Username Privilege Levels Finally, a username can have a privilege level associated with it. This is useful when you want specific users to default to higher privileges. The username privilege com- mand is used to set the privilege level for a user: Router#config terminal Enter configuration commands, one per line. End with CNTL/Z. Router(config)#username […]
Category Archives: Cisco
Physical layer : This layer deals with the physical connection between two points. This is the lowest layer, whose primary role is communicating raw bit streams. This layer is also responsible for activating, maintaining, and deactivating these bit-stream communications. Data-link layer : This layer deals with actually transferring data between two points. In contrast with […]
Technical Interview Questions — Networking * What is an IP address? * What is a subnet mask? * What is ARP? * What is ARP Cache Poisoning? * What is the ANDing process? * What is a default gateway? What happens if I don’t have one? * Can a workstation computer be configured to browse […]
Network engineer/architect interview questions —————————————————————— Explain how traceroute, ping, and tcpdump work and what they are used for? Describe a case where you have used these tools to troubleshoot. What is the last major networking problem you troubleshot and solved on your own in the last year? What LAN analyzer tools are you familiar with […]
OSPF ======== Describe OSPF in your own words. OSPF areas, the purpose of having each of them Types of OSPF LSA, the purpose of each LSA type What exact LSA type you can see in different areas How OSPF establishes neighboor relation, what the stages are If OSPF router is stucked in each stage what […]
1. User(s) are complaining of delays when using the network. What would you do? 2. What are some of the problems associated with operating a switched LAN? 3. Name some of the ways of combining TCP/IP traffic and SNA traffic over the same link. 4. What sort of cabling is suitable for Fast Ethernet protocols? […]
VPN interview questions: 1.What are the different types of VPN? 2.What requirements should a VPN fulfill? 3.How many ways are there to implement VPN architecture? 4.What are the different ways authentication mechanism in VPN? 5.Can you explain the basic of encryption in VPN? 6.what’s the difference between Symmetric and Asymmetric cryptosystem? 7.what are the different […]
1. What are 10Base2, 10Base5 and 10BaseT Ethernet LANs 10Base2–An Ethernet term meaning a maximum transfer rate of 10 Megabits per second that uses baseband signaling, with a contiguous cable segment length of 100 meters and a maximum of 2 segments. 10Base5–An Ethernet term meaning a maximum transfer rate of 10 Megabits per second that […]
One common port security scenario is to configure a static MAC address on a switchport. If the switch sees a mac address other than the configured address, a violation occurs. By default, the violation action is shutdown.You might use a configuration like this in a college computer lab. Let’s say that you have a printer […]