File Name: basic networking interview questions and answers .zip
These computers are linked together.
- Top 100 Networking Interview Questions & Answers
- 300+ TOP NETWORK ENGINEER Interview Questions and Answers pdf
- Computer Networks Interview Questions And Answers Guide
- Top 60 Networking Interview Questions and Answers
Top 100 Networking Interview Questions & Answers
Engineers working on the Internet Protocol needed a way to send IP datagrams over serial connections linking computers together. To solve the problem they created a very simple protocol that would d frame IP datagrams for transmission across the serial line. SLIP performs only one function: framing of data for transmission.
It does nothing else el Read More Answers. Question 2 in External Data Representation is a method of encoding data within an RPC message, used to ensure that the data is not system-dependent? Answer:- e External Data Representation is Encoding of data in upper layer of network. Read More Answers. C Question 3 Tell me, you can ping servers on the subnet your workstation is on, but not other subnets.
What is wrong? Iif it doesn't mach the subnet it will send that request to the gateway so the responsibility goes to gateway to reach the other network may be the gateway is not configure correctly Read More Answers. M Question 4 How to Re-cover The crashed files in outlook? What is the Limitation users of outlook? EXE file. Question 5 Explain the Pros and Cons of layer design?
Answer:- I know only the advantages of Layered design. We can treat each layer as a problem area. Say for example, data link layer, people can concentrate only on the device driver only, they dont need to worry about the network related meaning how the packet can be routed etc.
The only responsiblility of the device driver layer is to grab the packet destined to the local MAC and pass the frame to the network layer. Similary the network layer doesnt need to worry about how the packet is reached to the local machine. Its only responsibility is to check whether the packet belongs to the local machine or to be forwarded.
Also build the routing table to forward the packet. Question 6 Explain what is Ipsec tunneling, how it works? There are several types of resource records used, including name-to-address resolution information. The ERD is used in conjunction with the Windows repair option and you will be prompted for the diskette when needed. Note: The ERD is not to be confused with a standard boot diskette as it cannot be used alone.
The ERD is capable of performing such checks as Verifying the boot sector is not corrupt. Repairing any startup files. Locate any missing or damaged system files. Why it is a layered model? Answer:- in Osi reference model consisting of 7 layers hepls the data to be moved in more optimal from source to the destination.
And here the protocols are better hidden so the furhter enhancement can be done easily. This reference model can be used for both connection oriented and connectionless service. C Answer:- Every line has an upper limit and a lower limit on the frequency of signals it can carry. This limited range is called the bandwidth. It is an alternative to the Routing Information Protocol. Question 13 Do you know what is SAP? Question 14 Explain what is the VLan and how it is work?
VLANs improve security by isolating groups. A VLAN is a bridging domain and all broadcast and multicast traffic is contained within it. Question 15 Explain what is fragmentation of a packet? Question 16 Tell us what is wide-mouth frog?
Answer:- it is used in cryptography, a key distribution center KDC is part of a cryptosystem intended to reduce the risks inherent in exchanging keys. G Read More Answers. It uses the fundamental packet delivery services offered by UDP. It uses the services offered by TCP and so is reliable and secure. It establishes two connections virtual circuits between the hosts, one for data transfer and another for control information. Question 18 What is MTU of a link?
Any messages larger than the MTU are divided into smaller packets before being sent. Every network has a different MTU, which is set by the network administrator.
On Windows 95, you can also set the MTU of your d machine. This defines the maximum size of the packets sent from your computer onto the network. Ideally, you want the MTU to be the same as the smallest MTU of all the networks between your machine and a message's final destination. Otherwise, if your messages are larger than one of the intervening MTUs, they will get broken up fragmented , which slows down transmission speeds.
Trial and error is the only sure way of finding the optimal MTU, but there are some guidelines that el can help. That's all friends Read More Answers. This is a utility for ensuring connectivity between computers. ICMP protocol works behind this utility.
Under it , sending node. C sends packets to destination node and reply is received if there is proper communication between two. Question 20 O What are the possible ways of data exchange? These are Simplex: in this, data is transmitted in one direction only. Half-Duplex: in this, data is permitted to flow in either direction, but not silmultaneously. At a given time, the transmission can take place only in one direction. Full-duplex: A transmission system in which data can be transmitted in both directions simultaneously.
Question 21 Explain how to find real IP address of the client that is connecting with a server, if the client is using Proxy Transparent, Anonymous, and Private Proxy? Question 22 How to configure Proxy Server in Windows? Answer:- To configure proxy server in windows first install the 2 lan cards one for internet connection and another one for sharing internet connection to clients pc.
Question 23 How to share Internet using a proxy server? Question 24 G What is an operational database server and a non operational database server?
Mention its function? Answer:- lo Please share your answers. Answer:- lG It selects one of many analog or digital data sources and outputs that source into a single channel.
An electronic multiplexer functions as multiple input, single output switch. A multiplexer has multiple inputs and a selector that connects a specific input to the single output. C Answer:- Please share your answers.
O Question 28 Explain how to change in domain name? M Answer:- This article describes how to change a computer's Domain Name System DNS server or servers from the command line, either locally or remotely. This operation requires you to use the Regfind.
Microsoft cannot guarantee that you can solve problems that result from using Registry Editor incorrectly. Use Registry Editor at your own risk. The format is dotted decimal notation. Note You do not have to restart the computer for the DNS changes to take effect. Question 29 Consider a system where a program can be separated into two parts: code and data. The CPU knows whether it wants an instruction instruction fetch or data data fetch or store.
Therefore, two base-limit register pairs are provided: one for instructions and one for data. The instruction base limit register pair is automatically set to read only, so programs can be shared among different users. Discuss the advantages and disadvantages of this scheme? Answer:- Please share your answers.
300+ TOP NETWORK ENGINEER Interview Questions and Answers pdf
What is main difference between Communication and Transmission? Explain the concept of Cross Cable and Standard Cable? When we have to connect different devices or same devices we connect with cables and the in such a way that. It is a range of frequency within given band. In lay man term it is capacity of a network to hold.
Computer Networks Interview Questions And Answers Guide
A network is a set of devices connected by physical media links. A network is recursively is a connection of two or more nodes by a physical link or two or more networks connected by one or more nodes. At the lowest level, a network can consist of two or more computers directly connected by some physical medium such as coaxial cable or optical fiber. Such a physical medium is called as Link.
ED Jobs M. Com Jobs B. Sc Jobs B. E Jobs Ph.
A Tell me something about yourself. Tell about your eductaion, place you belong to, some struggle in life which shows that you have positive attitude and will to fight the odds. It refers to the connection between computers and other network devices that are located within a small physical location. What could be the maximum length of the LAN cable?
We have compiled the most frequently asked Networking Interview Questions and Answers that will help you to prepare for the Networking basics interview questions that an interviewer might ask you during your interview. In this list of Networking interview questions, we have covered all commonly asked basic and advanced interview questions on networking with detailed answers to help you clear the job interview.
Top 60 Networking Interview Questions and Answers
Computer Network is a set of computers that are connected to each other for sharing the resources. The major sharing of the resources over the connection is the Internet. Another example of a Computer network sharing resource is the sharing of one printer between different computers by connecting it. The best example of a computer network is the Internet. Now, if you are looking for a job which is related to the Computer Network then you need to prepare for the Computer Network Interview Questions.
Сьюзан. По ее щеке скатилась слеза. - Что с тобой? - в голосе Стратмора слышалась мольба. Лужа крови под телом Хейла расползалась на ковре, напоминая пятно разлитой нефти. Стратмор смущенно посмотрел на труп, затем перевел взгляд на Сьюзан. Неужели она узнала.
Полученный чек превышал его месячное университетское жалованье. Когда он шел к выходу по главному коридору, путь ему преградил охранник с телефонной трубкой в руке. - Мистер Беккер, подождите минутку. - В чем дело? - Беккер не рассчитывал, что все это займет так много времени, и теперь опаздывал на свой обычный субботний теннисный матч. Часовой пожал плечами.
Ступеньки оказались очень скользкими, влажными из-за конденсации пара. Она присела на решетчатой площадке. - Коммандер. Стратмор даже не повернулся. Он по-прежнему смотрел вниз, словно впав в транс и не отдавая себе отчета в происходящем. Сьюзан проследила за его взглядом, прижавшись к поручню.
- Каким же образом вы выполните обещание об эксклюзивном… - Не волнуйтесь, - спокойно ответил американец. - Эксклюзивные права у вас. Это я гарантирую. Как только найдется недостающая копия ключа, Цифровая крепость - ваша. - Но с ключа могут снять копию.
А теперь, если не возражаешь… - Стратмор не договорил, но Чатрукьян понял его без слов. Ему предложили исчезнуть. - Диагностика, черт меня дери! - бормотал Чатрукьян, направляясь в свою лабораторию. - Что же это за цикличная функция, над которой три миллиона процессоров бьются уже шестнадцать часов. Он постоял в нерешительности, раздумывая, не следует ли поставить в известность начальника лаборатории безопасности.
Он задерживается. ГЛАВА 16 - Кольцо? - не веря своим ушам, переспросила Сьюзан. - С руки Танкадо исчезло кольцо. - Да. К счастью, Дэвид это обнаружил.