HARDWARE NETWORKING INTERVIEW QUESTIONS ANSWERS PDF
The address resolution protocol (ARP) is used to associate the 32 bit IP address with the 48 bit physical address, used by a host or a router to find the physical. Networking Interview Questions updated on Apr 1. of the network? cittadelmonte.info of Users b. Type of transmission medium c. Hardware d. Software. Top Hardware & Networking Interview Questions & Answers - Download as Word Doc .doc), PDF File .pdf), Text File .txt) or read online. Top Hardware.
|Language:||English, Spanish, Portuguese|
|ePub File Size:||25.37 MB|
|PDF File Size:||14.33 MB|
|Distribution:||Free* [*Regsitration Required]|
+ Hardware And Networking Interview Questions and Answers, Question1: What is a node and links? Question2: What are the layers of the OSI reference. Top Networking Interview Questions & Answers. Details: Last It can be computer or device that is part of a network. Two or more .. Incorrectly hardware configuration is also one of those culprits to look into. 89) What. You have to be well-prepared to crack a networking job interview. Here are some of the probable Hardware and Networking Interview.
Define Network? A network is a set of devices connected by physical media links. A network is recursively is a connection of two or more nodes by a physical link or two or more networks connected by one or more nodes. What is Protocol? A protocol is a set of rules that govern all aspects of information communication. What is a Link? At the lowest level, a network can consist of two or more computers directly connected by some physical medium such as coaxial cable or optical fiber.
Application Layer. Question 3. Describe Domain Name System. Question 4. Find the difference between domain and workgroup: Question 5. The tree can have only levels: A full domain name is a sequence of labels separated by dots. A PQDN starts from a node, but it does not end with the root. Question 6. This loss of energy is called the Attenuation. To overcome this problem, amplifiers are used to amplify the signal.
Unit of the decibel is used to find out if a signal has lost or gained strength. Where PI and P2 are the variable and the powers of a signal at points 1 and 2, respectively. This noise may corrupt the signal. Induced noise comes from sources such as motors and other electronic appliances. Crosstalk is the effect of one wire on the other. Impulse noise comes from power lines, lightning etc. Question 8. Hub is a layer 1 device. It is unable to detect the collision.
Switch is layer 2 device. CAM table is used to make the forwarding decision. Layer is a completely logical partition of PDU protocol data unit process.
Question Explain Hidden Shares. How Do They Work? Administrative shares are usually created automatically for the root of each drive letter. They do not display in the network browse list. The address resolution protocol ARP is used to associate the 32 bit IP address with the 48 bit physical address, used by a host or a router to find the physical address of another host on its network by sending a ARP uery packet that includes the IP address of the receiver.
The reverse address resolution protocol RARP allows a host to discover its Internet address when it knows only its physical address. Clients and Servers are separate logical entities that work together over a network to accomplish a task. What Is Mac Address? It is the 48 bit hardware address of LAN card.
How We Will Configure Ads? Ping What Is Map Drive? A special feature that will map network resource to my computer. What Is Proxy Server? Most large businesses, organizations, and universities these days use a proxy server. This is a server that all computers on the local network have to go through before accessing information on the Internet. By using a proxy server, an organization can improve the network performance and filter what users connected to the network can access.
In windows98 it is command. It Linux has its own file system known as ext2, and ext3. What Is Size Of Swap? What Is Attenuation? The degeneration of a signal over distance on a network cable is called attenuation. What Is Cladding? A layer of a glass surrounding the center fiber of glass inside a fiber-optic cable.
What Is Netbios And Netbeui? A transport protocol designed by Microsoft and IBM for the use on small subnets. What Is Beaconing? The process that allows a network to self-repair networks problems. The stations on the network notify the other stations on the ring when they are not receiving the transmissions. Telnet is also called as terminal emulation.
It belongs to application layer. Frame relay is a packet switching technology. It will operate in the data link layer. The standard protocol has been defined between the terminal and the PAD, called X. Together, these three recommendations are often called "triple X".
Series of interface points that allow other computers to communicate with the other layers of network protocol stack. A generic term for section of a large networks usually separated by a bridge or router. What Is Subnet Mask? It is a term that makes distinguish between network address and host address in IP address.
Subnet mask value 0 defines host partition in IP address and value 1 — defines Network address. Describe Various Network Type? Local Area Networks Local area networks LANs are used to connect networking devices that are in a very close geographic area, such as a floor of a building, a building itself, or a campus environment. Companies deploy basically two types of CNs: Distributing Internet traffic loads across multiple servers Storage Area Networks Storage area networks SANs provide a high-speed infrastructure to move data between storage devices and file servers.
Disadvantage of SANs is their cost. Intranet An intranet is basically a network that is local to a company. In other words, users from within this company can find all of their resources without having to go outside of the company.
Extranet An extranet is an extended intranet, where certain internal services are made available to known external users or external business partners at remote locations. Internet An internet is used when unknown external users need to access internal resources in your network. In other words, your company might have a web site that sells various products, and you want any external user to be able to access this service. A VPN is used to provide a secure connection across a public network, such as an internet.
Extranets typically use a VPN to provide a secure connection between a company and its known external users or offices. Authentication is provided to validate the identities of the two peers. Confidentiality provides encryption of the data to keep it private from prying eyes.
Integrity is used to ensure that the data sent between the two devices or sites has not been tampered with.
It is an alternative to the Routing Information Protocol. The three types of routing tables are fixed, dynamic, and fixed central. What Is Packet Filter? Packet filter is a standard router equipped with some extra functionality.
The extra functionality allows every incoming or outgoing packet to be inspected. Packets meeting some criterion are forwarded normally. Those that fail the test are dropped. The same message might contain the name of the machine that has the boot files on it. If the boot image location is not specified, the workstation sends another UDP message to query the server.
Top 60 Networking Interview Questions and Answers
DNS resource record is an entry in a name server's database. There are several types of resource records used, including name-to-address resolution information. It is a better choice than TCP because of the improved speed a connectionless protocol offers. Of course, transmission reliability suffers with UDP. Interior gateways connect LANs of one organization, whereas exterior gateways connect the organization to the outside world.
SNMP is widely used in network management for configuring network devices like switches, hubs, routers, printers, servers. The below diagram shows how these components are connected with each other in the SNMP architecture: Q 25 What are the different types of a network? Explain each briefly. Below is Part 2 of these Networking questions series.
Q 26 Differentiate Communication and Transmission? Ans Through Transmission the data gets transferred from source to destination Only one way. It is treated as the physical movement of data.
Communication means the process of sending and receiving data between two media data is transferred between source and destination in both ways.
Ans OSI model stands for Open System Interconnection It is a framework which guides the applications how they can communicate in a network.
Q 28 Explain various types of networks based on their sizes? Ans Size of the Network is defined as the geographic area and the number of computers covered in it. Based on the size of the network they are classified as below,. Q 29 Define various types of internet connections?
Ans There are three types of internet connections. They are listed below. In this type, if we log off from the internet for any reason then there is no need to log in again. Modems of cables, Fibres, wireless connection, satellite connection etc. It uses radio waves to connect to the devices or gadgets. It is nothing but the high-speed and advanced type of broadband connection. Q 30 Few important terminology we come across networking concepts? Ans Below are few important terms we need to know in networking.
Q 31 Explain the characteristics of networking? Ans The main characteristics of networking are mentioned below,. Q 32 How many types of modes are used in data transferring through networks? Ans Data transferring modes in computer networks are of three types. They are listed below,.
Data transferring which takes place only in one direction is called Simplex. In Simplex mode, the data gets transferred either from sender to receiver or from receiver to sender. Radio signal, the print signal given from computer to printer etc. Data transferring can happen in both directions but not at the same time. Alternatively, the data is sent and received. Browsing through the internet, a user sends the request to the server and later the server processes the request and sends back the web page.
Data transferring happens in both directions that too simultaneously. Two lane road where traffic flows in both the directions, communication through telephone etc. Q 33 Name the different types of network topologies and brief its advantages? Ans Network Topology is nothing but the physical or logical way in which the devices like nodes, links, and computers of a network are arranged.
Physical Topology means the actual place where the elements of a network are located. Logical Topology deals with the flow of data over the networks.
A Link is used to connect more than two devices of a network. And more than two links located nearby forms a topology. The network topologies are classified as mentioned below. As the devices are connected to a single cable, it is also termed as Linear Bus Topology. The advantage of bus topology is that it can be installed easily. And the disadvantage is that if the backbone cable breaks then the whole network will be down. In Star Topology, there is a central controller or hub to which every node or device is connected through a cable.
In this topology, the devices are not linked to each other. If a device needs to communicate with the other, then it has to send the signal or data to the central hub. And then the hub sends the same data to the destination device. The advantage of the star topology is that if a link breaks then only that particular link is affected. The whole network remains undisturbed. The main disadvantage of the star topology is that all the devices of the network are dependent on a single point hub.
If the central hub gets failed, then the whole network gets down. Data or Signal in ring topology flow only in a single direction from one device to another and reaches the destination node. The advantage of ring topology is that it can be installed easily. Adding or deleting devices to the network is also easy. The main disadvantage of ring topology is the data flows only in one direction.
And a break at a node in the network can affect the whole network. In a Mesh Topology, each device of the network is connected to all other devices of the network. Mesh Topology uses Routing and Flooding techniques for data transmission.
The advantage of mesh topology is if one link breaks then it does not affect the whole network. And the disadvantage is, huge cabling is required and it is expensive.
Ans In data transmission if the sender sends any data frame to the receiver then the receiver should send the acknowledgment to the sender. The receiver will temporarily delay waits for the network layer to send the next data packet the acknowledgment and hooks it to the next outgoing data frame, this process is called as Piggybacking. Q 36 In how many ways the data is represented and what are they? Q 38 How a Switch is different from a Hub?
Ans The time taken for a signal to reach the destination and travel back to the sender with the acknowledgment is termed as Round Trip time RTT. Ans Brouter or Bridge Router is a device which acts as both bridge and a router. As a bridge, it forwards data between the networks. And as a router, it routes the data to specified systems within a network. It is assigned by the Internet Service Provider as a permanent address. Dynamic IP is the temporary IP address assigned by the network to a computing device.
Dynamic IP is automatically assigned by the server to the network device. Q 42 How VPN is used in the corporate world? Corporate companies, educational institutions, government offices etc use this VPN. Q 43 What is the difference between Firewall and Antivirus? Ans Firewall and Antivirus are two different security applications used in networking.
Top Networking Interview Questions & Answers
A firewall acts as a gatekeeper which prevents unauthorized users to access the private networks as intranets. A firewall examines each message and blocks the same which are unsecured. Antivirus is a software program that protects a computer from any malicious software, any virus, spyware, adware etc. A Firewall cannot protect the system from virus, spyware, adware etc. Ans If a network self-repair its problem then it is termed as Beaconing. If a device in the network is facing any problem, then it notifies the other devices that they are not receiving any signal.
Likewise, the problem gets repaired within the network. Q 45 Why the standard of an OSI model is termed as Ans OSI model was started in the month of February in So it is standardized as When a new device is added to the network, it broadcasts a message stating that it is new to the network. Then the message is transmitted to all the devices of the network. Q 47 How can a network be certified as an effective network? What are the factors affecting them? Ans A network can be certified as an effective network based on below-mentioned points,.
DNS acts as a translator between domain names and IP address. As humans remember names, the computer understands only numbers. Generally, we assign names to websites and computers like gmail. When we type such names the DNS translates it into numbers and execute our requests.
This is used to design or develop standards that are used for networking. Q 50 What is the use of encryption and decryption? Ans Encryption is the process of converting the transmission data into another form that is not read by any other device other than the intended receiver. Decryption is the process of converting back the encrypted data to its normal form. An algorithm called cipher is used in this conversion process. For example, if we connect a computer and laptop to a printer, then we can call it as an Ethernet network.
Ethernet acts as the carrier for internet within short distance networks like a network in a building. The main difference between Internet and Ethernet is security. Ethernet is safer than the internet as Ethernet is a closed loop and has only limited access. Ans Encapsulation means adding one thing on top of the other thing.
When a message or a packet is passed through the communication network OSI layers , every layer adds its header information to the actual packet. This process is termed as Data Encapsulation. Decapsulation is exactly the opposite of encapsulation. The process of removing the headers added by the OSI layers from the actual packet is termed as Decapsulation.
Q 53 How are networks classified based on their connections? Ans Networks are classified into two categories based on their connection types.
Hardware and Networking Interview Questions & Answers
They are mentioned below,. Ans In Networking when a task is in progress another task gets started before the previous task is finished. This is termed as Pipelining. Ans Encoder is a circuit that uses an algorithm to convert any data or compress audio data or video data for transmission purpose.
An encoder converts the analog signal into the digital signal. Ans Decoder is a circuit which converts the encoded data to its actual format. It converts the digital signal into analog signal.
Q 57 How can you recover the data from a system which is infected with Virus? Ans In another system not infected with a virus install an OS and antivirus with the latest updates. Then connect the HDD of the infected system as a secondary drive. Now scan the secondary HDD and clean it. Then copy the data into the system.
Top 100 Networking Interview Questions & Answers
Q 58 Describe the key elements of protocols? Ans Below three elements are the key elements of protocols. Q 59 Explain the difference between baseband and broadband transmission?
Ans Baseband Transmission: A single signal consumes the whole bandwidth of the cable.
- CODING INTERVIEW QUESTIONS 1ST EDITION NARASIMHA KARUMANCHI PDF
- 50 SHADES OF GREY PDF YAHOO ANSWERS
- HARDWARE INTERVIEW QUESTIONS AND ANSWERS PDF
- FDA EXAM QUESTION PAPERS PDF
- CRYPTOGRAPHY NETWORK SECURITY BEHROUZ FOROUZAN EBOOK
- COMPUTER NETWORKS FOROUZAN 2ND EDITION PDF
- PREVIOUS YEAR QUESTION PAPER OF IBPS CLERK EXAM PDF
- AIPMT PREVIOUS YEAR QUESTION PAPERS WITH SOLUTIONS PDF