CoolInterview.com - World's Largest Collection of Interview Questions
Start Your Own website Now
Sponsored Links

Interview Questions
Our Services

Get 9,000 Interview Questions & Answers in an eBook.


  • 9500+ Pages
  • 9000 Question & Answers
  • All Tech. Categories
  • 14 MB Content

    Get it now !!



    Send your Resume to 6000 Companies


  • Advertisements CCNA Certification Exam Interview Questions
    COOLINTERVIEW.COM CISCO CERTIFICATION EXAMS INTERVIEW QUESTIONS CCNA CERTIFICATION EXAM INTERVIEW QUESTIONS QUESTIONS LISTING

    CCNA Certification Exam Interview Questions & Answers

    Below we have listed all the CCNA Certification Exam Interview Questions and answers. Feel free to comment on any CCNA Certification Exam Interview Questions or answer by the comment feature available on the page.

    To buy an eBook containing 9000 Interview Questions, with Answers, Click Here.

    1 2 3 4 5 6 Next

    Sort By :   Latest First  |  Oldest First  |  By Rating

    Question
    Rating
    View Answer
    Which routing protocol by default uses bandwidth and delay as metrics?A. RIP B. BGP C. OSPF D. EIGRP
    View Answer
    A single 802.11g access point has been configured and installed in the center of a square office. A few wireless users are experiencing slow performance and drops while most users are operating at peak efficiency. What are three likely causes of this problem? (Choose three.) A. mismatched TKIP encryption B. null SSID C. cordless phones D. mismatched SSID E. metal file cabinets F. antenna type or direction
    View Answer
    What are two reasons that a network administrator would use access lists? (Choose two.) A. to control vty access into a router B. to control broadcast traffic through a router C. to filter traffic as it passes through a router D. to filter traffic that originates from the router E. to replace passwords as a line of defense against security incursions
    View Answer
    CDP is running between two Certkiller devices. What information is supplied by CDP? (Select three) A. Device Identifiers B. Capabilities list C. Platform D. Route identifier E. Neighbor traffic data
    View Answer
    Two routers named Atlanta and Brevard are connected by their serial interfaces as shown in the exhibit, but there is no data connectivity between them. The Atlanta router is known to have a correct configuration. Given the partial configurations shown in the exhibit, what is the problem on the Brevard router that is causing the lack of connectivity? A. A loopback is not set. B. The IP address is incorrect. C. The subnet mask is incorrect. D. The serial line encapsulations are incompatible. E. The maximum transmission unit (MTU) size is too large. F. The bandwidth setting is incompatible with the connected interface.
    View Answer
    23 A company is installing IP phones. The phones and office computers connect to the same device. To ensure maximum throughput for the phone data, the company needs to make sure that the phone traffic is on a different network from that of the office computer data traffic. What is the best network device to which to directly connect the phones and computers, and what technology should be implemented on this device? (Choose two.) A. hub B. router C. switch D. STP E. subinterfaces F. VLAN
    View Answer
    For security reasons, the network administrator needs to prevent pings into the corporate networks from hosts outside the internetwork. Which protocol should be blocked with access control lists? A. IP B. ICMP C. TCP D. UDP
    View Answer
    Refer to the exhibit. Switch-1 needs to send data to a host with a MAC address of 00b0.d056.efa4. What will Switch-1 do with this data? A. Switch-1 will drop the data because it does not have an entry for that MAC address. B. Switch-1 will flood the data out all of its ports except the port from which the data originated. C. Switch-1 will send an ARP request out all its ports except the port from which the data originated. D. Switch-1 will forward the data to its default gateway.
    View Answer
    What is the maximum data rate specified for IEEE 802.11b WLANs? A. 10 Mbps B. 11 Mbps C. 54 Mbps D. 100 Mbps
    View Answer
    CDP is being used throughout the Certkiller network. What are two reasons why the Certkiller network administrator would use CDP? (Choose two) A. To determine the status of network services on a remote device B. To obtain the IP Address of a connected device in order to telnet to the device C. To verify the type of cable interconnecting two devices D. To verify Layer 2 connectivity between two devices when Layer 3 fails E. To obtain VLAN information from directly connected switches F. To determine the status of the routing protocols between directly connected routers G. To support automatic network failover during outages
    View Answer
    A network interface port has collision detection and carrier sensing enabled on a shared twisted pair network. From this statement, what is known about the network interface port? A. This is a 10 Mb/s switch port. B. This is a 100 Mb/s switch port. C. This is an Ethernet port operating at half duplex. D. This is an Ethernet port operating at full duplex. E. This is a port on a network interface card in a PC.
    View Answer
    Which two statements are true about the command ip route 172.16.3.0 255.255.255.0 192.168.2.4? (Choose two.) A. It establishes a static route to the 172.16.3.0 network. B. It establishes a static route to the 192.168.2.0 network. C. It configures the router to send any traffic for an unknown destination to the 172.16.3.0 network. D. It configures the router to send any traffic for an unknown destination out the interface with the address 192.168.2.4. E. It uses the default administrative distance. F. It is a route that would be used last if other routes to the same destination exist.
    View Answer
    Refer to the exhibit. Assuming that the router is configured with the default settings, what type of router interface is this? A. Ethernet B. FastEthernet C. Gigabit Ethernet D. asynchronous serial E. synchronous serial
    View Answer
    Cisco is the leader in the router market space. What basic functions do their routers perform in a network? (Choose two) A. The microsegmentation of broadcast domains B. Path selection C. Packet switching D. Bridging between LAN segments E. Access layer security F. VLAN membership assignment G. Application optimization
    View Answer
    When do we need static IP address?
    View Answer
    When comparing and contrasting the similarities and differences between bridges and switches, which of the following are valid statements? Choose all the valid answer choices) A. Bridges are faster than switches because they have fewer ports. B. A switch is a multiport bridge, C. Bridges and switches learn MAC addresses by examining the source MAC address of each frame received. D. A bridge will forward a broadcast but a switch will not. E. Bridges and switches increase the size of a collision domain. F. None of the above statements are true.
    View Answer
    Refer to the topology and router configuration shown in the graphic. A host on the LAN is accessing an FTP server across the Internet. Which of the following addresses could appear as a source address for the packets forwarded by the router to the destination server? A. 10.10.0.1 B. 10.10.0.2 C. 199.99.9.33 D. 199.99.9.57 E. 200.2.2.17 F. 200.2.2.18
    View Answer
    Which of the following describe the process identifier that is used to run OSPF on a router? (Choose two.) A. It is locally significant. B. It is globally significant. C. It is needed to identify a unique instance of an OSPF database. D. It is an optional parameter required only if multiple OSPF processes are running on the router. E. All routers in the same OSPF area must have the same process ID if they are to exchange routing information.
    View Answer
    Refer to the output from the show running-config command in the exhibit. What should the administrator do to allow the workstations connected to the FastEthernet 0/0 interface to obtain an IP address? A. Apply access-group 14 to interface FastEthernet 0/0. B. Add access-list 14 permit any any to the access list configuration. C. Configure the IP address of the FastEtherent 0/0 interface to 10.90.201.1. D. Add an interface description to the FastEthernet 0/0 interface configuration.
    View Answer
    Which type of attack is characterized by a flood of packets that are requesting a TCP connection to a server? A. denial of service B. brute force C. reconnaissance D. Trojan horse
    View Answer

    1 2 3 4 5 6 Next

    A D V E R T I S E M E N T





    User Options
    Sponsored Links


    Copyright ©2003-2014 CoolInterview.com, All Rights Reserved.
    Privacy Policy | Terms and Conditions

    Download Yahoo Messenger | Placement Papers| FREE SMS | ASP .Net Tutorial | Web Hosting | Dedicated Servers | C Interview Questions & Answers

    Testing Articles | Testing Books | Testing Certifications | Testing FAQs | Testing Downloads | Testing Interview Questions | Testing Jobs | Testing Training Institutes


    Cache = 0.016113 Seconds