-
General Knowledge
-
General Topics
- Abbreviations
- Books and Authors
- Famous Academies and Institutes
- First in India (Man)
- First in India (Women)
- Important Dates
- Famous Personalities
- Public Administration Science
- Astronomy
- Biology
- Botany
- Chemistry
- Physics
- Zoology
- Inventions and Scientists Geography
- Geographical Epithets India
- Geographical Epithets World
- Places Associated with Industries in India
- National Parks and Sanctuaries
- Towns on River Banks History
- Indian History and Culture
- Indian National Movement
- Indian Polity and Constitution
- Ancient Period in Indian History
- World History
- Governor General of India Culture
- Languages
- Indian Dance and Music
- Classical Dances of India
- Folk Dances in India and Tribal Dances in India
- Famous Dancers, Instrumentalists, Vocalists in India World
- First in the World
- Parliament Names
- United Nation Organizations (UNO)
- World's Famous News Agencies
- World Industries
- National Emblems
- Countries and Alternative Names
- Countries and Capitals
- View More topics...
- General Aptitude
- Problems on Ages
- Alligation and Mixture
- Area
- Arithmetic Progression
- Average
- Banker's Discount
- Boats and Streams
- Calendar
- Chain Rule
- Clock
- Compound Interest
- Decimal Fraction
- Height and Distance
- Logarithms
- Mensurations
- Numbers
- Odd Man Out and Series
- Partnership and Share
- Percentage
- Permutation and Combination
- Pipes and Cisterns
- Probability
- Problems on H.C.F and L.C.M
- Problems on Numbers
- Problems on Trains
- Profit and Loss
- Races and Games
- Ratio and Proportion
- Simple Interest
- Simplification
- Stocks and Shares
- Surds and Indices
- Time and Distance
- Time and Work
- True Discount
- Volume & Surface Areas
- General English
- Antonyms
- Synonyms
- Vocabulary Test
- One Word Substitution
- Sentence Completion
- Sentence Improvement
- Idioms & Phrases
- Homonyms
- Word Formation
- Active & Passive Voice
- Direct and Indirect Speech
- Spotting Errors
- Double Synonyms
- Choose the Appropriate Filter
- Spelling Test
- Transformation
- Reconstruction of Sentence
- Chooose the Correct or Incorrect Sentence
- Networking
- Interview Questions
-
Programming
- .NET
- Java
- ASP.NET
- C++
- Perl
- Python
- Ruby and Rails
- Struts
- Core Java
- Hibernate Database
- DB2
- MS SQL Server
- MySQL
- Oracle
- SQL
- DBMS
- Data Warehousing
- Data structures and Algorithms Cisco
- CCNA
- CCNP Routing
- CCNP Switching
- Internetworking
- Border Gateway Protocol Windows
- MCSE
- Exchange Server
- Windows Server 2008
- DNS & Active Directory
- Firewall Questions Linux
- Unix
- Linux Server Administrator
- Linux System Administrator
- Linux File Manipulation
- Database
- Home
- Networking
- JNCIS- ENT Routing and Switching
Instructions
- Total Questions 20
- Each question carry 1 mark
- Must answer all the questions (otherwise report card will not be generated)
- If you dont want to take a test, simply click the check answers button and view all the answers with explanations
- Do Not Refresh the Page
- No Time Limit
- Good Luck :)
You Scored % - /
Correct Answers :
[A, D]
Explanation :
By default, BGP sessions are not authenticated. The use of the authentication-key command enables MD5 authentication.
Correct Answers :
[B, D]
Explanation :
The first portion of the expression requires an AS value to begin with a 65 and contain any other values. Only Options B and D fit that criterion. The second portion of the expression can be any possible value. This means that both Options B and D match the expression.
Correct Answers :
[A]
Explanation :
When a value of 0 is used with the router ID to identify the local router’s label space, it means that the router is using a per-node label allocation mechanism.
Correct Answers :
[C]
Explanation :
An IPv6 address uses 128 bits to fully address a host. This provides for a substantial increase in addressing space over IPv4.
Correct Answers :
[A]
Explanation :
A PIM-SM domain always creates a rendezvous point tree (RPT) from the RP to the last hop router. The shortest-path tree is created between the first-hop and last-hop routers, while a source-based tree is used in a dense-mode PIM domain. Multicast networks don’t use reversepath forwarding trees. The reverse-path concept is used to prevent forwarding loops in the network.
Correct Answers :
[D]
Explanation :
The result of a CSPF calculation is a complete strict-hop ERO of all routers in the path of the LSP. This information is sent to the RSVP process, which signals the path and establishes it in the network.
Correct Answers :
[C]
Explanation :
The MaxAge of an LSA is 60 minutes (3600 seconds). Before reaching the MaxAge, the JUNOS software refreshes the locally generated LSAs at 50-minute intervals.
Correct Answers :
[C]
Explanation :
The JUNOS software supports up to three area addresses per router.
Correct Answers :
[C]
Explanation :
The local-as command allows the BGP peering session to be established using an AS value other than the value configured within the routing-options hierarchy.
Correct Answers :
[D]
Explanation :
The buffer-size command is used by an individual queue to determine the amount of space to use for storing information.
Correct Answers :
[D]
Explanation :
By default, the data-link encapsulations must match on either side of the provider network. Only the use of IP Interworking relaxes this restriction by allowing this dissimilar connection.
Correct Answers :
[C]
Explanation :
By default, the JUNOS software makes three attempts to reach a configured RADIUS server.
Correct Answers :
[B, D]
Explanation :
The JUNOS software currently uses opaque LSAs to support graceful restart and traffic engineering. The link-local (type 9) opaque LSA is used with graceful restart, and the area-local (type 10) opaque LSA is used with traffic engineering.
Correct Answers :
[A]
Explanation :
The JUNOS software always groups incoming path advertisements by the neighboring AS and evaluates the MED values within each group. This process is called deterministic MED
Correct Answers :
[A, B]
Explanation :
Both BGP and IS-IS are capable of automatically populating the inet.2 routing table with unicast routes. These routes are designed for use within the context of a multicast RPF check.
Correct Answers :
[B]
Explanation :
Fast reroute is a temporary solution to a failure scenario in which each router protects traffic already traveling through the LSP.
Correct Answers :
[A]
Explanation :
A forwarding class is the mapping of a human-readable name to a specific interface queue within the JUNOS software.
Correct Answers :
[D]
Explanation :
The routing header in an IPv6 packet is used to source-route the packet across the network. It contains a list of addresses through which the packet must pass.
Correct Answers :
[D]
Explanation :
Since each of the policies contains no terminating action, they can be applied in any order desired. The BGP default policy will accept all incoming BGP routes.
Correct Answers :
[C]
Explanation :
Each IS-IS interface receives a default metric value of 10 for all interfaces. The exception to this rule is the loopback interface, which receives a metric value of 0.
|
|
||||||||||||||||||||||||||||