Golgappa.net | Golgappa.org | BagIndia.net | BodyIndia.Com | CabIndia.net | CarsBikes.net | CarsBikes.org | CashIndia.net | ConsumerIndia.net | CookingIndia.net | DataIndia.net | DealIndia.net | EmailIndia.net | FirstTablet.com | FirstTourist.com | ForsaleIndia.net | IndiaBody.Com | IndiaCab.net | IndiaCash.net | IndiaModel.net | KidForum.net | OfficeIndia.net | PaysIndia.com | RestaurantIndia.net | RestaurantsIndia.net | SaleForum.net | SellForum.net | SoldIndia.com | StarIndia.net | TomatoCab.com | TomatoCabs.com | TownIndia.com
Interested to Buy Any Domain ? << Click Here >> for more details...

Company Name Starts with ...
#  A  B  C  D  E   F  G  H  I  J   K  L  M  N  O   P  Q  R  S  T   U  V  W  X  Y  Z

HCL CCNA Interview Questions
Questions Answers Views Company eMail

What is the Cisco name for the encapsulation type used on a serial interface? A. HDLC B. SDLC C. SAP D. SNAP

3 28872

Identify the OSI layer which is responsible for end-to-end connections? A.) Network B.) Transport C.) Session D.) Data link E.) TCP

2 13038

Which layer is responsible for coordinating communication between systems? A.) Application B.) Network C.) Session D.) Transport E.) Physical F.) Data Link

2 13772

Identify the keystroke used to terminate the setup mode? A.) Ctrl-K B.) Crtl-C C.) Ctrl-Z D.) Crtl-End

1 8774

Identify the command to configure the router to boot from an IOS located on a TFTP server? A.) boot system tftp IOS.exe 172.16.5.1 B.) boot system tftp 172.16.5.1 IOS.exe C.) boot system flash tftp 172.16.5.1 D.) boot system IOS.exe 172.16.5.1

2 7479

Identify the true statements about the following access list: Access-list 101 deny tcp 192.10.172.0 0.0.0.255 any eq 23 Access-list 101 permit ip any any A.) This access list prevents the host 192.10.172.0 from telneting B.) This access list prevents any telnet traffic from subnet 192.10.172.0/24 C.) This access list filters some telnet access D.) This access list denies any telnet traffic to subnet 192.10.172.0/24 E.) This access list is invalid F.) The netmask on the this access list is reversed

1 4702

Which of the following is a valid extended IP access-list? A.) router(config)# access-list 101 permit tcp host 172.16.30.0 any eq 21 log B.) router# access-list 101 permit tcp host 172.16.30.0 any eq 21 log C.) router(config)# acess-list 101 permit any any 172.16.30.0 D.) router(config)# access-list 101 permit ip host 172.16.30.0 any eq 21 log

2 6778

What is the connection oriented protocol in the TCP/IP protocol stack? A. IP B. UDP C. TCP D. DNS E. OSPF

5 10787

What must you do to test connectivity on a dial on demand routing (DDR) link? A. increase the idle Import parameter B. send interesting traffic across the link C. reboot one of the integrated services digital network (ISDN) routers D. reset the DDR integrated services digital network (ISDN) router statistics to zero

1 7354

What is the link state routing protocol in the TCP/IP protocol stack? A. IP B. IS-IS C. NLSP D. OSPF E. RIP version 2

2 5937

Which three commands are used to configure information into RAM on a router? (Choose three) A. configure memory B. configure terminal C. configure overwrite D. copy tftp startup-config E. copy running-config startup-config F. copy startup-config running-config

8 11957

what is standard and extended acess list? what are the commands for extended and acess list?

3 8232

Which memory component on a Cisco router contains the dynamic system configuration? ROM NVRAM Flash RAM/DRAM

17 40715

What is difference between Store-and-Forward, cut-through, Fragment-Free Method?

2 20143

What is ISR or NonISR router? Difference between ISR or NonISR router?

3 39147

Post New HCL CCNA Interview Questions


HCL CCNA Interview Questions


Un-Answered Questions

What happens on checkpoint?

984


Explain acbgen process?

1047


Can you discuss the role of immunosuppressive therapy in kidney transplantation and its impact on patient outcomes?

1


A company wants to transmit data over the telephone, but it is concerned that its phones may be tapped. All of its data is transmitted as four-digit integers. It has asked you to write a program that will encrypt its data so that the data may be transmitted more securely. Your script should read a four digit integer entered by the user in a prompt dialog and encrypt it as follows: Replace each digit by (the sum of that digit plus 7) modulus 10. Then swap the first digit with the third, and swap the second digit with the fourth. Then output XHTML text that displays the encrypted integer.

3443


What is negative tag?

792


Mention the ways in which parameterized can be invoked. Give an example of each.

1019


What is a footer used for?

866


Explain hard disk and what is its purpose? : .NET Architecture

892


what matters more to you- money or success?

1131


What is pure oop?

1054


WHAT KIND OF LIGHTENING PROTECTION SCHEMS CAN BE ADOPTED FOR THE FLAT ROOF OF BIG DIMENSION.

2089


What is means by call function in python?

919


What tools can be used to assure a consistent style in node.js?

505


What are the drawbacks of Apache Spark?

307


Can I run c program in turbo c++?

991