42 most asked cisco ccna interview questions and answers 2021

Welcome friends thank you for coming to this content today we will be covering 42 most asked Cisco CCNA interview questions and answers first we will be covering.

Cisco CCNA interview questions and answers on OSI Model & TCP/IP

Question 1 What is OSI Model in Networking?

OSI Model is a reference model which shows how an application communicates in a network, it consist of 7 layers

Layer 1 - Physical Layer (It sets up bit-streams across a network)

Layer 2 - Data Link Layer (It set up links across a physical network)

Layer 3 - Network Layer (It handles addressing & routing data)

Layer 4 - Transport Layer (Used for an end to end communication)

Layer 5 - Session Layer (Used to interhost communicate) 

Layer 6 - Presentation Layer (for data representation & encryption)

Layer 7 - Application Layer (Used to process application)


Question 2 Explain TCP/IP model with OSI Model
  • TCP/IP has 4 layers and OSI Model has 7 layers 
  • The upper most of layer  (4th Application layer) of TCP/IP Model has similar function as OSI Model's upper layer (7th Application, 6th Presentation and 5th Session layer)

  • 3rd Transport layer in TCP/IP is similar to 4th Transport layer in OSI Model.
  • 2nd Internet layer in TCP/IP Model is 3rd Network layer in OSI Model.
  • Lower layer Network layer in TCP/IP has similar functions as OSI Model lower 2 layer ( Physical layer and Data link layer )

Question 3 What is the Data Encapsulation and De-Encapsulation 

As data is passed from the user application down the virtual layer of the OSI Model, each layer adds a header containing protocol information specific to data layer. These header are called protocol data units (PDUs) and the process to adding these headers is called encapsulation.

For example

  • Transport layer protocol (TCP) will add a header containing flow control, Port number and sequencing.

  • The Network layer header contains logical addressing information.
On the receiving device, that Data link layer header is processed and stripped away ( De-Encapsulation ) before being set up to the Network and other upper layers.


CCNA Interview Question and Answer on Topology & Ethernet

Question 4 Explain type of Network Topology 

In network we have mainly three topology

1. Mesh Topology

2. Bus Topology

3. Star Topology


Question 5 What is ethernet? Explain different cabling type

Ethernet is a suite technology which provides data-link and physical specification for controlling access to a shared network medium.

Ethernet can be deployed over three types of cabling.

1. Coaxial cabling - almost entirely deprecate Ethernet networking.
-  ThinNet
-  ThickNet

2. Twisted-pair cable 
-  Cat3- three twists per inch.
-  Cat4- five twists per inch.
-  Cat5e- five twists per inch.
-  Cat6- six twists per inch.

3. Fiber optic cabling
-  Single mode fiber
-  Multi-mode fiber

Question 6 Explain different categories of ethernet


Question 7 
Explain an ethernet frame

  • The absolute minimum frame size for Ethernet is 64 bytes ( or 512 bits ) including headers.
  • A frame that is smaller than 64 bytes will be discarded as a runt. 
  • The required fields in an Ethernet header add up to 18 bytes - thus , the frame payload must be a minimum of 46 bytes , to equal the minimum 64 - byte frame size. 
  • If the optional 4 - byte 802.1Q tag is used , the Ethernet header size will total 22 bytes , requiring a minimum payload of 42 bytes. 
  • By default , the maximum frame size for Ethernet is 1518 bytes – 18 bytes of header fields , and 1500 bytes of payload - or 1522 bytes with the 802.1Q tag. 
  • A frame that is larger than the maximum will be discarded as a giant.


CCNA Interview question and answers on Hub, Switch & Router

Question 8 What is a difference between Repeaters, Hub, Bridge and Switch

Repeaters are the most basic form of forwarding devices . A repeater receives a frame , regenerates an exact copy of the frame and forwards it along its way . They have two ports : an input port and an output port. 

Hubs are multiport repeaters . Whereas a repeater will have two ports ( one in , one out ) , a hub has 24 or more ports . A signal is delivered to any port is regenerated and forwarded out all ports. 

A bridge is a different than a repeater or a hub because it can examine frames . The ability to read MAC addresses gives it the ability to make intelligent decisions about forwarding packets . 

Switches are similar to bridges . Switches assist packet forwarding by creating a collision domain on each switched port . A table is built containing this map , which allows the switch to forward traffic only to the port attached to the destination node.


Question 9 Explain MAC Address table in ethernet switches

Ethernet switches build MAC address tables through a dynamic learning process.  The switch will build the MAC address table by checking the source MAC address of each frame.

In this example:-

When Comp A sends a frame to Comp B, the switch will add Comp A's MAC address to its table, associating it with port fa0 / 10.  However, the switch will not learn CompB's MAC address until CompB sends a frame to CompA, or to another device connected to the switch.  
Switches always learn from the source MAC address in a frame.

Question 10 Explain Collision Domain and Broadcast Domain

Question 11 What is multilayer switching?

Multilayer switching refers to any switch that forwards traffic at layers higher than Layer 2 .  A Layer 3 switch is considered as a multilayer switch, as it forwards frames at Layer 2 and packets at Layer 3.  

A Layer - 4 switch provides the same functions as a Layer - 3 switch , but will also examine and cache Transport 4th OSI layer application flow information , such as the TCP or UDP port

Question 12 What is the STP (Spanning tree protocol).

Spanning Tree Protocol (STP) runs on Layer 2 of OSI Model which runs on bridges and switches.  The main function of STP is to ensure that no loops are created when there are redundant paths in your network .  A failure of your primary link activates the backup links so that users can continue to use the network.  Without Spanning Tree Protocol on the bridges and switches, the failure can result in a loop.  

Spanning Tree Protocol creates a tree that spans all the switches in an extended network .  STP switches exchange Bridge Protocol Data Units (BPDU's) to build the topology database.  BPDU's are forwarded out all ports every two seconds.  

STP topology gets build in a multistep convergence process : 

• A Root Bridge is selected 

• Root ports are identified 

• Designated ports are selected 

• Ports are placed in a blocking state , to eliminate loops



Question 13 What are the commands to check cisco switch basic configuration.

To check running config
Switch#show running config

To check the startup config.
Switch#show startup-config

To display cisco ios version.
switch#show version

To check VLAN information.
Switch#show vlan

To examine flash memory.
Switch#show flash


CCNA interview questions answers on Switch or VLANs 


Question 14 what is VLAN? 

A Switch can be logically segmented into separate broadcast domains, using Virtual LANS (or VLANS). 

Each VLAN represents unique broadcast 
• Traffic between devices within the same VLAN is switched. 
• Traffic between devices in different VLANS requires a Layer-3 device to communicate. 

In below example 4 hosts are connected to a Layer 2 switch with VLAN's 

• Host A and Host B belong to VLAN 100 
• Host C and Host D belong to VLAN 200 

Question 15 What are the advantages of VLAN? 

VLANS provide the many advantages:
• Control - eliminates unnecessary broadcast traffic, improving network performance
• Flexibility - Allowing a user or device to exist anywhere.
• Security - logically separates users and departments to separate logical access.

Question 16  What are types of VLAN ports?

Cisco switch has two types of VLAN ports Access port & Trunk port: 

Access port 
An Access port belongs to and carries the traffic of only one VLAN. We can pass only single VLAN information. It is used to connect switch ports with computers with minimum speed 10Mbps. 

TRUNK PORT
A Trunk port is used for multiple connections between switch to routers and switch to switch, Switch to router- minimum speed:100mbps. It is used for inter VLAN communications, when connected with the router. 

Question 17  What are the commands to assign VLAN Access and Trunk Port in Switches? 

To configure an interface as a access port:

Switch(config)# interface gi1/1 
Switch(config-if)# switchport mode access 
Switch(config-if)# switchport access VLAN 10 

To manually configure an interface as a trunk port:

Switch(config)# interface gi2/1 
Switch(config-if)# switchport mode trunk 
Switch(config-if)# switchport trunk encapsulation dot1q 

Question 18 What is a Native VLAN? 

Native VLAN determines the VLAN that untagged traffic belongs to. By default, on all trunking ports, the native VLAN is VLAN 1. Only one native VLAN can be assigned to a trunk port. All untagged traffic received on this port will become member of native VLAN. 

Command to configure Native VLAN
Switch(config)#interface gi2/2 
Switch(config-if)#switchport mode trunk 
Switch(config-if)#switchport trunk native vlan 20

CCNA interview questions answers on VTP 

Question 19 What is VLAN Trunking Protocol (VTP)? 

VLAN Trunk Protocol reduces administration in a switched network. When you configure a new VLAN on one VTP server, the VLAN is distributed through all switches in the domain which reduces the need to configure the same VLAN everywhere. 

VTP requires that all switches join a VTP domain. Switches must belong to the same domain to share VLAN information. 

Question 20 Explain different modes of VTP? 

VTP has three modes as below

1. SERVER MODE

Full control over VLAN creations and modifications for their domains.

2. CLIENT MODE 

VTP clients do not allow the administrator to create, change or delete any VLAN's; instead they listen to the VTP's advertisements from other switches and modify their VLAN configuration accordingly.

3. TRANSPARENT MODE

VTP transparent mode switches will not participate in VTP advertisements. It can create and delete VLAN's that are local only to itself. It will not propagate to other switches, and will not advertise own VLAN configuration 

Question 21 What are the commands to configure VTP? 

Below are the commands to configure VTP 

Switch(config)# vtp domain xyz.com -----Domain Name 
Switch(config)# vtp mode server 
Switch(config)# vtp mode client 
Switch(config)# vtp mode transparent 
Świtch(config)# vtp password ABC123 -----Password

Question 23 What is VTP Pruning? 

Switches belong to only one broadcast domain. A Layer 2 switch forward both broadcasts and multicasts out every port in the same VLAN. 

This sends out broadcasts out trunk ports to other switches, which will in turn flood that broadcast out all ports in the same VLAN. 

VTP pruning stops unnecessary broadcast or multicast traffic in switching infrastructure. 

CCNA Interviews questions and answers on IP address & NAT 

Question 24 Explain IP Address & Subnet Mask 

What is the IP Address:

IP Address is a decimal 32 bit structure which provides logical addressing for hosts. An IP address helps identify a host, and what network that host exists on. An IP address is comprised of four octets, separated by periods. Each octet is an 8-bit number, resulting in a 32-bit IP address. 

IP provides two fundamental Network layer services: 

1. Logical addressing - provides a unique address that identifies both the host, and the network 

2. Routing - determines the best path to a particular destination Network 

What is the Subnet Mask

Part of an IP address identifies the network. The other part of the address identifies the host. A subnet mask is required to provide this distinction: Example 255.255.255.0 

Question 25 Explain Public vs Private IP Address

A private address is for internal use within a home or organization, and can be freely used by anyone. Private addresses can never be routed on the Internet. In fact, Internet routers are configured to immediately drop traffic with private addresses. 

Three private address ranges class.

A public address can be routed on the Internet. It must be Internet accessible must be configured with reachability from outside world. Allocation of public addresses is governed by the Internet Assigned Numbers Authority (IANA). 

• Class A - 10.x.x.x /8 

• Class B - 172.16.x.x /12 

• Class C - 192.168.x.x /24 

Question 26 What is Network Address Translation (NAT)? 

Network Address Translation (NAT)

NAT allows a host configured with a private address to be stamped with a public address, it allows that host to communicate across the Internet. 

It is possible to translate multiple privately-addressed hosts to a single public address, which conserves the public address space

Question 27 Explain different Types of NAT 

NAT can be implemented using one of three methods

Static NAT - It performs a static one on one translation between two addresses, or between a port on one address to a port on another address. Static NAT is mostly used to assign a public address to a device behind a NAT featured firewall or router.

Dynamic NAT – It utilizes a pool of global addresses to dynamically translate the outbound traffic of clients behind a NAT-enabled device. 

NAT Overload or Port Address Translation (PAT) - translates the outbound traffic of clients to unique port numbers of a single global address. PAT is important when the number of internal clients exceeds available global addresses.

CCNA Interview question and answers on Subnetting

Question 28 Explain Classless Inter-Domain Routing (CIDR) 

Classless Inter-Domain Routing (CIDR) is a method of representing a subnet mask. CIDR identifies the number of binary bits set to a 1 (or on) in a subnet mask

- A network using its default subnet mask is termed to as a classful network. 

- A networking using subnetting in subnet mask is referred to Classless network.


Question 29 Explain Subnetting 

Subnetting is the process of creating new networks (or subnets) by stealing bits from the host portion of a subnet mask. 

Stealing bits from hosts creates more networks but fewer hosts per network.

Consider the following Class C network

192.168.252.0 The default subnet mask for this network is 255.255.255.0

This single network can be segmented, or subnetted, into multiple networks.

CCNA interview question and answers on ARP, TCP/UDP 

Question 30 What is ARP?

Address Resolution protocol (ARP)

ARP allows a host to determine the MAC address for particular destination IP address.


Question 31 Explain UDP & TCP Protocol 

TCP & UDP are part of The Transport layer (OSI Layer 4), This layer is responsible for the reliable transfer of data, by ensuring that data arrives at its destination error-free and in order. 

Transport layer communication falls under two categories: 

O Connectionless (UDP) - requires no connection before data is sent. Connection-oriented protocols provide several important services: 

O Connection-oriented (TCP) – requires that a connection with specific agreed-upon parameters be established before data is sent. 

- Connection establishment - connections are established, maintained, and ultimately terminated between devices. 

- Segmentation and sequencing - data is segmented into smaller pieces for transport. Each segment is assigned a sequence number, so that the receiving device can reassemble the data on arrival. 

- Acknowledgments - receipt of data is confirmed through the use of acknowledgments. If a segment is lost, data can be retransmitted to guarantee delivery. 

- Flow control (or windowing) - data transfer rate is negotiated to prevent congestion

Question 32 list important TCP/UDP port no

Question 33 Explain TCP Three-Way Handshake 

TCP forms three-way handshake to setup a TCP connection. Control messages are passed between the two hosts as the connection is set up: 

• Host A sends a SYN (short for synchronize) message to Host B to initiate a connection. 

• Host B responds with an ACK (short for acknowledgement) to Host A's SYN message, and sends its own SYN message. The two messages are combined to form a single SYN+ACK message. 

• Host A completes the three-way handshake by sending an ACK to Host B's SYN.


Question 34 Explain IPV6 Address 

The IPV6 Address : 

The IPV6 address is 128 bits, as opposed to the 32-bit IPV4 address. Also unlike IPV4, the IPV6 address is represented in hexadecimal notation, separate by colons. 

An example of an IPV6 address would be.

 1254:1532:26B1:CC14:0123:1111:2222:3333

Each “grouping" (from here on called fields) of hexadecimal digits is 16 bits, with a total of eight fields.

CCNA interview question and answers on Routing

Question 35 explain difference between IGP and EGP protocol


Question 36 What is difference between static and dynamic routing?


Question 37 What is the default AD values of routing protocol?


Question 38 What is RIB and FIB in Routing Table? 

FIB is the Forwarding Table 

FIB contains destinations and the interfaces to get to those destinations. It is used by the router to figure out where to send the packet. 

RIB is the Routing Table 

RIB contains a list of all the destinations and the various next hops used to get to those destinations. One destination can have lots of possible next hops but only the best next-hop goes into the FIB.

Question 39 What are the advantage & disadvantage of OSPF?


Question 40 What is Loopback interface in cisco router? 

LOOPBACK INTERFACE- is a logical interface in cisco router, This interface is not a physical interface like Fast Ethernet or Gigabit Interface in Cisco router. 

They are used as termination points for remote source-route bridging (RSRB) and data link switching plus (DLSW+), This virtual interface is always up even if physical interface is down. 

Loopback interface is used to emulate a physical interface, by default cisco router doesn't have loopback interface it needs to be created using below command: 

Router(Config)#int loopback <loopback_interface_number> 
Router(Config-if)#ip address <ip_address> <subnet_mask>

Question 41 What is CDP (cisco Discovery Protocol)? 

CDP is Cisco discovery protocol which is cisco proprietary. It is used to share information about other directly connected Cisco equipment's. 

Below the its functions 
  • It is a layer 2 Data link layer protocol.
  • It works based on MAC addresses (device hardware address).
  • It is used to find adjacent connected Cisco devices. 
What information does CDP finds? 
  • IP addresses, 
  • Port numbers, 
  • IOS details, 
  • Router models.

Question 42 What is HSRP (Hot Standby router Protocol)? 

HSRP (Hot Standby Router Protocol) is redundant protocol developed by Cisco to provide gateway level redundancy without performing any additional configuration on end devices in network. 

HSRP Active and Standby routers send hello packets for communication over UDP protocol. These hello messages are forward to multicast address 224.0.0.2 to communicate between routers in HSRP. 

HSRP provides backup to a router in the event of failure.

42 most asked cisco ccna interview questions and answers 2021 42 most asked cisco ccna interview questions and answers 2021 Reviewed by YourOnlineZone on 30 June Rating: 5
Powered by Blogger.