Interview Questions-1

,

Basic Networking


<<Previous  Next>> 
Part 1 | Part 2 | Part 3 | Part 4 | Part 5| Part 6 | Part 7 | Part 8 | Part 9 | Part 10 | Part 11 | Part 12 | Part 13
What is LAN?
Latest answer: LAN is a computer network that spans a relatively small area. Most LANs are confined to a single building or group of buildings. However, one LAN can be connected to other LANs over any distance via telephone lines and radio waves...............
Read answer
What's the difference Between an Intranet and the Internet?
Latest answer: There's one major distinction between an intranet and the Internet: The Internet is an open, public space, while an intranet is designed to be a private space.................
Read answer  
Define the term Protocol.
Latest answer: Protocol is a standard way of communicating across a network. A protocol is the "language" of the network. It is a method by which two dissimilar systems can communicate..........
Read answer 
Define File Transfer Protocol.
Latest answer: File Transfer Protocol (FTP), a standard Internet protocol, is the simplest way to exchange files between computers on the Internet. Like the Hypertext Transfer Protocol (HTTP)................
Read answer
Explain the 7 Layers of OSI.
Latest answer: Layer 1: Physical layer
It represents all the electrical and physical specifications for devices............  
Read answer
What is a network? What are the different kinds of network? Explain them.
Latest answer: A network is a group of computers or nodes connected together. They are connected with each other by communication paths................
Read answer
What are network topologies? Explain Ring, Bus and Star topology.
Latest answer: A network topology describes the layout of a network. It describes how different nodes and elements are connected to each other. Different types of topology.................
Read answer
Explain IP, TCP and UDP.
Latest answer: TCP – Transmission control Protocol is used to establish communication between nodes or networks and exchange data packets. It guarantees delivery of data packets in the order they were sent.................
Read answer
How would you define IP address?
Latest answer: Computers using the TCP/IP for communication are uniquely identified by a 32 bit address called as an IP address. The routers use the IP address information to forward the packet to the destination computer.............
Read answer
What is multicasting?
Latest answer: Multicasting allows a single message to be sent to a group of recipients. Emailing, teleconferencing, are examples of multicasting..................
Read answer
Explain the functionality of PING.
Latest answer: Ping Is particularly used to check if the system is in network or not. It also gives packet lost information. In windows ping command is written as ping ip_address................
Read answer
Explain the core naming mechanism, Domain Name System (DNS).
Latest answer: A Domain Name system is used to convert the names of the website on the internet to IP addresses. The domain names for each IP addresses are stored in a database that is distributed across different servers.................
Read answer

Networking Protocols related Interview questions


<<Previous  Next>>
Part 1 | Part 2 | Part 3 | Part 4 | Part 5| Part 6 | Part 7 | Part 8 | Part 9 | Part 10 | Part 11 | Part 12 | Part 13
What is NetBIOS protocol?
Latest answer: NetBIOS (Network Basic Input/Output System) Protocol allows applications on separate computers to communicate over a LAN. It runs over TCP/IP giving each computer in the network a NetBIOS name and IP address.................
Read answer
What is IGMP protocol? 
Latest answer: Internet Group Management Protocol, allows internet hosts to multicast. i.e. to send messages to a group of computers. There may be a group of internet hosts interested to multicast..................
Read answer  
Explain PPP protocol. 
Latest answer: Point to Point protocol helps communication between 2 computers over a serial cable, phone line or other fiber optic lines. E.g. Connection between an Internet Service Provider and a host..................
Read answer
What is TCP/IP protocol?
Latest answer: Transmission Control Protocol / Internet Protocol: - It is a family of protocols used for communication and connection between hosts on the internet. It is the most widely used standard for transmitting data over the internet...............
Read answer
What is FTP (File Transfer Protocol)?
Latest answer: FTP is File Transfer Protocol. It used to exchange files on the internet. To enable the data transfer FTP uses TCP/IP, FTP is most commonly used to upload and download files from the internet..................
Read answer
What is HTTP (Hypertext Transfer Protocol)?
Latest answer: HTTP or Hyper Text Transfer Protocol is provides a set of rules to transfer files, videos, images over the world wide web. When the web browser is opened, a HTTP request call is made..................
Read answer
What is NNTP (Network News Transfer Protocol)?
Latest answer: NNTP or Network News Transfer Protocol is used to manage the notes posted on Unset newsgroup (a collection of posted notes on a subject posted by different users)...............
Read answer
What is SMTP (Simple Mail Transfer Protocol)?
Latest answer: SMTP or Simple Mail Transfer Protocol is used to send email messages between servers. The messages are retrieved using email clients. SMTP is more commonly used to send messages from a mail client to a mail server.................
Read answer
What is POP3 (Post Office Protocol 3)?
Latest answer: POP3 or Post Office Box 3 is used fro receiving emails. It is a client server protocol which holds the email.................
Read answer
What is SNMP (Simple Network Management Protocol)?
Latest answer: SNMP or Simple Network Management Protocol is typically used for managing the network. Managing the network includes managing the nodes present in the network................

Networking Routers Related Interview questions


<<Previous  Next>>
Part 1 | Part 2 | Part 3 | Part 4 | Part 5| Part 6 | Part 7 | Part 8 | Part 9 | Part 10 | Part 11 | Part 12 | Part 13
What are the basic components of routers? 
Latest answer: Components of Router: Internal components: ROM:- Used to store the routers bootstrap details, operating system software. Flash memory: - holds the operating systems images. The content is retained when the router is restarted..................
Read answer
What is Routing table?
Latest answer: A routing table stores the routes of the various nodes in a network. Nodes can be any electronic device connected to the network. The table is usually stored in a router or the network computer as a database or file.................
Read answer
What is Routing Protocols?
Latest answer: Routing protocols are used to assist in achieving the basic purpose of routing. They specify the routers the method to communicate with each other. They help the routers select the best possible path between nodes....................
Read answer
What is Distance Vector Routing Protocols?
Latest answer: The main goal of Distance Vector Routing Protocols Is to find out the best path for he data packet to reach the destination. Distance here could be the hops..................
Read answer
Describe the basics of internet routing.
Latest answer: When a source sends a packet to a destination, this packet has a specific path or route it follows. Different routing protocols are used to find the shortest path to the destination. The protocols maintain routing tables.................
Read answer
<<Previous  Next >>

Security Interview questions


<<Previous  Next>>
Part 1 | Part 2 | Part 3 | Part 4 | Part 5| Part 6 | Part 7 | Part 8 | Part 9 | Part 10 | Part 11 | Part 12 | Part 13
What is Data encryption?
Latest answer: Data encryption ensures data safety and very important for confidential or critical data. It protect data from being read, altered or forged while transmission....................
Read answer
What is the Public Key Encryption?
Latest answer: Public key encryption use public and private key for encryption and decryption. In this mechanism, public key is used to encrypt messages and only the corresponding..............
Read answer
Define Digital Signatures.
Latest answer: Digital signature is an attachment to an electronic message used for security purpose. It is used to verify the authenticity of the sender.................
Read answer
What is firewall? 
Latest answer: A firewall is a hardware or software installed to provide security to the private networks connected to the internet. They can be implemented in both hardware and software, or a combination of both................
Read answer

TCP Layer: Interview questions


<<Previous  Next>>
Part 1 | Part 2 | Part 3 | Part 4 | Part 5| Part 6 | Part 7 | Part 8 | Part 9 | Part 10 | Part 11 | Part 12 | Part 13
Explain Transmission Control Protocol, TCP.
Latest answer: TCP ensures reliable and end to end delivery of segments of information. Segments are acknowledged to the source when received by the destination.......................
Read answer
Explain User Datagram Protocol, UDP.
Latest answer: The UDP is a connectionless, unreliable service. UDP messages can be lost and duplicated.................
Read answer
What is TCP windowing concept?
Latest answer: TCP windowing concept is primarily used to avoid congestion in the traffic. It controls the amount of unacknowledged data a sender can send before it gets an acknowledgement...............
Read answer
What is TCP protocol?
Latest answer: Transmission control Protocol is used to establish communication between nodes or networks and exchange data packets. It guarantees delivery of data packets in the order they were sent.....................
Read answer
What is UDP protocol?
Latest answer: User Data Protocol is a communication protocol. It is normally used as an alternative for TCP/IP. However there are a number of differences between them. UDP does not divide data into packets.....................
Read answer
TCP vs. UDP.
Latest answer: TCP guarantees the delivery of data. UDP on the other hand, does not guarantee delivery of data. TCP delivers messages in the order they were sent. UDP has no ordering mechanisms....................
Read answer
<<Previous  Next>>

VPN Interview questions and answers


<<Previous  Next>>
Part 1 | Part 2 | Part 3 | Part 4 | Part 5| Part 6 | Part 7 | Part 8 | Part 9 | Part 10 | Part 11 | Part 12 | Part 13
What is Trusted and Untrusted Networks?
Latest answer: Trusted networks: Such Networks allow data to be transferred transparently. The machines using a trusted network are usually administered by an Administrator to ensure that private and secured data is not leaked....................
Read answer
What is VPN?
Latest answer: Virtual Private network is a network that used the public telecommunication infrastructure. This means that it used public wires to connect the nodes...................
Read answer
What are the different types of VPN?
Latest answer: Remote Access VPN:- Also called as Virtual Private dial-up network (VPDN) is mainly used in scenarios where remote access to a network becomes essential...................
Read answer
What are the different authentication methods used in VPNs?
Latest answer: The authentication method uses an authentication protocol. The methods are: EAP authentication method: Extensible authentication protocol authenticates remote access connection.........................
Read answer

Network Technology Interview questions


<<Previous  Next>>
Part 1 | Part 2 | Part 3 | Part 4 | Part 5| Part 6 | Part 7 | Part 8 | Part 9 | Part 10 | Part 11 | Part 12 | Part 13
What is Ethernet technology?
Latest answer: Ethernet technology is a high speed broadcast bus technology. In this type, all the station shares a single ether channel and receives every single transmitted signal...........
Read answer
Explain the use of network interface card, NIC.
Latest answer: NIC is used to connect computer to an Ethernet network................
Read answer
Explain token ring technology.
Latest answer: In this technology, all the devices are arranged in a circle. A token moves around the circular network. A device waits for the token before it sends its frame............
Read answer
What is CSMA and CD concept?
Latest answer: In CSDA (carrier sense multiple access), presence of any digital signal in a network is checked before transmission. Data transmission occurs only when no signal is sensed..............
Read answer

Networking IP layer Interview questions


<<Previous  Next>>
Part 1 | Part 2 | Part 3 | Part 4 | Part 5| Part 6 | Part 7 | Part 8 | Part 9 | Part 10 | Part 11 | Part 12 | Part 13
How would you define IP address?
Latest answer: IP address or Internet Protocol address is the address of a device attached to an IP network (TCP/IP network)...............
Read answer
Difference between Static and Dynamic IP.
Latest answer: Static IP is also called as permanent address assigned to each device in a network, whereas Dynamic IP, a temporary address assigned to the device via DHCP software..............
Read answer
What is the difference between public and private IP?
Latest answer: A public IP address allows equipment accessible to everyone on the internet. A private IP address is for private use within the network and allows many more PCs to be connected.............
Read answer
What is Network Address Translation?
Latest answer: Network Address Translation acts as an agent between the Internet and a local network. It is a dynamic method which is used to minimize Internet connectivity needs................
Read answer
Define IP multicast.
Latest answer: IP multicast technology reduces traffic by sending stream of information to many recipients at one go.................
Read answer
What is subneting?
Latest answer: Subnet adds one level to the way IP address is represented. It logically organizes the network. .................
Read answer
Define Address Resolution Protocol.
Latest answer: Address Resolution Protocol ARP, is responsible for mapping an IP address to its corresponding physical network address. It is mostly seen on Ethernet network............
Read answer
Explain Maximum Transfer Unit, MTU.
Latest answer: MTU specifies the largest amount of data that can be transferred across a network...........
Read answer
What is Routing Protocol?
Latest answer: Routing protocol is the way to send routing information between any routers in an autonomous system..............
Read answer
Explain the structure and use of internet addresses.
Latest answer: Each IP address is 32 bit long. In human language the IP addresses are written in dotted decimal notation. These are then converted to binary by the computer.................
Read answer
Explain how names are translated (resolved) into IP address.
Latest answer: Domain Name server or DNS is used to resolve names into IP addresses. When a web address is entered into the browser, the DNS client sends a request to the DNS server to find the corresponding IP address for the name.................
Read answer
Describe the basics of internet routing.
Latest answer: When a source sends a packet to a destination, this packet has a specific path or route it follows. Different routing protocols are used to find the shortest path to the destination. The protocols maintain routing tables...............
Read answer
Explain the core naming mechanism, Domain Name System (DNS).
Latest answer: A Domain Name system is used to convert the names of the website on the internet to IP addresses. The domain names for each IP addresses are stored in a database that is distributed across different servers....................
Read answer
<<Previous  Next>>

Firewall Interview questions


<<Previous  Next>>
Part 1 | Part 2 | Part 3 | Part 4 | Part 5| Part 6 | Part 7 | Part 8 | Part 9 | Part 10 | Part 11 | Part 12 | Part 13
What is firewall? 
Latest answer: A firewall is a hardware or software installed to provide security to the private networks connected to the internet.........................
Read answer
What are the types of firewalls?
Latest answer: Packet Filtering Firewall: This type of Firewall detects packets and block unnecessary packets and makes network traffic release.....................
Read answer
What is Data encryption?
Latest answer: Data encryption ensures data safety and very important for confidential or critical data. It protect data from being read, altered or forged while transmission.................
Read answer
What is the Public Key Encryption?
Latest answer: Public key encryption use public and private key for encryption and decryption. In this mechanism, public key is used to encrypt messages and only the corresponding private key .................
Read answer
Define Digital Signatures.
Latest answer: Digital signature is an attachment to an electronic message used for security purpose. It is used to verify the authenticity of the sender................
Read answer

Ethernet Networking Interview questions


<<Previous  Next>>
Part 1 | Part 2 | Part 3 | Part 4 | Part 5| Part 6 | Part 7 | Part 8 | Part 9 | Part 10 | Part 11 | Part 12 | Part 13
Define broadcast domain.
Latest answer: It is a logical area in a computer network where any computer connected to the network can directly transmit to any other computer in the domain.............
Read answer
Bridge vs switch.
Latest answer: A bridge connects two different LAN networks. A switch is something like you can connect many computers to a switch and then one computer can connect to another.................
Read answer
What is a Router?
Latest answer: A router is a device or sometimes a software in a computer which decides the next network point to which a packet should be forwarded to reach its destination on Internet..............
Read answer
Define gateway.
Latest answer: A gateway is a network point that provides entrance into another network. On the Internet, a node or stopping point can be either a gateway node or a host (end-point) node............
Read answer
What is firewall?
Latest answer: A firewall is a hardware or software installed to provide security to the private networks connected to the internet. They can be implemented in both hardware and software, or a...............
Read answer
<<Previous  Next>>

Firewall Interview questions


<<Previous  Next>>
Part 1 | Part 2 | Part 3 | Part 4 | Part 5| Part 6 | Part 7 | Part 8 | Part 9 | Part 10 | Part 11 | Part 12 | Part 13
What is firewall? 
Latest answer: A firewall is a hardware or software installed to provide security to the private networks connected to the internet.........................
Read answer
What are the types of firewalls?
Latest answer: Packet Filtering Firewall: This type of Firewall detects packets and block unnecessary packets and makes network traffic release.....................
Read answer
What is Data encryption?
Latest answer: Data encryption ensures data safety and very important for confidential or critical data. It protect data from being read, altered or forged while transmission.................
Read answer
What is the Public Key Encryption?
Latest answer: Public key encryption use public and private key for encryption and decryption. In this mechanism, public key is used to encrypt messages and only the corresponding private key .................
Read answer
Define Digital Signatures.
Latest answer: Digital signature is an attachment to an electronic message used for security purpose. It is used to verify the authenticity of the sender................
Read answer

Networking Application layer: Interview Questions


<<Previous  Next>>
Part 1 | Part 2 | Part 3 | Part 4 | Part 5| Part 6 | Part 7 | Part 8 | Part 9 | Part 10 | Part 11 | Part 12 | Part 13
Describe Application layer.  
Latest answer: The application layer is located at the top of the TCP/IP protocol layers. This one contains the network applications which make it possible to communicate using the lower layers............... 
Read answer
Define DNS.
Latest answer: The DNS translates Internet domain and host names to IP addresses. DNS automatically converts the names we type in our Web browser address bar to the IP addresses............
Read answer
Define Telnet.
Latest answer: Telnet is the main Internet protocol for creating a connection to a remote server.............. 
Read answer
Define SMTP.
Latest answer: SMTP - Short for Simple Mail Transfer Protocol, a protocol for sending e-mail messages between servers.............. 
Read answer

Networking Data link layer: Interview questions


<<Previous  Next>>
Part 1 | Part 2 | Part 3 | Part 4 | Part 5| Part 6 | Part 7 | Part 8 | Part 9 | Part 10 | Part 11 | Part 12 | Part 13
What Is a MAC Address?
Latest answer: MAC (Media Access Control) addresses are globally unique addressed that are written into hardware at the time of manufacture.................
Read answer 
MAC vs. IP Addressing
Latest answer: Whereas MAC addressing works at the data link layer, IP addressing functions at the network layer (layer 3). It's a slight oversimplification................
Read answer
Define Spanning-Tree Protocol (STP)
Latest answer: Spanning-Tree Protocol (STP) as defined in the IEEE 802.1D is a link management protocol that provides path redundancy while preventing undesirable loops in the network...........
Read answer
What is VPN?
Latest answer: A VPN is a service that offers secure, reliable connectivity over a shared public network infrastructure such as the Internet.................
Read answer  
<<Previous  Next>>

Basic Networking


<<Previous  Next>> 
Part 1 | Part 2 | Part 3 | Part 4 | Part 5| Part 6 | Part 7 | Part 8 | Part 9 | Part 10 | Part 11 | Part 12 | Part 13
What is LAN?
Latest answer: LAN is a computer network that spans a relatively small area. Most LANs are confined to a single building or group of buildings. However, one LAN can be connected to other LANs over any distance via telephone lines and radio waves...............
Read answer
What's the difference Between an Intranet and the Internet?
Latest answer: There's one major distinction between an intranet and the Internet: The Internet is an open, public space, while an intranet is designed to be a private space.................
Read answer  
Define the term Protocol.
Latest answer: Protocol is a standard way of communicating across a network. A protocol is the "language" of the network. It is a method by which two dissimilar systems can communicate..........
Read answer 
Define File Transfer Protocol.
Latest answer: File Transfer Protocol (FTP), a standard Internet protocol, is the simplest way to exchange files between computers on the Internet. Like the Hypertext Transfer Protocol (HTTP)................
Read answer
Explain the 7 Layers of OSI.
Latest answer: Layer 1: Physical layer
It represents all the electrical and physical specifications for devices............  
Read answer
What is a network? What are the different kinds of network? Explain them.
Latest answer: A network is a group of computers or nodes connected together. They are connected with each other by communication paths................
Read answer
What are network topologies? Explain Ring, Bus and Star topology.
Latest answer: A network topology describes the layout of a network. It describes how different nodes and elements are connected to each other. Different types of topology.................
Read answer
Explain IP, TCP and UDP.
Latest answer: TCP – Transmission control Protocol is used to establish communication between nodes or networks and exchange data packets. It guarantees delivery of data packets in the order they were sent.................
Read answer
How would you define IP address?
Latest answer: Computers using the TCP/IP for communication are uniquely identified by a 32 bit address called as an IP address. The routers use the IP address information to forward the packet to the destination computer.............
Read answer
What is multicasting?
Latest answer: Multicasting allows a single message to be sent to a group of recipients. Emailing, teleconferencing, are examples of multicasting..................
Read answer
Explain the functionality of PING.
Latest answer: Ping Is particularly used to check if the system is in network or not. It also gives packet lost information. In windows ping command is written as ping ip_address................
Read answer
Explain the core naming mechanism, Domain Name System (DNS).
Latest answer: A Domain Name system is used to convert the names of the website on the internet to IP addresses. The domain names for each IP addresses are stored in a database that is distributed across different servers.................
Read answer