CCNA

{
  "iq":[{"id":"1",
    "q":"What is Network?",
    "answer":"A network is a set of devices connected by physical media links.A network is recursively is a connection of two or more nodes by a physical link or two or more networks connected by one or more nodes.   "
  },
    {"id":"2",
      "q":"What is a Link? ",
      "answer":"A link refers to the connectivity between two devices.It includes the type of cables and protocols used in order for one device to be able to communicate with the other.  "
    },
    {"id":"3",
      "q":"What is a node?",
      "answer":"A network can consist of two or more computers directly connected by some physical medium such as coaxial cable or optical fiber.\n\nSuch a physical medium is called as Links and the computer it connects is called as Nodes."
    },

    {"id":"4",
      "q":"What is a gateway or Router?",

      "answer":"A node that is connected to two or more networks is commonly called as router or Gateway.It generally forwards message from one network to another. "
    },
    {"id":"5",
      "q":"What is point-point link? ",
      "answer":"If the physical links are limited to a pair of nodes it is said to be point-point link."
    },
    {"id":"6",
      "q":"What is Multiple Access? ",
      "answer":"If the physical links are shared by more than two nodes, it is said to be Multiple Access.  "
    },

    {"id":"7",
      "q":" What is a gateway or Router?",
      "answer":"A node that is connected to two or more networks is commonly called as router or Gateway. It generally forwards message from one network to another."
    },

    {"id":"8",
      "q":"What are the advantages of Distributed Processing?",
      "answer":"Security/Encapsulation\n\nDistributed database\n\nFaster Problem solving\n\nSecurity through redundancy\n\nCollaborative Processing"
    },
    {"id":"9",
      "q":"What is OSPF?",

      "answer":"OSPF stands for Open Shortest Path First. It is a link state routing protocol that can connect a large number of networks without having any limitation to number of hops. It uses Dijkstra Algorithm and considers Cost as its’ metric. It has AD of 110 and uses the concepts of Areas, Router-id, Process-id and Virtual link for connectivity."
    },

    {"id":"10",
      "q":" What is a LAN?",
      "answer":"LAN is short for Local Area Network. It refers to the connection between computers and other network devices that are located within a small physical location."
    },

    {"id":"11",
      "q":"What is Routing?",

      "answer":"Routing is a process of exchanging route information form one router to another. Without routing it is impossible to connect two or more networks located at different or same geographical areas."
    },

    {"id":"12",
      "q":"What is a Protocol?",
      "answer":"Protocol is set of rules on which a sender and a receiver agrees to transmit the data.Protocols are responsible for data communication in between networks."
    },
    {"id":"13",
      "q":"What is the 2nd layer of OSI layer model?",
      "answer":"Data link layer is the second layer of OSI model."
    },

    {"id":"14",
      "q":"At which layer HUB works?",
      "answer":"HUB work at layer 1 of OSI model"
    },

    {"id":"15",
      "q":"What is the key main difference between Hub and switch?",
      "answer":" Switch works at layer 2 of OSI while hub at layer\n\n1. Switch is commonly used to make separate domain while Hub have no concept of separate domains. "
    },

    {"id":"16",
      "q":"Is HSRP is cisco proprietary or introduced by IEEE?",
      "answer":"HSRP is Cisco’s proprietary"
    },

    {"id":"17",
      "q":"What does HSRP protocol do?",
      "answer":"It provides a high availability of redundant nodes. With HSRP, if one link goes down, another link comes up with in milli-seconds."
    },
    {"id":"18",
      "q":"What is Round Trip Time?",
      "answer":"The duration of time it takes to send a message from one end of a network to the other and back, is called RTT."
    },

    {"id":"19",
      "q":"Which port does RIP use of TCP?",
      "answer":" RIP use port of UDP (not TCP) 520."
    },

    {"id":"20",
      "q":"What is a packet of data?",
      "answer":"It contain source information, destination information, protocol version using. It also contain numeric identification number."
    },
    {"id":"21",
      "q":"What is the POP3 protocol.?",
      "answer":"Post Office Protocol, version 3 is used for accessing the message. POP3 is very simple protocol and has limited functionality. POP has different version but currently version 3 is used. A POP3 server listens on well-known port 110. POP3 supports two types of mode.\n\nDelete Mode: In this mode, the mail is deleted from the mailbox after each retrieval.Keep Mode. The mail remains in the mailbox after retrieval.  "
    },
    {"id":"22",
      "q":"What is Anonymous FTP?",
      "answer":"Some sites provide the functionality that user can access the file with limited access. To access these files, a user does not need to have an account or password. For using FTP, the user enters \"anonymous\" as a user ID and guest as password. Usually, you can enter anything as a password.  "
    },

    {"id":"23",
      "q":"How many VTP modes are in a switch and what are they?",
      "answer":"There are three type of VTP mode, these are Server, client and transparent."
    },{"id":"24",
      "q":"What is Route Poisoning? ",
      "answer":"Route Poisoning is the process of inserting a table entry of 16 to a route, making it unreachable. This technique is used in order to prevent problems caused by inconsistent updates on a route."
    },{"id":"25",
      "q":" What is HDLC?",
      "answer":"HDLC is short for High Level Data Link Control protocol, and is a propriety protocol of CISCO.It is the default encapsulation operated within CISCO routers."
    },{"id":"26",
      "q":"What are packets?",
      "answer":"Packets are the results of data encapsulation.\n\nThese are data that has been wrapped under the different protocols of the OSI layers.\n\nPackets are also referred to as datagrams."
    },{"id":"27",
      "q":"What is DLCI?",
      "answer":"DLCI, or Data Link Connection Identifiers, are normally assigned by a frame relay service provider in order to uniquely identify each virtual circuit that exists on the network."
    },{"id":"28",
      "q":" What is a Frame Relay?",
      "answer":"Frame Relay is a WAN protocol that provides connection-oriented communication by creating and maintaining virtual circuits.It has a high performance rating and operates at the Data Link and Physical Layers."
    },{"id":"29",
      "q":"What is 100BaseFX?",
      "answer":"This is Ethernet that makes use of fiber optic cable as the main transmission medium. The 100 stands for 100Mbps, which is the data speed."
    },{"id":"30",
      "q":" What is DHCP?",
      "answer":"DHCP is short for Dynamic Host Configuration Protocol.\n\nIts main task is to automatically assign an IP address to devices across the network.\n\nIt first checks for the next available address not yet taken by any device, then assigns this to a network device."
    },{"id":"31",
      "q":"What is the purpose of the Data Link?",
      "answer":"The job of the Data Link layer is to check messages are sent to the right device. Another function of this layer is framing."
    },{"id":"32",
      "q":"What are the things that can be accessed in a CISCO router’s identifying information?",
      "answer":"The hostname and the Interfaces. The hostname is the name of your router. The Interfaces are fixed configurations that refer to the router ports.   "
    },{"id":"33",
      "q":"Mention what is BOOTP?",
      "answer":"BOOTP is a computer networking protocol used to deploy an IP address to network devices from a configuration server."
    },
    {"id":"34",
      "q":" Explain what is EIGRP?",
      "answer":"EIGRP stands for Enhanced Interior Gateway Routing Protocol; it is a routing protocol designed by Cisco Systems.\n\nIt is availed on a router to share routes with other routers within the same autonomous system.\n\nUnlike other routers like RIP, EIGRP only sends incremental updates, decreasing the workload on the router and the amount of data that needs to be transferred."
    },

    {"id":"35",
      "q":"Explain why is UDP lease favored when compared to TCP?",
      "answer":"It is because UDP is un-sequenced and unreliable. It is not capable of creating virtual circuits and acknowledgments"
    },
    {"id":"36",
      "q":"Mention what does the clock rate do?",
      "answer":"Clockrate enables the routers or DCE equipment to communicate properly."
    },
    {"id":"37",
      "q":"Mention what command you must use if you want to delete or remove the configuration data that is stored in the NVRAM?",
      "answer":"Erase startup- coding is the command you must use if you want to delete the configuration data that is stored in the NVRAM"
    },{"id":"38",
      "q":"What is Full form of AD?",
      "answer":"Administrative Distance."
    },
    {"id":"39",
      "q":"What is DHCP scope?",
      "answer":"DHCP Scope is the range of IP Addresses from which DHCP server will be assigning IP Addresses to the clients."
    },{"id":"40",
      "q":"What are the different memories used in a CISCO router?",
      "answer":"Flash, RAM, NVRAM and ROM are the memories available in the router."
    },{"id":"41",
      "q":"What is the use of “Service Password Encryption” ?",
      "answer":"Service Password Encryption command encrypts plain text password into type 7 password. These are not very much secure and can be easily decrypted."
    },{"id":"42",
      "q":" In configuring a router, what command must be used if you want to delete the configuration data that is stored in the NVRAM?",
      "answer":"Erase startup-config is the command to delete preconfigured files on the router."
    },
    {"id":"43",
      "q":"How many ports are reserved for special purposes which host services like HTTP, FTP, and POP3 etc.?·",
      "answer":"Ports from 1 to 1024 are reserved for special services and will only be used by system administrator."
    },{"id":"44",
      "q":"How does Hold-downs work?",
      "answer":" Hold-downs prevent regular update messages from reinstating a downed link by removing that link from update messages. It uses triggered updates to reset the hold-down timer."
    },{"id":"45",
      "q":"Explain the benefits of VLANs.",
      "answer":"VLANs allow the creation of collision domains by groups other than just physical location.\n\nUsing VLANs, it is possible to establish networks by different means, such as by function, type of hardware, protocol, among others.\n\nThis is a big advantage when compared to conventional LANs wherein collision domains are always tied to physical location."
    },{"id":"46",
      "q":"What is Bandwidth?",
      "answer":"Bandwidth refers to the transmission capacity of a medium.It is a measure of how much volume a transmission channel can handle, and is measured in Kbps."
    },{"id":"47",
      "q":"How does cut-through LAN switching work?",
      "answer":"In Cut-Through LAN switching, as soon as the router receives the data frame,\n\nit will immediately send it out again and forward it to the next network segment after reading the destination address."
    },{"id":"48",
      "q":"What is IPv6?",
      "answer":"IPv6 , or Internet Protocol version 6, was developed to replace IPv4.\n\nAt present, IPv4 is being used to control internet traffic, butis expected to get saturated in the near future.\n\nIPv6 was designed to overcome this limitation."
    },
    {"id":"49",
      "q":"What is a Frame Relay?",
      "answer":"Frame Relay is a WAN protocol that provides connection-oriented communication by creating and maintaining virtual circuits.\n\nIt has a high performance rating and operates at the Data Link and Physical Layers."
    },{"id":"50",
      "q":"What are the different IPX access lists?",
      "answer":"There are two access lists: Standard and Extended. Standard Access List can only filter the source or destination IP address.\n\nAn Extended Access List uses the source and destination IP addresses, port, socket and protocol when filtering a network."
    }
  ]

}