Technical Interview Questions

Networking-Latest Networking Questions with Answers

|   103976

Latest Networking Questions with Answers

 

  1. Explain about DNS?

DNS - Domain Name System. DNS is the Naming System for the resources over Internet; includes Physical nodes and Applications. DNS –It is the easy way to locate to a resource easily over a network and serves to be an essential component necessary for the working of Internet.

  1. What is a Network?

A network means a set of devices that connected by physical media links. A network is recursively a connection of more than two nodes by a physical link or two or more networks connected by one or more nodes.

  1. What is Bandwidth?

Each and Every Signal often has a limit of an upper range and lower range of frequency of signal it can carry. So this range of limit of network between its upper frequency and lower frequency is termed as Bandwidth.

  1. List the criteria to check the network reliability?

A network Reliability is measured by the following factors.

  1. a) Downtime is the time it takes to recover.
  2. b) Failure Frequency is the frequency when it fails to work the way it is intended.
  3. Define a Link?

At the basic level, a network includes two or more computers directly connected by some physical medium such as co-axial cable or optical fiber. And that physical medium is called a Link.

  1. What is the DNS forwarder?

DNS servers usually communicate with outside DNS servers of the local network. A forwarder is an entry that is used when a DNS server receives DNS queries that it cant resolve locally. And then it forwards those requests to external DNS servers for resolution

  1. Definenode?

A network consist of two or more computers which will be directly connected by some physical medium such as coaxial cable or optical fiber. And that physical medium is called as Links and the computer it connects is termed as Nodes.

  1. What is a gateway or Router?

A router or gateway is a node that is connected to two or more networks. In general it forwards message from one network to another.

  1. What is point-point link?

If the physical links are limited to a pair of nodes then it is said to be point-point link.

  1. What is DHCP scope?

A scope is a range, or pool of IP addresses that can be leased to DHCP clients on a given subnet.

  1. What is FQDN?

An FQDN - fully qualified domain name contains both the hostname and a domain name. FQDN is uniquely identifies a host within a DNS hierarchy.

  1. What is MAC address? Does it have some link or something in common to Mac OS of Apple?

MAC - Media Access Control. MAC is the address of the device identified at Media Access Control Layer of Network Architecture. Similar to IP address MAC address is unique address, i.e., no two device can have same MAC address. MAC address is stored at the ROM Read Only Memory of the device.

MAC Address and Mac OS are two different things and it should not be confused with each other. Mac OS is a POSIX standard Operating System Developed upon FreeBSD used by Apple devices.

  1. Explain about PAN, LAN, HAN, SAN, CAN, MAN, WAN, GAN.?
  2. a) PAN(Personal Area Network) 

LAN is the connection of Computers a

    HAN is LAN of Home which connects to homely devices ranging from a few personal computers, phone, fax and printers.

    1. d) SAN(Storage Area Network)

      e) CAN(Campus Area

    CAN is the connection of devices, printers, phones and accessories within a campus which Links to other departments of the organization within the same campus.

    1. f) MAN

    2. g) WAN(Wide Area Network)

    GAN connects mobiles across the globe using satellites. What is POP3?

     POP3 stands for Post Office Protocol Version3 (Current Version). POP is a protocol which listens on port 110 and is responsible for accessing the mail service on a client machine. POP3 works in two modes such as Delete Mode and Keep Mode.

    1. a)Delete Mode: A mail is deleted from the mailbox after successful retrieval.
    2. b)b) Keep Mode: The Mail remains Intact in the mailbox after successful retrieval.
    3. How will check IP address on 98

    Start ==> Run ==> command ==> winipcfg
    How will you make partition after installing windows?
    My computer ==> right click ==> manage ==> disk management ==> 
    select free space ==> right click ==> New partition.

    1. What is IP?

    IP is a unique 32 bits software address of a node in a network.

    1. What is private IP?

    Three ranges of IP addresses have been reserved for private address and they are not valid for use on the Internet. If you want to access internet with these address you must have to use proxy server or NAT server (on normal cases the role of proxy server is played by your ISP.).If you do decide to implement a private IP address range, you can use IP addresses from any of the following classes: 

    Class A: 10.0.0.0 10.255.255.255 
    Class B: 172.16.0.0 172.31.255.255 
    Class C: 192.168.0.0 192.168.255.255

    1. What is public IP address?

    A public IP address is an address leased from an ISP that allows or enables direct Internet communication.

    1. What is the benefit of sub netting?
    2. Reduce the size of the routing tables. <
    1. Reduce network traffic. Broadcast traffic can be isolated within a single logical network. 
    2. Provide a way to secure network traffic by isolating it from the rest of the network.
    1. What is redirector?

      Redirector is software that intercepts file or prints I/O requests and translates them into network requests. This comes under presentation layer.

      1. What is APIPA?

    2. What are the LMHOSTS files

      OSI model was developed in February1

      ADS is Active Directory Structure

      1. How will you registeComputer to computer ==> cross 

        A Network cable may be crossove

          1. Computer to Switch
          2. Computer to Hub
          3. Computer to Modem
          4. Router to Switch
          1. Computer to Comp
          2. S
          3. Hub
          4. What is logical link c

          RAID is a method for providing fault tolerance by using m

            What are NETBIOS and NETBEU

          NETBIOS is a programming interface that allows I/O requests to be sent to and received from a remote computer and it hides the networking hardware from applications. 
          NETBEUI is NetBIOS extended user interface. A transport protocol designed by

            What is Beaconing?

          The process that allows a network to self-rep

          1. How will enable sound service in 2003?

          By default th

          1. How will enable CD burning se

          By default this service remain disable to enable this service
          Start --------> administrative tools --------> service -------->IMAPI CD burning com service --------> start up type --------> automatic

            1. IEEE 802      :   LAN/MAN
            2. I
            3. IEEE 802.2
            4. IEEE 802.3   : Ethernet Standards for Carrier Sense Multip
            5. I
            6. IEEE 802.5   : Standards for token ring access and for communications between LANs and MANs
            7. IEEE 802.6   : Standards for information exchange between systems.
            8. IEEE 802.7   : Standards for broadband LAN cabling.
            9. IEEE 802.8   :  Fiber optic connection.
            10. IEEE 802.9   : Standards for integrated services, like voice and data.
            11. IEEE 802.10: Standards fo
            12. IEEE 802.11: Wireless Networking "WiFi".
            13. IEEE 802.12: Standards for demand priority access method.
            14. IEEE 802.14: Standards for cable television broadband communications.
            15. IEEE 802.15.1 : Bluetooth
            16. IEEE 802.15
            17. IEEE 802.16    : Wireless Networking "WiMAX"
            1. What is virtual path?

            Along any transmission path from a given source to a given destination, a group of virtual circuits can be grouped together into what is called path.

            1. What is virtual channel?

            Virtual channel is normally a connection from one source to one destination, although multicast connections are also permitted. The other name for virtual channel is virtual circuit.

            1. What are the benefits of OSI Reference Model?

            It provides a framework for discussing network operations and design.

            1. What is the difference between routable and non- routable protocols?

            Routable protocols can work with a router and can be used to build large networks. Non-Routable protocols are also there which is designed to work on small, local networks and cannot be used with a router

            1. What is MAU?

            In token Ring, hub is called Multi station Access Unit (MAU).

            1. Explain 5-4-3 rule?

            In an Ethernet network, between any two points on the network, there can be no more than five network segments or four repeaters and of those five segments only three of segments can be populated.

            1. What do you meant by "triple X" in Networks?

            The function of PAD (Packet Assembler Disassembler) is described in a document known as X.3. The standard protocol has been defined between the terminal and the PAD, called X.28; another standard protocol exists between PAD and the network, called X.29. Altogether, these 3 recommendations are called "triple X".

            1. What is the difference between TFTP and FTP application layer protocols?

            The Trivial File Transfer Protocol (TFTP) allows a local host to obtain files from a remote host but does not provide reliability or security. It uses the fundamental packet delivery services offered by UDP. 

            The File Transfer Protocol (FTP) is the standard mechanism provided by TCP / IP for copying a file from one host to another. It uses the services offered by TCP and so is reliable and secure. It establishes two connections (virtual circuits) between the hosts, one for data transfer and another for control information.

            1. What is the minimum and maximum length of the header in the TCP segment and IP datagram?

            The header should have a minimum length of 20 bytes and can have a maximum length of 60 bytes.

            1. What is difference between ARP and RARP?

            The address resolution protocol (ARP) is used to associate the 32 bit IP address with the 48 bit physical address, used by a host or a router to find the physical address of another host on its network by sending a ARP query packet that includes the IP address of the receiver. 
            The reverse address resolution protocol (RARP) allows a host to discover its Internet address when it knows only its physical address.

            1. Define about ICMP?

            ICMP is Internet Control Message Protocol, a network layer protocol of the TCP/IP suite used by hosts and gateways to send notification of datagram problems back to the sender. It uses the echo test / reply to test whether a destination is reachable and responding. It also handles both control and error messages.

            1. What is terminal emulation, in which layer it comes?

            Tel

            1. What is frame relay, i

            Frame relay is a packet switching technology. It will operate in the data link layer.

            1. What is SAP?

          1. What is subnet?

          Define about subnet mask?

      2. Define backbone network?

      A backbo

        Define anonymous FTP?

      Anonymous FTP: it is a way of granting user access to files in public servers. Users that are allowed access to data in these s

      1. Define subnet mask?

        A subnet mask is made up of 32 bits (Like IP address). A subnet m

        1. Maximum length allowed for a UTP

        A single segment of UTP cable has an allowable length of 90 to 100 meters. This limitation can be overcome by using repeaters and switches.

        1. D

      2. What is Network Topology?
      3. List the different layers under TCP/IP?

      There are four layers:

      1. Network Layer
      2. Internet Layer
      3. Transport Layer
      4. Application Layer.

       

      1. Describe VPN?

      VPN - Virtual Private Network. It is a technology that allows a secure tunnel to be created across a network such as the Internet. 

      1. What is NAT?

      NAT -Network Address Translation.  This NAT protocol that provides a way for multiple computers on a common network to share single connection to the Internet.

      1. What is the role of network topology in the decision of setting up a network?

      Network topology indicates what media you must use to interconnect devices. It also serves as basis on what materials, connector and terminations that is applicable for the setup.

      1. Define RIP?

      RIP- Routing Information Protocol. It is us

        Describe the different ways of securing a computer network?

      There are several ways for securing a computer. Install reliable and updated anti-virus program on all computers. Make sure the firewalls are setup and configured properly. User authentication will also help a lot. Above mentioned all of these combined would make a secured network.

      1. Describe the imp

      OSI Physical Layer does the conversion from data bits to electrical signal, and electrical signal to data bits. This is where network devices and cable types are considered and setup.

      feedback