Computer Hardware and Networking interview question set 2/Computer Hardware and Networking Interview Questions and Answers for Freshers & Experienced

Name the types of WAN services obtained by Cisco routers.

WAN services obtained by Cisco routers are switched services where protocols are used to connect end to end devices and Interface front end.

Posted Date:- 2021-09-09 08:12:20

Mention the use of DDR on Cisco routers.

DDR stands for dial-on-demand routing used to generate and close a circuit-switched session. It provides on-demand routing to the low volume and periodic traffic.

Posted Date:- 2021-09-09 08:11:43

What are the benefits of the Hamming code?

Here, are important benefits of Hamming code

<> The Hamming code method is effective on networks where the data streams are given for the single-bit errors.
<> Hamming code not only provides the detection of a bit error but also helps you to indent bit containing error so that it can be corrected.
<> The ease of use of hamming codes makes it suitable for use in computer memory and single-error correction.

Posted Date:- 2021-09-09 08:11:12

What is the 5-4-3 rule? In which architecture it is used?

In the 5-4-3 rule, there is a maximum of five segments in a network that are connected with four repeaters. It is used in 10Base2 and 10Base5 Ethernet architectures. In this rule, only three segments can be populated with nodes.

Posted Date:- 2021-09-09 08:09:58

How many network segments can be populated in 10Base2?

10Base2 networks allow a maximum of five segments with only three of those segments populated. Each of the three populated segments can have a maximum of 30 nodes attached.

Posted Date:- 2021-09-09 08:09:29

Mention the types of wires used for data transmission in UTP cable.

There are four types of wires used for data transmission in UTP cable, which is wire 1, 2, 3, and 6. Where wires 1 and 2 are used to transmit the data while wires 3 and 6 are used to receive the data.

Posted Date:- 2021-09-09 08:08:33

What are the functions of a Network Layer?

The Network Layer or OSI Layer 3 provides services for exchanging individual sections of data over the network between identified end devices. To perform this end-to-end transport Layer 3 uses four basic processes:

1. Addressing
2. Encapsulation
3. Routing
4. Decapsulation

Posted Date:- 2021-09-09 08:07:56

What is Process Sigma?

Process Sigma measures the frequency of a task that is performed without any error. It is expressed as a number of standard deviations on a normal distribution.

Posted Date:- 2021-09-09 08:07:04

What is a VPN (Virtual Private Network)? What are the advantages of using a VPN Connection?

A VPN or Virtual Private Network is an encrypted connection (secure tunnel) built on the internet from a device to a network. It helps in the creation of a protected network between different networks using the internet (public network), ensuring that sensitive data is safely transmitted. This makes it difficult for third parties to gain unauthorized access, track your activities online, or steal data. By using the VPN, a client can connect to the organization’s network remotely.

Some of the advantages of using VPN Connection are:

1. Remote Access
2. Protected File Sharing
3. Anonymity
4. Enhanced Security
5. Improved Performance
6. Anonymity
7. Network Scalability
8. Prevents Data Throttling

Posted Date:- 2021-09-09 08:06:26

Is there a difference between a gateway and a router?

A gateway sends the data between two dissimilar networks, while a router sends the data between two similar networks.

Posted Date:- 2021-09-09 08:04:58

What is NVT (Network Virtual Terminal)?

NVT is a set of pre-defined rules to very simple virtual terminal interaction. This terminal helps you to start a Telnet session.

Posted Date:- 2021-09-09 08:04:18

What is the maximum segment length of a 100Base-FX network?

The maximum length for a network segment using 100Base-FX is 412 meters.

Posted Date:- 2021-09-09 08:03:50

What is the RSA algorithm?

RSA is short for the Rivest-Shamir-Adleman algorithm. It is the most commonly used public-key encryption algorithm in use today.

Posted Date:- 2021-09-09 08:03:19

What is the role of the IEEE in computer networking?

IEEE, or the Institute of Electrical and Electronics Engineers, is an organization composed of engineers that issues and manages standards for electrical and electronic devices. This includes networking devices, network interfaces, cablings, and connectors.

Posted Date:- 2021-09-09 08:02:50

How can you fix signal attenuation problems?

A common way of dealing with such a problem is to use repeaters and hubs because it will help regenerate the signal and therefore prevent signal loss. Checking if cables are properly terminated is also a must.

Posted Date:- 2021-09-09 08:02:16

Explain the importance of authentication.

Authentication is the process of verifying a user’s credentials before he can log into the network. It is normally performed using a username and password. This provides a secure means of limiting access from unwanted intruders on the network.

Posted Date:- 2021-09-09 08:01:05

What do you understand by DHCP?

Dynamic Host Configuration Protocol or DHCP is a network management protocol. DHCP automatically assigns IP addresses to the devices on the network and is used on the UDP/IP networks. In turn, it reduces the need for a network admin to assign IP addresses manually; this further reduces errors.

Posted Date:- 2021-09-09 08:00:00

Explain piggybacking.

In two-way communication, the receiver sends an acknowledgment to the sender on receiving the data packets. Suppose the receiver does not send the acknowledgment immediately and waits till the network layer passes in the following data packet. In that case, an acknowledgment is attached to the outgoing data frame. This process is known as piggybacking.

Posted Date:- 2021-09-09 07:59:01

Tell us about the advantages of a Modem.

Some advantages of modem are:

1. Its speed depends on the cost

2. It is more helpful in connecting LAN with the Internet

3. It is the most widely used data communication roadway.

Posted Date:- 2021-09-09 07:58:21

Where is the best place to install an Anti-virus program?

An anti-virus program must be installed on all servers and workstations to ensure protection. That’s because individual users can access any workstation and introduce a computer virus. You can plug in their removable hard drives or flash drives.

Posted Date:- 2021-09-09 07:57:32

What Is Multicast Routing?

Sending a message to a group is called multicasting, and its routing algorithm is called multicast routing.

Posted Date:- 2021-09-09 07:56:39

What Is Region?

When hierarchical routing is used, the routers are divided into what we call regions, with each router knowing all the details about how to route packets to destinations within its own region, but knowing nothing about the internal structure of other regions.

Posted Date:- 2021-09-09 07:56:18

What Is The Difference Between Interior And Exterior Neighbour Gateways?

Interior gateways connect LANs of one organization, whereas exterior gateways connect the organization to the outside world.

Posted Date:- 2021-09-09 07:55:48

What Protocol Is Used By Dns Name Servers?

DNS uses UDP for communication between servers. It is a better choice than TCP because of the improved speed a connectionless protocol offers. Of course, transmission reliability suffers with UDP.

Posted Date:- 2021-09-09 07:55:20

How will you recover data from a Virus-infected system?

We will install an OS and updated antivirus in a system that is free of any viruses, and then connect the hard drive of the infected system as a secondary drive. The hard drive will then be scanned and cleaned. Data can now be copied into the system.

Posted Date:- 2021-09-09 07:54:50

How would you differentiate between Firewall and Antivirus?

Both are security applications used in networking.

A firewall prevents unauthorized access in private networks as intranets. However, it does not protect against viruses, spyware, or adware.

An antivirus is software that protects a computer from any malicious software, virus, spyware, or adware.

You may consider such networking interview questions to be basic, but such questions are the favorite of interviewers as interviewees often leave behind such networking interview questions while preparing.

Posted Date:- 2021-09-09 07:54:25

What is Ethernet in Networking?

Ethernet is a computer network technology used to connect multiple computers or devices over a wired connection and create a local area network (LAN). It provides a simple interface by connecting devices together with a cable to share information. Ethernet works on layer 1 (physical) and layer 2 (data link layer) of an OSI model and can connect up to 1024 personal computers. An Ethernet network may use various topologies such as a star, bus, ring, etc. Wired Ethernet networks are connected via fibre optic cables, while the wireless Ethernet network uses wireless NICs. Ethernet network is very reliable, and data is transmitted as well as received at very high speed. To ensure the security of the data, Ethernet makes use of firewalls.

Posted Date:- 2021-09-09 07:53:42

What is a Hybrid Network?

A hybrid network is a network setup that makes use of both client-server and peer-to-peer architecture.

Posted Date:- 2021-09-09 07:52:38

What is ATM in Networking?

ATM stands for Asynchronous Transfer Mode and is a switching technique used by telecommunication networks to encode data into small fixed-size packets called cells. These cells are ideal for time-division multiplexing (TDM) and transmit them over a physical medium.

Each ATM cell is 53 bytes long with a 5-byte header and a 48-byte payload. Since all the data is encoded into identical cells, the transmission is simple and uniform. This reduces packet overload and ensures that mixed traffic is handled efficiently. ATM is the core protocol used for Synchronous Optical Network (SONET), Fiber Distributed Data Interface (FDDI) and other high-speed networks. ATM networks can easy to work with and are scalable both in size and speed.

Posted Date:- 2021-09-09 07:52:12

What is VLSM in Networking?

VLSM stands for Variable Length Subnet Masking. It is a subnet design strategy that allows subnet masks to have variable sizes within the same network. In other words, it involves a process of subnetting a subnet. VLSM enables network engineers to divide an IP address into different sized subnets and allocate it according to the network needs. This means that more than one mask is used for different subnets of a single class A, B, or C networks, thereby increasing the usability of subnets. The network administrator must use the relevant supporting routing protocol to use VLSM such as Intermediate System-to-Intermediate System (IS-IS), Routing Information Protocol v2 (RIPv2), Border Gateway Protocol (BGP), and Open Shortest Path First (OSPF).

Posted Date:- 2021-09-09 07:51:29

What is Host in Networking?

A host refers to a computer device (or server) that is linked with other devices connected within a network. The network hosts are assigned at least one network address configured manually by an administrator or automatically assigned by means of DHCP.

Posted Date:- 2021-09-09 07:50:55

What is RIP?

It is the abbreviation for Routing Information Protocol. It is a simple protocol that exchanges information between the routers.

Posted Date:- 2021-09-09 07:48:08

What is TELNET?

TELNET is a client-service protocol on the internet or local area network, allowing a user to log on to a remote device and have access to it. Technically, it is a bidirectional interactive text-oriented communication facility, which uses a virtual terminal connection.

Posted Date:- 2021-09-09 07:47:49

Bootp Helps A Disk Less Workstation Boot. How Does It Get A Message To The Network Looking For Its Ip Address And The Location Of Its Operating System Boot Files?

BOOTP sends a UDP message with a subnet work broadcast address and waits for a reply from a server that gives it the IP address. The same message might contain the name of the machine that has the boot files on it. If the boot image location is not specified, the workstation sends another UDP message to query the server.

Posted Date:- 2021-09-09 07:46:36

What Is Packet Filter?

Packet filter is a standard router equipped with some extra functionality. The extra functionality allows every incoming or outgoing packet to be inspected. Packets meeting some criterion are forwarded normally. Those that fail the test are dropped.

Posted Date:- 2021-09-09 07:46:17

What is the main disadvantage of a peer to peer network?

Accessing the resources that are shared by one of the workstations on the network takes a performance hit.

Posted Date:- 2021-09-09 07:45:55

Mention the uses of the Hamming code?

Following are some of the common applications of using Hemming code:

1. Modems
2. Satellites
3. PlasmaCAM
4. Shielding wire
5. Embedded Processor
6. Computer Memory
7. Open connectors

Posted Date:- 2021-09-09 07:44:12

Can you tell us about the use of Pseudo TTY?

It is a false terminal allowing external machines to log in or to connect through Telnet. No connection can take place without it.

Posted Date:- 2021-09-09 07:43:19

How does dynamic host configuration protocol help in network administration?

The network administrator applies the dynamic host configuration protocol to create a pool of IP addresses instead of visiting each client computer to configure a static IP address. This pool is known as the scope that can be assigned to clients dynamically.

Posted Date:- 2021-09-09 07:41:46

What is SLIP?

SLIP, or Serial Line Interface Protocol, is an old protocol developed during the early UNIX days. This is one of the protocols that are used for remote access.

Posted Date:- 2021-09-09 07:40:54

What is meant by clustering support?

Clustering support is the ability of a network operating system in a fault-tolerant group to connect multiple servers. The primary purpose of clustering is that if one server fails, the processing can continue with the next server in the cluster.

Posted Date:- 2021-09-09 07:40:35

What are gateways?

Gateways provide connectivity between two or more network segments. It is usually a computer that runs the gateway software and provides translation services. This translation is key in allowing different systems to communicate on the network.

Posted Date:- 2021-09-09 07:39:02

What is the main purpose of OSPF?

OSPF, or Open Shortest Path First, is a link-state routing protocol that uses routing tables to determine the best possible path for data exchange.

Posted Date:- 2021-09-09 07:38:24

How can you identify the IP class of a given IP address?

By looking at the first octet of any given IP address, you can identify whether it’s Class A, B, or C. If the first octet begins with a 0 bit, that address is Class A. If it begins with bits 10 then that address is a Class B address. If it begins with 110, then it’s a Class C network.

Posted Date:- 2021-09-09 07:38:08

What is Ping in Networking?

A Ping is a software utility used to verify the reachability of a specific IP address on a network. It was first developed by Michael Muss in 1983 to quickly test various points of the network and get a response. It works by sending Internet Control Message Protocol (ICMP) echo requests to the host of a destination computer and then waiting for an echo reply. The ping is initiated several times to get responses echoed back to the source provides important information such as –

<> consistency in the network connection
<> bytes sent and received
<> approximate duration of the round-trip time
<> packets sent, received, or lost

Posted Date:- 2021-09-09 07:36:30

What are the perquisites to configure a server?

Perquisites to configure a server are:

<> LAN card should be connected
<> Root (partition on which window is installed) should be in NTFS format.
<> A server should be configured with a static IP address.

Posted Date:- 2021-09-09 07:31:51

What Are The Three Type Of Routing Tables And What Are The Advantages And Disadvantages Of These?

The three types of routing tables are fixed, dynamic, and fixed central.

<> A fixed table must be manually modified every time there is a change.
<> A dynamic table changes its information based on network traffic, reducing the amount of manual maintenance.
<> A fixed central table lets a manager modify only one table, which is then read by other devices. The fixed central table reduces the need to update each machine's table, as with the fixed table. Usually a dynamic table causes the fewest problems for a network administrator, although the table's contents can change without the administrator being aware of the change.

Posted Date:- 2021-09-09 07:31:15

What is the equivalent layer or layers of the TCP/IP Application layer in terms of the OSI reference model?

The TCP/IP Application layer has three counterparts on the OSI model: 1) Session Layer, 2) Presentation Layer, and 3) Application Layer.

Posted Date:- 2021-09-09 07:30:03

What is RAS?

RAS (Remote Access Services) refers to any combination of hardware and software to enable remote access to tools or information that typically reside on a network of IT devices.

Posted Date:- 2021-09-09 07:29:36

What is the difference between ‘standard’ and ‘extended’ ACL

Standard ACLs are source-based, whereas extended ACLs are source- and destination-based.

Posted Date:- 2021-09-09 07:24:32

R4R Team
R4R provides Computer Hardware and Networking Freshers questions and answers (Computer Hardware and Networking Interview Questions and Answers) .The questions on website is done by expert team! Mock Tests and Practice Papers for prepare yourself.. Mock Tests, Practice Papers,Computer Hardware and Networking interview question set 2,Computer Hardware and Networking Freshers & Experienced Interview Questions and Answers,Computer Hardware and Networking Objetive choice questions and answers,Computer Hardware and Networking Multiple choice questions and answers,Computer Hardware and Networking objective, Computer Hardware and Networking questions , Computer Hardware and Networking answers,Computer Hardware and Networking MCQs questions and answers R4r provides Python,General knowledge(GK),Computer,PHP,SQL,Java,JSP,Android,CSS,Hibernate,Servlets,Spring etc Interview tips for Freshers and Experienced for Computer Hardware and Networking fresher interview questions ,Computer Hardware and Networking Experienced interview questions,Computer Hardware and Networking fresher interview questions and answers ,Computer Hardware and Networking Experienced interview questions and answers,tricky Computer Hardware and Networking queries for interview pdf,complex Computer Hardware and Networking for practice with answers,Computer Hardware and Networking for practice with answers You can search job and get offer latters by studing .learn in easy ways .