[go: up one dir, main page]

0% found this document useful (0 votes)
109 views30 pages

Www Nwkings Com Ccna Interview Questions Answers

Download as pdf or txt
Download as pdf or txt
Download as pdf or txt
You are on page 1/ 30

 Contact Us

CCNA INTERVIEW QUESTIONS & ANSWERS


June 7, 2022 by Aakriti

Cisco Certi몭ed Network Associate popularly known as CCNA is a certi몭cation exam that
quali몭es IT professionals to perform various entry-level tasks within the IT industry. The
CCNA certi몭cation deals with validating the skill, ability and expertise of an individual to
몭x, con몭gure and troubleshoot networks.

Check Live Free Webinar

CCNA Interview Questions - for Beginners


#1. What is routing?

Routing is the process of 몭nding the right path for transferring data from the original
source to the destination. Routing is carried by using a device known as a route, which
is a network layer device.
Chat with us, we're online!

#2. How many layers are there in an OSI reference model? Name
them.

There are 7 layers in an OSI (Open Systems Interconnection) reference model. They are:

1. Physical layer
2. Data link layer
3. Network layer
4. Transport layer
5. Session layer
6. Presentation layer
7. Application layer
#3. Explain HDLC.

HDLC (High-Level Data Link Control) is a group of communication protocols that usually
provides reliable delivery of data frames over communication or network link. It is a
proprietary protocol for CISCO and is the default encapsulation operated within CISCO
routers. It also ensures the error-free transmission of data and can provide both
connection-oriented and connectionless services.

#4. What is CDP?

CDP, short for “Cisco Discovery Protocol,” is a layer 2 protocol that works on a Media
Access Control (MAC) address. CDP may be used to identify port numbers, iOS details,
router models, device IDs, and switch models.

#5. What is BootP?

BootP, short for “Boot Program,” is a protocol that is mostly used to boot diskless work
areas that are connected to one network. A diskless workstation may also use BootP to
determine its IP address and the IP address of the server PC.
#6. What is the purpose for the Data Link layer?

The data link layer of the OSI model (Layer 2), prepares network data for the physical
network. The data link layer is responsible for network interface card (NIC) to network
interface card communications. Along with this the data link layer serves the following
purposes:

Enables upper layers to access the media.


Accepts data, usually Layer 3 packets (i.e., IPv4 or IPv6), and encapsulates them
into Layer 2 frames.
Controls how data is placed and received in the media.
Exchanges frames between endpoints over the network media.
Performs error detection and rejects any corrupt frame.

#7. What does the LLC sublayer do?

Logical Link Control (LLC) is a sublayer usually providing the logic for the data link as it
controls the synchronization, multiplexing, 몭ow control, and even error-checking
functions of DLL (Data Link Layer). DLL is divided into two sublayers i.e. LLC sublayer
and MAC (Medium Access Control) sublayer.

#8. What is MTU?

A maximum transmission unit also called MTU de몭nes the largest size of the packet
that can be transmitted as a single entity in a network connection. The size of the MTU
de몭nes the amount of data that can be transmitted in bytes over a network.

#9. What is the role of the LLC sublayer?

The LLC sublayer stands for Logical Link Control. It can provide optional services to an
application developer. One option is to provide 몭ow control to the Network layer by
using stop∕start codes. The LLC can also provide error correction.
#10. What is OSPF? Describe it.

OSPF stands for Open Shortest Path First. It uses the Dijkstra algorithm and is a link-
state routing protocol that is used to connect to a large number of networks without
having any limitation on the number of hops.

#11. What is subnetting?

Subnetting is when smaller networks are created from a larger parent network. Each
subnet is given an identi몭er or certain parameters within the network to indicate its
subnet number.

#12. Give some bene몭ts of LAN switching.

– allows full-duplex data transmission and reception

– media rate adaption

– easy and e몭cient migration


#13. De몭ne ARP.

The Address Resolution Protocol is a communication protocol used for discovering the
link layer address, such as a MAC address, associated with a given internet layer
address, typically an IPv4 address. This mapping is a critical function in the Internet
protocol suite.

#14. What is Spanning Tree Protocol?

Spanning Tree Protocol (STP) is a protocol which prevents layer 2 loops. STP enables
switches to become more aware of each other so that they can negotiate a Loop-free
path through the network. It chooses a reference point (Route Bridge) in the network
and calculates all the paths that are no longer useful (known as redundant links) to that
reference point. Then it selects one path to forward frames and blocks other redundant
paths. When blocking happens, loops are prevented.
#15. De몭ne Network Congestion.

Network congestion refers to a reduction in quality of service (QOS) that causes packet
loss, queueing delay, or the blocking of new connections. It occurs when the tra몭c
몭owing through a network exceeds its maximum capacity meaning when a link or
network node is handling data in excess of its capacity.

E몭ects of network congestion :

Queueing delay
Packet Loss
Slow Network
Blocking of new connections
Low throughput

Ways to 몭x network congestion :

1. Divide your network into subnets that can be resized to meet tra몭c.
2. TCP∕IP settings should be adjusted to balance packet send∕request speeds.
3. Upgrade your Internet plan to allow for more devices and increased bandwidth.

#16. What is the di몭erence between User Mode and Privileged Mode?

User Mode is commonly utilized for performing regular tasks on a CISCO router. For
example, User Mode may be used to connect to remote devices or check the status of a
router.

Privileged Mode is used to perform higher-level tasks on the router such as debugging
and making con몭gurations. Privileged Mode also includes all of the options that are
available for use in User Mode.

#17.What is a MAC address?

A MAC address is the abbreviation for a Media Access Control address. This address is
the identi몭cation used to depict a media access control layer in a network’s
architecture. It’s most commonly stored in the ROM and is di몭erent for each device.
#18. What is EIGRP?

EIGRP stands for Enhanced Interior Gateway Routing Protocol; it is a routing protocol
designed by Cisco Systems. It is available on a router to share routes with other routers
within the same autonomous system. Unlike other routers like RIP, EIGRP only sends
incremental updates, decreasing the workload on the router and the amount of data
that needs to be transferred.

EIGRP protocol consists of :

Bandwidth
Load
Delay
Reliability
MTU
Maximum Transmission Unit

#19. What are the di몭erent memories used in a CISCO router?

Di몭erent memories used in a CISCO router are:

– NVRAM stores the startup con몭guration 몭le.

– DRAM stores the con몭guration 몭le that is being executed.

– Flash Memory – stores the Cisco IOS.

#20. What is the function of the Application Layer in networking?

The Application Layer supports the communication components of an application and


provides network services to application processes that span beyond the OSI reference
model speci몭cations. It also synchronizes applications on the server and client.

CCNA Interview Questions - for Experts


Qus1:-What does cat stands for in networking?

Ans :− Cat stands for “CATEGORY“. Which started from Cat1 (Category1) and now
extend up to Cat7 (Category 7). Improved version∕category of cable improve the quality
of data transmission and make enhancement in bandwidth .provide more stability.

Cat 1 ? used for voice only

Cat 2 ? used for voice telephone & data communication, maximum?bandwidth?is 4?


Mbit∕s.?Cat?2 cable contains 4 pairs of wires, or 8 wires total.

Cat 3 – used for voice & data communication .Category?3 cable, commonly known as?
Cat 3?or?station wire .carry data up to 10?Mbit∕s.

Cat 4 – It is used in telephone networks which can transmit voice and data up to 16?
Mbit∕s

Cat 5 – The cable provides performance of up to 100?MHz and Cat?5 is also used to
carry other signals such as?telephony and?video.Cat5 does not support exact 100 MHz .
but Cat5e provide exact 100 MHz bandwidth.

Cat 6 ? It increase the performance of up to 250?MHz compared to 100?MHz for Cat?5


and Cat?5e.

Cat7– ?Ethernet cable is the newest cable category, operating at speeds of 10 Gb∕s at
100 meters of cable and transmitting frequencies up to 600 Mhz.

Qus2 :- What is APIPA

Ans :− Automatic Private IP addressing with this , A DHCP client can automatically
con몭gured an IP address & subnet mask when no DHCP server is available .

It was random address ranging of Class B from 169.254.0.1 to 169.254.255.254 . default


subnet mask of 255.255.0.0

Qus3 :- Private IP Address Range of IPV4

Ans :− 3 group of Private IP addresses —-

Class A ? 10.0.0.0 to 10.255.255.255.254

Class B ? 172.16.0.0 to 172.31.255.254

Class C ? 192.168.0.0 to 192.168.255.254

Qus4 :- Broadcast Domain and Collision Domain

Ans :−

HUB? Single Broadcast Domain and Single Collision Domain

SWITCH? Single Broadcast Domain and Multiple Collision Domain. But can also
separate Broadcast Domain by using VLAN’s

ROUTER? Multiple Broadcast and Multiple Collision Domain

Qus5:-What is cat stands for in networking?

Ans:−?A?collision domain?is a network segment with two or more devices sharing the
same bandwidth (where there is a chance of collision)
A?broadcast domain?is a logical division of a computer network, in which all nodes can
reach other by broadcast at the data link layer.

Qus6:- OSI and TCP∕IP Model

Ans:− OSI stands for Open System Interconnection developed by International Standard
Organization ISO . It is just a reference model.

Consist 7 layers which has bottom to top approach ?

Application Layer
Presentation Layer
Session Layer
Transport Layer
Network Layer
Data Link Layer
Physical Layer

TCP∕IP came 10 years before then OSI Model and it actually works in real scenarios.

Consist 4 layers —

Application Layer
Transport Layer
Internet layer
Network Interface layer∕Link Layer ∕Network Link Layer
Qus7:- Port numbers of TCP and UDP Protocole

Ans:­ Server provide their services on the basis of port numbers .we have two types of
connections ?

Transmission control protocol (TCP) & User datagram Protocol (UDP)

TCP ? Connection Oriented

File Transfer Protocol (FTP) ? 21


Hypertext Transfer Protocol (HTTP) — 80
Hypertext Transfer Protocol Secure (HTTPS)– 443
Secure Shell ­22
Telnet ? 23
Simple Network Management Protocol (SNMP? 161/162
SMTP – 25
DNS­53
Internet Message Access Protocol (IMAP)? 143
Border Gateway Protocol (BGP) — 179

UDP ? Connection Less

Domain Name System (DNS) ? 53


Dynamic Host Configuration Protocol (DHCP) ? 67/68
Trivial File Transfer Protocol (TFTP) ? 69
Network Time Protocol (NTP) ? 123
Simple Network Management Protocol (SNMP) ? 161/162

Qus8:- What is Firewall ?

Ans : – 몭rewall is a network security device or network security systemwhich help to


provide security to intranet (private Network) . So, that not any unauthorized user can
enter into their area .we can also apply security on routers (networking device) as well
but only for some extend. Routers provide very less security (Layer 3 device, work on
Internet Layer).

Firewall separate the internal (private) & external (public) network.It establishes a
barrier between a trusted internal network and untrusted external network.

Firewalls can be either hardware or software or combination of both.


Types of 몭rewall —
network 몭rewalls?or?host-based 몭rewalls

list of some company who provide?Network Security Services&?Appliances

Qus9:- What is Router ?

Ans:­ Router is L3 ­Network Layer device . it basically use for routing purpose . every router
has it’s own brain . they choose the best path from source to destination by checking the
information/best suitable path in their routing information table(RIB).

Types of Routing ?

Static Routing
Default Routing
Dynamic routing
Interior gateway routing protocol
Distance vector routing
RIP,RIPV2

Link state routing


OSPF ,IS­IS

Advance Distance vector routing


EIGRP (extended version of IGRP)
Exterior gateway routing protocol
BGP

Qus10:- Di몭erence between OSPF multicast address 224.0.0.5 and


224.0.0.6?

Ans:­ 224.0.0.5 – AllSPFRouters: Used to send OSPF messages to all OSPF routers on the
same network. The AllSPFRouters address is used for Hello packets. The DR and BDR use
this address to send Link State Update and Link State Acknowledgment packets.

224.0.0.6 – AllDRouters: Used to send OSPF messages to all OSPF DRs (the DR and the
BDR) on the same network. All OSPF routers except the DR use this address when sending
Link State Update and Link State Acknowledgment packets to the DR.

Qus11: - AD value of Dynamic Routing Protocols -- RIP, EIGRP &OSPF.

Ans :­Admistrative Distance (AD) Value of RIP is 120 with maximum of 15 hop count as
linear .Broadcast address of RIPV1 is 255.255.255.255 and it doesn’t carry the subnet mask
value .Multicast address of RIPV2 is 224.0.0.9 and it does support subnetting .RIP Timers
are ? update timer ? 30 sec , invalid timer/hold down timer ? 180 sec and last one flush timer
is 240 seconds .

AD value of EIGRP is 90 and multicast address is 224.0.0.10.It maintain the 3 tables ?


Teighbor table , topology table and Routing table .

Packet types are ?

Hello pkt  5 sec


Update pkt 15 sec
Query
Reply
Acknowledgment

It uses Reliable Transport Protocol with 88 protocol number

AD value of OSPF is 110 and multicast address is 224.0.0.5 &224.0.0.6 .It maintain the 3
tables ? Neighbor table , Database table and Routing table .

Packet types are ?

Hello pkt
Hello pkt
DBD (Data Base Description)
LSR (Link State Request)
LSU (Link State Update)
LSA (Link State Acknowledgment)

Less AD value is always reliable/preferable.

Qus12:- How many States are there in OSPF ?

Ans:­OSPF has to go through 7 states in order to become neighbors. There are 8 states in
OSPF.

DOWN
INIT
2­WAY
ExSTART
EXCHANGE
LOADING
FULL

Qus13:- Maximum HOP Count in RIP, EIGRP and OSPF

Ans:−RIP , EIGRP and OSPF all three are Dynamic Routing Protocol .
RIP Maximum hop count value is 15 as linear
EIGRP Maximum hop count value is 255
OSPF can use unlimited number of hop counts, but it is recommended to use
Maximum up to 100 hop count.

Qus14:- Which protocol support equal and unequal load balancing?

Ans : – EIGRP support Equal and Unequal load balancing , RIP and OSPF only support
Equal load balancing .

Qus15:- Router-ID selection in OSPF

Ans :− the highest IP address of the active physical interface of the router is Router-ID .

If logical interface loopback is con몭gured ,the highest IP address of the logical interface
is Router-ID .

Physical interface can down any time but logical not .

If we add one more loopback 20.1.1.1 higher than 1.1.1.1, here 20.1.1.1 will become
your Router-ID

Qus16 :- EIGRP work on which algorithm and it’s metric calculation

Ans:- EIGRP work on Defusing Update Algorithm (DUAL)

Metric Calculation formula —

10^7∕(Min Bandwidth)
Sum of delays∕10
Metric =( Bandwidth + Delay)*256

Qus17:- Working of Switch


Switch is an interconnecting device with 16 or 24 ports in common. All other devices are
connected to these ports. Whenever any machine sends packet to any other machine,
source machine send packet to switch, switch then forwards it to destination machine.
Each packet which comes to switch contains source and destination physical address in
it, on basis of which switch forwards packet to other machine. Switch always sent
packet based on destination MAC address. Its process is as follows:

(process also known as Switching)

1. When switch receives a packet from any device, it checks for its destination MAC
address.

2. Then switch compares destination MAC address with its MAC Address Table for
corresponding MAC address.

a. If MAC Address is found, packet is sent out to port against which MAC Address was
matched.

b. If entry is not found, Unknown unicasts (when the switch doesn’t have a port
mapping for a destination mac address in the frame) are treated like broadcasts by
Layer Two devices, and are 몭ooded out of all ports except the port on which the frame
originated.

Now question comes, how does switch knows on which port destination machine is
connected? — For this switch uses one table in its cache memory called MAC Address
table or Forwarding Table in which switch stores that at which port which machine is
connected by storing its physical address (MAC Address). So table contains two columns
(Physical Address and Port Number) and rows equal to number of ports in switch.

When switch is turned ON, by default there is no entry in MAC address table, as
communication starts, based on devices involved entries are created in table.
Qus18:- Working of Address Resolution Protocol (ARP)

ARP is a layer 2 protocol, used for obtaining MAC address of any devices within a
network. Host machines use ARP protocol to obtain MAC Address. ARP protocol in
conjunction with Layer 3 IP Protocol addressing (IP Address).

Host machine uses ARP because when machine needs to send packet to another device,
destination MAC address is needed to be written in packet sent, so host machine should
know the MAC Address of destination machine. Operating Systems also maintain ARP
Table (MAC Address Table).

To obtain MAC address, ARP performs following process: (ARP request by host machine)

1. Source machine generate ARP REQUEST packet with source MAC address (of this
machine), source IP address (of this machine) and destination IP address and forwards
this packet to switch.

2. Switch receives the incoming packet and reads the source MAC address and checks
its MAC address table, if entry for packet at incoming port is found then it checks its
MAC address with the source MAC address and updates it, if entry not found then
switch add and entry for incoming port with MAC address.

3. All ARP REQUEST packets are broadcasted in network, so switch broadcast ARP
REQUEST packet in network, because destination for ARP packet will be
255.255.255.255. (Broadcast are those packets which are sent to everyone in network
except the sender, only in network to which it belongs, it cannot span multiple
networks)

4. All devices in network receives ARP packet and compare their own IP address with
the destination IP address in that packet.

5. Only the machine which matches the both will reply with ARP reply packet. This
packet will have source IP of this machine (which was destination machine in previous
packet, as now its replying this machine will be the source machine) , source MAC
address, destination MAC address (same as source MAC address in REQUEST packet)
and destination IP address (same as source IP address in REQUEST packet).

6. Then switch reads the ARP reply message and add entry in its MAC Address Table for
port number on which it has received packet by reading its source MAC address 몭eld
and forwards that packet to destination machine (source machine in REQUEST packet)
as its MAC is indestination MAC address.

7. Further host machine add destination machine entry into its ARP table. This using
ARP resolution switch and other devices in network obtain MAC address of any other
device in a network. Remember ARP works on broadcast, so it works only in single
network.

Qus19:- Di몭erence between access link and trunk link ?

Ans :−Access link ? access link carry only one VLAN information .It does not tag the
frame . Mainly this link is established in between computer∕PC∕Node and Switch.

Trunk Link ? trunk link carry information of multiple VLAN’s. It tags the frame. So, that
receiving switch would know which VLAN’s information it has carried and transfer∕pass
that information accordingly.Mainly this link is established in between the Switches.

Qus20 :- Native VLAN

Ans :− Native VLAN is the only VLAN which is not tagged in the trunk. Native VLAN
frames are transmitted unchanged .by default VALN 1 is the NATIVE VLAN. if your switch
receives a frame with no VLAN information , it assumes this frame belongs to the
NATIVE VLAN .

Types of VLANs ?

Default VLAN

Native VLAN

DATA VLAN

VOICE VLAN
PRIVATE VLAN

MANAGEMENT VLAN

Qus 21: – If on 2 switches di몭erent VLAN’s are con몭gured and have


access link between the switches. Can the PC’s ping each other?

Ans :- They both can ping each other.The issue is that the switch interlink are both
access ports. An access port will not send or accept tagged tra몭c. Hence when SW1
sends PC1’s tra몭c over the link, the tag is removed. When that packet comes into SW2’s
fa0∕8 interface, that interface is part of vlan 20. SW2 will allow that frame to 몭ow to PC2.
The same happens vice-versa.

Qus22: - Trunking protocols

Ans : – There are two trunking protocols ?

ISL and IEEE DOT1Q∕802.1Q

ISL ? Inter Switch Link is Cisco proprietary protocol. That is 30 bytes in length. It add 30
bytes info in it’s frame that obviously increase the size of frame. Even cisco also
recommend to use IEEE 802.IQ for encapsulation.

IEEE DOT1Q∕802.1Q ? It is open standard .de몭ned by IEEE . All vendor support this .it
add 4 byte tag to the original frame .it doesn’t tag frames that belong to native VLAN.
Qus23 :- Why VTP is needed ? Their modes and which mode use
extended vlan ?

Ans :- Virtual Trunking Protocol use for propagate VLAN Database . Database creates in
Vlan.dat 몭le and store in 몭ash memory.

VTP Modes ?

Client Mode ? can not use extended vlan .

Server Mode ?can not use extended vlan , by default VTP is in server mode

Transparent Mode ? can use extended vlan ranges from <1006-4096>

O몭 Mode ? VTP O몭

Qus24 :- DHCP

Ans :− DHCP stands for Dynamic host con몭guration protocol , It assign IP addresses to
node∕computer∕PC automatically .It work on Discover o몭er request acknowledgment
DORA process. It is a UDP connectionless and support port number 67∕68 .

Qus25:- PC∕Computer∕Node doesn’t not have an IP address how it will


contact DHCP server?

Ans :− PC∕Computer∕node will send request to all the connected devices via broadcast
but only the DHCP server will accept this request and assign IP address from pool to the
system . It works on “DISCOVER OFFER REQUEST
ACKNOWLEDGMENT (DORA) “Process.

Qus26:- What is NAT?

Ans :− “ Network Address Translation“ It is a process where a network device , usually


a 몭rewall , assign a public address to a computer (or group of computers )inside a
public network (intranet).

The main use of NAT is to limit the no. of public addresses an organization or company
must use for both economy and security purpose.

It allow multiple private IP addresses to represent into by a smaller number of public IP


addresses.

Types of NAT

Static NAT
Dynamic NAT
Port Address Translation PAT

Qus27:- In Ether Channel ∕Port Channel ∕Link Aggregation, two


switches are connected. On one switch lacP is running and on
another switch pagP is running. Will they be able to establish
communication?

Ans :−
“NO” all ports in an ether channel must use the same protocol , you can not use two
protocols on two ends . In other words pagP and lacP are not compatible so , both ends
of a channel must use the same protocol .

Qus28:- Main di몭erence between Standard and Extended Access- list?


How packet 몭ltering is done?

Ans :− Access-List provide L3 security. There are of 2 types ACL’s

1. Numbered
2. Named

Numbered Standard Access list range is from 1-99


It blocks a network, host and subnet.
All services are blocked
Implement closest to the destination
Packet 몭ltering is based on only source IP address.
Numbered Extended Access list range is from 100-99.
Can block a network, host, subnet and services.
Can block any speci몭c service as per requirement
Implement closest to the source
Packet 몭ltering is based on source, destination address and protocol and
port number.

“Named Access-List mainly preferable because it has editing feature”

Qus29:- IPV4 and IPV6 address types

Ans : – IPV4 —

Broadcast
Multicast
Unicast

IPV6 ?

Multicast
Unicast
Anycast ? Good feature in IPV6

“IPV6 is 128 bit long , having 8 octets∕blocks . Each block contain 16 bits . It got
implemented to reduce address shortage in IPV4” IP address is given to every
device in the network and it is used to identify the device with in the network.

Qus30:- STP States and how Root Bridge, Root port and Designated
Port got select?

Ans : – Spanning Tree Protocol is a loop prevention technique defined by IEEE 82.1d

.Switches run STP by default , Switches use spanning tree algorithm STA to decide which

port should be shut down.

STP States ?

Disable
Blocking
Listening
Listening
Learning
Forwarding

The selection of Root Bridge is based on Bridge_ID , Bridge_ID consist bridge priority and
MAC address .by default priority is 32768. If all switches have same priority then root bridge
selection will be based on MAC address. Bridge_ID go in BPDU packet. Every switch share
Bridge protocol data unit (BPDU) after 2 seconds.

All ports of Root Bridge are designated ports

The ports that are connected directly with Root Bridge become root port.

Convergence time of STP is 32 seconds

Basics of networking
SOME BASIC THINGS BEFORE STARTING CCNA ! Lets Exercise ping :– packet internet gopher it
uses icmp ﴾ internet control message protocol﴿? protocol For verification the other device is
reachable to me or not?? ipconfig :– to check the ip address of a computer ipconfig /all :– to check
the ip address + mac address … Continue reading

Network Kings 0
Chat with us, we're online!
CCNA
ccna interview questions 2022, ccna interview questions and answers,
ccna interview questions and answers 2022, ccna interview questions and answers for
freshers, ccna interview questions and answers pdf 2022,
ccna interview questions book, ccna interview questions for experienced,
ccna interview questions in hindi
CCNP vs CCIE: When to Choose Which Cisco Certi몭cation?
CCNA VS CCNP – What sets them apart

4 thoughts on “CCNA INTERVIEW QUESTIONS &


ANSWERS”

Kibi Bersisa
June 13, 2022 at 11:07 pm

IT good information

Reply

Satpreet Singh
December 15, 2022 at 4:10 pm

Thanks! You can also check our blogs for more quality learning!
Check this: https:∕∕www.nwkings.com∕ccna-tutorial

Reply
Brajagopal Tripathi
June 16, 2022 at 11:38 pm

I’m actually preparing for an interview. It’s really very helpful.

Reply

Satpreet Singh
December 15, 2022 at 4:09 pm

Thanks! You can also check our blogs for more quality learning!
Check this: https:∕∕www.nwkings.com∕ccna-tutorial

Reply

Leave a Comment

Name *

Email *

Website

Save my name, email, and website in this browser for the next time I comment.
Post Comment

This site uses Akismet to reduce spam. Learn how your comment data is processed.
Tired of learning yourself ?
Enquire now & Learn From Engineers.

Name *

E­mail *

Whatsapp Number *
+91

Course Interested *

Country ?

Lead Name

Receive Updates on Whatsapp

Begin Learning Now !


Network Kings 2022. All rights reserved.

SCO 41,42,43, B Block, 4th Floor, Chandigarh Citi Center, VIP Rd, Near Metro, Zirakpur – 140-603 (Pb.), India

Network kings 60 Parrotta Drive Toronto ON M9M OE5

COMPANY
About Us
Reviews
Home
Contact Us
RESOURCES
Career
Blog
Hire from Us
Refund Policy
Terms & Conditions
Privacy Policy
Af몭litate
Pay in EMI
Become an Instructor
Help and Support

FOLLOW US

     

Network
Kings App

CONTACT US
 81305-37300
 1800 120 1334 (India)
 support@networkkings.org

We accept payments using:


Disclaimer- @2011-2022-Network Kings. All Rights Reserved. We do not claim the ownership of the logos used
above. They only belong to their respective organizations.

You might also like