I have gone to different websites and collected several questions which I will try to
answer shortly.
Example:-
2 ) Technical questions
I will focus on technical questions first which imperative for me at the moment.
1) What is TCP ?
Data sent in an order with a sequence number however no order is maintained for
UDP.
When the low level parts of the TCP "stream" arrive in the wrong order, resend
requests have to be sent, and all the out of sequence parts have to be put back
together. No ordering of messages, no tracking connections,
3)What is the network , first and last usable address for 10.2.1.3/22?
Step 3 :
Third octet
Network 0 4 8
Broadcast 3 7 11
Network 10.2.0.0/22
First 10.2.0.1/22
Last 10.2.3.254
Broadcast 10.2.3.255
90
20
200
Route Source Default
Distance
Values
Connected interface 0
Static route 1
Enhanced Interior Gateway Routing Protocol (EIGRP) summary 5
route
External Border Gateway Protocol (BGP) 20
Internal EIGRP 90
IGRP 100
OSPF 110
Intermediate System-to-Intermediate System (IS-IS) 115
Routing Information Protocol (RIP) 120
Exterior Gateway Protocol (EGP) 140
On Demand Routing (ODR) 160
External EIGRP 170
Internal BGP 200
Unknown* 255
OSPF
When EIGRP returns a stuck in active (SIA) message, it means that it has not received
a reply to a query. EIGRP sends a query when a route is lost and another feasible
route does not exist in the topology table. The SIA is caused by two sequential events:
When the SIA occurs, the router clears the neighbor that did not reply to the query.
7) In OSPF, what is a totaly stubby area? What does Area Zero do?
A totally stubby area is similar to a stub area. However, this area does not allow summary routes
in addition to not having external routes, that is, inter-area (IA) routes are not summarized into
totally stubby areas. The only way for traffic to get routed outside of the area is a default route
which is the only Type-3 LSA advertised into the area. When there is only one route out of the
area, fewer routing decisions have to be made by the route processor, which lowers system
resource utilization.
An OSPF domain is divided into areas that are labeled with 32-bit area identifiers. The backbone
area is responsible for distributing routing information between nonbackbone areas.
The backbone area (also known as area 0 or area 0.0.0.0) forms the core of an OSPF network.
All other areas are connected to it, and inter-area routing happens via routers connected to the
backbone area and to their own associated areas
8) Which internal routing protocol would use if you needed to route between Cisco
and non-Cisco equipment?
OSPF
This 3-way handshake process is also designed so that both ends can initiate and negotiate
separate TCP socket connections at the same time. TCP's three way handshaking technique is
often referred to as "SYN-SYN-ACK" (or more accurately SYN, SYN-ACK, ACK) because there
are three messages transmitted by TCP to negotiate and start a TCP session between
two computers.
Example :-
VLAN Trunk Protocol (VTP) reduces administration in a switched network. When you
configure a new VLAN on one VTP server, the VLAN is distributed through all switches in the
domain.
VTP packets are sent in either Inter-Switch Link (ISL) frames or in IEEE 802.1Q (dot1q) frames.
These packets are sent to the destination MAC address 01-00-0C-CC-CC-CC with a logical link
control (LLC) code of Subnetwork Access Protocol (SNAP) (AAAA) and a type of 2003 (in the
SNAP header).
ISL also encapsulates the entire frame, increasing the network overhead. Dot1q only places a
header on the frame, and in some circumstances, doesn't even do that. There is much less
overhead with dot1q as compared to ISL. That leads to the third major difference, the way the
protocols work with the native vlan.
The native vlan is simply the default vlan that switch ports are placed into if they are not
expressly placed into another vlan. On Cisco switches, the native vlan is vlan 1. (This can be
changed.)
If dot1q is running, frames that are going to be sent across the trunk line don't even have a header
placed on them; the remote switch will assume that any frame that has no header is destined for
the native vlan.
The problem with ISL is that it doesn't understand what a native vlan is. Every single frame will
be encapsulated, regardless of the vlan it's destined for.
A VTP domain (also called a VLAN management domain) consists of one switch or
several interconnected switches under the same administrative responsibility sharing
the same VTP domain name. By default, the switch is in VTP no-management-
domain state until it receives an advertisement for a domain over a trunk link
If the switch receives a VTP advertisement over a trunk link, it inherits the
management domain name and the VTP configuration revision number. The switch
then ignores advertisements with a different domain name or an earlier configuration
revision number.
Spanning Tree is use to prevent loop in a redundant network. Spanning tree defines a
tree with a root switch and a loop-free path from the root to all switches in the Layer 2
network.
The spanning-tree algorithm calculates the best loop-free path throughout a switched
Layer 2 network. Switches send and receive spanning-tree frames, called bridge
protocol data units (BPDUs), at regular intervals.
The Root bridge (switch) is a special bridge at the top of the Spanning Tree .The
Spanning tree defines a tree with a root switch and a loop-free path from the root to all
switches in the Layer 2 network. Spanning tree forces redundant data paths into a
standby (blocked) state. If a network segment in the spanning tree fails and a
redundant path exists, the spanning-tree algorithm recalculates the spanning-tree
topology and activates the standby path.
A correct address for the interface. If the DHCP has a different mask it will need ip
helper command.
A stateful firewall keeps track of the state of network connections (such as TCP
streams or UDP communication) and is able to hold significant attributes of each
connection in memory. These attributes are collectively known as the state of the
connection, and may include such details as the IP addresses and ports involved in the
connection and the sequence numbers of the packets traversing the connection.
Stateful inspection monitors incoming and outgoing packets over time, as well as the
state of the connection, and stores the data in dynamic state tables
Short for Hot Standby Routing Protocol, a proprietary protocol from Cisco. HSRP is a
routing protocol that provides backup to a router in the event of failure. Using HSRP,
several routers are connected to the same segment of an Ethernet, FDDI or token-ring
network and work together to present the appearance of a single virtual router on the
LAN. The routers share the same IP and MAC addresses, therefore in the event of
failure of one router, the hosts on the LAN are able to continue forwarding packets to
a consistent IP and MAC address. The process of transferring the routing
responsibilities from one device to another is transparent to the user.
20) What two things are needed in a PIX/ASA firewall to allow traffic to pass from a
higher security level to a lower security level?
21) In IPSec VPNs, what is diffehelman? What is it used for? In an IPSec tunnel,
what is main mode?
Proxy ARP is the technique in which one host, usually a router, answers ARP requests
intended for another machine. By "faking" its identity, the router accepts
responsibility for routing packets to the "real" destination. Proxy ARP can help
machines on a subnet reach remote subnets without the need to configure routing or a
default gateway.
ICMP is the "Internet Control Message Protocol". ICMP packets are small packets
used in local networks and on the Internet, most typically, for network troubleshooting
and problem location. ICMP may be used for reporting the route packets are taking to
reach an arbitrary destination either locally or on the Internet or to determine if a
particular local or Internet connected device is reachable and/or responding.
The address resolution protocol is used to associate the 32 bit IP address with the 48
bit physical address, used by a host or a router to find the physical address of another
host on its network by sending a ARP query packet that includes the IP address of the
receiver.The reverse address resolution protocol allows a host to discover its Internet
address when it knows only its physical address.
26) What are the data units at different layers of the TCP / IP protocol suite?
The data unit created at the application layer is called a message, at the transport layer
the data unit created is called either a segment or an user datagram, at the network
layer the data unit created is called the datagram, at the data link layer the datagram is
encapsulated in to a frame and finally transmitted as signals along the transmission
media.
29) On a Cisco switch, when would you use a "ip default-gateway" command, and
when a default route ip route 0.0.0.0 0.0.0.0 x.x.x.x
30) You create an SVI on 3560 switch, and its IP does not respond to ping. What
could be the problem?
31) On 3560 switch -What command would you use to view the mac table?
Show mac-address-table
32) On 6500 switch(IOS) - What command would you use to view the mac table?
Show mac-address-table
33) On 6500 switch(CATOS) - What command would you use to view the mac table?
34)On Foundry(FOS) - What command would you use to view the mac table?
All the ports are in Native Vlan. Any data frame which does not get tagged with vlan
information will be sent using native Vlan.
36) 3750 Switch-stack: which switch's flash holds the image that will run in RAM
when the stack is powered-up?
37) What commands would you use to set up a trunk between 2 cisco switches
A switch stack is a set of up to nine Catalyst 3750 switches connected through their
StackWise ports.
One of the switches controls the operation of the stack and is called the stack master.
The stack master
and the other switches in the stack are stack members. The stack members use the
Cisco StackWise
technology to behave and work together as a unified system. Layer 2 and Layer 3
protocols present the
entire switch stack as a single entity to the network.
38) What commands would you use to set up a trunk between 1 cisco switch and 1
cisco router
On the switch
switch mode trunk
switch trunk encapsulation dot1q
On the router
The purpose of BPDU Filter is to prevent the switch from sending BPDU frames on
ports that are enabled with portfast.
STP defines a tree with a root bridge and a loop-free path from the root to all network
devices in the Layer 2 network. STP forces redundant data paths into a standby
(blocked) state. If a network segment in the spanning tree fails and a redundant path
exists, the STP algorithm recalculates the spanning tree topology and activates the
standby path.
When two Layer 2 LAN ports on a network device are part of a loop, the STP port
priority and port path cost setting determine which port is put in the forwarding state
and which port is put in the blocking state. The STP port priority value represents the
location of a port in the network topology and how efficiently that location allows the
port to pass traffic. The STP port path cost value represents media speed.
43) Two PCs attached to 2 different switches. The switches are connected to each
other but the PCs can't ping each other. Possible reasons? Steps to troubleshoot?
44) Link status is up, but line protocol is down - what's wrong?
45) You have a switch that won't power on. How do you get it replaced?
46) Describe how multiple VLANs can exist on a single switch link
47) Name a trunking protocol you have used and how it works
Routing
OSI Model
66) In OSI terms, briefly describe what happens when you enter "www.google.com"
in your
browser address bar, and hit enter
67) Name the 7 layers
68) What layer is TCP?
69) What layer does a proxy server operate at?
70) Describe the process by which one layer communicates with the next
89) Tell me all of the OSPF LSA types that you're aware of
92) Which LSA type(s) do not appear an NSSA area, and 93) which LSA type(s) only
appear in an NSSA area?
89) Tell me all of the OSPF LSA types that you're aware of
92) Which LSA type(s) do not appear an NSSA area, and 93) which LSA type(s) only
appear in an NSSA area?
95) Why does OSPF require all traffic between non-backbone areas to pass through a
backbone area (area 0)?
OSPF
- Describe how the DHCP lease is obtained. It’s a four-step process consisting of (a)
IP request, (b) IP offer, © IP selection and (d) acknowledgement.
I can’t seem to access the Internet, don’t have any access to the corporate network and
on ipconfig my address is 169.254.*.*. What happened? The 169.254.*.* netmask is
assigned to Windows machines running 98/2000/XP if the DHCP server is not
available. The name for the technology is APIPA (Automatic Private Internet Protocol
Addressing).
We’ve installed a new Windows-based DHCP server, however, the users do not seem
to be getting DHCP leases off of it. The server must be authorized first with the
Active Directory.
How can you force the client to give up the dhcp lease if you have access to the client
PC? ipconfig /release
What authentication options do Windows 2000 Servers have for remote clients? PAP,
SPAP, CHAP,
MS-CHAP and EAP.
What are the networking protocol options for the Windows clients if for some reason
you do not want to use TCP/IP? NWLink (Novell), NetBEUI, AppleTalk (Apple).
What is data link layer in the OSI reference model responsible for? Data link layer is
located above the physical layer, but below the network layer. Taking raw data bits
and packaging them into frames. The network layer will be responsible for addressing
the frames, while the physical layer is reponsible for retrieving and sending raw data
bits.
What is binding order? The order by which the network protocols are used for client-
server communications. The most frequently used protocols should be at the top.
How do cryptography-based keys ensure the validity of data transferred across the
network? Each IP packet is assigned a checksum, so if the checksums do not match
on both receiving and transmitting ends, the data was modified or corrupted.
What is LMHOSTS file? It’s a file stored on a host machine that is used to resolve
NetBIOS to specific IP addresses.
What’s the difference between forward lookup and reverse lookup in DNS? Forward
lookup is name-to-address, the reverse lookup is address-to-name.
How can you recover a file encrypted using EFS? Use the domain recovery agent.
Explain how traceroute, ping, and tcpdump work and what they are used for?
What is the last major networking problem you troubleshot and solved on your own in
the last year?
What LAN analyzer tools are you familiar with and describe how you use them to
troubleshoot and on what media and network types.
Explain the contents of a routing table (default route, next hop, etc.)
What is a metric?
What do you see as current networking security issues (e.g. NFS mounting, spoofing,
one time
passwords, etc.)?
Describe the working environment you are currently in, e.g. frequent interruptions,
frequent priority shifting, team or individual.
Describe what network statistics or measurement tools you are familiar with and how
you have used them.
You need to retrieve a file from the file server for your word processing application,
which layer of the OSI model is responsible for this function?
Presentation layer
Application layer
Session layer
Transport layer
Datalink layer
You are working in a word processing program, which is run from the file server.
Your data comes back to you in an unintelligible manner. Which layer of the OSI
model would you investigate?
Application layer
Presentation layer
Session layer
Network layer
Datalink layer
The IEEE subdivided the datalink layer to provide for environments that need
connectionless or connection-oriented services. What are the two layers called?
Physical
MAC
LLC
Session
IP
You are working with graphic translations. Which layer of the OSI model is
responsible for code formatting and conversion and graphic standards.
Network layer
Session layer
Transport layer
Presentation layer
Routers can be configured using several sources. Select which of the following
sources can be used.
Console Port
Virtual Terminals
TFTP Server
Floppy disk
Removable media
Which layer is responsible for flow control with sliding windows and reliability with
sequence numbers and acknowledgments?
Transport
Application
Internet
Network Interface
Which processes does TCP, but not UDP, use?
Windowing
Acknowledgements
Source Port
Destination Port
What is UTP?
UTP — Unshielded twisted pair 10BASE-T is the preferred Ethernet medium of the
90s. It is based on a star topology and provides a number of advantages over coaxial
media:
It uses inexpensive, readily available copper phone wire. UTP wire is much easier to
install and debug than coax. UTP uses RG-45 connectors, which are cheap and
reliable.
Routers are machines that direct a packet through the maze of networks that stand
between its source and destination. Normally a router is used for internal networks
while a gateway acts a door for the packet to reach the ‘outside’ of the internal
network
Virtual memory is a technique that allows the execution of processes that may not be
completely in memory. A separation of user logical memory from physical memory
allows an extremely large virtual memory to be provided for programmers when only
a smaller physical memory is available. It is commonly implemented by demand
paging. A demand paging system is similar to a paging system with swapping.
Processes reside on secondary memory (which is usually a disk). When we want to
execute a process, we swap it into memory.
Explain the layered aspect of a UNIX system. What are the layers? What does it mean
to say they are layers?
. The hardware
The kernel assembles all of the following UNIX concepts from lower-level hardware
features: