Networking Interview Questions with Answers

Networking Interview Questions with Answers

1. What is an Under-Net or a sub-net?

A: The subnet or sub-networking is used in IP addresses as a way to divide a bigger network into smaller parts or sub-networks. This technique is mainly used to reduce the network traffic on a big network and also to make it more manageable for isolating and finding network problems as well as to enhance network performance.

2. What is transmission?

A: While communication means you can both send and receive information from electronic devices, transmission allows transfer of any kind of data from the source to it’s destination.

3. What is RAID?

A: RAID is directly connected with data storage. As a matter of fact, RAID is a technology which will increase the reliability of data storage and increase your PC performance. RAID is short for Redundant Array of Independent Discs. To set up a RAID system you would need two discs working with each other. The interesting thing about RAID is that these discs can be custom and they do not belong to any industry group or brand. That is why you have different kinds of RAID which can respond to a specific situation.

4. Types of exchanging data in CCNA?

A: Simplex, half-duplex and full-duplex.

5. When speaking of transmission, what kind of transmissions are there?

A: Baseband and broadband transmission.

6. What is NetBIOS?

A: NetBIOS is an interface which allows the programs to use it in different types of network like the LAN network (Local area network). NetBIOS has its own list of commands that it provides to program for requesting simple actions like for example managing names or perhaps sending datagrams through-out one network.

7. Explain MAC address.

A: Firstly, MAC means Media Access Control. The Media Access Control layer in the network structure is where the MAC address is attached at. The MAC address serves as an identifier of a device. This address is unique and it is stored in ROM, on a network card.

8. What is a virtual channel and a virtual path?

A: The virtual channel or in other terms called the virtual circuit is a logical circuit which is created by channel linking and channel links. The virtual channel is mostly used to transfer data from one destination to another or between two end points on a specified network.
If transmission was the transfer of data from the source to the destination, then along that path of data transfer, groups and groups of the logical circuits can be created, forming a virtual path. The virtual path forms ALONG the transmission path.

9. How would you define Interior Gateway Protocol (IGP).

A: To understand Interior Gateway Protocol, first we must focus on the “normal” gateway. A normal gateway is an access point to one specified network. The Interior Gateway protocol is the type of protocol which helps in exchanging and transferring valuable routing information between other gateways (In most cases, routers).  The IGP works and reacts within an autonomous system, which means it works within a system of local area networks of a company or a corporation per say.

10. Tell me the default size of a frame.

A: 1518 bytes.

11. Describe the process of segmentation and fragmentation.

A: Segmentation is the process of dividing data into pieces, like dividing the one hard disk into several drives, while fragmentation is diving the segmentation or dividing the pieces of the pieces.

12. What is encapsulation?

A: Just like having a capsule, the encapsulation process of data is when you summarize and protect all data (encapsulate it). It is a sort of packaging  data and functions into one single piece or component. It also protects the data from corruption.

13. What are the major branches of IP ?

A:  There are three types of IP. There’s public IP, private IP and special IP.

14. What is a SWITCH?

A: Switches are devices mainly used to connect computers or printers together and they are more likely to be used in the business sectors and companies. The switches are controllers who allow the computers to communicate with each other.

15. How many broadcast domains are there in a switch?

A: One.

1. Why do we use multiple protocols instead of one universal protocol?

A: Picture this as a brick of cards. If you would have or have created a universal protocol it would mean that shifting one piece of the puzzle or changing one thing (example given: moving one card) would make changes to all of the other protocols. That is why the universal protocol is considered unstable, while on the other hand if you are using a multiple protocols then you can maintain and manipulate changes concerning only that protocol without having affected the other ones.

2. What is a rendezvous point?

A: In a multicast network the rendezvous point is the main point where all the traffic is summarized. It is a router and all routers can be rendezvous points varying to configure different ranges.

3. How would you describe classless and classfull protocols?

A: A classful protocol is a protocol that does not support or recognize a sub network, meaning it only recognizes class A, B and C default masks. That is why it is called classful. On the other hand, the classless protocol is the other way around. It can recognize all the default masks and supports the sub-network meaning it can advertise any kind of a network.

4. Explain Route-Leaking.

A: Route leaking is changing and redistributing level two routes into an area of level one routes.

5. What is IBGP?

A:  The IBGP which is short for Border Gateway Protocol (Inter or Internal) and this kind of protocol like a gateway is an access point for routers to exchange data and information between each other in one specific system.

6. Does synchronization fall under IBGP?

A: Synchronization actually allows (when enabled) for the Border Gateway Protocol to be transferred to the routing table. If the synchronization is disabled then the IBGP routers must be synchronized.

7. What is the purpose of ARP?

A: ARP is short for Address Resolution Protocol. What kind of a protocol is this? It is a telecommunication protocol and it is used to change network layers into link layers, which helps build up a multi-access network.

8. What is a PING command?

A: A PING command is a sort of network tool which will help you verify if your connection is valid, thus if you are connected to the internet. You can use the PING command on a local network if you want to find out whether any of your computers connectivity is good and you can also PING the internet source to find out if you are connected to the world wide web. This command comes in hand when isolating a network problem. For example, PING commands are used allot in the multiplayer gaming world to find out which player has the worst connectivity and is slowing down the game.

9. What is a Distance Vector?

A: Firstly, the Distance Vector is called a vector because routes are visualized, explained and advertised as vectors (in terms of direction) where the distance is in metric. The Distance Vector routing protocol uses a routing algorithm so it can automatically update all the routers on the routing table and maintain a high-speed network.

10. What is BOOTP?

A: BOOTP stands short for the Bootstrap protocol which automatically starts up when system is booted and allows a computer a default IP address so it can connect to the internet.

More Resume

Interview Questions with Answers

Study Material

Search

Shortcodes Ultimate

 
Follow Us
 
BGP