Company Name Starts with ...
#  A  B  C  D  E   F  G  H  I  J   K  L  M  N  O   P  Q  R  S  T   U  V  W  X  Y  Z

Wipro CCNA Interview Questions
Questions Answers Views Company eMail

Novell's implementation of RIP updates routing tables every ____ seconds. A. 60 B. 90 C. 10 D. 30

1 11547

Which type of Ethernet framing is used for TCP/IP and AppleTalk? A. Ethernet 802.3 B. Ethernet 802.2 C. Ethernet II D. Ethernet SNAP

1 6695

Repeaters work at which layer of the OSI model? A.) Network B.) Session C.) Transport D.) Physical

6 31287

What is an advantage of LAN segmentation? A.) Increases broadcasts. B.) Increases collisions. C.) Provides more protocol support. D.) Decreases broadcasts. E.) Routing protocol support.

2 7549

Which command would configure Interface E0 with an IP address of 12.23.4.5 using a Subnet mask of 255.255.255.0 ? A.) ip address 12.23.4.5 255.255.255.0 B.) ip address 12.23.4.5 /24 C.) ip address 12.23.4.5 mask 255.255.255.0 D.) ip address 12.23.4.5 mask ff:ff:ff:0 E.) that is an invalid mask for a class 'A' address

3 7278

Identify the hardware component that stores the bootstrap program? A.) ROM B.) NVRAM C.) Booter load D.) RAM E.) Flash

4 12339

What is the most common layer 2 device? A. Hub B. Router C. Switch D. Repeater

7 12236

Which three statements about Frame Relay configurations using subinterfaces is true? (Choose three) A. Each subinterface is conferred either multipoint or point to point B. Any network address must be removed from the physical interface C. The configuration of subinterfaces is done in router (config-if)# mode D. Frame Relay encapsulation must be conferred on each subinterface

2 4298

At which layer of the OSI model does the ping command operate? A. session B. network C. transport D. maintenance

12 43183

When you enter router passwords during the setup dialog what is the difference between enable and the enable secret passwords? A. The enable password is encrypted B. The enable secret password uses IPSec password authentication C. The enable secret password cannot be seen as clear text when viewing the configuration D. The enable secret password acts as a backup in case the enable password is compromised

8 10766

You just entered the following command_Router(config#) line console 0 Which operation is most likely to follow? A. Confound terminal type B. enter protocol parameters for a serial line C. create a password on the console terminal line D. establish a terminal type 4 connection to a remote host E. change from configuration mode to console privileged mode

10 14691

Why we choose the router rather then L-3 Switch

8 9338

If i connect two routers through ethernet cable and serial cable then which has high speed and which is better among two?

10 11757

what is the difference between osi and tcp ?

8 9246

Tell me CCNA Course + Dump Q/A in chennai?

2 4576

Post New Wipro CCNA Interview Questions


Wipro CCNA Interview Questions


Un-Answered Questions

What is the syntax for creating a function?

1


How to log hibernate generated sql queries in log files?

183


Why do we use cache in hibernate?

166


What are the main components of teradata system?

574


How can we reattach any detached objects in Hibernate?

145






When we save a report in report studio with what extn it save?

645


What is foreign key and example?

499


Explain about objects in PHP?

567


What is parameterizion?

681


What are the core components of Apache Hadoop?

410


Why the plastic materials used in the screwdriver's handles?

583


How to write test case for this scenario. The system shall allow for a wild card search for the first name with a minimum of one character.

1443


What is service container?

426


How to detect if a non-menu key has been pressed?

1396


Does mysql support nosql?

470