Networking interview
What is the use of IGMP protocol? What are Ping and Tracert? Explain RSVP. How
does it work? Explain the concept of DHCP. What are the differences between a
domain and a workgroup?...............
|
Basic
networking interview
What is LAN? What's the difference Between an Intranet and the Internet? Define
the term Protocol.
Define File Transfer Protocol. Explain the 7 Layers of OSI...............
|
Application
layer
Describe Application layer. Define DNS. Define Telnet. Define
SMTP....................
|
Data
link layer
What Is a MAC Address? MAC vs. IP Addressing. Define Spanning-Tree Protocol
(STP). What is VPN?................
|
IP
layer
How would you define IP address? Difference between Static and Dynamic IP. What
is the difference between public and private IP? What is Network Address
Translation?............
|
Ethernet
Define broadcast domain. Bridge vs switch. What is a Router? Define gateway.
What is firewall?.................
|
Firewall
What is firewall? What are the types of firewalls?
What is Data encryption? What is the Public Key Encryption?.................
|
Network
technology
What is Ethernet technology? Explain the use of network interface card, NIC.
Explain token ring technology. What is CSMA and CD concept?
|
Protocols
What is NetBIOS protocol? What is IGMP protocol?
Explain PPP protocol. What is TCP / IP protocol?...................
|
Routers
What are the basic components of routers? What is Routing table? What
is Routing Protocols? What is Distance Vector Routing
Protocols?..........
|
Security
What is Data encryption? What is the Public Key Encryption? Define
Digital Signatures. What is firewall?........ |
TCP
layer
Explain Transmission Control Protocol, TCP. Explain User Datagram Protocol,
UDP. What is TCP windowing concept?..........
|
VPN
What is Trusted and Untrusted Networks? What is VPN? What are the different
types of VPN? What are the different authentication methods used in
VPNs?..................
|
Tunneling
What is Tunneling? What are voluntary and compulsory tunnels? Explain static
and dynamic tunnels.............. |
Subneting
Describe the concept of Subneting. Explain the advantages of using Subneting.
What is custom Subneting? Why do we need a subnet mask?................
|
RTP
Explain RTP. What is RTP Multiplexing? Explain the use of RTP and RTCP
protocols. Describe the format of RTP and RTCP packets............
|
Multicasting
What is multicasting?
Define IP multicast.
Describe how the multicast protocol works.
Describe how to control the scope of multicast transmissions..................
|
Secured
Socket Layer
What is SSL? What are the two important TCP Socket classes? What are the
advantages and disadvantages of Java Sockets? What is race condition? How does
the race condition occur?
What is meant by Symmentric Multiprocessing (SMP)?...............
|
Socket
Programming
What is a socket? Datagram vs. stream. What is a stream socket?.............
|
|
Latest networking interview questions and answers
There are 5 types of OSPF packets. Beginning of all OSPF
packets is specified by standard header of 24 bytes. A list of link state
advertisements is used in dealing with all OSPF packet
types............................
Read
answer
EGP: Exterior Gateway Protocol: It is implemented for
different autonomous systems. These are independent administrative entities and
the communication between independent network infrastructures is
done........................
Read
answer
BGP (Border Gateway Protocol): BGP is the core routing
protocol for internet. The set of addresses are maintained by BGP. Network
reachability is designated among autonomous systems by BGP. The routing
decisions are made by BGP are based on path, network policies and rule
sets................
Read
answer
Routing Information Base (RIB): RIB is the heart of Boarder
Gateway Protocol’s system of routing system management. Handling RIB consists
of stored routes database..................
Read answer
The following are the confederations of BGP: - iBGP mesh
reduction...............
Read
answer
BGP Path attribute : The prefix being advertised is described
by BGP Path attribute. To describe a route there are many more attributes.
These let the downstream people for informing decisions about the routing of a
packet.................
Read
answer
Different online threats are prevented by a firewall. To
define, a firewall is a part of a computer system which is designated to block
unauthorized access by permitting authorized communications.................
Read
answer
Packet filtering firewalls are part of a router which work at
the network level of the OSI model or the IP layer of TCP/IP. In this firewall
every packet is compared to a set of criteria prior to forwarding
it....................
Read
answer
Circuit Level gateways works at the session layer of OSI
model. The TCP handshaking between packets for determining whether a session
requested is legitimate or not is monitored by Circuit level
gateways................
Read
answer
Application gateway is one of the firewall systems. A service
is provided by different processes which maintain complete TCP connection state
and sequencing. Re-addressing of traffic for outgoing traffic..................
Read
answer
Stateful inspection is a key technology for routers and
firewalls. All the session information in a single entry without allowing high
time cost of session table timeout processing is stored in the existing session
table.........................
Read
answer
A demilitarized zone is one of the physical or logical
sub-network, which contains and exposes an external services to a larger,
untrusted network of an organization’s external services.................
Read
answer
Bastion Host is a gateway between an inside network and an
outside network. The design of Bastion Host focuses on defending against
attacks which are aimed at the inside network. A Bastion Host will
be.................
Read answer
IP spooling refers to IP packets with forged source IP
address. The purpose is to conceal identification of the
sender....................
Read answer
Trusted network is an open architecture for Network Access
Control. The aim is to enable operators of network for providing endpoint
integrity at each every network connection, which provides
interoperability.........................
Read answer
VPN – Virtual Private Network is cost-effective, secure
remote access to private networks, included in Windows Server 2003. The
administrators can take the advantage of the internet for the support of
providing..................
Read answer
Remote Access VPN: Only single VPN gateway is involved in
Remote Access VPN. The negotiating the secure communication channel party with
the VPN is PC or laptops, which is connected to the internet
and.................
Read answer
The Implementation-based VPN architecture is utilized for
resulting simpler customer routing and simpler service provider provisioning,
and a number of topologies that are hard for implementation in either
the...............
Read answer
Security-based VPN architecture combines the switching of
Layer 2 switching and Layer 3 layer routing and switching...................
Read answer
The service footprint of service provides can increase and
gain advantage with the combination of VPN architectures and their
strengths..............
Read answer
|