Golgappa.net | Golgappa.org | BagIndia.net | BodyIndia.Com | CabIndia.net | CarsBikes.net | CarsBikes.org | CashIndia.net | ConsumerIndia.net | CookingIndia.net | DataIndia.net | DealIndia.net | EmailIndia.net | FirstTablet.com | FirstTourist.com | ForsaleIndia.net | IndiaBody.Com | IndiaCab.net | IndiaCash.net | IndiaModel.net | KidForum.net | OfficeIndia.net | PaysIndia.com | RestaurantIndia.net | RestaurantsIndia.net | SaleForum.net | SellForum.net | SoldIndia.com | StarIndia.net | TomatoCab.com | TomatoCabs.com | TownIndia.com
Interested to Buy Any Domain ? << Click Here >> for more details...



Cisco Certifications Interview Questions
Questions Answers Views Company eMail

What is a backoff on an 802.3 networks A. It is latency in store and forward switching B. It is the time used for token passing from machine to machine C. It is the retransmission delay that is enforced when a collision occurs D. it is the result of two nodes transmitting at the same time. The frames from each transmitting device collide and are damaged.

3 7380

Which statement about half duplex Ethernet operations is true? A. With half duplex transmission frames feed into a single cable in one direction at a time. B. Half duplex transmission between stations is achieved by using point to point Ethernet and Fast Ethernet connections C. Half duplex transmission between stations is achieved by using point to munificent Ethernet and Fast Ethernet connections D. Half duplex Ethernet technology provides a transmit circuit connection wired directly to the receiver circuit at the other end of the connection

5 10476

Which three commands are used to configure information into RAM on a router? (Choose three) A. configure memory B. configure terminal C. configure overwrite D. copy tftp startup-config E. copy running-config startup-config F. copy startup-config running-config

HCL,

8 11889

When you enter router passwords during the setup dialog what is the difference between enable and the enable secret passwords? A. The enable password is encrypted B. The enable secret password uses IPSec password authentication C. The enable secret password cannot be seen as clear text when viewing the configuration D. The enable secret password acts as a backup in case the enable password is compromised

Wipro,

8 13393

You just entered the following command_Router(config#) line console 0 Which operation is most likely to follow? A. Confound terminal type B. enter protocol parameters for a serial line C. create a password on the console terminal line D. establish a terminal type 4 connection to a remote host E. change from configuration mode to console privileged mode

Intel, Quark, Wipro,

10 17517

What are the three commonly used methods of flow control used for handling network congestion? A. Buffering B. Source-quench messages C. Error checking D. Windowing

Cisco,

1 10612

What are the five areas of the ISO Network Management Model? A. Performance management B. Accounting management C. Flow management D. Configuration management E. Operating management F. Fault management G. Routing management H. Security management

2 13137

What is the standard ethernet cabling specification? (not IEEE 802.3) A. STP B. Coax (thin) C. Coax (thick) D. UTP

1 4692

What AppleTalk protocol permits AppleTalk workstations to share files across a network?

1 3910

Which of the following are true regarding switched virtual circuits (SVCs) and permanent virtual circuits (PVCs)? Choose two. A. SVCs and PVCs can use the same circuit. B. PVCs are permanently established virtual circuits. C. SVCs and PVCs terminate the circuit when data transmission is complete. D. SVCs are virtual circuits that are dynamically established on demand and terminated when data transmission is complete.

1 4406

Which two of the following describe ASN.1 (Abstract Syntax Notation One)? A. It is an abstract routing protocol that is not used very often. B. It is an OSI language for describing data types independent of particular computer structures and representation techniques. C. Consists of only one basic routing algorithm. D. Uses BER (Basic Encoding Rules).

1 3953

What is the technique used by a router that can automatically initiate and close a circuit-switched session? A. PLP B. LAPP C. ASN.1 D. DDR

1 3800

What are two ways to connect a PC to a LAN when using ATM (Asynchronous Transfer Mode)? A. ATM endpoint B. ATM LAPB C. ATM router D. ATM switch

1 4118

Match the following routing protocols with their routing algorithm. A. OSPF 1. Distance Vector B. IGRP 2. Link-State C. RIP D. IS-IS E. NLSP F. RTMP G. AURP H. BGP

1 6004

ISDN is referenced by a suite of ITU-T (International Telecommunication Union Telecommunication Standardization Sector) standards encompassing what three layers of the OSI reference model? A. Physical B. Data Link (LAPD) C. Data Link (RMON) D. Network (Q.930 and Q.931)

1 4140


Un-Answered Questions { Cisco Certifications }

What is poe (power over ethernet)?

1129


On which mode we give debug command?

1111


In port based access-list which command you give instead of ip?

1068


In which access- list type you can't do editing?

1062


Which peer authentication method and which ipsec mode is used to connect to the branch locations? (Choose two)

1269


What is Phase od VPN in site to site and what information you will require to configure a SITE to SITE VPN

3763


GUYS i was refraining the OLD post and i got a good Question and wana make sure that you guys Just did not vist it for answers if you are not Aware google it understand it and then answered it the question is -: Significance of IP helper-address Command on SW? Is it necessary to put this command? you donot wana to give answer please donot visit this question and increase the vistor name if you are thinking that answer is wrong mark it wrong and explain why you are marking it wrong

2021


Which decision called socket base?

1079


What is the meaning of synchronization?

1202


Explain the matric of eigrp protocol?

3360


Can you explain different components in PKI?

1787


What are 10base2, 10base5 and 10baset ethernet lans?

1057


Explain how many types of router?

1094


When we use extended access-list?

1065


What is the virtual path?

1034