____________________________________________________________________________________________
Question 1 –
Can we use OSPF without backbone area?
Answer 1 –
Yes, but it will be limited to intra-area (same area) communication. By default, Inter-area communication is not possible without backbone area.
____________________________________________________________________________________________
Question 2 –
What will be the status of Interface Fa0/2 of Catalyst Switch in the below 3 scenarios –
c)
Answer 2 –
a) Blocked (Since Higher Port ID than fa0/1).
b) Err-disabled (due to bpduguard).
c) Loop in network since BPDU filter will filter the BPDUs and allow traffic to flow without blocking the… hence a loop in the network.
____________________________________________________________________________________________
Question 3 –
Router A and Router B are running RIP V2 .Router B is configured to advertise all connected interfaces via RIP v1.Which networks connected to Router B will be advertised to Router A ?
Answer 3 –
10.0.0.0/8 and 192.168.2.0/24
_________________________________________________________________________________________
Question 4 –
Router A and Router B are running RIP V2 .Router B is configured to advertise all connected interfaces via RIP v1.Which networks connected to Router B will be advertised to Router A ?
Answer 4 –
10.0.0.0/8.
Note – 192.168.2.1/23 is a supernet of /24 network. advertising any network prefix less than its classful major network) is not allowed in RIP route summarization
____________________________________________________________________________________________
Question 5 –
A new switch configured as a VTP client, and added to the existing VTP domain. Shortly after switch is connected, the whole network goes down. What could have caused this to happen?
Answer 5 –
The configuration revision of the switch inserted was higher than the configuration revision of the VTP domain
____________________________________________________________________________________________
Question 6 –
I want to use extended VLANs (VLAN IDs 1006-4094) on network switches. What should he VTP mode be set to before configuring extended-range VLANs?
Answer 6 –
Transparent mode
Explanation –
The switch must be in VTP transparent mode when you create extended-range VLANs.Only transparent mode support extended Vlans.Server and Client mode don’t allow to store in vlan database.
____________________________________________________________________________________________
Question 7 –
How much data can be carried in a standard Ethernet frame?
1500 bytes or 1518 bytes
Answer 7 –
1518 bytes
Explanation –
A standard Ethernet frame MTU is 1500 bytes. The MTU size or packet size refers only to Ethernet payload. Ethernet frame size refers to the whole Ethernet frame, including the header and the trailer.
Preamble is not calculated in frame size so DA (6 bytes) SA (6 bytes) Type (2
bytes) data + pad (1500 bytes) FCS (4bytes) = a total of 1518
Note –
A standard Ethernet frame MTU is 1500 bytes. This does not include the Ethernet header and Cyclic Redundancy Check (CRC) trailer, which is 18 bytes in length, to make the total Ethernet frame size of 1518. So the total size of an Ethernet packet can be as large as 1518 bytes, but the maximum payload is only 1500 bytes.
____________________________________________________________________________________________
Question 8 –
802.1Q trunking uses which Ethertype to identify itself?
Answer 8 –
The IEEE 802.1Q specification defines the Ethertype field to be 8100 in the presence of a VLAN ID.
__________________________________________________________________________________________
Question 9–
What option is the best way to apply CIDR if a service provider wants to summarize the following addresses: 200.1.0.0/16, 200.2.0.0/16, 200.3.0.0/16, 200.5.0.0/16, 200.6.0.0/16, 200.7.0.0/16?
Answer 9 –
200.4.0.0/14, 200.2.0.0/15, 200.1.0.0/16
Explanation –
The Network 200.4.0.0/14 will encompass the 200.5.0.0, 200.6.0.0 and 200.7.0.0 networks. The second summarization, 200.2.0.0/15 will take care of both the 200.2.0.0 and 200.3.0.0 networks. Finally, the last network is needed in order to include the only remaining network, which is 200.1.0.0/16. This will summarize all 6 networks using only 3 statements.
___________________________________________________________________________________________
QUESTION 10 –
Under the OSPF process, you type in the “area 1 range” command. Which LSA types will be summarized?
Answer 10 –
A, B
Explanation –
Area range command is used for summarizing routes on the boundary of two OSPF areas.The information to be summarized is contained in two types of LSAs: Type 1 and Type2. Type 1 LSAs are Router LSAs and are generated by each router in an OSPF network. Type 2 LSAs are network LSAs, which are generated by the DR.Both Type1 and Type 2 LSAs are flooded within the originating area only. Only when the information needs to be conveyed to another area in a summarized form area-range command is used, which acts on the information provided by these two LSAs.
____________________________________________________________________________________________
QUESTION 11 –
which 3 BGP attributes will be carried in every BGP update(both IBGP and EBGP)?
Answer 11 –
Origin, AS-Path, Next Hop
____________________________________________________________________________________________
Question 12 –
Router A,B and C are running EIGRP and are EIGRP neighbors.
Router A configuration is shown below –
Router eigrp 1
Network 192.168.10.0
Redistribute connected
Which routes would show up in the routing table of Router B as EIGRP routes?
Answer 12 –
10.0.0.0/8 and 192.168.1.0/24
____________________________________________________________________________________________
Question 13 –
From the perspective of below diagram, which routers will met he feasibility condition for network 192.168.1.0/24.
Answer 13 –
Router B and Router C.
____________________________________________________________________________________________
Question 14 –
From the perspective of below diagram, which routers will be considered –
a) Successor
b) Feasible Successor
For network 192.168.1.0/24
Answer 14 –
Successor is Router B
Feasible Successor is Router C
___________________________________________________________________________________________
Question 15 –
The “Show IP EIGRP neighbor” command is issued on the router A. Router A is configured with the default EIGRP settings. After issuing this command, which of the following RED value is incorrect ?
R1# show ip eigrp neighbors
IP-EIGRP neighbors for process 1
H Address Interface Hold Uptime SRTT RTO Q Seq
(sec) (ms) Cnt Num
0 192.168.1.2 Fa0/0 103 00:01:44 95 570 0 3
Answer 15 –
Hold Time should be between 10-15 and not 103 seconds.
________________________________________________________________________________
Question 16 –
Which IP address maps to the Ethernet multicast MAC address of 01-00-5e-10-20-02 ?
Answer 16 –
239.144.32.2
224.16.32.2
Ethernet interfaces map the lower 23 bits of the IP multicast address to the lower 23 bits of the MAC 0100.5e00.0000. As an example, the IP multicast address 224.0.0.2 is Mapped to the MAC layer as 0100.5e00.0002. HEX 01 = 00-5e (all Multicast Addresses);HEX 10 = 00010000 – could be both 16 and 144 (decimal) due to the fact that we ignore the first bit of the second octet when converting to binary; HEX 20 = 00100000 = 32; HEX 02 = 00000010 = 2
____________________________________________________________________________________________
QUESTION 17 –
What is the primary purpose for the RPF check in IP multicast networks?
Answer 17 –
To prevent multicast traffic looping through the network.
Explanation – Reverse Path Forwarding (RPF) provides loop avoidance. It is an algorithm used to forward multicast packets. The RPF rules are: If a router receives a datagram on an interface that it uses to send unicast packets to the source of that packet, then the packet has arrived on the RPF interface. If the packet arrives on the RPF interface, a router forwards the packet out the interfaces that are present in the outgoing interface list of a multicast routing table entry. If the packet does not arrive on the RPF interface, the packet is silently discarded.
___________________________________________________________________________________________
Question 18 –
In an MPLS network, which protocol is used to distribute traffic engineering information?
Answer 18 –
OSPF Opaque LSAs or IS-IS TLVs
Explanation:
OSPF Opaque LSA provides a generalized mechanism for OSPF to carry additional information. The new information can be used directly by OSPF or indirectly by other applications, which use OSPF to distribute information.
___________________________________________________________________________________
Question 19 –
What is penultimate hop popping (PHP) and what is its use?
Answer 19 –
PHP is the technique for removing the (POP) MPLS label before the egress router. The MPLS label on a switched packet is popped by either the egress router or the penultimate router, depending on your configuration. If you decide to use penultimate hop popping, you essentially terminate the LSP one hop earlier. The MPLS labels are popped by the routers that connect to the egress router, rather than all of them being popped by the same egress router.
____________________________________________________________________________________________________
Question 20 – Explain BGP “Site of Origin” Attribute ?
Answer 20 –
Site of Origin BGP Community Attribute
The site-of-origin (SoO) extended community is a BGP extended community attribute that is used to identify routes that have originated from a site so that the advertisement of that prefix back to the source site can be prevented. The SoO extended community uniquely identifies the site from which a router has learned a route. BGP can use the SoO value associated with a route to prevent routing loops.
FOR MORE INTERVIEW QUESTION PLEASE VISIT:
https://ipwithease.com/shop/
ABOUT THE AUTHOR
I am here to share my knowledge and experience in the field of networking with the goal being – “The more you share, the more you learn.”
I am a biotechnologist by qualification and a Network Enthusiast by interest. I developed interest in networking being in the company of a passionate Network Professional, my husband.
I am a strong believer of the fact that “learning is a constant process of discovering yourself.”
– Rashmi Bhardwaj (Author/Editor)