Escolar Documentos
Profissional Documentos
Cultura Documentos
-www.rlidz.blogspot.com -
2|Page
What is RAID?
RAID stands for Redundant Array of Inexpensive Drives. It is a technology that uses two or more hard disk
drives to replicate data among multiple hard disk drives. RAID provides greater levels of performance,
reliability and larger data volumes sizes. It is used for mirroring.
What is VoIP and how it works?
VoIP is nothing but Voice over Internet Protocol. It converts voice into digital signal which is transmitted
through internet. If we are calling a regular phone then the signal is converted to regular telephone signal
before reaching to destination. VoIP allows us to make call directly from a computer.
What is VLAN?
VLAN is nothing but Virtual LAN. It is a network of computers that act as if they are connected to the
same network even though they may actually be physically located in different segments of LAN. VLANs are
configures through software than hardware. The advantages of VLAN are that even if we move the computer
physically it can stay on the same VLAN without requiring any hardware reconfiguration.
What is the difference between L-2 Devices and L-3 Devices?
L-2 Devices works on MAC Address and L-3 Devices works on IP Address. L-2 Devices are much faster when
compared to L-3 Devices.
What is default gateway?
Default gateway is basically the entry point from one network and exit from the other networkwhich often
routes through the router network.
Explain the disadvantages of circular login?
In circular login method the event of corrupt database, only the last back up data can be restored.
Mention few standard port numbers for SMTP, POP3, LADAP, IMAP4, Global catalog?
SMTP – 25, POP3 – 110, IMAP4 – 143, RPC – 135, LDAP – 389, Global Catalog – 3268
Q: What are the seven layers of the OSI model?
A: The layers are physical, data link, network, transport, session, presentation, and applicationlayers.
Q: In the TCP client-servel model, how does the three-way handshake work in opening
connection?
A: The client first sends a packet with sequence “x” to the server. When the server receives this packet, the
server will send back another packet with sequence “y”, acknowledging the request of the client. When the
client receives the acknowledgement from the server, the client will then send an acknowledge back to the
server for acknowledging that sequence “y” has been received.
Q: What is the purpose of exchanging beginning sequence numbers during the the connection
in the TCP client-server model?
A: To ensure that any data lost during data transfer can be retransmitted.
Q: How does Asynchronous Transfer Mode (ATM) work?
A: ATM works by transmitting all traffic in small, fixed-sized cells. These small, fixed-size cells reduces
queuing delay and can be switched quickly. ATM fits into layer 2 of the OSI model and provides functions for
framing and error correction. At the port interface, ATM switches convert cells into frames, and vice versa.
ATM provides Quality of Service and traffic shaping.
Q: Given a Class B Network with subnet mask of 255.255.248.0 and a packet addressed to
130.40.32.16, what is the subnet address?
A: Take the 2 addresses, write them in binary form, then AND them. The answer is 130.40.32.0
Q:What is an IP address?
A.Every device connected to the public Internet is assigned a unique number known as an Internet Protocol
(IP) address. IP addresses consist of four numbers separated by periods (also called a ‘dotted-quad’) and
look something like 127.0.0.1.
In computer networking, an Internet Protocol (IP) address consists of a numerical identification (logical
address) that network management assigns to devices participating in a computernetwork utilizing the
-www.rlidz.blogspot.com -
3|Page
Internet Protocol for communication between its nodes.[1] Although computers store IP addresses as binary
numbers, they often display them in more human-readable notations, such as 192.168.100.1 (for IPv4), and
2001:db8:0:1234:0:567:1:1 (for IPv6). The role of the IP address has been characterized as follows: “A name
indicates what we seek. An address indicates where it is. A route indicates how to get there.”
Q:What is ARP? What is ARP Cache Poisoning?
Address Resolution Protocol (ARP) is a protocol for mapping an Internet Protocol address (IP address) to a
physical machine address that is recognized in the local network. For example, in IP Version 4, the most
common level of IP in use today, an address is 32 bits long. In an Ethernet local area network, however,
addresses for attached devices are 48 bits long. (The physical machine address is also known as a
Media Access Control or MAC address.) A table, usually called the ARP cache, is used to maintain a
correlation between each MAC address and its corresponding IP address. ARP provides the protocol rules for
making this correlation and providing address conversion in both directions.
Q:What is a default gateway? What happens if I don’t have one?
A:A gateway is a routing device that knows how to pass traffic between different subnets andnetworks. A
computer will know some routes (a route is the address of each node a packet must go through on the
Internet to reach a specific destination), but not the routes to every address on the Internet. It won’t even
know all the routes on the nearest subnets. A gateway will not have this information either, but will at least
know the addresses of other gateways it can hand the traffic off to. Your default gateway is on the same
subnet as your computer, and is the gateway your computer relies on when it doesn’t know how to route
traffic.
The default gateway is typically very similar to your IP address, in that many of the numbers may be the
same. However, the default gateway is not your IP address. To see what default gateway you are using, follow
the steps below for your operating system.
Q:What is Automatic Private IP Addressing (APIPA)?
A. Windows 98, 98 SE, Me, and 2000 have an Automatic Private IP Addressing (APIPA) feature that will
automatically assign an Internet Protocol address to a computer on which it installed. This occurs when the
TCP/IP protocol is installed, set to obtain it’s IP address automatically from a Dynamic Host Configuration
Protocol server, and when there is no DHCP server present or the DHCP server is not available. The Internet
Assigned Numbers Authority (IANA) has reserved private IP addresses in the range of 169.254.0.0 –
169.254.255.255 for Automatic Private IP Addressing.
Q:What is CIDR?
Short for Classless Inter-Domain Routing, an IP addressing scheme that replaces the older system based on
classes A, B, and C. With CIDR, a single IP address can be used to designate many unique IP addresses. A
CIDR IP address looks like a normal IP address except that it ends with a slash followed by a number, called
the IP network prefix. For example: 172.200.0.0/16
The IP network prefix specifies how many addresses are covered by the CIDR address, with lower numbers
covering more addresses. An IP network prefix of /12, for example, can be used to address 1,048,576 former
Class C addresses. CIDR addresses reduce the size of routing tables and make more IP addresses available
within organizations. CIDR is also called supernetting
Q:What does the ping 192.168.0.1 -l 1000 -n 100 command do?
A:The ping command will send roundtrip packets to a destination ( other PC, router, printer, etc.) and see
how long it takes. The 192.168.0.1 is the destination ( which, by the way is a typical default IP address of a
router. ) The -l 1000 is how big the packet should be in bytes. The default is 32, if the -l parameter is not
used. And the -n 100 is saying to send, it 100 times. The default is 4, when this parameter is not used.
Q:Describe the role of the routing table on a host and on a router.
a:In internetworking, the process of moving a packet of data from source to destination. Routing is usually
performed by a dedicated device called a router. Routing is a key feature of the Internet because it enables
messages to pass from one computer to another and eventually reach the target machine. Each intermediary
-www.rlidz.blogspot.com -
4|Page
computer performs routing by passing along the message to the next computer. Part of this process involves
analyzing a routing table to determine the best path.
(row´ter) (n.) A device that forwards data packets along networks. A router is connected to at least two
networks, commonly two LANs or WANs or a LAN and its ISP’s network. Routers are located at gateways,
the places where two or more networks connect. Routers use headers and forwarding tables to determine the
best path for forwarding the packets, and they use protocols such as ICMP to communicate with each other
and configure the best route between any two hosts.Very little filtering of data is done through routers .
Q:What are routing protocols? Why do we need them? Name a few.
A:Routing protocol is a protocol that specifies how routers communicate with each other to disseminate
information that allows them to select routes between any two nodes on a network. Typically, each router
has a prior knowledge only of its immediate neighbors. A routing protocol shares this information so that
routers have knowledge of the network topology at large.
The term routing protocol may refer more specifically to a protocol operating at Layer 3 of the OSI model
which similarly disseminates topology information between routers. Many routing protocols used in the
public Internet are defined in documents called RFCs.
There are three major types of routing protocols, some with variants: link-state routing protocols, path
vector protocols and distance vector routing protocols.
The specific characteristics of routing protocols include the manner in which they either prevent routing
loops from forming or break routing loops if they do form, and the manner in which they determine
preferred routes from a sequence of hop costs and other preference factors.
• IGRP (Interior Gateway Routing Protocol)
• EIGRP (Enhanced Interior Gateway Routing Protocol)
• OSPF (Open Shortest Path First)
• RIP (Routing Information Protocol)
• IS-IS (Intermediate System to Intermediate System)
Q .To monitor ipx traffic on a network, what command would you use?
Show ipx traffic
Q. What command would you use to find out the names of Novell servers on a network?
show ipx servers
Q. “arpa” is used by the Cisco IOS for which encapsulation types?
Ethernet_II
Q. To prevent Service Advertisements (SAPs) from flooding a network, Cisco routers do not
forward them. How are services advertised to other networks?
Each router builds its own SAP table and forwards that every 60 seconds.
Q. Which type of Ethernet framing is used for TCP/IP and AppleTalk?
Ethernet SNAP
Q Which type of Ethernet framing is used for TCP/IP and DECnet?
Ethernet II
Q. Which NetWare protocol works on layer 3–network layer—of the OSI model?
IPX
-www.rlidz.blogspot.com -
5|Page
Q. When using RIP, routing updates are broadcast every ____ seconds.
30
Q. A default route is analogous to?
Default gateway
Q. What does the command “IP name-server 255.255.255.255″ accomplish?
It sets the domain name lookup to be a local broadcast.
Q. How would you configure one host name that points to two IP addresses?
IP host jacob 1.0.0.5 2.0.0.8
Q. Which IP Address Class can have 64,000 subnets with 64,000 hosts per subnet?
Class B
Q. There are two processes to pair MAC address with IP addresses. Which process finds an IP
address from a MAC address?
RARP
Q. Where would network testing be included in an IP packet?
IP Options field
Q. What field tells the Internet layer how to handle an IP packet?
Type of Service
Q. What is the UDP datagram format?
Source Port – 16 bits, Destination Port – 16 bits, Length – 16 Bits, Checksum – 16 bits, Data
Q. What is the function of DDR on Cisco routers?
DDR is dial-on-demand routing. It provides routing for low volume and periodic traffic. It initiates a call to a
remote site when there is traffic to transmit.
Q. When using access lists, what does a Cisco router check first?
The first thing checked is to see if the packet is routable or bridgeable. If it is not, the packet will be dropped.
Q. What do the following statements in an extended access list accomplish?
access-list 101 deny TCP 172.16.4.0 0.0.0.255 172.16.3.0 0.0.0.255 eq 21
access-list 101 deny TCP 172.16.4.0 0.0.0.255 172.16.3.0 0.0.0.255 eq 20
access-list 101 permit TCP 172.16.4.0 0.0.0.255 0.0.0.0 255.255.255.255
This will block ftp traffic since ftp uses ports 20 and 21.
Q. Which protocol for PPP LCP (Link Control Protocol) performs a challenge handshake?
CHAP
Q. Which form of PPP error detection on Cisco routers monitors data dropped on a link?
The Quality protocol monitors data dropped on a link. Magic Number avoids frame looping.
Q. Which protocol for PPP provides load balancing across multiple links?
Multilink Protocol (MP)
Q. Which OSI layer end to end communication, segmentation and re-assembly?
Layer 4 the Transport layer performs this function.
Q. What IP command would you use to test the entire IP stack?
Telnet is an application and it resides at the top of the stack it traverses down the stack and up the stack at
the receiving end.
Q. What is the default bandwidth of a serial connection?
Default bandwidth is T1.
Q. Which OSI layer handles physical address, network topology?
Layer 2 the Data-Link layer performs this function.
Q Which OSI layer establishes, maintains and terminates sessions between hosts?
Layer 5 the Session layer performs this function.
Q. Where Cisco IOS is stored?
By default the Cisco IOS is stored in flash.
-www.rlidz.blogspot.com -
6|Page
-www.rlidz.blogspot.com -
7|Page
-www.rlidz.blogspot.com -