Networking Tutorial

Networking interview
What is the use of IGMP protocol? What are Ping and Tracert? Explain RSVP. How does it work? Explain the concept of DHCP. What are the differences between a domain and a workgroup?...............

Basic networking interview
What is LAN? What's the difference Between an Intranet and the Internet? Define the term Protocol.
Define File Transfer Protocol. Explain the 7 Layers of OSI...............
Application layer
Describe Application layer. Define DNS. Define Telnet. Define SMTP....................
Data link layer
What Is a MAC Address? MAC vs. IP Addressing. Define Spanning-Tree Protocol (STP). What is VPN?................
IP layer
How would you define IP address? Difference between Static and Dynamic IP. What is the difference between public and private IP? What is Network Address Translation?............
Ethernet
Define broadcast domain. Bridge vs switch. What is a Router? Define gateway. What is firewall?.................

Firewall
What is firewall? What are the types of firewalls?
What is Data encryption? What is the Public Key Encryption?.................

Network technology
What is Ethernet technology? Explain the use of network interface card, NIC. Explain token ring technology. What is CSMA and CD concept?
Protocols
What is NetBIOS protocol? What is IGMP protocol?
Explain PPP protocol. What is TCP / IP protocol?...................
Routers
What are the basic components of routers? What is Routing table? What is Routing Protocols?  What is Distance Vector Routing Protocols?..........
Security
What is Data encryption? What is the Public Key Encryption?  Define Digital Signatures. What is firewall?........
TCP layer
Explain Transmission Control Protocol, TCP. Explain User Datagram Protocol, UDP. What is TCP windowing concept?..........

VPN
What is Trusted and Untrusted Networks? What is VPN? What are the different types of VPN? What are the different authentication methods used in VPNs?..................

Tunneling
What is Tunneling? What are voluntary and compulsory tunnels? Explain static and dynamic tunnels..............
Subneting
Describe the concept of Subneting. Explain the advantages of using Subneting. What is custom Subneting? Why do we need a subnet mask?................
RTP
Explain RTP. What is RTP Multiplexing? Explain the use of RTP and RTCP protocols. Describe the format of RTP and RTCP packets............
Multicasting
What is multicasting?
Define IP multicast.
Describe how the multicast protocol works.
Describe how to control the scope of multicast transmissions..................
Secured Socket Layer
What is SSL? What are the two important TCP Socket classes? What are the advantages and disadvantages of Java Sockets? What is race condition? How does the race condition occur?
What is meant by Symmentric Multiprocessing (SMP)?...............
Socket Programming
What is a socket? Datagram vs. stream. What is a stream socket?.............
Latest networking interview questions and answers
What are the different OSPF Packet Types? Explain them

There are 5 types of OSPF packets. Beginning of all OSPF packets is specified by standard header of 24 bytes. A list of link state advertisements is used in dealing with all OSPF packet types............................
Read answer

What are the different types of Dynamic Protocols? Explain them [Hint EGP and IGP]

EGP: Exterior Gateway Protocol: It is implemented for different autonomous systems. These are independent administrative entities and the communication between independent network infrastructures is done........................
Read answer

What is BGP protocol? What are EBGP and IBGP? (External BGP and Internal BGP)

BGP (Border Gateway Protocol): BGP is the core routing protocol for internet. The set of addresses are maintained by BGP. Network reachability is designated among autonomous systems by BGP. The routing decisions are made by BGP are based on path, network policies and rule sets................
Read answer

What is RIB, Routing Information Base?

Routing Information Base (RIB): RIB is the heart of Boarder Gateway Protocol’s system of routing system management. Handling RIB consists of stored routes database..................
Read answer

What are BGP Confederations?

The following are the confederations of BGP: - iBGP mesh reduction...............
Read answer

What are BGP Path Attributes?

BGP Path attribute : The prefix being advertised is described by BGP Path attribute. To describe a route there are many more attributes. These let the downstream people for informing decisions about the routing of a packet.................
Read answer

What is a Firewall? What is the different type of Firewalls?

Different online threats are prevented by a firewall. To define, a firewall is a part of a computer system which is designated to block unauthorized access by permitting authorized communications.................
Read answer

Explain Packet Filter Firewall. Advantages and disadvantages of Packet Filtering

Packet filtering firewalls are part of a router which work at the network level of the OSI model or the IP layer of TCP/IP. In this firewall every packet is compared to a set of criteria prior to forwarding it....................
Read answer

Explain Circuit Level gateway. Advantages and disadvantages of Circuit Level gateway

Circuit Level gateways works at the session layer of OSI model. The TCP handshaking between packets for determining whether a session requested is legitimate or not is monitored by Circuit level gateways................
Read answer

Explain Application gateway. Advantages and disadvantages of Application gateway

Application gateway is one of the firewall systems. A service is provided by different processes which maintain complete TCP connection state and sequencing. Re-addressing of traffic for outgoing traffic..................
Read answer

Explain Stateful inspection. Advantages and disadvantages of Stateful inspection.

Stateful inspection is a key technology for routers and firewalls. All the session information in a single entry without allowing high time cost of session table timeout processing is stored in the existing session table.........................
Read answer

What is Demilitarized Zone, (DMZ)?

A demilitarized zone is one of the physical or logical sub-network, which contains and exposes an external services to a larger, untrusted network of an organization’s external services.................
Read answer

What is a Bastion Host?

Bastion Host is a gateway between an inside network and an outside network. The design of Bastion Host focuses on defending against attacks which are aimed at the inside network. A Bastion Host will be.................
Read answer

Explain the concept of IP Spooling.

IP spooling refers to IP packets with forged source IP address. The purpose is to conceal identification of the sender....................
Read answer

What are Trusted and Untrusted Network?

Trusted network is an open architecture for Network Access Control. The aim is to enable operators of network for providing endpoint integrity at each every network connection, which provides interoperability.........................
Read answer

What is VPN?

VPN – Virtual Private Network is cost-effective, secure remote access to private networks, included in Windows Server 2003. The administrators can take the advantage of the internet for the support of providing..................
Read answer

Explain the different types of VPN - Remote Access VPNs, Intranet VPNs and Intranet VPNs.

Remote Access VPN: Only single VPN gateway is involved in Remote Access VPN. The negotiating the secure communication channel party with the VPN is PC or laptops, which is connected to the internet and.................
Read answer

Explain Implementation-based VPN architecture.

The Implementation-based VPN architecture is utilized for resulting simpler customer routing and simpler service provider provisioning, and a number of topologies that are hard for implementation in either the...............
Read answer

Explain Security-based VPN architecture.

Security-based VPN architecture combines the switching of Layer 2 switching and Layer 3 layer routing and switching...................
Read answer

Explain Firewall-to-Firewall VPNs.

The service footprint of service provides can increase and gain advantage with the combination of VPN architectures and their strengths..............
Read answer



Write your comment - Share Knowledge and Experience

Discussion Board
symantec netbakcup

pls send me the symantec netbackup queries......(or) pdf's....for beginners and intermediate rs...

murthy 01-29-2015 07:02 AM

need interview questions

kindly pls mail me interview question of networking, php, linux, seo

Arun Mishra 09-26-2014 02:40 AM

 

 
Latest MCQs
» General awareness - Banking » ASP.NET » PL/SQL » Mechanical Engineering
» IAS Prelims GS » Java » Programming Language » Electrical Engineering
» English » C++ » Software Engineering » Electronic Engineering
» Quantitative Aptitude » Oracle » English » Finance
Home | About us | Sitemap | Contact us | We are hiring