Q26. Explain what is a source route?
Ans. The source route is defined as a sequence of IP addresses that are used to identify the route of a datagram. You can also involve the source route in the IP datagram header.
Q27. What is the difference between ‘standard’ and ‘extended’ ACL (access control list)?
Ans. Standard ACLs are source-based, whereas extended ACLs are source- and destination-based.
Q28. What is data encapsulation?
Ans. Data encapsulation is the process of breaking down information into smaller, manageable chunks before their transmission across the network.
Q29. What is RAS?
Ans. RAS (Remote Access Services) refers to any combination of hardware and software to enable remote access to tools or information that typically reside on a network of IT devices.
Q30. Mention the different network protocols that are supported by Windows RRAS services?
Ans. Following are the three main network protocols supported by Windows RRAS services:
NetBEUI
TCP/IP
IPX
Check out the difference between CCNA and CCNP.
Q31. What are the perquisites to configure a server?
Ans. Perquisites to configure a server are:
LAN card should be connected
Root (partition on which window is installed) should be in NTFS format.
A server should be configured with a static IP address.
Q32. How can you secure a computer network?
Ans. There are several ways to achieve this.
Install a reliable and updated antivirus program across the network
Ensure firewalls are setup and configured properly
Monitor firewall performance
User authentication
Update passwords regularly, every quarter
Create a virtual private network (VPN)
Q33. Mention the uses of the Hamming code?
Ans. Following are some of the common applications of using Hemming code:
Modems
Satellites
PlasmaCAM
Shielding wire
Embedded Processor
Computer Memory
Open connectors

Also check out>> Top CCNA Interview Questions
Q34. What are ‘firewalls’?
Ans. Firewalls serve to protect an internal network from external attacks.
Q35. What are proxy servers and how do they protect computer networks?
Ans.
Proxy servers prevent external users from identifying the IP addresses
of an internal network. They make a network virtually invisible to
external users, who cannot identify the physical location of a network
without knowledge of the correct IP address.
Q36. What are Nodes and Links?
Ans.
Nodes – Devices or data points on a more extensive network are known as
nodes. They are individual parts of a larger data structure and contain
data. They also link other nodes.
Links- A link is the physical
and logical network component for interconnecting hosts or nodes in a
network. It is a physical communication medium such as coaxial cable or
optical fiber.
Q37. What is SLIP?
Ans. SLIP or Serial Line Interface Protocol was developed during the early UNIX days and it is used for remote access.
SLIP
does not provide error detection as it relies on higher-layer protocols
for it. Therefore, SLIP alone is not successful on an error-prone
dial-up connection. However, it is still useful to test operating
system’s response capabilities under load (looking at ping flood
statistics).
Q38. What is TCP/IP?
Ans. TCP/IP is the
short form of the Transmission Control Protocol / Internet Protocol. It
is a set of protocol layers designed to facilitate data exchange on
heterogeneous networks.
Q39. How many layers does TCP/IP have?
Ans. TCP/IP has five layers –
Application Layer
Network Layer
Data Link Layer
Physical Layer
Transport Layer
Q40. How many layers are there in the OSI model? Name them
Ans. There are seven layers – physical, data link, network, transport, session, presentation, and application.
Q41. A gateway works in which layer of the OSI model?
Ans. Transport layer.
Also Suggested – Top Cisco Interview Questions and Answers
Q42. Explain why the standard OSI model is known as 802.xx?
Ans.
The OSI model was introduced in February 1980. In 802.XX, ‘80’ is named
for the year 1980, and ‘2’ is named as the month of February.
Q43. What common software problems lead to network defects?
Ans. It can be any or a combination of –
Application conflicts
Client-server problems
Configuration error
Protocol mismatch
Security issues
User policy & rights issues
Q44. Why is encryption on a network necessary?
Ans.
Encryption is the process of changing data from its original readable
format to an unreadable format, thus ensuring network security. It
requires the user to use a secret key or password to decrypt the data.
Encryption
is not only useful for communications, but also in any case where you
want to protect sensitive information. Thus, it is possible to encrypt
the information contained in disks, folders or even individual files, to
prevent unauthorized access. Then, in addition to the benefit of
protecting the privacy of users, data encryption prevents other types of
attacks such as identity theft, or bank fraud, in addition to providing
a protection mechanism against the theft or loss of devices with
sensitive information.
Q45. What are the types of errors?
Ans. There are two categories of errors –
Single-bit error – one-bit error per data unit
Burst error – Two or more bits errors per data unit
Q46. What is a client-server model?
Ans.
The client-server model is a distributed communication framework for
network processes. This framework is distributed among service
requestors, clients, and service providers.
Q47. What is TELNET?
Ans.
TELNET is a client-service protocol on the internet or local area
network, allowing a user to log on to a remote device and have access to
it. Technically, it is a bidirectional interactive text-oriented
communication facility, which uses a virtual terminal connection.
Also explore:
Top paid and free online courses by Coursera
Top online edX courses
Popular Udemy courses
Q48. What is RIP?
Ans.
It is the abbreviation for Routing Information Protocol. It is a simple
protocol that exchanges information between the routers.
Q49. What is half-duplex?
Ans.
It is the mode of communication between two devices. Here the data
flows bi-directionally but simultaneously. A perfect example of a
half-duplex is a walkie-talkie.
Q50. What is a full-duplex?
Ans.
It is a mode of communication between two devices and the data flow is
bi-directional too, but the flow is simultaneous. Example – telephone.
Q51. What is netstat?
Ans.
Netstat is a command-line utility program that provides information
about the current Transmission Control Protocol /Internet Protocol
(TCP/IP) settings of a connection.
Q52. What is a peer-peer process?
Ans. The processes on each machine that communicate at a given layer are called the peer-peer process.
Q53. What is anonymous FTP?
Ans.
With the help of an anonymous FTP, users can be granted access to files
in public servers. Users can log in as anonymous guests, thus the name.
Q54. What is NAT?
Ans.
It stands for Network Address Translation and is a protocol that allows
a network device, usually a firewall, to assign a public address to a
computer/s inside a private network.
Q55. Mention a few examples of private network addresses.
Ans. Few examples of private network addresses are:
10.0.0.0
with a subnet cover of 255.0.0.0172.16.0.0 with subnet cover of
255.240.0.0192.168.0.0 with subnet cover of 255.255.0.0.
Explore the concept of Internet of Things.
Q56. Can you tell me the main elements of a protocol?
Ans. This is among the very commonly asked networking interview questions. Your reply should be –
There are three main elements of a protocol –
Syntax: It refers to the structure or format of the data and their order of presentation.
Semantics: It specifies the meaning of each section of bits.
Timing: Timing refers to two characteristics, which include the timing of data sending and the speed of data sending.
Q57. What is NIC?
Ans.
NIC is the abbreviation for Network Interface Card. It is a peripheral
card with electronic circuitry. It is attached to a PC and connects it
to a network. NIC has its own MAC address and this identifies a PC on
the network.
Comments
Post a Comment