networking questions for interview

Upload: stasshilkrut

Post on 09-Jan-2016

226 views

Category:

Documents


0 download

DESCRIPTION

Networking Questions for interview

TRANSCRIPT

Q5. What is anonymous FTP and why would you use it?

Q7. Which layer of the 7 layer model provides services to the Application layer over the Session layer connection?

Q9. What is External Data Representation?

.Q10. Which OSI Reference Layer controls application to application communication?

Q12. What is a DNS resource record?

Q13. What protocol is used by DNS name servers?

Q14. What is the difference between interior and exterior neighbor gateways?

Q16. What are theadvantages and disadvantagesof the three types (fixed, dynamic, and fixed central) of routing tables?

Q18. What is source route?

Q19. What is RIP (Routing Information Protocol)?

Q20. What is SLIP (Serial Line Interface Protocol)?

Q21. What is Proxy ARP?

Q22. What isOSPF?

Q24. What is a Multi-homed Host?

Q25. What is NVT (NetworkVirtual Terminal)?

Q27. What isBGP(Border Gateway Protocol)?

Q28. What is autonomous system?

Q29. What is EGP (Exterior Gateway Protocol)?

Q30. What is IGP (Interior Gateway Protocol)?

Q34. What is silly window syndrome?

Q36. What is multicast routing?

Q37. What is traffic shaping?

Q38. What is packet filter?

Q39. What is virtual path?

Q40. What is virtual channel?

Q41. What is logical link control?

Q42. Why should you care about the OSI Reference Model?

Q43. What is the difference between routable and non- routable protocols?

Q47. What is the range of addresses (A,B,C,D,E) in the classes of internet addresses?

Q49. What is difference between ARP and RARP?

Q50. What is ICMP?

Q53. What is Bandwidth?

Q54. Difference between bit rate and baud rate.

Q55. What is MAC address?

Q56. What is attenuation?

Q66. What is subnet?

Q68. How Gateway is different from Routers?

Q69. What are the different type of networking / internetworking devices?

Q70. What is mesh network?

.Q71. What is passive topology?

Q72. What are the main/known topologies for networks?

Q73. What are major types of networks and explainServer-based network andPeer-to-peer network.

Q75. What is difference between baseband and broadband transmission?

Q78. Difference between the communication and transmission.

Q79.The Internet Control Message Protocol occurs at what layer of the seven layer model?

Q80.Which protocol resolves an IP address to a MAC address?

Q81.MIDI and MPEG are examples of what layer of the OSI seven layer model?

Q82.What is the protocol number for UDP?

Q84.Which layer is responsible for putting 1s and 0s into a logical group?

Q85.What does P mean when running a Trace?

Q89.Which switching technology can reduce the size of a broadcast domain?

Q90.What is the first step in data encapsulation?

Q91.What is the protocol number for TCP?

Q93.Repeaters work at which layer of the OSI model?

Q97.What does DHCPstands for

Q98.What does the acronym ARP stand for?

Q99.Which layer is responsible for identifying and establishing the availability of the intended communication partner?

Q100.Which OSI layer provides mechanical, electrical, procedural for activating, maintaining

Troubleshooting

1. Explain how trace route works?

2. What command to use to verify that BGP neighbor has been established?

3. What extra option do you have beside the basics when using ping?

Q.2 Find the error, if any, in the following IPv4 addresses.a. 200.56.045.78b. 22.34.7.8.20c. 75.45.279.14d. 11100010.23.24.66

Q.5 Describe attenuation, distortion, and noise in brief.

Q.12 What is User Agent?User agent is a software that provides the service to the user to make the process of sending and receiving a message easier. The following are User Agent services.

Q.8 Describe the functionality of data link layer.Data Link Layer is the second layer from the bottom in OSI model. This layer has two main functions Data link control Media access control.Data link control provides the functionality of include framing, flow and error control that provide smooth and reliable transmission of frames between nodes. Media Access Control (MAC) handles the sharing of link.Q.9 Explain Stop-and-Wait Automatic Repeat Request for noisy channel.In this protocol the sending device keeps a copy of the last frame transmitted until it receives an acknowledgment for that frame. A data frames uses a sequence number; an ACK frame uses an acknowledgment number. The sender has a control variable, which we call Sn (sender, next frame to send), that holds the sequence number for the next frame to be sent (0 or 1).1. Differentiate between hub and switch.a.) Hub is a layer 1 device while Switch is layer 2 device.b.) Hub works on single collision and single broadcast domain while switch works on per port collision and single broadcast domain.4. What are the main qualities of an effective and efficient network?a. Performanceb. Reliabilityc. Security7. Which factors mark the reliability of the network?a. Frequency of failureb. Downtime / Time taken for recovery.8. Name the factors that tell us about the security of the network.a. Virus attacks on the system.b. Unauthorized access to the system.9. Define Bandwidth and Latency?- Bandwidth/ Throughput It means the number of bits which can be transmitted over the network in a specified time.- Latency It is the time taken by a message to travel from one side to another.

Bandwidth and latency describe the performance of a network.10. What is point to point link?- Direct connection between two computers on a network is called as point to point link.- No other network devices other than a connecting cable are required for point to point connection.- The cable connects the NIC card of both the devices.11. When is a switch said to be congested?

12. Explain a.) Uni-casting,b.) Multicasting and c.) Broadcastinga.) Uni-casting - Message is sent from a source to a single destination node.b.) Multicasting - Message is sent from a source to some subsets of other nodes.c.) Broadcasting - Message is sent from a source to all the nodes in the network.14. Which layers of OSI are referred to as network support layers?The following 3 layers of OSI are referred to as network support layers:a. Physical Layerb. Data link Layer andc. Network Layers15. Which layers of OSI are referred to as user support layers?The block of user support layers consists of:a. Session Layerb. Presentation Layer andc. Application Layer16. What does the Data Link Layer do?- The Data Link Layer transforms the physical layer to a reliable link.It takes care of:

a. Node to node delivery.b. Framingc. Physical Addressingd. Flow Controle. Error Controlf. Access Control18. What are the responsibilities of Network Layer?- The Network Layer aids in source-to-destination delivery of packet across multiple networks.- It performs:a. Logical Addressingb. Routing

21. How does dynamic host configuration protocol aid in network administration?- In a large set up where it is difficult to manually configure the IP address of each system, dynamic host configuration protocol comes very helpful.- Using this protocol, the administrator can create a pool of IP addresses which are called scopes. These can be then dynamically assigned to the systems.

1. What are Brute Force Attacks?

2. How do you use RSA for both authentication and secrecy?

3. Can you differentiate among encoding, encryption and hashing?

4. What is digital signature? Differentiate between Physical and Digital Signature

5. What is Authentication Header and how it provides the protection to IP header?

6. Explain SSL Protocol. How does it protect internet users from various threats?

7. What is PIX firewall security? How does it differ from a firewall?

8. What are replay attacks? Give an example of replay attack

9. If you have to encrypt as well as compress data during transmission then which would you do first and why?

10. What is the goal of Information Security in an organization?

11. What is Network Mask?

12. Define Subnetting.

13. What is the User Datagram Protocol (UDP)?

14. Explain TCP Windowing concept.

15. What is the Domain Name System (DNS)? What are the advantages of it?

16. What is the TTL (Time to Live)? Why is it required?

17. Explain the use of Internet Control Message Protocol (ICMP)

18. What are Ping and Tracert?

19. Explain RSVP. How does it work?

20. Explain the concept of DHCP.

21. What are the differences between a domain and a workgroup?

22. Explain how NAT works.

23. What is IP Spoofing and how can it be prevented?

24. What is an application gateway?

25. Explain Circuit Level Gateway.

26. What is 'Gateway Of Last Resort'?

27. What are switches? Explain the concepts of Layer-3 switches.

28. What is Router? Explain components of Routers.

29. Explain different layers in the OSI model.

30. Explain the concept and capabilities of Unicast IP Addresses.

31. What is IP Multicasting?

32. Explain the classes of IP addresses. Why do we need them?

33. What is Subneting? Explain the advantages of using Subneting.

34. What is Superneting? Explain the concept of custom Subneting.

35. What is VLSM, Variable length subnet masking?

36. What is Data Fragmentaion? Explain how Data Fragmentaion works.

37. Explain the concepts and capabilities of IP Datagram.

Page 3 of 21