► Computer Networking ► Interview Questions ► Networking Classes
10/8/13
e w or ng n erv ew ques ons - pos e on une
200 Networking interview questions and answers - networking faq pdf
,
a
:
y
s pra
ng
1. Differentiate between hub and switch. a.) Hub is a l ayer 1 device while Switch is la yer 2 device. b.) Hub works on single collision and single broadcast domain while s witch works on per port collision and s ingle broadcast domain.
2. What is FQDN? - FQDN is the abbreviation for Fully Qualified Dom ain Nam e. - It contains both the hostname and a domain name. - It uniquely identifies a host within a DNS hierarchy
3. Tell us something about LMHOSTS files. - It is a text file that resolves NetBIOS names to IP addres ses . - It can be compared with the HOSTS file which is a static method of resolving domain names into IP addresses. - LMHOSTS files must be manually configured and updated.
4. What are the main qualities of an effective and effici ent network? a. Performance b. Reliability c. Security
5. What are 10Base2, 10Base5 and 10BaseT Ethernet LANs? 10Base2 - It is an Ethernet term which means a maximum transfer rate of 10 Megabits per second that uses baseband signaling, with a contiguous cable segment length of 100 meters and a maximum of 2 segments. 10Base5 - It is an Ethernet term meaning a maximum transfer rate of 10 Megabits per second that uses baseband signaling, with 5 continuous segments not exceeding 100 meters per s egment. 10BaseT - It is an Ethernet term meaning a maximum transfer rate of 10 Megabits per second that uses baseband signaling and twisted pair cabling.
6. What is anonymous FTP? What is its use? - It is an FTP that enables the users to connect to a host without a valid login and password. - The login used is anonymous or guest, with the password usually requesting the user's ID. - It enables a large number of users to access the files on the host without needing to set up a login for all of them. - It exercises a strict control over the areas an anonymous user can access.
7. Which factors mark the reliability of the network? a. Frequency of failure b. Downtim e / Time taken for recovery
Subneting RTP Multicasting Socket Programming Secured Socket Layer Bluetooth
10/8/13
200 Networking interview questions and answers - networking faq pdf
8. Name the factors that tell us about the security of the network. a. Virus attacks on the s ystem. b. Unauthorized access to the system.
9. Define Bandwidth and Latency? - Bandwidth/ Throughput – It means the number of bits which can be transmitted over the network in a specified time. - Latency – It is the time taken by a mes sage to travel from one si de to another. Bandwidth and la tency describe the pe rformance of a network.
10. What is point to point link? - Direct connection between two computers on a network is called as point to point link. - No other network devices other than a connecting cable are required for poin t to point connection. - The cable connects the NIC card of both the devices.
11. When is a switch said to be congested? - Sometimes a switch receives the packets faster than they can be accommodated in the shared link. These packets are stored in the memory for sometime. - However, after sometime the buffer space will exhaust and some packets will start getting dropped off. - The switch is called as congested in this s tate.
12. Explain a.) Uni-casting, b.) Multicasting and c.) Broadcasting a.) Uni-casting - Message is sent from a s ource to a single des tination node. b.) Multicasting - Message is sent from a s ource to some s ubsets of other nodes. c.) Broadcasting - Message is sent from a source to all the nodes in the network.
13. What are the various types of Multiplexing? The various types o f multiple xing are: a. Frequency Division Multiplexing (FDM) b. Time D ivision Multiplexing (TDM) i. Synchronous TDM ii. Asynchronous TDM c. Wave Division Multiplexing (WDM)
14. Which layers of OSI are referred to as network support layers? The following 3 layers of OSI are referred to as network support layers: a. Physical La yer b. Data link Layer and
10/8/13
200 Networking interview questions and answers - networking faq pdf
c. Network L ayers
15. Which layers of OSI are referred to as user support layers? The block of user support layers consists of: a. Session Layer b. Presentation Layer and c. Application Layer
16. What does the Data Link Layer do? - The Data Link Layer transforms the physical layer to a reliable link. It takes care of: a. Node to node del ivery. b. Framing c. Physical Addressing d. Flow Control e. Error Control f. Access Control
17. What is NIC? - NIC stands for Network Interface Card. - It is a peripheral card attached to a PC to helps it connect to a network. - The MAC address o f the card helps the network in ide ntifying the PC.
18. What are the responsibilities of Network Layer? - The Network Layer aids in source-to-destination delivery of packet across multiple networks. - It performs: a. Logical Addressing b. Routing
19. Name the various error detection methods. The various error detection methods are: a. Vertical Redundancy Check (VRC) b. Longitudinal Re dundancy Check (VRC) c. Cyclic Redundancy Check (VRC) d. Checksum
20. . What is Bit Stuffing? - Bit stuffing means adding one e xtra 0 whenever five consecutive 1s follow a 0. - This is done so that the pattern 0111110 is not mistaken for a flag.
21. How does dynamic host configuration protocol aid in network administration?
10/8/13
200 Networking interview questions and answers - networking faq pdf
- In a large set up where it is difficult to manually configure the IP address of each system, dynamic host configuration protocol comes very helpful. - Using this protocol, the administrator can create a pool of IP addresses which are called scopes. These can be then dynamically assigned to the systems.
Routing and Switching What are Brute Force Attacks? Brute forcing is a mechani sm which is used by an attacker to break the encryption of data by applying a s et of various key............. Read Answer
How do you use RSA for both authentication and sec recy? RSA is a public key encryption al gorithm. The R SA algorithms are........... Read Answer
Can you differentiate among encoding, encryption and hashing? Encoding: Basically encoding is used to protect the integrity of data as it crosses through communication network to keep its original message............. Read Answer
If you have to generate a hash function then what characteristics are needed in a secure hash function? A secure has h function shou ld have the following characteristics:................ Read Answer
What is digital signature? Differentiate between Physical and Digital Signature A digital si gnature is an electronic analogue of a written signature; the digital signature can be used to provide ass urance........... Read Answer
What is Authentication Header and how it provides the protection to IP header? Basicall y Authentication Header protects IP head er and provides the comple te authenticity to the IP packets............. Read Answer
Explain SSL Protocol. How does it protect internet users from various threats? The SSL protocol (Secure Socket Layer protocol) was originall y developed b y Netscape, to ens ure s ecurity of data transported............. Read Answer
10/8/13
200 Networking interview questions and answers - networking faq pdf
What is PIX firewall security? How does it differ from a firewall? PIX (Private Internet E xchange)........... Read Answer
What are Malware? Explain different types of Malware Malware is a software program which is developed to destroy a computer s ystem.............. Read Answer
What are replay attacks? Give an example of replay attack Replay attacks are the network attacks in w hich an attacker spi es the conversation b etween the s ender and recei ver.......... Read Answer
If you have to ‘encrypt’ as w ell as ‘com press’ data during transmission then which w ould you do first and why? Data s hould be transm itted over any communication network in s uch a w ay that the data integrity and authenticity............. Read Answer
What is the goal of Information Security in an organization? Mainly there are three Information s ecurity goals in a n organ ization: C onfidentiality, Integrity and Availability.............. Read Answer
What is Symmetr ic-Key cryptography and Asymmetric-Key cryptography? Symm etric-Key Cryptography: Symm etric-key cryptography uses a s ingle key for both encryption and decryption. Encryption and decryption algorithm are i nverse of each other............. Read Answer
Explain the se rvices provided by IP (Internet Protocol) - Addressing, Fragmentat ion, Packet tim eouts and options Latest answer: Addressing: For the purpose of delivering datagram packets, IP needs to know about the address of the destination. By including the host addressing, this task is carried out by IP. As IP operates in an internet, its systems are designed to accept the address ing of d evices which are uniqu e............. Read answer
Explain the classes of IP address Latest answer: IP addresses are organized into classes. For convenience of humans, IP addresses are expressed in the decimal format. Every number i n each cla ss is represented as binary to computers .................. Read answer
10/8/13
200 Networking interview questions and answers - networking faq pdf
Define Broadcast, Unicast and Multicast. Latest answer: Unicast: A term used in communication to describe a piece of information to send from one point to another. There are only sender and receiver................ Read answer
What is Network Mask? Latest answer: A network mask is used for determination of what subnet an IP address belongs to. An IP address has network address and the host address................. Read answer
Define S ubnetting. Latest answer: A subnet des cribes a set of networked com puters wh ich have comm on IP addres s routing prefix.................. Read answer
What is the User Datagram Protocol (UDP)? Latest answer: Us er datagram protocol allows computer applications to send mess ages as datagram packets from source to destination on an Internet Protocol,.................. Read answer
Explain TCP Windowing concept. Latest answer: TCP Windowi ng is a concept that is used for avoiding conges tion in the network traffic.................. Read answer
What is the Domain Name System (DNS)? What are the advantages of it? Latest answer: A hierarchical naming system for computer systems, services or for that matter any resource participating in the internet................... Read answer
What is the TTL (Time to Live)? Why is it required? Latest answer: TTL is a value in data packet of Internet Protocol. It comm unicates to the ne twork router whether or not the packet sho uld be in the network for too long or discarded................. Read answer
Explain the use of Internet Control Message Protocol (ICMP) Latest answer: Internet Control Mess age Protocol is one of the impo rtant protocols in the Internet Protocol su ite. It is m ainly used in operating system of ne tworked com puters.................. Read answer
What is the use of IGMP protocol? Latest answer: Internet Group Management Protocol: - It allows internet hosts to participate in multicasting. The IGMP messages are used to learn which hos ts is part of which multicas t groups..............
10/8/13
200 Networking interview questions and answers - networking faq pdf
Read answer
What are Ping and Tracert? Latest answer: Ping and tracert are the commands used to s end information to some rem ote computers to receive som e information. Information i s sent and received by packets.............. Read answer
Explain RSVP. How does it work? Latest answer: Resource Reservation protocol is used to reserve resources across a network. It is used for requesting a specific Quality of Service (QoS) from the network............... Read answer
Explain the concept of DHCP. Latest answer: Dynamic Host Configuration Protocol is used as signing IP addresses to computers in a network. The IP addresses are assigned dynamically............... Read answer
What are the differences between a domain and a workgroup? Latest answer: In a domai n, one or more com puter can be a server to manage the network. On the other hand in a workgroup al l computers are peers having no control on each other............. Read answer
Explain how NAT works.
Latest answer: Network Address Translation translates and IP address used in a network to another IP address known within another network. A NAT table is main tained for global to local and local to m apping o f IP’s................ Read answer
What is PPP protocol? Explain PPP packet format. Latest answer: Point to Point protocol helps communication between 2 computers over a serial cable, phone line or other fiber optic lines. E.g. Connection between an Internet Service Provider an d a host................ Read answer
What is IP Spoofing and how ca n it be prevented? Latest answer: IP spoofing is a mechanism used by attackers to gain unauthorized access to a system. Here, the intruder sends messages to a computer with an IP address indicating that the message is coming from a trusted host............... Read answer
10/8/13
200 Networking interview questions and answers - networking faq pdf
Explain IP datagram, Fragmentat ion and MTU. Latest answer: IP datagram can be us ed to describe a portion of IP data. Each IP datagram has set of fields arranged in an order. The order is s pecific which helps to decode and read the s tream eas ily.............. Read answer
What is an application gateway? Latest answer: An application gateway is an appli cation program that runs on a firewall be tween two networks. An application gateway is used for establis hing connection b etween client program and des tination service.................. Read answer
Explain Circuit Level Gateway. Latest answer: A circuit level gateway is used to find if a session in TCP handshaking is legitimate or not. It can be considered as a layer between application layer and transport layer.................. Read answer
What is 'Gateway Of Last Resort'? A Gateway of Last Resort or Default gateway is a route used by the router when no other known route exists to transm it the IP packet. Known routes are pres ent in the routing table................. Read answer
What are switches? Explain the concepts of Layer-3 switches. Latest answer: It is a device that connects multiple network segments. A swi tch analyzes the MAC address and then determines wh ere to send the data.............. Read answer
What is Router? Explain components of Routers. Latest answer: The way switches connect multiple computers, a router connects multiple networks. Routers comprise of data consisting of large tables of networks and add ress es.................. Read answer
Overview of OSI layer. Latest answer: OSI stands for Open Systems Interconnection The OSI reference model gives an overview of the layered comm unications and com puter network protocol de sign ................... Read answer
Explain different layer s in the OSI model.
10/8/13
200 Networking interview questions and answers - networking faq pdf
Latest answer: Application Layer: Closes t to the end us er, Interact directly with the software appli cation. Presentation Layer: Translates a pplication to network form at, and vice versa, Works to trans form data in to the form that the application layer can accept, Forma ts and e ncrypts data to be s ent acros s a network......................... Read answer
Explain the concept and capabilities of Unicast IP Addresses. Latest answer: It is an IP address that uniquely identifies a host in a network. The datagram with a unicast IP address is received and processed by only a single host. Read answer
What is IP Multicasting? Latest answer: It is an IP address that identifies a particular group of hosts in network. This group of hosts is called a m ulticast group.............. Read answer
Explain the classes of IP addresses. Why do we need them? Latest answer: Class A: Range: from 0 .0.0.0 to 127.255.255.255. Leftmost bit: 0. First 8 bits: netid. Rema ining 24 bits : hos tid.............. Read answer
What is Subneting? Explain the advantages of using Subneting. Latest answer: Subneting is dividing a network into several subnets. This is usual ly done for the follow ing purpo ses :.................. Read answer
What is Superneting? Explain the concept of custom Subneting. Latest answer: Supernetting or Classless Inter-Domain Routing (CIDR) : It is a way to aggregate multiple Internet addresses of the same class.............. Read answer
What is VLSM, Variable length subnet masking? Latest answer: VLSM is a means of allocating IP addressing resources to subnets according to their individual need rather than some general network-wide rule................ Read answer
10/8/13
200 Networking interview questions and answers - networking faq pdf
What is Data Fragmentaion? Explain how Data Fragmentaion works. Latest answer: Fragmentation occurs when storage space is used inefficiently due to which storage capacity and performance is reduced................ Read answer
Explain the concepts and capabilities of IP Datagram. Latest answer: Data transmitted over an internet using IP is carried in messages called IP datagrams. Like all network protocol mes sages , IP uses a spe cific format for its datagram s................... Read answer
What is MAC address? Media Access Control address is an identifier for assigned to most network adapters or Network Interface Cards by the manufacturer for the purpose of identification............... Read answer
Describe the Packet Format of ARP (Address Resolution Protocol)? The fields of the packet format of ARP are as follows : -Hardware type: It is a 16-bit field . Each LAN has b een ass igned an in teger based on its type. For exampl e, Ethernet is given the type 1. -Protocol type: This is a 16-bit field de fining the protocol. For example, the value of this field for IPv4 protocol is 0800. -Hardware length: This i s an 8-bi t field defining the length of the physical addres s in b ytes. For example, for Ethernet the value is 6. -Protocol length: This is a n 8-bit field defining the leng th of the logical addres s in bytes. For exampl e, for IPv4 protocol the value is 4. -Operation: This is a 16-bitfield defini ng the type of packet. Two packet types are defined: ARP request (1), ARP reply (2). -Sender hardware address: This is a variable-length field defining the physical address of the sender. For example, for Ethernet this field is 6 bytes lon g. -Sender protocol address : This is a variable-length field defining the logi cal (for exampl e, IP) address of the s ender. For the IP protocol, this field is 4 bytes long. -Target hardware address: This is a variable-length field defining the physical address of the target. For example, for Ethernet this field is 6 bytes lo ng. -Target protocol addres s: This is a variable-length field defining the logi cal (for exampl e, IP) address of the target. For IPv4 protocol, this field is 4 bytes long.
What are the advantages of IPv6 over IPv4? the next generation IP, or IPv6 has s ome ad vantages over IPv4 that can be sum marized as foll ows: - Larger Address Space: An IPv6 address is 128 bytes long where IPv4 has 32-bit address only, this is a huge increase in the address space. - Better Header Format: IPv6 uses a new header format which simplifies and speeds up the routing process because most of the options do not need to be checked by routers. - New Options: IPv6 has new options to allow for additional functionalities.
10/8/13
200 Networking interview questions and answers - networking faq pdf
. -Support For Resource Allocation: In IPv6, flow label has been added to enab le the source to reques t special ha ndling of the packet. This mechanism can be used to support traffic such as real-time audio and video. -Support For More Security: The encryption and authentication options in IPv6 provide confidentiality and i ntegrity of the packet.
What are the different design goals of ATM? Asynchronous Transfer Mode (ATM) is the cell relay protocol. The Design Goals of ATM are as follows: - A technology is needed to take advantage of high rate transmission media and less susceptible to noise degradation for maximizing the data rates. -The system m ust interface with existing system s and p rovide wide -area inter-connectivity between. -The implem entation of design m ust be cheaper en ough so that everyone can afford it. If ATM is to become the backbone of international communications, as indeed, it must be available at low cost to every user who wants it. -The new system must be able to work with and support the existing telecommunication hierarchies. - The new system m ust be connection-oriented to ens ure accurate and predictable deli very. - One objective is to move as many of the functions to hardware as possible (for speed) an eliminate as many software functions as possible (again for speed).
Test your Networking skills! Networking (40 questions) Wireless communication Iphone Android Linux (27 questions) Test your network ing knowledge with our multiple choice questions! Next>>
CCIE Training www.ine.com/CCIE-Training
We've Certified 3000+ CCIEs More CC IEs than any other company.
CCNA Courses & Institutes Download Browser
10/8/13
200 Networking interview questions and answers - networking faq pdf
Lattice MachXO2 PLD Write your comment - Share Knowledge and Experience Discussion Board Networking interview questions and answers. What is the role of Pseudo tty? Pseudo tty -false terminal - it enables external machines to connect through Telnet or rlogin. No connection can be made without a pseudo tty. Explain External Data Represe ntation. It is a method of encoding data within an RPC message. It is used to ensure that the data is not system-dependent. Differentiate between interior and exterior neighbour gateways. - Interior gateway - connects LANs within a n organization - Exterior gateway - connects the organi zation to the outsi de world. Honey 12-7-2011 06:48 AM Networking interview questions and answers. Explain SLIP. SLIP - Serial Line Interface Protocol, is a protocol used for transmission of IP datagrams across a serial line. What do you mea n by Multi-homed Host? - It is a multiple network interface that requires multiple IP addresses. What is multicast routing? Multicasting - Sending a message to a group. Multicast routing- Routing algorithm of sending message to a group. What is the role of OSI Reference Model? It provides a framework for discussing network operations and design. Arun 12-7-2011 06:47 AM Networking interview questions and answers. In which layer does the frame relay operate? Frame relay - packet swi tching technology, operates in the data li nk layer. Explain Gateway. Gateway - operates at the upper levels of the OSI model. It translates i nformation between two a bsolu tely different network architectures or
10/8/13
200 Networking interview questions and answers - networking faq pdf
. What are the different ways of data exchange? a. Simplex b. Half-duplex c. Full-dupl ex. Magan 12-7-2011 06:46 AM
Related content
Placement practice test: Java | SAP | .NET | Oracle | Sql Server | QA | Aptitude | Networking | All Skills
Introduction to Network Protocols ISO OSI TCP/IP Methods of Information Transmission Virtual Ci rcuit .
10/8/13
200 Networking interview questions and answers - networking faq pdf
Home | Want a Job? Submit Key Skills | Employer login | My key skills | About us | Sitemap | Contact us Copyright © 2008 - 2013 CareerRide .com. All rights reserved. Terms of use | Follow us on Facebook! Bookmark to: