Anda di halaman 1dari 15

Back to Questions Page

4. What is a disadvantage to using bridges in your network? A. Filters by MAC address B. Stops broadcast storms C. Doesn't stop broadcast storms D. Can only use up to 4 bridges in any LAN

Question

Rank Answer Posted By

Question Submitted By :: Kapilasdhir I also faced this Question!! Answer


c.doesn't stop broadcast storm ALL Interview .com

Kushal Singh Bisht

Answer

Answer: C Even though the 5-4-3 rule specifies you can only have 4 bridges in a network, that is not really adisadvantage. The disadvantage to bridging is that it filters by MAC address and cannot create separate networks like a router can. This means that if a broadcast storm was to take place a bridge will forward the frames.

Kapilasdhir [Pioneer]

Question

3. What does a bridge use to segment a network? A. IP Addresses B. Broadcasts C. Application data D. Media Access Control addresses

Rank Answer Posted By

Question Submitted By :: Kapilasdhir I also faced this Question!! Answer


Answer:- C Application data ALL Interview .com

Bhisham

Answer

Answer: D Bridges can only read frames and filters

Kapilasdhir [Pioneer]

by MAC (hardware) address.

Question

2. What are the valid ways to segment a LAN? (Choose all that apply) A. Repeater B. Bridge C. Switch D. Router

Rank Answer Posted By

Question Submitted By :: Kapilasdhir I also faced this Question!! Answer


c.Switch ALL Interview .com

Hiresh

Answer

Answer: B, C, D Repeaters do not segment the network, but rather extend the distance a LAN can run

Kapilasdhir [Pioneer]

Question

1. What is an advantage to LAN segmentation? A. Provides multiprotocol support B. Decreases security C. Decreases broadcasts D. Increases broadcasts

Rank Answer Posted By

Question Submitted By :: Kapilasdhir I also faced this Question!! Answer


A ALL Interview .com

Shashi Sinha

Answer

Answer: C LAN segmentation decreases broadcast propagation to all segments.

Kapilasdhir [Pioneer]

Question what is 5-4-3 rule? Question Submitted By :: Kapilasdhir I also faced this Question!! Answer
5-4-3 rule means ring topology methods

Rank Answer Posted By


ALL Interview .com

Bhisham

Question what is unike ip address Question Submitted By :: Govind_chandrakar I also faced this Question!! Answer
It might be unique IP Address. Every IP Address should be unique in its network, whether it is Local or it is on Internet, we must have to provide an unique IP address to the system.

Rank Answer Posted By


ALL Interview .com

Chandresh_kumar

Question

How we ping ICMP a NIC with a correct IP address but with wrong MAC address Do all NIC's can run inpromiscuous mode

Rank Answer Posted By

Question Submitted By :: Asimaraeen This Interview Question Asked @ Cisco , Hcl I also faced this Question!! Answer
Thanks abdullah and prakash, plz read my question carefully ur answers are not relevant acco ALL Interview .com

Asim

Answer

In computing, promiscuous mode or promisc mode is a configuration of a network card that makes the card pass all traffic it receives to the central processing unit rather than just packets addressed to it a feature normally used for packet sniffing. Each packet includes the hardware (Media Access Control) address. When a network card receives a

Abdullah [Buraq It]

packet, it checks if the address is its own. If not, the card normally drops the packet. But in promiscuous mode, the card doesn't drop the packet, thus allowing the computer to read all packets.

Answer

In computing, promiscuous mode or promisc mode is a configuration of a network card that makes the card pass all traffic it receives to the central processing unit rather than just packets addressed to it a feature normally used for packet sniffing. Each packet includes the hardware (Media Access Control) address. When a network card receives a packet, it checks if the address is its own. If not, the card normally drops the packet. But in promiscuous mode, the card doesn't drop the packet, thus allowing the computer to read all packets.

Prakash Parmar [Buraq It]

How we put NIC in promiscuous mode when

Question using MS windows,

can any one tell me in detail

Rank Answer Posted By

Question Submitted By :: Asimaraeen This Interview Question Asked @ Cisco , Ibm I also faced this Question!! Answer
it is very lenthy to explan but i try to expian from ccontrol paneel activate network bridging after instalation of nic card vereyfi in cmd mode tyope show netsh bridge ALL Interview .com

Jitendera Sinha

if that succesfull then u have put the nic in premisious mode

how to troubleshoot when protocols is

Question down and link is not


getting up

Rank Answer Posted By

Question Submitted By :: Mohd Arshad Ayub This Interview Question Asked @ HCL , Sify I also faced this Question!! Answer
just write a command "sh ip protocol" if link is down check the ip address that u have put on serial interface or ethernet interface or chk the clock rate at the end of dce !!!!!thats it ALL Interview .com

Naveen Kumar Sharma

Answer

just write a command "sh ip protocol" if link is down check the ip address that u have put on serial interface or ethernet interface or chk the clock rate at the end of dce

Pitass

Answer

Chk modem connectivity frm service provider end to customer end. Chk same network ip address is configured serial interfaces.Also chk same encapsulation configured both routers.

Senthil. K Hcl

Answer

plz check encapsulation whether matching with remote device or not...and check the clock rate....

Punit Gaur

Answer

pls check following things 1- encapsulation mismatch 2- keepalive mismatch 3- clockrate mismatch

Yusuf Shaikh

why we give clock rate to DCE and not to

Question DTE

what is the difference in the two.

Rank Answer Posted By

Question Submitted By :: Amit I also faced this Question!! Answer


Because DTE basically contained the router serial interface and DCE contained the isp router end ,and two dte cannot communicate directly atleast one DCE would be there for communication,and dce provide clocking for synchronization,thats why we use back to back serial cable in industry its one end behave as DTE and its other end behave as DCE. ALL Interview .com

Naveen Kumar Sharma

Answer

Because all Cisco router are by default DTE and it is the receiver side(RECEIVING THE CLOCK PULSE FROM DCE) of serial cable,basically connected the router serial interface, and DCE basically connnected the isp router end ,it is sender side(sending the clock pulse to DTE) of serial cable and 2 DTE Cannot communicate directly atleast one DCE would be there for communication

Naveen Agrawal

what is the difference between a passive

Question and active hub??

which is better ??

Rank Answer Posted By

Question Submitted By :: Abouleila I also faced this Question!! Answer


Passive hub will not regenerate the signal but active hub will regenerate the signal ....... so active hub is better. ALL Interview .com

Sachin

Answer

active hub need electricity bt passive hub didnt active hub copy and regnerate signals but passive only copy signals

Amit

Answer

Passive Hubs These hubs are nothing more than point contacts for the wires that make up the physical network. An example of this would be a punchdown block that is a simple plastic, unpowered box used to plug network cables into it. Active Hubs Active hubs are a little smarter than the passive hubs we saw. All You might also come across the term "concentrators" which are basically active hubs, concentrating and strengthening a signal as it enters and exits the hub. It's also worth noting that today's active hubs are advertised as "hubs" or "repeaters". It is very rare you will see a hub with the word "active" on it! These hubs usually come in configurations of 4, 8, 16 and 24 ports, providing link & activity leds (lights) to show which devices are currently connected, powered on and transmitting or receiving data. Lastly, you might be interested knowing that all Ethernet

Jitendera Kuamr Sinha

hubs are active hubs. jitendera kumar sinha

Answer

Passive Hubs These hubs are nothing more than point contacts for the wires that make up the physical network. An example of this would be a punchdown block that is a simple plastic, unpowered box used to plug network cables into it. Active Hubs Active hubs are a little smarter than the passive hubs we saw. All You might also come across the term "concentrators" which are basically active hubs, concentrating and strengthening a signal as it enters and exits the hub. It's also worth noting that today's active hubs are advertised as "hubs" or "repeaters". It is very rare you will see a hub with the word "active" on it! These hubs usually come in configurations of 4, 8, 16 and 24 ports, providing link & activity leds (lights) to show which devices are currently connected, powered on and transmitting or receiving data. Lastly, you might be interested knowing that all Ethernet hubs are active hubs.

Ravinder Gujjar

Answer

active hub is more smarter than passive hub

Priyanka

Answer

a passive hub is just a connector. it connects the wires coming from different branches. an active hub is actually a multiport

Anshika

repeater. it is used to create connections between stations in a physical star topology.

Question extended access-list

What is difference between standard and

Rank Answer Posted By

Question Submitted By :: Tarun Jhamb This Interview Question Asked @ HCL , Vipro, Lab Exam I also faced this Question!! Answer
standard IP access list provides basic packet filtering abilities, based on the source IP address of a packet only. As a general rule, apply standard IP access lists close to the destination network to which you wish to permit or deny access.Standard IP access lists fall into the numerical range 1-99 Unlike standard IP access lists (which only allow you to filter packets based on their source IP address), extended IP access lists allow a much more granular level of control. Extended IP access lists allow filtering not only on source addresses, but also on destination addresses, protocols, and even applications, based on their port number. For example, you might choose to permit or deny a group of hosts from accessing a particular server, limit access to a telnet server to only a single host, or similar.Extended IP access lists are identified through their use of the 100-199 numerical range. ALL Interview .com

Gaurav Kumar Sharma

Answer

In standard access-list the range area is 0-99 but in case of extended access-list the range area is 100-199 and in standard access-list we cannot create permission on

Sachin

specific protocol like bloking the telnet or ftp......we can do that in extended access-list.

Answer

In standard access-list we can filter the packet after routing.and it will applied on destination router.its depend only on source ip address. but in case of extended access list we can filter the packet before routing,and it will applied on source router,its depend on source ip,destination ip,port and protocol.

Naveen Kumar Sharma

Answer

standard access list has range area of 099 extended has 100-199.

Harsh Singh

Answer

Standard access list basically used to filter packets by IP address & is basically close to the destination router.(1-99) Extended access list is used to filter packets based on address ,protocol & port no. dedicated for particular services.(100-199)

Manoranjan

Answer

When you enable standard access-list it will block entire thing but extended access-list can block every port like ftp,telnet etc. Standard range is 1-99 and extended range is 100-199.

Nizam

Answer

Standared IP access list is based on IP address.Apply close to the destination that can only filter packet based on there source IP address.Numeric value from 1-99,1300-1399 Extended IP access list is based on Port address.Apply close to source that can filter not only source address but also destination address based on there port number.Numeric value from 100-199.Allow more grangular level of controle.

Awanish Kumar Sharma

Answer

Difference between Standard ACL & Extended ACL a) In Standard ACL, filtering is based on source IP address. where as in extended ACL, filtering is bases on Source IP address, Destination IP address, Protocol Type, Source Port Number & Destination Port Number. b) Standard ACL are used to block particular host or sub network. where as Extended ACL is used to block particular services. c)Standard ACL is implemented as possible closer to destination. where as Extended ACL is implemented as possible closer to source. d) Standard ACL is created from 1 - 99 & extended range 1300 - 1999. where as Extended ACL is created from 100 - 199 & extended range 2000 - 2699. e) In Standard ACL, two communication will be blocked, where as in Extended ACL, one way communication will be blocked. f) In Standard ACL, all services will be blocked. Where as in Extended ACL, particular services wil

Shahin

be blocked. Hope this much of difference will help u guys. Keep posting new question plzzzz....!!! Thanking you Shahin

Question configured

What is proxy-ARP and how it is used and

Rank Answer Posted By

Question Submitted By :: Tarun Jhamb I also faced this Question!! Answer


Proxy ARP (RFC 1027) is a way to make a machine physically located on one network appear to be logically part of a different physical network connected to the same router/firewall. Typically it allows us to hide a machine with a public IP address on a private network behind a router, and still have the machine appear to be on the public network "in front of" the router. The router "proxys" ARP requests and all network traffic to and from the hidden machine to make this fiction possible. Consider a router with two interface cards, one connected to a public network PUBNET and one connected to a private network PRIVNET. We want to hide a server machine on the PRIVNET network but have it accessible from the PUBNET network. The IP address of the server machine lies in the PUBNET network, even though we are placing the machine on the PRIVNET network behind the router. By enabling proxy ARP on the router, any machine on the PUBNET network that issues an ARP "who has" request for the server's MAC address will get a proxy ARP reply from the router containing the router's MAC ALL Interview .com

Jerald

address. This tells machines on the PUBNET network that they should be sending packets destined for the server via the router. The router forwards the packets from the machines on the PUBNET network to the server on the PRIVNET network. Similarly, when the server on the PRIVNET network issues a "who has" request for any machines on the PUBNET network, the router provides its own MAC address via proxy ARP. This tells the server to send packets for machines on the PUBNET network via the router. The router forwards the packets from the server on the PRIVNET network to the machines on the PUBNET network. The proxy ARP provided by the router allows the server on the PRIVNETnetwork to appear to be on the PUBNET network. It lets the router pass ARP requests and other network packets in both directions between the server machine and the PUBNET network, making the server machine appear to be connected to the PUBNET network even though it is on the PRIVNET network hidden behind the router.

Question To which layer ICMP belongs Question Submitted By :: Vini This Interview Question Asked @ CMS I also faced this Question!! Answer
at layer 3 (network layer)

Rank Answer Posted By

ALL Interview .com

Sarfaraz

Answer

Network layer

Sachin

Answer

layer 3 network of osi

Kunal

Answer

Network Layer(3) is belong to icmp

Dinesh

Answer

icmp internet control message protocol it works on network layer

Amit

Answer

icmp work with internet protocol (ip) at layer 3 of osi model and inernet layer of tcp model..

Topgun

Answer

network

Guest

Question facilities

How ICMP is used in ping and traceroute

Rank Answer Posted By

Question Submitted By :: Vini I also faced this Question!! Answer


Internet Control Message Protocol (ICMP) pings and traceroute on the PIX Firewall are handled differently based on the version of PIX and ASA code. Inbound ICMP through the PIX/ASA is denied by default. Outbound ICMP is permitted, but the incoming reply is denied by default. ** ASA/PIX does not support ICMP redirects, because it does not support asymmetric routing ALL Interview .com

Partha

Answer

it is used in finding out the error message like if data gram is not reaching to the destination.It is reliable protocol as compared to Internet protocol.

Sachin

Answer

ICMP works on echo-request n echo-reply in network communications devices echorequest/reply's open open in network security devices echorequest/reply is close as inbound traffic is restricted by default. so by this process of echo-request n echo-reply the PING and traceroute works and gives the information that the channel is established.

Hasan

Anda mungkin juga menyukai