Académique Documents
Professionnel Documents
Culture Documents
Part 1 Part 2 Part 3 Part 4 Part 5 Part 6 Part 7 Part 8 Part 9 Part 17 Part 18 Part 19
Part 10
Part 11
Part 12
Part 13
Part 14
Part 15
Part 16
Networking for freshers Download Networking FAQ Test Networking skills New
Test SQL Server skills New Test Oracle skills New Networking notes Application layer Data link layer IP layer Ethernet Firewall Network technology Protocols Routers Security TCP layer VPN Tunneling
Describe the Packet Format of ARP (Address Resolution Protocol) What are the advantages of IPv6 over IPv4? What are the different design goals of ATM? If you are a victim of Denial of Service (Dos) then what you do? The function of a denial of service attack is to flood its target machine with too much traffic and prevents it from being accessible to any other requests or providing services..............
Read Answ er
www.careerride.com/Networking-Interview-Questions.aspx
Networking interview questions - posted on June 27, 2013 at 16:45 PM by Kshipra Singh
Subneting
1/15
10/8/13
Networking interview questions - posted on June 27, 2013 at 16:45 PM by Kshipra Singh
2. What is FQDN?
- FQDN is the abbreviation for Fully Qualified Domain Name. - It contains both the hostname and a domain name. - It uniquely identifies a host within a DNS hierarchy
10/8/13
8. Name the factors that tell us about the security of the network.
a. Virus attacks on the system. b. Unauthorized access to the system.
www.careerride.com/Networking-Interview-Questions.aspx
3/15
10/8/13
c. Network Layers
21. How does dynamic host configuration protocol aid in network administration?
www.careerride.com/Networking-Interview-Questions.aspx 4/15
10/8/13
- In a large set up where it is difficult to manually configure the IP address of each system, dynamic host configuration protocol comes very helpful. - Using this protocol, the administrator can create a pool of IP addresses which are called scopes. These can be then dynamically assigned to the systems.
Routing and Switching What are Brute Force Attacks? Brute forcing is a mechanism which is used by an attacker to break the encryption of data by applying a set of various key.............
Read Answ er
How do you use RSA for both authentication and secrecy? RSA is a public key encryption algorithm. The RSA algorithms are...........
Read Answ er
Can you differentiate among encoding, encryption and hashing? Encoding: Basically encoding is used to protect the integrity of data as it crosses through communication network to keep its original message.............
Read Answ er
If you have to generate a hash function then what characteristics are needed in a secure hash function? A secure hash function should have the following characteristics:................
Read Answ er
What is digital signature? Differentiate between Physical and Digital Signature A digital signature is an electronic analogue of a written signature; the digital signature can be used to provide assurance...........
Read Answ er
What is Authentication Header and how it provides the protection to IP header? Basically Authentication Header protects IP header and provides the complete authenticity to the IP packets.............
Read Answ er
Explain SSL Protocol. How does it protect internet users from various threats? The SSL protocol (Secure Socket Layer protocol) was originally developed by Netscape, to ensure security of data transported.............
Read Answ er
www.careerride.com/Networking-Interview-Questions.aspx 5/15
10/8/13
What is PIX firewall security? How does it differ from a firewall? PIX (Private Internet Exchange)...........
Read Answ er
What are Malware? Explain different types of Malware Malware is a software program which is developed to destroy a computer system..............
Read Answ er
What are replay attacks? Give an example of replay attack Replay attacks are the network attacks in which an attacker spies the conversation between the sender and receiver..........
Read Answ er
If you have to encrypt as well as compress data during transmission then which would you do first and why? Data should be transmitted over any communication network in such a way that the data integrity and authenticity.............
Read Answ er
What is the goal of Information Security in an organization? Mainly there are three Information security goals in an organization: Confidentiality, Integrity and Availability..............
Read Answ er
What is Symmetric-Key cryptography and Asymmetric-Key cryptography? Symmetric-Key Cryptography: Symmetric-key cryptography uses a single key for both encryption and decryption. Encryption and decryption algorithm are inverse of each other.............
Read Answ er
Explain the services provided by IP (Internet Protocol) - Addressing, Fragmentation, Packet timeouts and options Latest answer: Addressing: For the purpose of delivering datagram packets, IP needs to know about the address of the destination. By including the host addressing, this task is carried out by IP. As IP operates in an internet, its systems are designed to accept the addressing of devices which are unique.............
Read answ er
Explain the classes of IP address Latest answer: IP addresses are organized into classes. For convenience of humans, IP addresses are expressed in the decimal format. Every number in each class is represented as binary to computers..................
Read answ er
www.careerride.com/Networking-Interview-Questions.aspx 6/15
10/8/13
Define Broadcast, Unicast and Multicast. Latest answer: Unicast: A term used in communication to describe a piece of information to send from one point to another. There are only sender and receiver................
Read answ er
What is Network Mask? Latest answer: A network mask is used for determination of what subnet an IP address belongs to. An IP address has network address and the host address.................
Read answ er
Define Subnetting. Latest answer: A subnet describes a set of networked computers which have common IP address routing prefix..................
Read answ er
What is the User Datagram Protocol (UDP)? Latest answer: User datagram protocol allows computer applications to send messages as datagram packets from source to destination on an Internet Protocol,..................
Read answ er
Explain TCP Windowing concept. Latest answer: TCP Windowing is a concept that is used for avoiding congestion in the network traffic..................
Read answ er
What is the Domain Name System (DNS)? What are the advantages of it? Latest answer: A hierarchical naming system for computer systems, services or for that matter any resource participating in the internet...................
Read answ er
What is the TTL (Time to Live)? Why is it required? Latest answer: TTL is a value in data packet of Internet Protocol. It communicates to the network router whether or not the packet should be in the network for too long or discarded.................
Read answ er
Explain the use of Internet Control Message Protocol (ICMP) Latest answer: Internet Control Message Protocol is one of the important protocols in the Internet Protocol suite. It is mainly used in operating system of networked computers..................
Read answ er
What is the use of IGMP protocol? Latest answer: Internet Group Management Protocol: - It allows internet hosts to participate in multicasting. The IGMP messages are used to learn which hosts is part of which multicast groups..............
www.careerride.com/Networking-Interview-Questions.aspx
Read answ er
7/15
10/8/13
Read answ er
What are Ping and Tracert? Latest answer: Ping and tracert are the commands used to send information to some remote computers to receive some information. Information is sent and received by packets..............
Read answ er
Explain RSVP. How does it work? Latest answer: Resource Reservation protocol is used to reserve resources across a network. It is used for requesting a specific Quality of Service (QoS) from the network...............
Read answ er
Explain the concept of DHCP. Latest answer: Dynamic Host Configuration Protocol is used assigning IP addresses to computers in a network. The IP addresses are assigned dynamically...............
Read answ er
What are the differences between a domain and a workgroup? Latest answer: In a domain, one or more computer can be a server to manage the network. On the other hand in a workgroup all computers are peers having no control on each other.............
Read answ er
Latest answer: Network Address Translation translates and IP address used in a network to another IP address known within another network. A NAT table is maintained for global to local and local to mapping of IPs................
Read answ er
What is PPP protocol? Explain PPP packet format. Latest answer: Point to Point protocol helps communication between 2 computers over a serial cable, phone line or other fiber optic lines. E.g. Connection between an Internet Service Provider and a host................
Read answ er
What is IP Spoofing and how can it be prevented? Latest answer: IP spoofing is a mechanism used by attackers to gain unauthorized access to a system. Here, the intruder sends messages to a computer with an IP address indicating that the message is coming from a trusted host...............
Read answ er
www.careerride.com/Networking-Interview-Questions.aspx 8/15
10/8/13
Explain IP datagram, Fragmentation and MTU. Latest answer: IP datagram can be used to describe a portion of IP data. Each IP datagram has set of fields arranged in an order. The order is specific which helps to decode and read the stream easily..............
Read answ er
What is an application gateway? Latest answer: An application gateway is an application program that runs on a firewall between two networks. An application gateway is used for establishing connection between client program and destination service..................
Read answ er
Explain Circuit Level Gateway. Latest answer: A circuit level gateway is used to find if a session in TCP handshaking is legitimate or not. It can be considered as a layer between application layer and transport layer..................
Read answ er
What is 'Gateway Of Last Resort'? A Gateway of Last Resort or Default gateway is a route used by the router when no other known route exists to transmit the IP packet. Known routes are present in the routing table.................
Read answ er
What are switches? Explain the concepts of Layer-3 switches. Latest answer: It is a device that connects multiple network segments. A switch analyzes the MAC address and then determines where to send the data..............
Read answ er
What is Router? Explain components of Routers. Latest answer: The way switches connect multiple computers, a router connects multiple networks. Routers comprise of data consisting of large tables of networks and addresses..................
Read answ er
Overview of OSI layer. Latest answer: OSI stands for Open Systems Interconnection The OSI reference model gives an overview of the layered communications and computer network protocol design...................
Read answ er
10/8/13
Latest answer: Application Layer: Closest to the end user, Interact directly with the software application. Presentation Layer: Translates application to network format, and vice versa, Works to transform data into the form that the application layer can accept, Formats and encrypts data to be sent across a network.........................
Read answ er
Explain the concept and capabilities of Unicast IP Addresses. Latest answer: It is an IP address that uniquely identifies a host in a network. The datagram with a unicast IP address is received and processed by only a single host.
Read answ er
What is IP Multicasting? Latest answer: It is an IP address that identifies a particular group of hosts in network. This group of hosts is called a multicast group..............
Read answ er
Explain the classes of IP addresses. Why do we need them? Latest answer: Class A: Range: from 0.0.0.0 to 127.255.255.255. Leftmost bit: 0. First 8 bits: netid. Remaining 24 bits: hostid..............
Read answ er
What is Subneting? Explain the advantages of using Subneting. Latest answer: Subneting is dividing a network into several subnets. This is usually done for the following purposes:..................
Read answ er
What is Superneting? Explain the concept of custom Subneting. Latest answer: Supernetting or Classless Inter-Domain Routing (CIDR) : It is a way to aggregate multiple Internet addresses of the same class..............
Read answ er
What is VLSM, Variable length subnet masking? Latest answer: VLSM is a means of allocating IP addressing resources to subnets according to their individual need rather than some general network-wide rule................
Read answ er
www.careerride.com/Networking-Interview-Questions.aspx 10/15
10/8/13
Read answ er
What is Data Fragmentaion? Explain how Data Fragmentaion works. Latest answer: Fragmentation occurs when storage space is used inefficiently due to which storage capacity and performance is reduced................
Read answ er
Explain the concepts and capabilities of IP Datagram. Latest answer: Data transmitted over an internet using IP is carried in messages called IP datagrams. Like all network protocol messages, IP uses a specific format for its datagrams...................
Read answ er
What is MAC address? Media Access Control address is an identifier for assigned to most network adapters or Network Interface Cards by the manufacturer for the purpose of identification...............
Read answ er
10/8/13
- Allowance for extension: In IPv6 new technologies can easily embedded. -Support For Resource Allocation: In IPv6, flow label has been added to enable the source to request special handling of the packet. This mechanism can be used to support traffic such as real-time audio and video. -Support For More Security: The encryption and authentication options in IPv6 provide confidentiality and integrity of the packet.
CCIE Training
www.ine.com/CCIE-Training
We've Certified 3000+ CCIEs More CCIEs than any other company.
10/8/13
www.careerride.com/Networking-Interview-Questions.aspx
13/15
10/8/13
data formats. What are the different ways of data exchange? a. Simplex b. Half-duplex c. Full-duplex. Magan 12-7-2011 06:46 AM
Related content
Placement practice test: Java | SAP | .NET | Oracle | Sql Server | QA | Aptitude | Networking | All Skills
Introduction to Network Protocols ISO OSI TCP/IP Methods of Information Transmission Virtual Circuit .
www.careerride.com/Networking-Interview-Questions.aspx
14/15
10/8/13
Home | Want a Job? Submit Key Skills | Employer login | My key skills | About us | Sitemap | Contact us Copyright 2008 - 2013 CareerRide.com. All rights reserved. Terms of use | Follow us on Facebook!
Bookm ark to:
www.careerride.com/Networking-Interview-Questions.aspx
15/15