Beruflich Dokumente
Kultur Dokumente
Network+ FAQ
Q. What is networking?
Ans. Sharing information and resources between devices is called networking.
Resource sharing
Speed
Time
Cost minimization
File sharing
Application sharing
Message sharing
Drawback of network:
Less security (high chance of hacking)
Less privacy(high transparency)
Wide Area Networks: It is a collection of more than two LANs. A WAN is any network that crosses
metropolitan, regional, or National boundaries. A WAN as any networks that uses routers and public
network links.
Metropolitan Area Networks: A MAN covers a city. The best known example of a MAN is the cable
TV network available in many cities. A MAN is smaller than a WAN but bigger than a LAN.
SAN: Storage area network a SAN is a dedicated high-performance network used to move data
between servers and storage resources.
Q. What is Intranet?
Ans. Private network within an organization or LAN is called Intranet.
Q. What is Internet?
Ans. The internet is a network of networks. It is a global collection of high powered computers that are
connected to each other with network cables, telephone lines, microwave dishes, satellites etc. You can
communicate with anyone on the internet by sending email, posting messages in newsgroups, chatting in
various chat areas and even telephoning and video conferencing over the net.
Q. What is MAC?
Ans. Media Access Control it’s a 48 bit physical address of your NIC card which can’t be change.
Hub Switch
Layer 1 device. Layer 2 and 3 device.
Share the bandwidth between devices. Provides full bandwidth to each device.
Single collision domain. Multiple collision domains.
No security. Provide security.
No Internal operating system. It’s got Internal operating system.
Non intelligent device.. Intelligent device.
Straight cable: It is used to connect two dissimilar devices like hub to computer.
Cross cable: it is used to connect two similar devices like computer to computer, hub to hub etc.
Q. What are the advantages and disadvantages of Fiber optic based network?
Ans.
Advantages Disadvantages
It covers larger distance Very Expensive
High bandwidth up to 100 Mbps Difficult to install
Support voice data and video at the highest Require special training to configure.
Transmission speeds
Q. What is CSMA/CD?
TCP UDP
It’s a connection oriented protocol It’s a connection less protocol
It provides error recovery, flow control It adds no reliability, flow control and error
And reliability. Recovery
It’s slow It’s fast
Workgroup Domain
There is no centralized administration. Centralized administration.
Share level security. Access level security.
Local users and computers Global users and computers
Desktop level security Global security
Good for small network Good for secure network
Easy to maintain Difficult to maintain.
Router Switch
Layer 3 device. Layer 2 device.
WAN device. LAN device.
Multiple collision multiple broadcast. Multiple collision single broadcast.
Q. What is Hub?
Application layer- This is seventh layer of the model. Responsible for providing network services
like file services web access etc.
Presentation layer- Sixth layer of the model. This layer performs protocol conversion and manages
data transmission and encryption.
Session layer- Fifth layer of the model. Responsible for establishing and maintaining a
communication session.
Transport layer- Fourth layer of the model. This layer controls the data flow and troubleshoots and
problem with transmitting or receiving data grams. This layer’s most important job is to provide
error checking and reliable end to end communication.
Network layer- Third layer of the model. Responsible for logical addressing. Some error control and
flow control is performed at this level.
Data link layer- Second layer of the model. Maintain data flow divide packets into chunks with error
detection.
Physical layer- First layer of the model. Defines cabling and connection also transmits data over the
physical media.
Q. What is Router?
Ans. Routers are highly intelligent devices work in layer 3, used to connect different networks segments
and determine the best path for sending data.
Q. What is Gateway?
Q. What is Bridge?
Ans. Bridges operate in the Data link layer of the OSI model. They join similar topologies and are used
to divide network segments.
Q. What is client?
Ans. A client is a requester of a service.
Q. What is Server?
Ans. A server is a service provider in a network like File server, Print server and Web server.
Dedicated Server- Dedicated server is a server which is only responsible for only one service like
File server, Web server, and Print server etc.
Non-Dedicated Server- A non-dedicated server is responsible for more than one service like
DHCP+DNS+PRINT server.
Q. Explain VOIP?
Ans. VOIP stands for Voice over IP and this technology is used for transmitted the voice over the IP
based long distance network to make phone calls. VOIP phone calls are very cheap and a large number
of the corporate offices and home users are using VOIP technology to make long distance phone calls.
Q. Explain WI Max?
Ans. WI Max is a wireless broadband technology and it is a advance shape of the WI FI (which was a
base band technology). WI Max supports data, video and audio communication at the same time at a
very high speed up to 70 Mbps.
Q. What is Switch?
Ans. A switch like a hub but with additional benefits like, learn MAC address with IOS and provide full
bandwidth to each device.
Q. What is ICS?
Ans. Internet connection sharing that connects multiple computers in one LAN to the internet through a
single connection and a single IP.
Q. What is FDDI?
Ans. Fiber Distributed Data Interface is a set of American National Standard Institute (ANSI) protocols
for sending network data over Fiber optic cable.
Q. What is Port?
Ans. A well known port is a port number which is reserved for a well known service like FTP, HTTP.
Q. What is Bandwidth?
Ans. Quantity of information that can be transferred in a specific time unit is called Bandwidth. The unit
for Bandwidth is Bits per second (bps). Higher the bandwidth faster is data transfer.
Q. what is protocol?
Ans. A protocol is an agreement between the communicating parties on how communication is to
proceed.
Q. What is Modem?
Ans. A modem is a device that makes it possible for computers to communicate over telephone lines.
Modem means modulate and demodulate. It converts analog signal to digital and digital signal to analog.
Star Topology- In star topology computers are connected by cables to a hub or switch. In this
topology you can easily add or remove devices. In this topology in one computer fail the network
will continue to function but if hub or switch fails all network will fail.
Bus Topology- All computers are connected to a single cable but the numbers of computers on a Bus
network will affect network performance because only one computer can send data at a time, in this
topology line break at any point will result in total network failure.
Mesh Topology- A mesh topology provides each device with a point to point connection to every
other device in the network, this topology is most expansive and difficult to maintain.
Ring Topology- In Ring topology computers are connected by a single loop of cable, the data signals
travel around the loop in one direction passing throw each computer. In this topology if there is a
line break or it you are adding or removing a device anywhere in the ring this will bring down the
network. It is difficult to maintain
Hybrid Topology- The hybrid topology is simply a mix of the other topologies the hybrid network
may be more expensive than some types of network topologies, but it takes the best feature of all the
other topologies and exploits them.
Q. What is NetBEUI?
Ans. NetBEUI a transport protocol. It’s is responsible for how data is transmitted between two
computers. It is not routable and is rarely used in modern computing
Q. What is NetBIOS?
Ans. Network Basic Input Output System a name resolution system. It allows a computer to search for
another computer on the network by its Microsoft computer name.
Class A- In class A the first byte is assigned to the network address and remaining three bytes are
used for host or node address. The class A format is Network.Node.Node.Node, and the default
subnet mask is 255.0.0.0
Class B- In class B network the first two bytes are assigned to the network address and the remaining
two bytes are used for node address. The format is Network.Network.Node.Node, the default subnet
mask is 255.255.0.0
Class C- In Class C network the first three bytes are assigned to the network address and the last
byte dedicated to node address. The format is Network.Network.Network.Node, the subnet mask is
255.255.255.0.
Q. Describe CSMA/CA?
Guided Media: This form of transmission is usually referred wired transmission like UTP, Coaxial,
Fiber optic cable etc.
Unguided Media: This form of transmission is usually referred as wireless transmission like Antenna
to Antenna, Microwave, Satellite, Infrared etc.
Advantages Disadvantages
Covers larger distance up to 2 miles. Low bandwidth 2-54Mbps
Very flexible Most expensive.
Q. What is RJ-45?
Ans. RJ-45 a connector type used with UTP wire to connect network devices.
Q. What is BNC?
Ans. British Novel Connecter used with coaxial cable in BUS topology.
Simplex: In this mode data is transmitted in one direction only. This means one end will always be a
transmitter and the other end will always be a receiver.
Half duplex: In this mode data can flow in either direction but at a given time one transmission can
take place only in one direction.
Full duplex: A transmission system in which data can be transmitted in both directions
simultaneously is called a full duplex system. Sometimes this mode of transmission is called duplex
mode.
Q. What is NOS?
Ans. The network requires some software to control all the information transfer activity on the network.
This task is handled by the software called Network Operating System.
Application Layer- This layer is the highest layer in the TCP/IP model. It is used by application to
access services across a TCP/IP network like FTP, HTTP, and Telnet etc.
Transport Layer- The transport layer is located at layer 3 of the TCP/IP model. The main
responsibility of the transport layer is to provide communication from one application to another
application. It also controls the flow of data.
Internet Layer- It is responsible for handling the communication from one computer to the other. It
accepts a request to send data from the Transport layer
Network Interface layer- This is at the lowest level of the TCP/IP model. It accepts the datagram
from the Internet layer and transmits over the network. The Network Interface layer is also
responsible for translating an internet address into a hardware address(48 bit MAC)
NCP- Network control protocol used for conveying network traffic. It also allows a host to connect
with other host.
NNTP- Network News Transfer Protocol used to distribute network news messages to NNTP servers
and clients (newsreaders) on the Internet. NNTP is designed so that news articles are stored on a
server in a central database, thus enabling a user to select specific items to read.
SNMP- Simple Network Management Protocol (SNMP) client software that runs on a hub, a router,
or another networking component. It also sends the health information of network.
NTP- Stands for Network Time Protocol, an Internet protocol for synchronizing computer clocks to
an accurate reference clock
NTLM- Stands for Windows NT LAN Manager, the native security protocol on Microsoft Windows
NT domain-based networks. NTLM is also known as Windows NT Challenge/Response
Authentication protocol.
IMAP- Internet Message Access Protocol (IMAP), which enabled individual mailboxes to be
assigned to users, and Multipurpose Internet Mail Extensions (MIME), which made it possible for
text-based e-mail to contain binary information such as multimedia files and executables.
MPPE- Microsoft Point-to-Point Encryption (MPPE) encrypts data in PPP-based dial-up connections
or PPTP VPN connections. Strong (128-bit key) and standard (40-bit key) MPPE encryption
schemes are supported. MPPE provides data security between your PPTP connection and the tunnel
server.
ICMP- Internet control message protocol. It is used to report errors. There are two simple and widely
used application based on ICMP Ping and Trace route.
ARP- Address resolution protocol used to convert logical address to physical address e.g. IP to
MAC. Path command prompt- ARP -a
RARP- Reverse address resolution protocol responsible for converting physical address to logical
addresses e.g. MAC to IP.
BOOTP- The Bootstrap protocol enable a client workstation to initialize with a minimal IP stack and
request it’s IP address, a gateway and the address of a name server from a BOOTP Server.
UDP- User datagram protocol. It’s a connection less protocol, responsible for sending and receiving
data grams but does not provide reliability, flow control, and error recovery.
SMTP- Simple mail transfer protocol used to send and receive mail between networks.
TFTP- Trivial file transfer protocol is an extremely simple protocol to transfer files. TFTP lacks most
of the feature of FTP the only thing it can do is read, write from/to a server.
NFS- The SUN micro system Network File System protocol enables machines to share file system
across a network.
HTTPS- Hypertext transfer protocol secure it is used to transfer encrypted information in network.
SLIP- Serial line internet protocol it’s an internet protocol. This is the older and simple protocol. Slip
lacks with few problems like, it does not do any error detection or correction, it supports only IP and
doesn’t provide authentication.
PPP- Point to point protocol an alternate solution of Slip protocol with error detection, support
multiple protocols, and permits authentication.
L2TP- Layer 2 tunneling protocol a VPN protocol that is used in conjunction with IPSec to provide a
high level of security when sending IP packets over the internet. L2TP and IPSec provide data
authentication, data encryption, and data integrity services.
PPPOE- Point to point protocol over Ethernet. A protocol that uses PPP to provide remote
connectivity services via Ethernet.
PPTP- Point to point tunneling protocol used for secure communication between two networks. It
provides authentication, compression and encryption.
CHAP- challenge Handshake Authentication Protocol. A security protocol used to negotiate secure
authentication by using encryption that is based the industry standard hashing scheme specified by
Message Digest 5(MD5). Mostly schemes are used to transform data into a scrambled format.
EAP- Extensible Authentication Protocol. A remote access protocol used for logon authentication.
EAP was designed to provide secure authentication services for third party devices like smart card.
MS-CHAP- Microsoft Challenge Handshake Authentication Protocol. It’s a better version of CHAP;
it uses the Message Digest 4(MD4) hashing algorithm and Data Encryption Standard (DES).
IP- Internet Protocol is the standard for data packet delivery over the internet. IP is a network layer
protocol that provides network addressing for identifying senders and receivers. IP also define how
data packets can be routed across the network to their destination.
BAP- Bandwidth allocation protocol a protocol that manages bandwidth for Multilink
Point-to-Point Protocol (MPPP) connections.
PPTP L2TP
Microsoft proprietary Standards based
Only windows and Unix platforms Not platform specific
Microsoft encryption IPSec encryption
Requires that the transmission network, Require an IP-based transmission network
Provide point-to-pint connectivity
No header compression Support header compression
Q. What is the difference between Interior gateway protocol and Exterior gateway protocol?
Ans
.
(IGPs): Interior gateway protocol allows routers to exchange information within an AS. Examples of
these protocols are Open Short Path First (OSPF) and Routing Information Protocol (RIP).
(EGPs): Exterior gateway protocol allows the exchange of information between autonomous
systems. An example of this type of routing protocol is Border Gateway Protocol (BGP).
Static Routing: Static routing is manually performed by the network administrator. The
administrator is responsible for discovering and propagating routes through the network.
Dynamic Routing: This algorithm allows routers to automatically discover and maintain awareness
of the paths through the network.
The network ID cannot be set to 127. This address is reserved for loop back and diagnostic purpose.
The network ID and host ID can’t be all 1s. If all bits are set to 1, the address is interpreted as a
broadcast address.
Neither the network ID nor the host ID can have the all bits 0s.
A unique network ID is needed for each network connected to a wide area network.
Dial-up Broadband
It’s an old method Its new technology
Its slow Its fast
Maximum download speed 56 kbps. Maximum speed 256 kbps.
Cheep technology Expensive than dial-up
Q. What is Kerberos?
Ans. Kerberos is an authentication system. Kerberos secure authentication requests, ensuring that user
access to network services occurs over a secure communication channel. The Kerberos 5 (v5)
authentication mechanism works by assigning a unique key, called a ticket, to each user who
successfully authenticates to a windows server 2003 domain controller. These tickets contain encrypted
data, including an encrypted password, which confirms the user’s identity to the requested service.
Non Routable protocols: Non routable protocols that can’t forward packets. The most commonly non
routable protocol is NetBUEI.
Q. What is UNC?
Ans. Universal Naming Convention for identifying shared resources on a network.
Q. Common Commands.
Ans.
Command Service
ARP Resolve IP to MAC address
HOST NAME Display the host name for the local system
IPCONFIG Display the local TCP/IP configuration
NBSTAT Provides information about NetBIOS over
TCP/IP connections.
NETSTAT Provides statistical information and,
Connections status for TCP/IP protocol
PATHPING A route tracing tool that combines feature,
Of the PING and Tracert commands.
PING Packet internet gopher used to verify, the
Connectivity between two devices
ROUTE Display a copy of the local routing table for,
the system and provides the ability to,
modify the local routing table
Q. What is Sub-netting?
Ans. Sub-netting allows you to divide a large network into smaller network or Subneting is a process of
breaking the network into smaller units. These units care called as subnets.
Q. What is Tunneling?
Ans. Tunneling is a mechanism provided to transfer data securely between two networks. The data is
split into smaller packets and passed through the tunnel. The data passing through the tunnel has 3 layers
of encryption. The data is encapsulated. Tunneling can be approached by Point to Point tunneling
protocol and L2TP protocol.
The Distance Vector protocol initially prepares a Routing table which is shared with other routers. This
routing table is shared between routers present in the same network. A new routing table is prepared
when some new information is received from some other router. Now, the bad routing paths are removed
keeping only the smallest hop paths. This new table is then communicated to other routers.
Ans. Internet Group Management Protocol, allows internet hosts to multicast. i.e. to send messages to a
group of computers. There may be a group of internet hosts interested to multicast. IGMP allows router
to determine which host groups have members on a given network segment. It helps to establish group
memberships. It is commonly used for streamlining videos and gaming. The protocol can be
implemented both as a host side and router side. The host side is responsible to notify its membership in
a group. The notification is made to a local router. This local router (router side) in turn sends out
queries.
Q. Explain DHCP.
Ans. Dynamic Host Configuration Protocol is a service that automatically configures TCP/IP on client
machines.
Q. DHCP requirement.
Ans. DHCP comes with window NT server, window 2000, 2003 and 2008 server. If we have any one of
this server we can use DHCP service.
Request- Request the parameter offered by one of the servers and declines all other offer.
DHCP-REQUEST: Request the parameter offered by one of the servers and declines all other offer.
DHCP-NACK: Negative acknowledgement from server to client, indicating that the client’s lease
has expired or that a requested IP address is incorrect.
DHCP-DECLINE: Message from client to server indicating that the offered address is already in use.
DHCP-RELEASE: Message from a client to server canceling remainder of a lease and relinquishing
network address.
Q. What is the minimum and maximum lease duration for DHCP IP?
Ans. Minimum 8 days and maximum 999 days.
Q. Components of DHCP.
Ans.
Q. Advantages of DHCP.
Ans.
Q. DNS components.
Ans. There are three main components you will find in the DNS.
Domain Name Servers- The Domain Name Servers are servers running the DNS software
component, which store information about a zone file. These name servers provide address
resolution and other information about the computers that you access.
DNS resolvers- DNS resolvers are piece of code that is built into the operating system. These
resolves FQDN to IP address.
Q. What is FQDN?
Ans. A Fully Qualified Domain Name represents a host name appended to the parent namespace. The
left most portion of the FQDN is the host portion of the name. A host name is an alias we give to an IP
address.
Primary Zone: The primary zone is the location where all updates to the zone’s records are made.
Primary zone has read and write permission.
Stub Zone- This is mini zone is kept on a DNS server hosting a parent zone, and its only purpose is
to identify the authoritative name servers in child zones.
SRV- Service a service record helps identify services running in a domain namespace.
MX- Mail Exchange this record identifies the IP address of a mail server for a given domain.
NS- Name Server these specify the name servers that are authoritative for a given portion of the
DNS namespace.
SOA- Start of Authority this resource records indicates the name of origin for the zone and contains
the name of the server that is the primary source for information about the zone.
CNAME- Canonical name the CNAME can be used to assign multiple names to a single IP address.
Q. Explain WINS.
Ans. Windows Internet Name Service (WINS) A Windows NT service that resolves a NetBIOS name to
IP. It’s also naming resolution mechanism like DNS but works in Windows NT network environment.
Q. What is TTL?
Ans. Time to Live (TTL) a field in IP packets that indicates how many routers the packet can still cross
(hops it can still make) before it is discarded. TTL is also used in ARP tables to indicate how long an
entry should remain in the table.
Q. What is Super-netting?
Ans. Super-netting the process of combining multiple IP address ranges into a single IP network.
Q. What is Subnet?
Ans. Subnet a network that is part of another network. The connection is made through a gateway,
bridge, or router.
Q. Explain SAM?
Ans. Security Accounts Manager (SAM) A database within Windows that contains information about all
the users and groups and their associated rights and settings within a domain.
Q. What is Proxy?
Ans. Proxy a type of firewall that prevents direct communication between a client and a host by acting
as an intermediary.
STP is Shielded Twisted Pair. It is the same as UTP but has a shield inside to protect from electrical
interference. It should be used in Token Ring networks or in Ethernet networks where electrical
interference may be a problem.
STP is more expensive and bulkier than UTP due to the shield.
Q. What is Packet?
Ans. A group of bits ready for transmission over a network. It includes a header, data, and a trailer.
Q. What is WINIPCFG?
Ans. In windows 9X, the utility that allows you to view you current TCP/IP configuration.