Cisco Interview Preparation and Recruitment Process


About Cisco


Cisco Systems, Inc., commonly known as Cisco, is a global leader in networking and telecommunications technology. Founded in 1984 by Leonard Bosack and Sandy Lerner, two Stanford University computer scientists, Cisco is headquartered in San Jose, California. The company’s name is derived from San Francisco, and its logo represents the Golden Gate Bridge. Cisco pioneered the development of routers and networking solutions, playing a pivotal role in building the internet's infrastructure.

Cisco Interview Questions

Key Facts About Cisco:

  • Industry: Information Technology, Communications Equipment
  • Core Products: Cisco designs, manufactures, and sells networking hardware (routers, switches, wireless systems), software, cybersecurity solutions, collaboration tools (e.g., Webex), and data center technologies. Notable product lines include Cisco Catalyst, Silicon One, and Hypershield for AI-native security.
  • Markets Served: Enterprises, service providers, governments, educational institutions, and small businesses across industries like healthcare, finance, and transportation.
  • Innovations: Cisco is a leader in Internet Protocol (IP)-based networking, Internet of Things (IoT), cloud computing, and AI-driven solutions. Its 2023 acquisition of Splunk enhanced its cybersecurity and data observability capabilities, leveraging machine learning for real-time threat detection.
  • Global Reach: Operates in the Americas, EMEA (Europe, Middle East, Africa), and APJC (Asia Pacific, Japan, China) with over 71,000 employees worldwide.
  • Financials: As of April 24, 2025, Cisco’s market capitalization is approximately $223.94 billion, with annual revenue of $54.18 billion and earnings per share of $2.28 (previous year). Stock ticker: CSCO (NASDAQ).
  • Certifications: Cisco’s Networking Academy has trained over 20 million learners since 1997, offering certifications like CCNA and CCIE to validate IT skills.
  • Sustainability: Cisco is committed to environmental sustainability, promoting energy-efficient technologies and a circular economy.


Historical Milestones:

  • 1984: Founded to commercialize multiprotocol routers, based on Stanford’s “Blue Box” technology.
  • 1990: Went public with a market cap of $224 million.
  • 1990s: Dominated the router market and expanded through acquisitions like Crescendo Communications (1993) for switching technology.
  • 2006: Rebranded to “Cisco” and launched “The Human Network” campaign.
  • 2009: Listed on the Dow Jones Industrial Average.
  • 2023: Acquired Splunk, strengthening AI and cybersecurity offerings.


Recent Developments:

  • AI Focus: Cisco is investing in AI infrastructure, with Silicon One platforms supporting high-speed, scalable AI networks and Cisco AI Defense for secure AI application development.
  • Security: The Hypershield architecture provides AI-native cybersecurity, protecting workloads across hybrid cloud environments.
  • Controversies: Allegations of NSA backdoors in Cisco products surfaced in 2014 via Edward Snowden’s leaks, which Cisco denied. Recent X posts (April 2025) highlight a vulnerability (CVE-2025-32433) in Erlang-based systems, though Cisco reports no remote code execution risk yet. Additionally, some X posts allege workplace issues regarding Palestinian and Arab employees, though these claims are unverified and inconclusive.


Corporate Culture:

Cisco emphasizes inclusivity and innovation, earning recognition on Fortune’s 100 Best Companies to Work For list. Its Cisco Live events, like the upcoming June 2025 San Diego conference, foster community and technical training. However, posts on X have raised concerns about workplace dynamics, which require further investigation for accuracy.


How to Engage with Cisco:

  • Products/Services: Explore offerings at www.cisco.com.
  • Certifications: Visit www.netacad.com for training.
  • Support: Contact Cisco at 1-800-553-2447 (U.S./Canada, enterprise) or check www.cisco.com for global contacts.
  • Careers: Job opportunities are listed on Cisco’s LinkedIn or www.cisco.com.


Cisco Recruitment Proces


Here’s a clear breakdown of the Cisco recruitment process (as of recent trends):


1. Application

  • You apply online through Cisco’s Careers page, LinkedIn, or sometimes through university placement drives.

  • Make sure your resume is tailored to the role (technical skills, certifications like CCNA, or project experience if applying for tech roles).


2. Online Assessment (if applicable)

For technical or intern roles, Cisco often conducts an online test:

  • Aptitude Questions (logical reasoning, quantitative ability)

  • Technical Questions (basic networking, programming, cybersecurity depending on the role)

  • Coding Test (for software roles) – platforms like HackerRank might be used.


3. Technical Interviews

Usually 1–2 rounds, depending on the position:

  • For Networking Roles: Expect deep questions on OSI model, routing protocols (BGP, OSPF), switching concepts, VLANs, subnetting, etc.

  • For Software Roles: Data structures and algorithms, OOPs concepts, APIs, Python/Java/C++ skills, and sometimes networking basics.

  • For Security Roles: Cybersecurity fundamentals, VPNs, firewalls, encryption, etc.

  • Interviews can be virtual (via Webex) or in-person.


4. Managerial/Behavioral Interview

  • Focuses on your soft skills, teamwork, problem-solving approach, and alignment with Cisco’s culture ("Conscious Culture").

  • Questions like "Describe a time you overcame a challenge" or "How do you prioritize tasks under pressure?"


5. HR Interview

  • Discussion around salary expectations, relocation, availability, career goals, and company values.

  • Might include some light behavioral questions too.

  • Cisco emphasizes diversity, inclusion, and innovation.


Key Tips for Cisco Interviews:

  • Know Networking Basics if applying for technical roles (even for software roles, basics help).

  • Understand Cisco Products (like Cisco Webex, Cisco Meraki, etc.) to show genuine interest.

  • Prepare for STAR method answers (Situation-Task-Action-Result) for behavioral questions.

  • Highlight any Cisco certifications (e.g., CCNA, CCNP) or related projects.

  • Cultural fit is important — Cisco promotes innovation, inclusivity, and sustainability.

Cisco Interview Questions :

1 .
Define a firewall?

A firewall is a security device — either hardware, software, or both — that monitors and controls incoming and outgoing network traffic based on predefined security rules.

Its main purpose is to create a barrier between a trusted internal network (like your organization's network) and untrusted external networks (like the Internet) to block malicious traffic and unauthorized access.


Simple Definition:

A firewall is like a security guard for your network — it decides what data is allowed in or out based on rules you set.


Key Functions of a Firewall:
  • Packet Filtering: Checks data packets and allows or blocks them based on source/destination IP, port number, and protocol.

  • Stateful Inspection: Tracks the state of active connections and makes decisions based on the context of the traffic.

  • Proxy Services: Acts as a middleman between users and the internet, hiding internal network details.

  • Intrusion Prevention: Some firewalls can detect and prevent attacks in real-time.


Types of Firewalls:
  • Network-based Firewalls: Protect entire networks (hardware devices).

  • Host-based Firewalls: Installed on individual devices (software, e.g., Windows Firewall).

  • Next-Generation Firewalls (NGFW): Include deep packet inspection, intrusion prevention systems (IPS), and advanced threat protection.

2 .
What is a link?

A link in networking refers to a connection between two devices that allows them to communicate with each other by transmitting data.


Simple Definition:

A link is the physical or logical connection that carries data between two nodes (like computers, routers, or switches) in a network.


Types of Links:
  • Physical Link: A real, tangible connection like a cable (Ethernet cable, fiber optics) connecting two devices.

  • Logical Link: A virtual connection over a network, even if devices aren't directly connected physically (e.g., VPN connections, tunnels).


Examples:
  • An Ethernet cable connecting a PC to a switch = Physical Link.

  • A Wi-Fi connection between your laptop and a router = Wireless Physical Link.

  • A VPN tunnel connecting two company offices over the internet = Logical Link.

3 .
What is the default TCP session timeout for CISCO?

In Cisco devices, the default TCP session timeout typically depends on the specific Cisco platform and configuration, but generally, it is:


Default TCP Session Timeout: ~1 hour (3600 seconds)

This means if a TCP session stays idle (no traffic) for 1 hour, the Cisco device will close the session automatically.


Example Values on Common Cisco Platforms:
  • Cisco ASA (Firewall):

    • Default TCP idle timeout = 1 hour (3600 seconds)

    • You can see it with the command:

      show running-config timeout
      
  • Cisco Routers/Switches (with firewall features):

    • TCP session timeout defaults to about 60 minutes unless configured otherwise.

  • Cisco FTD (Firepower Threat Defense):

    • TCP idle timeout = 3600 seconds by default.


You Can Manually Change It

Example (Cisco ASA):

timeout tcp 2:00:00

This would set the TCP idle timeout to 2 hours.

4 .
What is a diskless workstation?

A diskless workstation is a computer that does not have its own hard disk (or local storage). Instead, it boots and loads its operating system over a network from a central server.


Simple Definition:

A diskless workstation is a computer that relies entirely on a network server to get its operating system, files, and applications — it has no internal storage like a hard drive or SSD.


How it Works:
  • When the workstation powers on, it uses a network boot protocol (like PXE – Preboot Execution Environment).

  • It connects to a boot server (like a TFTP server) to download the necessary system files.

  • All user data and applications are stored on and accessed from the central server.


Why Use Diskless Workstations?
  • Cost Saving: No hard drives needed in every machine.

  • Easier Management: Update or fix software in one place (the server), not on each computer.

  • Security: Data stays centralized; if a workstation is stolen, no data is lost.

  • Energy Efficient: No spinning disks = less power consumption.


Where You Find Them:
  • Corporate offices (for basic client computers)

  • Schools and universities (computer labs)

  • Thin client setups (in Virtual Desktop Infrastructure - VDI environments)

  • Kiosks and public terminals


* Example
: In a university lab, dozens of diskless PCs might boot Linux from a central server. If the OS needs an update, the admin only updates the server — not each PC individually.

5 .
What is routing?
Routing (in networking) is:

The process of selecting a path for traffic in a network, so that data packets can travel from their source to their destination efficiently.


In simple words:

Routing is like choosing the best road for your data to travel across a network (like the Internet) to reach its target device.


How Routing Works:
  • Devices called routers examine the destination IP address of each data packet.

  • They decide the best next hop (the next router or device) based on routing tables and routing protocols.

  • Routers then forward the packet along the selected path until it reaches its final destination.


Key Elements of Routing:
  • Routing Table: A database in a router listing paths to various network destinations.

  • Routing Protocols: Special rules routers use to communicate and share information (like OSPF, BGP, RIP).

  • Static Routing: Manually configured paths.

  • Dynamic Routing: Paths automatically learned and updated using routing protocols.


Example:

When you send a message from your phone in India to a server in the USA:

  • Your phone sends the data to a local router.

  • The router checks its routing table and forwards the packet toward a bigger router (ISP router).

  • Step-by-step, each router decides where to send the packet next.

  • After multiple hops, the data finally reaches the server.


* Summary
: Routing is the heart of network communication — it ensures your data finds the right way through a complex web of networks.

6 .
Explain types of routing protocols
Types of Routing Protocols

Routing protocols help routers learn routes dynamically and share information about networks. They are mainly divided into two broad categories:


1. Interior Gateway Protocols (IGP)

(Used within a single organization or autonomous system)

Protocol Type Description Examples
Distance Vector Routers share information with their neighbors only. They send the entire routing table periodically. RIP, IGRP
Link State Routers share only the state of their links (their direct connections) with all routers in the area. More efficient. OSPF, IS-IS

2. Exterior Gateway Protocols (EGP)

(Used to route between different organizations or autonomous systems)

Protocol Type Description Examples
Path Vector Used between different networks on the Internet. Focuses on path attributes and policies. BGP (Border Gateway Protocol)

Short explanation of important protocols:
  • RIP (Routing Information Protocol):

    • Distance vector protocol.

    • Uses hop count as the metric.

    • Max hop count = 15; 16 = unreachable.

    • Simple but slow and not ideal for large networks.

  • IGRP (Interior Gateway Routing Protocol):

    • Cisco proprietary (replaced by EIGRP).

    • Improves over RIP by considering bandwidth, delay, reliability, and load.

  • EIGRP (Enhanced IGRP):

    • Hybrid protocol (both distance vector and link state features).

    • Cisco proprietary (now partly open).

    • Fast convergence and scalable.

  • OSPF (Open Shortest Path First):

    • Link-state protocol.

    • Calculates the best path using Dijkstra’s algorithm.

    • Suitable for large, complex enterprise networks.

    • Divides networks into areas to optimize traffic.

  • IS-IS (Intermediate System to Intermediate System):

    • Another link-state protocol (used mostly by ISPs).

    • Similar to OSPF but more flexible for very large networks.

  • BGP (Border Gateway Protocol):

    • "Protocol of the Internet."

    • Connects different companies, ISPs, or data centers.

    • Focuses on path attributes like AS-PATH.

    • Very scalable but complex to configure.


Quick Table to Remember
Protocol Type Metric Usage
RIP Distance Vector Hop Count Small Networks
EIGRP Hybrid Bandwidth + Delay Cisco-based Large Networks
OSPF Link State Cost (based on bandwidth) Enterprise Networks
IS-IS Link State Cost ISP Backbone
BGP Path Vector Path Attributes Internet / Inter-AS
7 .
What are the different types of memories in a Cisco router?
Different Types of Memory in a Cisco Router

A Cisco router typically uses four types of memory, each serving a different purpose:

Memory Type Purpose Key Points
RAM (Random Access Memory) Temporary working memory - Stores the running configuration- Holds the routing tables- Contains packet buffers- Loses data when router reboots (volatile)
ROM (Read-Only Memory) Stores bootstrap and basic diagnostics - Contains the POST (Power-On Self Test)- Contains the basic startup program (bootstrap loader)- Non-volatile (data persists)
NVRAM (Non-Volatile RAM) Stores startup configuration - Stores the configuration that is loaded when the router boots- Non-volatile (keeps data even when power is off)- Usually small in size
Flash Memory Stores the IOS image (operating system) - Holds the router’s operating system (Cisco IOS)- Can store multiple IOS versions- Non-volatile (like a hard disk)- Electrically erasable and writable

Quick Explanation of Each:
1. RAM
  • Think of it like the router’s active workspace.

  • Contents include:

    • Running-config (current configuration)

    • Routing tables

    • ARP cache

  • Wipes clean when you turn off the router.


2. ROM
  • Acts like a backup brain.

  • Contains:

    • Minimal IOS version (ROM Monitor/ROMMON)

    • Bootstrap program (to load IOS from flash)

  • Cannot be easily changed.


3. NVRAM
  • Stores the startup-config file.

  • When the router boots, it loads startup-config from NVRAM into RAM.


4. Flash
  • Think of this like the hard drive for the router.

  • Stores:

    • Main IOS image

    • Backup IOS images

  • Flash is electrically erasable (you can upgrade IOS versions easily).


Summary in one line:

RAM = running workspace,
ROM = basic startup instructions,
NVRAM = saved startup settings,
Flash = storage for the router’s operating system.

8 .
Define the types of network nodes.
Here are the types of network nodes based on their function and application in a distributed network:

Internet Network Nodes : They are the physical network nodes that act as a host computer in the internet network. They are generally defined by their distinct IP addresses. WAN access points don’t have any IP address.

Data Communication Nodes : They either include communication devices, like modems, hubs, bridges, routers, switches, etc., or physical nodes. They are present between Data Terminal NodeS (DTE) and data communication circuits. One of the primary roles of data communication nodes is to execute signal conversion, line clocks, and coding.

Telecommunications : With the help of telephone nodes in a computer, you get intelligent network services. These assist in exchanging information. Nodes in a cellular network carry base station controllers that work to regulate different base stations at once.

LANs and WANs : These include devices or physical nodes. Furthermore, they comprise a different MAC address for Network Interface Card (NIC). LANs and WANs are computers, modems, wireless LAN access points, and more.

Distributed Nodes : These nodes are involved in a distributed environment. There are generally two types of distributed nodes: virtual nodes and physical nodes. Mainly, they are used to maintain transparency in the network.
9 .
Define a gateway.
What is a Gateway?

A gateway is a network device that connects two different networks and translates communication between them, allowing data to flow from one network to another.


Simple Explanation:
  • A gateway acts like a bridge between two networks that might use different protocols, architectures, or formats.

  • It receives data from one network, translates it if necessary, and forwards it to another network.


Example:
  • Your home router serves as a gateway:
    It connects your private home network (192.168.x.x addresses) to the public Internet (global IP addresses).

  • In a corporate setup, a gateway might connect a company's internal network to a partner’s network using different communication rules.


Important Points:
  • A default gateway in networking is the router IP address that devices send traffic to when they need to reach outside their own local network.

  • In complex enterprise networks, specialized gateways might also do:

    • Protocol conversion (e.g., TCP/IP to AppleTalk)

    • Data format translation

    • Security filtering (firewalls often act as gateways too)


Summary
:

A gateway connects different networks, translates communication between them, and routes data to the correct destination.

10 .
How is a TCP connection established?
The following steps enumerate the process of establishing a TCP connection:

Step 1: The host or the receiver sends a packet with an SYN flag to the sender (server). Then, the server responds with an SYN flag and ACK (ACKnowledge) flag to approve the connection. Next, the receiver sends an ACK flag and confirms the handshake. The OS at both ends is informed about the connection establishment.

Step 2: Now, the sender initiates data transmission and gets acknowledgments from the receiver. A timer starts as the sender begins sending data.

Step 3: The sender retransmits the data even if it hasn't received any acknowledgments after the timer limit exceeds.

Step 4: In the case of windowing, when the receiver buffer is full, the receiver sends a stop signal to the sender to stop the data transmission.

Step 5: After all the data processing is done, the receiver sends the go signal to the sender to start transmitting the data again.
11 .
What do you know about diskless workstations?
It refers to the client computers that are connected to a networked server. Such computers will require only a small amount of hardware to interact with the system through a user. Diskless workstations don’t carry a hard disk. Programs and data will get retrieved from the network. The server does all the hard work, such as performing calculations, booting, and data storage.

Furthermore, they are even helpful in decreasing the overall cost of LAN as a single disk drive. In addition to this, diskless workstations also simplify backups and security as all the files are stored in a single place, which is the file server.
12 .
Which protocol will you use to boot the diskless workstations?
Bootstrap Protocol or BootP will be used to boot the diskless workstations across the internet. The BootP is much similar to Dynamic Host Configuration Protocol (DHCP) and lets a computer obtain the IP address of the server along with its own IP address.
13 .
What is cut-through LAN switching?
Cut-Through LAN Switching

Cut-through switching is a method used in Ethernet LAN switches where the switch begins forwarding a frame as soon as it reads the destination MAC address, without waiting for the entire frame to be received. This reduces latency compared to other switching methods like store-and-forward.


How Cut-Through Switching Works
  1. Reads Destination MAC Address:

    • The switch examines only the first 6 bytes (destination MAC) of the incoming Ethernet frame.

  2. Immediate Forwarding:

    • The switch starts forwarding the frame before the entire packet is received, reducing delay.

  3. No Full Error Checking:

    • Unlike store-and-forward, it does not check the frame for errors (CRC) before forwarding.


Advantages

✔ Lower Latency – Faster forwarding since the switch doesn’t wait for the full frame.
✔ Better for Real-Time Apps – Ideal for VoIP, gaming, and high-frequency trading where delay matters.


Disadvantages

✖ No Error Checking – Forwards corrupted or runt frames, increasing network errors.
✖ Less Reliable – Not suitable for noisy or unreliable networks.


Cut-Through vs. Store-and-Forward Switching
Feature Cut-Through Store-and-Forward
Latency Very Low Higher (waits for full frame)
Error Checking No Yes (drops bad frames)
Use Case Low-latency apps High-reliability networks

Variations of Cut-Through Switching
  • Fast Forward Switching – Minimal latency; forwards immediately after reading MAC.

  • Fragment-Free Switching – Checks first 64 bytes (to avoid collision fragments) before forwarding.


When to Use Cut-Through?
  • In low-latency, high-speed networks (e.g., data centers).

  • When error rates are low (e.g., fiber-optic networks).

14 .
What is context switching and how is it triggered?
Context switching stores the context or state of a process for reloading and executing it after resuming from the same point as earlier. The feature is for multitasking operating systems that allow multiple functions to share a single CPU. The three major triggers are:

* Multitasking
* Interrupt Handling
* User and Kernel Mode Switching.
15 .
What are the different OSI layers?
OSI model consists of the following seven layers:

* Physical
* Data Link
* Network
* Transport
* Session
* Presentation
* Application
16 .
Tell us the access-list range for extended VINES, extended XNS, and extended IP.
The access-list range of extended VINES extended XNS and extended IP is:

* Extended VINES: The range is 101 - 200

* Extended XNS: The range is 500 - 599

* Extended IP: The range is 100 - 199 and 2000 - 2699
17 .
Write a program for printing all permutations of a given string.
A permutation means re-arranging the ordered list(L) elements into a correspondence of one-to-one with the L itself. It is also known as an “order” or “arrangement number”. There will be n! permutation for a string with length n.

For finding all permutations of a given string, the recursive algorithm will make use of backtracking which finds the permutation of numbers by swapping a single element per iteration.

We are providing the “XYZ” string as an input in the below given example. It will produce 6 permutations for a given string. The permutation for a string “XYZ” are “XYZ”, “YXZ”, “ZYX”, “XZY”, “YZX”, “ZXY”.

Program:
// C Program to print all permutations of a given string including duplicates

#include <stdio.h>
#include <string.h>
// Function for swapping values at two pointers
void swap(char *a, char *b)  
{
   char temp;
   temp = *a;
   *a = *b;
   *b = temp;
}

/* Function for printing permutations of a string. This function takes
three parameters: String, Starting index of the string, last index of
the string. */
void permute(char *a, int beg, int end)
{
   int i;
   if (beg == end)
       printf("%s\n", a);
   else
   {
       for (i = beg; i <= end; i++)
       {
           swap((a+beg), (a+i));
           permute(a, beg+1, end);
           //backtracking method
           swap((a+beg), (a+i));
       }
   }
}

// Driver program for testing above defined functions
int main()
{
   char string[] = "XYZ";
   int n = strlen(string);
   permute(string, 0, n-1);
   return 0;
}​


Output:
XYZ
XZY
YXZ
YZX
ZYX
ZXY​
18 .
Write a program for finding the greatest difference between two elements of an array that is in increasing order of elements.
A solution for this problem can be achieved with the usage of two loops. Initially, we consider the maximum difference value as the difference between the first two array elements. Later, the elements will be picked one by one in the outer loop and the difference between the picked element and every other array element will be calculated in the inner loop, then that difference will be compared with the maximum difference calculated so far.

Program:
// Java program
class MaxDiffrence
{
   /* The function will assume that there will be at least two elements
   in an array. The function will return a negative value if the array
   is in decreasing order of sorting. This function will return 0
   if elements are equal. */
   
   int maximumDiff(int x[], int size)
   {
       int res = x[1] - x[0];
       int i, j;
       for (i = 0; i < size; i++)
       {
           for (j = i + 1; j < size; j++)
           {
               if (x[j] - x[i] > res)
                   res = x[j] - x[i];
           }
       }
       return res;
   }

   // Driver program for testing above function
   public static void main(String[] args)
   {
       MaxDifference md = new MaxDifference();
       int array[] = {2, 3, 90, 10, 120};
       System.out.println("Maximum difference between two elements of an array is " + md.maximumDiff(array, 5));
   }
}​

Output:
Maximum difference between two elements of an array is 118​
19 .
Write a program for finding the first and last occurrences (or positions) of a number in an array of a sorted manner.
Assign firstPos and lastPos values as -1 in the beginning, as we need to find them yet. Within for loop, you need to compare a given element with each element of an array. When an element is found for the first time, we will update the firstPos value with i. After that, whenever we find an element, we will update the lastPos value with i. Then firstpos and lastPos value will be printed.
// C++ program
#include <bits/stdc++.h>
using namespace std;

void findFirstAndLastFunc(int a[], int n, int x)
{
   int firstPos = -1, lastPos = -1;
   for (int i = 0; i < n; i++)
   {
       if (x != a[i])
           continue;
       if (firstPos == -1)
           firstPos = i;
       lastPos = i;
   }
   if (firstPos != -1)
       cout << "First Occurrence = " << firstPos<< "\n Last Occurrence = " << lastPos;
   else
       cout << "Element not Found";
}

int main()
{
   int a[] = { 1, 2, 2, 2, 3, 3, 4, 5, 7, 7};
   int n = sizeof(a) / sizeof(int);
   int x = 7;
   findFirstAndLastFunc(a, n, x);
   return 0;
}​

Output:
First Occurrence = 8
Last Occurrence = 9​
20 .
Explain in detail about Bridges in Networking and mention its usage.
A bridge is a networking device that will connect numerous LANs (Local Area Networks) for forming a larger LAN. Also, it can connect LAN segments to form newer LAN segments. It operates in the OSI model’s Data-Link layer. Bridges are helpful in increasing the network capacity of a single LAN by joining multiple LANs.

Working of Bridge:

The bridge will connect two or more different LANs that are having similar protocols and help to communicate between the devices (nodes) in them. It will accept all the data packets and all of them will be amplified to the other side. The bridges are considered to be intelligent devices as they will permit the passing of only selective packets from them.

A bridge will pass only those packets which are addressed from the node of one network to the node of the other network. That means the bridge will consult a database on receiving the data frame for deciding whether to pass, transmit or discard the frame.

* If the frame consists of a destination MAC (Media Access Control) address within the same network, then the bridge will pass the frame to that node and discard it later.
* If the frame consists of a destination MAC address within the connected network, then the bridge will forward the frame towards it.

Uses of Bridge:

* The capacity of the network will be increased and multiplied as multiple smaller networks are combined to form a single network using the bridge.
* The database in the bridge will help for deciding whether a data frame should be transmitted or discarded on receiving the data frame.
* A single faulty node will be prevented from bringing down the whole network, by deciding on whether to forward or discard the data frame.
* It helps for frame broadcasting to each node even if the MAC or destination address is not available.
* With the help of a wireless bridge, we can connect the wireless networks with wireless segments.
21 .
What are TACACS (Terminal Access Controller Access Control System) and RADIUS (Remote Authentication Dial In User Service) in networking?
TACACS: It is a group of remote authentication protocols useful in controlling remote authentication and other related services for the networked access control via a centralized server. TACACS will help for determining whether the user is having access to the network or not as it will permit the remote access server to communicate with an authentication server.

RADIUS: It is an AAA (Authentication, Authorization, and Accounting) protocol to control access to network resources. RADIUS is used by ISPs (Internet Service Providers) and corporations to manage access into the Internet or internal networks across a group of access technologies that include wireless, DSL, modem, and VPNs.

Frequently Asked Questions



1. Why do u want to join Cisco?

You can answer the above question in the following way:

“I want to join Cisco for three reasons. Firstly, I believe working at Cisco adds to a natural progression in my career development. Secondly, I want to work at Cisco because this is a company that is constantly innovating and changing to make sure it meets the needs of its customers and service users. Finally, I want to join Cisco because I’m interested in working alongside passionate people who are eager to drive forward the organisation that they are working for. We spend a lot of our valuable time at work, and I want that time to be put to best use.”


2. How do you get selected in Cisco?

To get selected by Cisco, you should be following the below procedures –

* Fill out the application issued by Cisco on its official website or apply directly through a recruiter/referral link.
* Build a resume that highlights your skills for a specific position that you are applying for.
* Have extensive background research on Cisco, understand its day-to-day operations, and its achievements.
* Prepare for the Cisco job interview and give your best during the interview to get selected.


3. What is the average salary of a Cisco employee in India?

According to payscale.com, Cisco Systems pays an average salary of ₹15,00,000 per year to its employees. The salaries at Cisco can typically range from an average of ₹6,50,000 to ₹30,00,000 per year. Cisco Systems employees with the job title of Software Engineering Manager paid most with an average annual salary of ₹28,78,888, while the employees with the title Network Engineer paid the least with an average annual salary of ₹7,50,000.


4. What are the prerequisites for an entry-level job at Cisco?

The candidates who are applying for an entry-level job at Cisco should possess a Bachelor’s degree with 60% throughout in 10th, 12th & Graduation degree. Moreover, while appearing for the hiring process at Cisco, the candidates should not have any pending backlogs. Apart from the specific technical knowledge, you will also be required to possess some soft skills, including good communication & reasoning skills.


5. Is Cisco a good company to start your career?

Cisco is the best place to start your career if you are interested in the networking domain. You will get many benefits & perks and also receive a chance to work on the latest technologies. A few reasons that make Cisco an awesome place to start a career are – a lucrative salary, a great environment to grow your network, and excellent career growth opportunities.