Top CCNA Interview Interview Questions (2021) - InterviewBit

Before you go!

Take this "CCNA Interview Questions" interview guide with you

Welcome to Interviewbit, help us create the best experience for you!

Currently, You are a:

Few details about your education

College/University *
Enter the name of your college
Branch *
Year of completion *

Few details about your education

College/University *
Enter the name of your college
Branch *
Year of completion *

Few details about your career...

Current Company *
Enter company name
Experience *

You're all set!

Begin your success journey!

Sign Up using
Full name *
Email *
Password *

By creating an account, I acknowledge that I have read and agree to InterviewBit’s Terms and Privacy Policy .

Welcome back!

Log In using
Email *
Password *

CCNA Interview Questions

Download PDF


Your requested download is ready!
Click here to download.

Begin your success journey!

Sign Up using
Full name *
Email *
Password *

By creating an account, I acknowledge that I have read and agree to InterviewBit’s Terms and Privacy Policy .

Welcome back!

Log In using
Email *
Password *

CCNA (Cisco Certified Network Associate) is basically an IT (Information Technology) Certification from Cisco (the world’s most famous company for manufacturing and selling networking equipment). This certification validates the holder's general ability to install, configure, operate, and troubleshoot switched and routed networks within the enterprise. CCNA certification offers in-depth knowledge and understanding of networking concepts which is very important to sharpen your networking skills. It is the foundation of the networking domain. CCNA, CCNP from Cisco Systems, USA are considered the most preferred certifications in networking. CCNA helps people in getting the desired job in topmost IT companies.

Crack your next tech interview with confidence!
Take a free mock interview, get instant⚡️ feedback and recommendation💡

CCNA Interview Questions for Freshers

1. Explain Routing.

Routing is basically a process of establishing the routes that data packets take on their way to the destination. It is a process of selecting a path across one or more networks to move a data packet from source to destination. Routing is generally performed in many types of networks such as circuit-switched networks, computer networks, etc. It is considered as one of the most essential features in a network and is done by a device called routers.

In the above diagram, the data packet moves from Computer A to Computer B. There are two paths available: 

1st- Network 1, 3, and 5 
2nd- Network 2 and 4 

It depends upon network routers to make a choice whether to pass through 1st or 2nd. The 1st one is a long path but might be faster at forwarding packets whereas the 2nd one is a shorter path. These are the kinds of choices that routers have to make constantly.  

2. What do you mean by data packets?

Data packet is a unit of data that is made into a single package for transmission over a network. They are also referred to as a network layer package and are also used by IP protocol as they contain the IP information which is attached to each packet. They contain much essential information like email messages, website data, and VoIP (Voice-over-IP) calls. Each data packet has a unique numeric identification number that defines the packet number and order.  

3. What do you mean by routers? Write its major functions.

Router is a networking device that is used to forward data packets along with a network from source to destination. The devices are specially designed to receive, analyze, and forward data packets between computer networks. It examines a destination IP address of a data packet and uses its headers and routing table to determine the best way or route for transferring the packets. There are some popular companies that develop routers like HP, Juniper, Nortel, Cisco, etc. 

Functions of Routers:

  • Send and receive data on computer networks. 
  • Used to create local networks of devices 
  • Helps to connect multiple devices to the Internet. 
  • Allows users to configure the port as per their requirements in the network. 
  • Filter unwanted interference, and carry out the process of data encapsulation and decapsulation. 
  • Used to segment network traffic. 
  • Prevent network bottlenecks simply by isolating portions of a network. 
  • Reduce excessive traffic. 
You can download a PDF version of Ccna Interview Questions.

Download PDF


Your requested download is ready!
Click here to download.

4. Name types of routes that are available in routers.

Types of routes available in routers include:

Static Route: This route is also known as a non-adaptive route. It is either directly configured on an active interface of the router or manually added to the routing table by an administrator.

Default Route:  In this, the router is configured to send all packets towards a single router, and it does not matter whether or not it belongs to a specific network. It is especially used when networks deal with a single exit point. 
 
Dynamic Route: This route is also known as the adaptive route. It makes automatic adjustments of the routes as per the current state of the route in the routing table and also uses routing protocols to find network destinations.  

5. What do you mean by Switching?

Switching is a process in computer networks that enable us to interconnect links to form a larger network. It works at the DLL frame and uses hardware address or mac address of devices on LAN (Local Area Network) to segment a network.

6. Name two ports of Switches.

The two ports of switches include: 

Access Port: It connects network hosts to a single VLAN and only carries the traffic of one VLAN. In this, traffic is sent and received in native format without any VLAN tagging.  Access ports are basically used to connect switch ports with computers with a minimum of 10 Mbps speed. 

Trunk Port: It generally connects to another switch and is able to interact with several other VLANs. By default, it is a member of all VLANs in the VLAN database. The trunk port is basically used for multiple connections between the switch to switch and switch to routers. 

7. Name different IPX access list.

There are basically two different IPX access lists as given below: 

Standard: Used to filter the source or destination IP address. 

Extended: Uses source and destination IP addresses, protocol, socket, and port when fileting a network. 

8. What is the main objective of Data Link Layer and Transport Layer?

Data Link Layer: It is the 2nd layer of the OSI model which is generally responsible for transferring the datagram across an individual link. It is considered one of the most complicated layers and also has complex functionalities and liabilities. It also ensures that the appropriate physical protocol is assigned to the data. 

Transport Layer: It is the 4th layer of the OSI model which is responsible for providing transparent transfer of data among end-users, thus providing reliable data transfer services to the top layers. Its main objective is to deliver the entire message from source to destination. 

9. What do you mean by 100BaseFX?

100BaseFX is basically an Ethernet media standard for Ethernet over fiber optic cables, rather than twisted-pair cables. It is a version of Fast Ethernet that makes use of fiber optic cables as the main transmission medium. Here, 100 refers to 100Mbps data speed that means it carries data traffic at 100 Mbps in LAN.  

10. Name the LAN Switching method that is mostly used in CISCO Catalyst 5000?

Store and forward switching method is mostly used by CISCO Catalyst 5000 because it stores the entire frame to its buffers and executes a CRC check before deciding whether to forward that data frame or not.

11. Name different memories that are used in CISCO routers.

Different memories that are used in CISCO router include: 

  • NVRAM (Non-volatile RAM): It is used to store startup configuration files. It also retains its content even after a device is restarted or powered down.  
  • DRAM (Dynamic Random-Access Memory): It is used to store configuration files that are being executed. It loses its content when a device is restarted.  
  • ROM (Read Only Memory): It is used to store a bootstrap program that initializes a boot process. It also runs and maintains instructions for POST diagnostics. 
  • Flash Memory: It is used to store CISCO IOS. It can also be used to store other files such as backup configuration files.  

12. Write difference between tracert and traceroute.

Tracert: It is a Command Prompt command that is used to show various details about the path that a packet takes from the source computer to the specified destination computer. It only uses ICMP (Internet Control Message Protocol) echo requests. It can be used on a PC. This command is generally used in Windows NT-based OS. 

Traceroute: As the name suggests, it is a command that is used to trace the records of the path that a packet takes from the source computer to the specified destination computer. It uses UDP (User Datagram Protocol) echo requests. Traceroute command can be used on a router or switch. This command is generally used in UNIX OS.  

13. Explain HDLC.

HDLC (High-Level Data Link Control) is a group of communication protocols that usually provides reliable delivery of data frames over communication or network link.  It is a proprietary protocol for CISCO and is the default encapsulation operated within CISCO routers. It also ensures the error-free transmission of data and can provide both connection-oriented and connectionless services. 

14. What do you mean by DLCI?

DLCI (Data Link Connection Identifier) is basically a frame relay 10-bit-wide link-local virtual circuit normally assigned by frame relay service to uniquely identify each virtual circuit that is present on the network. It simply identifies which logical circuit the data travels over. 

15. Name router command that is used to display RAM content and NVRAM Content.

The router command that is used to display RAM content is “Show run/show running-config", and the router command that is used to display NVRAM content is “Show start/show start-config".

16. What do you mean by Frame relay?

Frame relay is basically a packet switching technology typically used to transfer data between geographically separated LANs or across WANs. It simply provides connection-oriented communication by developing and maintaining virtual circuits. It is cost-effective technology and is generally used to join two or more routers with a single interface. It works on the data link layer and physical layer of the OSI model.

17. What are three possible ways of data transmission in CCNA?

Three possible ways of data transmission in CCNA include: 

Simplex: The Communication is unidirectional in Simplex mode, as on a single-direction road. Just one of the two devices on a connection can communicate, the other can just get. The simplex mode can utilize the whole limit of the channel to send information one way.

Half Duplex: Each station can transmit and receive in Half-duplex mode, however not simultaneously. At the point when one device is sending, the other can just receive, and the other way around. The half-duplex mode is utilized in situations where there is no requirement for communication both ways simultaneously. The whole limit of the channel can be used for every direction.

Full Duplex: Both stations can send and receive all the while in full-duplex mode. Signals that are going in one direction share the capacity of the connection with signals going another way IN this type of mode. This sharing can happen in two ways: 

  • Either the connection should contain two truly separate transmission ways, one for sending and the other for receiving. 
  • The capacity is split between signals going in two ways. 

Full-duplex mode is utilized when communication both ways are required constantly. The limit or capacity of the channel, anyway, should be split between the two directions.

18. What do you mean by MTU?

MTU (Maximum Transmission Unit) is considered the largest size frame or packet that a network-connected device will accept.  Its default size is 1500 bytes which is the largest Ethernet standard unit. TCP (Transmission Control Protocol) generally uses MTU to determine the maximum size of each packet in any transmission. 

19. What are different types of cables used in routing?

There are basically three different types of cables used in routing: 

Straight Cable: These cables are used to connect different group devices. It is especially used in LAN to connect different devices such as computers to a network hub like a router, PC and switch, router and switch, etc. Its ultimate goal is to connect a host to the client.  

Cross Cable: These cables are used to connect the same group of devices. It is considered one of the most commonly used cable formats for network cables. It is especially used when two similar devices need to be connected. Cross cables are also known as cross-wired cables. 

Rollover Cable: These cables are used to connect the console port of the computer. This cable is specially designed flat to help distinguish it from other types of cables. It generally allows programmers to connect to network devices and can also manipulate the programming whenever needed. Rollover cables are also known as Yost cable, Cisco cable, or a Console cable.  

20. Explain network latency.

Network latency basically represents the delay in communication over a network. It simply refers to the performance of one device when it communicates with another. It is the time taken for some data to go from the source to its destination across the network. Network latency can be affected by bandwidth speed, cabling, network card performance, and congestion. 

21. What do you mean by User mode and Privileged mode?

User Mode: User mode is generally used to view the configurations of the routers. It allows us to view basic system information, check router status, connect to remote devices, etc. User mode is mostly used to perform regular tasks on the router when we are using a Cisco router. 

Privileged Mode: Privileged mode is generally used to view all the configurations on the router. It allows you to change configurations that are less important. Privileged mode is mostly used to perform high-level tasks on the routers such as making configurations and debugging.

22. What do you mean by Windows in terms of networking?

In terms of networking, the window is the number of segments that are allowed to be transferred from the source to the destination before any acknowledgment is sent. 

23. What is the function of an LLC sublayer?

LLC (Logical Link Control) is basically the upper sublayer of the data link layer and acts as an interface between the network layer and MAC sublayer of the data link layer of the OSI model. This sublayer provides the logic for data link as it controls the synchronization, flow control, multiplexing, and also error checking functions of the data link layer. It simply provides optional services to an application developer.

CCNA Interview Questions for Experienced

24. What do you mean by EIGRP? Mention some metrics of EIGRP Protocol.

EIGRP (Enhanced Interior Gateway Routing Protocol) is referred to as Cisco's IGP (Interior Gateway Protocol) that is used on a computer network especially for automating routing decisions and configurations. This protocol is suited for different topologies and media. It is mostly used on a router to share routes with other routers within the same autonomous system.  

EIGRP Protocol generally includes the following metrics: 

  • Bandwidth 
  • Load 
  • Delay 
  • Reliability 
  • MTU 
  • Maximum Transmission Unit 

25. What is CDP? Write its functions.

CDP (Cisco Discovery Protocol) is a Layer 2, media-independent, and network-independent protocol that runs on all the Cisco devices that helps us to discover Cisco devices on the network. This protocol works on the basis of MAC address. It also facilitates the management of Cisco devices by discovering these devices, identifying how to configure them, and allowing systems to learn about each other using different network-layer protocols. Some of its functions include: 

  • Collects information about directly connected neighboring devices.  
  • Find adjacent Cisco devices. 
  • Find out port numbers, IP addresses, router models, switch models, interface details, iOS details, device ID-hostname. 
  • Simplifies the process of keeping an up-to-date inventory of Cisco network devices. 
  • Share information about other directly connected Cisco equipment like OS version, IP addresses. 

26. What do you mean by VLAN? Write its main objective.

VLAN (Virtual Local Area Network) is basically a logical group of workstations, services, or network devices that communicate with one another on a separate physical LAN. It improves the network performance or applies some additional security features. It also allows several networks to work virtually as if they were a LAN sharing a single broadcast domain. 

27. What are the benefits of using VLAN?

There are several advantages of using VLAN:  

  • Removes latency and traffic load on the network 
  • Saves network resources and increases network efficiency 
  • Reduces IT cost and the incidence of collisions 
  • Improve network security and performance 
  • Ensure network flexibility and provide easier management 
  • Make it easier to relocate a network or a network device 
  • Increase the number of broadcast domains while decreasing the size of broadcast domains. 
  • Establish broadcast domains in switched networks. 

28. What do you mean by a broadcast domain and a collision domain?

Broadcast Domain: As the name suggests, a Broadcast domain is a logical set of reachable computer systems without having a router. In this type of domain, traffic flows all over the network. In this scenario, when a device sends a broadcast message, then all the other devices present in its broadcast domain have to pay attention to it.  

Collision Domain: As the name suggests, a Collision domain is a part of a network where packet collisions can take place when being sent on a shared medium or through repeaters. In this scenario, when a device sends a message to a network, then all other devices present in its collision domain have to pay attention to it, whether or not it was destined for them. 

29. Explain BootP.

BootP (Bootstrap Protocol or Boot Program) is defined as a computer networking protocol that is being used by a client for obtaining an IP address of a server PC. In a network, BootP is generally used for booting diskless workstations. These diskless workstations use BootP to get their own IP address as well as the server’s IP address.  It was originally designed to replace RARP (Reverse Address Resolution Protocol), also known as RFC 903. 

30. What do you mean by route poisoning?

Route poisoning refers to a method that prevents certain networks from sending data packets to path destinations that have already become invalid. This method is being employed by distance vector routing protocols like RIPv2 whenever they see any invalid route to prevent routing loops. It is generally used to overcome large routing loops and informs all the connected routers in a network about the path that is invalid by saying that it has a hop count that exceeds the maximum allowable. 

31. Write difference between static and dynamic IP addressing.

Static IP address: Static IP address, as the name suggests, is simply an IP address that doesn’t change. It remains the same until the device is decommissioned or the network architecture is changed.  

Dynamic IP address: Dynamic IP address, as the name suggests, is simply an IP address that changes over time. It is mostly used because IPv4 does not provide enough static IP addresses to go around. 

Static vs Dynamic IP address:

Static IP address Dynamic IP address
This IP address is generally provided by ISP (Internet Service Provider). This IP address is generally provided by DHCP (Dynamic Host Configuration Protocol).
The address does not change whenever a device is assigned a static IP address by the network administrator.  The address changes over time whenever a device is assigned a dynamic IP address.
It is less secure and more difficult to designate as compared to dynamic IP addresses. It is more secure and easy to designate as compared to static IP addresses.
It is more appropriate for a business. It is more appropriate for a home network. 
These are costlier to deploy and more difficult to manage as compared to dynamic IP addresses. These are cheaper to deploy and easier to manage as compared to static IP addresses.
It is more suitable for dedicated services like mail, VPN and FTP servers, etc. It is more suitable for a large network that requires internet access to all devices.
It is mostly used where computational data is less confidential. It is mostly used where data is more confidential and requires higher security. 

32. What is network congestion? When network congestion happens?

Network congestion is a situation that occurs when a network node is overloaded with data or traffic and can cause a common problem for admins. It usually occurs when the network is carrying or exchanging more data than the network devices like routers and switches can accommodate. It is a result of an internet route becoming too full when many users try using the same bandwidth. This condition is true in big networks that do not resort to network segmentation.

33. What are two types of networks in CCNA?

Two types of networks in CCNA includes: 

Server-based network: Client-Server networks can also be referred to as Server-Based networks. A server is a node that provides services to clients. In this, a Centralized server is used to store the data because its management is centralized.

Peer-to-Peer network: A peer-to-peer network is also known as a computer-to-computer network or P2P. Peers are nodes or computer systems that are connected to one another. Every node in this kind of network is connected to another node.

34. What are types of passwords that can be used in CISCO routers?

Different types of passwords that can be used in CISCO routers include: 

  • Enabled: This is a global command that disables privileged execution mode. The password is not encrypted. To change it, one can use  "enable password password"
  • Enable Secret: In place of an enable password, this secret password is used.  To change it, one can use "enable secret password".
  • AUX (Auxiliary): Passwords for auxiliary ports can be set using an auxiliary password. Through a modem, a router can be accessed via this port.
  • Console: Console port passwords are set using the console password.
  • VTY (Virtual Terminal): For Telnet sessions into the router, you will need the virtual terminal password. Passwords can be changed at any time. You can set it up when you configure the router from the console. 

35. Write difference between public IP and private IP.

Public IP Private IP
It is used on public networks. It is mostly used within a private network or LAN to connect securely with other devices within the same network. 
It is usually assigned by a Service provider or IANA.  It is usually assigned by a LAN administrator. 
It is generally used to communicate outside the network.  It is generally used to communicate within the same network.
It can be known by searching “what is my IP” on google.  It can be known by typing “ipconfig” on the command prompt. 
Its scope is global.   Its scope is local to the present network.
These come with a cost and are controlled by ISP.   These are free of cost and are used to load network OS.
It is routable and therefore, communication among different users is possible. It is not routable and therefore, communication among different users is not possible.
It can be any number not included in the reserved private IP address range.
Example: 202.60.23.1
Address ranges to be used by private networks are: 
Class A: 10.0.0.0 - 10.255.255.255
Class B: 172.16.0.0 - 172.31.255.255
Class C: 192.168.0.0 - 192.168.255.255
Example: 192.168.0.3 

36. Write the main function of the application layer in networking?

The application layer is the topmost layer in the OSI model that is used by end-user software such as web browsers and email clients. It is considered as the layer through which users interact. It usually consists of some protocols that are more focused on process-to-process communication across an IP Network. Some of its functions include: 

  • Manage data exchange in a peer-to-peer or a client-server networking model.  
  • Provide firm communication interface and end-user services. 
  • Enables users to access the network. 
  • Provide the basis for email forwarding and storage facilities. 
  • Allows access to global information about different services. 

37. Explain PoE.

PoE (Power on Ethernet) generally refers to a technology that allows electric power to be carried over the Ethernet cable that carries data. It passes the electric power supply to the network through the cable rather than the power cords and minimizes the number of wires required to install the network.

38. What do you mean by OSPF?

OSPF (Open Shortest Path First) is basically a popular link-state routing protocol for IP networks that are used to connect to a large number of networks without any limitation on the number of hops. It determines the best route for delivering the data packets within an IP network.  It has been implemented by a wide range of network vendors such as Cisco. It works on Dijkstra Algorithm. 

  • Firstly, a shortest-path tree is constructed. 
  • Secondly, the routing table is populated with the resulting best paths. 

39. Write difference between RIP and IGRP.

RIP (Routing Information Protocol) IGRP (Interior Gateway Routing Protocol) 
It is a distance vector-based routing protocol.  It is a distance vector-based interior gateway routing protocol.
It is used to calculate the metric in terms of Hop count.  It is used to calculate the metric in terms of bandwidth, load, and delay.
It is an industry-standard dynamic protocol and is mainly used for smaller-sized organizations. It is a Cisco standard dynamic protocol and is mainly used for medium to large-sized organizations.
It is denoted by ‘R’ in the routing table and supports 15 routers max. It is denoted by ‘I’ in the routing tables and supports 255 routers max.
We cannot create a separate administrative boundary in the network in the RIP routing protocol. Using autonomous System numbers, we can create a separate administrative boundary in the network in the IGRP routing protocol.

Conclusion:

CCNA is a stepping stone for getting quality jobs and career growth. It helps to get into the networking domain, especially if one wants to work with CISCO products. Before you start your career as a professional CCNA expert, you will definitely get help from these CCNA interview questions and answers. It enhances your knowledge to a great level and helps you crack a CCNA interview successfully at a fresher and experienced level. 

CCNA MCQ

1.

Which of the following services uses both UDP and TCP ports?

2.

Which of the following is not an IPv6 address type?

3.

Which of the following devices is used to connect a token ring network to an ethernet network?

4.

Name the hardware component that is used to store the backup configuration. 

5.

Which of the following commands will be used to verify the path a packet gets routed through on the network? 

6.

Name the OSI layer that is responsible for end-to-end connections.

7.

What is the main objective of the ping command?

8.

Where CISCO IOS is stored?

9.

Name the switching method used by the frame relay technique.

10.

Out of the following, which is an example of a MAC address?