Escolar Documentos
Profissional Documentos
Cultura Documentos
Routers:
SERIES MODELS
Each series will have different models Each models will have
different features or functions
700 701,702,703,704,710 (supports ISDN
Technology)
800 801,803,805,810 (supports ISDN+Leased
line connection)
1000 1001,1003,1010,1011,1015
1100 1101,1102,1102,1115
1400 1401 - 1411
1600
1700
2500
2600
3600
4000
5000
7000
Rohit Agarwal
QUESTIONS COMPILED ON CCNA
12000GSR
Gigabit Switched Routers
Products of Cisco:
Router
Switches
Bridges
Brouters
Repeaters
PIX – Packet Information Exchange
VPN Concentrator
AAA Server – Authentication, Authorizing, Accounting Server
IDS – Intrusion Detection System
Policy Manager
Fibre Optics
CRS – Carrier Routing System (provides 9.6TeraBytes per second)
CMTS or UBR – Cable Modem Terminating System
Network
Connection of two or more nodes over the physical media is called as Network.
Networking
Connection of two or more nodes over the physical media and sharing the
resources is called as Networking.
Types of Network:
1.Peer-to-Peer Network
Peer meaning client, Operating system used as client are win95, 98,NT4.0
Workstation, Win2000 prof, ME, XP prof.
Workgroup is a small group of computers where no centralized administration
and no security is provided.
Rohit Agarwal
QUESTIONS COMPILED ON CCNA
Media:
There are 2 types of media
Guided media (wired media)
UnGuided media (wireless media)
Co-axial cable
← Maximum Distance 500mts
Rohit Agarwal
QUESTIONS COMPILED ON CCNA
← Low response
← Less attenuation
← Speed 10Mbps
← Communication done is half duplex
← Connection done using BNC – Bayonet Neil Concellmen Connector
← Registered Guage Standard (RG)
RG 9,11,12 Thinnet Coaxial Cable
RG 58 Thicknet Coaxial Cable
RG 58/U, RG 58A/U Military Network
RG 59 Dish Network
RG 62 Arc Net
Rohit Agarwal
QUESTIONS COMPILED ON CCNA
Rohit Agarwal
QUESTIONS COMPILED ON CCNA
Microwaves
Electromagnetic Waves > 1Mhz
Radio Waves
Introduced in 1998 for computers
Electromagnetic Waves < 1Mhz
Maximum frequency available now is 2Ghz
Protocols
A set of rules for a particular type of communication.
Connection Oriented
Follows the same path for data transfer
Acknowledgement
Reliable
e.g. TCP, SPX, AppleTalk datagram protocol
Connectionless Oriented
Follows the path where less traffic is found
No Acknowledgement
Non-Reliable
e.g. IP, IPX, UDP, AppleTalk protocol
Standards
Two types of Standards
Defacto Standard
Dejuire Standard
Defacto Standard
Standard widely used by all is called as Defacto Standard.
Rohit Agarwal
QUESTIONS COMPILED ON CCNA
Dejuire Standard
Standard defined by an organization is called as Dejuire Standard.
Network Segmentation
Breaking up a larger network into a number of smaller ones is called as
Network Segmentation and is accomplished using Routers, Switches and
Bridges.
Broadcast Domain
A group of devices receiving broadcast frames initiating from any device
within the group.
Collision Domain
The network area in Ethernet over, which frames that have collided and
damaged.
Rohit Agarwal
QUESTIONS COMPILED ON CCNA
Broadcast Storms
An undesired event on the network caused by the simultaneous transmission of
any number of broadcasts across the network.
Multicasting
Any communication between a single sender and multiple receivers.
ARP
Address Resolution Protocol, the protocol that traces IP addresses to MAC
addresses.
IPX
Internetwork Packet Exchange, layer 3 protocol used in Novell Netware networks
for transferring information from servers to workstations.
Router
It’s a layer 3 device that connects 2 different networks and routes packets of
data from one network to another. It breaks up Broadcast domain as well as
Collision Domain.
Advantages of Router
Router don’t forward Broadcasts by default.
Perform access control on the traffic that flows through the router i.e.
Packet Filtering.
Network Address Translation.
Quality of Service for particular network traffic.
Can be used as a DHCP relay agent.
Connects different VLAN’s.
Rohit Agarwal
QUESTIONS COMPILED ON CCNA
Hub:
Hub operates at Layer 1 Physical Layer
No Filtering
No Addressing
Hub creates single collision domain and single broadcast domain
Make forwarding to all the ports when signal is arrived
Rohit Agarwal
QUESTIONS COMPILED ON CCNA
A utility that verifies connections to one or more remote hosts. The ping
command uses the ICMP echo request and echo reply packets to determine
whether a particular IP system on a network is functional. Ping is useful
for diagnosing IP network or router failures.
What is RAID?
A method used to standardize and categorize fault-tolerant disk
systems. RAID levels provide various mixes of performance, reliability,
and cost. Some servers provide three of the RAID levels:
Level 0 (striping)
Level 1 (mirroring)
Level 5 (striping & parity).
Rohit Agarwal
QUESTIONS COMPILED ON CCNA
Rohit Agarwal
QUESTIONS COMPILED ON CCNA
Server-based Network
Provide centralized control of network resources and rely on server
computers to provide security and network administration
Router
It’s a layer 3 device that connects 2 different networks and routes packets
of data from one network to another. It breaks up Broadcast domain as
well as Collision Domain.
What is Brouter?
It’s a Hybrid device that combines the features of both bridges and routers.
What is Subnet?
A subdivision of an IP network.
Rohit Agarwal
QUESTIONS COMPILED ON CCNA
What is Beaconing?
An FDDI frame or Token Ring frame that points to serious problem with
the ring, such as a broken cable. The beacon frame carries the address of
the station thought to be down.
What is Cladding?
A layer of a glass surrounding the center fiber of glass inside a fiber-
optic cable.
What is Attenuation?
In communication weakening or loss of signal energy, typically caused
by distance.
Rohit Agarwal
QUESTIONS COMPILED ON CCNA
What is ICMP?
ICMP – Internet Control Message Protocol
It is a Network Layer Internet protocol, which can report errors and status
information. We can use the ping command to send ICMP echo request
messages and record the receipt of ICMP echo reply messages. With these
messages, we can detect network or host communication failures and
troubleshoot common TCP/IP connectivity problems.
What is the difference between TFTP and FTP application layer protocols?
TFTP – Trivial File Transfer Protocol
A stripped down version of FTP, easy to use and fast. TFTP has no
Directory browsing, no Authentication and insecure it can only send and
receive files.
Rohit Agarwal
QUESTIONS COMPILED ON CCNA
What MAU?
MAU – Multistation Access Unit
Rohit Agarwal
QUESTIONS COMPILED ON CCNA
What is Kerberos?
An authentication mechanism used to verify user or host identity.
Kerberos uses encryption to prevent intruders from discovering passwords
and gaining unauthorized access to files.
Rohit Agarwal
QUESTIONS COMPILED ON CCNA
password.
Routing updates are sent as Multicast addresses i.e.
224.0.0.5 – SPF (all OSPF routers)
224.0.0.6 – Designated router and Backup Designated router
OSPF maintains 3 types of Routing table i.e.
← Routing Table (Dijisktra)
← Topology Table (SPF)
← Neighborship Table.
In OSPF Routers can be connected in two methods i.e.
← Point-to-Point Link
← Point to Multipoint Link
In OSPF a single large Autonomous system is break into small areas.
There should be atleast one area by name Area 0. It’s called as Backbone
Area.
The Router that connects more than one Area is called as Area Border
Routers.
The Router that connects to other Autonomous system is called as
Autonomous System Boundary Router.
Router ID
If the priority is set 1 to all the routers then there is a tie in priority, in
this case it will check if there is any loopback address is given to any
router if not the router with highest value of IP address will be elected as
Router ID.
This router will be then called as Designated Router and the router with
less value of IP address after Designated Router will be called as Backup
Designated Router.
If a Router has all interfaces existing in single area than that router is
called as Internal Router.
Whenever a router send routing updates to DR and BDR it uses
Destination address as 224.0.0.6 and when DR send updates to all the
routers it uses Destination address as 224.0.0.5.
In OSPF routing updates are called as Link State Advertisements.
If an OSPF router wants to send updates to other OSPF router then it
should carry 3 requirements i.e.
Hello Packets Received
Rohit Agarwal
QUESTIONS COMPILED ON CCNA
Adjacency Built
If both router interfaces belongs to same Area, same Password then Hallo
and Dead Intervals should be set same.
Neighborship Built
If both routers are adjacent to each other then Neighborship is built in
Routers.
When one routerRA sends updates i.e. Link State Advertisements to other
routerRB it will send that update to Topology Database of routerRB and
will run an algorithm SPF on routerRB to create a new Topology Table.
After that Dijisktra Algorithm is run to find the best path and that entry
will be put in Routing Table.
The router when sends Hallo packets to other router a Neighborship Table
is set on that Router.
Rohit Agarwal
QUESTIONS COMPILED ON CCNA
path selection.
Supports maximum 15 Hops.
Supports 6 paths if there is a tie in metric i.e. same metric.
RIP Timers
Route update timer – 30seconds
Route invalid timer – 180 seconds
Holddown timer – 180 seconds
Route flush timer – 240 seconds
What are the advantages and disadvantages of the three types of routing
tables?
Rohit Agarwal
QUESTIONS COMPILED ON CCNA
address and waits for a reply from a server that gives it the IP address.
How do Data Link layer addresses and Network addresses differ? Give a
description of each.
Besides the names suggesting that addresses reside at different layers,
other differences do exist. Data Link layer addresses are assigned by the
manufacturer and identify the actual hardware device. A Network layer
address is a logical address assigned by the network administrator to
identify a device running a Network layer protocol, such as IP.
Rohit Agarwal
QUESTIONS COMPILED ON CCNA
only the first six bytes of the frame before forwarding it.
Name the Cisco proprietary protocol used on Fast Ethernet VLAN trunk
links.
ISL (Inter-Switch Link) protocol is used to encapsulate VLAN traffic over
Fast Ethernet trunk links.
What two basic steps are necessary to create access list filters?
The first step is to build the list at global configuration mode using the
access-list command followed by an access list number signifying the
type. The second step is to apply the list to an interface by using the
[protocol type] access-group command followed by the access list number
and parameters.
Identify the appropriate access list range values used to create access lists.
Rohit Agarwal
QUESTIONS COMPILED ON CCNA
How does the direction in which an access list is applied affect datagram
processing?
Access lists applied to an interface in an inbound direction determine
whether a datagram received on an interface will be forwarded or blocked.
Access lists applied to an interface in an outbound direction determine
whether a datagram already received will be forwarded out that interface.
Rohit Agarwal
QUESTIONS COMPILED ON CCNA
Rohit Agarwal
QUESTIONS COMPILED ON CCNA
Choose the devices that are used for Data Link layer segmentation.
← Concentrators and switches
← Routers and bridges
← Bridges and switches
← Bridges and hubs
Answer A is incorrect because concentrators reside at the Physical layer
and switches at the Data Link layer.
Answer B is incorrect because routers are level 3 devices and bridges are
level 2 devices.
Answer C is correct because bridges and switches reside at the Data Link
layer.
Answer D is incorrect because bridges reside at the Data Link layer and
hubs at the Physical layer.
Rohit Agarwal
QUESTIONS COMPILED ON CCNA
Rohit Agarwal
QUESTIONS COMPILED ON CCNA
← Set up an Intra-LAN.
← Set up a workgroup banded by a server cluster.
← Set up a VLAN to isolate traffic.
← Set up a firewall to isolate traffic.
Answers A and B are incorrect because they are simply false.
Answer C is correct because each VLAN becomes its own broadcast
domain.
Answer D is incorrect because a firewall is meant to shelter internal
networks from intrusion from the outside.
Rohit Agarwal
QUESTIONS COMPILED ON CCNA
Rohit Agarwal
QUESTIONS COMPILED ON CCNA
Rohit Agarwal
QUESTIONS COMPILED ON CCNA
VTP (Virtual Trunking Protocol) exists at which layer and for what
purpose?
← Layer 2, to maintain VLAN configuration consistency
← Layer 2, to maintain trunking protocol synchronization
← Layer 2, to maintain domain synchronization
← Layer 3, to maintain access lists
Answer A is correct because VTP operates at layer 2 and maintains
VLAN configuration consistency.
Although the OSI layer is correct, answers B and C are incorrect because
the second portion of the answers is incorrect.
Answer D is incorrect because VTP and switching do not operate at layer 3
and access lists are maintained on routers.
Rohit Agarwal
QUESTIONS COMPILED ON CCNA
← 0.0.255.255
← 255.255.255.0
Answer A is correct because, if unspecified, the default mask used is
0.0.0.0.
Answers B and C are incorrect because neither are the default mask.
Answer D is incorrect because it is a regular mask, which is not used for
wildcard masking.
Write the command that would apply access list 100 to interface E0 in an
outbound direction. (Assume you are already at interface configuration
mode of the Ethernet interface.)
← IP access-group 100 out
← IP access-list 100 out
← IP access-group 100 in
← IP access-group E0 out
Answer A is correct because IP access-group 100 out is the command that
would apply access list 100 to interface E0 in an outbound direction.
Answers B, C, and D are simply incorrect.
Rohit Agarwal
QUESTIONS COMPILED ON CCNA
permit statement and also is using the host keyword with the destination
network.
Answer D is correct because it uses a valid access list number and syntax
to forward ICMP echo requests.
Write the command to view all access lists created on your router
regardless of protocol.
← show access-lists
← show ip access-lists
← show ipx interfaces
← show ipx servers
Answer A is correct because show access-lists enables you to view all
access lists created on your router regardless of protocol.
Answers B, C, and D are incorrect because these commands do not enable
you to perform that specific function.
Which of the following best describes the function of the following access
list line?
← Access-list 87 permit 145.19.2.1 0.0.0.0 155.6.0.0 0.0.255.255
← Any host on subnet 155.6.0.0 can access host 145.19.2.1.
← It is an IPX standard access list allowing host 145.19.2.1 to access
any host on subnet 155.6.0.0.
← It is an extended IP access list allowing hosts on network
145.19.0.0 to access hosts on network 145.19.0.0, which can access host
155.6.255.255.
← It is an IP standard access list enabling host 145.19.2.1 to access
any host on subnet 155.6.0.0.
Answers A and C are incorrect because they do not state the actions of
this access list correctly.
Answer B is incorrect because this is not an IPX standard list.
Answer D is correct because it correctly describes the access list behavior.
Rohit Agarwal
QUESTIONS COMPILED ON CCNA
Which command can you use to display a list of access list filters
configured on your router for IP only?
← show IP access-lists
← show access-lists
← show IPX interfaces
← show IPX servers
Answer A is correct because show IP access-lists enables you to display a
list of access list filters configured on your router for IP only.
Answers B, C, and D are incorrect because these commands do not enable
that specific function.
Write the command to bind IPX extended access list 901 to interface serial
0 on an inbound direction.
← IPX access-group 901 in
← IPX access-group 901 S0 out
← IPX access-group 910 in
← IPX access-group 901 out
Answer A is correct because IPX access-group 901 in is the command that
will bind the IPX extended access list 901 to interface serial 0 on an
inbound direction.
Answers B, C, and D are incorrect because they are simply false.
Which two of the following commands will enable Telnet traffic from all
hosts on network 166.10.0.0 to be forwarded to the Telnet server
137.2.10.1?
← Access-list 110 permit TCP 166.10.0.0 0.0.255.255 host 137.2.10.1
Rohit Agarwal
QUESTIONS COMPILED ON CCNA
eq Telnet
← Access-list 99 permit TCP 166.10.0.0 0.0.255.255 137.2.10.1
0.0.0.0. eq 23
← Access-list 110 permit TCP 166.10.0.0 0.0.255.255 137.2.10.1
0.0.0.0 eq 23
← Access-list 110 permit IP 166.10.0.0 0.0.255.255 137.2.10.1
0.0.0.0. eq 23
Answers A and C are correct. The only difference between the two is that
Answer A uses the host keyword and the Telnet keyword instead of a port
number.
Answer B is incorrect because the access list number is 99, which is used
for standard lists.
Answer D is incorrect because it uses IP instead of TCP after the permit
statement.
Rohit Agarwal