Golgappa.net | Golgappa.org | BagIndia.net | BodyIndia.Com | CabIndia.net | CarsBikes.net | CarsBikes.org | CashIndia.net | ConsumerIndia.net | CookingIndia.net | DataIndia.net | DealIndia.net | EmailIndia.net | FirstTablet.com | FirstTourist.com | ForsaleIndia.net | IndiaBody.Com | IndiaCab.net | IndiaCash.net | IndiaModel.net | KidForum.net | OfficeIndia.net | PaysIndia.com | RestaurantIndia.net | RestaurantsIndia.net | SaleForum.net | SellForum.net | SoldIndia.com | StarIndia.net | TomatoCab.com | TomatoCabs.com | TownIndia.com
Interested to Buy Any Domain ? << Click Here >> for more details...


hi friends i have some problem regarding technical round
ahr round plz tell me what should the right answer

technical questions
1 what is brouter
2 what is the menaing of 10 base2, 10 base 5 and 10baset
3 what is diffrence between bit rate and baud rate.
and this question was tooooooooooo much difficult to me
that
hr said to me that
rank me after the taking the all short of interview

Answers were Sorted based on User's Feedback



hi friends i have some problem regarding technical round ahr round plz tell me what should the rig..

Answer / jitendera sinha.it@gmil.com

hi i am jitendera sinha. and i am trying to give that answer
1 Brouter=bridge+router is called brouter.in another we can
say that the router which have both brifge nad router
property is called brouter.

2 10 base 2 is ethernet term trhat consern with datta
tratnsfer take place at speed of 10mbps/s having lenthg of
section 100 meter with two contiguish segment.

similary 10 base 5 is alswo a etehernet terme nad having
data transfer rate 10mbps havinf 5 continious segment
oflength 100 m
3 same as 1 and 2 but applyed for twisted cable

4 bit rate=numbaer of bit /sec is called bit rate
baud rate num
ber of bit/n


naswer of hr question-
if i will be there then i will say that sir as far my
consern u look very much anlaytical and methdical and pay a
silent view no ranking has be done
thanks
n=signal shift

Is This Answer Correct ?    1 Yes 0 No

hi friends i have some problem regarding technical round ahr round plz tell me what should the rig..

Answer / sohan

hi i am sohan any one have another answer about hr question
if yes then plz plz write

Is This Answer Correct ?    0 Yes 0 No

hi friends i have some problem regarding technical round ahr round plz tell me what should the rig..

Answer / jitendera sinha.

hi sir BhuvaneswariKulandaivelu
thnaks to making this answer bu sir i have readen in the
bok that max^m length of segment is 100 miter and u told
200 meter sir please clearfy it and having conituniusg
segment of 2

plz mail me on jitenderasinha.it2@gmail.com
















Other CCNA Interview Questions

Question Asked @ Answers

Which statement is true regarding Administrative distance?
A.) It is a metric B.) Number of hops between two routers
C.) Trustworthiness of the routing information D.) RIP
Administrative distance is 100 1
Which range of possible numbers do standard ipx access
lists have? A. 100 199 B. 600 699 C. 800 899 D. 1000-1099
1
Which OSI layer incorporates the MAC address and the LLC?
A.) Data link B.) Network C.) Physcial D.) Transport 2
Routers that have Flash memory typically have a ore loaded
copy of place IOS software. Which command should you use to
make a backup copy of the software image onto a given
network server? A. copy flash tftp B. save copy to tftp C.
write backup tftp D. write, backup -server-name- E. copy
backup to -server-name- 1
As a system administrator, you perform an extended ping at
the privileged EXEC prompt. As part of the display, you
see "Set DF bit in IP header? [yes] :" What would happen if
you answered no at the prompt. A. This lets the router
fragment the packet. B. It tells the router not to fragment
the packet. C. This lets the router direct the packet to
the destination it finds in its routing table. D. It tell
the router to send the packet to the next hop router. 1
Which two describe frame tagging? A.) Examines particular
info about each frame B.) A unique ID placed in the header
of each frame as it traverses the switch fabric C.) A user-
assigned ID defined to each frame D.) The building of
filter tables 1
If you are running Token Ring with Novell IPX routing,
which encapsulation should you use? A.) SAP B.) SNAP C.)
802.5 D.) 802.2 1
With distance vector routing protocols, it is never useful
to send the same routing update packet back out the same
interface that it was learned. This concept is called what?
A.) Holddown timers B.) Poison Reverse C.) Count to
infinity D.) Split Horizon E.) Link State 1
Which statement is true regarding full duplex? A.) Allows
for transmission and receiving of data simultaneously B.)
Only works in a multipoint configuration C.) Does not
affect the bandwidth D.) Allows for transmission and
receiving of data but not a the same time 1
Based upon the 1st octet rule identify the range for a
Class A address? A.) 1 - 126 B.) 192 - 223 C.) 128 - 191
D.) 1 - 191 1
When you enter router passwords during the setup dialog
what is the difference between enable and the enable secret
passwords? A. The enable password is encrypted B. The
enable secret password uses IPSec password authentication
C. The enable secret password cannot be seen as clear text
when viewing the configuration D. The enable secret
password acts as a backup in case the enable password is
compromised Wipro 6
Identify 2 HDLC characteristics? A.) Default serial
encapsulation B.) Open standard C.) Supports Stacker
compression D.) Supports point-to-point and multipoint 1
Using the access-list command, 'access-list 1 deny
2.2.2.2', what else must be done to stop host 2.2.2.2 from
sending any traffic out of physical interface E0, while
still allowing other traffic? A.) In global mode, Add a
line - 'access-list 1 permit 0.0.0.0 255.255.255.255' B.)
On interface E0, Add a line - 'access-group 1 in' C.) In
global mode, Add a line - 'access-list 1 permit all' D.) On
interface E0, Add a line - 'access-list 1 in' E.) On
interface E0, Add a line - 'access-list 1 out' F.) On
interface E0, Add a line - 'ip access-group 1' 1
Which command will display the encapsulation type on
interface serial 0? A.) show interface s0 B.) show all C.)
show int s0 encap D.) show encap s0 E.) show encap 1
Identify the 3 major functions at layer 3 of the OSI model?
A.) Forwarding process B.) Logical addressing C.) End-to-
end connections D.) Path selection E.) MAC address
examination F.) Network monitoring 1
Identify 3 IP routing protocols? A.) RIP B.) AURP C.) OSPF
D.) IGRP E.) ARP F.) ICMP 2
You are conferring a Frame Relay router with subinterfaces
on interface Serial 0 Which subinterfaces numbers could you
use for this configuration? A. 1 and 2 B. 0 2 and 0 3 C. 1
0 and 1 1 D. 0 1 a and 0 1 1
Identify the hardware component used to store buffers,
tables, running-configuration etc? A.) NVRAM B.) ROM C.)
RAM D.) Flash 2
Whith the hierarchical numbering of IP addressing what
determines the spoon of the address that will identify the
network number? A. subnet mask B. dots between octets C.
class of the first octet D. assignments of DHCP E.
address

Is This Answer Correct ?    0 Yes 0 No

hi friends i have some problem regarding technical round ahr round plz tell me what should the rig..

Answer / mahesh

we hve 3 types of cables
1.coaxil
2.Twistedpair
3.Fiber optic
the coaxil cable is classifed as (clasifed on the basis of
network segment)
a.10 base 2, the length is exactly 185 meters not 200m
10mbps baseband signal,also called thinnet
b.10 base5, can support upto 500m ,aslo called thicknet

for 10 base t which is twistedpair cable has max length of
100meters
-----------------------------------------------------------


Which statement is true regarding Administrative distance?
A.) It is a metric B.) Number of hops between two routers
C.) Trustworthiness of the routing information D.) RIP
Administrative distance is 100 1

ANSWER IS C:

Which range of possible numbers do standard ipx access
lists have? A. 100 199 B. 600 699 C. 800 899 D. 1000-1099

ANSWER IS C:800-899(STANDERD)
900-999(EXTENDED)

Which OSI layer incorporates the MAC address and the LLC?
A.) Data link B.) Network C.) Physcial D.) Transport

ANS B:

Routers that have Flash memory typically have a ore loaded
copy of place IOS software. Which command should you use to
make a backup copy of the software image onto a given
network server? A. copy flash tftp B. save copy to tftp C.
write backup tftp D. write, backup -server-name- E. copy
backup to -server-name- 1

ANS A:

As a system administrator, you perform an extended ping at
the privileged EXEC prompt. As part of the display, you
see "Set DF bit in IP header? [yes] :" What would happen if
you answered no at the prompt. A. This lets the router
fragment the packet. B. It tells the router not to fragment
the packet. C. This lets the router direct the packet to
the destination it finds in its routing table. D. It tell
the router to send the packet to the next hop router. 1

ANS A: IT TELS ROUTER TO FRAGMENT PACKET


With distance vector routing protocols, it is never useful
to send the same routing update packet back out the same
interface that it was learned. This concept is called what?
A.) Holddown timers B.) Poison Reverse C.) Count to
infinity D.) Split Horizon E.) Link State

ANS D: SPLIT HORIZON

Which statement is true regarding full duplex? A.) Allows
for transmission and receiving of data simultaneously B.)
Only works in a multipoint configuration C.) Does not
affect the bandwidth D.) Allows for transmission and
receiving of data but not a the same time

ANS A:

Based upon the 1st octet rule identify the range for a
Class A address? A.) 1 - 126 B.) 192 - 223 C.) 128 - 191
D.) 1 - 191

ANS A:

When you enter router passwords during the setup dialog
what is the difference between enable and the enable secret
passwords? A. The enable password is encrypted B. The
enable secret password uses IPSec password authentication
C. The enable secret password cannot be seen as clear text
when viewing the configuration D. The enable secret
password acts as a backup in case the enable password is
compromised Wipro

ANS C:

Identify 2 HDLC characteristics? A.) Default serial
encapsulation B.) Open standard C.) Supports Stacker
compression D.) Supports point-to-point and multipoint 1

ANS A,D

Is This Answer Correct ?    0 Yes 0 No

hi friends i have some problem regarding technical round ahr round plz tell me what should the rig..

Answer / bhuvaneswarikulandaivelu

The name 10BASE2 is otherwise known as thinnet. The 10
comes from the maximum transmission speed of 10 Mbit/s
(millions of bits per second). The BASE stands for baseband
signalling(signals having frequencies zero or very near to
zero), and the 2 represents the maximum segment length of
200 meters

Is This Answer Correct ?    0 Yes 1 No

Post New Answer

More CCNA Interview Questions

what is secure hand shake protocol

2 Answers  


Which layer defines the physical topology? A.) Application B.) Transport C.) Network D.) Data Link E.) Physical F.) Session

1 Answers  


When determining whether or not to route a LAN segment, which rule of thumb do you use? A.) 60/40 B.) 50/50 C.) 80/20 D.) 90/10 E.) 70/30

1 Answers  


You have a Class B network address divided into 30 subnets. You will add 25 new subnets within the next year. You need 600 host IDs for each subnet. Which subnet mask should you use? A.) 255.254.0.0 B.) 255.192.0.0 C.) 255.255.252.0 D.) 255.255.248 0

1 Answers  


What are the things that can be accessed in a CISCO router’s identifying information?

0 Answers  


Which statement is true regarding half duplex? A.) Only works in a point-to-point configuration B.) Allows for transmitting and receiving but not a the same time C.) Allow for transmitting and receiving of data simultaneously D.) Doubles the bandwidth

1 Answers  


Which statement about Ethernet switches is true? A. Symmetric switching allows connection between pods of unlike bandwidth and does not require memory buffering B. Memory Buffering is used to prevent a bottleneck when pods of different bandwidth are connected on a symmetric switch C. The latency can be reduced if the switch utilizes the store and forward method of switching store and forward is better for error detection D. The cut through method of switching is faster because the switch forwards the packet to the destination as soon as it reads the destination address

1 Answers  


Identify the purpose of the Ping command? A.) Share routing information with a neighbor router B.) Transmit user data when buffers are full C.) Test connectivity at layer 3 D.) Test entire protocol stack

2 Answers  


In order to configure a Frame Relay subinterface with IP identify the 2 commands that must be configured on the physcial interface? A.) Router(config-if)# encapsulation frame-relay B.) Router(config-if)# no ip address C.) Router(config-if)#encapsulation subinterface frame-relay D.) Router(config)# subinterface s0 encapsulation frame-relay

2 Answers  


You are a network administrator and have been assigned the IP address of 201.222.5.0. You need to have 20 subnets with 5 hosts per subnet. What subnet mask will you use? A. 255.255.255.248 B. 255.255.255.128 C. 255.255.255.192 D. 255.255.255.240

2 Answers  


Define autonomous system (as)?

0 Answers  


Which of the following is an invalid host address using a netmask of 255.255.255.192? A.) 10.1.1.1 B.) 10.1.1.66 C.) 10.1.1.130 D.) 10.1.1.127

3 Answers  


Categories