Thursday, 18 July 2013

RAID 0, RAID 1, RAID 5, RAID 10 Explanation

On most situations you will be using one of the following four levels of RAIDs.
  • RAID 0
  • RAID 1
  • RAID 5
  • RAID 10 (also known as RAID 1+0)
This article explains the main difference between these raid levels along with an easy to understand diagram.

In all the diagrams mentioned below:
  • A, B, C, D, E and F – represents blocks
  • p1, p2, and p3 – represents parity

RAID LEVEL 0


Following are the key points to remember for RAID level 0.
  • Minimum 2 disks.
  • Excellent performance ( as blocks are striped ).
  • No redundancy ( no mirror, no parity ).
  • Don’t use this for any critical system.

    RAID LEVEL 1

    Following are the key points to remember for RAID level 1.
  • Minimum 2 disks.
  • Good performance ( no striping. no parity ).
  • Excellent redundancy ( as blocks are mirrored ).

RAID LEVEL 5


Following are the key points to remember for RAID level 5.
  • Minimum 3 disks.
  • Good performance ( as blocks are striped ).
  • Good redundancy ( distributed parity ).
  • Best cost effective option providing both performance and redundancy. Use this for DB that is heavily read oriented. Write operations will be slow.
  • RAID LEVEL 10

Network Administrator Interview Questions with Answers!!!

1.What is a NIC?
Network Interface Card

2.What is a MAC Address?
MAC- Media Access Control .its a unique identifier defined for certain hardware/network adapters

3.When would you use a crosslink cable?
To link computers using this cable..You need to assign the static Ip if u need to

4.What are the main advantages and disadvantages of Fiber-Optic-based networks?
Adv:More efficient and quality of service is better.
Dis: Expensive, complicated

5.What is the difference between a Hub and a Switch?
Hub is device to connect two devices, switch is a network bridge which processes and routes data approirately over network layer of OSI Reference model

6.On which OSI layer can a router be found?
physical layer

7.What is CSMA/CD?
Carrier sense multiple access with collision detection

8.What is multicast?
to send data/info to group of computers using same network

9.What is Broadcast?
TO send data/info to all of the members of the network..( simple 176.16.255.255 for class B network)

10.What is the difference between TCP and UDP?
TCP-Transmission Control Protocol
UDP- user Datagram protocol

UDP is user assisted program and converts the application into the encapsulated form and makes it end point for data to send and then TCP helps in transmission or broadcast!


11.Describe some of the settings that are added by TCP and by UDP to the packet's header.

ans:Its called Encapsulation

12.What are TCP Ports? Name a few.
As described above End points are called Ports.
5/TCP,UDP   Remote Job Entry
7/TCP,UDP   Echo

13.What is a TCP Session?
the layer that establishes ,manages and terminates the session between two communticating devices

14.What three elements make up a socket?

Protocol (TCP, UDP or raw IP).
Local socket address (Local IP address and port number)
Remote socket address

15.What will happen if you leave the default gateway information empty while manually configuring TCP/IP?
i think it will automatically get it from DNS server

16.What will happen if you execute the following command: "arp –d *"?
- deletes all the ip address information

17.What is ICMP?
Internet Control Message Protocol

18.When would you use the ping command with the "-t" switch?
to get the ping back from other computer with no packet loss

19.What command-line tool would help you discover for which port numbers your computer is listening?
netstat -n  (on Dos prompt)

20.What is APIPA? How would you recognize it?
Automatic Private IP Addressing
for small network if u see something default automatic numeric values entered in a device that is attached you can see someone novice has done that using APIPA

21.What is a Cyclic Redundancy Check?
its a function that checks the input data value/length and than produces the output usualy of integral of 32 bits

22.What would you type in at a command prompt to view the IP settings for the computer that you are sitting at?
"ipconfig"


23.What command would you type in at a command prompt to view the IP address of the remote computer?
Ping
Netstat

24.What is the W Value for class B?

25.What is the Net ID of an IP Address of 18.9.25.3 with Subnet Mask of 255.0.0.0?
CLASS A network with NET ID 18.0.0.0

26.What is CIDR?
Classless Inter-Domain Routing

27.What is 255.255.255.255 used for?
Research

28.What is the maximum number of hosts for a Class B Network?
16384 (2(raise to power N)- 2)

29.What is the (default) class type of 195.152.12.1?
CLASS B with NET ID 195.152.0.0

30.What is the subnet mask for 10.0.10.1/17?
255.0.0.0

31.What is the result when changing from a subnet mask of 255.255.224.0 to a subnet mask of 255.255.240.0?
hmm..broadcast and binary address changes i guess

32.How can you access a shared folder from a remote computer? Name at least 3 methods.
-from ur pc my network place
- using a mapped drive
-Universal Naming Convention (UNC)

Tuesday, 14 May 2013

Networking Terms and Their Meaning

Domain Name System (DNS): DNS translates Internet addresses (such as www.dummies.com) to IP addresses (such as 208.215.179.146) so routers can find Web sites (among other things) on the Internet. Typically, your ISP will provide you a primary and secondary DNS server address. You configure DNS in your computer’s network settings (or set it up on your DHCP server to automatically configure your computers and other network devices with DNS information).
Dynamic Host Configuration Protocol (DHCP): DHCP automatically assigns IP addresses to the devices on your network. You pre-configure a range of allowable IP addresses on a DHCP server (such as a router or computer) that runs on your network.
Ethernet: Ethernet is a networking standard. Although there are other types of networks, Ethernet is by far the most common and is almost exclusively the only standard used in home networking. You will encounter this term frequently when shopping for various network hardware, such as routers, modems, and cables.
Internet Protocol (IP) Address: Every device (for example, computers, printers, routers, and gaming consoles) on a network must have a unique address. An IP address consists of four sets of numbers from 0 to 255, separated by a decimal (for example, 192.168.1.200).
Internet Service Provider (ISP): An ISP provides Internet service to individuals and businesses. Typical options for high-speed Internet access include DSL and cable.
Malware: Short for malicious software, malware is software code that is designed to damage files or entire computer systems, steal data, disrupt network, and do generally bad things to computers, networks, and people. Malware consists of viruses, worms, Trojans, spyware, adware, backdoors, rootkits, and bots.
Phishing: Phishing (pronounced like fishing) e-mails are a type of spam used by identity thieves to trick an individual into revealing private data, such as banking account information or passwords. Many phishing attempts appear to come from a legitimate sender such as your bank, and may even include authentic logos and links to the actual bank’s Web site (as well as other links that may install other malware or take you to a malicious Web site).
Rootkit: A rootkit (or backdoor) is a program that allows an attacker to covertly gain access to your computer in order to steal data, do damage, or control your computer.
Service Set Identifier (SSID): An SSID uniquely identifies your wireless network and is broadcast by your wireless access point.
Spyware: Spyware quietly collects information about users on your computer or network. Spyware can be used to monitor a computer user’s activities or even log keystrokes.
Trojan: A Trojan (or Trojan horse) is malware that masquerades as legitimate software. Once a Trojan has been installed on a computer, it can do extensive damage to a computer or network, including deleting files, stealing data, and installing other viruses.
Virtual Private Network (VPN): A VPN allows two networks to be connected securely over the Internet as if they were one network. For example, you might use a VPN to connect your home network to your corporate network (if your company permits you to connect to the office from home).
Wi-Fi Protected Access (WPA and WPA2): WPA and WPA2 are wireless security standards for protecting your wireless network and the data on your wireless network.
Worm: A worm is similar to a virus, but does not require a host program or file and can replicate and infect computers with human action. Worms typically take advantage of a known vulnerability or bug in a computer program or operating system.

Thursday, 11 April 2013

CCNA  interview questions part-2

51. Which addresses are INCORRECTLY paired with their class?
* 128 to 191, Class B
* 192 to 223 Class B
* 128 to 191, Class C
* 192 to 223, Class C
Correct answer: B & C
Address classes are: 1 to 126, Class A; 128 to 191, Class B, 192 to 223, Class C; 224 to 239, Class D; and
52. to 255, Class E. The first octet rule states that the class of an address can be determined by the numerical value of the first octet.

53. Which addresses are INCORRECTLY paired with their class?
* 1 to 126, Class A
* 128 to 191, Class A
* 1 to 126, Class B
* 128 to 191, Class B
Correct answer: B & C.
Address classes are: 1 to 126, Class A; 128 to 191, Class B, 192 to 223, Class C; 224 to 239, Class D; and
54. to 255, Class E. The first octet rule states that the class of an address can be determined by the numerical value of the first octet.
55. Which addresses are INCORRECTLY paired with their class?
* 240 – 255, Class D
* 240 – 255, Class E
* 224 – 239, Class D
* 224 – 239, Class E
Correct answer: A & D
Address classes are: 1 to 126, Class A; 128 to 191, Class B, 192 to 223, Class C; 224 to 239, Class D; and 240 to 255, Class E.
56. Which IP Address Class is INCORRECTLY paired with its range of network numbers?
* Class A addresses include 192.0.0.0 through 223.255.255.0
* Class A addresses include 1.0.0.0 through 126.0.0.0
* Class B addresses include 128.0.0.0 through 191.255.0.0
* Class C addresses include 192.0.0.0 through 223.255.255.0
* Class D addresses include 224.0.0.0 through 239.255.255.0
Correct answer: A
Class A addresses include 1.0.0.0 through 126.0.0.0
Class B addresses include 128.0.0.0 through 191.255.0.0
Class C addresses include 192.0.0.0 through 223.255.255.0
Class D addresses include 224.0.0.0 through 239.255.255.0
57. Which IP Address Class can have 16 million subnets but support 254 hosts?
* Class C
* Class A
* Class B
* Class D
Correct answer: A
Possible Subnets IP Address Class Possible Hosts
58. A 16M.
64K B 64K
16M C 254
59. Which IP Address Class can have 64,000 subnets with 64,000 hosts per subnet?
* Class B
* Class A
* Class C
* Class D
Correct answer: A
IP Address Class Possible Subnets Possible Hosts
60. A 16M
64K B 64K
16M C 254
61. There are two processes to pair MAC address with IP addresses. Which process finds an IP address from a MAC address?
* RARP
* ARP
* RIP
* IGRP
Correct answer: A
ARP (Address Resolution Protocol) maps an IP address to the MAC address, RARP (Reverse Address Resolution Protocol) maps the MAC address to the IP address. ARP and RARP work at the internet layer of the Internet Model or the network layer of the OSI model.
62. When the router runs out of buffer space, this is called ________.
* Source Quench
* Redirect
* Information Request
* Low Memory
Correct answer: A
Source quench is the process where the destination router, or end internetworking device will “quench” the date from the “source”, or the source router. This usually happens when the destination router runs out of buffer space to process packets.
63. Which protocol carries messages such as destination Unreachable, Time Exceeded, Parameter Problem, Source Quench, Redirect, Echo, Echo Reply, Timestamp, Information Request, Information Reply, Address Request, and Address Reply?
* ICMP
* UDP
* TCP
* TFTP
* FTP
Correct answer: A
ICMP (Internet Control Message Protocol) is a network layer internet protocol described in RFC # 792. ICMP reports IP packet information such as destination Unreachable, Time Exceeded, Parameter Problem, Source Quench, Redirect, Echo, Echo Reply, Timestamp, Information Request, Information Reply, Address Request, and Address Reply.
64. Two of the protocols that can be carried in the Protocol field of an IP packet are?
* TCP
* UDP
* FTP
* TFTP
Correct answer: A & B
The following are the fields in an IP segment,
their length, and their definitions:
VERS (Version number – 16 bits)
HLEN (Number of 32-bit words in the header – 4 bits)
Type of Server (How the datagram should be handled – 32 bits)
Total Length (Total length of header and data – 32 bits)
Identification (Provide fragmentation of datagrams to allow different MTUs in the internet – 4 bits)
Flags (Provide fragmentation of datagrams to allow different MTUs in the internet – 4 bits)
Frag Offset (Provide fragmentation of datagrams to allow different MTUs in the internet – 6 bits)
TTL (Time-To-Live – 6 bits)
Protocol (Upperlayer protocol sending the datagram – 16 bits)
Header Checksum )Integrity check on the header – 16 bits)
Source IP Address (32 bits)
Destination IP Address (32 bits)
IP Options (network testing, debugging, security and others – 4 bits)
Data (4 bits).
65. Where would network testing be included in an IP packet?
* IP Options field
* Identification field
* Type of Service field
* Reservation field
Correct answer: A
The following are the fields in an IP segment, their length, and their definitions:
VERS (Version number – 16 bits)
HLEN (Number of 32-bit words in the header – 4 bits)
Type of Server (How the datagram should be handled – 32 bits)
Total Length (Total length of header and data – 32 bits)
Identification (Provide fragmentation of datagrams to allow different MTUs in the internet – 4 bits)
Flags (Provide fragmentation of datagrams to allow different MTUs in the internet – 4 bits)
Frag Offset (Provide fragmentation of datagrams to allow different MTUs in the internet – 6 bits)
TTL (Time-To-Live – 6 bits)
Protocol (Upperlayer protocol sending the datagram – 16 bits)
Header Checksum )Integrity check on the header – 16 bits)
Source IP Address (32 bits)
Destination IP Address (32 bits)
IP Options (network testing, debugging, security and others – 4 bits)
Data (4 bits).
66. What field tells the Internet layer how to handle an IP packet?
* Type of Service
* Identification
* Flags
* Frag Offset
Correct answer: A
The following are the fields in an IP segment, their length, and their definitions:
VERS (Version number – 16 bits)
HLEN (Number of 32-bit words in the header – 4 bits)
Type of Server (How the datagram should be handled – 32 bits)
Total Length (Total length of header and data – 32 bits)
Identification (Provide fragmentation of datagrams to allow different MTUs in the internet – 4 bits)
Flags (Provide fragmentation of datagrams to allow different MTUs in the internet – 4 bits)
Frag Offset (Provide fragmentation of datagrams to allow different MTUs in the internet – 6 bits)
TTL (Time-To-Live – 6 bits)
Protocol (Upperlayer protocol sending the datagram – 16 bits)
Header Checksum )Integrity check on the header – 16 bits)
Source IP Address (32 bits)
Destination IP Address (32 bits)
IP Options (network testing, debugging, security and others – 4 bits) Data (4 bits).
67. Which fields of an IP packet provide for fragmentation of datagrams to allow differing MTUs in the internet?
* Identification
* Flags
* Frag Offset
* Type of Service
* Total Length
Correct answer: A, B & C
The following are the fields in an IP segment, their length, and their definitions:
VERS (Version number – 16 bits)
HLEN (Number of 32-bit words in the header – 4 bits)
Type of Server (How the datagram should be handled – 32 bits)
Total Length (Total length of header and data – 32 bits)
Identification (Provide fragmentation of datagrams to allow different MTUs in the internet – 4 bits)
Flags (Provide fragmentation of datagrams to allow different MTUs in the internet – 4 bits)
Frag Offset (Provide fragmentation of datagrams to allow different MTUs in the internet – 6 bits)
TTL (Time-To-Live – 6 bits)
Protocol (Upperlayer protocol sending the datagram – 16 bits)
Header Checksum )Integrity check on the header – 16 bits)
Source IP Address (32 bits)
Destination IP Address (32 bits)
IP Options (network testing, debugging, security and others – 4 bits)
Data (4 bits).
68. Which processes does TCP, but not UDP, use?
* Windowing
* Acknowledgements
* Source Port
* Destination Port
Correct answer: A & B
UDP (User Datagram Protocol) does not use sequence or acknowledgement fields in transmission.
UDP is a connectionless and unreliable protocol, since there is no delivery checking mechanism in the UDP data format.
69. What is the UDP datagram format?
* Source Port – 16 bits, Destination Port – 16 bits, Length – 16 Bits, Checksum – 16 bits, Data
* Destination Port – 16 bits, Source Port – 16 bits, Length – 16 Bits, Checksum – 16 bits, Data
* Source Port – 16 bits, Destination Port – 16 bits, Checksum – 16 Bits, Length – 16 bits, Data
* Source Port – 8 bits, Destination Port – 8 bits, Length -8 Bits, Checksum – 8 bits, Data
Correct answer: A
The UDP format for a segment is as follows:
Source Port 16 bits
Destination Port 16 bits
Length 16 bits
Checksum 16 bits
Data xx bits
70. What is the function of DDR on Cisco routers?
* DDR is dial–on-demand routing. It provides a continuous LAN only connection.
* DDR is dial-on-demand routing. It provides routing for high volume traffic.
* DDR is dial–on-demand routing. It provides a continuous WAN connection.
* DDR is dial-on-demand routing. It provides routing for low volume and periodic traffic.
Correct answer: D
DDR is dial-on-demand routing. It provides routing for low volume and periodic traffic. It initiates a call to a remote site when there is traffic to transmit.
71. What are the two types of access lists that can be configured on a Cisco router?
* Standard
* Extended
* Filtering
* Packet
Correct answer: A & B
The access lists are standard and extended. Standard access lists for IP check the source address of packets that could be routed. Extended access lists can check the source and destination packet plus check for specific protocols, port numbers, etc.
72. When using access lists, what does a Cisco router check first?
* To see if the packet is routable or bridgeable
* The destination address
* The source address
* The packet contents
Correct answer: A
The first thing checked is to see if the packet is routable or bridgeable. If it is not, the packet will be dropped.
73. How many access lists are allowed per interface?
* One per port, per protocol
* Two per port, per protocol
* Unlimited
* Router interface +1 per port.
Correct answer: A
Only one access list is allowed per interface. An access list must have conditions that test true for all packets that use the access list.
74. What do the following commands accomplish?
access-list 1 deny 172.16.4.0 0.0.0.255
access-list 1 permit any interface ethernet 0
IP access-group 1 out
* This will block traffic from subnet 172.16.4.0 and allow all other traffic.
* This will allow traffic from subnet 172.16.4.0 and block all other traffic.
* All traffic is allowed.
* All traffic is blocked.
Correct answer: A
This will block traffic from subnet 172.16.4.0 and allow all other traffic. The first statement “access-list 1 deny 172.16.4.0 0.0.0.255″ will deny access to the subnet 172.16.4.0.
75. What do the following statements in an extended access list accomplish?
access-list 101 deny TCP 172.16.4.0 0.0.0.255 172.16.3.0 0.0.0.255 eq 21
access-list 101 deny TCP 172.16.4.0 0.0.0.255 172.16.3.0 0.0.0.255 eq 20
access-list 101 permit TCP 172.16.4.0 0.0.0.255 0.0.0.0 255.255.255.255
* This will block ftp traffic.
* This will block http traffic.
* This will permit ftp traffic.
* This will permit tftp traffic.
Correct answer: A
This will block ftp traffic since ftp uses ports 20 and 21.
76. Access lists are numbered. Which of the following ranges could be used for an IP access list?
* 600 – 699
* 100 – 199
* 1 – 99
* 800 – 899
* 1000 – 1099
Correct answer: wer: B & C
AppleTalk access lists use numbers in the 600 – 699 range. IP uses 1 – 99 for standard access lists or 100-199 for extended access lists. IPX uses 800 – 899 or 900 – 999 for extended access lists. IPX SAP filters use 1000 – 1099.
77. Cisco routers use wildcard masking to identify how to check or ignore corresponding IP address bits. What does setting a wildcard mask bit to 0 cause the router to do?
* It tells the router to check the corresponding bit value.
* It tells the router to ignore the corresponding bit value.
* It tells the router to check its alternate routing list.
* It tells the router to use its primary routing list.
Correct answer: A
It tells the router to check the corresponding bit value.
78. You are a system administrator and you want to deny access to a group of computers with addresses 172.30.16.0 to 172.30.31.0. Which wildcard mask would you use?
* 0.0.15.255
* 0.0.255.255
* 0.0.31.255
* 0.0.127.255
* 0.0.255.255
Correct answer: A
0.0.15.255 will check the last 13 bits of an address so that computers 172.30.16.0 to 172.30.31.0 will be denied access. 0.0.31.255 would check the last 6 binary digits and deny access to addresses 172.30.32.0 to 172.30.63.0. 0.0.127.255 would check the last 7 binary digits and deny access to addresses 172.30.64.0 to 172.30.127.0. 0.0.255.255 would deny 172.30.0.0 to 172.30.254.0. If you write decimal 15 in binary, you have 0001111, the 1’s tell the router to ignore address with these bits set; 0’s tell the router to check the bits. The third octet for 172.30.16.0 is 00010000. The third octet for 172.30.31.0 would be 00011111. So, traffic from these addresses would be denied.
79. In order to limit the quantity of numbers that a system administrator has to enter, Cisco can use which abbreviation to indicate 0.0.0.0?
* host
* any
* all
* include
Correct answer: A
Cisco uses host to specify 0.0.0.0. This tells the router to check all. Cisco uses any to specify 255.255.255.255. This tells the router to ignore all and permit any address to use an access list test.
80. What do the following commands accomplish?
access-list 1 permit 172.16.0.0 0.0.255.255
interface ethernet 0
IP access-group 1 out
interface ethernet 1
IP access-group 1 out
* Only traffic from the source network 172.16.0.0 will be blocked.
* Only traffic from the source network 172.16.0.0 will be forwarded. Non-172.16.0.0 network traffic is blocked.
* Non-172.16.0.0 traffic will be forwarded.
* All traffic will be forwarded.
Correct answer: B
Only traffic from the source network 172.16.0.0 will be forwarded. Non-172.16.0.0 network traffic is blocked. The wildcard mask 0.0.255.255 tells the router to check the first 2 octets and to ignore the last 2 octets.
81. When using access lists, it is important where those access lists are placed. Which statement best describes access list placement?
* Put standard access lists as near the destination as possible. Put extended access lists as close to the source as possible.
* Put extended access lists as near the destination as possible. Put standard access lists as close to the source as possible.
* It isn’t import where access lists are placed since the router will read and cache the whole list.
* Put access lists as close to corporate headquarters as possible.
Correct answer: A
Put standard access lists as near the destination as possible. Put extended access lists as close to the source as possible. Standard access lists don’t specify the destination address.
82. As the system administrator, you enter the following commands at the command prompt:
ipx routing
access-list 800 permit 2b 4d
int e0
ipx network 4d
ipx access-group 800 out
int e1
ipx network 2b
int e2
ipx network 3c
What did these command accomplish?
* Traffic from network 4c destined for network 4d will be forwarded out Ethernet0.
* Traffic from network 3c destined for network 4d will be forwarded out Ethernet0.
* Traffic from network 2b destined for network 4d will be forwarded out Ethernet0.
* Traffic from network 4d destined for network 2d will be forwarded out Ethernet0.
Correct answer: C
Traffic from network 2b destined for network 4d will be forwarded out Ethernet0. The other interfaces E1 and E2 are not subject to the access list since they lack the access group statement to link them to access list 800.
83. The following commands were entered at the command prompt of a Cisco router. What do they accomplish?
access-list 1000 deny 9e.1234.5678.1212 4
access-list 1000 permit -1
interface ethernet 0
ipx network 9e
interface ethernet 1
ipx network 4a
interface serial 0
ipx network 1
ipx output-sap-filter 1000
* File server advertisements from server 9e.1234.5678.1212 will not be forwarded on interface S0.
* All other SAP services, other than file server, from any source will be forwarded on S0.
* All other SAP services, other than print server, from any source will be forwarded on S0.
* Print server advertisements from server 9e.1234.5678.1212 will not be forwarded on interface S0.
Correct answer: A & B
File server advertisements from server 9e.1234.5678.1212 will not be forwarded on interface S0. All other SAP services, other than file server, from any source will be forwarded on S0.
84. You receive “input filter list is 800 and output filter list is 801″ as part of the output from a show interfaces command. What kind of traffic are you filtering?
* IPX/SPX
* TCP/IP
* LocalTalk
* DDR
Correct answer: A
Because the access list is numbered in the 800 range, you are filtering IPX/SPX traffic.
85. Which service uses telephone control messages and signals between the transfer points along the way to the called destination?
* Signaling System 7 (SS7)
* Time-division Multiplexing (TDM)
* X.25
* Frame relay
Correct answer: A
Signaling System 7 (SS7) uses telephone control messages and signals between the transfer points along the way to the called destination. Time-division Multiplexing (TDM) has information from multiple sources and allocates bandwidth on a single media. Circuit switching uses signaling to determine the call route, which is a dedicated path between the sender and the receiver. Basic telephone service and Integrated Services Digital Network (ISDN) use TDM circuits. X.25 and Frame Relay services have information contained in packets or frames to share non-dedicated bandwidth. X.25 avoids delays for call setup. Frame Relay uses permanent virtual circuits (PVCs).
86. Which service takes information from multiple sources and allocates bandwidth on a single media?
* Time-division Multiplexing (TDM)
* Signaling System 7 (SS7)
* X.25
* Frame relay
Correct answer: A
87. Which three devices can be used to convert the user data from the DTE into a form acceptable to the WAN service’s facility?
* Modem
* CSU/DSU
* TA/NT1
* CO
* SS7
Correct answer: A, B & C
A modem, CSU/DSU (Channel Service Unit/Data Service Unit), or TA/NT1 (Terminal Adapter/Network Termination 1) can be used to convert the user data from the DTE into a form acceptable to the WAN service’s facility.
88. What is the juncture at which the CPE ends and the local loop portion of the service begins?
* Demarc
* CO
* Local loop
* Last-mile
Correct answer: A
The demarcation or demarc is the juncture at which the CPE ends and the local loop portion of the service begins. The CO (Central Office) is the nearest point of presence for the provider’s WAN service. The local loop or “last-mile” is the cabling that extends from the demarc into the WAN service provider’s central office.
89. You can access three forms of WAN services with Cisco routers. Select the three forms:
* Switched or relayed services
* Interface front end to IBM enterprise data center computers
* Using protocols that connect peer-to-peer devices like HDLC or PPP encapsulation.
* IPX/SPX
* NetBEUI
Correct answer: A, B & C
You can access three forms of WAN services with Cisco routers. Switched or relayed services include X.25, Frame Relay, and ISDN. An interface front end to IBM enterprise data center computers includes SDLC. And, you can access the services of WAN providers using protocols that connect peer devices such as HDLC and PPP encapsulation. IPX/SPX and NetBEUI are LAN protocols.
90. Select the fields for the Cisco HDLC protocol:
* Flag, Address, Control
* Flag, Address, Control, Protocol, LCP (Code, Identifier, Length, Data), FCS, Flag
* Flag, Address, Control, Data, FCS, Flag
* Flag, Address, Control, Proprietary, Data, FCS, Flag
Correct answer: D
The Cisco HDLC frame format is Flag, Address, Control Proprietary, Data, FCS, Flag. The PPP frame format is Flag, Address, Control, Protocol, LCP (Code, Identifier, Length, Data), FCS, Flag. The SDLC and LAPB format is Flag, Address, Control, Data, FCS, Flag.
85: Select the physical interfaces that PPP can be configured on a Cisco router:
* Asynchronous serial
* HSSI
* ISDN
* Synchronous serial
Correct answer: A, B, C & D
All four of them can carry PPP traffic. HSSI is High Speed Serial Interface.
91. Select the correct statements about PPP and SLIP for WAN communications?
* PPP uses its Network Control Programs (NCPs) component to encapsulate multiple protocols.
* PPP can only transport TCP/IP
* SLIP can only transport TCP/IP.
* SLIP uses its Network Control Programs (NCPs) component to encapsulate multiple protocols.
Correct answer: A & C
87a Which protocol for PPP LCP (Link Control Protocol) performs a challenge handshake?
* CHAP
* PAP
* UDP
* IPX
Correct answer: A
87b Which form of PPP error detection on Cisco routers monitors data dropped on a link?
* Quality
* Magic Number
* Error Monitor
* Droplink
Correct answer: A

The Quality protocol monitors data dropped on a link. Magic Number avoids frame looping.
92. Which protocol for PPP provides load balancing across multiple links?
* Multilink Protocol (MP)
* Quality
* Magic Number
* Stacker
* Predictor
Correct answer: A
93. As the system administrator, you type “ppp authentication chap pap secret”. Which authentication method is used first in setting up a session?
* secret
* PAP
* CHAP
* PPP/SLIP
Correct answer: C
94. Select the compression protocols for PPP?
* Stac
* Predictor
* Quality
* Magic Number
Correct answer: A & B
95. What are the three phases of PPP session establishment?
* Link establishment phase
* Authentication phase
* Network layer protocol phase
* Handshake phase
* Dial-in phase
Correct answer: A, B & C
96. What is the default IPX Ethernet encapsulation?
* SNAP
* Arpa
* 802.2
* Novell-Ether
* SAP
Correct answer: D
97. What must be true for two Routers running IGRP to communicate their routes?
* Same autonomous system number
* Connected using Ethernet only
* Use composite metric
D)Configured for PPP
Correct answer: A
98. The following is partial output from a routing table, identify the 2 numbers in the square brackets; ‘192.168.10.0 [100/1300] via 10.1.0.1, 00:00:23, Ethernet1′
* 100 = metric, 1300 = administrative distance
* 100 = administrative distance, 1300 = hop count
* 100 = administrative distance, 1300 = metric
* 100 = hop count, 1300 = metric
Correct answer: C
99. Identify 3 methods used to prevent routing loops?
* Split horizon
* Holddown timers
* Poison reverse
* SPF algorithm
* LSP’s
Correct answer: A B C
100. Which statement is true regarding full duplex?
* Allows for transmission and receiving of data simultaneously
* Only works in a multipoint configuration
* Does not affect the bandwidth
* Allows for transmission and receiving of data but not a the same time
Correct answer: A
Full duplex is just the opposite of half duplex. It handles traffic in both directions simultaneously.
CCNA INTERVIEW QUESTIONS and Answers

Q1. Which of the following is Class C IP address?
A. 10.10.14.118
B. 135.23.112.57
C. 191.200.199.199
D. 204.67.118.54
Correct Answer: D.
Explanation:
IP addresses are written using decimal numbers separated by decimal points. This is called dotted decimal notation of expressing IP addresses.
Q2. You have an IP of 156.233.42.56 with a subnet mask of 7 bits. How many hosts and subnets are possible?
A. 126 hosts and 510 subnets
B. 128 subnets and 512 hosts
C. 510 hosts and 126 subnets
D. 512 subnets and 128 hosts
Correct answer: C
Explanation:
Class B network has the form N.N.H.H, the default subnet mask is 16 bits long.
There is additional 7 bits to the default subnet mask. The total number of bits in subnet are 16+7 = 23.
This leaves us with 32-23 =9 bits for assigning to hosts.
7 bits of subnet mask corresponds to (2^7-2)=128-2 = 126 subnets.
9 bits belonging to host addresses correspond to (2^9-2)=512-2 = 510 hosts.

Q3. Two sub layers of OSI Data Link layer are which of the following? [Select 2].
A. Logical Link Control
B. Data Link Control
C. Media Access Control
D. Physical Layer Control
Correct answer: A,C
Q4. Match the following:
A. Repeaters 1. Data Link Layer
B. Bridges 2. Network Layer
C. Routers 3. Physical Layer
Select the best combination:
A. A —>2, B—>3, C—>1
B. A—>3, B—->1, C—->2
C. A—>3,B—–>2, C—->1
D. A—->1, B—->2, C—->3
Correct answer: B
Q5. Which of the following are session layer standards? [Select 2].
A. NFS
B. SQL
C. JPG
D. MIDI
Correct answer: A,B
Q6. Match the corresponding layers of ISO and DoD models?
DoD Model <———> ISO OSI Model
A. Process/Application 1. Application
B. Host-to-Host 2. Presentation
C. Internet 3. Session
D. Network Access 4. Transport
5. Network
6. Data Link
7. Physical
Choose best choice:
A. A->1+2; B->3+4; C->5; D->6+7
B. A->1+2+3; B->4; C->5; D->6+7
C. A->1+2+3; B->4; C->5+6; D->7
D. A->1+2+3; B->4+5; C->6; D->7
Correct answer: B
Q7. What is the command used to add a banner to a Cisco router configuration?
A. add banner
B. banner motd #
C. motd banner #
D. add banner #
Correct answer: B
Q8. What is the default administrative distance for RIP?
A. 100
B. 120
C. 0
D. 200
Correct answer: B
Q9. The Cisco Catalyst 1900 switches support which three LAN switch types? [Select 3].
A. Store-and-Forward
B. FragmentFree
C. InstaSwitch
D. FastForward
Correct answer: A,B,D
Q10. Which is true regarding VLANs?
A. VLAN technology uses VLAN switches (layer 2) which is a substitute for routing technology which uses routers.
B. A VLAN has same collision domain
C. A VLAN has same broadcast domain
D. VLANs are less secure with respect to simple switch or Hub networks.
Correct answer: C
Q11. Your internet work consists entirely of Cisco devices. You have given a command “show cdp neighbors”. In the response, you get “S” under the head “Capability”. What does the letter “S” mean?
A. It means “Source Route Bridge”
B. It means “Host”
C. It means “Switch”
D. It means “Static”
Correct answer: C
Q12. You want to verify the encapsulation type being used at Data Link layer for interface s0. Which command can you use?
A. Sh ip protocol
B. sh int s0
C. sh ip interface
D. sh processes
Correct answer: B
Q13. You want to run 802.2 frame type on your Ethernet interface. Which encapsulation type has to be chosen?
A. Ethernet_II
B. 802.2
C. SAP
D. SNAP
Answer is C
Q14. What does -1 signify in an extended IPX access list?
A. permit this host
B. deny this host
C. permit only this subnet
D. any host or any network
Correct answer: D
Q15. Which command sequence will allow only traffic from network 185.64.0.0 to enter interface s0?
A. access-list 25 permit 185.64.0.0 255.255.0.0
int s0 ; ip access-list 25 out
B. access-list 25 permit 185.64.0.0 255.255.0.0
int s0 ; ip access-group 25 out
C. access-list 25 permit 185.64.0.0 0.0.255.255
int s0 ; ip access-list 25 in
D. access-list 25 permit 185.64.0.0 0.0.255.255
int s0 ; ip access-group 25 in
Correct answer: D
Q16. Which of the following are reference points relevant to ISDN? [Select 2].
A. T
B. U
C. V
D. X
Correct answer: A,B
Q17. Which is true about VLAN Trunk Protocol? [Select 2].
A. VTP is statically configured and no built in intelligence is available.
B. VTP provides intelligence for configuring switches across the network.
C. VTP is not designed to distribute information across the switch fabric.
D. VTP is designed to distribute information across the switch fabric.
Correct answer: B, D
Q18. Which of the following is a term associated with WAN terminology / is a WAN device? [Select all that apply].
A. Demarc
B. DSU/CSU
C. Modem
D. CPE
Correct answer: A, B, C, D
Q19. Which of the following can be used to view the previous command you entered into a Cisco router? [Select 2].
A. CTRL+F1
B. The Down Arrow
C. The Up Arrow
D. CTRL + P
Correct answer: C, D
Q20. What is true about static VLANs? [Choose the best answer].
A. The VLAN is configured by a TFTP server.
B. It automatically notify a new network user.
C. The administrator assigns VLAN by port.
D. Static VLAN are more appropriate when the switch fabric becomes more complex.
Correct answer: C

Wednesday, 10 April 2013

DDR4 – Advantages of Migrating from DDR3

DDR4 is the next evolution in DRAM, bringing even higher performance and more robust control features while improving energy economy for enterprise, micro-server, tablet, and ultrathin client applications. The following table compares some of the key feature differences between DDR3 and DDR4.
Feature/Option DDR3 DDR4 DDR4 Advantage
Voltage (core and I/O) 1.5V 1.2V Reduces memory power demand
VREF inputs 2 – DQs and CMD/ADDR 1 – CMD/ADDR VREFDQ now internal
Low voltage standard Yes
(DDR3L at 1.35V)
Anticipated
(likely 1.05V)
Memory power reductions
Data rate (Mb/s) 800, 1066, 1333, 1600, 1866, 2133 1600, 1866, 2133, 2400, 2667, 3200 Migration to higher‐speed I/O
Densities 512Mb–8Gb 2Gb–16Gb Better enablement for large-capacity memory subsystems
Internal banks 8 16 More banks
Bank groups (BG) 0 4 Faster burst accesses
tCK – DLL enabled 300 MHz to 800 MHz 667 MHz to 1.6 GHz Higher data rates
tCK – DLL disabled 10 MHz to 125 MHz (optional) Undefined to 125 MHz DLL-off now fully supported
Read latency AL + CL AL + CL Expanded values
Write latency AL + CWL AL + CWL Expanded values
DQ driver (ALT) 40Ω 48Ω Optimized for PtP (point-to-point) applications
DQ bus SSTL15 POD12 Mitigate I/O noise and power
RTT values (in Ω) 120, 60, 40, 30, 20 240, 120, 80, 60, 48, 40, 34 Support higher data rates
RTT not allowed READ bursts Disables during READ bursts Ease-of-use
ODT modes Nominal, dynamic Nominal, dynamic, park Additional control mode; supports OTF value change
ODT control ODT signaling required ODT signaling not required Ease of ODT control, allows non-ODT routing on PtP applications
Multipurpose register (MPR) Four registers – 1 defined, 3 RFU Four registers – 3 defined, 1 RFU Provides additional specialty readout

Tuesday, 9 April 2013

IP address classes

 
Class 1st Octet Decimal Range 1st Octet High Order Bits Network/Host ID (N=Network, H=Host) Default Subnet Mask Number of Networks Hosts per Network (Usable Addresses)
A 1 – 126* 0 N.H.H.H 255.0.0.0 126 (27 – 2) 16,777,214 (224 – 2)
B 128 – 191 10 N.N.H.H 255.255.0.0 16,382 (214 – 2) 65,534 (216 – 2)
C 192 – 223 110 N.N.N.H 255.255.255.0 2,097,150 (221 – 2) 254 (28 – 2)
D 224 – 239 1110 Reserved for Multicasting
E 240 – 254 1111 Experimental; used for research
Note: Class A addresses 127.0.0.0 to 127.255.255.255 cannot be used and is reserved for loopback and diagnostic functions.

Private IP Addresses

Class Private Networks Subnet Mask Address Range
A 10.0.0.0 255.0.0.0 10.0.0.0 - 10.255.255.255
B 172.16.0.0 - 172.31.0.0 255.240.0.0 172.16.0.0 - 172.31.255.255
C 192.168.0.0 255.255.0.0 192.168.0.0 - 192.168.255.255