0% found this document useful (0 votes)
11 views

Networking terms by mahad

Networking terms by mahad

Uploaded by

mahadakram967
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
11 views

Networking terms by mahad

Networking terms by mahad

Uploaded by

mahadakram967
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 10

Sure, here are some common networking interview questions along with their answers:

1. **What is a Network?**
- **Answer:** A network is a collection of computers, servers, mainframes, network devices, or
other devices connected to one another to allow the sharing of data.

2. **What is the OSI model?**


- **Answer:** The OSI (Open Systems Interconnection) model is a conceptual framework used
to understand and implement standard protocols in seven layers: Physical, Data Link, Network,
Transport, Session, Presentation, and Application.

3. **What is a MAC address?**


- **Answer:** A MAC (Media Access Control) address is a unique identifier assigned to a
network interface card (NIC) for communications at the data link layer of a network segment.

4. **What is an IP address?**
- **Answer:** An IP (Internet Protocol) address is a unique address that identifies a device on
the internet or a local network.

5. **What is the difference between IPv4 and IPv6?**


- **Answer:** IPv4 uses a 32-bit address format allowing for approximately 4.3 billion unique
addresses, whereas IPv6 uses a 128-bit address format allowing for a vastly larger number of
unique addresses.

6. **What is a subnet mask?**


- **Answer:** A subnet mask is used in IP networks to divide the IP address into network and
host parts.

7. **What is a default gateway?**


- **Answer:** A default gateway is a router that serves as the path to access other networks
when no specific route is set for a given IP address.

8. **What is DHCP?**
- **Answer:** DHCP (Dynamic Host Configuration Protocol) is a network management
protocol used to automatically assign IP addresses to devices on a network.

9. **What is DNS?**
- **Answer:** DNS (Domain Name System) translates domain names into IP addresses,
allowing users to access websites with human-readable names instead of numeric IP
addresses.

10. **What is a VPN?**


- **Answer:** A VPN (Virtual Private Network) is a service that encrypts your internet
connection and hides your IP address to ensure privacy and security online.
11. **What is a firewall?**
- **Answer:** A firewall is a network security device that monitors and controls incoming and
outgoing network traffic based on predetermined security rules.

12. **What is a router?**


- **Answer:** A router is a device that forwards data packets between computer networks,
performing the traffic directing functions on the internet.

13. **What is a switch?**


- **Answer:** A switch is a networking device that connects devices within a network and
uses packet switching to forward data to its destination device.

14. **What is a hub?**


- **Answer:** A hub is a basic networking device that connects multiple devices in a network,
but it does not manage traffic like a switch and can cause network congestion.

15. **What is a network topology?**


- **Answer:** Network topology refers to the arrangement of different elements (links, nodes,
etc.) in a computer network. Common topologies include star, ring, bus, and mesh.

16. **What is a VLAN?**


- **Answer:** A VLAN (Virtual Local Area Network) is a subnetwork that can group together
devices from different physical LANs.

17. **What is NAT?**


- **Answer:** NAT (Network Address Translation) is a method used to remap one IP address
space into another by modifying network address information in the IP header of packets.

18. **What is a proxy server?**


- **Answer:** A proxy server is a server that acts as an intermediary for requests from clients
seeking resources from other servers, providing various functions like anonymity and content
filtering.

19. **What is the difference between TCP and UDP?**


- **Answer:** TCP (Transmission Control Protocol) is connection-oriented and ensures
reliable data transfer, while UDP (User Datagram Protocol) is connectionless and faster but
does not guarantee delivery.

20. **What are the main functions of the Transport Layer?**


- **Answer:** The Transport Layer is responsible for end-to-end communication, error
correction, flow control, and ensuring complete data transfer.

21. **What is a port number?**


- **Answer:** A port number is a numerical identifier in the transport layer used to specify a
particular process or service on a networked device.

22. **What is ICMP?**


- **Answer:** ICMP (Internet Control Message Protocol) is used for sending error messages
and operational information, such as network status, to network devices.

23. **What is ARP?**


- **Answer:** ARP (Address Resolution Protocol) is used to map IP network addresses to the
hardware addresses used by the data link layer.

24. **What is a ping command?**


- **Answer:** The ping command is a network utility used to test the reachability of a host on
an IP network and measure the round-trip time for messages sent.

25. **What is a traceroute command?**


- **Answer:** Traceroute is a network diagnostic tool used to track the path that a packet
takes from source to destination and to identify routing paths and delays.

The remaining 75 questions can cover more specific scenarios, advanced networking concepts,
security practices, and practical problem-solving in networking. Let me know if you want more
questions, or if there are specific areas you'd like to focus on.

Here are additional networking interview questions and their answers:

26. **What is the purpose of a load balancer?**


- **Answer:** A load balancer distributes network or application traffic across multiple servers
to ensure no single server becomes overwhelmed, improving performance and reliability.

27. **What is the difference between a public IP and a private IP?**


- **Answer:** A public IP address is used for external communication on the internet, while a
private IP address is used for internal communication within a private network.

28. **What is a DMZ in networking?**


- **Answer:** A DMZ (Demilitarized Zone) is a physical or logical subnet that separates an
internal local network from other untrusted networks, typically the internet, to add an extra layer
of security.

29. **What is a collision domain?**


- **Answer:** A collision domain is a network segment where data packets can collide with
each other when being sent on a shared medium, affecting performance.

30. **What is a broadcast domain?**


- **Answer:** A broadcast domain is a network segment in which a broadcast packet sent by
a device is received by all other devices in that segment.

31. **What is a proxy ARP?**


- **Answer:** Proxy ARP is a technique in which one device, usually a router, answers ARP
requests intended for another device, effectively routing traffic on behalf of the device.

32. **What is MTU?**


- **Answer:** MTU (Maximum Transmission Unit) is the largest size of a packet or frame that
can be sent in a packet- or frame-based network such as the internet.

33. **What is the difference between half-duplex and full-duplex communication?**


- **Answer:** Half-duplex communication allows data transmission in both directions but not
simultaneously, while full-duplex communication allows simultaneous data transmission in both
directions.

34. **What is a network protocol?**


- **Answer:** A network protocol is a set of rules and conventions for communication between
network devices, ensuring the correct exchange of data.

35. **What is SNMP?**


- **Answer:** SNMP (Simple Network Management Protocol) is an internet-standard protocol
used to manage and monitor network devices.

36. **What is a socket?**


- **Answer:** A socket is an endpoint for sending or receiving data between devices in a
network, typically consisting of an IP address and a port number.

37. **What is the role of the Application Layer in the OSI model?**
- **Answer:** The Application Layer provides network services directly to user applications,
such as email, file transfer, and web browsing.

38. **What is a routing table?**


- **Answer:** A routing table is a data table stored in a router or a networked computer that
lists the routes to particular network destinations.

39. **What is BGP?**


- **Answer:** BGP (Border Gateway Protocol) is a standardized exterior gateway protocol
used to exchange routing information between autonomous systems on the internet.

40. **What is OSPF?**


- **Answer:** OSPF (Open Shortest Path First) is a link-state routing protocol used for finding
the best path for data through a network by maintaining a map of the network.
41. **What is the purpose of a subnet?**
- **Answer:** A subnet divides a larger network into smaller, more manageable sections to
improve performance and security.

42. **What is MPLS?**


- **Answer:** MPLS (Multiprotocol Label Switching) is a technique for speeding up and
shaping network traffic flows using labels to direct data from one node to another.

43. **What is QoS?**


- **Answer:** QoS (Quality of Service) refers to various techniques to manage network
resources by setting priorities for specific types of data, ensuring the performance of critical
applications.

44. **What is the difference between unicast, multicast, and broadcast?**


- **Answer:** Unicast is communication between a single sender and a single receiver.
Multicast is communication between a single sender and multiple specified receivers. Broadcast
is communication from a single sender to all possible receivers in the network.

45. **What is the purpose of a network bridge?**


- **Answer:** A network bridge connects two or more network segments, making them
function as a single network, and filters traffic to reduce collisions.

46. **What is the use of the `netstat` command?**


- **Answer:** The `netstat` command displays network connections, routing tables, interface
statistics, masquerade connections, and multicast memberships.

47. **What is the `ipconfig` command used for?**


- **Answer:** The `ipconfig` command displays all current TCP/IP network configuration
values and can modify DHCP and DNS settings.

48. **What is the `nslookup` command?**


- **Answer:** The `nslookup` command queries the DNS to obtain domain name or IP
address mapping information.

49. **What is the purpose of a network interface card (NIC)?**


- **Answer:** A NIC is a hardware component that allows a computer to connect to a network
and communicate with other devices.

50. **What is the function of a gateway in networking?**


- **Answer:** A gateway serves as a node that routes traffic from a workstation to the outside
network and translates data between different protocols.

51. **What is a Layer 2 switch?**


- **Answer:** A Layer 2 switch operates at the Data Link layer and uses MAC addresses to
forward data to the correct destination within a local network.

52. **What is a Layer 3 switch?**


- **Answer:** A Layer 3 switch operates at the Network layer and can perform routing
functions in addition to switching.

53. **What is STP?**


- **Answer:** STP (Spanning Tree Protocol) is a network protocol that ensures a loop-free
topology for Ethernet networks by disabling redundant paths.

54. **What is a T1 line?**


- **Answer:** A T1 line is a type of fiber optic telephone line that can handle more data than
traditional telephone lines, providing 1.544 Mbps of bandwidth.

55. **What is the difference between HTTP and HTTPS?**


- **Answer:** HTTP (Hypertext Transfer Protocol) is used for transmitting web pages, while
HTTPS (HTTP Secure) is HTTP with encryption for secure communication.

56. **What is the difference between symmetric and asymmetric encryption?**


- **Answer:** Symmetric encryption uses the same key for encryption and decryption, while
asymmetric encryption uses a public key for encryption and a private key for decryption.

57. **What is a site-to-site VPN?**


- **Answer:** A site-to-site VPN connects entire networks to each other, typically an
organization’s headquarters to its branch offices, using the internet as the medium.

58. **What is a client-to-site VPN?**


- **Answer:** A client-to-site VPN allows individual users to connect to a remote network
securely over the internet, typically used for remote access by employees.

59. **What is a broadcast storm?**


- **Answer:** A broadcast storm occurs when there is an excessive amount of broadcast
traffic on the network, leading to network congestion and potential failures.

60. **What is a loopback address?**


- **Answer:** A loopback address is a special IP address (127.0.0.1 for IPv4 and ::1 for IPv6)
used to test network software without sending packets over the network.

61. **What is CIDR?**


- **Answer:** CIDR (Classless Inter-Domain Routing) is a method for allocating IP addresses
and routing that replaces the old system based on classes A, B, and C.

62. **What is a routing protocol?**


- **Answer:** A routing protocol determines the best path for data to travel across networks
and can dynamically update routing tables.

63. **What is EIGRP?**


- **Answer:** EIGRP (Enhanced Interior Gateway Routing Protocol) is an advanced
distance-vector routing protocol that is used on a computer network for automating routing
decisions and configuration.

64. **What is RDP?**


- **Answer:** RDP (Remote Desktop Protocol) is a proprietary protocol developed by
Microsoft for remote access to another computer over a network.

65. **What is SSH?**


- **Answer:** SSH (Secure Shell) is a protocol for securely accessing and managing devices
over an unsecured network.

66. **What is Telnet?**


- **Answer:** Telnet is a protocol used for remote access to devices over a network, typically
for administrative purposes, but it is not secure as it transmits data in plaintext.

67. **What is a wildcard mask?**


- **Answer:** A wildcard mask is used in networking to specify a range of IP addresses and is
often used in access control lists (ACLs) and routing.

68. **What is the difference between a modem and a router?**


- **Answer:** A modem connects a network to the internet by converting digital data from a
computer into a format suitable for transmission over a phone or cable line. A router routes data
between devices on a network and manages traffic within the network.

69. **What is PoE?**


- **Answer:** PoE (Power over Ethernet) allows Ethernet cables to carry electrical power to
devices like wireless access points and IP cameras.

70. **What is a wireless access point?**


- **Answer:** A wireless access point (WAP) is a device that allows wireless devices to
connect to a wired network using Wi-Fi.

71. **What is the difference between 2.4 GHz and 5 GHz Wi-Fi bands?**
- **Answer:** The 2.4 GHz band offers broader coverage but slower speeds, while the 5 GHz
band provides faster

Sure, continuing from where we left off:

71. **What is the difference between 2.4 GHz and 5 GHz Wi-Fi bands?**
- **Answer:** The 2.4 GHz band offers broader coverage but slower speeds and is more
susceptible to interference. The 5 GHz band provides faster speeds and less interference but
has a shorter range.

72. **What is the difference between WEP, WPA, and WPA2?**


- **Answer:** WEP (Wired Equivalent Privacy) is an older, less secure encryption method.
WPA (Wi-Fi Protected Access) improved security but still had vulnerabilities. WPA2 (Wi-Fi
Protected Access 2) offers stronger security and is currently the standard for Wi-Fi encryption.

73. **What is a mesh network?**


- **Answer:** A mesh network is a network topology where each node relays data for the
network. All nodes cooperate in the distribution of data across the network.

74. **What is port forwarding?**


- **Answer:** Port forwarding is a network address translation (NAT) application that redirects
communication requests from one address and port number combination to another while the
packets traverse a network gateway, such as a router or firewall.

75. **What is port mirroring?**


- **Answer:** Port mirroring, also known as SPAN (Switched Port Analyzer), is used on a
network switch to send a copy of network packets seen on one port (or an entire VLAN) to a
network monitoring connection on another port.

76. **What is the difference between static and dynamic IP addressing?**


- **Answer:** Static IP addressing assigns a fixed IP address to a device, while dynamic IP
addressing assigns IP addresses from a pool of available addresses, typically using DHCP.

77. **What is a Service Set Identifier (SSID)?**


- **Answer:** An SSID is a unique identifier that names a wireless local area network (WLAN).
Devices use the SSID to connect to the correct network.

78. **What is an autonomous system (AS)?**


- **Answer:** An autonomous system is a collection of IP networks and routers under the
control of a single organization that presents a common routing policy to the internet.

79. **What is the difference between routing and switching?**


- **Answer:** Routing involves moving packets between different networks (Layer 3), while
switching involves moving packets within the same network (Layer 2).

80. **What is a duplex mismatch?**


- **Answer:** A duplex mismatch occurs when two connected network devices are set to
different duplex modes (one to half-duplex, the other to full-duplex), leading to network
performance issues.
81. **What is NAT overload?**
- **Answer:** NAT overload, also known as PAT (Port Address Translation), allows multiple
devices on a local network to be mapped to a single public IP address but with a different port
number for each session.

82. **What is a three-way handshake?**


- **Answer:** A three-way handshake is a process used in TCP/IP networks to establish a
connection between a client and server. It involves SYN, SYN-ACK, and ACK packets.

83. **What is DHCP snooping?**


- **Answer:** DHCP snooping is a security feature that acts as a firewall between untrusted
hosts and DHCP servers to prevent malicious or malformed DHCP traffic.

84. **What is a private VLAN?**


- **Answer:** A private VLAN is a VLAN within a VLAN that provides layer 2 isolation between
ports within the same VLAN to enhance security.

85. **What is a stateful firewall?**


- **Answer:** A stateful firewall monitors the state of active connections and makes decisions
based on the context of the traffic (state), as opposed to just examining individual packets.

86. **What is the role of the Network Layer in the OSI model?**
- **Answer:** The Network Layer is responsible for data routing, packet forwarding, and logical
addressing (IP addresses).

87. **What is a demultiplexer?**


- **Answer:** In networking, a demultiplexer takes a single input signal and selects one of
many data-output-lines, which is then forwarded to the correct destination.

88. **What is RADIUS?**


- **Answer:** RADIUS (Remote Authentication Dial-In User Service) is a networking protocol
that provides centralized Authentication, Authorization, and Accounting (AAA) management for
users connecting to a network.

89. **What is TACACS+?**


- **Answer:** TACACS+ (Terminal Access Controller Access-Control System Plus) is a
protocol that provides detailed accounting information and flexible administrative control over
the authentication and authorization processes.

90. **What is an MPLS VPN?**


- **Answer:** An MPLS VPN is a type of VPN that uses Multiprotocol Label Switching
technology to create private networks over a shared infrastructure.

91. **What is GRE?**


- **Answer:** GRE (Generic Routing Encapsulation) is a tunneling protocol developed by
Cisco that can encapsulate a wide variety of network layer protocols inside virtual point-to-point
connections.

92. **What is VTP?**


- **Answer:** VTP (VLAN Trunking Protocol) is a Cisco protocol that propagates the definition
of Virtual Local Area Networks (VLANs) on the whole local area network.

93. **What is HSRP?**


- **Answer:** HSRP (Hot Standby Router Protocol) is a Cisco protocol that provides network
redundancy by allowing multiple routers to function as a single virtual router.

94. **What is IPsec?**


- **Answer:** IPsec (Internet Protocol Security) is a suite of protocols for securing internet
protocol (IP) communications by authenticating and encrypting each IP packet in a
communication session.

95. **What is a network tap?**


- **Answer:** A network tap is a hardware device that provides a way to access the data
flowing across a network without altering the data.

96. **What is a next-hop address?**


- **Answer:** The next-hop address is the next gateway to which packets should be forwarded
along the path to their final destination.

97. **What is BSSID?**


- **Answer:** BSSID (Basic Service Set Identifier) is the MAC address of the wireless access
point (AP) or the basic service set (BSS) in infrastructure mode in a Wi-Fi network.

98. **What is an SSID broadcast?**


- **Answer:** SSID broadcast is the process by which a wireless access point (AP)
periodically sends out its network name (SSID) so that nearby devices can discover and
connect to the network.

99. **What is frame relay?**


- **Answer:** Frame relay is a standardized wide area network technology that specifies the
physical and data link layers of digital telecommunications channels using a packet-switching
methodology.

100. **What is the purpose of IGMP?**


- **Answer:** IGMP (Internet Group Management Protocol) is used by IP hosts to establish
multicast group memberships. It is used for managing multicast streams and is essential for
streaming applications.

You might also like