Chapter 12

Frequently Asked Interview
Questions and Answers
What is Routing?
Through routing, you can identify the path in which any information can be passed between the source and destination systems. The path is usually provided through a network layer that is created by the router.
What Purpose Does the Data Link serve?
There are two functions that the data link layer performs:
-           Framing
-           Verifying that the messages from the source reach the right device
What is the Difference between Physical Topology and Logical Topology?
The physical topology will provide the actual layout of the medium in the network while the logical topology refers to the path that the signal takes through the physical topology.
Why is it Important to Use a Switch?
When information is passed from a source to a destination, you need to use a switch to create a frame. The switch will receive signals, and it will use that signal to create a frame. When it does this, the switch can easily read the destination system's address and access that address. The switch can then send the frame to the correct port in the network to pass on the information. Every organization uses this method since this is the most effective way to transmit data. The switch will never broadcast the information sent to every other port in the network.
In What Situation Does Network Congestion Occur?
If numerous users are trying to access one network using the same bandwidth, there will be some congestion in the network. For example, if you want to log onto a website on Black Friday to access the sales, you may find it difficult to find your product because the server of the store is down, considering there is too much traffic on that network. This situation, however, only occurs where there is no segmentation in a large network.
Define the Term 'Window' in Terms of Networking
The source and destination can only share a set of segments, called the window, on any network. Once the segments are shared between the source and the destination, a notification must be sent to the source, confirming that the destination has indeed received the segments.
How Do Hold-downs Work?
A hold-down will ensure that an update message does not reinstate any downed link. It does this by removing that link from that message. A triggered update is used to reset the hold-down timer.
How is the Router Hold-down Timer Reset Due to a Triggered Update?
A triggered update can reset the router's hold-down timer if the timer has expired. This happens when the router receives a processing task that was proportional to the number of links present in the Internetwork.
Is a Network Divided into Smaller Sections Using a Bridge?
A bridge cannot be used to break the network into smaller segments, but it can be used to filter a large network. It does this without shrinking the network.
How Many Types of Memories are used in a Cisco Router?
Every Cisco router will use the following memories:
  1. The NVRAM is used to store the startup configuration file
  2. The DRAM stores the configuration file during the execution
  3. The Cisco IOS is stored in the flash memory during the execution process
How Does Cut-through LAN Switching Work?
In this type of switching, once a data frame is passed to a router, it is sent out immediately and forwarded to the next segment in the network. This is done once the destination address is read.
Which LAN Switching Method Does the Cisco Catalyst 5000 Use?
The Cisco Catalyst 5000 uses the store-and-forward method of switching. The data frame is only shared between the source and the destination once the switch checks the CRC and saves the frame within the buffer.
What is the Purpose of the LLC Sublayer?
Most application developers use the LLC or Logical Link Control sublayer to perform the following functions:
  1. Error correction
  2. Manage the flow of the network layer using the start and stop codes
What is the difference between IGRP and RIP?
RIP only looks at the hop count when it determines the route in which information should be passed through the network. IGRP not only looks at the hop count but also looks at the reliability, MTU, bandwidth, and other factors about the route before it selects the route to transmit the message.
What is BootP?
In most networks, there will be some diskless workstations. The Boot Program or BootP Protocol is used to start those workstations. Since there is no disk in the workstation, you cannot power it without a protocol or program. This workstation can also use the BootP program or protocol to identify its own and the server's IP Address.
What Does the Application Layer do in Networking?
The application layer is used to perform the following functions:
-           Helps to synchronize any application on both the server and the client sides
-           Supports the components that are directly associated with communication in an application
-          If any applications span beyond the OSI reference model specification, the application layer is used to provide network services for those applications
What is the difference between the User Mode and Privileged Mode?
The network will use the user mode to perform a task that is performed by the system regularly using a Cisco router. These tasks include simple functions like checking the router status, checking the route status, view system information, or connect to remote devices. In the privileged mode, more functions can be performed, including making changes to the router, debugging or troubleshooting, and including some tests to validate the routes in a network.
Define 100BaseFX
Ethernet with a data speed of 100 is termed as 100BaseFX.
What Is the Transmission Medium in An Ethernet?
The main transmission medium in an Ethernet is a fiber optic cable.
What is MTU?
The maximum transmission unit or MTU is the largest size of the packet of data that can be shared across the network. This means that the packet of data does not have to be broken down further before it is sent across the network.
How Does Cut-through LAN Switching Work?
If you configure the network to use this type of switch, the data that is sent to the router will be forwarded or immediately sent to the next part of the network. The next segment is identified only when the router reads the destination address.
What is the Difference between the Hub, Router, and Switch?
Routers are used to transmit the packets of data along with the different networks. A switch is a tool or device that helps to filter packets or datagrams between various LAN segments. A switch can have either a single broadcast domain or multiple collision domains. A switch is used to support packet protocols, and it works in the second and third data link layers. A hub has both multiple collision domains and a single domain. All the information that comes from one port will be sent out to another port.
Using a Cisco Router's Identifying Information, What Are the Things That You Can Access?
You can identify the interfaces and the hostname from the Cisco router's identifying information. The former is a fixed configuration that will refer to a router port while the latter will give you the name of the router.
Define Latency
When information or data is being sent from one device to another over a network, there is sometimes a delay. This delay or lapse is termed as latency.
What is the Number of Hops Used When the Network Uses RIP?
The network receives hops when information is being transferred. If the network receives more than fifteen hops, this will indicate that the route is out of service or unreachable. Therefore, the maximum number of hops that any network can receive is fifteen.
What are Packets?
A packet is a result of data encapsulation. The packets are data that have been encapsulated or wrapped between the different OSI layers under different protocols. They are also called datagrams.
Define Segments
A segment is a part of a data stream that moves from the top layers in OSI to the bottom layers, and towards the network. A segment is a logic unit that is found in the transport layer.
Define a Frame Relay
Frame relays are used to communicate between different frames while sending information. This is done by designing, creating, and maintaining a virtual circuit and using the WAN protocol. This protocol only operates at the Physical and Data Link layers and has a high-performance rating.
If you want to Route an IPX, How Do You Configure a Cisco Router?
If you want to enable IPX routing, you should use the command IPX routing. When you do this, you can ensure that every device and interface within that network will be configured. You can then make a change using the encapsulation method or network number.
List the Different IPX Access Lists
There are two types of access lists in Networking:
-           Standard
-           Extended
The standard access layer is only used to filter the IP address of either the source or the destination. The latter access list filters a network using the source and destination IP addresses, protocol, socket, and port.
What are the Benefits of VLANs?
VLANs will allow you to develop and create some collision domains using different groups on a network. You do not need to access the physical location of the router. You can use a VLAN to establish different networks. You can use different types of hardware, functions, protocols, and other means to establish the network. It is for this reason that most people choose to use VLANs to set up a network when compared to a LAN. In the latter, the collision domain is only connected to the physical location.
Define HDLC
High-Level Data Link Control or HDLC protocol is a Cisco protocol, and this is the default encapsulation that is operated in all Cisco routers.
Define Subnetting
Subnetting is a process of breaking a large network down into smaller networks. Since it is a part of the large network, every subnet will need to be assigned some identifiers or parameters that will indicate the subnet number.
List the Advantages of Using the Layered Model in the Networking Industry.
The advantages of the layered network are:
  1. The network industry is allowed to progress faster since specialization is encouraged.
  2. Administrators can always troubleshoot problems or issues in the network efficiently.
  3. An administrator can make changes only to one layer if necessary. He or she can also ensure that this change does not affect the other layers in the network.
Why do Administrators Prefer the TCP to UDP?
UDP is an unreliable and unsequenced protocol when compared to TCP. This protocol cannot establish a virtual circuit or even obtain any acknowledgment.
What Standards Does the Presentation Layer Support?
Multiple standards are used or included in the presentation layer. This will ensure that all the data in the layer is presented or broken down correctly. These standards include TIFF, JPEG, and PICT for graphics and MPEG, QuickTime, and MIDI for audio or video files.
How can you configure a Router Remotely?
You may need to configure a router remotely if you do not have physical access to that router. The best way to do this is to use the Cisco AutoInstall Procedure. In this process, the router will need to be connected to a WAN or LAN through the interfaces.
What Does the Show Protocol Display?
You will find the following in a show protocol:
-           The configured encapsulation method for every interface
-           The address that is assigned to every interface
-           The protocols that are routed on the configured router
How Can an IP Address be depicted?
An IP Address can be depicted in three ways:
-           using Hexadecimal (for example 82 1E 10 A1)
-           using Binary (for example 10000010.00111011.01110010.01110011)
-           using Dotted-decimal (for example: 192.168.0.1)
Is There a Way to Switch to Privileged Mode, and What Should You Do to Switch to the User Mode?
Enter the command enable if you want to access the privileged mode in any network. Make sure you know why you are doing it. If you want to switch back to the user mode, open the command prompt and enter "disable."
What are the Benefits of LAN Switching?
The benefits of LAN switching are:
-           LAN switching improves the media adaptation rate
-           It allows the transmission of the data through a full-duplex
-           It allows easy and efficient migration
How Can One Identify a Valid Host in any Subnet?
You can use the following equation to identify a valid host in the subnet: 256 – (subnet mask). You will find the valid host between that range.
What is Bandwidth?
The transmission capacity of every medium is called the bandwidth. This is used to measure the volume that any transmission channel can handle, and it is always measured in kilobytes per section.
Define DLCI
Data Link Control Identifiers or DLCI are assigned to identify every virtual circuit, and these identifiers are assigned to these circuits using a frame relay service provider. These circuits exist on the same network.
How is a Cisco Router Secured? What are the Different Passwords That Can be used?
A Cisco router can be protected by five passwords:
  1. Virtual
  2. Terminal
  3. Auxiliary
  4. Secret
  5. Console
Why Do Most Administrators Use Segmenting When They Need to Manage a Large Network?
Network administrators often use network segmenting to improve the traffic in the network. It also ensures that every user has a high bandwidth. This ensures that the network performs better. It is important to segment the network, especially if it is a growing network.
What command should be Used If You Want to Delete Any Existing Configuration in a Router and Want to Reconfigure It?
  1. erase startup-config
  2. erase running-config
  3. delete NVRAM
  4. erase NVRAM
Correct Answer: A. erase startup-config
When You Look at the Commands Given Below, What is the Next Command that You Need to Use to Route the Traffic that is going to the Router?
Hostname: Branch Hostname: Remote
PH# 123-6000, 123-6001 PH# 123-8000, 123-8001
SPID1: 32055512360001 SPID1: 32055512380001
SPID2: 32055512360002 SPID2: 32055512380002
ISDN switch-type basic ni
username Remote password cisco
interface bri0
IP address 10.1.1.1 255.255.255.0
encapsulation PPP
PPP authentication chap
ISDN spid1 41055512360001
ISDN spid2 41055512360002
dialer map IP 10.1.1.2 name Remote 1238001
dialer-list one protocol IP permit
The answer is (config-if)# dialer-group 1
When you Configure a Router that Utilizes Both Logical and Physical Interfaces, What are the Factors that You Need to Consider When You Determine the OSPR Router ID?
A. The highest IP address of any interface.
B. The middle IP address of any logical interface.
C. The highest IP address of any physical interface.
D. The lowest IP address of any physical interface.
E. The highest IP address of any logical interface.
F. The lowest IP address of any interface.
G. The lowest IP address of any logical interface.
Correct Answer: C. The highest IP address of any physical interface.
Mention the Size of the IP Address.
An IP address has a size of 32 bits for IPv4 and 128s bit for IPv6.
What Does a Data Packet or a Datagram Consist Of?
A datagram or data packet consists of the following information:
- Sender information
- Receiver's information
- Information passed through the client
This packet also contains some information that will define the number of the packet and the order of that packet. When the data is sent through the network, the information is broken down into smaller packets of data. These packets also carry some configuration and data for that message.
What is DHCP?
DHCP or Dynamic Host Configuration Protocol can assign an IP Address to specific workstations and clients. This protocol can also be used to create static IP addresses for different machines like printers, servers, routers, and scanners.
What is the difference between Static and Dynamic IP Addressing?
The router will manually assign a static IP address to the network while the DHCP server can assign a dynamic IP address to the network.
What is the Range for a Private IPS?
For a private IPS, the ranges that can be selected are:
- Class A: 10.0.0.0 – 10.0.0.255
- Class B: 172.16.0.0 – 172.31.0.0
- Class C: 192.168.0.0 – 192.168.0.255
How Can You Access a Router?
You can access a router in the following way:
- Telnet (IP)
- AUX (Telephone)
- Console (Cable)
What is EIGRP?
EIGRP or Enhanced Interior Gateway Routing Protocol is a protocol that was designed and developed by Cisco. This protocol can be used by routers to share routes in the network with other routers connected to the same system. Unlike RIP, EIGRP can only send incremental updated. This will decrease the volume of data that can be transferred in the network.
What Does the EIGRP Protocol Consist Of?
EIGRP comprises of
1. Load
2. Bandwidth
3. Delay
4. MTU or Maximum Transmission Unit
5. Reliability
What is the Function of a Clock Rate?
You can use the clock rate to either enable the router equipment or DCE to improve communication.
What Command is used to Remove or Delete any Configuration Data in NVRAM?
If you want to delete any information in the NVRAM, you can use the command to erase startup coding.
State the Differences Between the UDP and TCP?
Different systems use different protocols, like TCP and UDP, to send files across the network.
TCP (Transmission Control Protocol)
UDP (User Datagram Protocol)
You can use TCP to retrieve the lost part of any file shared across a network since this is a connection-oriented protocol. A system can lose connection to network while a file is being transferred. This protocol will ensure that no data is lost during the transfer.
When you use a UDP, you cannot be certain if your files will be sent to the destination system since this is a connectionless protocol. You also cannot be certain if there will be no leak in the data.
The TCP protocol will ensure that the files are sent in the same order to the destination system.
Since this is a connectionless protocol, you cannot be certain if the message will reach the destination in the right order.
The data in this protocol will always be read by the network as a stream. This means that the packets of data are always connected in the form of a stream.
In UDP, the packets are always broken down and sent across the network to the destination system. It is impossible to ensure that the packet will fully arrive at the destination.
Example: World Wide Web, file transfer protocol, e-mail, etc.
Example: VOIP (Voice Over Internet Protocol), TFTP (Trivial File Transfer Protocol), etc.
What is the Difference between Full Duplex and Half Duplex?
The difference between a half-duplex and full-duplex is that in the former, the communication will only happen in one direction. In contrast, in the latter, communication happens in two directions.
What is the Process of Conversion in Data Encapsulation?
Data encapsulation includes the following steps:
- Layers one, two, and three: The first three layers in the network are the application, presentation, and session layers. The router and protocols will convert the input provided by the user in these layers into data that can be transmitted in the network.
- Layer Four: The fourth layer in the network is the transport layer, and the router and protocols will break the data down into smaller segments or chunks that can be passed through the network.
- Layer Five: The fifth layer is the network layer, and the router and protocols will convert the data into packets or datagrams. The router and protocol will also add a network header to the data.
- Layer Six: The sixth layer is the data link layer, where the datagrams or packets are all built into the frames.
- Layer Seven: The seventh layer is the physical layer, where the router and protocols convert the frames into bits.
If the Router IOS is Stuck, What Command Should You Use?
Use the following command if the IOS is stuck: Ctrl + Shift + F6 and X.
Define Route Poisoning
Routes in a network can become invalid or dead, and the router must prevent the movement of packets through those routes. When you poison the route, you can prevent the transmission of packets. This process is termed as route poisoning.
In the case of RIP, What Route Entry Will an Invalid or Dead Route be assigned?
If there is a RIP entry in the table, the network will assign sixteen hops to any dead or invalid routes. This makes that route unreachable.