Certifications Interview Questions
Questions Answers Views Company eMail

"sap" is used by the Cisco IOS for which encapsulation types? A. Ethernet_802.2 B. Token-Ring C. FDDI_SNAP D. Ethernet_802.3 E. FDDI_802.2

1 3047

Which type of Ethernet framing is used for TCP/IP and AppleTalk? A. Ethernet 802.3 B. Ethernet 802.2 C. Ethernet II D. Ethernet SNAP


1 5713

Which type of Ethernet framing is used for TCP/IP and DECnet? A. Ethernet 802.3 B. Ethernet 802.2 C. Ethernet II D. Ethernet SNAP

1 4108

You are a system administrator on a NetWare network, you are running NetWare 4.11 and you cannot communicate with your router. What is the likely problem? A. NetWare 4.11 defaults to 802.2 encapsulation. B. NetWare 4.11 defaults to 802.3 encapsulation C. Cisco routers only work with NetWare 3.11. D. NetWare 3.11 defaults to 802.2 encapsulation.

1 3477

NetWare IPX addressing uses a network number and a node number. Which statements are true? A. The network address is administratively assigned and can be up to 16 hexadecimal digits long. B. The node address is always administratively assigned. C. The node address is usually the MAC address. D. If the MAC address is used as the node address, then IPX eliminates the use of ARP.

1 2939

Which NetWare protocol works on layer 3--network layer--of the OSI model? A. IPX B. NCP C. SPX D. NetBIOS

1 4961

Which NetWare protocol provides link-state routing? A. NLSP B. RIP C. SAP D. NCP

1 6322

As a system administrator, you want to debug igrp but are worried that the "debug IP igrp transaction" command will flood the console. What is the command that you should use? A. debug IP igrp event B. debug IP igrp-events C. debug IP igrp summary D. debug IP igrp events

1 3768

What does the following series of commands accomplish? router igrp 71 network router igrp 109 network A. It isolates networks and B. It loads igrp for networks 109 and 71. C. It disables RIP. D. It disables all routing protocols.

1 3346

In the command "router igrp 109" what does 109 signify? A. an autonomous system B. any network number which the router is attached to C. the allowable length of the routing table D. the network socket number

1 5073

IGRP supports a feature that allows traffic to be distributed among up to 6 (4 default) paths to provide greater overall throughput and reliability. What is this called? A. unequal-cost load balancing B. equal-cost load balancing C. proportionate load balancing D. low cost load balancing

1 2879

IGRP uses flash updates, poison reverse updates, holddown times, and split horizon. How often does it broadcast its routing table updates? A. 90 seconds B. 10 seconds C. 30 seconds D. 45 seconds

1 5339

The command "show IP protocol" displays which information? A. routing timers B. network information C. contents of the IP routing table D. information about all known network and subnetworks


4 16967

When using RIP, routing updates are broadcast every ____ seconds. A. 30 B. 10 C. 60 D. 90

4 12112

An autonomous system can only exist if all routers in that system meet which criteria? A. interconnected B. run the same routing protocol C. assigned same autonomous system number D. run IGRP only E. run RIP only

1 5840

Un-Answered Questions { Certifications }

What is the difference between csma/cd and csma/ca?


Why ip address called logical address?


plese forward scjp 1.6 dumps to my mail pleaseeeeeee siddu.eld@gmail.com


What is the difference between unicast, multicast, broadcast, and anycast?


Name the protocol which can do load balancing on unequal cost also?


what's the difference between Symmetric and Asymmetric cryptosystem?


What is the key advantage of using a switches?


What is the difference between static ip addressing and dynamic ip addressing?


pls... tell me that how should i prepare for CATe in STC? give some tips.. i have 2 days only for exam.. if u know any mock test webside , tell me


Utilizing RIP, what is the limit when it comes to the number of hops?


how we can protect the chroot /mnt/sysimage with password


what are the effects on the QoS in each layer of OSI model in network security?


What is antecedent certificate? Which documents come under antecedent certificate?


What is ping used for?


What is osi reference model?