Top Banner

of 46

Networking Q&A

Apr 03, 2018

Download

Documents

K Ravi Kumar
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
  • 7/29/2019 Networking Q&A

    1/46

    Sponsored Links

    Home>Networking QA

    Title: 25 Important Networking Interview Questions & Answers

    Q : What are the benefits of obtained by using the Client/Serveroriented TP Monitors? A : Client/Server applications development framework. Scalability of functions. Load balancing. High availability. MOM integration. Firewalls of protection Reduced system cost.

    Q : What are the services provided by the Operating System?A : Extended services - These are add-on modular software components thatare layered on top of base service.

    Q : What is Load balancing?A : If the number of incoming clients requests exceeds the number ofprocesses in a server class, the TP Monitor may start dynamically a newones and this is called Load balancing.

    Q : What is networking?A : Networking is the engineering discipline concerned with thecommunication between devices or computer systems.

    Q : What is a multi casting?A : A Multicasting is refer to a system, where a computers or network

    devices(node) sends out a message to a group of computers or networkdevices(node)in a network

    Q : What is MPLS?Where it is work?A : Multi Protocol Label Switching(MPLS). This protocol is mainly used forQOS(quality of service). It can handle the multi protocol via the path usingthe label ie done by label stacking.

    Q : What is a TP Monitor?A : There is no commonly accepted the definition for a TP monitor. Accordingto Jeri Edwards' a TP Monitor is "an OS for transaction processing".

    Q : What are the types of Transparencies?

    A : The transparencies types of NOS middleware is expected to provides are, Location transparency Namespace transparency Logon transparency Local/Remote access transparency Replication transparency Distributed time transparency Administration transparency and

    http://www.intervieweasy.com/index.htmhttp://www.intervieweasy.com/index.htmhttp://www.intervieweasy.com/myqa/category.php?catID=2http://www.intervieweasy.com/myqa/category.php?catID=2http://www.intervieweasy.com/myqa/category.php?catID=2http://www.intervieweasy.com/myqa/category.php?catID=2http://www.intervieweasy.com/index.htm
  • 7/29/2019 Networking Q&A

    2/46

    Failure transparency

    Q : What is MOM?A : Message Oriented Middleware (MOM) is allowed the general purposemessages to be exchanged in a Client/Server system using message

    queues. Applications are communicate over networks by simply puttingmessages in the queues and getting messages from queues. It is typicallyto provides a very simple high level APIs to its services. MOM's messagingand queuing allow the clients and servers to communicate across a networkwithout being linked by a private, dedicated, logical connection. The clientsand server can run at different times. It is a post-office like metaphor.

    Q : What is mean by Symmentric Multiprocessing (SMP)?A : SMP treats all the processors as equal. Any processor can do the workof any other processor. Applications are divided into the threads that can runconcurrently on any available processor. Any processor in the pool can runthe OS kernel and execute user-written threads.

    Q : Whats a Web server?A : This new model of Client/Server consists of thin, portable, "universal"clients that talk to the super fat servers. In the simplest form, a web serverreturns the documents when clients ask for them by name. The clients andserver communicate using an RPC-like protocol called HTTP.

    Q : What are the functions of the typical server program?A : Typical server program waits for the client-initiated requests. Executesmany requests at the same time. Takes care of VIP clients first. Initiates andruns background task activity. Keeps running. Grown bigger and faster.

    Q : What is meant by AMP?A : Asymmetric Multi processing imposes hierarchy and a division of labor

    among the processors. Only one designated processor, the master, controls(in a tightly coupled arrangement) slave processors dedicated to specificfunctions.

    Q : What means by 3-Tier architecture?A : In 3-tier Client/Server systems are the application logic (or process) livesin the middle tier and it is separated from the data and the user interface. Intheory, the 3-tier Client/Server systems are more scalable, robust andflexible.Example: TP monitor, Web.

    Q : What means by 2-Tier architecture?A : In 2-tier Client/Server systems are the application logic is either burried

    inside the user interface on the client or within the database on the server.Example: File servers and Database servers with stored procedures.

    Q : What is passive topology?A : In a Passive topology when the computers on the network simply listenand receive the signal, they are referred to as passive because they do notamplify the signal in any way.

  • 7/29/2019 Networking Q&A

    3/46

    Example - linear bus.

    Q : Whats the Protocol Data Unit?A : The data unit in the LLC level is called the protocol data unit (PDU). ThePDU contains the four fields a destination service access point (DSAP), a

    source service access the point (SSAP), a control field and an informationfield. DSAP, SSAP are addresses used by the LLC to identify the protocolstacks on the receiving and sending machines that are generating and usingthe data. The control field specifies whether the PDU frame is a informationframe (I - frame) or a supervisory frame (S - frame) or a unnumbered frame(U - frame).

    Q : What are major types of networks and explain it?A : There are two major types of networks, Server-based network. Peer-to-peer network.

    Peer-to-peer network, computers can act as both servers sharing resources

    and as clients using the resources.Server-based networks provide centralized control of network resources andrely on server computers to provide security and network administration.

    Q: Explain the SMTP?A : Simple Mail Transfer Protocol(SMTP) is a protocol for sending e-mailmessages between servers.

    Q : Define DNS?A : The DNS translates the Internet domain and host names to IP addresses.DNS automatically converts the names we type in our Web browser addressbar to the IP addresses of Web servers hosting those sites. DNS implementsa distributed database to store this name and address information for all

    public hosts on the Internet.

    Q : Whats the packet filter in Networking?A : Packet filter is a standard router equipped with the some extrafunctionality. The extra functionality allows in every incoming or outgoingpacket to be inspected. Packets are meeting some criterion are forwardednormally. Those that fail the test are dropped.

    Q : Whats VPN?A VPN is a service that offers secure, reliable connectivity over a sharedpublic the network infrastructure such as the Internet. VPNs maintain thesame security and management policies as a private network. They are themost cost effective method of establishing a virtual point-to-point connection

    between the remote users and an enterprise customer's network.

    Q : What is RAIDA method for providing the fault tolerance by using the multiple hard diskdrives.

    Q : Whats MAC address?A : The address for a device as it is identified at the Media Access Control

  • 7/29/2019 Networking Q&A

    4/46

    (MAC) layer in the network architecture. MAC address is usually stored in theRead only memory (ROM) on the network adapter card and is unique.

    Q : What is the ICMPA : Internet Control Message Protocol (ICMP) is a network layer protocol of

    the TCP/IP suite used by the hosts and gateways to send notification ofdatagram problems back to the sender. It is used to the echo test / reply totest whether a destination is reachable and responding. It is also handles theboth control and error messages.

    Q : What is hidden shares.A : Hidden or administrative shares are share names with a dollar sign ($) appended to their names.Administrative shares are usually created the automatically for the root of each drive letter. They do notappear in the network browse list.

    Q : What are the three types of domain controller does Exchange access?A: The three types of domain controllers are

    Normal Domain Controller Global Catalog, Configuration Domain Controller

    Q : What are the accessibility features in Windows 2000?A : The accessibility features in windows 2000 are StickyKeys, FilterKeys Narrator, Magnifier, and On-Screen Keyboard.

    Q : What are the disadvantages of circular logging?A : In the event of a corrupt database is a data can only be restored to the last backup.

    Q : What permissions does folder inherit from the parent?A : When you combine the NTFS permissions based on users and their group memberships, the least

    restrictive permissions take the precedence. However, explicit Deny entries always override Allow theentries.

    Q : Whats the difference between a task and a process? A : PROCESS : one or more PROCESS will be required to complete a task.TASK : A Particular Work to be Done is known as TASK.

    Q : What is a virtual memory?A : A virtual memory is a hardware technique where as the system appears to have more memory that itactually does. This is done by the time-sharing, the physical memory and storage parts of the memoryone disk when they are not actively being used.

    Q : What is cache memory?A : A Cache memory is a random access memory (RAM) that a computer microprocessor can accessmore quickly than it can access the regular RAM. As the microprocessor processes data, it looks like firstin the cache memory and if it finds the data there (from a previous reading of data), it doesnt have to dothe more time-consuming reading of sdata from larger memory.

    Q : What is the difference between Complier and Interpreter?A : An interpreter reads the one instruction at a time and carries out the actions implied by thatinstruction. It doesnt perform any translation. But a compiler translates the entire instructions.

  • 7/29/2019 Networking Q&A

    5/46

    Q : Differentiate between Primary storage and secondary storage?A : Main memory is only the large storage media that the CPU can access directly.

    Secondary storage is the extension of main memory that provides large nonvolatile storage capacity.

    Q : Different types of Real-Time Scheduling?

    A :There are two types of Real time SchedulingSoft real-time computing requires that critical processes receive priority over less fortunate ones.Hard real-time systems is required to complete a critical task within a guaranteed amount of time.

    Q : What is a Memory-Management Unit (MMU)?A : In MMU scheme, the value in the relocation register is added to the every address generated by auser process at the time it is sent to memory.Hardware device that maps the virtual to physical address.The user program deals with logical addresses; it never sees the real physical addresses.

    Q : What is multi tasking?A : Multitasking is the logical extension of multiprogramming .The concept of multitasking is a quite ofsimilar to multiprogramming but difference is that the switching between jobs occurs so frequently that the

    users can interact with each program while it is running. This concept is also known as a time-sharingsystems. A time-shared operating system uses CPU scheduling and multiprogramming to provide eachuser with a small portion of time-shared system.

    Q : What is Multi Programming?A : Multiprogramming is the technique of running several programs at a time using timesharing. It allowsa computer to do several things at the same time. Multiprogramming creates logical parallelism.

    The concept of multiprogramming is that the operating system keeps the several jobs in memorysimultaneously. The operating system selects a job from the job pool and starts executing a job, whenthat job needs to wait for any i/o operations the CPU is switched to another job. So the main idea here isthat the CPU is never idle.

    Q : What is Multi threading?A :Multi threading is an application typically is implemented as a separate process with the severalthreads of control. In some situations a single application may be required to perform several similar tasksfor example a web server accepts client requests for web pages, images, sound, and so forth. A busyweb server may have several of clients concurrently accessing it. If the web server ran as a traditionalsingle-threaded process, it would be able to service only one client at a time. The amount of time that aclient might have to wait for its request to be serviced could be enormous.

    So it is efficient to have one process that contains multiple threads to serve the same purpose. Thisapproach would multithread the web-server process, the server would create a separate thread thatwould listen for client requests when a request was made rather than creating another process it wouldcreate another thread to service the request.So to get the advantages like responsiveness, Resource sharing economy and utilization of

    multiprocessor architectures multithreading concept can be used .

    Q : What are the difference phases of software life cycle? A : Specification of the task Implementation (coding) Design of algorithms Maintenance and evolution of the system Testing and debugging Obsolescence

  • 7/29/2019 Networking Q&A

    6/46

    Q : How do you double-boot a Windows 2003 server box? A: The Boot .ini file is set as a read-only, system, and hidden to prevent is unwanted editing. To changethe Boot.ini timeout and default settings, use the System option in Control Panel from the Advanced taband

    Sponsored Links

    Home>Networking QA

    Title: Recent Linux Interview Questions & Answers

    Q : What is the real mean of DHCP?A : Dynamic Host Configuration Protocol(DHCP) is a protocol used to bynetworked devices (clients) to obtain the IP address.

    Q : Whats the difference between user right and user permission?A : User rights is that user is authorized to used password. if hispassword/file/dir is expired he is not able to loginUser permission is the user is permitted to to use file/directory.that is

    authentication. If he is authentication for particular file or not.

    Q : What is the difference between working directory and homedirectory?A : Home directory is the default working directory when a user logs in. Onthe other hand, working directory is the users current directory.

    Q : What is the difference between internal and external commands?A : Internal commands are that are already loaded in the system. They willbe executed any time and are independent.

    Q : What is the file server in Linux server? A : File server is used to for file sharing. It enables the processes required

    the fro sharing

    Q : How does the linux file system work?A : Linux file structure is a tree like structure. It begins from the rootdirectory, represented by '/', and then expands into sub-directories.

    Q : What is a Bash Shell?A : A Bash is a free of shell for UNIX. It is the default shell for most UNIXsystems. It has a combination of the C and Korn shell features.

    Q : What is a FIFO?A : A FIFO are otherwise called as 'named pipes'. FIFO (first-in-first-out) is a

    special file which is said to be data transient. Once data is read fromnamed pipe, it cannot be read again. Also, data can be read only in theorder written. It is used to the in inter process communication where aprocesswrites to one end of the pipe (producer) and the other reads from the otherend (consumer).

    Q : What is Linux Shell? What is Shell Script?A : Linux shell is a user interface used for executing the commands. But Shell

    http://www.intervieweasy.com/index.htmhttp://www.intervieweasy.com/index.htmhttp://www.intervieweasy.com/myqa/category.php?catID=2http://www.intervieweasy.com/myqa/category.php?catID=2http://www.intervieweasy.com/myqa/category.php?catID=2http://www.intervieweasy.com/myqa/category.php?catID=2http://www.intervieweasy.com/index.htm
  • 7/29/2019 Networking Q&A

    7/46

    is a program the user.

    Q : Discuss about the mount and unmount system calls ?A : The privileged mount system call is used to attach a file system to adirectory of another file system; The unmount system call detaches a filesystem. When you mount another file system on to your directory, you areessentially splicing one directory tree onto a branch in another directory tree.The first argument to mount call is the mount point, that is a directory in thecurrent file naming system. The second argument is the file system to mountto that point. When you insert a CDROM to your UNIX system's drive, the filesystem is in the CDROM automatically mounts to /dev/CDROM in yoursystem.

    Q : How can you set/get an environment variable from a program?A :. Setting the value of an environment variable is done by using `putenv()'.Getting the value of an environment variable is done by using `getenv()'

    Q : What is the complete name of the default configuration file forLILO?A : The default configuration file for the LILO is /etc/lilo.conf. You can use theanother file by using the -C option along with the name of the file.

    Q : What command should you use to check your filesystem? A : The fsck command is used to check the integrity of the filesystem on yourdisk.

    link in unix operating system ?

    A :Soft Links(Symbolic Links) :

    Links are different inode numbers.

    ls -l command shows all links with second column value 1 and the link points to original file.

    Link has the path for original file and not the contents.

    Removing soft link doesn't affect anything but removing original file , the link becomes "dangling" linkwhich points to nonexistant file.

    Hard Links :

    All Links are same inode number.

    ls -l command shows all the links with the link column(Second) shows No. of links.

    Links have actual file contents

    Removing any link ,just reduces the link count , but doesnt affect other links.

  • 7/29/2019 Networking Q&A

    8/46

    Q : What is the difference between STUB and LILO?A : LILO (LInux LOader) is a boot loader for Linux.STUB is a temporary implementaion of part of a program for debugging purposes.

    Q : What is UNIX Kernel.A : A UNIX Kernel is heart of the operating system. UNIX kernal is loaded first when UNIX system is

    booted. It handles allocation of devices, cpu, memory from that point on.

    Q : Do you have idea about "Shell Job Control"?A : Job control in Unix means is controlling the execution of jobs. Using fg (foreground), bg(background),jobs, kill, nice etc.. you can actually control the priorities, order and the number of jobs which are beingprocessed. The effective use of these commands is called Job control.

    Q : How many prompts are available in a UNIX system?A : Unix/ Linux Supports are four PromptsPS1, PS2, PS3, PS4

    Q : What is a Marshalling?A : Marshalling is a usually required when passing the output parameters of a program written in one

    language as input to a program is written in another language.

    Q : Explain about Scheduling.A : The way by which the processes are alloated to a CPU to use the CPU time is called scheduling.Schedulings are different types of algorithms FCFS(first come first serve) SJF(shortest job first) SHORTEST JOB NEXT ROUND ROBIN MULTILEVEL FEEDBACK SCHEDULING

    Q : How are devices represented in UNIX?A : All the devices are represented by files called special files that are located in/dev directory. Thus,

    device files and other files are named and accessed in the same way. A 'regular file' is just an ordinarydata file in the disk. A 'block special file' represents a device with characteristics similar to a disk (datatransfer in terms of blocks). A 'character special file' represents a device with characteristics similar to akeyboard (data transfer is by stream of bits in sequential order).

    Q : What is a FIFO?A :FIFO are otherwise called as 'named pipes'. FIFO (first-in-first-out) is a special file which is said to bedata transient. Once data is read from named pipe, it cant be read again. Also, data can be read only inthe order written. It is used to in interprocess communication where a process writes to one end of thepipe (producer) and the other reads from the other end (consumer).

    Q : What is the most graceful way to bring a system into single user mode? A : The most graceful way is to use the command init s. If you want to shut everything down before goingto single user mode then do init 0 first and from the ok prompt do a boot -s.

    Q : What is INODE?A : A unique number is associated with each filename. This number is used to look up an entry in theinode table which gives information on the type, size, and location of the file and the user id of the ownerof the file.

    Q : What is a statically linked file?

  • 7/29/2019 Networking Q&A

    9/46

    A : A statically linked program is one of that contains all the information (libraries) it needs to run. Itdoesnt need to load additional libraries in order to execute.

    Q : Whats the difference between Swapping and Paging?A : Swapping: Whole process is moved from the swap device to the main memory for execution. Processsize must be less than or equal to the available main memory. It is easier to implementation and

    overhead to the system. Swapping systems does not handle the memory more flexibly as compared tothe paging systems.Paging:Only the required memory pages are moved to main memory from the swap device for execution.Process size does not matter. Gives the concept of the virtual memory.Its provide the greater flexibility in mapping the virtual address space into the physical memory of themachine. Allows more number of processes to fit in the main memory simultaneously. Allows the greaterprocess size than the available physical memory. Demand paging systems handle the memory moreflexibly.

    Q : What is the main goal of the Memory Management?A : The memory management decides which process should reside in the main memory, Manages theparts of the virtual address space of a process which is non-core resident, Monitors are the available

    main memory and periodically write the processes into the swap device to provide more processes fit inthe main memory simultaneously.

    Q : How the Swapper works?A : The swapper is the only process that swaps the processes. The Swapper is operated only in theKernel mode and it doesnt use System calls instead it uses internal Kernel functions for swapping. It isthe archetype of all kernel process.

    Q : What is called page fault?A : A Page fault is referred to the situation when the process addresses a page in the working is a set ofthe process but the process fails to locate the page in the working set. And on a page fault the kernelupdates the working set by reading the page from the secondary device.

    Q : What is the different types of Unix systems?A : The most widely Unix systems used are:System V (AT&T) , AIX (IBM) , BSD (Berkeley) , Solaris (Sun), Xenix ( A PC version of Unix)

    Sponsored Links

    Home>Networking QA

    Title: Recent Networking Interview Questions and Answers

    Q : Explain the distance vector routing algorithm?A : Distance Vector Routing Algorithms is calculate a best route to reach adestination based solely on distance.

    Q : What is FTP & UDP? Whats the different version of IP?A : FTP or File Transfer Protocol is used to transfer data from one computerto another over the Internet, or through a networkUser Datagram Protocol (UDP) is one of the core protocols of the Internetprotocol suite. Using UDP, programs on the networked computers can sendshort messages sometimes known as datagrams(using Datagram Sockets)to one another.

    http://www.intervieweasy.com/index.htmhttp://www.intervieweasy.com/index.htmhttp://www.intervieweasy.com/myqa/category.php?catID=2http://www.intervieweasy.com/myqa/category.php?catID=2http://www.intervieweasy.com/myqa/category.php?catID=2http://www.intervieweasy.com/myqa/category.php?catID=2http://www.intervieweasy.com/index.htm
  • 7/29/2019 Networking Q&A

    10/46

    IP versions IPv6,IPv4

    Q : Why we use cross the cable to connect same devices? A : Same devices like PC-2-PC, it uses(NIC for PC) 1,2 for transmission &3,6 for reception. If we do not use cross cable then we can't transfer data.

    While in the case of switch/hub they receive (NIC of SWITCH/HUB)data on1,2 & transmit on 3,6.

    So we use straight cable for de-similar host & cross cable for similar hosts.

    Q : whats the difference between ATM and ISDN?A :ATM is Packet Switching or Cell switching. ISDN is a Circuite switching .

    Q : What is the TCP/IP ? what is the use of TCP/IP?A :Integrated Services refers to ISDN's ability to deliver at minimumof twosimultaneous connections, in any combination of data, voice, video, and fax,over a single line. Multiple devices can be attached to the line, and used as

    needed. That means an ISDN line can get care of most people's completecommunications needs at a much higher transmission rate, without forcingthe purchase of multiple analog phone lines.Asynchronous Transfer Mode (ATM) is a cell relay, packet switching networkand data link layer protocol which encodes data traffic into small (53 bytes;48 bytes of data and 5 bytes of header information) fixed-sized cells. ATMprovides data link layer services that run over Layer 1 links. This differs fromother technologies based on packet-switched networks (such as the InternetProtocol or Ethernet), in which variable sized packets (known as frameswhen referencing layer 2) are used. ATM is a connection-orientedtechnology, in which a logical connection is established between the twoendpoints before the actual data exchange begins.

    Q : What do you mean by Twisted-pair Cabling ?A : A type of cable that consists of two independently insulated wires twistedaround one another. The use of two wires twisted together helps to reducethe crosstalk and electromagnetic induction.

    Q :What is the seven layers in Open System Interconnection model.A : The seven layers are Application, Presentation, Session, Transport,Network, Data link, and Physical.

    Q : what is a Transaction server?A : A transaction server is the client invokes remote procedures that reside

    on the server with an SQL database engine. These remote procedures onthe server execute a group of SQL statements. The network exchangeconsists of a single request/reply message. The SQL statements either allsucceed or fail as a unit.

    Q : What is mean by Transparency?A : Transparency really means hiding the network and its servers from usersand even the application programmers.

  • 7/29/2019 Networking Q&A

    11/46

    Q :What are the two types of OLTP?A : TP lite, based on the stored procedures. TP heavy, based on the TPmonitors.

    Q : Difference between trigger and rule?

    A : The triggers are called implicitly by database generated events, whilestored procedures are called the explicitly by client applications.

    Q : Explain building blocks of Client/Server?A : The client side building block runs the client side of the application.The server side building block runs the server side of the application.

    Q : What is the Structured Query Langauge (SQL)?A : SQL is a powerful set-oriented language which was developed by IBMresearch for the databases that adhere to the relational model. It consists ofa short list of powerful, yet highly flexible, commands that can be used tomanipulate information collected in tables. Through the SQL, we canmanipulate and control sets of records at a time.

    Q : What are the main components of Transaction-based Systems?A : The main components of trasaction based systems are TransactionManager, and Resource Manager Application Program.

    Q : What is a File server?A : A File servers are useful for sharing files across a network. With a fileserver, the client passes requests for file records over network to the fileserver

    Q : Whats the differences between a domain and a workgroup?A : A domain, one or more computer can be a server to manage thenetwork. On the other hand in a workgroup in all computers are peers having

    no control on each other. In a domain, user doesnt need an account to logonon a specific computer if an account is available on the domain. In a workgroup user needs to have an account for every computer.In a domain, Computers can be on different local networks. In a work groupall computers needs to be a part of the same local network.

    Q : Explain the term Protocol?A : The term Protocol is a standard way of communicating across a network.A protocol is the "language" of the network. It is a method by which twodissimilar systems can communicate. TCP is a protocol which runs over anetwork.

    Q : What is Telnet?

    A : Telnet is the main part of Internet protocol for creating a connection to aremote server.

    Q : What is a MIB?A : A MIB (Management Information Base) is part of every SNMP-manageddevice. Each SNMP agent has the MIB database that contains informationabout the device's status, its performance, connections, and configuration.

  • 7/29/2019 Networking Q&A

    12/46

    The MIB is queried by SNMP.

    Q :What is a NVT (Network Virtual Terminal)?A : NVT is a set of rules defining a very simple virtual terminal interaction.The NVT is used in the start of a Telnet session.

    Q : What are the possible ways of data exchange?A : The possible ways of data exchange are Simplex and Half-duplex Full-duplex.

    Q : What are the main important topologies for networks?A : STAR topology:In this all computers are connected using a central hub.Advantages:Can be inexpensive, easy to install and reconfigure and easy to trouble shootphysical problems.

    BUS topology:

    In this each computer is directly connected to primary network cable in asingle line.Advantages:In expensive, easy to install, simple to understand, easy to extend.

    RING topology:In this all computers are connected in loop.Advantages:All computers have equal access to network media, installation can besimple, and signal does not degrade as much asin other topologies because each computer regenerates it.

    Q : What is a mesh networkA : A mesh network in which there are multiple network links betweencomputers to provide multiple paths for data to travel.

    Q : What is ACID property?A : The ACID is a term coined by Andrew Reuter in 1983, which stands forAtomicity, Consistence, Isolation and Durability.

    Q : What is a point-to-point protocol?A : Point to point protocol is a communications protocol used to connectcomputers to remote networking services including Internet service providers.

    Q : What are the most typical functional units of the Client/Server

    applications?A : There are User interface Business Logic and Shared data.

    Q : What are Triggers and Rules?A : Triggers are special user defined actions usually in the form of storedprocedures, that are automatically invoked by the server based on the datarelated events. It can perform complex actions and can use the full power ofprocedural languages.

  • 7/29/2019 Networking Q&A

    13/46

    A rule is a special type of trigger that is used to the perform simple checks ondata.

    Q : What is RPC?A : The Remote Procedure Call (RPC) hides the intricacies of the network by

    using the ordinary procedure call mechanism familiar to every programmer. Aclient process calls a function on a remote server and suspends itself until itgets back the results. Parameters are passed like in any ordinary procedure.The RPC, like an ordinary procedure, is synchronous. The process thatissues the call waits until it gets the results.Under the covers, the RPC run-time software collects values for theparameters, forms a message, and sends it to the remote server. The serverreceives the request, unpack the parameters, calls the procedures, andsends the reply back to the client. It is a telephone-like metaphor.

    Q : What is the difference between the transmission andcommunication?A : Transmission is a physical movement of information and concern issueslike bit polarity, synchronization, clock etc..Communication means themeaning full exchange of information between two communication media.

    Q : What is Beaconing?A : The process that allows a network to self-repair networks problems. Thestations on the network notify the other stations on the ring when they are notreceiving the transmissions. Beaconing is used in Token ring and FDDInetworks

    Q : Whats the difference between ARP and RARP?A : The address resolution protocol (ARP) is used to the associate the 32 bitIP address with the 48 bit physical address, used by a host or a router to findthe physical address of another host on its network by sending a ARP query

    packet that includes the IP address of the receiver.

    The reverse address resolution protocol (RARP) allows a host to discover itsInternet address when it is know only its physical address.

    Sponsored Links

    Home>Networking QA

    Title: Technical Interview Networking Questions with Answers

    1. Identify 2 features of PPP CHAP authentication?* Username and password is sent in clear text

    * Authentication messages are sent periodically during theconnection* Less secure then PAP* Local router challenges the remote routerCorrect answer: B DPPP CHAP authentication message are sent periodically during theconnection by challenging the other end of the connection.It is more secure than PAP and passwords and username areencrypted.

    http://www.intervieweasy.com/index.htmhttp://www.intervieweasy.com/index.htmhttp://www.intervieweasy.com/myqa/category.php?catID=2http://www.intervieweasy.com/myqa/category.php?catID=2http://www.intervieweasy.com/myqa/category.php?catID=2http://www.intervieweasy.com/myqa/category.php?catID=2http://www.intervieweasy.com/index.htm
  • 7/29/2019 Networking Q&A

    14/46

    2. Identify the default IPX serial encapsulation?* Novell-Ether* SDLC* SNAP* HDLCCorrect answer: DThe default IPX serial encapsulation is HDLC.

    3. Identify the hardware component that stores the backupconfiguration?* RAM* NVRAM* Flash* ROMCorrect answer: BNVRAM contains the backup config. RAM is the dynamic memoryarea, ROM contains the boot strap code and Flash contains the IOS.

    4. Identify the extended IP access-list number range?* 600 - 699* 1 - 99

    * 900 - 999* 100 - 199Correct answer: DThe extended IP access-list range is 100-199.

    5. Identify 3 Fast Ethernet technologies?* 100 Base FastEther* 100 Base FX* 100 Base T4* 100 BaseTXCorrect answer: B C D

    6. BaseFastEther is false. 100 Base FX, TX and T4 are all valid.7. Identify the OSI layer which is responsible for end-to-end

    connections?

    * Network* Transport* Session* Data link* TCPCorrect answer: BLayer 4 is the Transport layer and is responsible for end-to-endconnections.

    8. Identify the 2 characteristics regarding MAC addresses?* Contains a network portion and host portion* Always assigned by System Administrator* 48 bits long* Contains a vendor code and serial numberCorrect answer: C DMAC addresses are assigned by the vendor. Each MAC address is48 bits long and made up of 24 bits vendor code and 24 bits serialnumber.

    9. Identify the number range for IPX SAP filters?* 900 - 999* 1000 - 1099* 800 -899* 100 - 199

  • 7/29/2019 Networking Q&A

    15/46

    Correct answer: BThe IPX SAP filtering range is 1000-1099.

    10. What is the purpose of ARP?* IP to host name resolution* Host name to IP address resolution* Mac to IP address resolution* IP to Mac address resolutionCorrect answer: DAddress Resolution Protocol resolves the MAC address if the IPaddress is known. It is a layer 3 protocol.

    11. Which OSI layer establishes, maintains and terminates sessionsbetween hosts?* Application* Physical* Data-Link* Presentation* Network* SessionCorrect answer: F

    Layer 5 the Session layer performs this function.12. Which statement is true regarding Administrative distance?

    * It is a metric* Number of hops between two routers* Trustworthiness of the routing information* RIP Administrative distance is 100Correct answer: CAdministrative distance is rating of trustworthiness of the routinginformation. The lower the AD the better the information.

    13. Identify the purpose of the Pingcommand?* Share routing information with a neighbor router* Transmit user data when buffers are full* Test connectivity at layer 3

    * Test entire protocol stackCorrect answer: CThe ping command tests layer 3 connectivity.

    14. Identify the order of the 5 step encapsulation?1. Create the segment2. Convert the frame to bits3. Create the packet4. Create the frame5. User creates the data* 1,2,4,2,5* 2,1,3,4,5* 5,1,3,4,2* 5,3,4,1,2Correct answer: CCisco 5 step encapsulation.1) User creates Data2) Data is converted into a segment at layer 43) The segment is converted to packet at layer 34) The packet it converted into a frame at layer 25) The frame is converted into bits at layer 1

    15. The Cisco IOS is stored where?* ROM

  • 7/29/2019 Networking Q&A

    16/46

    * CD* Flash* NVRAMCorrect answer: CBy default the Cisco IOS is stored in flash.

    16. Sequence and acknowledgement numbers are used for?* Layer transitioning* Flow control* Port number addressing* ReliabilityCorrect answer: DTCP uses sequence numbers and acknowledgements to implementreliability.

    17. Identify IPX GNS and its purpose?* Go Network Server - sends a print job to a network server* Get Nearest Server - locate the nearest server* Guaranteed Network Services - allocates resources to users* Get Notes Server - locates Domino ServerCorrect answer: B

    GNS stands for Get Nearest Server, initiated by a workstation.18. Identify the true statement regarding subnetting?

    * Allows for more host address* Borrow bits from the network portion of the address* Allows for unlimited number of networks* Borrow bits from the host portion of the addressCorrect answer: DSubnetting involves borrowing bits for the host portion of the addressto be used to subnet addressing.

    19. Inverse ARP serves what purpose?* Method for a local router to introduce itself to the remote end of theconnection* Broadcast a routing table update

    * Identify MAC addresses if the IP address is known* Sent every 10 seconds used to verify the Frame Switch is stillactiveCorrect answer: AInverse ARP operates in a Frame Relay network so the two endpoints can identify themselves to each other.

    20. Identify 3 characteristics of a MAC address?* Burned into the NIC* 48 bits long* Length is 32 bits* Used to deliver the frame to the end device* Contains a network portion and a host portionCorrect answer: A B DThe MAC address is 48 bits long not 32. It does NOT contain anetwork and host portion with the address. It is used to deliver theframe to the destination device.

    21. Identify 3 IP routing protocols?* RIP* AURP* OSPF* IGRP* ARP

  • 7/29/2019 Networking Q&A

    17/46

    * ICMPCorrect answer: A C DAURP and ICMP are not routing protocols.

    22. Identify the type of routing protocol that exchanges entire routingtables at regular intervals?* Link state* Interior gateway protocols* Appletalk routing* Distance vectorCorrect answer: DDistance Vector routing protocols exchange entire routing tables withits neighbors. LinkStaterouting protocols exchange LSPs to shareinformation regarding the networks they know.

    23. Identify the type of hardware required to connect a Token ringnetwork to an Ethernet network?* Repeater* TR-Enet* Router* Token Ring to Ethernet translation hub

    Correct answer: CRouters are used to connect dissimilar networks with differentaccess-methods, like connecting Token Ring to Ethernet.

    24. Identify 3 characteristics regarding CDP?* On by default* Shows only directly connected neighbors* Requires IP or IPX* 60 second update interval by default* 30 second updates interval by defaultCorrect answer: A B DCDP stands for Cisco Discovery Protocol. It is used to discoverdirectly connected neighbors, it is on by default and has a 60 secondupdate interval by default.

    25. Identify 2 transport layer protocols?* IP* TCP* CDP* ARP* UDPCorrect answer: B ETPCand UDP are 2 layer4 Transport protocols.

    26. Identify 2 features of X.25?* Supports only IP* Utilizes switched and permanent virtual circuits* Contains minimal flow control and error recovery* Utilizes LAPB as its data-link protocolCorrect answer: B DX.25 utilizes LAPB and uses switched and permanent VCs. Itsupports multiple layer protocols and is heavy laden with errordetection and correction mechanisms.

    27. Identify the purpose of the Trace command?* Explorer packet transmitting routing information* Test connectivity* Determine the path a packet is taking through the network* Transmits user data when buffers are full

  • 7/29/2019 Networking Q&A

    18/46

    Correct answer: CThe trace command is used to determine the path a packet hastaken through the network.

    28. Identify the purpose of the TCP 3 step handshake?* Setup a un-reliable connection* Initialize routing tables* Synchronize sequence numbers between hosts* Connection tear down processCorrect answer: CThe 3 step handshake establishes the parameters required for aTCP connection. During the handshake process sequence numbersare synchronized allowing for the end points to properly acknowledgeand re-assemble the segments.

    29. Identify 2 PPP characteristics?* Is proprietary to Cisco* Supports authentication* Support compression* Run on a multi-access networkCorrect answer: B C

    PPP supports authentication; PAP and CHAP. It also supportscompression; Stacker and Predictor.

    30. Which statement is true regarding half duplex?* Only works in a point-to-point configuration* Allows for transmitting and receiving but not a the same time* Allow for transmitting and receiving of data simultaneously* Doubles the bandwidthCorrect answer: B

    Sponsored Links

    Home>Networking QA

    Title: Networking Protocols Interview Questions and Answers

    1. To prevent Service Advertisements (SAPs) from flooding a network,Cisco routers do not forward them. How are services advertised toother networks?* Each router builds its own SAP table and forwards that every 60seconds.* Each router assigns a service number and broadcasts that.* SAPs arent necessary with Cisco routers. * Cisco routers filter out all SAPs.Correct answer: ACisco routers build SAP tables and forward the table every 60seconds. All SAPs cant be filtered even with 4.x since NDS and timesynchronization uses SAPs.

    2. Novells implementation of RIP updates routing tables every ____seconds.

    http://www.intervieweasy.com/index.htmhttp://www.intervieweasy.com/index.htmhttp://www.intervieweasy.com/myqa/category.php?catID=2http://www.intervieweasy.com/myqa/category.php?catID=2http://www.intervieweasy.com/myqa/category.php?catID=2http://www.intervieweasy.com/myqa/category.php?catID=2http://www.intervieweasy.com/index.htm
  • 7/29/2019 Networking Q&A

    19/46

    * 60* 90* 10* 30Correct answer: ANovells RIP updates routing tables every 60 seconds, Apples RTMP

    is every 10 seconds, routers ARP every 60 seconds, IGRP signalevery 90 seconds, and Banyan VINES signals every 90 seconds.

    3. In Novells use of RIP, there are two metrics used to make routingdecisions. Select the two metrics.* Ticks.* Hops* Loops* CountsCorrect answer: A &BIt first uses ticks (which is about 1/18 sec.); if there is a tie, it useshops; if hops are equal, then it uses an administratively assignedtiebreaker.

    4. What is the Cisco name for the encapsulation type used on a serial

    interface?* HDLC* SDLC* SAP* SNAPCorrect answer: A

    5. arpa is used by the Cisco IOS for which encapsulation types? * Ethernet_II* Ethernet_802.3* Ethernet_802.2* Ethernet_SNAPCorrect answer: A

    6. Novells IPX and Ciscos IOS name their protocols differently. Cisco

    uses sap for Ethernet_802.2, Token-Ring, and Novells FDDI_802.2.Cisco uses snap for Ethernet_SNAP, Token-Ring_SNAP, andFDDI_SNAP. Cisco uses arpa for Ethernet_II and, finally the defaultis Novell-ether for Novells Ethernet_802.3. snap is used by theCisco IOS for which encapsulation types?* Ethernet_SNAP* Token-Ring_SNAP* FDDI_SNAP* Novell-SNAP* Novell-FDDI.Correct answer: A,B &C

    7. Novells IPX and Ciscos IOS name their protocols differently. Ciscouses sap for Ethernet_802.2, Token-Ring, and Novells FDDI_802.2.Cisco uses snap for Ethernet_SNAP, Token-Ring_SNAP, andFDDI_SNAP. Cisco uses arpa for Ethernet_II and, finally the defaultis Novell-ether for Novells Ethernet_802.3.15 sap is used by theCisco IOS for which encapsulation types?* Ethernet_802.2* Token-Ring* FDDI_SNAP* Ethernet_802.3* FDDI_802.2

  • 7/29/2019 Networking Q&A

    20/46

    Correct answer: A,B &E8. Novells IPX and Ciscos IOS name their protocols differently. Cisco

    uses sap for Ethernet_802.2, Token-Ring, and Novells FDDI_802.2.Cisco uses snap for Ethernet_SNAP, Token-Ring_SNAP, andFDDI_SNAP. Cisco uses arpa for Ethernet_II and, finally the defaultis Novell-ether for Novells Ethernet_802.3. Which type of Ethernetframing is used for TCP/IP and AppleTalk?* Ethernet 802.3* Ethernet 802.2* Ethernet II* Ethernet SNAPCorrect answer: DEthernet 802.3 is used with NetWare versions 2 through 3.11,Ethernet 802.2 is used with NetWare 3.12 and later plus OSI routing,Ethernet II is used with TCP/IP and DECnet, and Ethernet SNAP isused with TCP/IP and AppleTalk.

    9. Which type of Ethernet framing is used for TCP/IP and DECnet?* Ethernet 802.3* Ethernet 802.2

    * Ethernet II* Ethernet SNAPCorrect answer: CEthernet 802.3 is used with NetWare versions 2 through 3.11,Ethernet 802.2 is used with NetWare 3.12 and later plus OSI routing,Ethernet II is used with TCP/IP and DECnet, and Ethernet SNAP isused with TCP/IP and AppleTalk.

    10. You are a system administrator on a NetWare network, you arerunning NetWare 4.11 and you cannot communicate with your router.What is the likely problem?* NetWare 4.11 defaults to 802.2 encapsulation.* NetWare 4.11 defaults to 802.3 encapsulation* Cisco routers only work with NetWare 3.11.

    * NetWare 3.11 defaults to 802.2 encapsulation.Correct answer: AThe default encapsulation on Cisco routers is Novell Ethernet_802.3and NetWare 3.12 and later defaults to 802.2 encapsulation, 3.11and earlier defaults to 802.3.

    11. NetWare IPX addressing uses a network number and a nodenumber. Which statements are true?* The network address is administratively assigned and can be up to16 hexadecimal digits long.* The node address is always administratively assigned.* The node address is usually the MAC address.* If the MAC address is used as the node address, then IPXeliminates the use of ARP.Correct answer: A, C &DThe network address can be up to 16 hexadecimal digits in length.The node number is 12 hexadecimal digits. The node address isusually the MAC address. An example IPX address is4a1d.0000.0c56.de33. The network part is 4a1d. The node part is0000.0c56.de33. The network number is assigned by the systemadministrator of the Novell network.

    12. Which NetWare protocol works on layer 3network layerof the OSImodel?

  • 7/29/2019 Networking Q&A

    21/46

    * IPX* NCP* SPX* NetBIOSCorrect answer: AIPX (Internetwork Packet Exchange) is a NetWare network layer 3protocol used for transferring information on LANs.

    13. Which NetWare protocol provides link-state routing?* NLSP* RIP* SAP* NCPCorrect answer: ANetWare Link Services Protocol (NLSP) provides link-state routing.SAP (Service Advertisement Protocol) advertises network services.NCP (NetWare Core Protocol) provides client-to-server connectionsand applications. RIP is a distance vector routing protocol.

    14. As a system administrator, you want to debug igrp but are worriedthat the debug IP igrp transaction command will flood the console.

    What is the command that you should use?* debug IP igrp event* debug IP igrp-events* debug IP igrp summary* debug IP igrp eventsCorrect answer: DThe debug IP igrp events is used to only display a summary ofIGRP routing information. You can append an IP address onto eithercommand to see only the IGRP updates from a neighbor.

    15. What does the following series of commands accomplish? router igrp71 network 10.0.0.0 router igrp 109 network 172.68.7.0* It isolates networks 10.0.0.0 and 172.68.7.0.* It loads igrp for networks 109 and 71.

    * It disables RIP.* It disables all routing protocols.Correct answer: AIt isolates network 10.0.0.0 and 172.68.7.0 and associatesautonomous systems 109 and 71 with IGRP. IGRP does not disableRIP, both can be used at the same time.

    16. In the command router igrp 109 what does 109 signify? * an autonomous system* any network number which the router is attached to* the allowable length of the routing table* the network socket numberCorrect answer: AThe Cisco IOS global configuration command router igrp xxx isused to configure the Interior Gateway Routing Protocol. In this case,the 109 is called the process-id , which can also be used for anautonomous system number.

    17. IGRP supports a feature that allows traffic to be distributed among upto 6 (4 default) paths to provide greater overall throughput andreliability. What is this called?* unequal-cost load balancing* equal-cost load balancing* proportionate load balancing

  • 7/29/2019 Networking Q&A

    22/46

    * low cost load balancingCorrect answer: AAn unequal-cost load balancing is used to provide alternate paths fordata distribution on an internetwork. Cisco developed this method touse unused or under utilized links to increase bandwidth and networkavailability.

    18. IGRP uses flash updates, poison reverse updates, holddown times,and split horizon. How often does it broadcast its routing tableupdates?* 90 seconds* 10 seconds* 30 seconds* 45 secondsCorrect answer: A

    19. The command show IP protocol displays which information?* routing timers* network information* contents of the IP routing table* information about all known network and subnetworks

    Correct answer: A & Bshow IP protocol displays routing timers and network information.show IP route displays the routing table with information about allknown networks and subnetworks.

    20. When using RIP, routing updates are broadcast every ____ seconds.* 30* 10* 60* 90Correct answer: ANovells RIP updates routing tables every 60 seconds, Apples RTMPis every 10 seconds, routers ARP every 60 seconds, DECnet hostsand IGRP signal every 15 seconds, and Banyan VINES signals

    every 90 seconds.21. An autonomous system can only exist if all routers in that system

    meet which criteria?* interconnected* run the same routing protocol* assigned same autonomous system number* run IGRP only* run RIP onlyCorrect answer: A,B &CAn autonomous system is a set of routers and networks under thesame administration. Each router must be interconnected, run thesame routing protocol, and assigned the same autonomous systemnumber. The network Information Center (NIC) assigns a uniqueautonomous system number to enterprises.

    22. A default route is analogous to a _________.* default gateway* static route* dynamic route* one-way routeCorrect answer: AA default route is analogous to a default gateway. It is used to reducethe length of routing tables and to provide complete routing

  • 7/29/2019 Networking Q&A

    23/46

    capabilities when a router might not know the routes to all othernetworks.

    23. Routers can learn about destinations through static routes, default, ordynamic routing. By default, a router will use information derivedfrom __________.* IGRP* RIP* IP* TCPCorrect answer: AThe quality of information is rated:Connected interface 0Static route 1IGRP 100RIP 120Unknown 255The lower the value, the more reliable the source with 255 signifyinginformation that the router will ignore. So, the router will use IGRP,rated at 100, before RIP, rated at 120.

    24. You are logged into a router, what command would show you the IPaddresses of routers connected to you?* show cdp neighbors detail* show run* show neighbors* show cdpCorrect answer: A

    25. As a system administrator, you perform an extended ping at theprivileged EXEC prompt. As part of the display, you see Set DF bitin IP header? [yes] : What would happen if you answered no at theprompt.* This lets the router fragment the packet.* It tells the router not to fragment the packet.

    * This lets the router direct the packet to the destination it finds in itsrouting table.* It tell the router to send the packet to the next hop routerCorrect answer: ASet DF bit in IP header? is a response to an extended ping at therouter. If you answer yes (the default) the router will not fragment thepacket. If you answer no, the router will fragment the packet.

    26. You have typed ping 172.16.101.1 and get the following display :Type escape sequence to abort. Sending 5, 100-byte ICMP Echoesto 172.16.101.1, timeout is 2 seconds:.!!!!What does the . signify?* That one message timed out.* That all messages were successful.* That one message was successful.* That one message completed in under the allotted timeframe.Correct answer: AThe possible responses from the ping command are: ! Successfulreceipt of an echo reply. Timed out waiting for a reply U Destinationunreachable C Congestion-experienced packet I Ping interrupted ?Packet type unknown & Packet TTL exceeded

    27. Which command, that is used to test address configuration, uses

  • 7/29/2019 Networking Q&A

    24/46

    Time-To-Live (TTL) values to generate messages from each router.* trace* ping* telnet* bootpCorrect answer: AThe Cisco IOS EXEC command trace [protocol] [destination] isused to discover routes that packets will travel to their destinationhosts. Trace uses TTL (Time to Live) values to report destinationroute information.

    28. What does the command IP name-server 255.255.255.255accomplish?

    * It sets the domain name lookup to be a local broadcast.* This is an illegal command.* It disables domain name lookup.* The command is now defunct and has been replaced by IP server-name ip anyCorrect answer: A

    By default DNS is enabled on a router with a server address of255.255.255.255, which provides for a local broadcast.

    29. As a system administrator, you need to provide your routers with aDomain Name System (DNS) server. How many DNS servers canyou specify with one command?* 6* 1* 2* 4Correct answer: AYou can only specify six name servers in one command. The syntaxis IP name-server server-address1 [[ server-address2 ]server-

    address6]. You must also enableDNS.

    30. How would you configure one host name that points to two IPaddresses?* IP host jacob 1.0.0.5 2.0.0.8* IP jacob 1.0.0.5 2.0.0.8* IP host jacob 1.0.0.5* IP host duplicate allCorrect answer: A

    Sponsored Links

    Home>Networking QA

    Title: Advanced Networking Questions and Answers

    1. When configuring the subnet mask for an IP address, which formatscan be used?

    http://www.intervieweasy.com/index.htmhttp://www.intervieweasy.com/index.htmhttp://www.intervieweasy.com/myqa/category.php?catID=2http://www.intervieweasy.com/myqa/category.php?catID=2http://www.intervieweasy.com/myqa/category.php?catID=2http://www.intervieweasy.com/myqa/category.php?catID=2http://www.intervieweasy.com/index.htm
  • 7/29/2019 Networking Q&A

    25/46

    * dotted-decimal.* Hexadecimal* Bit-count* Octal* BinaryCorrect answer: A, B &C

    2. You are given the following address: 153.50.6.27/25. Determine thesubnet mask, address class, subnet address, and broadcastaddress.* 255.255.255.128, B,153.50.6.0, 153.50.6.127* 255.255.255.128, C,153.50.6.0, 153.50.6.127* 255.255.255.128, C,153.50.6.127, 153.50.6.0* 255.255.255.224, C,153.50.6.0, 153.50.6.127Correct answer: A

    3. You are given the following address: 128.16.32.13/30. Determine thesubnet mask, address class, subnet address,and broadcast address.* 255.255.255.252, B,128.16.32.12, 128.16.32.15* 255.255.255.252, C,128.16.32.12, 128.16.32.15

    * 255.255.255.252, B,128.16.32.15, 128.16.32.12* 255.255.255.248, B,128.16.32.12, 128.16.32.15Correct answer: A

    4. You are given the following address: 15.16.193.6/21. Determine thesubnet mask, address class, subnet address,and broadcast address.* 255.255.248.0, A, 15.16.192.0, 15.16.199.255* 255.255.248.0, B, 15.16.192.0, 15.16.199.255* 255.255.248.0, A, 15.16.199.255, 14.15.192.0* 255.255.242.0, A, 15.16.192.0, 15.16.199.255Correct answer: A

    5. You have an IP host address of 201.222.5.121 and a subnet mask of255.255.255.248. What is the broadcast address?

    * 201.222.5.127* 201.222.5.120* 201.222.5.121* 201.222.5.122Correct answer: AThe easiest way to calculate this is to subtract 255.255.255.248(subnet mask) from 255.255.255.255, thisequals 7. Convert the address 201.222.5.121 to binary1100100111011110 00000101 01111001. Convert themask 255.255.255.248 to binary11111111 11111111 1111111111111000. AND them together to get: 11001001 11011110

    6. 01111000 or 201.222.5.120. 201.222.5.120 is the subnet address,add 7 to this address for 201.222.5.127 orthe broadcast address. 201.222.5.121 through 201.222.5.126 are thevalid host addresses.

    7. Given the address 172.16.2.120 and the subnet mask of255.255.255.0. How many hosts are available?* 254* 510* 126* 16,372Correct answer: A

  • 7/29/2019 Networking Q&A

    26/46

    172.16.2 120 is a standard Class B address with a subnet mask thatallows 254 hosts. You are a network administrator and have beenassigned the IP address of 201.222.5.0. You need to have 20subnets with 5 hosts per subnet. The subnet mask is255.255.255.248.

    8. Which addresses are valid host addresses?* 201.222.5.17* 201.222.5.18* 201.222.5.16* 201.222.5.19* 201.222.5.31Correct answer: A,B & DSubnet addresses in this situation are all in multiples of 8. In thisexample, 201.222.5.16 is the subnet, 201.22.5.31 is the broadcastaddress. The rest are valid host IDs on subnet 201.222.5.16.

    9. You are a network administrator and have been assigned the IPaddress of 201.222.5.0. You need to have 20 subnets with

    10. hosts per subnet. What subnet mask will you use?* 255.255.255.248

    * 255.255.255.128* 255.255.255.192* 255.255.255.240Correct answer: ABy borrowing 5 bits from the last octet, you can. have 30 subnets. Ifyou borrowed only 4 bits you could only have 14 subnets. Theformula is (2 to the power of n)-2. By borrowing 4 bits, you have(22x22)-2=14. By borrowing 5 bits, you have (22x22x2)-2=30.To get 20 subnets, you would need to borrow 5 bits so the subnetmask would be 255.255.255.248.

    11. You are given the IP address of 172.16.2.160 with a subnet mask of255.255.0.0. What is the network address in binary?* 10101100 00010000

    * 00000010 10100000* 10101100 00000000* 11100000 11110000Correct answer: ATo find the network address, convert the IP address to binary10101100 000100000 00000010 10100000then ANDed it with thesubnet mask11111111 11111111 00000000 00000000. The rest is10101100 00010000 00000000 00000000, which is 172.16.0.0 indecimal.The first octet rule states that the class of an address can bedetermined by the numerical value of the first octet.

    12. Which addresses are INCORRECTLY paired with their class?* 128 to 191, Class B* 192 to 223 Class B* 128 to 191, Class C* 192 to 223, Class CCorrect answer: B & CAddress classes are: 1 to 126, Class A; 128 to 191, Class B, 192 to223, Class C; 224 to 239, Class D; and

    13. to 255, Class E. The first octet rule states that the class of anaddress can be determined by the numerical value of the first octet.

    14. Which addresses are INCORRECTLY paired with their class?

  • 7/29/2019 Networking Q&A

    27/46

    * 1 to 126, Class A* 128 to 191, Class A* 1 to 126, Class B* 128 to 191, Class BCorrect answer: B & C.Address classes are: 1 to 126, Class A; 128 to 191, Class B, 192 to223, Class C; 224 to 239, Class D; and

    15. to 255, Class E. The first octet rule states that the class of anaddress can be determined by the numerical value of the first octet.

    16. Which addresses are INCORRECTLY paired with their class?* 240 - 255, Class D* 240 - 255, Class E* 224 - 239, Class D* 224 - 239, Class ECorrect answer: A & DAddress classes are: 1 to 126, Class A; 128 to 191, Class B, 192 to223, Class C; 224 to 239, Class D; and 240 to 255, Class E.

    17. Which IP Address Class is INCORRECTLY paired with its range ofnetwork numbers?

    * Class A addresses include 192.0.0.0 through 223.255.255.0* Class A addresses include 1.0.0.0 through 126.0.0.0* Class B addresses include 128.0.0.0 through 191.255.0.0* Class C addresses include 192.0.0.0 through 223.255.255.0* Class D addresses include 224.0.0.0 through 239.255.255.0Correct answer: AClass A addresses include 1.0.0.0 through 126.0.0.0Class B addresses include 128.0.0.0 through 191.255.0.0Class C addresses include 192.0.0.0 through 223.255.255.0Class D addresses include 224.0.0.0 through 239.255.255.0

    18. Which IP Address Class can have 16 million subnets but support 254hosts?* Class C

    * Class A* Class B* Class DCorrect answer: APossible Subnets IP Address Class Possible Hosts

    19. A 16M.64K B 64K16M C 254

    20. Which IP Address Class can have 64,000 subnets with 64,000 hostsper subnet?* Class B* Class A* Class C* Class DCorrect answer: AIP Address Class Possible Subnets Possible Hosts

    21. A 16M64K B 64K16M C 254

    22. There are two processes to pair MAC address with IP addresses.Which process finds an IP address from a MAC address?* RARP

  • 7/29/2019 Networking Q&A

    28/46

    * ARP* RIP* IGRPCorrect answer: AARP (Address Resolution Protocol) maps an IP address to the MACaddress, RARP (Reverse Address Resolution Protocol) maps theMAC address to the IP address. ARP and RARP work at the internetlayer of the Internet Model or the network layer of the OSI model.

    23. When the router runs out of buffer space, this is called ________.* Source Quench* Redirect* Information Request* Low MemoryCorrect answer: ASource quench is the process where the destination router, or endinternetworking device will quench the date from the source, orthe source router. This usually happens when the destination routerruns out of buffer space to process packets.

    24. Which protocol carries messages such as destination Unreachable,

    Time Exceeded, Parameter Problem, Source Quench, Redirect,Echo, Echo Reply, Timestamp, Information Request, InformationReply, Address Request, and Address Reply?* ICMP* UDP* TCP* TFTP* FTPCorrect answer: AICMP (Internet Control Message Protocol) is a network layer internetprotocol described in RFC # 792. ICMP reports IP packet informationsuch as destination Unreachable, Time Exceeded, ParameterProblem, Source Quench, Redirect, Echo, Echo Reply, Timestamp,

    Information Request, Information Reply, Address Request, andAddress Reply.25. Two of the protocols that can be carried in the Protocol field of an IP

    packet are?* TCP* UDP* FTP* TFTPCorrect answer: A & BThe following are the fields in an IP segment,their length, and their definitions:VERS (Version number - 16 bits)HLEN (Number of 32-bit words in the header - 4 bits)Type of Server (How the datagram should be handled - 32 bits)Total Length (Total length of header and data - 32 bits)Identification (Provide fragmentation of datagrams to allow differentMTUs in the internet - 4 bits)Flags (Provide fragmentation of datagrams to allow different MTUs inthe internet - 4 bits)Frag Offset (Provide fragmentation of datagrams to allow differentMTUs in the internet - 6 bits)TTL (Time-To-Live - 6 bits)

  • 7/29/2019 Networking Q&A

    29/46

    Protocol (Upperlayer protocol sending the datagram - 16 bits)Header Checksum )Integrity check on the header - 16 bits)Source IP Address (32 bits)Destination IP Address (32 bits)IP Options (network testing, debugging, security and others - 4 bits)Data (4 bits).

    26. Where would network testing be included in an IP packet?* IP Options field* Identification field* Type of Service field* Reservation fieldCorrect answer: AThe following are the fields in an IP segment, their length, and theirdefinitions:VERS (Version number - 16 bits)HLEN (Number of 32-bit words in the header - 4 bits)Type of Server (How the datagram should be handled - 32 bits)Total Length (Total length of header and data - 32 bits)Identification (Provide fragmentation of datagrams to allow different

    MTUs in the internet - 4 bits)Flags (Provide fragmentation of datagrams to allow different MTUs inthe internet - 4 bits)Frag Offset (Provide fragmentation of datagrams to allow differentMTUs in the internet - 6 bits)TTL (Time-To-Live - 6 bits)Protocol (Upperlayer protocol sending the datagram - 16 bits)Header Checksum )Integrity check on the header - 16 bits)Source IP Address (32 bits)Destination IP Address (32 bits)IP Options (network testing, debugging, security and others - 4 bits)Data (4 bits).

    27. What field tells the Internet layer how to handle an IP packet?

    * Type of Service* Identification* Flags* Frag OffsetCorrect answer: AThe following are the fields in an IP segment, their length, and theirdefinitions:VERS (Version number - 16 bits)HLEN (Number of 32-bit words in the header - 4 bits)Type of Server (How the datagram should be handled - 32 bits)Total Length (Total length of header and data - 32 bits)Identification (Provide fragmentation of datagrams to allow differentMTUs in the internet - 4 bits)Flags (Provide fragmentation of datagrams to allow different MTUs inthe internet - 4 bits)Frag Offset (Provide fragmentation of datagrams to allow differentMTUs in the internet - 6 bits)TTL (Time-To-Live - 6 bits)Protocol (Upperlayer protocol sending the datagram - 16 bits)Header Checksum )Integrity check on the header - 16 bits)Source IP Address (32 bits)Destination IP Address (32 bits)

  • 7/29/2019 Networking Q&A

    30/46

    IP Options (network testing, debugging, security and others - 4 bits)Data (4 bits).

    28. Which fields of an IP packet provide for fragmentation of datagramsto allow differing MTUs in the internet?* Identification* Flags* Frag Offset* Type of Service* Total LengthCorrect answer: A, B & CThe following are the fields in an IP segment, their length, and theirdefinitions:VERS (Version number - 16 bits)HLEN (Number of 32-bit words in the header - 4 bits)Type of Server (How the datagram should be handled - 32 bits)Total Length (Total length of header and data - 32 bits)Identification (Provide fragmentation of datagrams to allow differentMTUs in the internet - 4 bits)Flags (Provide fragmentation of datagrams to allow different MTUs in

    the internet - 4 bits)Frag Offset (Provide fragmentation of datagrams to allow differentMTUs in the internet - 6 bits)TTL (Time-To-Live - 6 bits)Protocol (Upperlayer protocol sending the datagram - 16 bits)Header Checksum )Integrity check on the header - 16 bits)Source IP Address (32 bits)Destination IP Address (32 bits)IP Options (network testing, debugging, security and others - 4 bits)Data (4 bits).

    29. Which processes does TCP, but not UDP, use?* Windowing* Acknowledgements

    * SourcePort* DestinationPortCorrect answer: A & BUDP (User Datagram Protocol) does not use sequence oracknowledgement fields in transmission.UDP is a connectionless and unreliable protocol, since there is nodelivery checking mechanism in the UDP data format.

    30. What is the UDP datagram format?* Source Port - 16 bits, Destination Port - 16 bits, Length - 16 Bits,Checksum - 16 bits, Data* Destination Port - 16 bits, Source Port - 16 bits, Length - 16 Bits,Checksum - 16 bits, Data* Source Port - 16 bits, Destination Port - 16 bits, Checksum - 16Bits, Length - 16 bits, Data* Source Port - 8 bits, Destination Port - 8 bits, Length -8 Bits,Checksum - 8 bits, DataCorrect answer: AThe UDP format for a segment is as follows:Source Port 16 bitsDestination Port 16 bitsLength 16 bitsChecksum 16 bits

  • 7/29/2019 Networking Q&A

    31/46

    Data xx bits31. What is the function of DDR on Cisco routers?

    * DDR is dialon-demand routing. It provides a continuous LAN onlyconnection.* DDR is dial-on-demand routing. It provides routing for high volumetraffic.* DDR is dialon-demand routing. It provides a continuous WANconnection.* DDR is dial-on-demand routing. It provides routing for low volumeand periodic traffic.Correct answer: DDDR is dial-on-demand routing. It provides routing for low volumeand periodic traffic. It initiates a call to a remote site when there istraffic to transmit.

    32. What are the two types of access lists that can be configured on aCisco router?* Standard* Extended* Filtering

    * PacketCorrect answer: A & BThe access lists are standard and extended. Standard access listsfor IP check the source address of packets that could be routed.Extended access lists can check the source and destination packetplus check for specific protocols, port numbers, etc.

    33. When using access lists, what does a Cisco router check first?* To see if the packet is routable or bridgeable* The destination address* The source address* The packet contentsCorrect answer: AThe first thing checked is to see if the packet is routable or

    bridgeable. If it is not, the packet will be dropped.34. How many access lists are allowed per interface?

    * One per port, per protocol* Two per port, per protocol* Unlimited* Router interface +1 per port.Correct answer: AOnly one access list is allowed per interface. An access list musthave conditions that test true for all packets that use the access list.

    35. What do the following commands accomplish?access-list 1 deny 172.16.4.0 0.0.0.255access-list 1 permit any interface ethernet 0IP access-group 1 out* This will block traffic from subnet 172.16.4.0 and allow all othertraffic.* This will allow traffic from subnet 172.16.4.0 and block all othertraffic.* All traffic is allowed.* All traffic is blocked.Correct answer: AThis will block traffic from subnet 172.16.4.0 and allow all othertraffic. The first statement access-list 1 deny 172.16.4.0 0.0.0.255

  • 7/29/2019 Networking Q&A

    32/46

    will deny access to the subnet 172.16.4.0.36. What do the following statements in an extended access list

    accomplish?access-list 101 deny TCP 172.16.4.0 0.0.0.255 172.16.3.0 0.0.0.255eq 21access-list 101 deny TCP 172.16.4.0 0.0.0.255 172.16.3.0 0.0.0.255eq 20access-list 101 permit TCP 172.16.4.0 0.0.0.255 0.0.0.0255.255.255.255* This will block ftp traffic.* This will block http traffic.* This will permit ftp traffic.* This will permit tftp traffic.Correct answer: A

    Sponsored Links

    Home>Networking QA

    Title: Basic Hardware Questions and Answers for Technical Interview

    1. What is Booting?Everything that happens between the time the computer is switched on and

    it is ready to accept commands/input from the user is known as booting

    2. Difference between DDR1 AND DDR2?

    1. DDR1 is 184 Pin and DDR2 is 240 Pin.2. DDR2 is much more faster than DDR1

    3.What is the window XP repair console command?Following eight commands to repir Window XP by console command.

    C: CD ..C: ATTRIB -H C:#oot.iniC:ATTRIB -S C:#oot.iniC:ATRIB -R C:#oot.iniC: delboot.iniC: BOOTCFG /RebuildC: CHKDSK /R /FC: FIXBOOT

    4. What is the difference between FAT32,NTFS?FAT-File allocation Table.This system less Security and not suport 10X

    OS(Operating System).FAT convert to NTFS but NTFS no convert in FAT.NTFS-New Tencologey File System.This file system more security andIncreases two options-sharing & quota.NTFS file system not suport 9XOS(As-win-NT,win95,win98)..

    5. What is cache memory?

    http://www.intervieweasy.com/index.htmhttp://www.intervieweasy.com/index.htmhttp://www.intervieweasy.com/myqa/category.php?catID=2http://www.intervieweasy.com/myqa/category.php?catID=2http://www.intervieweasy.com/myqa/category.php?catID=2http://www.intervieweasy.com/myqa/category.php?catID=2http://www.intervieweasy.com/index.htm
  • 7/29/2019 Networking Q&A

    33/46

    Cache memory is a small high-speed memory. It is used for temporarystorage of data & information between the main memory and the CPU(center processing unit). The cache memory is only in RAM.

    6. Write minimum 5 types of printer?

    Types of printer: ink jet, laserjet, dot matrix, LCDLED, Label printer, Plotter

    7. Write about single beep, double beep, long beep troubleshooting?Single beep: system working fine. Double beep: RAM problem. Long beep:

    Processor problem

    8. Difference between RISC AND CISC?RISC-Means Reduced Instruction Set Computer.a Risc system has reduced

    number of instructions and more importantly it is load store architecture werepipelining can be implemented easily. CISC-Means Complex instruction setarchitecure.A CISC system has complex instructions such as direct additionbetween data in two memory locations.

    9.What is different types of mouse?types of mouse: optical mouse, scroll mouse, USB mouse, wireless mouse

    10. What is Zip Drive?Zip Drive Definition A {disk drive} from {Iomega Corporation} which takes

    removable 100 {megabyte} {hard disks}.Both internal and external drives are manufactured, making the drive suitablefor {backup}, mass storage or for moving files between computers.Software is included to help with file organization. The internal {SCSI}

    model offers up to 60 MB / minute transfer rate.The company has started to manufacture a larger {Jaz} drive, which takesone {gigbyte} disks.

    11. What is jumper?A removable wire or small plug whose presence or absence is used to

    determine some aspect of hardware configuration

    12.What is PCI slot? Why this slot is uses?A connector on {Peripheral Component Interconnect} and the associated

    physical space occupied by the installed PCI card.Uses: insert different types of a add on card. Eg: Ethernet Card, VGA card,USB card, etc..

    13. The CPU is busy but you want to stop and do some other task. How doyou do it?

    In Windows .. Go to Task Manager Go to the process Click End Task ..Terminate the process and work other task.

    14. Why is Bluetooth called a cable replacement technology?Bluetooth technology allows the creation of Personal Area Networks without

    cables or wires that are usual in home networks.

  • 7/29/2019 Networking Q&A

    34/46

    Home>Networking QA

    Title: Web Technology Java Script & VB Script Interview Questions and Answers

    Java Script Qns & Ans

    1.) What Boolean operators are not supported by JavaScript?

    A) && (AND)

    B) || (OR)

    C)! (NOT)

    D) All the above.

    E) None of the above.

    Ans: E)

    2.) What is a number in JavaScript, derived by dividing negative number byzero called?

    A) Negative finite.

    B) Negative imperfect.

    C) Negative infinity.

    D) None of the above.

    Ans: c)

    3.) What does is Nanfunction do?

    A) Return true if the argument is not a number.

    B) Return true if the argument is a number.

    C) Return true if the argument is divided by zero.

    D) Return true if the argument is a perfect square.

    Ans: A)

    4.) How to declare the methods in Javascript?

    Methods are the actions that can be performed on objects.

    Example:

    script type=text/javascript>var str=Hello world!

    http://www.intervieweasy.com/index.htmhttp://www.intervieweasy.com/index.htmhttp://www.intervieweasy.com/myqa/category.php?catID=2http://www.intervieweasy.com/myqa/category.php?catID=2http://www.intervieweasy.com/myqa/category.php?catID=2http://www.intervieweasy.com/myqa/category.php?catID=2http://www.intervieweasy.com/index.htm
  • 7/29/2019 Networking Q&A

    35/46

    document.write(str.toUpperCase())

    In the above example UpperCase() method is used to print the string inUppercases.

    5.) What is variable typing in javascript?

    It is perfectly legal to assign a number to a variable and then assign a stringto the same variable as follows

    Example: i = 10;

    i = string;

    6.) What is JavaScript? Mention its various types.

    JavaScript is a platform-independent, event-driven, interpreted client-sidescripting .The various types are Number, String, Boolean, Function, Object,

    Null, Undefined.

    7.) How do I print JavaScript output?

    JavaScript programs cannot directly access printers. However, the user canprint out everything on the Web page, including the output of JavaScriptprograms, by using the File | Print menu of the browser. How can I preventan html page from being printed by a browser? Include a style sheetreference or a style sheet section with a media type of print. Set a rule forBODY with one entry, display:none.

    8.) How to add a combo box dynamically at run time in Java script?

    for (var i=0;i

  • 7/29/2019 Networking Q&A

    36/46

    VB Script Qns & Ans

    1.) What is the use of datepart keyword?

    Returns the specified part of a given date.

    2.) What is the use of step keyword?

    Using the Step keyword, you can increase or decrease the counter variableby the value you specify.

    3.) Which command is used for writing text on a page?

    Document. Write (text)

    4.) What is the scope of a variable ?

    The scope of a variable defines whether a variable will be accessible in thewhole function or will be accessed only to its local instance.I have definedearlier in the tutorials that they can also be deemed as a local variables orcan be deemed as a global variables.

    For ex.< script >Dim nameSub cmdclickme_OnClickDim ageEnd Sub< / script >

    It is clear from the above example about the scope of the variable that thevariable name will be available to the whole script as it is declared outsidesub procedure so enhance his behaviour to the global as compared to thevariable name age which is defined inside the sub procedure hence makinghis behaviour local and will be only accessed in this sub procedure only.

    5.) How to Add VB script to web pages ?

    There are scripting languages like Javascript and Vbscript and they aredesigned as an extension to html language.The Web browsers like MicrosoftInternet Explorer receives the scripts along with the rest of the web pagedocument. It is the browser responsibility to parse and process the scripts.These scripts are widely used as a client side scripting languages.

    6.) How to Assign values to a variable ?

    How to Assign values to a variable ? Ans: Simple you have to declare avariable name and assign any value.For ex.Name = ChandraStatus=False

  • 7/29/2019 Networking Q&A

    37/46

    Age=30Now all the above variables has been assigned values.This is a simple wayto declare and assign related values to a variable.

    7.) How do you create a recordset object in VBScript?

    First of all declare a variable to hold the Recordset object, ex- DimobjRsNow, Create this varible as a Recordset object, ex- SetobjRs=Server.CreateObject(ADODB.RECORDSET)

    8.) What is the use of Option Explicit in VBScript?

    When you use the Option Explicit statement, you must explicitly declare allvariables using the Dim, Private, Public, or ReDim statements. If you attemptto use an undeclared variable name, an error occurs.Use Option Explicit toavoid incorrectly typing the name of an existing variable or to avoid confusionin code where the scope of the variable is not clear

    Sponsored Links

    Home>Networking QA

    Title: Interview - Frequently Asked Networking Questions

    Q. What is The A Port Number?

    A Port Number is allocated by the operating system (or can be requested) , insuch a way to identify the pocess in a standalone system or a network.default PortNumber for FTP is 21.

    Q.What is DHCP?

    DHCP is a protocol which is designe for Automatic Give the IP Address toDHCP client.. DHCP Assine the IP Address for few days Lease & capture theclients MAC address.. It is Updated version of BootP

    Q.What is a default gateway?

    The exit-point from one network and entry-way into another network, oftenthe router of the network.

    Q.How do you set a default route on an IOS Cisco router?

    ip route 0.0.0.0 0.0.0.0 x.x.x.x [where x.x.x.x represents the destinationaddress]

    Q.What is the difference between a domain local group and a global group?

    Domain local groups grant permissions to objects within the domain in whichthe reside. Global groups contain grant permissions tree or forest wide forany objects within the Active Directory

    Q.What is LDAP used for?

    http://www.intervieweasy.com/index.htmhttp://www.intervieweasy.com/index.htmhttp://www.intervieweasy.com/myqa/category.php?catID=2http://www.intervieweasy.com/myqa/category.php?catID=2http://www.intervieweasy.com/myqa/category.php?catID=2http://www.intervieweasy.com/myqa/category.php?catID=2http://www.intervieweasy.com/index.htm
  • 7/29/2019 Networking Q&A

    38/46

    LDAP is a set of protocol used for providing access to information directories.

    Q.What tool have you used to create and analyze packet captures?

    Network Monitor in Win2K / Win2K3, Ethereal in Linux, OptiView Series II (byFluke Networks).

    Q.What is the significance of the IP address 255.255.255.255?

    The limited broadcast address is utilized when an IP node must perform aone-to-everyone delivery on the local network but the network ID is unknown.

    Q.. Name of seven layers in Open System Interconnection model?They are Application, Presentation, Session, Transport, Network, Data link,

    and Physical

    Q.What is ipv6 ? how many octects is it ?ipv6 means Internet Protocol Version 6. It is the latest version. It has 16octates.It is in Hexadecimal format.

    Q.How do you share a printer?This is how I share a printer on a the LAN You can print from every PC on

    your network to one printer. To share a printer with the other PCs in yourhome you need to configure the PC to which the printer is connected andthen install the shared printeR.

    Q.Write minimum 5 types of NETWORK?

    a.local area networkb.widec.metropolitand.personale.wireless local

    Q. What is DNS?Domain name system/server is used to translate the IP address into the

    hostname and hostname into the IP address. DNS is mostly used on theinternet and the networks.

    Q. Why we use cross cable to connect same devices?Same devices like PC-2-PC, it uses(NIC for PC) 1,2 for transmission & 3,6

    for reception. If we don't use cross cable then we can't transfer data. While inthe case of switch/hub they receive (NIC of SWITCH/HUB)data on 1,2 &transmit on 3,6. Thats why we use straight cable for de-similar host & crosscable for similar hosts.

    Q.Define Bluetooth Technology?

  • 7/29/2019 Networking Q&A

    39/46

    Bluetooth is a short range wireless technology that uses radio waves forcommunication. Many mobile phones, laptops, MP3 players have built infeatures of the Bluetooth.

    Q. Given a Class B Network with subnet mask of 255.255.248.0 and a packetaddressed to 130.40.32.16, what is the subnet address?Take the 2 addresses, write them in binary form, then AND them. The

    answer is 130.40.32.0

    Q. What is the full form of UDP? How it works? What is the use of UDP?UDP is connection less protocol UDP dose not provide mechanisms for

    error detection and error correction between the source and the destination.Because of this, UDP utilized bandwidth more efficiently than TCP.

    Q. .What is MAU?In token Ring , hub is called Multistation Access Unit(MAU).

    Q. write about port number FTP, NNTP, SMTP, POP3, DNS, DHCP?FTP-21NNTP-443SMTP25POP3-110DNS-53DHCP-67

    Q. What is FTP & UDP?What is the different version of IP?IP is 32 bit (not byte) and IPv6 is 128 bit in length ...

    Q. What is Wifi?Wi Fi or wireless fidelity is a base band network technology that is used for

    the wireless data communication

    Sponsored Links

    Home>Networking QA

    Title: Hardware Architecture Interview Questions and Answers

    1.) What is Virtual Memory?

    http://www.intervieweasy.com/index.htmhttp://www.intervieweasy.com/index.htmhttp://www.intervieweasy.com/myqa/category.php?catID=2http://www.intervieweasy.com/myqa/category.php?catID=2http://www.intervieweasy.com/myqa/category.php?catID=2http://www.intervieweasy.com/myqa/category.php?catID=2http://www.intervieweasy.com/index.htm
  • 7/29/2019 Networking Q&A

    40/46

    This Memory is used extending the capability of physical memory. Thismemory is simulated by the hard drive.When all the RAM is being used thecomputer will swap data to the hard drive and back to give the impressionthat there is more memory

    2.) What are the five stages in a DLX pipeline?

    Instruction Fetch Stage Instruction Decode Stage Instruction Execution StageMemory Stage Write Back

    3.) What is MESI?

    MESI is a Cache Coherency protocol used in multi-processor systems toindicate the state in which the data in the cache of a particular processor is. Itstands of Modified, Exclusive, Shared and Invalid

    4.) What is cache memory?

    Cache memory is random access memory (RAM) that a computer

    microprocessor can access more quickly than it can access regular RAM. Asthe microprocessor processes data, it looks first in the cache memory and if itfinds the data there (from a previous reading of data), it does not have to dothe more time-consuming reading of data from larger memory.(cachememory is used between the c.p.u and the ram to access dta fastly)

    5.) What is hard disk and what is its purpose?

    Hard disk is the secondary storage device, which holds the data in bulk, andit holds the data on the magnetic medium of the disk.Hard disks have a hardplatter that holds the magnetic medium, the magnetic medium can be easilyerased and rewritten, and a typical desktop machine will have a hard diskwith a capacity of between 10 and 40 gigabytes. Data is stored onto the disk

    in the form of files.

    6.) Whats the speed and device maximum specs for Firewire?

    EEE 1394 (Firewire) supports the maximum of 63 connected devices withspeeds up to 400 Mbps.

    7.) Whats the difference between L1 and L2 cache?

    Level 1 cache is internal to the chip, L2 is external. L1 Cache is of Higherspeed than that of L2 Cache.

    8.) What is the difference between primary & secondary storage device?

    In primary storage device the storage capacity is limited. It has a volatilememory. In secondary storage device the storage capacity is larger. It is anonvolatile memory. Primary devices are: RAM / ROM. Secondary devicesare: Floppy disc / Hard disk.

    9). Explain the difference between write through and write back cache?

    Write Through: After writing in cache memory, main memory is updated

  • 7/29/2019 Networking Q&A

    41/46

    immediatly to mantain reliability.

    Write Back: After writing in cache memory a flag bit called dirty bit is set.When this value needs to be replaced that bit is check, if it is set then thevalue is taken to main memory.

    10). What is Cache Coherency?

    Cache coherence refers to the integrity of data stored in local caches of ashared resource. Cache coherence is a special case of memory coherence.When clients in a system, particularly CPUs in a multiprocessing system,maintain caches of a common memory resource, problems arise. Referring tothe figure, if the top client has a copy of a memory block from a previous readand the bottom client changes that memory block, the top client could be leftwith an invalid cache of memory without any notification of the change.Cache coherence is intended to manage such conflicts and maintainconsistency between cache and memory.

    11). What is Snooping cache?

    The fundamental idea behind a snooping cache is that the cache constantlymonitors the bus. (The verb to snoop is colloquial English meaning to spy orto monitor.) The idea is, whenever the snooping cache detects a writeoperation on the bus for a particular memory location, it invalidates anycached copy it has of the contents of that location. As a result, so long as amemory location is read-only, it may duplicated between many caches, asdifferent processors read it, but when a processor writes that lo