Vous êtes sur la page 1sur 46

Sponsored Links

Home > Networking QA Title: 25 Important Networking Interview Questions & Answers

Q : What are the benefits of obtained by using the Client/Server oriented TP Monitors? A : Client/Server applications development framework. Scalability of functions. Load balancing. High availability. MOM integration. Firewalls of protection Reduced system cost.

Q : What are the services provided by the Operating System? A : Extended services - These are add-on modular software components that are layered on top of base service. Q : What is Load balancing? A : If the number of incoming clients requests exceeds the number of processes in a server class, the TP Monitor may start dynamically a new ones and this is called Load balancing. Q : What is networking? A : Networking is the engineering discipline concerned with the communication between devices or computer systems. Q : What is a multi casting? A : A Multicasting is refer to a system, where a computers or network devices(node) sends out a message to a group of computers or network devices(node)in a network Q : What is MPLS?Where it is work? A : Multi Protocol Label Switching(MPLS). This protocol is mainly used for QOS(quality of service). It can handle the multi protocol via the path using the label ie done by label stacking. Q : What is a TP Monitor? A : There is no commonly accepted the definition for a TP monitor. According to Jeri Edwards' a TP Monitor is "an OS for transaction processing". Q : What are the types of Transparencies? A : The transparencies types of NOS middleware is expected to provides are, Location transparency Namespace transparency Logon transparency Local/Remote access transparency Replication transparency Distributed time transparency Administration transparency and

Failure transparency Q : What is MOM? A : Message Oriented Middleware (MOM) is allowed the general purpose messages to be exchanged in a Client/Server system using message queues. Applications are communicate over networks by simply putting messages in the queues and getting messages from queues. It is typically to provides a very simple high level APIs to its services. MOM's messaging and queuing allow the clients and servers to communicate across a network without being linked by a private, dedicated, logical connection. The clients and server can run at different times. It is a post-office like metaphor. Q : What is mean by Symmentric Multiprocessing (SMP)? A : SMP treats all the processors as equal. Any processor can do the work of any other processor. Applications are divided into the threads that can run concurrently on any available processor. Any processor in the pool can run the OS kernel and execute user-written threads. Q : Whats a Web server? A : This new model of Client/Server consists of thin, portable, "universal" clients that talk to the super fat servers. In the simplest form, a web server returns the documents when clients ask for them by name. The clients and server communicate using an RPC-like protocol called HTTP. Q : What are the functions of the typical server program? A : Typical server program waits for the client-initiated requests. Executes many requests at the same time. Takes care of VIP clients first. Initiates and runs background task activity. Keeps running. Grown bigger and faster. Q : What is meant by AMP? A : Asymmetric Multi processing imposes hierarchy and a division of labor among the processors. Only one designated processor, the master, controls (in a tightly coupled arrangement) slave processors dedicated to specific functions. Q : What means by 3-Tier architecture? A : In 3-tier Client/Server systems are the application logic (or process) lives in the middle tier and it is separated from the data and the user interface. In theory, the 3-tier Client/Server systems are more scalable, robust and flexible. Example: TP monitor, Web. Q : What means by 2-Tier architecture? A : In 2-tier Client/Server systems are the application logic is either burried inside the user interface on the client or within the database on the server. Example: File servers and Database servers with stored procedures. Q : What is passive topology? A : In a Passive topology when the computers on the network simply listen and receive the signal, they are referred to as passive because they do not amplify the signal in any way.

Example - linear bus. Q : Whats the Protocol Data Unit? A : The data unit in the LLC level is called the protocol data unit (PDU). The PDU contains the four fields a destination service access point (DSAP), a source service access the point (SSAP), a control field and an information field. DSAP, SSAP are addresses used by the LLC to identify the protocol stacks on the receiving and sending machines that are generating and using the data. The control field specifies whether the PDU frame is a information frame (I - frame) or a supervisory frame (S - frame) or a unnumbered frame (U - frame). Q : What are major types of networks and explain it? A : There are two major types of networks, Server-based network. Peer-to-peer network. Peer-to-peer network, computers can act as both servers sharing resources and as clients using the resources. Server-based networks provide centralized control of network resources and rely on server computers to provide security and network administration. Q: Explain the SMTP? A : Simple Mail Transfer Protocol(SMTP) is a protocol for sending e-mail messages between servers. Q : Define DNS? A : The DNS translates the Internet domain and host names to IP addresses. DNS automatically converts the names we type in our Web browser address bar to the IP addresses of Web servers hosting those sites. DNS implements a distributed database to store this name and address information for all public hosts on the Internet. Q : Whats the packet filter in Networking? A : Packet filter is a standard router equipped with the some extra functionality. The extra functionality allows in every incoming or outgoing packet to be inspected. Packets are meeting some criterion are forwarded normally. Those that fail the test are dropped. Q : Whats VPN? A VPN is a service that offers secure, reliable connectivity over a shared public the network infrastructure such as the Internet. VPNs maintain the same security and management policies as a private network. They are the most cost effective method of establishing a virtual point-to-point connection between the remote users and an enterprise customer's network. Q : What is RAID A method for providing the fault tolerance by using the multiple hard disk drives. Q : Whats MAC address? A : The address for a device as it is identified at the Media Access Control

(MAC) layer in the network architecture. MAC address is usually stored in the Read only memory (ROM) on the network adapter card and is unique. Q : What is the ICMP A : Internet Control Message Protocol (ICMP) is a network layer protocol of the TCP/IP suite used by the hosts and gateways to send notification of datagram problems back to the sender. It is used to the echo test / reply to test whether a destination is reachable and responding. It is also handles the both control and error messages.

Q : What is hidden shares. A : Hidden or administrative shares are share names with a dollar sign ($) appended to their names. Administrative shares are usually created the automatically for the root of each drive letter. They do not appear in the network browse list. Q : What are the three types of domain controller does Exchange access? A: The three types of domain controllers are Normal Domain Controller Global Catalog, Configuration Domain Controller Q : What are the accessibility features in Windows 2000? A : The accessibility features in windows 2000 are StickyKeys, FilterKeys Narrator, Magnifier, and OnScreen Keyboard. Q : What are the disadvantages of circular logging? A : In the event of a corrupt database is a data can only be restored to the last backup. Q : What permissions does folder inherit from the parent? A : When you combine the NTFS permissions based on users and their group memberships, the least restrictive permissions take the precedence. However, explicit Deny entries always override Allow the entries. Q : Whats the difference between a task and a process? A : PROCESS : one or more PROCESS will be required to complete a task. TASK : A Particular Work to be Done is known as TASK. Q : What is a virtual memory? A : A virtual memory is a hardware technique where as the system appears to have more memory that it actually does. This is done by the time-sharing, the physical memory and storage parts of the memory one disk when they are not actively being used. Q : What is cache memory? A : A Cache memory is a random access memory (RAM) that a computer microprocessor can access more quickly than it can access the regular RAM. As the microprocessor processes data, it looks like first in the cache memory and if it finds the data there (from a previous reading of data), it doesnt have to do the more time-consuming reading of sdata from larger memory. Q : What is the difference between Complier and Interpreter? A : An interpreter reads the one instruction at a time and carries out the actions implied by that instruction. It doesnt perform any translation. But a compiler translates the entire instructions.

Q : Differentiate between Primary storage and secondary storage? A : Main memory is only the large storage media that the CPU can access directly. Secondary storage is the extension of main memory that provides large nonvolatile storage capacity. Q : Different types of Real-Time Scheduling? A :There are two types of Real time Scheduling Soft real-time computing requires that critical processes receive priority over less fortunate ones. Hard real-time systems is required to complete a critical task within a guaranteed amount of time. Q : What is a Memory-Management Unit (MMU)? A : In MMU scheme, the value in the relocation register is added to the every address generated by a user process at the time it is sent to memory. Hardware device that maps the virtual to physical address. The user program deals with logical addresses; it never sees the real physical addresses. Q : What is multi tasking? A : Multitasking is the logical extension of multiprogramming .The concept of multitasking is a quite of similar to multiprogramming but difference is that the switching between jobs occurs so frequently that the users can interact with each program while it is running. This concept is also known as a time-sharing systems. A time-shared operating system uses CPU scheduling and multiprogramming to provide each user with a small portion of time-shared system. Q : What is Multi Programming? A : Multiprogramming is the technique of running several programs at a time using timesharing. It allows a computer to do several things at the same time. Multiprogramming creates logical parallelism. The concept of multiprogramming is that the operating system keeps the several jobs in memory simultaneously. The operating system selects a job from the job pool and starts executing a job, when that job needs to wait for any i/o operations the CPU is switched to another job. So the main idea here is that the CPU is never idle. Q : What is Multi threading? A :Multi threading is an application typically is implemented as a separate process with the several threads of control. In some situations a single application may be required to perform several similar tasks for example a web server accepts client requests for web pages, images, sound, and so forth. A busy web server may have several of clients concurrently accessing it. If the web server ran as a traditional single-threaded process, it would be able to service only one client at a time. The amount of time that a client might have to wait for its request to be serviced could be enormous. So it is efficient to have one process that contains multiple threads to serve the same purpose. This approach would multithread the web-server process, the server would create a separate thread that would listen for client requests when a request was made rather than creating another process it would create another thread to service the request. So to get the advantages like responsiveness, Resource sharing economy and utilization of multiprocessor architectures multithreading concept can be used . Q : What are the difference phases of software life cycle? A : Specification of the task Implementation (coding) Design of algorithms Maintenance and evolution of the system Testing and debugging Obsolescence

Q : How do you double-boot a Windows 2003 server box? A: The Boot .ini file is set as a read-only, system, and hidden to prevent is unwanted editing. To change the Boot.ini timeout and default settings, use the System option in Control Panel from the Advanced tab and
Sponsored Links

Home > Networking QA Title: Recent Linux Interview Questions & Answers

Q : What is the real mean of DHCP? A : Dynamic Host Configuration Protocol(DHCP) is a protocol used to by networked devices (clients) to obtain the IP address. Q : Whats the difference between user right and user permission? A : User rights is that user is authorized to used password. if his password/file/dir is expired he is not able to login User permission is the user is permitted to to use file/directory.that is authentication. If he is authentication for particular file or not. Q : What is the difference between working directory and home directory? A : Home directory is the default working directory when a user logs in. On the other hand, working directory is the users current directory. Q : What is the difference between internal and external commands? A : Internal commands are that are already loaded in the system. They will be executed any time and are independent. Q : What is the file server in Linux server? A : File server is used to for file sharing. It enables the processes required the fro sharing Q : How does the linux file system work? A : Linux file structure is a tree like structure. It begins from the root directory, represented by '/', and then expands into sub-directories. Q : What is a Bash Shell? A : A Bash is a free of shell for UNIX. It is the default shell for most UNIX systems. It has a combination of the C and Korn shell features. Q : What is a FIFO? A : A FIFO are otherwise called as 'named pipes'. FIFO (first-in-first-out) is a special file which is said to be data transient. Once data is read from named pipe, it cannot be read again. Also, data can be read only in the order written. It is used to the in inter process communication where a process writes to one end of the pipe (producer) and the other reads from the other end (consumer). Q : What is Linux Shell? What is Shell Script? A : Linux shell is a user interface used for executing the commands. But Shell

is a program the user.

Q : Discuss about the mount and unmount system calls ? A : The privileged mount system call is used to attach a file system to a directory of another file system; The unmount system call detaches a file system. When you mount another file system on to your directory, you are essentially splicing one directory tree onto a branch in another directory tree. The first argument to mount call is the mount point, that is a directory in the current file naming system. The second argument is the file system to mount to that point. When you insert a CDROM to your UNIX system's drive, the file system is in the CDROM automatically mounts to /dev/CDROM in your system. Q : How can you set/get an environment variable from a program? A :. Setting the value of an environment variable is done by using `putenv()'. Getting the value of an environment variable is done by using `getenv()' Q : What is the complete name of the default configuration file for LILO? A : The default configuration file for the LILO is /etc/lilo.conf. You can use the another file by using the -C option along with the name of the file. Q : What command should you use to check your filesystem? A : The fsck command is used to check the integrity of the filesystem on your disk.

link in unix operating system ? A :Soft Links(Symbolic Links) : Links are different inode numbers. ls -l command shows all links with second column value 1 and the link points to original file. Link has the path for original file and not the contents. Removing soft link doesn't affect anything but removing original file , the link becomes "dangling" link which points to nonexistant file. Hard Links : All Links are same inode number. ls -l command shows all the links with the link column(Second) shows No. of links. Links have actual file contents Removing any link ,just reduces the link count , but doesnt affect other links.

Q : What is the difference between STUB and LILO? A : LILO (LInux LOader) is a boot loader for Linux. STUB is a temporary implementaion of part of a program for debugging purposes. Q : What is UNIX Kernel. A : A UNIX Kernel is heart of the operating system. UNIX kernal is loaded first when UNIX system is booted. It handles allocation of devices, cpu, memory from that point on. Q : Do you have idea about "Shell Job Control"? A : Job control in Unix means is controlling the execution of jobs. Using fg (foreground), bg(background), jobs, kill, nice etc.. you can actually control the priorities, order and the number of jobs which are being processed. The effective use of these commands is called Job control. Q : How many prompts are available in a UNIX system? A : Unix/ Linux Supports are four Prompts PS1, PS2, PS3, PS4 Q : What is a Marshalling? A : Marshalling is a usually required when passing the output parameters of a program written in one language as input to a program is written in another language. Q : Explain about Scheduling. A : The way by which the processes are alloated to a CPU to use the CPU time is called scheduling. Schedulings are different types of algorithms FCFS(first come first serve) SJF(shortest job first) SHORTEST JOB NEXT ROUND ROBIN MULTILEVEL FEEDBACK SCHEDULING Q : How are devices represented in UNIX? A : All the devices are represented by files called special files that are located in/dev directory. Thus, device files and other files are named and accessed in the same way. A 'regular file' is just an ordinary data file in the disk. A 'block special file' represents a device with characteristics similar to a disk (data transfer in terms of blocks). A 'character special file' represents a device with characteristics similar to a keyboard (data transfer is by stream of bits in sequential order). Q : What is a FIFO? A :FIFO are otherwise called as 'named pipes'. FIFO (first-in-first-out) is a special file which is said to be data transient. Once data is read from named pipe, it cant be read again. Also, data can be read only in the order written. It is used to in interprocess communication where a process writes to one end of the pipe (producer) and the other reads from the other end (consumer). Q : What is the most graceful way to bring a system into single user mode? A : The most graceful way is to use the command init s. If you want to shut everything down before going to single user mode then do init 0 first and from the ok prompt do a boot -s. Q : What is INODE? A : A unique number is associated with each filename. This number is used to look up an entry in the inode table which gives information on the type, size, and location of the file and the user id of the owner of the file. Q : What is a statically linked file?

A : A statically linked program is one of that contains all the information (libraries) it needs to run. It doesnt need to load additional libraries in order to execute. Q : Whats the difference between Swapping and Paging? A : Swapping: Whole process is moved from the swap device to the main memory for execution. Process size must be less than or equal to the available main memory. It is easier to implementation and overhead to the system. Swapping systems does not handle the memory more flexibly as compared to the paging systems. Paging: Only the required memory pages are moved to main memory from the swap device for execution. Process size does not matter. Gives the concept of the virtual memory. Its provide the greater flexibility in mapping the virtual address space into the physical memory of the machine. Allows more number of processes to fit in the main memory simultaneously. Allows the greater process size than the available physical memory. Demand paging systems handle the memory more flexibly. Q : What is the main goal of the Memory Management? A : The memory management decides which process should reside in the main memory, Manages the parts of the virtual address space of a process which is non-core resident, Monitors are the available main memory and periodically write the processes into the swap device to provide more processes fit in the main memory simultaneously. Q : How the Swapper works? A : The swapper is the only process that swaps the processes. The Swapper is operated only in the Kernel mode and it doesnt use System calls instead it uses internal Kernel functions for swapping. It is the archetype of all kernel process. Q : What is called page fault? A : A Page fault is referred to the situation when the process addresses a page in the working is a set of the process but the process fails to locate the page in the working set. And on a page fault the kernel updates the working set by reading the page from the secondary device. Q : What is the different types of Unix systems? A : The most widely Unix systems used are: System V (AT&T) , AIX (IBM) , BSD (Berkeley) , Solaris (Sun), Xenix ( A PC version of Unix)
Sponsored Links

Home > Networking QA Title: Recent Networking Interview Questions and Answers

Q : Explain the distance vector routing algorithm? A : Distance Vector Routing Algorithms is calculate a best route to reach a destination based solely on distance. Q : What is FTP & UDP? Whats the different version of IP? A : FTP or File Transfer Protocol is used to transfer data from one computer to another over the Internet, or through a network User Datagram Protocol (UDP) is one of the core protocols of the Internet protocol suite. Using UDP, programs on the networked computers can send short messages sometimes known as datagrams(using Datagram Sockets) to one another.

IP versions IPv6,IPv4 Q : Why we use cross the cable to connect same devices? A : Same devices like PC-2-PC, it uses(NIC for PC) 1,2 for transmission & 3,6 for reception. If we do not use cross cable then we can't transfer data. While in the case of switch/hub they receive (NIC of SWITCH/HUB)data on 1,2 & transmit on 3,6. So we use straight cable for de-similar host & cross cable for similar hosts. Q : whats the difference between ATM and ISDN? A :ATM is Packet Switching or Cell switching. ISDN is a Circuite switching . Q : What is the TCP/IP ? what is the use of TCP/IP? A :Integrated Services refers to ISDN's ability to deliver at minimumof two simultaneous connections, in any combination of data, voice, video, and fax, over a single line. Multiple devices can be attached to the line, and used as needed. That means an ISDN line can get care of most people's complete communications needs at a much higher transmission rate, without forcing the purchase of multiple analog phone lines. Asynchronous Transfer Mode (ATM) is a cell relay, packet switching network and data link layer protocol which encodes data traffic into small (53 bytes; 48 bytes of data and 5 bytes of header information) fixed-sized cells. ATM provides data link layer services that run over Layer 1 links. This differs from other technologies based on packet-switched networks (such as the Internet Protocol or Ethernet), in which variable sized packets (known as frames when referencing layer 2) are used. ATM is a connection-oriented technology, in which a logical connection is established between the two endpoints before the actual data exchange begins.

Q : What do you mean by Twisted-pair Cabling ? A : A type of cable that consists of two independently insulated wires twisted around one another. The use of two wires twisted together helps to reduce the crosstalk and electromagnetic induction. Q :What is the seven layers in Open System Interconnection model. A : The seven layers are Application, Presentation, Session, Transport, Network, Data link, and Physical.

Q : what is a Transaction server? A : A transaction server is the client invokes remote procedures that reside on the server with an SQL database engine. These remote procedures on the server execute a group of SQL statements. The network exchange consists of a single request/reply message. The SQL statements either all succeed or fail as a unit. Q : What is mean by Transparency? A : Transparency really means hiding the network and its servers from users and even the application programmers.

Q :What are the two types of OLTP? A : TP lite, based on the stored procedures. TP heavy, based on the TP monitors. Q : Difference between trigger and rule? A : The triggers are called implicitly by database generated events, while stored procedures are called the explicitly by client applications. Q : Explain building blocks of Client/Server? A : The client side building block runs the client side of the application. The server side building block runs the server side of the application. Q : What is the Structured Query Langauge (SQL)? A : SQL is a powerful set-oriented language which was developed by IBM research for the databases that adhere to the relational model. It consists of a short list of powerful, yet highly flexible, commands that can be used to manipulate information collected in tables. Through the SQL, we can manipulate and control sets of records at a time. Q : What are the main components of Transaction-based Systems? A : The main components of trasaction based systems are Transaction Manager, and Resource Manager Application Program. Q : What is a File server? A : A File servers are useful for sharing files across a network. With a file server, the client passes requests for file records over network to the file server Q : Whats the differences between a domain and a workgroup? A : A domain, one or more computer can be a server to manage the network. On the other hand in a workgroup in all computers are peers having no control on each other. In a domain, user doesnt need an account to logon on a specific computer if an account is available on the domain. In a work group user needs to have an account for every computer. In a domain, Computers can be on different local networks. In a work group all computers needs to be a part of the same local network. Q : Explain the term Protocol? A : The term Protocol is a standard way of communicating across a network. A protocol is the "language" of the network. It is a method by which two dissimilar systems can communicate. TCP is a protocol which runs over a network. Q : What is Telnet? A : Telnet is the main part of Internet protocol for creating a connection to a remote server. Q : What is a MIB? A : A MIB (Management Information Base) is part of every SNMP-managed device. Each SNMP agent has the MIB database that contains information about the device's status, its performance, connections, and configuration.

The MIB is queried by SNMP. Q :What is a NVT (Network Virtual Terminal)? A : NVT is a set of rules defining a very simple virtual terminal interaction. The NVT is used in the start of a Telnet session. Q : What are the possible ways of data exchange? A : The possible ways of data exchange are Simplex and Half-duplex Fullduplex. Q : What are the main important topologies for networks? A : STAR topology: In this all computers are connected using a central hub. Advantages: Can be inexpensive, easy to install and reconfigure and easy to trouble shoot physical problems. BUS topology: In this each computer is directly connected to primary network cable in a single line. Advantages: In expensive, easy to install, simple to understand, easy to extend.

RING topology: In this all computers are connected in loop. Advantages: All computers have equal access to network media, installation can be simple, and signal does not degrade as much as in other topologies because each computer regenerates it. Q : What is a mesh network A : A mesh network in which there are multiple network links between computers to provide multiple paths for data to travel. Q : What is ACID property? A : The ACID is a term coined by Andrew Reuter in 1983, which stands for Atomicity, Consistence, Isolation and Durability. Q : What is a point-to-point protocol? A : Point to point protocol is a communications protocol used to connect computers to remote networking services including Internet service providers. Q : What are the most typical functional units of the Client/Server applications? A : There are User interface Business Logic and Shared data. Q : What are Triggers and Rules? A : Triggers are special user defined actions usually in the form of stored procedures, that are automatically invoked by the server based on the data related events. It can perform complex actions and can use the full power of procedural languages.

A rule is a special type of trigger that is used to the perform simple checks on data. Q : What is RPC? A : The Remote Procedure Call (RPC) hides the intricacies of the network by using the ordinary procedure call mechanism familiar to every programmer. A client process calls a function on a remote server and suspends itself until it gets back the results. Parameters are passed like in any ordinary procedure. The RPC, like an ordinary procedure, is synchronous. The process that issues the call waits until it gets the results. Under the covers, the RPC run-time software collects values for the parameters, forms a message, and sends it to the remote server. The server receives the request, unpack the parameters, calls the procedures, and sends the reply back to the client. It is a telephone-like metaphor. Q : What is the difference between the transmission and communication? A : Transmission is a physical movement of information and concern issues like bit polarity, synchronization, clock etc..Communication means the meaning full exchange of information between two communication media. Q : What is Beaconing? A : The process that allows a network to self-repair networks problems. The stations on the network notify the other stations on the ring when they are not receiving the transmissions. Beaconing is used in Token ring and FDDI networks Q : Whats the difference between ARP and RARP? A : The address resolution protocol (ARP) is used to the associate the 32 bit IP address with the 48 bit physical address, used by a host or a router to find the physical address of another host on its network by sending a ARP query packet that includes the IP address of the receiver. The reverse address resolution protocol (RARP) allows a host to discover its Internet address when it is know only its physical address.
Sponsored Links

Home > Networking QA Title: Technical Interview Networking Questions with Answers
1.

Identify 2 features of PPP CHAP authentication? * Username and password is sent in clear text * Authentication messages are sent periodically during the connection * Less secure then PAP * Local router challenges the remote router Correct answer: B D PPP CHAP authentication message are sent periodically during the connection by challenging the other end of the connection. It is more secure than PAP and passwords and username are encrypted.

2.

3.

4.

5.

6. 7.

8.

9.

Identify the default IPX serial encapsulation? * Novell-Ether * SDLC * SNAP * HDLC Correct answer: D The default IPX serial encapsulation is HDLC. Identify the hardware component that stores the backup configuration? * RAM * NVRAM * Flash * ROM Correct answer: B NVRAM contains the backup config. RAM is the dynamic memory area, ROM contains the boot strap code and Flash contains the IOS. Identify the extended IP access-list number range? * 600 - 699 * 1 - 99 * 900 - 999 * 100 - 199 Correct answer: D The extended IP access-list range is 100-199. Identify 3 Fast Ethernet technologies? * 100 Base FastEther * 100 Base FX * 100 Base T4 * 100 Base TX Correct answer: B C D BaseFastEther is false. 100 Base FX, TX and T4 are all valid. Identify the OSI layer which is responsible for end-to-end connections? * Network * Transport * Session * Data link * TCP Correct answer: B Layer 4 is the Transport layer and is responsible for end-to-end connections. Identify the 2 characteristics regarding MAC addresses? * Contains a network portion and host portion * Always assigned by System Administrator * 48 bits long * Contains a vendor code and serial number Correct answer: C D MAC addresses are assigned by the vendor. Each MAC address is 48 bits long and made up of 24 bits vendor code and 24 bits serial number. Identify the number range for IPX SAP filters? * 900 - 999 * 1000 - 1099 * 800 -899 * 100 - 199

10.

11.

12.

13.

14.

15.

Correct answer: B The IPX SAP filtering range is 1000-1099. What is the purpose of ARP? * IP to host name resolution * Host name to IP address resolution * Mac to IP address resolution * IP to Mac address resolution Correct answer: D Address Resolution Protocol resolves the MAC address if the IP address is known. It is a layer 3 protocol. Which OSI layer establishes, maintains and terminates sessions between hosts? * Application * Physical * Data-Link * Presentation * Network * Session Correct answer: F Layer 5 the Session layer performs this function. Which statement is true regarding Administrative distance? * It is a metric * Number of hops between two routers * Trustworthiness of the routing information * RIP Administrative distance is 100 Correct answer: C Administrative distance is rating of trustworthiness of the routing information. The lower the AD the better the information. Identify the purpose of the Ping command? * Share routing information with a neighbor router * Transmit user data when buffers are full * Test connectivity at layer 3 * Test entire protocol stack Correct answer: C The ping command tests layer 3 connectivity. Identify the order of the 5 step encapsulation? 1. Create the segment 2. Convert the frame to bits 3. Create the packet 4. Create the frame 5. User creates the data * 1,2,4,2,5 * 2,1,3,4,5 * 5,1,3,4,2 * 5,3,4,1,2 Correct answer: C Cisco 5 step encapsulation. 1) User creates Data 2) Data is converted into a segment at layer 4 3) The segment is converted to packet at layer 3 4) The packet it converted into a frame at layer 2 5) The frame is converted into bits at layer 1 The Cisco IOS is stored where? * ROM

16.

17.

18.

19.

20.

21.

* CD * Flash * NVRAM Correct answer: C By default the Cisco IOS is stored in flash. Sequence and acknowledgement numbers are used for? * Layer transitioning * Flow control * Port number addressing * Reliability Correct answer: D TCP uses sequence numbers and acknowledgements to implement reliability. Identify IPX GNS and its purpose? * Go Network Server - sends a print job to a network server * Get Nearest Server - locate the nearest server * Guaranteed Network Services - allocates resources to users * Get Notes Server - locates Domino Server Correct answer: B GNS stands for Get Nearest Server, initiated by a workstation. Identify the true statement regarding subnetting? * Allows for more host address * Borrow bits from the network portion of the address * Allows for unlimited number of networks * Borrow bits from the host portion of the address Correct answer: D Subnetting involves borrowing bits for the host portion of the address to be used to subnet addressing. Inverse ARP serves what purpose? * Method for a local router to introduce itself to the remote end of the connection * Broadcast a routing table update * Identify MAC addresses if the IP address is known * Sent every 10 seconds used to verify the Frame Switch is still active Correct answer: A Inverse ARP operates in a Frame Relay network so the two end points can identify themselves to each other. Identify 3 characteristics of a MAC address? * Burned into the NIC * 48 bits long * Length is 32 bits * Used to deliver the frame to the end device * Contains a network portion and a host portion Correct answer: A B D The MAC address is 48 bits long not 32. It does NOT contain a network and host portion with the address. It is used to deliver the frame to the destination device. Identify 3 IP routing protocols? * RIP * AURP * OSPF * IGRP * ARP

22.

23.

24.

25.

26.

27.

* ICMP Correct answer: A C D AURP and ICMP are not routing protocols. Identify the type of routing protocol that exchanges entire routing tables at regular intervals? * Link state * Interior gateway protocols * Appletalk routing * Distance vector Correct answer: D Distance Vector routing protocols exchange entire routing tables with its neighbors. Link State routing protocols exchange LSPs to share information regarding the networks they know. Identify the type of hardware required to connect a Token ring network to an Ethernet network? * Repeater * TR-Enet * Router * Token Ring to Ethernet translation hub Correct answer: C Routers are used to connect dissimilar networks with different access-methods, like connecting Token Ring to Ethernet. Identify 3 characteristics regarding CDP? * On by default * Shows only directly connected neighbors * Requires IP or IPX * 60 second update interval by default * 30 second updates interval by default Correct answer: A B D CDP stands for Cisco Discovery Protocol. It is used to discover directly connected neighbors, it is on by default and has a 60 second update interval by default. Identify 2 transport layer protocols? * IP * TCP * CDP * ARP * UDP Correct answer: B E TPC and UDP are 2 layer4 Transport protocols. Identify 2 features of X.25? * Supports only IP * Utilizes switched and permanent virtual circuits * Contains minimal flow control and error recovery * Utilizes LAPB as its data-link protocol Correct answer: B D X.25 utilizes LAPB and uses switched and permanent VCs. It supports multiple layer protocols and is heavy laden with error detection and correction mechanisms. Identify the purpose of the Trace command? * Explorer packet transmitting routing information * Test connectivity * Determine the path a packet is taking through the network * Transmits user data when buffers are full

28.

29.

30.

Correct answer: C The trace command is used to determine the path a packet has taken through the network. Identify the purpose of the TCP 3 step handshake? * Setup a un-reliable connection * Initialize routing tables * Synchronize sequence numbers between hosts * Connection tear down process Correct answer: C The 3 step handshake establishes the parameters required for a TCP connection. During the handshake process sequence numbers are synchronized allowing for the end points to properly acknowledge and re-assemble the segments. Identify 2 PPP characteristics? * Is proprietary to Cisco * Supports authentication * Support compression * Run on a multi-access network Correct answer: B C PPP supports authentication; PAP and CHAP. It also supports compression; Stacker and Predictor. Which statement is true regarding half duplex? * Only works in a point-to-point configuration * Allows for transmitting and receiving but not a the same time * Allow for transmitting and receiving of data simultaneously * Doubles the bandwidth Correct answer: B

Sponsored Links

Home > Networking QA Title: Networking Protocols Interview Questions and Answers
1.

2.

To prevent Service Advertisements (SAPs) from flooding a network, Cisco routers do not forward them. How are services advertised to other networks? * Each router builds its own SAP table and forwards that every 60 seconds. * Each router assigns a service number and broadcasts that. * SAPs arent necessary with Cisco routers. * Cisco routers filter out all SAPs. Correct answer: A Cisco routers build SAP tables and forward the table every 60 seconds. All SAPs cant be filtered even with 4.x since NDS and time synchronization uses SAPs. Novells implementation of RIP updates routing tables every ____ seconds.

3.

4.

5.

6.

7.

* 60 * 90 * 10 * 30 Correct answer: A Novells RIP updates routing tables every 60 seconds, Apples RTMP is every 10 seconds, routers ARP every 60 seconds, IGRP signal every 90 seconds, and Banyan VINES signals every 90 seconds. In Novells use of RIP, there are two metrics used to make routing decisions. Select the two metrics. * Ticks. * Hops * Loops * Counts Correct answer: A &B It first uses ticks (which is about 1/18 sec.); if there is a tie, it uses hops; if hops are equal, then it uses an administratively assigned tiebreaker. What is the Cisco name for the encapsulation type used on a serial interface? * HDLC * SDLC * SAP * SNAP Correct answer: A arpa is used by the Cisco IOS for which encapsulation types? * Ethernet_II * Ethernet_802.3 * Ethernet_802.2 * Ethernet_SNAP Correct answer: A Novells IPX and Ciscos IOS name their protocols differently. Cisco uses sap for Ethernet_802.2, Token-Ring, and Novells FDDI_802.2. Cisco uses snap for Ethernet_SNAP, Token-Ring_SNAP, and FDDI_SNAP. Cisco uses arpa for Ethernet_II and, finally the default is Novell-ether for Novells Ethernet_802.3. snap is used by the Cisco IOS for which encapsulation types? * Ethernet_SNAP * Token-Ring_SNAP * FDDI_SNAP * Novell-SNAP * Novell-FDDI. Correct answer: A,B &C Novells IPX and Ciscos IOS name their protocols differently. Cisco uses sap for Ethernet_802.2, Token-Ring, and Novells FDDI_802.2. Cisco uses snap for Ethernet_SNAP, Token-Ring_SNAP, and FDDI_SNAP. Cisco uses arpa for Ethernet_II and, finally the default is Novell-ether for Novells Ethernet_802.3.15 sap is used by the Cisco IOS for which encapsulation types? * Ethernet_802.2 * Token-Ring * FDDI_SNAP * Ethernet_802.3 * FDDI_802.2

8.

9.

10.

11.

12.

Correct answer: A,B &E Novells IPX and Ciscos IOS name their protocols differently. Cisco uses sap for Ethernet_802.2, Token-Ring, and Novells FDDI_802.2. Cisco uses snap for Ethernet_SNAP, Token-Ring_SNAP, and FDDI_SNAP. Cisco uses arpa for Ethernet_II and, finally the default is Novell-ether for Novells Ethernet_802.3. Which type of Ethernet framing is used for TCP/IP and AppleTalk? * Ethernet 802.3 * Ethernet 802.2 * Ethernet II * Ethernet SNAP Correct answer: D Ethernet 802.3 is used with NetWare versions 2 through 3.11, Ethernet 802.2 is used with NetWare 3.12 and later plus OSI routing, Ethernet II is used with TCP/IP and DECnet, and Ethernet SNAP is used with TCP/IP and AppleTalk. Which type of Ethernet framing is used for TCP/IP and DECnet? * Ethernet 802.3 * Ethernet 802.2 * Ethernet II * Ethernet SNAP Correct answer: C Ethernet 802.3 is used with NetWare versions 2 through 3.11, Ethernet 802.2 is used with NetWare 3.12 and later plus OSI routing, Ethernet II is used with TCP/IP and DECnet, and Ethernet SNAP is used with TCP/IP and AppleTalk. You are a system administrator on a NetWare network, you are running NetWare 4.11 and you cannot communicate with your router. What is the likely problem? * NetWare 4.11 defaults to 802.2 encapsulation. * NetWare 4.11 defaults to 802.3 encapsulation * Cisco routers only work with NetWare 3.11. * NetWare 3.11 defaults to 802.2 encapsulation. Correct answer: A The default encapsulation on Cisco routers is Novell Ethernet_802.3 and NetWare 3.12 and later defaults to 802.2 encapsulation, 3.11 and earlier defaults to 802.3. NetWare IPX addressing uses a network number and a node number. Which statements are true? * The network address is administratively assigned and can be up to 16 hexadecimal digits long. * The node address is always administratively assigned. * The node address is usually the MAC address. * If the MAC address is used as the node address, then IPX eliminates the use of ARP. Correct answer: A, C &D The network address can be up to 16 hexadecimal digits in length. The node number is 12 hexadecimal digits. The node address is usually the MAC address. An example IPX address is 4a1d.0000.0c56.de33. The network part is 4a1d. The node part is 0000.0c56.de33. The network number is assigned by the system administrator of the Novell network. Which NetWare protocol works on layer 3network layerof the OSI model?

13.

14.

15.

16.

17.

* IPX * NCP * SPX * NetBIOS Correct answer: A IPX (Internetwork Packet Exchange) is a NetWare network layer 3 protocol used for transferring information on LANs. Which NetWare protocol provides link-state routing? * NLSP * RIP * SAP * NCP Correct answer: A NetWare Link Services Protocol (NLSP) provides link-state routing. SAP (Service Advertisement Protocol) advertises network services. NCP (NetWare Core Protocol) provides client-to-server connections and applications. RIP is a distance vector routing protocol. As a system administrator, you want to debug igrp but are worried that the debug IP igrp transaction command will flood the console. What is the command that you should use? * debug IP igrp event * debug IP igrp-events * debug IP igrp summary * debug IP igrp events Correct answer: D The debug IP igrp events is used to only display a summary of IGRP routing information. You can append an IP address onto either command to see only the IGRP updates from a neighbor. What does the following series of commands accomplish? router igrp 71 network 10.0.0.0 router igrp 109 network 172.68.7.0 * It isolates networks 10.0.0.0 and 172.68.7.0. * It loads igrp for networks 109 and 71. * It disables RIP. * It disables all routing protocols. Correct answer: A It isolates network 10.0.0.0 and 172.68.7.0 and associates autonomous systems 109 and 71 with IGRP. IGRP does not disable RIP, both can be used at the same time. In the command router igrp 109 what does 109 signify? * an autonomous system * any network number which the router is attached to * the allowable length of the routing table * the network socket number Correct answer: A The Cisco IOS global configuration command router igrp xxx is used to configure the Interior Gateway Routing Protocol. In this case, the 109 is called the process-id , which can also be used for an autonomous system number. IGRP supports a feature that allows traffic to be distributed among up to 6 (4 default) paths to provide greater overall throughput and reliability. What is this called? * unequal-cost load balancing * equal-cost load balancing * proportionate load balancing

18.

19.

20.

21.

22.

* low cost load balancing Correct answer: A An unequal-cost load balancing is used to provide alternate paths for data distribution on an internetwork. Cisco developed this method to use unused or under utilized links to increase bandwidth and network availability. IGRP uses flash updates, poison reverse updates, holddown times, and split horizon. How often does it broadcast its routing table updates? * 90 seconds * 10 seconds * 30 seconds * 45 seconds Correct answer: A The command show IP protocol displays which information? * routing timers * network information * contents of the IP routing table * information about all known network and subnetworks Correct answer: A & B show IP protocol displays routing timers and network information. show IP route displays the routing table with information about all known networks and subnetworks. When using RIP, routing updates are broadcast every ____ seconds. * 30 * 10 * 60 * 90 Correct answer: A Novells RIP updates routing tables every 60 seconds, Apples RTMP is every 10 seconds, routers ARP every 60 seconds, DECnet hosts and IGRP signal every 15 seconds, and Banyan VINES signals every 90 seconds. An autonomous system can only exist if all routers in that system meet which criteria? * interconnected * run the same routing protocol * assigned same autonomous system number * run IGRP only * run RIP only Correct answer: A,B &C An autonomous system is a set of routers and networks under the same administration. Each router must be interconnected, run the same routing protocol, and assigned the same autonomous system number. The network Information Center (NIC) assigns a unique autonomous system number to enterprises. A default route is analogous to a _________. * default gateway * static route * dynamic route * one-way route Correct answer: A A default route is analogous to a default gateway. It is used to reduce the length of routing tables and to provide complete routing

23.

24.

25.

26.

27.

capabilities when a router might not know the routes to all other networks. Routers can learn about destinations through static routes, default, or dynamic routing. By default, a router will use information derived from __________. * IGRP * RIP * IP * TCP Correct answer: A The quality of information is rated: Connected interface 0 Static route 1 IGRP 100 RIP 120 Unknown 255 The lower the value, the more reliable the source with 255 signifying information that the router will ignore. So, the router will use IGRP, rated at 100, before RIP, rated at 120. You are logged into a router, what command would show you the IP addresses of routers connected to you? * show cdp neighbors detail * show run * show neighbors * show cdp Correct answer: A As a system administrator, you perform an extended ping at the privileged EXEC prompt. As part of the display, you see Set DF bit in IP header? [yes] : What would happen if you answered no at the prompt. * This lets the router fragment the packet. * It tells the router not to fragment the packet. * This lets the router direct the packet to the destination it finds in its routing table. * It tell the router to send the packet to the next hop router Correct answer: A Set DF bit in IP header? is a response to an extended ping at the router. If you answer yes (the default) the router will not fragment the packet. If you answer no, the router will fragment the packet. You have typed ping 172.16.101.1 and get the following display: Type escape sequence to abort. Sending 5, 100-byte ICMP Echoes to 172.16.101.1, timeout is 2 seconds: .!!!! What does the . signify? * That one message timed out. * That all messages were successful. * That one message was successful. * That one message completed in under the allotted timeframe. Correct answer: A The possible responses from the ping command are: ! Successful receipt of an echo reply. Timed out waiting for a reply U Destination unreachable C Congestion-experienced packet I Ping interrupted ? Packet type unknown & Packet TTL exceeded Which command, that is used to test address configuration, uses

28.

Time-To-Live (TTL) values to generate messages from each router. * trace * ping * telnet * bootp Correct answer: A The Cisco IOS EXEC command trace [protocol] [destination] is used to discover routes that packets will travel to their destination hosts. Trace uses TTL (Time to Live) values to report destination route information. What does the command IP name-server 255.255.255.255 accomplish? * It sets the domain name lookup to be a local broadcast. * This is an illegal command. * It disables domain name lookup. * The command is now defunct and has been replaced by IP servername ip any Correct answer: A By default DNS is enabled on a router with a server address of 255.255.255.255, which provides for a local broadcast.

29.

30.

As a system administrator, you need to provide your routers with a Domain Name System (DNS) server. How many DNS servers can you specify with one command? *6 *1 *2 *4 Correct answer: A You can only specify six name servers in one command. The syntax is IP name-server server-address1 [[ server-address2 ]serveraddress6]. You must also enable DNS. How would you configure one host name that points to two IP addresses? * IP host jacob 1.0.0.5 2.0.0.8 * IP jacob 1.0.0.5 2.0.0.8 * IP host jacob 1.0.0.5 * IP host duplicate all Correct answer: A

Sponsored Links

Home > Networking QA Title: Advanced Networking Questions and Answers


1.

When configuring the subnet mask for an IP address, which formats can be used?

2.

3.

4.

5.

6.

7.

* dotted-decimal. * Hexadecimal * Bit-count * Octal * Binary Correct answer: A, B &C You are given the following address: 153.50.6.27/25. Determine the subnet mask, address class, subnet address, and broadcast address. * 255.255.255.128, B,153.50.6.0, 153.50.6.127 * 255.255.255.128, C,153.50.6.0, 153.50.6.127 * 255.255.255.128, C,153.50.6.127, 153.50.6.0 * 255.255.255.224, C,153.50.6.0, 153.50.6.127 Correct answer: A You are given the following address: 128.16.32.13/30. Determine the subnet mask, address class, subnet address, and broadcast address. * 255.255.255.252, B,128.16.32.12, 128.16.32.15 * 255.255.255.252, C,128.16.32.12, 128.16.32.15 * 255.255.255.252, B,128.16.32.15, 128.16.32.12 * 255.255.255.248, B,128.16.32.12, 128.16.32.15 Correct answer: A You are given the following address: 15.16.193.6/21. Determine the subnet mask, address class, subnet address, and broadcast address. * 255.255.248.0, A, 15.16.192.0, 15.16.199.255 * 255.255.248.0, B, 15.16.192.0, 15.16.199.255 * 255.255.248.0, A, 15.16.199.255, 14.15.192.0 * 255.255.242.0, A, 15.16.192.0, 15.16.199.255 Correct answer: A You have an IP host address of 201.222.5.121 and a subnet mask of 255.255.255.248. What is the broadcast address? * 201.222.5.127 * 201.222.5.120 * 201.222.5.121 * 201.222.5.122 Correct answer: A The easiest way to calculate this is to subtract 255.255.255.248 (subnet mask) from 255.255.255.255, this equals 7. Convert the address 201.222.5.121 to binary11001001 11011110 00000101 01111001. Convert the mask 255.255.255.248 to binary11111111 11111111 11111111 11111000. AND them together to get: 11001001 11011110 01111000 or 201.222.5.120. 201.222.5.120 is the subnet address, add 7 to this address for 201.222.5.127 or the broadcast address. 201.222.5.121 through 201.222.5.126 are the valid host addresses. Given the address 172.16.2.120 and the subnet mask of 255.255.255.0. How many hosts are available? * 254 * 510 * 126 * 16,372 Correct answer: A

8.

9. 10.

11.

12.

13. 14.

172.16.2 120 is a standard Class B address with a subnet mask that allows 254 hosts. You are a network administrator and have been assigned the IP address of 201.222.5.0. You need to have 20 subnets with 5 hosts per subnet. The subnet mask is 255.255.255.248. Which addresses are valid host addresses? * 201.222.5.17 * 201.222.5.18 * 201.222.5.16 * 201.222.5.19 * 201.222.5.31 Correct answer: A,B & D Subnet addresses in this situation are all in multiples of 8. In this example, 201.222.5.16 is the subnet, 201.22.5.31 is the broadcast address. The rest are valid host IDs on subnet 201.222.5.16. You are a network administrator and have been assigned the IP address of 201.222.5.0. You need to have 20 subnets with hosts per subnet. What subnet mask will you use? * 255.255.255.248 * 255.255.255.128 * 255.255.255.192 * 255.255.255.240 Correct answer: A By borrowing 5 bits from the last octet, you can. have 30 subnets. If you borrowed only 4 bits you could only have 14 subnets. The formula is (2 to the power of n)-2. By borrowing 4 bits, you have (22x22)-2=14. By borrowing 5 bits, you have (22x22x2)-2=30. To get 20 subnets, you would need to borrow 5 bits so the subnet mask would be 255.255.255.248. You are given the IP address of 172.16.2.160 with a subnet mask of 255.255.0.0. What is the network address in binary? * 10101100 00010000 * 00000010 10100000 * 10101100 00000000 * 11100000 11110000 Correct answer: A To find the network address, convert the IP address to binary 10101100 000100000 00000010 10100000 then ANDed it with the subnet mask11111111 11111111 00000000 00000000. The rest is 10101100 00010000 00000000 00000000, which is 172.16.0.0 in decimal. The first octet rule states that the class of an address can be determined by the numerical value of the first octet. Which addresses are INCORRECTLY paired with their class? * 128 to 191, Class B * 192 to 223 Class B * 128 to 191, Class C * 192 to 223, Class C Correct answer: B & C Address classes are: 1 to 126, Class A; 128 to 191, Class B, 192 to 223, Class C; 224 to 239, Class D; and to 255, Class E. The first octet rule states that the class of an address can be determined by the numerical value of the first octet. Which addresses are INCORRECTLY paired with their class?

15. 16.

17.

18.

19.

20.

21.

22.

* 1 to 126, Class A * 128 to 191, Class A * 1 to 126, Class B * 128 to 191, Class B Correct answer: B & C. Address classes are: 1 to 126, Class A; 128 to 191, Class B, 192 to 223, Class C; 224 to 239, Class D; and to 255, Class E. The first octet rule states that the class of an address can be determined by the numerical value of the first octet. Which addresses are INCORRECTLY paired with their class? * 240 - 255, Class D * 240 - 255, Class E * 224 - 239, Class D * 224 - 239, Class E Correct answer: A & D Address classes are: 1 to 126, Class A; 128 to 191, Class B, 192 to 223, Class C; 224 to 239, Class D; and 240 to 255, Class E. Which IP Address Class is INCORRECTLY paired with its range of network numbers? * Class A addresses include 192.0.0.0 through 223.255.255.0 * Class A addresses include 1.0.0.0 through 126.0.0.0 * Class B addresses include 128.0.0.0 through 191.255.0.0 * Class C addresses include 192.0.0.0 through 223.255.255.0 * Class D addresses include 224.0.0.0 through 239.255.255.0 Correct answer: A Class A addresses include 1.0.0.0 through 126.0.0.0 Class B addresses include 128.0.0.0 through 191.255.0.0 Class C addresses include 192.0.0.0 through 223.255.255.0 Class D addresses include 224.0.0.0 through 239.255.255.0 Which IP Address Class can have 16 million subnets but support 254 hosts? * Class C * Class A * Class B * Class D Correct answer: A Possible Subnets IP Address Class Possible Hosts A 16M. 64K B 64K 16M C 254 Which IP Address Class can have 64,000 subnets with 64,000 hosts per subnet? * Class B * Class A * Class C * Class D Correct answer: A IP Address Class Possible Subnets Possible Hosts A 16M 64K B 64K 16M C 254 There are two processes to pair MAC address with IP addresses. Which process finds an IP address from a MAC address? * RARP

23.

24.

25.

* ARP * RIP * IGRP Correct answer: A ARP (Address Resolution Protocol) maps an IP address to the MAC address, RARP (Reverse Address Resolution Protocol) maps the MAC address to the IP address. ARP and RARP work at the internet layer of the Internet Model or the network layer of the OSI model. When the router runs out of buffer space, this is called ________. * Source Quench * Redirect * Information Request * Low Memory Correct answer: A Source quench is the process where the destination router, or end internetworking device will quench the date from the source, or the source router. This usually happens when the destination router runs out of buffer space to process packets. Which protocol carries messages such as destination Unreachable, Time Exceeded, Parameter Problem, Source Quench, Redirect, Echo, Echo Reply, Timestamp, Information Request, Information Reply, Address Request, and Address Reply? * ICMP * UDP * TCP * TFTP * FTP Correct answer: A ICMP (Internet Control Message Protocol) is a network layer internet protocol described in RFC # 792. ICMP reports IP packet information such as destination Unreachable, Time Exceeded, Parameter Problem, Source Quench, Redirect, Echo, Echo Reply, Timestamp, Information Request, Information Reply, Address Request, and Address Reply. Two of the protocols that can be carried in the Protocol field of an IP packet are? * TCP * UDP * FTP * TFTP Correct answer: A & B The following are the fields in an IP segment, their length, and their definitions: VERS (Version number - 16 bits) HLEN (Number of 32-bit words in the header - 4 bits) Type of Server (How the datagram should be handled - 32 bits) Total Length (Total length of header and data - 32 bits) Identification (Provide fragmentation of datagrams to allow different MTUs in the internet - 4 bits) Flags (Provide fragmentation of datagrams to allow different MTUs in the internet - 4 bits) Frag Offset (Provide fragmentation of datagrams to allow different MTUs in the internet - 6 bits) TTL (Time-To-Live - 6 bits)

26.

27.

Protocol (Upperlayer protocol sending the datagram - 16 bits) Header Checksum )Integrity check on the header - 16 bits) Source IP Address (32 bits) Destination IP Address (32 bits) IP Options (network testing, debugging, security and others - 4 bits) Data (4 bits). Where would network testing be included in an IP packet? * IP Options field * Identification field * Type of Service field * Reservation field Correct answer: A The following are the fields in an IP segment, their length, and their definitions: VERS (Version number - 16 bits) HLEN (Number of 32-bit words in the header - 4 bits) Type of Server (How the datagram should be handled - 32 bits) Total Length (Total length of header and data - 32 bits) Identification (Provide fragmentation of datagrams to allow different MTUs in the internet - 4 bits) Flags (Provide fragmentation of datagrams to allow different MTUs in the internet - 4 bits) Frag Offset (Provide fragmentation of datagrams to allow different MTUs in the internet - 6 bits) TTL (Time-To-Live - 6 bits) Protocol (Upperlayer protocol sending the datagram - 16 bits) Header Checksum )Integrity check on the header - 16 bits) Source IP Address (32 bits) Destination IP Address (32 bits) IP Options (network testing, debugging, security and others - 4 bits) Data (4 bits). What field tells the Internet layer how to handle an IP packet? * Type of Service * Identification * Flags * Frag Offset Correct answer: A The following are the fields in an IP segment, their length, and their definitions: VERS (Version number - 16 bits) HLEN (Number of 32-bit words in the header - 4 bits) Type of Server (How the datagram should be handled - 32 bits) Total Length (Total length of header and data - 32 bits) Identification (Provide fragmentation of datagrams to allow different MTUs in the internet - 4 bits) Flags (Provide fragmentation of datagrams to allow different MTUs in the internet - 4 bits) Frag Offset (Provide fragmentation of datagrams to allow different MTUs in the internet - 6 bits) TTL (Time-To-Live - 6 bits) Protocol (Upperlayer protocol sending the datagram - 16 bits) Header Checksum )Integrity check on the header - 16 bits) Source IP Address (32 bits) Destination IP Address (32 bits)

28.

29.

30.

IP Options (network testing, debugging, security and others - 4 bits) Data (4 bits). Which fields of an IP packet provide for fragmentation of datagrams to allow differing MTUs in the internet? * Identification * Flags * Frag Offset * Type of Service * Total Length Correct answer: A, B & C The following are the fields in an IP segment, their length, and their definitions: VERS (Version number - 16 bits) HLEN (Number of 32-bit words in the header - 4 bits) Type of Server (How the datagram should be handled - 32 bits) Total Length (Total length of header and data - 32 bits) Identification (Provide fragmentation of datagrams to allow different MTUs in the internet - 4 bits) Flags (Provide fragmentation of datagrams to allow different MTUs in the internet - 4 bits) Frag Offset (Provide fragmentation of datagrams to allow different MTUs in the internet - 6 bits) TTL (Time-To-Live - 6 bits) Protocol (Upperlayer protocol sending the datagram - 16 bits) Header Checksum )Integrity check on the header - 16 bits) Source IP Address (32 bits) Destination IP Address (32 bits) IP Options (network testing, debugging, security and others - 4 bits) Data (4 bits). Which processes does TCP, but not UDP, use? * Windowing * Acknowledgements * Source Port * Destination Port Correct answer: A & B UDP (User Datagram Protocol) does not use sequence or acknowledgement fields in transmission. UDP is a connectionless and unreliable protocol, since there is no delivery checking mechanism in the UDP data format. What is the UDP datagram format? * Source Port - 16 bits, Destination Port - 16 bits, Length - 16 Bits, Checksum - 16 bits, Data * Destination Port - 16 bits, Source Port - 16 bits, Length - 16 Bits, Checksum - 16 bits, Data * Source Port - 16 bits, Destination Port - 16 bits, Checksum - 16 Bits, Length - 16 bits, Data * Source Port - 8 bits, Destination Port - 8 bits, Length -8 Bits, Checksum - 8 bits, Data Correct answer: A The UDP format for a segment is as follows: Source Port 16 bits Destination Port 16 bits Length 16 bits Checksum 16 bits

31.

32.

33.

34.

35.

Data xx bits What is the function of DDR on Cisco routers? * DDR is dialon-demand routing. It provides a continuous LAN only connection. * DDR is dial-on-demand routing. It provides routing for high volume traffic. * DDR is dialon-demand routing. It provides a continuous WAN connection. * DDR is dial-on-demand routing. It provides routing for low volume and periodic traffic. Correct answer: D DDR is dial-on-demand routing. It provides routing for low volume and periodic traffic. It initiates a call to a remote site when there is traffic to transmit. What are the two types of access lists that can be configured on a Cisco router? * Standard * Extended * Filtering * Packet Correct answer: A & B The access lists are standard and extended. Standard access lists for IP check the source address of packets that could be routed. Extended access lists can check the source and destination packet plus check for specific protocols, port numbers, etc. When using access lists, what does a Cisco router check first? * To see if the packet is routable or bridgeable * The destination address * The source address * The packet contents Correct answer: A The first thing checked is to see if the packet is routable or bridgeable. If it is not, the packet will be dropped. How many access lists are allowed per interface? * One per port, per protocol * Two per port, per protocol * Unlimited * Router interface +1 per port. Correct answer: A Only one access list is allowed per interface. An access list must have conditions that test true for all packets that use the access list. What do the following commands accomplish? access-list 1 deny 172.16.4.0 0.0.0.255 access-list 1 permit any interface ethernet 0 IP access-group 1 out * This will block traffic from subnet 172.16.4.0 and allow all other traffic. * This will allow traffic from subnet 172.16.4.0 and block all other traffic. * All traffic is allowed. * All traffic is blocked. Correct answer: A This will block traffic from subnet 172.16.4.0 and allow all other traffic. The first statement access-list 1 deny 172.16.4.0 0.0.0.255

36.

will deny access to the subnet 172.16.4.0. What do the following statements in an extended access list accomplish? access-list 101 deny TCP 172.16.4.0 0.0.0.255 172.16.3.0 0.0.0.255 eq 21 access-list 101 deny TCP 172.16.4.0 0.0.0.255 172.16.3.0 0.0.0.255 eq 20 access-list 101 permit TCP 172.16.4.0 0.0.0.255 0.0.0.0 255.255.255.255 * This will block ftp traffic. * This will block http traffic. * This will permit ftp traffic. * This will permit tftp traffic. Correct answer: A

Sponsored Links

Home > Networking QA Title: Basic Hardware Questions and Answers for Technical Interview

1. What is Booting? Everything that happens between the time the computer is switched on and it is ready to accept commands/input from the user is known as booting 2. Difference between DDR1 AND DDR2? 1. DDR1 is 184 Pin and DDR2 is 240 Pin. 2. DDR2 is much more faster than DDR1 3.What is the window XP repair console command? Following eight commands to repir Window XP by console command. C: CD .. C: ATTRIB -H C:#oot.ini C:ATTRIB -S C:#oot.ini C:ATRIB -R C:#oot.ini C: del boot.ini C: BOOTCFG /Rebuild C: CHKDSK /R /F C: FIXBOOT 4. What is the difference between FAT32,NTFS? FAT-File allocation Table.This system less Security and not suport 10X OS(Operating System).FAT convert to NTFS but NTFS no convert in FAT. NTFS-New Tencologey File System.This file system more security and Increases two options-sharing & quota.NTFS file system not suport 9X OS(As-win-NT,win95,win98).. 5. What is cache memory?

Cache memory is a small high-speed memory. It is used for temporary storage of data & information between the main memory and the CPU (center processing unit). The cache memory is only in RAM. 6. Write minimum 5 types of printer? Types of printer: ink jet, laserjet, dot matrix, LCDLED, Label printer, Plotter 7. Write about single beep, double beep, long beep troubleshooting? Single beep: system working fine. Double beep: RAM problem. Long beep: Processor problem 8. Difference between RISC AND CISC? RISC-Means Reduced Instruction Set Computer.a Risc system has reduced number of instructions and more importantly it is load store architecture were pipelining can be implemented easily. CISC-Means Complex instruction set architecure.A CISC system has complex instructions such as direct addition between data in two memory locations. 9.What is different types of mouse? types of mouse: optical mouse, scroll mouse, USB mouse, wireless mouse 10. What is Zip Drive ? Zip Drive Definition A {disk drive} from {Iomega Corporation} which takes removable 100 {megabyte} {hard disks}. Both internal and external drives are manufactured, making the drive suitable for {backup}, mass storage or for moving files between computers. Software is included to help with file organization. The internal {SCSI} model offers up to 60 MB / minute transfer rate. The company has started to manufacture a larger {Jaz} drive, which takes one {gigbyte} disks.

11. What is jumper? A removable wire or small plug whose presence or absence is used to determine some aspect of hardware configuration 12.What is PCI slot? Why this slot is uses? A connector on {Peripheral Component Interconnect} and the associated physical space occupied by the installed PCI card. Uses: insert different types of a add on card. Eg: Ethernet Card, VGA card, USB card, etc.. 13. The CPU is busy but you want to stop and do some other task. How do you do it? In Windows .. Go to Task Manager Go to the process Click End Task .. Terminate the process and work other task. 14. Why is Bluetooth called a cable replacement technology? Bluetooth technology allows the creation of Personal Area Networks without cables or wires that are usual in home networks.

Home > Networking QA Title: Web Technology Java Script & VB Script Interview Questions and Answers

Java Script Qns & Ans 1.) What Boolean operators are not supported by JavaScript? A) && (AND) B) || (OR) C)! (NOT) D) All the above. E) None of the above. Ans: E) 2.) What is a number in JavaScript, derived by dividing negative number by zero called? A) Negative finite. B) Negative imperfect. C) Negative infinity. D) None of the above. Ans: c) 3.) What does is Nan function do? A) Return true if the argument is not a number. B) Return true if the argument is a number. C) Return true if the argument is divided by zero. D) Return true if the argument is a perfect square. Ans: A) 4.) How to declare the methods in Javascript? Methods are the actions that can be performed on objects. Example: script type=text/javascript>var str=Hello world!

document.write(str.toUpperCase()) In the above example UpperCase() method is used to print the string in Uppercases. 5.) What is variable typing in javascript? It is perfectly legal to assign a number to a variable and then assign a string to the same variable as follows Example: i = 10; i = string; 6.) What is JavaScript? Mention its various types. JavaScript is a platform-independent, event-driven, interpreted client-side scripting .The various types are Number, String, Boolean, Function, Object, Null, Undefined. 7.) How do I print JavaScript output? JavaScript programs cannot directly access printers. However, the user can print out everything on the Web page, including the output of JavaScript programs, by using the File | Print menu of the browser. How can I prevent an html page from being printed by a browser? Include a style sheet reference or a style sheet section with a media type of print. Set a rule for BODY with one entry, display:none. 8.) How to add a combo box dynamically at run time in Java script? for (var i=0;i<5;i++) { document.forms[0].cmb1.options[i]= new Option("Test"+i,i) } 9.) What are the security related issues in JavaScript scripts? Basically the source code of the Javascript will be visible when we select the source,hence the javascript part of the code is fully transparent.Secondly javascripts can be disabled on the browser easily. 10.) What is negative infinity? Its a number in JavaScript, derived by dividing negative number by zero. 11.) How to read and write a file using javascript? I/O operations like reading or writing a file is not possible with client-side javascript. However , this can be done by coding a Java applet that reads files for the script.

VB Script Qns & Ans

1.) What is the use of datepart keyword? Returns the specified part of a given date. 2.) What is the use of step keyword? Using the Step keyword, you can increase or decrease the counter variable by the value you specify. 3.) Which command is used for writing text on a page? Document. Write (text)

4.) What is the scope of a variable ? The scope of a variable defines whether a variable will be accessible in the whole function or will be accessed only to its local instance.I have defined earlier in the tutorials that they can also be deemed as a local variables or can be deemed as a global variables. For ex. < script > Dim name Sub cmdclickme_OnClick Dim age End Sub < / script > It is clear from the above example about the scope of the variable that the variable name will be available to the whole script as it is declared outside sub procedure so enhance his behaviour to the global as compared to the variable name age which is defined inside the sub procedure hence making his behaviour local and will be only accessed in this sub procedure only. 5.) How to Add VB script to web pages ? There are scripting languages like Javascript and Vbscript and they are designed as an extension to html language.The Web browsers like Microsoft Internet Explorer receives the scripts along with the rest of the web page document. It is the browser responsibility to parse and process the scripts. These scripts are widely used as a client side scripting languages. 6.) How to Assign values to a variable ? How to Assign values to a variable ? Ans: Simple you have to declare a variable name and assign any value. For ex. Name = Chandra Status=False

Age=30 Now all the above variables has been assigned values.This is a simple way to declare and assign related values to a variable. 7.) How do you create a recordset object in VBScript? First of all declare a variable to hold the Recordset object, ex- Dim objRsNow, Create this varible as a Recordset object, ex- Set objRs=Server.CreateObject(ADODB.RECORDSET) 8.) What is the use of Option Explicit in VBScript? When you use the Option Explicit statement, you must explicitly declare all variables using the Dim, Private, Public, or ReDim statements. If you attempt to use an undeclared variable name, an error occurs.Use Option Explicit to avoid incorrectly typing the name of an existing variable or to avoid confusion in code where the scope of the variable is not clear
Sponsored Links

Home > Networking QA Title: Interview - Frequently Asked Networking Questions

Q. What is The A Port Number? A Port Number is allocated by the operating system (or can be requested) , in such a way to identify the pocess in a standalone system or a network.default Port Number for FTP is 21. Q.What is DHCP? DHCP is a protocol which is designe for Automatic Give the IP Address to DHCP client.. DHCP Assine the IP Address for few days Lease & capture the clients MAC address.. It is Updated version of BootP Q.What is a default gateway? The exit-point from one network and entry-way into another network, often the router of the network. Q.How do you set a default route on an IOS Cisco router? ip route 0.0.0.0 0.0.0.0 x.x.x.x [where x.x.x.x represents the destination address] Q.What is the difference between a domain local group and a global group? Domain local groups grant permissions to objects within the domain in which the reside. Global groups contain grant permissions tree or forest wide for any objects within the Active Directory Q.What is LDAP used for?

LDAP is a set of protocol used for providing access to information directories. Q.What tool have you used to create and analyze packet captures? Network Monitor in Win2K / Win2K3, Ethereal in Linux, OptiView Series II (by Fluke Networks). Q.What is the significance of the IP address 255.255.255.255? The limited broadcast address is utilized when an IP node must perform a one-to-everyone delivery on the local network but the network ID is unknown. Q.. Name of seven layers in Open System Interconnection model? They are Application, Presentation, Session, Transport, Network, Data link, and Physical

Q.What is ipv6 ? how many octects is it ? ipv6 means Internet Protocol Version 6. It is the latest version. It has 16 octates.It is in Hexadecimal format.

Q.How do you share a printer? This is how I share a printer on a the LAN You can print from every PC on your network to one printer. To share a printer with the other PCs in your home you need to configure the PC to which the printer is connected and then install the shared printeR.

Q.Write minimum 5 types of NETWORK? a.local area network b.wide c.metropolitan d.personal e.wireless local Q. What is DNS? Domain name system/server is used to translate the IP address into the hostname and hostname into the IP address. DNS is mostly used on the internet and the networks.

Q. Why we use cross cable to connect same devices? Same devices like PC-2-PC, it uses(NIC for PC) 1,2 for transmission & 3,6 for reception. If we don't use cross cable then we can't transfer data. While in the case of switch/hub they receive (NIC of SWITCH/HUB)data on 1,2 & transmit on 3,6. Thats why we use straight cable for de-similar host & cross cable for similar hosts.

Q.Define Bluetooth Technology?

Bluetooth is a short range wireless technology that uses radio waves for communication. Many mobile phones, laptops, MP3 players have built in features of the Bluetooth.

Q. Given a Class B Network with subnet mask of 255.255.248.0 and a packet addressed to 130.40.32.16, what is the subnet address? Take the 2 addresses, write them in binary form, then AND them. The answer is 130.40.32.0

Q. What is the full form of UDP? How it works? What is the use of UDP? UDP is connection less protocol UDP dose not provide mechanisms for error detection and error correction between the source and the destination. Because of this, UDP utilized bandwidth more efficiently than TCP.

Q. .What is MAU?
In token Ring , hub is called Multistation Access Unit(MAU).

Q. write about port number FTP, NNTP, SMTP, POP3, DNS, DHCP?
FTP-21 NNTP-443 SMTP25 POP3-110 DNS-53 DHCP-67

Q. What is FTP & UDP?What is the different version of IP?


IP is 32 bit (not byte) and IPv6 is 128 bit in length ...

Q. What is Wifi?
Wi Fi or wireless fidelity is a base band network technology that is used for the wireless data communication

Sponsored Links

Home > Networking QA Title: Hardware Architecture Interview Questions and Answers

1.) What is Virtual Memory?

This Memory is used extending the capability of physical memory. This memory is simulated by the hard drive.When all the RAM is being used the computer will swap data to the hard drive and back to give the impression that there is more memory 2.) What are the five stages in a DLX pipeline? Instruction Fetch Stage Instruction Decode Stage Instruction Execution Stage Memory Stage Write Back 3.) What is MESI? MESI is a Cache Coherency protocol used in multi-processor systems to indicate the state in which the data in the cache of a particular processor is. It stands of Modified, Exclusive, Shared and Invalid 4.) What is cache memory? Cache memory is random access memory (RAM) that a computer microprocessor can access more quickly than it can access regular RAM. As the microprocessor processes data, it looks first in the cache memory and if it finds the data there (from a previous reading of data), it does not have to do the more time-consuming reading of data from larger memory.(cache memory is used between the c.p.u and the ram to access dta fastly) 5.) What is hard disk and what is its purpose? Hard disk is the secondary storage device, which holds the data in bulk, and it holds the data on the magnetic medium of the disk.Hard disks have a hard platter that holds the magnetic medium, the magnetic medium can be easily erased and rewritten, and a typical desktop machine will have a hard disk with a capacity of between 10 and 40 gigabytes. Data is stored onto the disk in the form of files. 6.) Whats the speed and device maximum specs for Firewire? EEE 1394 (Firewire) supports the maximum of 63 connected devices with speeds up to 400 Mbps. 7.) W hats the difference between L1 and L2 cache? Level 1 cache is internal to the chip, L2 is external. L1 Cache is of Higher speed than that of L2 Cache. 8.) What is the difference between primary & secondary storage device? In primary storage device the storage capacity is limited. It has a volatile memory. In secondary storage device the storage capacity is larger. It is a nonvolatile memory. Primary devices are: RAM / ROM. Secondary devices are: Floppy disc / Hard disk. 9). Explain the difference between write through and write back cache? Write Through: After writing in cache memory, main memory is updated

immediatly to mantain reliability. Write Back: After writing in cache memory a flag bit called dirty bit is set. When this value needs to be replaced that bit is check, if it is set then the value is taken to main memory. 10). What is Cache Coherency? Cache coherence refers to the integrity of data stored in local caches of a shared resource. Cache coherence is a special case of memory coherence. When clients in a system, particularly CPUs in a multiprocessing system, maintain caches of a common memory resource, problems arise. Referring to the figure, if the top client has a copy of a memory block from a previous read and the bottom client changes that memory block, the top client could be left with an invalid cache of memory without any notification of the change. Cache coherence is intended to manage such conflicts and maintain consistency between cache and memory. 11). What is Snooping cache? The fundamental idea behind a snooping cache is that the cache constantly monitors the bus. (The verb to snoop is colloquial English meaning to spy or to monitor.) The idea is, whenever the snooping cache detects a write operation on the bus for a particular memory location, it invalidates any cached copy it has of the contents of that location. As a result, so long as a memory location is read-only, it may duplicated between many caches, as different processors read it, but when a processor writes that location, all copies will be destroyed except the one copy in the local cache of the processor that performed the write operation, and, of course, the copy in main memory. 12). What is pipelining? Pipelining is a process By which CPU is enable to fatch an instruction when the execution of another instruction going on.8086 is the 1st microprocessor which use that concept of pipelining.it use 2 diffrent circuit for execution and fatching of an instruction. Its a technique used in advanced microprocessors where the microprocessor begins executing a second instuction before the first has been completed. That is, several instructions are in the pipeline simultaneously, each at a different processing stage.

13). What are the different hazards? How do you avoid them?

There are situations, called hazards, that prevent the next instruction in the instruction stream from executing during its designated clock cycle. Hazards reduce the performance from the ideal speedup gained by pipelining. There are three classes of Hazards: 1. Structural Hazards: It arise from resource conflicts when the hardware cannot support all possible combinations of instructions simultaniously in ovelapped execution.

2. Data Hazards: It arise when an instruction depends on the results of previous instruction in a way that is exposed by the ovelapping of instructions in the pipeline. 3. Control Hazards: It arise from the pipelining of branches and other instructions that change the PC. 14.Explain what is DMA?

Direct memory access (DMA) is a feature of modern computers and microprocessors that allows certain hardware subsystems within the computer to access system memory for reading and/or writing independently of the central processing unit. Many hardware systems use DMA including disk drive controllers, graphics cards, network cards, sound cards and GPUs. DMA is also used for intra-chip data transfer in multi-core processors, especially in multiprocessor system-on-chips, where its processing element is equipped with a local memory (often called scratchpad memory) and DMA is used for transferring data between the local memory and the main memory. Computers that have DMA channels can transfer data to and from devices with much less CPU overhead than computers without a DMA channel. 15).What is the difference between a LATCH and a FLIP-FLOP ? * Latch is a level sensitive device while flip-flop is an edge sensitive device. * Latch is sensitive to glitches on enable pin, whereas flip-flop is immune to glitches. * Latches take less gates (also less power) to implement than flip-flops. * Latches are faster than flip-flops. 16). How do you improve the cache performance?

There are two concurrent paths in a typical cache access--- one through the data array and the other through the tag array. In most cases, the path through the tag array is significantly longer than that through the data array. In this paper, we propose a new scheme that exploits this imbalance in the tag and data paths to improve overall cache performance. Under this scheme, an additional tag directory, the Full-Map Block Directory, is used to provide an alternate tag path to speed up cache access for almost all the memory requests. This scheme is based on the observation that spatial locality exists on a cache line basis, i.e., cache lines near one another tend to be referenced together. Performance evaluation using a TPC-C-like benchmark and selected applications from the SPEC92 benchmark suite demonstrates that this scheme has the potential to improve overall system performance by more than 20%. 17).About hardware and software interrupts? In computing, an interrupt is an asynchronous signal from hardware indicating the need for attention or a synchronous event in software indicating the need for a change in execution. A hardware interrupt causes the processor to save its state of execution via a context switch, and begin

execution of an interrupt handler. Software interrupts are usually implemented as instructions in the instruction set, which cause a context switch to an interrupt handler similar to a hardware interrupt. 18).What is aliasing?

Aliasing is a signal processing term. Aliasing occurs when a system is measured at an insufficient sampling rate. It is perhaps best explained through example. Imagine a disk (or paper plate) with a dot near the edge. If the disk began rotating at one revolution per minute, you could observe the angular velocity by looking at it. Now close your eyes. If you open your eyes every 15 seconds and observe the dot, you can still measure direction of rotation and speed. Every 30 seconds and it becomes difficult to determine the rotation of the plate (this is the NYQUIST FREQUENCY). Look every 75 seconds and the plate appears to be rotating opposite to its true rotation. This is aliasing. The same thing happens when a digital measurement device does not sample a signal often enough. The most common example comes from old westerns. If you watch a movie with a stage coach, the wagon wheels appear to move backwards once a certain speed is reached. The wagon wheel is the same as a paper plate from example one with several dots around the perimeter (wheel spokes) instead of one.

Sponsored Links

Home > Networking QA Title: Networking OS Interview Questions and Answers

Q. Windows explorer is not working , what might be the problem and how you will fix? If The successful login is not letting the administrator to enter into the starting screen , then there will be missing of the browseui.dll,that file should be reinstalled to get the windows explorer working back.

Q.What are the components with which the Cisco Aironet components can associate? Not all Aironet devices can associate with all other types of Aironet devices. For instance, the Client Adapter card cannot form a wireless association with a Workgroup Bridge (WGB). Refer to Cisco Aironet Hardware Association Matrix for a complete description of association capabilities. Q.What are the different platforms of Cisco Aironet APs available?

Cisco Aironet 1500 Series Cisco Aironet 1300 Series Cisco Aironet 1240 AG Series Cisco Aironet 1230 AG Series Cisco Aironet 1200 Series Cisco Aironet 1130 AG Series Cisco Aironet 1100 Series Cisco Aironet 1000 Series Q.WHAT MACS ARE UPGRADEABLE TO THE POWERPC? Apple will provide logic board replacements for all Centris, Quadra and WorkGroup Server models except the Quadra 700,900 and 950. There should also be logic board replacements for the IIvx, IIvi, LC 475, 520, 550, and 575, Performa 475,476, 550, and 600. Upgraded AV Macs will lose their special video capabilities, at least initially. Apple will also make available PowerPC processor upgrade boards that fit into the PDS slots of the Quadra 605, 610, 650, 700, 800, 900, and 950 as well as the Centris 610 and 650 and the Performa 475 and 476. Macs upgraded via a PDS card run at twice the speed of the system clock. Thus a 25 MHz 68040 Mac with a PDS accelerator will become a 50 MHz PowerMac. You'll be able to disable the accelerator if you have old software that's not PowerPC compatible or that just plain runs faster on the older hardware. 68030 desktop Macs with expansion slots will be upgradeable via third party accelerator cards. Daughtercard upgrades for the Powerbook 500 and Duo 280 series will be available sometime late this summer or early fall. Q.CAN I ADD AN FPU TO MY MAC? CAN I REPLACE THE 68LC040 WITH A 68040? All 68020 and 68030 desktop Macs that did not ship with an FPU standard (i.e. the IIsi and LC series) have special slots that can accommodate an FPU card. All Macs that have the FPUless 680LC40 CPU run just fine if that chip is replaced with a full 68040 that includes an FPU. All PowerPC Macs include an integrated FPU. There is no way to add only an FPU to a 68000 Mac like an SE though some third party accelerators do include FPU's as well as faster CPU's. Q.WHAT'S VRAM? Video RAM is where the computer stores the images displayed on your screen. On some earlier Macs with built-in video (Mac 128, IIci) this was kept in main memory. However it's considerably more efficient and faster to store the screen image in its own separate RAM. Generally the more VRAM you have the more colors or shades of gray you can display and the larger the monitors you can use. The chart below shows the number of colors that can be displayed at a given resolution with the specified amount of VRAM. Q.What is Exchange Server 2007? Exchange Server 2007 is the next version of Exchange Server, the industry's leading server for e-mail, calendaring, and unified messaging. The release of Exchange Server 2007 is closely aligned with the Microsoft Office 2007 wave

of products, which together deliver a best-in-class enterprise messaging and collaboration solution. Q.What does it mean to "power cycle" a device? Power cycling an electronic device is a technical way of saying "resetting" it. When you power cycle a device, you turn it off and then turn it back on again. Pretty high-tech, huh? Usually, you should let the device sit for a couple seconds after turning it off to make sure the memory in the device is fully cleared before turning it back on. Any electronic device can be power cycled, but the term is frequently used with cable modems, DSL modems, and routers. This is because small internal errors in these devices can prevent them from functioning correctly. Resetting them typically fixes the errors and allows them to work correctly again. Q.What does it mean when a computer is "low on resources?" The resources a computer has are mainly processing speed, hard disk storage, and memory. The phrase "low on resources" usually means the computer is running out of memory. The best way to prevent this error from coming up is to install more RAM on your machine. Upgrading your RAM is the best performance booster you can give your computer, and it usually doesn't cost a lot. Q.Is UNIX and Linux Both Are same? No,Both are different.But Both are writen in POSIX standards , thats why lots of authors used to refer as same, but strictly saying both are differnt. Q.Tell The Two Boot loader Names in Linux? The Most Popular Boot Loaders are LILO GRUB Q.What is the major advantage of a hash table? The major advantage of a hash table is its speed. Because the hash function is to take a range of key values and transform them into index values in such a way that the key values are distributed randomly across all the indices of a hash table. Q.What is NFS? What is its job? NFS stands for Network File System. NFS enables filesystems physically residing on one computer system to be used by other computers in the network, appearing to users on the remote host as just another local disk. Q.What is the main advantage of creating links to a file instead of copies of the file? The main advantage is not really that it saves disk space (though it does that too) but, rather, that a change of permissions on the file is applied to all the link access points. The link will show permissions of lrwxrwxrwx but that is for

the link itself and not the access to the file to which the link points. Thus if you want to change the permissions for a command, such as su, you only have to do it on the original. With copies you have to find all of the copies and change permission on each of the copies. Q.In Linux OS, what is the file server? The file server is a machine that shares its disk storage and files with other machines on the network Q.Which field is used to define the users default shell? command-The last field, called either command or login command, is used to specify what shell the user will use when he logs in. Q.What is LILO? LILO stands for Linux boot loader. It will load the MBR, master boot record, into the memory, and tell the system which partition and hard drive to boot from..

Vous aimerez peut-être aussi