Anda di halaman 1dari 23

Completing CCNP was a big task. What's next ?

Of course a profile change is needed


to justify what has been studied in last few months.

I have gone to different websites and collected several questions which I will try to
answer shortly.

I will separate the questions into two types.

1 ) Competency based question (non-technical question)

Example:-

-How do you cope under stress?


-How long have you worked without sleep?
-What value can you add to our organization?
-How do you determine what needs to be done compared to what the client wants
done?
-Describe whether you are a network admin or server admin?
-Are you currently or have you worked as a member of a team? If yes, name some of
the challenges and how you handled them.
-Are you currently or have you worked as a member of a team? If yes, name some of
the challenges and how you handled them.
-Do you prefer routing or switching?
-What are your strengths and weaknesses?
-How do you troubleshoot network slowness issues?

2 ) Technical questions

I will focus on technical questions first which imperative for me at the moment.

1) What is TCP ?

TCP/IP is a set of data communications mechanisms, embodied in software, that let


you use the Internet and countless other private networks. Each mechanism—also
known as a protocol—is designed to perform a specific function. These protocols are
divided into two categories based on their function:
 One focuses on processing and handling data from applications and is known as
the Transmission Control Protocol (TCP) suite.
 The other is more network oriented and designed to accommodate the
transmission and receipt of application data across a network. This second suite is
called the Internet Protocol (IP) suite.

2) What is the difference between TCP and UDP ?

TCP is connection-oriented protocol where as UDP is connectionless protocol.

Data sent in an order with a sequence number however no order is maintained for
UDP.

When the low level parts of the TCP "stream" arrive in the wrong order, resend
requests have to be sent, and all the out of sequence parts have to be put back
together. No ordering of messages, no tracking connections,

3)What is the network , first and last usable address for 10.2.1.3/22?

Step 1 : /22 = 252


Step 2 : 256 -252 = 4

Step 3 :

Third octet

Network 0 4 8

Broadcast 3 7 11

Network 10.2.0.0/22
First 10.2.0.1/22
Last 10.2.3.254
Broadcast 10.2.3.255

4) What is the administrative distance of EIGRP, eBGP, iBGP?

90
20
200
Route Source Default
Distance
Values
Connected interface 0
Static route 1
Enhanced Interior Gateway Routing Protocol (EIGRP) summary 5
route
External Border Gateway Protocol (BGP) 20
Internal EIGRP 90
IGRP 100
OSPF 110
Intermediate System-to-Intermediate System (IS-IS) 115
Routing Information Protocol (RIP) 120
Exterior Gateway Protocol (EGP) 140
On Demand Routing (ODR) 160
External EIGRP 170
Internal BGP 200
Unknown* 255

5) What is your favorite routing Protocol?

OSPF

6) In EIGRP, what is a Stuck in Active route?

When EIGRP returns a stuck in active (SIA) message, it means that it has not received
a reply to a query. EIGRP sends a query when a route is lost and another feasible
route does not exist in the topology table. The SIA is caused by two sequential events:

 The route reported by the SIA has gone away.


 An EIGRP neighbor (or neighbors) have not replied to the query for that route.

When the SIA occurs, the router clears the neighbor that did not reply to the query.
7) In OSPF, what is a totaly stubby area? What does Area Zero do?

A totally stubby area is similar to a stub area. However, this area does not allow summary routes
in addition to not having external routes, that is, inter-area (IA) routes are not summarized into
totally stubby areas. The only way for traffic to get routed outside of the area is a default route
which is the only Type-3 LSA advertised into the area. When there is only one route out of the
area, fewer routing decisions have to be made by the route processor, which lowers system
resource utilization.

An OSPF domain is divided into areas that are labeled with 32-bit area identifiers. The backbone
area is responsible for distributing routing information between nonbackbone areas.

All OSPF areas must connect to the backbone area.

The backbone area (also known as area 0 or area 0.0.0.0) forms the core of an OSPF network.
All other areas are connected to it, and inter-area routing happens via routers connected to the
backbone area and to their own associated areas

8) Which internal routing protocol would use if you needed to route between Cisco
and non-Cisco equipment?

OSPF

9) Explain what a 3-way handshake is in TCP?

This 3-way handshake process is also designed so that both ends can initiate and negotiate
separate TCP socket connections at the same time. TCP's three way handshaking technique is
often referred to as "SYN-SYN-ACK" (or more accurately SYN, SYN-ACK, ACK) because there
are three messages transmitted by TCP to negotiate and start a TCP session between
two computers.

Example :-

Host A sends a TCP SYNchronize packet to Host B

Host B receives A's SYN


Host B sends a SYNchronize-ACKnowledgement
Host A receives B's SYN-ACK
Host A sends ACKnowledge
Host B receives ACK.
TCP socket connection is ESTABLISHED

10)What is a VLAN trunking protocol?

VLAN Trunk Protocol (VTP) reduces administration in a switched network. When you
configure a new VLAN on one VTP server, the VLAN is distributed through all switches in the
domain.

VTP packets are sent in either Inter-Switch Link (ISL) frames or in IEEE 802.1Q (dot1q) frames.
These packets are sent to the destination MAC address 01-00-0C-CC-CC-CC with a logical link
control (LLC) code of Subnetwork Access Protocol (SNAP) (AAAA) and a type of 2003 (in the
SNAP header).

11 )What is the different between 802.1q and ISL?

ISL also encapsulates the entire frame, increasing the network overhead. Dot1q only places a
header on the frame, and in some circumstances, doesn't even do that. There is much less
overhead with dot1q as compared to ISL. That leads to the third major difference, the way the
protocols work with the native vlan.
The native vlan is simply the default vlan that switch ports are placed into if they are not
expressly placed into another vlan. On Cisco switches, the native vlan is vlan 1. (This can be
changed.)
If dot1q is running, frames that are going to be sent across the trunk line don't even have a header
placed on them; the remote switch will assume that any frame that has no header is destined for
the native vlan.
The problem with ISL is that it doesn't understand what a native vlan is. Every single frame will
be encapsulated, regardless of the vlan it's destined for.

12) Explain what is an Ether-Channel?

EtherChannel® technology builds upon standards-based 802.3 full-duplex Fast Ethernet to


provide network managers with a reliable, high-speed solution for the campus network
backbone. EtherChannel technology provides bandwidth scalability within the campus by
providing up to 800 Mbps, 8 Gbps, or 80 Gbps of aggregate bandwidth for a Fast EtherChannel,
Gigabit EtherChannel, or 10 Gigabit EtherChannel connection, respectively.

13) What do you need to do to setup a VTP domain?

A VTP domain (also called a VLAN management domain) consists of one switch or
several interconnected switches under the same administrative responsibility sharing
the same VTP domain name. By default, the switch is in VTP no-management-
domain state until it receives an advertisement for a domain over a trunk link
If the switch receives a VTP advertisement over a trunk link, it inherits the
management domain name and the VTP configuration revision number. The switch
then ignores advertisements with a different domain name or an earlier configuration
revision number.

14) What is Spanning Tree used for?

Spanning Tree is use to prevent loop in a redundant network. Spanning tree defines a
tree with a root switch and a loop-free path from the root to all switches in the Layer 2
network.
The spanning-tree algorithm calculates the best loop-free path throughout a switched
Layer 2 network. Switches send and receive spanning-tree frames, called bridge
protocol data units (BPDUs), at regular intervals.

15) What is a root bridge and why do you need one?

The Root bridge (switch) is a special bridge at the top of the Spanning Tree .The
Spanning tree defines a tree with a root switch and a loop-free path from the root to all
switches in the Layer 2 network. Spanning tree forces redundant data paths into a
standby (blocked) state. If a network segment in the spanning tree fails and a
redundant path exists, the spanning-tree algorithm recalculates the spanning-tree
topology and activates the standby path.

16) What is needed on a router interface to allow DHCP to function on a subnet?

A correct address for the interface. If the DHCP has a different mask it will need ip
helper command.

17) Describe what a stateful firewall is?

A stateful firewall keeps track of the state of network connections (such as TCP
streams or UDP communication) and is able to hold significant attributes of each
connection in memory. These attributes are collectively known as the state of the
connection, and may include such details as the IP addresses and ports involved in the
connection and the sequence numbers of the packets traversing the connection.
Stateful inspection monitors incoming and outgoing packets over time, as well as the
state of the connection, and stores the data in dynamic state tables

18) What is HSRP? Is this an open standard?

Short for Hot Standby Routing Protocol, a proprietary protocol from Cisco. HSRP is a
routing protocol that provides backup to a router in the event of failure. Using HSRP,
several routers are connected to the same segment of an Ethernet, FDDI or token-ring
network and work together to present the appearance of a single virtual router on the
LAN. The routers share the same IP and MAC addresses, therefore in the event of
failure of one router, the hosts on the LAN are able to continue forwarding packets to
a consistent IP and MAC address. The process of transferring the routing
responsibilities from one device to another is transparent to the user.

19) In a PIX/ASA, what are security levels used for?

20) What two things are needed in a PIX/ASA firewall to allow traffic to pass from a
higher security level to a lower security level?

21) In IPSec VPNs, what is diffehelman? What is it used for? In an IPSec tunnel,
what is main mode?

22) What is ARP?

The Address Resolution Protocol, or ARP, is a critical protocol in your network


infrastructure. What is ARP? It’s an Internet protocol used to map an IP address to a
MAC Address. Usually ARP just “works” and you don’t have to do anything about it.
However, there are reasons that you may need to make ARP or configure ARP on
your router.

23 )What is Proxy ARP?

Proxy ARP is the technique in which one host, usually a router, answers ARP requests
intended for another machine. By "faking" its identity, the router accepts
responsibility for routing packets to the "real" destination. Proxy ARP can help
machines on a subnet reach remote subnets without the need to configure routing or a
default gateway.

24) What is ICMP?

ICMP is the "Internet Control Message Protocol". ICMP packets are small packets
used in local networks and on the Internet, most typically, for network troubleshooting
and problem location. ICMP may be used for reporting the route packets are taking to
reach an arbitrary destination either locally or on the Internet or to determine if a
particular local or Internet connected device is reachable and/or responding.

25) What is difference between ARP and RARP?

The address resolution protocol is used to associate the 32 bit IP address with the 48
bit physical address, used by a host or a router to find the physical address of another
host on its network by sending a ARP query packet that includes the IP address of the
receiver.The reverse address resolution protocol allows a host to discover its Internet
address when it knows only its physical address.

26) What are the data units at different layers of the TCP / IP protocol suite?

The data unit created at the application layer is called a message, at the transport layer
the data unit created is called either a segment or an user datagram, at the network
layer the data unit created is called the datagram, at the data link layer the datagram is
encapsulated in to a frame and finally transmitted as signals along the transmission
media.

27) What is the range of addresses in the classes of internet addresses?

Class A 0 - 126 255.0.0.0 (127 is loopback)


Class B 128 - 191. 255.255.0.0
Class C 192 - 223. 255.255.255.0
Class D Multicast
Class E Reserved
28) Can diagram and explain the network you worked on ?

29) On a Cisco switch, when would you use a "ip default-gateway" command, and
when a default route ip route 0.0.0.0 0.0.0.0 x.x.x.x

The default gateway receives IP packets with unresolved destination IP addresses


from the switch. Once the default gateway is configured, the switch has connectivity
to the remote networks with which a host needs to communicate.

30) You create an SVI on 3560 switch, and its IP does not respond to ping. What
could be the problem?

- Vlan interface can be down (check if its administratively down).


- No device connected to the switch

31) On 3560 switch -What command would you use to view the mac table?

Show mac-address-table

32) On 6500 switch(IOS) - What command would you use to view the mac table?

Show mac-address-table

33) On 6500 switch(CATOS) - What command would you use to view the mac table?

34)On Foundry(FOS) - What command would you use to view the mac table?

35) What is the Native Vlan?

All the ports are in Native Vlan. Any data frame which does not get tagged with vlan
information will be sent using native Vlan.

36) 3750 Switch-stack: which switch's flash holds the image that will run in RAM
when the stack is powered-up?
37) What commands would you use to set up a trunk between 2 cisco switches

A switch stack is a set of up to nine Catalyst 3750 switches connected through their
StackWise ports.
One of the switches controls the operation of the stack and is called the stack master.
The stack master
and the other switches in the stack are stack members. The stack members use the
Cisco StackWise
technology to behave and work together as a unified system. Layer 2 and Layer 3
protocols present the
entire switch stack as a single entity to the network.

38) What commands would you use to set up a trunk between 1 cisco switch and 1
cisco router

On the switch
switch mode trunk
switch trunk encapsulation dot1q

On the router

encapsulation dot1Q 1 native

39) Difference between BPDUGUARD/BPDUFILTER.

The purpose of BPDU Filter is to prevent the switch from sending BPDU frames on
ports that are enabled with portfast.

The purpose of globally configured BPDU Guard is to disable (err-disable) all


portfast-enabled ports should they ever receive BPDU frames.

40) Explain how STP works

STP defines a tree with a root bridge and a loop-free path from the root to all network
devices in the Layer 2 network. STP forces redundant data paths into a standby
(blocked) state. If a network segment in the spanning tree fails and a redundant path
exists, the STP algorithm recalculates the spanning tree topology and activates the
standby path.
When two Layer 2 LAN ports on a network device are part of a loop, the STP port
priority and port path cost setting determine which port is put in the forwarding state
and which port is put in the blocking state. The STP port priority value represents the
location of a port in the network topology and how efficiently that location allows the
port to pass traffic. The STP port path cost value represents media speed.

41) What is spanning tree protocol and how does it work?

42) Difference between a trunk and an access layer switch port?

43) Two PCs attached to 2 different switches. The switches are connected to each
other but the PCs can't ping each other. Possible reasons? Steps to troubleshoot?

44) Link status is up, but line protocol is down - what's wrong?
45) You have a switch that won't power on. How do you get it replaced?
46) Describe how multiple VLANs can exist on a single switch link
47) Name a trunking protocol you have used and how it works

Routing

48) OSPF- configuration statement


49) HSRP - what is "interface tracking" used for ?
50) Which has a higher admin distance- EBGP(20) or EIGRP(90)
51) Which has a better admin distance- EBGP or EIGRP
52) BGP- When would you apply a Weight to a BGP neighbor?
53) BGP- When would you prepend an AS path?
54) BGP- If you prepend a prefix's AS Path, does the prefix look better or worse to
the world?
55) BGP- What command would you use to see your BGP neighbors?
56) BGP- Who controls routing with an AS?
57) EIGRP-Do Juniper routers run EIGRP?
58)EIGRP- What is the difference between the EIGRP topology table, and the routing
table
59) EIGRP- In a network with dual redundant paths, how could you use an offset list
60) What is the (TCP) 3-way handshake?
61) How do you set up an OSPF network?
62) You want to add an attached network into your OSPF configuration. What are the
command(s)?
63) What is redistribution in terms of routing protocols? What is mutual
redistribution?
64) What would be some problems with mutual redistribution?
65) The LEC can't loop the CSU or NIU on a T1 circuit. Should you get the Cisco
WIC replaced?

OSI Model

66) In OSI terms, briefly describe what happens when you enter "www.google.com"
in your
browser address bar, and hit enter
67) Name the 7 layers
68) What layer is TCP?
69) What layer does a proxy server operate at?
70) Describe the process by which one layer communicates with the next

71) Usable hosts in a /23?


72) How many bits for hosts are there in a /27?
73) What's the dotted decimal equivalent of a /28?

74) How do you look up a MX record?


75) What is a CNAME?
76) What is an A record?
77) How can you view routing information in a Unix server?
78) How can you configure a static route in a Unix server?
79) What is the command to list your current directory in Unix?
80) Give an example of a regular expression used with the "|" character, in Cisco, or
Unix
81) Trick question--If you change the "bandwidth" on a router interface, and the
interface utilization drops,
what could be an explanation?
82) Have you used Wireshark?
83 ) If I give you a Ethernet cable and pair of scissors can you make me a DS-1 loop
back plug ....?
84) Stateful firewall vs. access-lists vs. proxy server - how are they different?
85) How do you show the arp table on a linux box? On a windows box? On a Cisco
router?
86) Briefly explain the difference between static and dynamic NAT
87) Briefly explain the use of a virtual IP address in HSRP or VRRP
88) explain basic IP and Ethernet addressing

89) Tell me all of the OSPF LSA types that you're aware of

90) Which LSA types are flooded distance-vector style?


91) Can multiple prefixes exist in a single LSA?

92) Which LSA type(s) do not appear an NSSA area, and 93) which LSA type(s) only
appear in an NSSA area?

94) What address are LSA updates sent to?

88) explain basic IP and Ethernet addressing

89) Tell me all of the OSPF LSA types that you're aware of

90) Which LSA types are flooded distance-vector style?


91) Can multiple prefixes exist in a single LSA?

92) Which LSA type(s) do not appear an NSSA area, and 93) which LSA type(s) only
appear in an NSSA area?

94) What address are LSA updates sent to?

95) Why does OSPF require all traffic between non-backbone areas to pass through a
backbone area (area 0)?

96) Name the VTP Modes?


97) How can you configure a switch port to be a trunk?
98) What command do you use to allow Vlans on a trunk?
99) How can you assign a vlan to a switch port?
100)Can you explain PortFast on a switch?
101)What the steps that PortFast ignore?

102) Explain Etherchannel?


103) Can I bundle two different type of interface ex. a fastethernet with
gigabitethernet?
104) How can you configure Etherchannel?
105) Is Etherchannel a layer 2 or layer 3 technology?
106) Explain EIGRP?
107) Explain BGP?
108) If you have two ISP provider and you want to have a primary line and backup,
how can you control the flow from you side to the provider and coming back from the
provider?
109) What is the AD for EIGRP and BGP
110) What command you use to establish neighbor with a BGP peer?
111) What command to use to advertise neighbor on EIGRP?

112) Explain how trace route works?


113) What command to use to verify that BGP neighbor has been established?
114) What extra option do you have beside the basics when using ping?
115) Explain spanning tree?
116) How can you configure a switch to be a root-bridge?
117) What is the default priority on a switch?
118) What command to use to change the priority on a switch?

Some other questions to go through :-

OSPF

- Describe OSPF in your own words.

- OSPF areas, the purpose of having each of them


- Types of OSPF LSA, the purpose of each LSA type
- What exact LSA type you can see in different areas
- How OSPF establishes neighboor relation, what the stages are
- If OSPF router is stucked in each stage what the problem is and how to troubleshoot
it
- OSPF hierarchy in the single or multi areas. Cool - OSPF behavior in broadcast and
nonbroadcast
- Draw the diagram of typical OSPF network and explain generally how it works, DR,
BDR, election, ASBR, ABR, route redistribution and summarization
STP
- How it works and the purpose
- Diff types (SSTP, MSTP, RSTP) Cisco - PVST/PVST+
root election
- Diff. port stages and timing for convergence
- Draw the typical diagram and explain how diff types of STP work
- What ports are blocking or forwarding
- How it works if there are topology changes

- What are ACLs


Diff types
- Write an example if you want to allow and to deny…
- Well-known port numbers (DNS - 53 and etc…)
QOS
- What is that
- What is the diff b/w L2 and L3 QoS
How it works
Network:
- Draw the typical network diagram you have to deal with
- explain how it works
- What part of it you are responsible firewall, what is that, how it works, how it is diff
from ACLs
- What problems with the network you had had and how you solved it.
- What are the ways to troubleshoot the network, techniques, commands network
security, ways to achieve it
Switching:
- VLANs
STP
- How a L2 switch works with broadcast, unicast, multicast, known/unknown traffic
- VRRP, GLBP
- port monitoring and mirroring
- L3 switch, how it works PIM sparse and dense modes
- Windows admin interview questions

- Describe how the DHCP lease is obtained. It’s a four-step process consisting of (a)
IP request, (b) IP offer, © IP selection and (d) acknowledgement.

I can’t seem to access the Internet, don’t have any access to the corporate network and
on ipconfig my address is 169.254.*.*. What happened? The 169.254.*.* netmask is
assigned to Windows machines running 98/2000/XP if the DHCP server is not
available. The name for the technology is APIPA (Automatic Private Internet Protocol
Addressing).
We’ve installed a new Windows-based DHCP server, however, the users do not seem
to be getting DHCP leases off of it. The server must be authorized first with the
Active Directory.
How can you force the client to give up the dhcp lease if you have access to the client
PC? ipconfig /release
What authentication options do Windows 2000 Servers have for remote clients? PAP,
SPAP, CHAP,
MS-CHAP and EAP.

What are the networking protocol options for the Windows clients if for some reason
you do not want to use TCP/IP? NWLink (Novell), NetBEUI, AppleTalk (Apple).

What is data link layer in the OSI reference model responsible for? Data link layer is
located above the physical layer, but below the network layer. Taking raw data bits
and packaging them into frames. The network layer will be responsible for addressing
the frames, while the physical layer is reponsible for retrieving and sending raw data
bits.

What is binding order? The order by which the network protocols are used for client-
server communications. The most frequently used protocols should be at the top.

How do cryptography-based keys ensure the validity of data transferred across the
network? Each IP packet is assigned a checksum, so if the checksums do not match
on both receiving and transmitting ends, the data was modified or corrupted.

Should we deploy IPSEC-based security or certificate-based security? They are really


two different technologies. IPSec secures the TCP/IP communication and protects the
integrity of the packets. Certificate-based security ensures the validity of authenticated
clients and servers.

What is LMHOSTS file? It’s a file stored on a host machine that is used to resolve
NetBIOS to specific IP addresses.

What’s the difference between forward lookup and reverse lookup in DNS? Forward
lookup is name-to-address, the reverse lookup is address-to-name.

How can you recover a file encrypted using EFS? Use the domain recovery agent.

Network engineer/architect interview questions

Explain how traceroute, ping, and tcpdump work and what they are used for?

Describe a case where you have used these tools to troubleshoot.

What is the last major networking problem you troubleshot and solved on your own in
the last year?
What LAN analyzer tools are you familiar with and describe how you use them to
troubleshoot and on what media and network types.

Explain the contents of a routing table (default route, next hop, etc.)

What routing protocols have you configured?

Describe the commands to set up a route.

What routing problems have you troubleshot?

How do you display a routing table on a Cisco? On a host?

How do you use a routing table and for what?

What is a route flap?

What is a metric?

When do you use BGP, IGRP, OSPF, Static Routes?

What do you see as current networking security issues (e.g. NFS mounting, spoofing,
one time
passwords, etc.)?

Describe a routing filter and what it does.

Describe an access list and what it does.

What is a network management system?

Describe how SNMP works.

Describe the working environment you are currently in, e.g. frequent interruptions,
frequent priority shifting, team or individual.

What do you use to write documentation? Editor? Mail reader?

What platform (s) do you currently work on at your desk?

How do you manage multiple concurrent high level projects?


Describe a recent short term stressful situation and how you managed it.

How do you manage a long term demanding stressful work environment?

Have you worked in an assignment based environment, e.g. work request/trouble


ticket system, and if so, describe that environment.

Describe what network statistics or measurement tools you are familiar with and how
you have used them.

Describe what a VPN is and how it works.

Describe how VoIP works.

Describe methods of QoS.

How does ToS bit work?

You need to retrieve a file from the file server for your word processing application,
which layer of the OSI model is responsible for this function?

Presentation layer
Application layer
Session layer
Transport layer
Datalink layer

You are working in a word processing program, which is run from the file server.
Your data comes back to you in an unintelligible manner. Which layer of the OSI
model would you investigate?

Application layer
Presentation layer
Session layer
Network layer
Datalink layer

The IEEE subdivided the datalink layer to provide for environments that need
connectionless or connection-oriented services. What are the two layers called?
Physical
MAC
LLC
Session
IP

You are working with graphic translations. Which layer of the OSI model is
responsible for code formatting and conversion and graphic standards.

Network layer
Session layer
Transport layer
Presentation layer

Which is the best definition of encapsulation?


Each layer of the OSI model uses encryption to put the PDU from the upper layer into
its data field. It adds header and trailer information that is available to its counterpart
on the system that will receive it.
Data always needs to be tunneled to its destination so encapsulation must be used.
Each layer of the OSI model uses compression to put the PDU from the upper layer
into its data field. It adds header and trailer information that is available to its
counterpart on the system that will receive it.
Each layer of the OSI model uses encapsulation to put the PDU from the upper layer
into its data field. It adds header and trailer information that is available to its
counterpart on the system that will receive it.

Routers can be configured using several sources. Select which of the following
sources can be used.
Console Port
Virtual Terminals
TFTP Server
Floppy disk
Removable media

Which memory component on a Cisco router contains the dynamic system


configuration?
ROM
NVRAM
Flash
RAM/DRAM
Which combination of keys will allow you to view the previous commands that you
typed at the router?
ESC-P
Ctrl-P
Shift-P
Alt-P

Which commands will display the active configuration parameters?


show running-config
write term
show version
display term
You are configuring a router, which prompt tells you that you are in the privileged
EXEC mode?
@
>
!
:
#

What does the command “IP name-server 255.255.255.255″ accomplish?

It disables domain name lookup.


It sets the domain name lookup to be a local broadcast.
This is an illegal command.
The command is now defunct and has been replaced by “IP server-name ip any”
The following selections show the command prompt and the configuration of the IP
network mask.

Which two are correct?


Router(config-if)#netmask-format { bitcount | decimal | hexadecimal }
Router#term IP netmask-format { bitcount | decimal | hexadecimal }
Router(config-if)#IP netmask-format { bitcount | decimal | hexadecimal }
Router#ip netmask-format { bitcount | decimal | hexadecimal }

Which layer is responsible for flow control with sliding windows and reliability with
sequence numbers and acknowledgments?
Transport
Application
Internet
Network Interface
Which processes does TCP, but not UDP, use?
Windowing
Acknowledgements
Source Port
Destination Port

Select which protocols use distance vector routing?


OSPF
RIP
IGRP
PPP

Networking and Unix interview questions

What is UTP?

UTP — Unshielded twisted pair 10BASE-T is the preferred Ethernet medium of the
90s. It is based on a star topology and provides a number of advantages over coaxial
media:

It uses inexpensive, readily available copper phone wire. UTP wire is much easier to
install and debug than coax. UTP uses RG-45 connectors, which are cheap and
reliable.

What is a router? What is a gateway?

Routers are machines that direct a packet through the maze of networks that stand
between its source and destination. Normally a router is used for internal networks
while a gateway acts a door for the packet to reach the ‘outside’ of the internal
network

What is Semaphore? What is deadlock?

Semaphore is a synchronization tool to solve critical-section problem, can be used to


control access to the critical section for a process or thread. The main disadvantage
(same of mutual-exclusion) is require busy waiting. It will create problems in a
multiprogramming system, where a single CPU is shared among many processes.

Busy waiting wastes CPU cycles.


Deadlock is a situation when two or more processes are waiting indefinitely for an
event that can be caused by only one of the waiting processes. The implementation of
a semaphore with a waiting queue may result in this situation.

What is Virtual Memory?

Virtual memory is a technique that allows the execution of processes that may not be
completely in memory. A separation of user logical memory from physical memory
allows an extremely large virtual memory to be provided for programmers when only
a smaller physical memory is available. It is commonly implemented by demand
paging. A demand paging system is similar to a paging system with swapping.
Processes reside on secondary memory (which is usually a disk). When we want to
execute a process, we swap it into memory.

Explain the layered aspect of a UNIX system. What are the layers? What does it mean
to say they are layers?

A UNIX system has essentially three main layers:

. The hardware

. The operating system kernel

. The user-level programs

The kernel hides the system’s hardware underneath an abstract, high-level


programming interface. It is responsible for implementing many of the facilities that
users and user-level programs take for granted.

The kernel assembles all of the following UNIX concepts from lower-level hardware
features:

. Processes (time-sharing, protected address space)

. Signals and semaphores

. Virtual Memory (swapping, paging, and mapping)

. The filesystem (files, directories, namespace)

. Pipes and network connections (inter-process communication)

Anda mungkin juga menyukai