? 

Person mode is just for viewing router configurations and Privileged mode is for viewing all router configurations and likewise permits enhancing some much less necessary configurations.

For extra particulars please check with the Cisco Router modes article.

12. What’s EIGRP? Point out some metrics of the EIGRP Protocol.

EIGRP determines the trail worth from 5 metrics: bandwidth, load, delay, reliability, and MTU. EIGRP makes use of 5 totally different messages to speak with neighboring routers. EIGRP Messages – Hi there, Replace, Query, Reply and Affirm.

For extra particulars please check with the EIGRP fundamentals article.

13 . What’s CDP(Cisco Discovery Protocol)? Write its capabilities.

Cisco Discovery Protocol (CDP) is a community discovery software that helps community directors and technicians determine close by Cisco units, particularly these with a low-transparency protocol.

For extra particulars please check with the Cisco Discovery Protocol (CDP) and Hyperlink Layer Discovery Protocol (LLDP) article.

14. Distinction between a broadcast area and a collision area?

Each broadcast and collision domains overlap. Broadcast area refers back to the transmission of knowledge over a large space, resembling tv or radio broadcasting. The collision area consists of two or extra objects that come into contact with one another immediately, violently, or unexpectedly.

For extra particulars please check with the Collision Area and Broadcast Area within the Laptop Community article.

15. What do you imply by route poisoning?

Route poisoning is a solution to management a router from transmitting packets by way of a path that has develop into weak inside pc networks. Distance-vector routing protocols in pc networks use route poisoning to point out different routers {that a} route is now not reachable and shouldn’t be thought of from their routing tables. The cut up horizon with poison reverses the route poisoning and delivers updates with unreachable hop counts on to all of the nodes within the community. When the protocol catches an invalid route, all the routers within the community are notified that the unhealthy route has an infinite (∞) route metric. This makes all nodes on the invalid route appear infinitely distant, stopping any of the routers from sending packets over the invalid path.

For extra particulars please check with the Route Poisoning article.

16. What sorts of passwords can be utilized in CISCO routers?

There are three sorts of passwords that can be utilized in a Cisco router. These are 

  • Administrative passwords: They’re used to manage entry to the router. They’re used to assign permissions to customers and to manage the general operation of the router. 
  • Person passwords: These are used to guard information saved on the router. They’re used to log into the router and management entry to the router.
  • Password attributes: They’re used to set a password restrict, and to specify the period of time {that a} password should be used earlier than it’s robotically modified.

For extra particulars please check with the Completely different Varieties of Passwords utilized in Securing Cisco Router article.

17. Write the distinction between public IP and personal IP.

A public IP handle that identifies you on the Web so that each one the data you search can discover you. Personal IP addresses are used inside a non-public community to securely hook up with different units in the identical community. Every system on the identical community has a singular non-public IP handle.

For extra particulars please check with the Personal and Public IP article.

18. Clarify PoE.

Energy over Ethernet (PoE) is a measure that permits Ethernet cables to concurrently switch information and energy utilizing a single community cable. This allows system integration and community installers to ascertain powered home equipment in areas that lack electrical circuitry. As well as, PoE stops the price of putting in further electrical wiring, requiring skilled electrical installers to guarantee that strict conduit laws are adopted. PoE expertise transmits 10/100/1000 Mbps of information and 15W, 30W, 60W, and as much as 90W of energy price range to home equipment over Cat5e, Cat6, and Cat6a. Cat7 and Cat8 Ethernet cables for the best distance of 100m.

For extra particulars please check with the Energy Over Ethernet (POE) article.

19. What’s Spherical Journey Time?

RTT is also called round-trip time is an important software in defining the working situation of a community. It’s the time between a request and the response in any form of server on the web. A round-trip time is measured in milliseconds. RTT will be examined and decided by pinging a particular handle. It refers back to the time taken by a community request to succeed in a closing level and to revert again to the preliminary supply.

For extra particulars please check with the RTT(Spherical Journey Time) article.

20. What’s DHCP scope?

The DHCP scope is a legitimate vary of IP addresses which might be identified for task or lease to shopper computer systems on a person subnet. In a DHCP server, a scope is configured to find out the handle pool of IPs that the server can present to DHCP purchasers. DHCP Scopes outline IP addresses which might be offered to the purchasers. They need to be decided and activated earlier than DHCP purchasers use the DHCP server for its dynamic IP configuration. Customers can configure as many scopes on a DHCP server as wanted within the community atmosphere.

For extra particulars please check with the Dynamic Host Configuration Protocol (DHCP) article.

21.  what’s NVRAM?

NVRAM (Non-volatile random-access reminiscence) is a pc reminiscence that may preserve information when energy to the reminiscence chips has been turned off. NVRAM is part of the bigger sort of non-volatile reminiscence (NVM), which accommodates storage-class reminiscence primarily based on NAND flash. Flash reminiscence chips are sluggish to learn to and write than RAM chips, making them much less properly fitted for energetic computational reminiscence.

22. What’s using “Service Password Encryption”?

Service Password Encryption  Command on CISCO Router/Change  Allows you to encrypt all passwords in your router in order that they can’t be simply assumed out of your operating configuration. This command makes use of very weak encryption as a result of the router has to decrypt the password in a short time for it to work.

For extra particulars please check with the Completely different Varieties of Passwords utilized in Securing Cisco Router article.

23.  Clarify totally different cable sorts?

There are generally two sorts of cables utilized in networking, described beneath.

  • Coaxial cable: A coaxial cable is a form of copper cable specifically made with a metallic guard and different components organized to cease sign interference. It’s primarily utilized by cable TV companies to attach their satellite tv for pc antenna installations to clients’ houses and companies. It’s also generally utilized by phone corporations to safe central workplaces to phone poles close to clients. Some houses and workplaces use coaxial cable, too, however its basic use as an Ethernet connectivity medium in corporations and information facilities has been changed by the deployment of twisted pair cabling.
  • Twisted pair: Twisted pair Ethernet is an Ethernet in a pc community that makes use of twisted pairs of insulated copper wires for the bodily layer of the community, which is related to the info hyperlink layer. Twisted pair cable wires are circled one another to scale back obstacles from different twisted pairs within the cable. The 2 twisted wires assist in lowering crosstalk that may disrupt indicators and reduce electromagnetic induction, which has a voltage throughout a conductor transferring by way of a magnetic subject. 

For extra particulars please check with the Varieties of Ethernet Cable article.

24.  What’s the port variety of DNS and Telnet?

The Port variety of Telnet is 23 and the Port variety of DNS is 53..

For extra particulars please check with the Numerous TCP and UDP ports article.

25. Which service makes use of each TCP and UDP?

The Area Identify System (DNS) makes use of the TCP and UDP protocols for communication.UDP is used for decrease communications and is good for DNS queries.TCP is used for zone transfers and is appropriate for giant response messages.

For extra particulars please check with the Numerous TCP and UDP ports article.

26. What’s the port variety of SMTP and POP3?

The Port variety of SMTP is 587 and the Port variety of POP3 is 110.

For extra particulars please check with the Distinction between SMTP and POP3 article.

27. What’s CRC? Which layer does CRC work on?

CRC stands for Cyclic Redundancy Verify. It’s a checksum algorithm used to detect errors in digital information streams transmitted between two or extra computer systems. The layer the place CRC works is determined by the kind of information being checked and the way it must be processed by the system. Typically, CRC is utilized on the decrease layer of an OSI mannequin stack (OSI Reference Mannequin).

For extra particulars please check with the Cyclic Redundancy Verify article.

28. Which one is dependable – TCP or UDP ? and why?

TCP is dependable as a result of it ensures the supply of information to the vacation spot router. The supply of information to the vacation spot cannot be secured in UDP.

For extra particulars please check with the Numerous TCP and UDP ports article.

29. What’s the port variety of FTP (information) and FTP?

The Port variety of FTP (information) is 20 and the Port variety of FTP is 21. 

For extra particulars please check with the File Switch Protocol (FTP) article.

30.  Which layer gives the logical addressing that routers will use for path willpower?

The Community layer gives logical addressing, usually IP addressing and routing.

For extra particulars please check with the Community Layer Companies- Packetizing, Routing, and Forwarding article.

31. DNS makes use of which protocol? Why?

The Area Identify System (DNS) makes use of Transmission Management Protocol (TCP) for zone transfers and Person Datagram Protocol (UDP) for title queries.UDP exchanges fewer information than TCP.

For extra particulars please check with the  Why does DNS use UDP and never TCP article.

32. Differentiate between forwarding lookup and reverse lookup in DNS?

Ahead DNS and reverse DNS lookups are two totally different strategies of accessing the Web. The ahead space is the DNS zone the place the hostname is saved within the IP handle relationship. Reverse DNS is the question technique for figuring out the area title related to an IP handle.

For extra particulars please check with the Find out how to Implement Reverse DNS Look Up Cache? article.

33. What’s Cut up Horizon Cisco?

A cut up horizon is developed to cease routing loops. Routing loops occur when a loop is created between two or extra routers. For instance, Router 1 has a community path to 192.168.1.0 by way of Router 2. Router 2 has a path to the identical community, however it’s again by way of Router 1. Due to this fact, Router 1 sends packets for 192.168.1.0 to Router 2, which then transmits the packets again to Router 1. This looping continues till the TTL (Time to Reside) on the packet expires.

For extra particulars please check with the  Route Poisoning and Depend to infinity drawback within the Routing article.

34. Why is RIP generally known as Distance Vector?

The Routing Data Protocol (RIP) is the oldest distance-vector routing protocol that makes use of the hop rely as a routing metric. RIP stops routing loops by executing a restrict on the variety of hops approved in a path from supply to vacation spot. The biggest variety of hops allowed for RIP is 15, which limits the scale of networks that RIP can assist. RIP executes the cut up horizon, route poisoning, and hold-down means to forestall the flawed routing data from being propagated. In RIPv1 routers broadcast updates with their routing desk each 30 seconds. Within the early deployments, routing tables had been brief sufficient that the site visitors was not necessary. As networks grew in dimension, nonetheless, it grew to become apparent there might be an enormous site visitors burst each 30 seconds, even when the routers had been initialized at random occasions. 

For extra particulars please check with the Routing Data Protocol (RIP) article.

35. What’s the administrative distance of RIP?

By default, OSPF has a default administration degree of 110 and RIP has a default administration degree of 120.

For extra particulars please check with the Routing Data Protocol (RIP) article.

36. What’s the restrict of hop rely in RIP?

The restrict of hop rely in RIP is 15. Networks with a hop rely of 16 or extra are unreachable.

For extra particulars please check with the Routing Data Protocol (RIP) article.

37. How is RIP choose the most effective path to the distant community?

The principle perform of the router is to find out one of the simplest ways to ship the packets. To find out the most effective route, a router searches its router desk to discover a community handle just like the vacation spot IP handle of the bundle.

For extra particulars please check with the Routing Data Protocol (RIP) article.

38. What are the variations between RIPv1 and RIPv2?

RIPv1 makes use of a regular route. Occasional updates would not have subnet data and no assist for VLSM. This limitation makes it unattainable to have subnets of various sizes throughout the identical community class. In different phrases, all subnets within the community class ought to be the identical dimension. There may be additionally no router authentication assist, which makes RIP susceptible to varied assaults. RIPv2 is a vector distance route protocol outlined in RFC 1723. As a phaseless protocol, it means, it included a subnet masks and community addresses in its router updates.

For extra particulars please check with the Variations between RIPv1 and RIPv2 article.

39. What’s pinhole congestion?

In pc networking, the router makes selections concerning the way in which a packet will journey, primarily based on the variety of hops it carries to succeed in the vacation spot and if it had 2 different methods to get there, it is going to solely ship it by way of the shortest path, whatever the connection velocity. This is called pinhole congestion.

For extra particulars please check with the Congestion Management in Laptop Networks article.

40. What’s a passive interface in RIP?

Router (config-router) # passive-interface serial0 / 0/0. Units the interface as idle, which means that route updates won’t be despatched to this interface. NOTE: In RIP, the passive-interface command will forestall the inter-face from sending route updates however will enable the visible interface to obtain updates.

For extra particulars please check with the Passive-Interface Command Habits in RIP, EIGRP & OSPF article.

41. Clarify the loop avoidance mechanism in RIP.

The next strategies are used to keep away from Routing Loops in RIP:

  • The utmost hop rely mechanism can be utilized to dam Routing Loops. Vector distance protocols use the TTL (Lifetime) worth within the IP information header to keep away from loops.
  • Cut up horizontal is the setting of the route that stops the route from being marketed again to the place it got here from.
  • Route Poisoning is one other solution to keep away from loops. If the router finds that one in every of its related routes has failed, the router will likely be poisonous to the route by offering infinite metrics to it.

For extra particulars please check with the  Routing Loop and Find out how to Keep away from Routing Loop article.

42. Why EIGRP known as hybrid protocol?

EIGRP doesn’t switch all information to the Routing desk when modifications are made, however will solely switch modifications made for the reason that Routing desk was final up to date. EIGRP doesn’t ship its routing desk periodically, however will solely ship routing information within the occasion of an actual change. This habits is extremely compliant with link-state routing laws, so EIGRP is taken into account a hybrid protocol.

For extra particulars please check with the EIGRP fundamentals article.

43.  What is supposed by energetic and passive states in EIGRP?

  • Energetic State: Routes the place a follower route fails and no follower routes are prone to transfer to a useful state forcing EIGRP to submit question packages and reconnect. 
  • Passive State: The route is in a passive state the place the route has a path to comply with, and no failures have occurred thus far.

For extra particulars please check with the EIGRP fundamentals article.

44. What does stuck-in-active imply?

EIGRP is a dependable protocol and for every query the route you ship to its neighbors it’s essential to get a response inside 3 minutes. If the router doesn’t get a solution to ALL its pending questions it is going to set the stage for SIA (STUCK INACTIVE) and kill the closest neighbor.

45.  What’s the EIGRP Feasibility Situation?

The Feasibility situation states that the route won’t be accepted if the Reported Vary exceeds the absolute best Route vary. Or it means one other manner from a router’s viewpoint: the trail to the community won’t be accepted if my neighbor’s value exceeds my value. 

For extra particulars please check with the EIGRP Price Calculation article.

46. Clarify what’s going to occur if the packet will not be acknowledged?

If a packet will not be acknowledged by the community, it implies that the info was efficiently delivered to its vacation spot however no response was obtained from both finish. So long as each ends are conscious of one another and have been configured appropriately, there ought to be no motive for the receiving node to do something additional with this packet. Knowledge should still be flowing by way of this connection as a result of acknowledgments take the time or as a result of some intermediate nodes may be buffering packets earlier than forwarding them on. Nevertheless, if at any cut-off date you discover your site visitors slowing down noticeably or turning into fully unavailable attributable to an extreme variety of misplaced packets (particularly throughout high-traffic occasions), then it’s possible that one thing has gone flawed and also you’ll want to analyze what triggered it.

For extra particulars please check with the Cease and Anticipate protocol, and its issues, and options article.

47. Clarify Null Zero in EIGRP?

It’s a visible interface used to make sure that routes enter the RIB, the tracks should have the next-hop to get into the RIB. If a packet arrives on a tool with a path to Null 0 and isn’t elsewhere, it is going to eliminate it because the ACL would. Consider it as a visual interplay when the packets die properly.

For extra particulars please check with the article EIGRP fundamentals 

48.  What’s the EIGRP stub routing characteristic?

The EIGRP stub routing characteristic permits the community administrator to forestall queries from being despatched to a distant system. Along with a easy hub and spoke community, the place the distant system is related to a single distribution system, the distant system can have a twin residence on two or extra distribution units.

49. Distinction between LSA & LSU in OSPF?

Hyperlink State Replace (LSU) packs are OSPF Kind 4. packs. Every LSA accommodates route, metrics, and topology data to outline a part of the OSPF community. The native router advertises the LSA contained in the LSU bundle to its neighbors.

50.  What’s Route Redistribution in pc networks?

The usage of a routing protocol to broadcast routes which might be identified by another means, resembling by one other routing protocol, static routes, or straight related routes, known as redistribution. Whereas working a single routing protocol all through your entire IP internetwork is fascinating, multi-protocol routing is frequent for plenty of causes, resembling enterprise unions, a number of departments managed by a number of community directors, and multi-vendor environments. Operating different routing protocols is often a part of a community design. In any case, having a a number of protocol atmosphere makes redistribution a necessity.

RELATED ARTICLES

LEAVE A REPLY

Please enter your comment!
Please enter your name here

- Advertisment -
Google search engine

Most Popular

Recent Comments