नवीन पोस्ट..

Complete Blender Course for Beginners – Creating a Knife Set.

Image
  Complete Blender Course for Beginners – Creating a Knife Set Complete Blender Course for Beginners – Creating a Knife Set What You will Learn :- Use Blender 3.2 and in general understand it's interface 3D Modeling UV Unwrapping Create materials with free PBR textures Lighting using Easy-HDRI You learn retopoligy for small parts of the models GET ON UDEMY JOIN OUR TELEGRAM CHANNEL 

CCNA Routing basic interview Question and answers Part 2

CCNA Routing Basic Interview Question & Answers Part  2 



Q26. Explain what is a source route?

Ans. The source route is defined as a sequence of IP addresses that are used to identify the route of a datagram. You can also involve the source route in the IP datagram header.

 
Q27. What is the difference between ‘standard’ and ‘extended’ ACL (access control list)?

Ans. Standard ACLs are source-based, whereas extended ACLs are source- and destination-based.


 
Q28. What is data encapsulation?

Ans. Data encapsulation is the process of breaking down information into smaller, manageable chunks before their transmission across the network.

 
Q29. What is RAS?

Ans. RAS (Remote Access Services) refers to any combination of hardware and software to enable remote access to tools or information that typically reside on a network of IT devices.

 
Q30. Mention the different network protocols that are supported by Windows RRAS services?

Ans. Following are the three main network protocols supported by Windows RRAS services:

    NetBEUI
    TCP/IP
    IPX

Check out the difference between CCNA and CCNP.

 
Q31. What are the perquisites to configure a server?

Ans. Perquisites to configure a server are:

    LAN card should be connected
    Root (partition on which window is installed) should be in NTFS format.
    A server should be configured with a static IP address.

 
Q32. How can you secure a computer network?

Ans. There are several ways to achieve this.

    Install a reliable and updated antivirus program across the network
    Ensure firewalls are setup and configured properly
    Monitor firewall performance
    User authentication
    Update passwords regularly, every quarter
    Create a virtual private network (VPN)

 
Q33. Mention the uses of the Hamming code?

Ans. Following are some of the common applications of using Hemming code:

    Modems
    Satellites
    PlasmaCAM
    Shielding wire
    Embedded Processor
    Computer Memory
    Open connectors

Also check out>> Top CCNA Interview Questions

 
Q34. What are ‘firewalls’?

Ans. Firewalls serve to protect an internal network from external attacks.

 
Q35. What are proxy servers and how do they protect computer networks?

Ans. Proxy servers prevent external users from identifying the IP addresses of an internal network. They make a network virtually invisible to external users, who cannot identify the physical location of a network without knowledge of the correct IP address.

 
Q36. What are Nodes and Links?

Ans. Nodes – Devices or data points on a more extensive network are known as nodes. They are individual parts of a larger data structure and contain data. They also link other nodes.

Links- A link is the physical and logical network component for interconnecting hosts or nodes in a network. It is a physical communication medium such as coaxial cable or optical fiber.

 
Q37. What is SLIP?

Ans. SLIP or Serial Line Interface Protocol was developed during the early UNIX days and it is used for remote access.

SLIP does not provide error detection as it relies on higher-layer protocols for it. Therefore, SLIP alone is not successful on an error-prone dial-up connection. However, it is still useful to test operating system’s response capabilities under load (looking at ping flood statistics).

 
Q38. What is TCP/IP?

Ans. TCP/IP is the short form of the Transmission Control Protocol / Internet Protocol. It is a set of protocol layers designed to facilitate data exchange on heterogeneous networks.

 
Q39. How many layers does TCP/IP have?

Ans. TCP/IP has five layers –

    Application Layer
    Network Layer
    Data Link Layer
    Physical Layer
    Transport Layer

 
Q40. How many layers are there in the OSI model? Name them

Ans. There are seven layers – physical, data link, network, transport, session, presentation, and application.

 
Q41. A gateway works in which layer of the OSI model?

Ans. Transport layer.

Also Suggested – Top Cisco Interview Questions and Answers

 
Q42. Explain why the standard OSI model is known as 802.xx?

Ans. The OSI model was introduced in February 1980. In 802.XX, ‘80’ is named for the year 1980, and ‘2’ is named as the month of February.

Happy Learning.......

 
Q43. What common software problems lead to network defects?

Ans. It can be any or a combination of –

    Application conflicts
    Client-server problems
    Configuration error
    Protocol mismatch
    Security issues
    User policy & rights issues

 
Q44. Why is encryption on a network necessary?

Ans. Encryption is the process of changing data from its original readable format to an unreadable format, thus ensuring network security. It requires the user to use a secret key or password to decrypt the data.

Encryption is not only useful for communications, but also in any case where you want to protect sensitive information. Thus, it is possible to encrypt the information contained in disks, folders or even individual files, to prevent unauthorized access. Then, in addition to the benefit of protecting the privacy of users, data encryption prevents other types of attacks such as identity theft, or bank fraud, in addition to providing a protection mechanism against the theft or loss of devices with sensitive information.

 
Q45. What are the types of errors?

Ans. There are two categories of errors –

    Single-bit error – one-bit error per data unit
    Burst error – Two or more bits errors per data unit

 
Q46. What is a client-server model?

Ans. The client-server model is a distributed communication framework for network processes. This framework is distributed among service requestors, clients, and service providers.

 
Q47. What is TELNET?

Ans. TELNET is a client-service protocol on the internet or local area network, allowing a user to log on to a remote device and have access to it. Technically, it is a bidirectional interactive text-oriented communication facility, which uses a virtual terminal connection.

Also explore:

    Top paid and free online courses by Coursera
    Top online edX courses
    Popular Udemy courses

 
Q48. What is RIP?

Ans. It is the abbreviation for Routing Information Protocol. It is a simple protocol that exchanges information between the routers.

 
Q49. What is half-duplex?

Ans. It is the mode of communication between two devices. Here the data flows bi-directionally but simultaneously. A perfect example of a half-duplex is a walkie-talkie.

 
Q50. What is a full-duplex?

Ans. It is a mode of communication between two devices and the data flow is bi-directional too, but the flow is simultaneous. Example – telephone.

 
Q51. What is netstat?

Ans. Netstat is a command-line utility program that provides information about the current Transmission Control Protocol /Internet Protocol (TCP/IP) settings of a connection.

 
Q52. What is a peer-peer process?

Ans. The processes on each machine that communicate at a given layer are called the peer-peer process.

 
Q53. What is anonymous FTP?

Ans. With the help of an anonymous FTP, users can be granted access to files in public servers. Users can log in as anonymous guests, thus the name.

 
Q54. What is NAT?

Ans. It stands for Network Address Translation and is a protocol that allows a network device, usually a firewall, to assign a public address to a computer/s inside a private network.

 
Q55. Mention a few examples of private network addresses.

Ans. Few examples of private network addresses are:

10.0.0.0 with a subnet cover of 255.0.0.0172.16.0.0  with subnet cover of 255.240.0.0192.168.0.0 with subnet cover of 255.255.0.0.

 

Explore the concept of Internet of Things.

 
Q56. Can you tell me the main elements of a protocol?

Ans. This is among the very commonly asked networking interview questions. Your reply should be –

There are three main elements of a protocol –

    Syntax: It refers to the structure or format of the data and their order of presentation.
    Semantics: It specifies the meaning of each section of bits.
    Timing: Timing refers to two characteristics, which include the timing of data sending and the speed of data sending.

 
Q57. What is NIC?

Ans. NIC is the abbreviation for Network Interface Card. It is a peripheral card with electronic circuitry. It is attached to a PC and connects it to a network. NIC has its own MAC address and this identifies a PC on the network.

 

Comments

Popular posts from this blog

Fortinet Internet Threat Perspectives Quiz Answers Fortinet NSE 1 Information Security Awareness Fortinet - Everything Trending

Ethical Hacking: SQL Injection for Beginners

CCNA Interview Basic Questions And Answers