0% found this document useful (0 votes)
17 views39 pages

Technology Technology

The document provides an overview of various courses and resources in Technology, Data Science, and Management, including topics such as Big Data, Cybersecurity, and Project Management. It features career guides, interview questions, and insights into the latest trends in these fields. Additionally, it includes detailed explanations of networking concepts, types of networks, and protocols relevant to aspiring network engineers.

Uploaded by

tazebayelign2016
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
17 views39 pages

Technology Technology

The document provides an overview of various courses and resources in Technology, Data Science, and Management, including topics such as Big Data, Cybersecurity, and Project Management. It features career guides, interview questions, and insights into the latest trends in these fields. Additionally, it includes detailed explanations of networking concepts, types of networks, and protocols relevant to aspiring network engineers.

Uploaded by

tazebayelign2016
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 39

Technology Technology

Courses in Technology

Big Data

Cybersecurity

Databases

DevOps and Cloud computing

Full Stack Development

IT Services

Masters and Certificate Programs

Networking and Hardware

Operating System

Programming

QA and Testing

Software Tools

Career Guides

Learn why Cybersecurity is essential

Learn about the 4Vs of Big Data

An Ethical Hacker's guide for getting from beginner to professional

What's New

Top SQL Interview Questions and Answers

Top Online IT Courses Starting in February 2021

Top Tableau Interview Questions and Answers

Top Software Testing Interview Questions and Answers

Data Science Data Science


Courses in Data Science

Data Science Basics

Deep Learning

Machine Learning

Career Guides

Learn more about different versions of Python

How to get started with Data Science?

Learn about the difference between AI and ML

What's New

Top Free AI and Data Science Courses Starting in February 2021 (Updated)

17 Best Data Science Courses for 2021

Top Data Science Interview Questions and Answers for 2021

Top HBase Interview Questions and Answers [Updated]

Management Management

Courses in Management

Business Analytics

Business Tools

CSR

Entrepreneurship

Human Resources

Industry Programs

Logistics and Supply Chain

Marketing

Masters and PG-Management

Operations
Product Management

Strategy and Leadership

Project Management

Sales

Career Guides

What are the latest trends in Recruitment?

What are the traits required to become a successful Entrepreneur?

Your guide to become a Business Analyst

What's New

Leadership vs Management: The Grand Old Debate

Top Online Management Courses Starting in February 2021

Top Data Warehouse Interview Questions and Answers

Top 40 MIS Executive Interview Questions and Answers

MoreMore

Finance

Creativity and Design

Emerging Technologies

Engineering-Non CS

Healthcare

Energy and Environment

Social Sciences

Personal Growth

Courses

Blog Blog

Trending Articles
Top Free AI and Data Science Courses Starting in February 2021 (Updated)

Top Data Science Interview Questions and Answers for 2021

How to Become an AWS Solutions Architect - Beginner's Guide

Top Project Management Interview Questions and Answers

Highest Rated Online Learning Platforms on Naukri Learning (Based on 1000+ verified reviews)

View All

Course Recommendations

Top Online IT Courses Starting in February 2021

Best Online Web Design Courses to Take in 2021

How Can Online MBA Help You Advance Your Career

17 Best Data Science Courses for 2021

Best Online Courses on Top 20 eLearning Platforms [Updated]

View All

What's New

Interview Log - A Day in the Life of a CEO and Managing Director

100+ Networking Interview Questions and Answers [Updated]

Data Analyst Interview Questions and Answers

Leadership vs Management: The Grand Old Debate

Top SQL Interview Questions and Answers

View All

Top of Form

Bottom of Form

Login

Sign Up
Jobs

Naukri Fast Forward

Contact Us

Learning Advice

Skip to content

Make Informed Upskilling Decisions

Top of Form

Bottom of Form

Technology

100+ Networking Interview Questions and Answers [Updated]

Naukri Learning > Articles > Technology > 100+ Networking Interview Questions and Answers [Updated]

by Rashmi Karan

1 Comment
Jan 22 2021

Planning to start a career in networking or looking to switch to another organization as a network


engineer? Our detailed guide on networking interview questions and answers covers the most
frequently asked networking interview questions in hardware and networking interviews:

This article lists 100+ networking interview questions, and is categorized into two main segments –
Networking Interview Questions For Freshers

Networking Interview Questions For Experienced

Networking Interview Questions For Freshers

Q1. What is a network?

Ans. A network consists of two or more separate devices linked together such that they can
communicate. Networking facilitates data communication between computers and peripherals, and it is
done through wired cabling or wireless links. Networks can be classified according to different criteria
such as scope, type of connection, functional relationship, topology, or function, among others.

Explore courses related to Networking –

Popular Networking Certifications Online Courses & Popular Networking Online Courses &
Certifications Certifications

Popular Cisco Certifications Online Courses & Popular Network Security Online Courses &
Certifications Certifications

Q2. What are the different types of networks?

Considering the size or span of a network, we can classify them as follows:

PAN (Personal Area Network) – PAN is made up of devices used by a single person. It has a range of a
few meters.

WPAN (Wireless Personal Area Network) – It is a PAN network that uses wireless technologies as a
medium.

LAN (Local Area Network) – LAN is a network whose range is limited to a relatively small area, such as a
room, a building, an airplane, etc.

WLAN (Wireless Local Area Network) – WLAN is a LAN network that uses wireless means of
communication. It is a widely used configuration due to its scalability and because it does not require
the installation of cables.

CAN (Campus Area Network) – A network of high-speed devices that connects LANs in a limited
geographical area, such as a university campus, a military base, etc.

MAN (Metropolitan Area Network) or metropolitan area network – It is a high-speed (broadband)


network providing coverage in a larger geographic area than a campus, but still limited.
WAN (Wide Area Network) – WAN extends over a large geographical area using unusual means of
communication, such as satellites, interoceanic cables, fiber optics, etc. Use public media.

VLAN – It is a type of logical or virtual LAN, mounted on a physical network, in order to increase security
and performance. In special cases, thanks to the 802.11Q protocol (also called QinQ), it is possible to
mount virtual networks on WAN networks. It is important not to confuse this implementation with VPN
technology.

Read more – What is Networking?

Q3. What are the different types of LAN cables used?

Ans. There are two types of LAN cables used – ‘Cat 5’ and ‘Cat 6.’ Cat 5 can support 100Mbps of speed
while Cat 6 can support 1Gbps of speed.

Q4. What is a ‘cross table’?

Ans. This is a type of connection between the same types of devices without using a hub/switch so that
they can communicate.

Q5. What is a ‘subnet’?

Ans. A ‘subnet’ is a generic term for a section of an extensive network, usually separated by a bridge or a
router. It also works for the network’s broadcast domains, manages traffic flow, and helps increasing
network performance.

Uses of the subnet in networking:

Relieving network congestion

Reallocating IP addresses

Improving network security

Explore the best Networking Courses on Naukri Learning.

Q6. What is DNS?

Ans. The Domain Name System (DNS) is a central part of the internet, providing a way to match names
(a website you’re seeking) to numbers (the address for the website). Anything connected to the internet
– laptops, tablets, mobile phones, and websites – has an Internet Protocol (IP) address made up of
numbers.

Explore – what is network security?

Q7. Differentiate between ‘forward lookup’ and ‘reverse lookup’ in DNS?

Ans. Converting names to IP addresses is called forward lookup.

Resolving IP addresses to names is called reverse lookup.

Q8. What is Network Topology?

Ans. Network topology is the physical or logical arrangement in which the devices or nodes of a network
(e.g. computers, printers, servers, hubs, switches, routers, etc.) are interconnected with each other over
a communication medium. It consists of two parts – the physical topology, which is the actual
arrangement of the cables (the media), and the logical topology, which defines how the hosts access the
media.

Types of network topologies –

Bus – In the bus network topology, each workstation is connected to a main cable called a bus.
Therefore, in effect, each workstation is directly connected to every other workstation on the network.

Bus network topology

Star – In the star network topology, there is a central computer or server to which all workstations are
directly connected. Each workstation is indirectly connected to each other through the central
computer.
Star network topology

Ring – In the ring network topology, the workstations are connected in a closed-loop configuration.
Adjacent workstation pairs are directly connected. Other pairs of workstations are indirectly connected,
passing data through one or more intermediate nodes.

Ring network topology

Mesh – Mesh network topology has two forms – full and partial mesh. In the full mesh topology, each
workstation is directly connected to each other. In the partial mesh topology, some workstations are
connected to all the others, and some are connected only to the other nodes with which they exchange
more data.
Fully Connected Mesh

Partial Mesh Network Topology

Tree – The tree network topology uses two or more star networks connected to each other. The central
computers in star networks are connected to the main bus. Thus, a tree network is a bus network of star
networks.
Tree Network Topology

Signal – Signal or Logical topology refers to the nature of the paths that signals follow from node to
node. In many cases, the logical topology is the same as the physical topology. But it’s not always like
this. For example, some networks are physically arranged in a star configuration, but they function
logically as bus or ring networks.

Also Explore- Top Network Engineer Interview Questions and Answers

Q9. What is a ‘client’ and ‘server’ in a network?


Ans. Clients and servers are separate logical entities that work together over a network to accomplish a
task.

A client application is the element of communication that requests or requests a network service, for
example, accessing a web page, or downloading a file, or sending an email.

A server application is the element of communication that responds to customer requests, providing the
required service, that is, sending the web page or the requested file or email.

The client-server model is used by computer applications such as email, the world wide web, and
network printing.

Q10. What is a ‘frame relay’ and in which layer does it operate?

Ans. Frame Relay is a data link layer digital packet-switched network protocol technology designed to
connect local area networks (LANs) and transfer data over wide area networks (WANs). Frame Relay
shares some of the same underlying technology as X.25.

It is based on the older X.25 packet-switching technology that was designed to transmit analog data as
voice conversations. Unlike X.25, which was designed for analog signals, Frame Relay is a fast packet
technology, which means that the protocol does not attempt to correct errors. It is often used to
connect LANs with main backbones, as well as in public wide area networks and in private network
environments with leased T-1 lines. It requires a dedicated connection during the transmission period
and is not ideal for voice or video, which require a constant stream of transmissions.

Also Read>> Top Network Security Interview Questions

Q11. What are the different features of Frame Relay?

Frame Relay is a connectionless service, which means that every data packet that passes over the
network contains address information

Frame Relay is a service that is provided with a variety of speeds from 56 Kbs to 25 Mbs. Although the
speeds most used for the service are currently 56 Kbs and 1,544 Mbs

The frames are of variable length and go up to 4,096 bytes

Frame Relay is considered a broadband ISDN service

It operates at high speed (1,544 Mbps to 44,376 Mbps).

It operates only on the physical and data link layers. Therefore, it can be easily used on the Internet.

It has a large frame size of 9000 bytes. Therefore, it can accommodate all local area network frame sizes.
Frame Relay can only detect errors (at the data link layer). But there is no flow control or error control.

It operates in the data link layer.

GET CCNP CERTIFIED NOW>>

Q12. How does a Frame Relay Work?

Ans. Frame Relay supports the multiplexing of traffic from multiple connections over a shared physical
link. It uses hardware components that include router frames, bridges, and switches to pack data into
individual frame relay messages. Each connection uses a 10-bit Data Link Connection Identifier (DLCI) for
unique channel addressing. There are two types of connections:

Permanent Virtual Circuits (PVCs) for persistent connections intended to be maintained for long periods
even if data is not actively transferred.

Switched Virtual Circuits (SVCs) for temporary connections that last only one session.

Frame Relay then places the data in a variable-size unit called a frame and leaves any necessary error
correction (data retransmission) until the endpoints, speeding up the overall transmission of data.
Frame Relay

Q13. What is a MAC address?

Ans. A MAC (Media Access Control) address is the unique 48-bit hardware address of a LAN card, usually
stored in the ROM of the network adapter card.

The MAC address is a unique identifier that manufacturers assign to a network card or device. It is also
known as a physical address represented by hexadecimal digits. Each MAC address is unique worldwide
and, in theory, they are fixed for each device.

Each MAC address includes six pairs of numbers. The first three pairs help to identify the manufacturer
and the next three to the specific model. It is important to bear in mind that a computer may have a
variety of hardware to connect to networks; thus, it is common to have a MAC address for Ethernet, one
for Wi-Fi, and another for Bluetooth.

Q14. What is ‘beaconing’?

Ans. Beaconing is the process that allows a network to self-repair network problems.

Q15. Differentiate between ‘attenuation’, ‘distortion’, and ‘noise’.

Ans. When a signal travels through a medium, it loses some of its energy due to the resistance of the
medium. This loss of energy is called attenuation.

When a signal travels through a medium from one point to another, it may change the form or shape of
the signal. This is known as distortion.

Noise is unwanted electrical or electromagnetic energy that degrades the quality of signals and data.

GET CCNA CERTIFIED NOW>>

Q16. What is an IP address?

Ans. An Internet Protocol address (IP address) is a numerical label assigned to each device (e.g.,
computer, printer) participating in a computer network that uses the Internet Protocol for
communication.

Also Read – Is CCNA Training the Right Choice for Networking Professionals?

Q17. Differentiate between a ‘bit rate’ and ‘baud rate’.

Ans. A bit rate is the number of bits transmitted during one second, whereas, baud rate refers to the
number of signal units per second that are required to represent those bits.

Baud rate = bit rate / N, where N is the no. of bits represented by each signal shift.

Q18. What is ‘bandwidth’?


Ans. The limited range of frequency of signals that a line can carry is called the bandwidth. Bandwidth is
often confused with Internet speed when it is actually the volume of information that can be sent over a
connection in a measured amount of time, calculated in megabits per second (Mbps).

Logically the bandwidth of our network will be decisive for the quality and speed of it. The more
bandwidth we have, the better, since the faster we can transfer data.

Q19. What is Project 802?

Ans. It is a project started by IEEE to set standards to enable intercommunication between equipment
from a variety of manufacturers.

Q20. What is ICMP?

Ans. ICMP (Internet Control Message Protocol) is a network layer protocol of the TCP/IP suite used by
hosts and gateways to send notification of datagram problems back to the sender.

Q21. What are the major types of networks?

Ans. Following are the major types of networks:

Server-based network

Peer-to-peer network

Also Read>> Cisco Certifications: CCNA Vs. CCNP

Q22. What are the important topologies for networks?

Ans. There are three essential topologies – Star, Bus, and Ring.

Q23. Differentiate between static IP addressing and dynamic IP addressing.

Ans. In a static IP address, a computer (or another device) is always configured to use the same IP
address, whereas, in a dynamic IP address, the IP address can change periodically and is managed by a
centralized network service.
Q21. What are the different ways to exchange data?

Ans. Following are the different ways to exchange data:

Simplex

Half-duplex

Full-duplex

Learn – what is Networking?

Q24. What are routers?

Ans. Routers connect two or more network segments. These intelligent network devices store
information in their routing tables such as paths, hops, and bottlenecks. They determine the most
accurate data transfer paths and operate in Open Systems Interconnection (OSI) Network Layer.

The roles of a router are –

inter-network communication

Best path selection

Packet forwarding

Packet filtering

Q25. What are the criteria for the best path selection of a router?

Ans. The following parameters define the path selection:

Longest prefix match

Minimum AD (administrative distance)

Lowest metric value

Q26. Explain what is a source route?

Ans. The source route is defined as a sequence of IP addresses that are used to identify the route of a
datagram. You can also involve the source route in the IP datagram header.
Q27. What is the difference between ‘standard’ and ‘extended’ ACL (access control list)?

Ans. Standard ACLs are source-based, whereas extended ACLs are source- and destination-based.

Q28. What is data encapsulation?

Ans. Data encapsulation is the process of breaking down information into smaller, manageable chunks
before their transmission across the network.

Q29. What is RAS?

Ans. RAS (Remote Access Services) refers to any combination of hardware and software to enable
remote access to tools or information that typically reside on a network of IT devices.

Q30. Mention the different network protocols that are supported by Windows RRAS services?

Ans. Following are the three main network protocols supported by Windows RRAS services:

NetBEUI

TCP/IP

IPX

Check out the difference between CCNA and CCNP.

Q31. What are the perquisites to configure a server?

Ans. Perquisites to configure a server are:

LAN card should be connected

Root (partition on which window is installed) should be in NTFS format.

A server should be configured with a static IP address.

Q32. How can you secure a computer network?


Ans. There are several ways to achieve this.

Install a reliable and updated antivirus program across the network

Ensure firewalls are setup and configured properly

Monitor firewall performance

User authentication

Update passwords regularly, every quarter

Create a virtual private network (VPN)

Q33. Mention the uses of the Hamming code?

Ans. Following are some of the common applications of using Hemming code:

Modems

Satellites

PlasmaCAM

Shielding wire

Embedded Processor

Computer Memory

Open connectors

Also check out>> Top CCNA Interview Questions

Q34. What are ‘firewalls’?

Ans. Firewalls serve to protect an internal network from external attacks.

Q35. What are proxy servers and how do they protect computer networks?

Ans. Proxy servers prevent external users from identifying the IP addresses of an internal network. They
make a network virtually invisible to external users, who cannot identify the physical location of a
network without knowledge of the correct IP address.
Q36. What are Nodes and Links?

Ans. Nodes – Devices or data points on a more extensive network are known as nodes. They are
individual parts of a larger data structure and contain data. They also link other nodes.

Links- A link is the physical and logical network component for interconnecting hosts or nodes in a
network. It is a physical communication medium such as coaxial cable or optical fiber.

Q37. What is SLIP?

Ans. SLIP or Serial Line Interface Protocol was developed during the early UNIX days and it is used for
remote access.

SLIP does not provide error detection as it relies on higher-layer protocols for it. Therefore, SLIP alone is
not successful on an error-prone dial-up connection. However, it is still useful to test operating system’s
response capabilities under load (looking at ping flood statistics).

Q38. What is TCP/IP?

Ans. TCP/IP is the short form of the Transmission Control Protocol / Internet Protocol. It is a set of
protocol layers designed to facilitate data exchange on heterogeneous networks.

Q39. How many layers does TCP/IP have?

Ans. TCP/IP has five layers –

Application Layer

Network Layer

Data Link Layer

Physical Layer

Transport Layer

Q40. How many layers are there in the OSI model? Name them
Ans. There are seven layers – physical, data link, network, transport, session, presentation, and
application.

Q41. A gateway works in which layer of the OSI model?

Ans. Transport layer.

Also Suggested – Top Cisco Interview Questions and Answers

Q42. Explain why the standard OSI model is known as 802.xx?

Ans. The OSI model was introduced in February 1980. In 802.XX, ‘80’ is named for the year 1980, and ‘2’
is named as the month of February.

Q43. What common software problems lead to network defects?

Ans. It can be any or a combination of –

Application conflicts

Client-server problems

Configuration error

Protocol mismatch

Security issues

User policy & rights issues

Q44. Why is encryption on a network necessary?

Ans. Encryption is the process of changing data from its original readable format to an unreadable
format, thus ensuring network security. It requires the user to use a secret key or password to decrypt
the data.

Encryption is not only useful for communications, but also in any case where you want to protect
sensitive information. Thus, it is possible to encrypt the information contained in disks, folders or even
individual files, to prevent unauthorized access. Then, in addition to the benefit of protecting the privacy
of users, data encryption prevents other types of attacks such as identity theft, or bank fraud, in addition
to providing a protection mechanism against the theft or loss of devices with sensitive information.
Q45. What are the types of errors?

Ans. There are two categories of errors –

Single-bit error – one-bit error per data unit

Burst error – Two or more bits errors per data unit

Q46. What is a client-server model?

Ans. The client-server model is a distributed communication framework for network processes. This
framework is distributed among service requestors, clients, and service providers.

Q47. What is TELNET?

Ans. TELNET is a client-service protocol on the internet or local area network, allowing a user to log on
to a remote device and have access to it. Technically, it is a bidirectional interactive text-oriented
communication facility, which uses a virtual terminal connection.

Also explore:

Top paid and free online courses by Coursera

Top online edX courses

Popular Udemy courses

Q48. What is RIP?

Ans. It is the abbreviation for Routing Information Protocol. It is a simple protocol that exchanges
information between the routers.

Q49. What is half-duplex?

Ans. It is the mode of communication between two devices. Here the data flows bi-directionally but
simultaneously. A perfect example of a half-duplex is a walkie-talkie.
Q50. What is a full-duplex?

Ans. It is a mode of communication between two devices and the data flow is bi-directional too, but the
flow is simultaneous. Example – telephone.

Q51. What is netstat?

Ans. Netstat is a command-line utility program that provides information about the current
Transmission Control Protocol /Internet Protocol (TCP/IP) settings of a connection.

Q52. What is a peer-peer process?

Ans. The processes on each machine that communicate at a given layer are called the peer-peer process.

Q53. What is anonymous FTP?

Ans. With the help of an anonymous FTP, users can be granted access to files in public servers. Users can
log in as anonymous guests, thus the name.

Q54. What is NAT?

Ans. It stands for Network Address Translation and is a protocol that allows a network device, usually a
firewall, to assign a public address to a computer/s inside a private network.

Q55. Mention a few examples of private network addresses.

Ans. Few examples of private network addresses are:

10.0.0.0 with a subnet cover of 255.0.0.0172.16.0.0 with subnet cover of 255.240.0.0192.168.0.0 with
subnet cover of 255.255.0.0.

Explore the concept of Internet of Things.

Q56. Can you tell me the main elements of a protocol?


Ans. This is among the very commonly asked networking interview questions. Your reply should be –

There are three main elements of a protocol –

Syntax: It refers to the structure or format of the data and their order of presentation.

Semantics: It specifies the meaning of each section of bits.

Timing: Timing refers to two characteristics, which include the timing of data sending and the speed of
data sending.

Q57. What is NIC?

Ans. NIC is the abbreviation for Network Interface Card. It is a peripheral card with electronic circuitry. It
is attached to a PC and connects it to a network. NIC has its own MAC address and this identifies a PC on
the network.

Q58. What is the difference between Communication and Transmission?

Ans. Transmission – A process of sending and receiving data between source and destination, in only
one way. It is regarded as the physical movement of data.

Communication – A process of sending and receiving data between source and destination, in both
ways.

Q59. Explain NAT in networking.

Ans. Network Address Translation (NAT) is a protocol used to convert the IP address of the computer
network into a local network to a single IP address. It takes all your local network devices and provides a
single IP address to share a single connection to the internet. NAT is used router, computer, firewall in a
local network.

Also Read – What Is CCNA And Why Should You Get A Certification?

Q60. Explain NOS.

Ans. Short form for Network Operating System. Specialized software that provides connectivity to a
computer such that it can communicate with other computers and devices on a network.
Q61. What is IDEA?

Ans. IDEA is the abbreviation for International Data Encryption Algorithm. It is the replacement for the
Data Encryption Standard (DES).

Q62. What is ASCII?

Ans. American Standard Code for Information Interchange.

Q63. What is Brouter?

Ans. Brouter is a device that functions as both a bridge and a router. It forwards data within the
networks and also routes data to individual systems in a network.

Q64. Mention the maximum length of the Thinnet cable?

Ans. The maximum length of the Thinnet cable is 185 meters.

Also Read>> Top SAP Security Interview Questions

Q65. Name the cable which uses the RJ11 connector?

Ans. Telephone cables use the RJ11 connector.

Q66. How would you differentiate between Firewall and Antivirus?

Ans. Both are security applications used in networking.

A firewall prevents unauthorized access in private networks as intranets. However, it does not protect
against viruses, spyware, or adware.

An antivirus is software that protects a computer from any malicious software, virus, spyware, or
adware.

Q67. How will you recover data from a Virus-infected system?


Ans. We will install an OS and updated antivirus in a system that is free of any viruses, and then connect
the hard drive of the infected system as a secondary drive. The hard drive will then be scanned and
cleaned. Data can now be copied into the system.

Q68. What is ipconfig?

Ans. An acronym for Internet Protocol Configuration, Ipconfig is used on Microsoft Windows to view and
configure the network interface. It displays all TCP/IP network summary information available on a
network and helps to modify the DHCP protocol and DNS settings.

Q69. What is ifconfig?

Ans. It is an acronym for Interface Configuration and is used on Linux, Mac, and UNIX operating systems.
ifconfig configures and controls the TCP/IP network interface parameters from Command Line Interface
while allowing the user to check the IP addresses of these network interfaces.

Q70. What is the semantic gap?

Ans. A semantic gap is a difference between high-level programming sets in various computer languages
and the simple computing instructions used by microprocessors.

Q71. What is the difference between a Domain and a Workgroup?

Ans. The main difference is where do the computer networks belong to. If it is a home network, then
computers will be a part of a workgroup, and if it’s a workplace network, then the computers will be a
part of a domain.

Q72. What Is NVT?

Ans. NVT stands for Network Virtual Terminal and is a representation of a primary terminal. This virtual
terminal helps you to start a telnet session.

Q73. What Is BGP?

Ans. BGP or Border Gateway Protocol is a protocol used to transfer data and information between
different host gateways or autonomous systems.
Q74. What is Round Trip Time?

Ans. Round Trip Time or RTT is the time taken to send a message from one end of a network to the other
and back.

Q75. What is 127.0.0.1 and localhost?

Ans. Localhost is the standard hostname given to the machine, and it is represented by the IP address
127.0.0.1. Therefore, we can say that 127.0.0.1 and localhost are the same thing.

To read further – Top CCNA Interview Questions and Answers

Q76. Which are the most typical functional units of the client/server applications?

Ans. The most typical functional units of the client/server applications are –

Presentation logic or user interface (e.g., ATMs)

Business logic (e.g., Account balance inquiry)

Data (e.g., Bank account records)

Q77. What are the Triggers?

Ans. Triggers are event-driven specialized procedures and are managed by database management
systems. It is capable of performing complex actions and use procedural languages full throttle.

Q78. What is a Gateway?

Ans. A gateway is a hardware device that is connected to two or more networks. It may be a router,
firewall, server, or any other similar device, and is capable of regulating traffic in the network.

Q79. Is there a difference between a gateway and a router?


Ans. A gateway sends the data between two dissimilar networks, while a router sends the data between
two similar networks.

Networking Interview Questions For Experienced

Q80. Explain 10Base-T.

Ans. 10Base-T specifies data transfer rate, i.e., 10Mbps. Here the usage of the term ‘Base’ defines
‘Baseband’ and not ‘Broadband’. T denotes the type of cable, which is a twisted pair.

Q81. Name the user support layers.

Ans. There are three types of user support layers –

Session Layer

Presentation Layer and

Application Layer

Q82. What is Piggy Backing?

Ans. It is the process of gaining access to a restricted communications channel by using an already
established session by another user. This technique is known to improve the efficiency of the
bidirectional protocols.

Q83. What is the asynchronous transmission?

Ans. It is a serial mode of transmission. It is the process of data transmission, where every character is a
self-contained unit. Each character in asynchronous transmission has its start and stop bits, along with
an uneven interval between them.

Q84. What is the synchronous transmission?

Ans. Synchronous transmission refers to continuous data streaming in the form of signals, accompanied
by regular timing signals. These signals are generated by the external clocking mechanism and ensure
that senders and receivers are in synchrony.
Q85. What are the different types of transmission media?

Ans. Transmission media has two broad types –

Guided media (wired)

Unguided media (wireless)

Q86. What is Process Sigma?

Ans. Process Sigma measures the frequency of a task that is performed without any error. It is expressed
as a number of standard deviations on a normal distribution.

Q87. What is FMEA?

Ans. Failure Mode Effect and Analysis or FMEA is a qualitative and systematic tool to identify potential
failure modes in a system, the reasons, and their effects.

Q88. What is the backbone network?

Ans. It refers to a centralized infrastructure for distributing different routes and data to various
networks. Backbone networks connect LANs and WANs and also handles the management of bandwidth
and multiple channels.

Q89. What is OSPF?

Ans. OSPF is an abbreviation for Open Shortest Path First. It is a routing protocol that uses a link-state
routing (LSR) algorithm to find out the best possible path for data exchange.

Q90. What is the range of addresses in the classes of internet addresses?

Ans. Following are the five different ranges of addresses in the classes of the internet:

Class A: 0.0.0.0 – 127.255.255.255

Class B: 128.0.0.0 – 191.255.255.255


Class C: 192.0.0.0 – 223.255.255.255

Class D: 224.0.0.0 – 239.255.255.255

Class E: 240.0.0.0 – 247.255.255.255

Q91. What are Datalink Protocols?

Ans. Datalink protocols are defined as the sets of requirements used to implement the data link layer.
There are the following categories of Data Link protocols:

Synchronous Protocols

Asynchronous Protocols

Bit Oriented protocols

Character Oriented Protocols

Q92. What are the functions of a Network Layer?

Ans. The Network Layer or OSI Layer 3 provides services for exchanging individual sections of data over
the network between identified end devices. To perform this end-to-end transport Layer 3 uses four
basic processes:

Addressing

Encapsulation

Routing

Decapsulation

Q93. Name the access method used in the 1000BaseTX network.

Ans. CSMA/CD access method is used in the 1000BaseTX network.

Q94. Mention the different types of links used to build a computer network.

Ans. Following are the different types of links used to build a computer network:

Cables
Wireless Links

Last-Mile Links

Leased Lines

Q95. Mention the types of wires used for data transmission in UTP cable.

Ans. There are four types of wires used for data transmission in UTP cable, which is wire 1, 2, 3, and 6.
Where wires 1 and 2 are used to transmit the data while wires 3 and 6 are used to receive the data.

Q96. Can we use RG59 and RG6 cables in a computer network?

Ans. RG59 and RG6 cables are not used in the computer network. These cables are made for the cable
TV network.

Q97. What is 10Base2?

Ans. 10Base2 is defined as part of the IEEE 802.3a standard, specifies data transmission speeds of
10Mbps and a total segment length of 185 meters using RG-58 coaxial cable. The 10Base2 standard
specifies a physical bus topology and uses BNC connectors with 50-ohm terminators at each end of the
cable. One of the physical ends of each segment must be grounded.

Q98. Name the cable used in the 10BaseFL network.

Ans. Fiber optical cable is the cable used in the 10BaseFL network.

Q99. Why is IP protocol deliberated as a connectionless protocol?

Ans. An IP protocol is deliberated as a connectionless protocol because it does not build up a connection
before sending data to the endpoint.

Explore Network Security Online Courses & Certifications on Naukri Learning

Q100. How many network segments can be populated in 10Base2?


Ans. 10Base2 networks allow a maximum of five segments with only three of those segments populated.
Each of the three populated segments can have a maximum of 30 nodes attached.

Q101. What is the point-to-point protocol?

Ans. A communications protocol is used to connect computers to remote networking services, including
Internet service providers.

Q102. What is NIC?

Ans. The NIC stands for the network interface controller. NIC is a device or module that controls and
configures the interface of a processor system to a network or other interconnection. There are many
different types of interfaces in electronic systems. NICs generally configure, maintain the current state,
handle faults, and provide algorithm implementation to successfully transfer data to and from the
interface.

Q103. Mention any five applications that use TCP port.

Ans. Following are the five application that uses TCP port:

FTP

POP

SSH

SMTP

Telnet

Q104. What is the 5-4-3 rule? In which architecture it is used?

Ans. In the 5-4-3 rule, there is a maximum of five segments in a network that are connected with four
repeaters. It is used in 10Base2 and 10Base5 Ethernet architectures. In this rule, only three segments
can be populated with nodes.

Q105. Name the measurement unit used to measure the transmission speed of Ethernet?

Ans. Mbps is the measurement unit used to measure the transmission speed of Ethernet.
Must Read: Top Security Courses For IT Professionals

Q106. Name the switching method used to explore the destination Mac address.

Ans. The switching method that is used to explore the destination Mac address is Cut Through.

Q107. Mention the use of DDR on Cisco routers.

Ans. DDR stands for dial-on-demand routing used to generate and close a circuit-switched session. It
provides on-demand routing to the low volume and periodic traffic.

CCNA Certification Exam Details

Q108. Mention the number of access lists required per interface.

Ans. One access list can be used per interface and per protocol.

Q109. What is the possible way to convert the user data from DTE to the WAN Service Form?

Ans. To convert the user data from DTE to WAN Service Form, we can use the Modem, CSU/DSU, and
TA/NT1.

Q110. Name the types of WAN services obtained by Cisco routers.

Ans. WAN services obtained by Cisco routers are switched services where protocols are used to connect
end to end devices and Interface front end.

Q111. Name the various technologies involved in building WAN links?

Ans. Various technologies involved in building WAN links are:

Digital connections – using digital-grade telephone lines

Analog connections – using conventional telephone lines

Switched connections – using different sets of links between the sender and receiver to move data.

Check out the popular Cisco Certifications.


Q112. Explain the Sliding Window in Agile?

Ans. In the Sliding Window, the sender and receiver are required to deal with the manageable sequence
numbers. This abstract concept defines the range of sequence numbers with the concern of sender and
receiver.

Q113. What standard color sequences are used for a straight-through cable?

Ans. Standard color sequences used for a straight-through cable are Orange/white, orange, green/white,
green, blue/white, blue, brown/white, brown.

Q114. What is a Network Interface Card?

Ans. Network Interface Card is a connecting device used to interlink computers with the network. These
cards are of two types:

Internal network cards

External network cards

Q115. What is SMTP?

Ans. Simple Mail Transfer Protocol (SMTP) is a protocol used to move all internal mail across different
networks. It works with Mail Transfer Agent (MTA) and provides the mail transmission on the TCP/IP
protocol stack.

Q116. Explain the role of the IEEE in computer networking?

Ans. Institute of Electrical and Electronics Engineers (IEEE) is an organization comprised of engineers that
manage standards for electrical and electronic devices. It involves networking devices, cablings, network
interfaces, and connectors.

Check out the top Programming Courses.

Q117. Name the layers of the TCP IP protocol suite that are involved in a link-layer switch.

Ans. In TCP IP protocol, a link-layer switch is involved with the data-link layer and physical layer.
Q118. What is MAU?

Ans. Multistation Access Unit(MAU) is a device used to connect multiple network stations in star
topology in the form of a ring which is also known as a token ring network.

Q119. Mention the maximum number of networks and hosts used in classes A, B, and C networks.

Ans. The maximum number of networks and hosts used in class A, B, and C network are:

In Class A: 126 networks, 16,777,214 hosts.

In Class B: 16,384 networks, 65,534 hosts.

In Class C: 2,097,152 networks, 254 hosts.

I hope these networking interview questions will help you to crack your next hardware and networking
interview.

All the best!

Download PDF

————————————————————————————————————–

If you have recently completed a professional course/certification, click here to submit a review and get
FREE certification highlighter worth Rs. 500.

4.2142857142857

4.21 avg. rating (84% score) - 42 votes

interview questions, Networking and Hardware

Browse Courses by Categories

Masters and Certificate Programs Courses

IT Services Courses

Big Data Courses


Programming Courses

Software Tools Courses

Full Stack Development Courses

Operating System Courses

Networking and Hardware Courses

QA and Testing Courses

DevOps and Cloud computing Courses

Databases Courses

Cybersecurity Courses

Related Posts

Dec 26 2019

Technology

25 Frequently Asked Node.js Interview Questions in 2020

Nov 03 2020

Technology

PHP Interview Questions and Answers

May 07 2018

Technology

What Is PPC and Why Should You Get A Certification?

Popular Courses on Naukri Learning

Postgraduate Certificate Program in Cloud Computing

Jigsaw Academy ⭐ 4.3

Online UGC-recognised MCA


Manipal

MASTER OF COMPUTER APPLICATIONS

Amity Online University ⭐ 4.6

Become a Java Developer

UDACITY ⭐ 3.5

Node.js, Express, MongoDB & More: The Complete Bootcamp 2020

UDEMY

View all top courses

Popular Skills on Naukri Learning

DevOps and Cloud computing

200+ courses from 30+ platforms

Masters and Certificate Programs

20+ courses from 10+ platforms

Programming

330+ courses from 20+ platforms

Full Stack Development

80+ courses from 10+ platforms

Discover trending skills


Popular CoursesArtificial intelligence and Machine Learning CoursesData Science CoursesManagement
CoursesDigital Marketing CoursesProduct Management CoursesBusiness Analytics CoursesPython
CoursesSales Management CoursesHealthcare CoursesAccounting and Finance Courses

Popular PlatformsCoursera CoursesUdemy CoursesSwayam & NPTEL CoursesEdx CoursesIIM


CoursesUdacity CoursesIvy league CoursesIIT CoursesGoogle Courses

Courses & CertificationsFree online coursesTop courses starting soonProgramming for managersTop 10
Free AI CoursesExecutive programsTrending coursesTop Interview Questions & Answers

InformationAbout usContact usSitemapCustomer SupportFeedbackPrivacy PolicyTerms &


ConditionsGrievancesTrust & SafetyLocate BranchRegister HereBlog

Contact UsToll Free - 1800-102-5557(9.00 AM to 8.00PM IST)Email - nl.feedback@naukri.comConnect


with us

Terms & ConditionsWhile Naukri Learning services have helped many customers over the years, we do
not guarantee any interview calls or assure any job offers with any of our services. The services
associated with Naukri Learning are only provided through the website Naukri.com. You are advised to
be cautious of calls/emails asking for payment from other web sites that claim to offer similar services
under the name of Naukri.com. We have no associates/agents other than the partner sites that have
been specifically named on the homepage of the website Naukri.com. We also recommend that you
read the Security Guidelines and Terms and Conditions

Partner
SitesNaukriNaukrigulfShiksha99acresFirstnaukriJeevansathiAmbitionboxPolicybazaarBrijjZomatoMeritna
tionAll rights reserved @ 2020 Info Edge (India) Ltd.

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy