Hardware and networking interview questions and answers pdf


+ Hardware And Networking Interview Questions and Answers, Question1: What is a node and links? Question2: What are the layers of the OSI reference. You have to be well-prepared to crack a networking job interview. Here are some of the probable Hardware and Networking Interview. The address resolution protocol (ARP) is used to associate the 32 bit IP address with the 48 bit physical address, used by a host or a router to find the physical.

Language:English, Spanish, Japanese
Genre:Politics & Laws
Published (Last):11.02.2016
Distribution:Free* [*Register to download]
Uploaded by: WARD

59586 downloads 140879 Views 39.50MB PDF Size Report

Hardware And Networking Interview Questions And Answers Pdf

Top Hardware & Networking Interview Questions & Answers - Download as Word Doc .doc), PDF File .pdf), Text File .txt) or read online. Top Hardware. Common Interview Questions for Computer. Networking and Information Security Majors. Interviewing with companies for IT positions, whether large or small. Networking Interview Questions updated on Apr ruthenpress.info of Users b. Type of transmission medium c. Hardware d. Software. 7. Three common redundancy methods are parity check, cyclic redundancy check (CRC), and checksum.

What is main difference between Communication and Transmission? Explain the concept of Cross Cable and Standard Cable? When we have to connect different devices or same devices we connect with cables and the in such a way that. It is a range of frequency within given band. In lay man term it is capacity of a network to hold. It is layer three devices which connect two or more different network together.

Impulse noise comes from power lines, lightning etc. Question 7.

What Is Ip? Question 8. Answer : Hub is a layer 1 device. It is unable to detect the collision. Switch is layer 2 device. CAM table is used to make the forwarding decision.

Question 9. What Is A Layer? Answer : Layer is a completely logical partition of PDU protocol data unit process. Question Explain Hidden Shares. How Do They Work? Administrative shares are usually created automatically for the root of each drive letter.

They do not display in the network browse list. Answer : The address resolution protocol ARP is used to associate the 32 bit IP address with the 48 bit physical address, used by a host or a router to find the physical address of another host on its network by sending a ARP uery packet that includes the IP address of the receiver. The reverse address resolution protocol RARP allows a host to discover its Internet address when it knows only its physical address. Answer : Clients and Servers are separate logical entities that work together over a network to accomplish a task.

The advantage of bus topology is that it can be installed easily. And the disadvantage is that if the backbone cable breaks then the whole network will be down. In this topology, the devices are not linked to each other. If a device needs to communicate with the other, then it has to send the signal or data to the central hub.

And then the hub sends the same data to the destination device.

Networking Interview Questions

The advantage of the star topology is that if a link breaks then only that particular link is affected. The whole network remains undisturbed. The main disadvantage of the star topology is that all the devices of the network are dependent on a single point hub.

If the central hub gets failed, then the whole network gets down. Data or Signal in ring topology flow only in a single direction from one device to another and reaches the destination node. The advantage of ring topology is that it can be installed easily. Adding or deleting devices to the network is also easy. The main disadvantage of ring topology is the data flows only in one direction.

And a break at a node in the network can affect the whole network. Mesh Topology uses Routing and Flooding techniques for data transmission. The advantage of mesh topology is if one link breaks then it does not affect the whole network. And the disadvantage is, huge cabling is required and it is expensive. Q 35 Define Piggybacking? Ans In data transmission if the sender sends any data frame to the receiver then the receiver should send the acknowledgment to the sender.

The receiver will temporarily delay waits for the network layer to send the next data packet the acknowledgment and hooks it to the next outgoing data frame, this process is called as Piggybacking Q 36 In how many ways the data is represented and what are they? Audio: It is nothing but the continuous sound which is different from text and numbers. Video: Continuous visual images or a combination of images. Images: Every image is divided into pixels. And the pixels are represented using bits.

Pixels may vary in size based on the image resolution. Numbers: These are converted into binary numbers and are represented using bits. Text: Text is also represented as bits.

Q 38 How a Switch is different from a Hub? Ans Below are the differences between a Switch and a Hub, Below given snapshot clearly, explains the difference between a switch and a hub, Q 39 Define Round Trip Time? Ans The time taken for a signal to reach the destination and travel back to the sender with the acknowledgment is termed as Round Trip time RTT. Q 40 Define Brouter?

Hardware and Networking Interview Questions with Answers ~ Technical Support for Windows Server

Ans Brouter or Bridge Router is a device which acts as both bridge and a router. As a bridge, it forwards data between the networks. And as a router, it routes the data to specified systems within a network.

It is assigned by the Internet Service Provider as a permanent address. Dynamic IP is the temporary IP address assigned by the network to a computing device. Dynamic IP is automatically assigned by the server to the network device. Q 42 How VPN is used in the corporate world? Corporate companies, educational institutions, government offices etc use this VPN. Q 43 What is the difference between Firewall and Antivirus?

Ans Firewall and Antivirus are two different security applications used in networking. A firewall acts as a gatekeeper which prevents unauthorized users to access the private networks as intranets.

A firewall examines each message and blocks the same which are unsecured. Antivirus is a software program that protects a computer from any malicious software, any virus, spyware, adware etc.

Note: A Firewall cannot protect the system from virus, spyware, adware etc. Q 44 Explain Beaconing? Ans If a network self-repair its problem then it is termed as Beaconing. If a device in the network is facing any problem, then it notifies the other devices that they are not receiving any signal.

Likewise, the problem gets repaired within the network.

Networking Interview Questions

Q 45 Why the standard of an OSI model is termed as Ans OSI model was started in the month of February in So it is standardized as When a new device is added to the network, it broadcasts a message stating that it is new to the network.

Then the message is transmitted to all the devices of the network. Q 47 How can a network be certified as an effective network? What are the factors affecting them? The factors affecting the performance of a network are hardware, software, transmission medium types and the number of users using the network.

Reliability: Reliability is nothing but measuring the probability of failures occurred in a network and the time taken by it to recover from it. The factors affecting the same are the frequency of failure and recovery time from failure. Security: Protecting the data from viruses and unauthorized users.

The factors affecting the security are viruses and users who do not have permission to access the network. Q 48 Explain DNS? DNS acts as a translator between domain names and IP address. As humans remember names, the computer understands only numbers. Generally, we assign names to websites and computers like gmail.

When we type such names the DNS translates it into numbers and execute our requests. Translating the names into numbers or IP address is named as a Forward lookup. Translating the IP address to names is named as a Reverse lookup. This is used to design or develop standards that are used for networking.

Q 50 What is the use of encryption and decryption? Ans Encryption is the process of converting the transmission data into another form that is not read by any other device other than the intended receiver. Decryption is the process of converting back the encrypted data to its normal form.

An algorithm called cipher is used in this conversion process. Q 51 Brief Ethernet? For example, if we connect a computer and laptop to a printer, then we can call it as an Ethernet network. Ethernet acts as the carrier for internet within short distance networks like a network in a building. The main difference between Internet and Ethernet is security.

300 Core Java Interview Questions | Set 1

Ethernet is safer than the internet as Ethernet is a closed loop and has only limited access. Q 52 Explain Data Encapsulation? Ans Encapsulation means adding one thing on top of the other thing. When a message or a packet is passed through the communication network OSI layers , every layer adds its header information to the actual packet. This process is termed as Data Encapsulation. Note: Decapsulation is exactly the opposite of encapsulation. The process of removing the headers added by the OSI layers from the actual packet is termed as Decapsulation.

Q 53 How are networks classified based on their connections?

Similar files:

Copyright © 2019 ruthenpress.info. All rights reserved.
DMCA |Contact Us