Company Name Starts with ...
#  A  B  C  D  E   F  G  H  I  J   K  L  M  N  O   P  Q  R  S  T   U  V  W  X  Y  Z

Wipro CCNA Interview Questions
Questions Answers Views Company eMail

Novell's implementation of RIP updates routing tables every ____ seconds. A. 60 B. 90 C. 10 D. 30

1 7389

Which type of Ethernet framing is used for TCP/IP and AppleTalk? A. Ethernet 802.3 B. Ethernet 802.2 C. Ethernet II D. Ethernet SNAP

1 5712

Repeaters work at which layer of the OSI model? A.) Network B.) Session C.) Transport D.) Physical

6 27629

What is an advantage of LAN segmentation? A.) Increases broadcasts. B.) Increases collisions. C.) Provides more protocol support. D.) Decreases broadcasts. E.) Routing protocol support.

2 6127

Which command would configure Interface E0 with an IP address of using a Subnet mask of ? A.) ip address B.) ip address /24 C.) ip address mask D.) ip address mask ff:ff:ff:0 E.) that is an invalid mask for a class 'A' address

3 5851

Identify the hardware component that stores the bootstrap program? A.) ROM B.) NVRAM C.) Booter load D.) RAM E.) Flash

4 10073

What is the most common layer 2 device? A. Hub B. Router C. Switch D. Repeater

7 9705

Which three statements about Frame Relay configurations using subinterfaces is true? (Choose three) A. Each subinterface is conferred either multipoint or point to point B. Any network address must be removed from the physical interface C. The configuration of subinterfaces is done in router (config-if)# mode D. Frame Relay encapsulation must be conferred on each subinterface

2 3237

At which layer of the OSI model does the ping command operate? A. session B. network C. transport D. maintenance

12 37302

When you enter router passwords during the setup dialog what is the difference between enable and the enable secret passwords? A. The enable password is encrypted B. The enable secret password uses IPSec password authentication C. The enable secret password cannot be seen as clear text when viewing the configuration D. The enable secret password acts as a backup in case the enable password is compromised

8 8015

You just entered the following command_Router(config#) line console 0 Which operation is most likely to follow? A. Confound terminal type B. enter protocol parameters for a serial line C. create a password on the console terminal line D. establish a terminal type 4 connection to a remote host E. change from configuration mode to console privileged mode

10 10784

Why we choose the router rather then L-3 Switch

8 6468

If i connect two routers through ethernet cable and serial cable then which has high speed and which is better among two?

10 8675

what is the difference between osi and tcp ?

8 6417

Tell me CCNA Course + Dump Q/A in chennai?

2 3399

Post New Wipro CCNA Interview Questions

Wipro CCNA Interview Questions

Un-Answered Questions

What is deploying a website?


what do you mean by the repro command?


Can you list the coffman's conditions that lead to a deadlock?


What is inspect?


Explain how to perform system maintenance?


How to code in perl to implement the tail function in unix?


How many requests per second does facebook handle?


What is critical radius of insulation?


What is use of model in laravel?


One of the Institutes contains 5 student groups. Every group contains 4 students. Institute wants to store student group’s details in array. Group should contain group member’s details (name and registration number and age), project name, and mark of the group.


How are vpcs interconnected across the region and within the same region?


What's the benefit for specifying constraints like not null, primary key explicitly instead of specifying it against the column ?


Explain what are the essential components of embedded system?


How do I change the default background color in excel?


What is database Configuration assistant ?