Company Name Starts with ...
#  A  B  C  D  E   F  G  H  I  J   K  L  M  N  O   P  Q  R  S  T   U  V  W  X  Y  Z

Wipro CCNA Interview Questions
Questions Answers Views Company eMail

Novell's implementation of RIP updates routing tables every ____ seconds. A. 60 B. 90 C. 10 D. 30

1 6875

Which type of Ethernet framing is used for TCP/IP and AppleTalk? A. Ethernet 802.3 B. Ethernet 802.2 C. Ethernet II D. Ethernet SNAP

1 5538

Repeaters work at which layer of the OSI model? A.) Network B.) Session C.) Transport D.) Physical

6 26144

What is an advantage of LAN segmentation? A.) Increases broadcasts. B.) Increases collisions. C.) Provides more protocol support. D.) Decreases broadcasts. E.) Routing protocol support.

2 5929

Which command would configure Interface E0 with an IP address of using a Subnet mask of ? A.) ip address B.) ip address /24 C.) ip address mask D.) ip address mask ff:ff:ff:0 E.) that is an invalid mask for a class 'A' address

3 5601

Identify the hardware component that stores the bootstrap program? A.) ROM B.) NVRAM C.) Booter load D.) RAM E.) Flash

4 9773

What is the most common layer 2 device? A. Hub B. Router C. Switch D. Repeater

7 9225

Which three statements about Frame Relay configurations using subinterfaces is true? (Choose three) A. Each subinterface is conferred either multipoint or point to point B. Any network address must be removed from the physical interface C. The configuration of subinterfaces is done in router (config-if)# mode D. Frame Relay encapsulation must be conferred on each subinterface

2 3077

At which layer of the OSI model does the ping command operate? A. session B. network C. transport D. maintenance

12 35959

When you enter router passwords during the setup dialog what is the difference between enable and the enable secret passwords? A. The enable password is encrypted B. The enable secret password uses IPSec password authentication C. The enable secret password cannot be seen as clear text when viewing the configuration D. The enable secret password acts as a backup in case the enable password is compromised

8 7526

You just entered the following command_Router(config#) line console 0 Which operation is most likely to follow? A. Confound terminal type B. enter protocol parameters for a serial line C. create a password on the console terminal line D. establish a terminal type 4 connection to a remote host E. change from configuration mode to console privileged mode

10 10300

Why we choose the router rather then L-3 Switch

8 5971

If i connect two routers through ethernet cable and serial cable then which has high speed and which is better among two?

10 8176

what is the difference between osi and tcp ?

8 6022

Tell me CCNA Course + Dump Q/A in chennai?

2 3235

Post New Wipro CCNA Interview Questions

Wipro CCNA Interview Questions

Un-Answered Questions

Explain how cassandra delete data?


What is the difference between PIC 9.99 and 9v99 in COBOL?


What is microsoft push notification service?


why do you want to work with tavant technologies?


why is it important for HR management to transform from primarily admininistrative and operetional to becoming a more stratgeic contributor?


What is the difference between remove() and removeChild()?


How to recover from sql injection? : sql server security


Why we use virtual companies?


How can i copy program (parameter) from mm440 (V.F.D.) by using BOP?


Can you define cognos decision stream?


What is email marketing? What are the types of email marketing?


Can intelligence server integrate with my existing data structure?


What are the Formatting and Printing Strings available in PHP?


What is meant by 2-tier architecture in client server environment?


What is best practice to refer dynamic custom messages in visualforce with multi-language support ?