Top 250 Networking Interview Questions and Answers

Updated 28 Jan 2025

Q101. 1- How ping / Traceroute work?

Ans.

Ping and Traceroute are network diagnostic tools used to test connectivity and identify network issues.

  • Ping sends a small packet of data to a destination IP address and waits for a response. It measures the time it takes for the packet to travel to the destination and back.

  • Traceroute sends packets with increasing TTL values to the destination, and each router along the path sends back an ICMP message indicating its presence. This helps to identify the path taken by the packet...read more

Add your answer
Frequently asked in

Q102. 1.What is DR and how you handle it.

Ans.

DR stands for Disaster Recovery. It involves implementing strategies and procedures to ensure business continuity in the event of a disaster.

  • DR is the process of preparing for and recovering from a disaster that affects the availability of IT infrastructure and services.

  • It includes creating backup systems, replicating data, and establishing failover mechanisms.

  • DR plans should be regularly tested and updated to ensure effectiveness.

  • AWS provides various services like AWS Backup...read more

View 1 answer
Frequently asked in

Q103. what is xlate table in ASA and ipsec tunnel trouble shooting

Ans.

The xlate table in ASA is used to keep track of translations between internal and external IP addresses. It is important for IPsec tunnel troubleshooting.

  • The xlate table is used to map internal IP addresses to external IP addresses

  • It is important for troubleshooting IPsec tunnels because it allows you to see if traffic is being translated correctly

  • You can view the xlate table using the 'show xlate' command in the ASA CLI

  • If there are issues with the xlate table, it can cause I...read more

Add your answer

Q104. what is stp ? what is port fast in stp ?

Ans.

STP stands for Spanning Tree Protocol. Port Fast is a feature in STP that allows a port to bypass the listening and learning states.

  • STP is a protocol used to prevent loops in a network by blocking redundant paths

  • It works by electing a root bridge and calculating the shortest path to it

  • Port Fast is a feature that allows a port to immediately transition to forwarding state, bypassing the listening and learning states

  • It is used on ports that are not connected to other switches t...read more

Add your answer
Frequently asked in
Are these interview questions helpful?

Q105. How can you configure pxe?

Ans.

PXE can be configured by setting up a PXE server, configuring DHCP and TFTP services, and creating appropriate boot files.

  • Set up a PXE server, such as using a Linux distribution like CentOS or Ubuntu

  • Configure DHCP service to assign IP addresses to PXE clients

  • Configure TFTP service to provide boot files to PXE clients

  • Create appropriate boot files, like pxelinux.0 or bootmgr.exe, and place them in the TFTP server's directory

  • Ensure the PXE server and the PXE clients are on the s...read more

Add your answer

Q106. Difference between SSH and Telnet?

Ans.

SSH is a secure protocol for remote access while Telnet is an unsecured protocol.

  • SSH encrypts data while Telnet sends data in plain text.

  • SSH uses public-key cryptography while Telnet uses username and password authentication.

  • SSH is more secure and recommended over Telnet.

  • SSH uses port 22 while Telnet uses port 23.

  • SSH is used for remote access to servers while Telnet is mostly used for testing network connectivity.

Add your answer
Share interview questions and help millions of jobseekers 🌟

Q107. What is use Bgp protocol?

Ans.

BGP protocol is used for exchanging routing information between different autonomous systems on the internet.

  • BGP stands for Border Gateway Protocol.

  • It is an exterior gateway protocol used for inter-domain routing.

  • BGP allows routers in different autonomous systems to exchange routing information.

  • It helps in determining the best path for data packets to reach their destination.

  • BGP is used by internet service providers (ISPs) to connect their networks and exchange routing inform...read more

View 1 answer

Q108. What's BGP attributes and their works?

Ans.

BGP attributes are characteristics used to influence routing decisions in Border Gateway Protocol.

  • BGP attributes are used to determine the best path for routing traffic.

  • Some common BGP attributes include AS Path, Next Hop, Local Preference, and MED.

  • AS Path attribute shows the path of autonomous systems that the route has traversed.

  • Next Hop attribute indicates the IP address to reach the next hop for the route.

  • Local Preference attribute is used to influence the path selection ...read more

View 1 answer

Networking Jobs

Senior - Key Account Manager 2-5 years
Equitas Small Finance Bank Ltd.
4.5
Kalyani
Semiconductor Package & System Planning Engineer 5-10 years
IBM India Pvt. Limited
4.0
Bangalore / Bengaluru
Semiconductor Package & System Planning Engineer 2-6 years
IBM India Pvt. Limited
4.0
Bangalore / Bengaluru

Q109. What's is VTP?

Ans.

VTP stands for VLAN Trunking Protocol. It is a Cisco proprietary protocol used to manage VLAN configurations across a network.

  • VTP allows for centralized management of VLANs in a network.

  • It enables the creation, deletion, and renaming of VLANs on a switch and automatically propagates these changes to other switches in the network.

  • VTP operates in three modes: server, client, and transparent.

  • Server mode allows VLAN configuration changes, client mode receives and stores VLAN info...read more

View 2 more answers
Frequently asked in

Q110. What is SMTP? Where is it used?

Ans.

SMTP stands for Simple Mail Transfer Protocol. It is used for sending and receiving email messages.

  • SMTP is a protocol used for sending email messages between servers.

  • It is responsible for transferring email messages from the sender's mail server to the recipient's mail server.

  • SMTP uses port 25 by default, but can also use ports 465 or 587 for secure connections.

  • SMTP is used by email clients such as Microsoft Outlook and webmail services like Gmail and Yahoo Mail.

Add your answer

Q111. What is nas

Ans.

NAS stands for Network Attached Storage. It is a file-level storage device that provides centralized data storage and access over a computer network.

  • NAS is a storage device that connects to a network and allows multiple users to access and share files.

  • It provides file-level access, meaning users can access individual files and folders stored on the NAS.

  • NAS devices often have their own operating system and can offer additional features like data backup, remote access, and medi...read more

View 1 answer

Q112. Explain OSI model devices on each layer ?

Ans.

OSI model devices are specific to each layer of the model, facilitating communication between devices.

  • Layer 1 (Physical): hubs, repeaters, cables

  • Layer 2 (Data Link): switches, bridges

  • Layer 3 (Network): routers, layer 3 switches

  • Layer 4 (Transport): gateways, firewalls

  • Layer 5 (Session): not applicable

  • Layer 6 (Presentation): encryption/decryption devices

  • Layer 7 (Application): servers, workstations

Add your answer
Frequently asked in

Q113. What is BBS & Components

Ans.

BBS stands for Bar Bending Schedule, which is a detailed list of reinforcement bars to be used in a construction project.

  • BBS includes details such as bar mark, type of bar, diameter, length, shape, and quantity.

  • It helps in estimating the quantity of steel required for the project.

  • BBS is essential for ensuring the structural integrity and strength of the building.

  • Components of BBS include bending shapes, cutting length, and bar mark identification.

Add your answer

Q114. How many equipment used in gpon

Ans.

GPON uses several equipment including Optical Line Terminal (OLT), Optical Network Unit (ONU), Optical Distribution Network (ODN), and Optical Splitter.

  • GPON uses Optical Line Terminal (OLT) to connect to the service provider's network.

  • Optical Network Unit (ONU) is used to connect to the end user's premises.

  • Optical Distribution Network (ODN) is used to distribute the signal to multiple ONUs.

  • Optical Splitter is used to split the signal to multiple ONUs.

  • Other equipment used in G...read more

Add your answer

Q115. What is the ACS & CCTV?

Ans.

ACS stands for Access Control System and CCTV stands for Closed Circuit Television.

  • ACS is a security system that controls and monitors access to a building or facility.

  • It uses various methods like key cards, biometric scans, or PIN codes to grant or deny access.

  • CCTV is a surveillance system that uses cameras to capture and record video footage.

  • It is commonly used for security purposes to monitor and record activities in a specific area.

  • ACS and CCTV are often used together to ...read more

View 1 answer

Q116. how to connect on-prem to your VPC

Ans.

To connect on-prem to VPC, use VPN or Direct Connect.

  • Create a virtual private gateway in VPC

  • Create a customer gateway on-premises

  • Create a VPN connection or Direct Connect

  • Configure routing tables to allow traffic between on-prem and VPC

Add your answer
Frequently asked in

Q117. What is srvcc,whether it use in 4g

Ans.

SRVCC stands for Single Radio Voice Call Continuity and it is used in 4G networks.

  • SRVCC is a feature that allows a voice call to be seamlessly transferred from LTE to 3G or 2G networks without interruption.

  • It ensures that the voice call remains connected even when the user moves out of the LTE coverage area.

  • SRVCC is important for providing a smooth transition between different network technologies and ensuring a high-quality voice call experience for users.

Add your answer

Q118. Please explain the P2P Cycle ?

Ans.

The P2P Cycle refers to the end-to-end process of purchasing goods or services, from requisition to payment.

  • The cycle starts with a purchase requisition, where a request is made for goods or services.

  • The requisition is then approved by the appropriate authority.

  • A purchase order is created based on the approved requisition, specifying the details of the purchase.

  • The purchase order is sent to the supplier or vendor.

  • Upon receiving the goods or services, the receiving department ...read more

View 5 more answers
Frequently asked in

Q119. what is modem and what is router

Ans.

A modem is a device that connects your computer to the internet through your ISP, while a router is a device that connects multiple devices to a network and manages traffic between them.

  • Modem stands for modulator-demodulator and converts digital signals to analog signals for transmission over telephone lines

  • Router directs traffic between devices on a network and can prioritize traffic for certain devices or applications

  • Modem and router are often combined into a single device ...read more

Add your answer

Q120. How many types of topologies in San and explain it one by one

Ans.

There are three types of topologies in SAN: point-to-point, arbitrated loop, and switched fabric.

  • Point-to-point topology connects two devices directly.

  • Arbitrated loop topology connects devices in a loop, where each device has a unique address.

  • Switched fabric topology connects devices through a central switch, allowing multiple simultaneous connections.

  • Examples: Fibre Channel (FC) and Internet Small Computer System Interface (iSCSI) are commonly used SAN topologies.

View 2 more answers

Q121. Describe FSMO roles in detail

Ans.

FSMO roles are specialized domain controller tasks in Active Directory.

  • There are 5 FSMO roles: Schema Master, Domain Naming Master, RID Master, PDC Emulator, and Infrastructure Master.

  • Schema Master: responsible for updating the Active Directory schema.

  • Domain Naming Master: responsible for adding or removing domains in the forest.

  • RID Master: responsible for allocating RIDs to domain controllers.

  • PDC Emulator: responsible for time synchronization and password changes.

  • Infrastruct...read more

Add your answer
Frequently asked in

Q122. What are vlans and trunks

Ans.

VLANs are virtual LANs that separate network traffic, while trunks are connections that carry multiple VLANs over a single link.

  • VLANs allow for network segmentation and improved security

  • Trunks are used to carry multiple VLANs over a single link

  • VLANs are identified by a VLAN ID

  • Trunks use VLAN tagging to identify which VLAN traffic belongs to

  • VLANs can be configured on switches, routers, and firewalls

Add your answer

Q123. What is sla for p3 incident

Ans.

SLA for P3 incident is typically 24-48 hours.

  • P3 incidents are considered low priority incidents

  • SLA for P3 incidents is usually longer than P1 and P2 incidents

  • SLA for P3 incidents can vary depending on the organization and the severity of the incident

  • Typically, SLA for P3 incidents is around 24-48 hours

  • SLA for P3 incidents may include response time, resolution time, and communication requirements

Add your answer

Q124. Difference between SSL and TLS

Ans.

SSL and TLS are cryptographic protocols used to secure communication over the internet.

  • SSL stands for Secure Sockets Layer and TLS stands for Transport Layer Security.

  • SSL is the predecessor of TLS.

  • Both protocols provide encryption and authentication for secure communication.

  • TLS is considered more secure than SSL.

  • SSL uses a combination of symmetric and asymmetric encryption, while TLS primarily uses symmetric encryption.

  • SSL and TLS use digital certificates to verify the identi...read more

Add your answer

Q125. What is a hub in computer

Ans.

A hub is a networking device that connects multiple devices together to form a single network segment.

  • A hub operates at the physical layer (layer 1) of the OSI model.

  • It receives data packets from one device and broadcasts them to all other devices connected to it.

  • Hubs are now largely obsolete and have been replaced by switches.

  • Examples of hubs include Ethernet hubs and USB hubs.

Add your answer

Q126. What is CDN in Computers/Information technology industry

Ans.

CDN stands for Content Delivery Network. It is a distributed network of servers that deliver web content to users based on their geographic location.

  • CDN improves website performance by reducing latency and increasing page load speed.

  • CDN caches content in multiple locations, allowing users to access it from a server closest to them.

  • CDN helps handle high traffic loads and prevents server overload.

  • Popular CDN providers include Cloudflare, Akamai, and Amazon CloudFront.

View 1 answer

Q127. What is static and DHCP?

Ans.

Static and DHCP are two methods of assigning IP addresses to devices on a network.

  • Static IP addresses are manually assigned to a device and do not change unless manually reconfigured.

  • DHCP (Dynamic Host Configuration Protocol) automatically assigns IP addresses to devices on a network.

  • DHCP can also assign other network configuration information, such as subnet mask and default gateway.

  • Static IP addresses are useful for devices that require a consistent IP address, such as serv...read more

Add your answer

Q128. What is OFC network

Ans.

OFC network stands for Optical Fiber Cable network, which is a telecommunications network that uses optical fibers to transmit data.

  • OFC network is a high-speed network that uses optical fibers made of glass or plastic to transmit data.

  • It is widely used in telecommunications to provide high-speed internet, telephone, and television services.

  • Optical fibers in an OFC network can transmit data over long distances without any loss of signal strength.

  • OFC networks are capable of car...read more

View 7 more answers
Frequently asked in

Q129. What is vary header?

Ans.

Vary header is used to indicate to caches that the response may vary based on the request headers.

  • Vary header is used in HTTP responses.

  • It specifies which request headers a cache should take into account when considering a response.

  • For example, if a response varies based on the 'Accept-Encoding' header, the server should include 'Vary: Accept-Encoding' in the response.

  • This helps prevent caching of responses that are not appropriate for a particular request.

Add your answer

Q130. how to check if the server of Facebook is up without opening the browser or app.

Ans.

Use command line tools like ping or curl to check server status.

  • Use ping command to check if server is reachable

  • Use curl command to check if server is responding with HTTP status code 200

  • Use telnet command to check if server is listening on a specific port

  • Use monitoring tools like Nagios or Zabbix to automate server status checks

Add your answer
Frequently asked in

Q131. What is telecommunications ?how it's working

Ans.

Telecommunications is the transmission of information over long distances using various technologies.

  • Telecommunications involves the exchange of information through electronic means.

  • It includes technologies like telephones, radios, television, and the internet.

  • Telecommunications systems use a combination of hardware, software, and networks to transmit and receive data.

  • Data is converted into electrical signals, transmitted through cables or wireless channels, and then decoded ...read more

Add your answer

Q132. What is the role of router's ?

Ans.

Routers are networking devices that forward data packets between computer networks.

  • Routers connect multiple networks together and determine the best path for data to travel.

  • They use routing tables to make decisions about where to send data packets.

  • Routers can also provide security by blocking unwanted traffic and filtering incoming data.

  • Examples of routers include home routers, enterprise routers, and core routers used by internet service providers.

Add your answer
Frequently asked in

Q133. How to check IP in Linux?

Ans.

To check IP in Linux, use the command 'ifconfig' or 'ip addr show'

  • Open the terminal and type 'ifconfig' or 'ip addr show'

  • Look for the IP address under the network interface section

  • Alternatively, use the command 'hostname -I' to display the IP address only

Add your answer

Q134. Whats is network and what are the types

Ans.

A network is a group of interconnected devices that can communicate and share resources. There are two types of networks: LAN and WAN.

  • A LAN (Local Area Network) is a network that covers a small area, such as a home, office, or building.

  • A WAN (Wide Area Network) is a network that covers a large geographical area, such as a city, country, or even the world.

  • Other types of networks include WLAN (Wireless Local Area Network), MAN (Metropolitan Area Network), and CAN (Campus Area N...read more

Add your answer

Q135. wha is proxy?

Ans.

A proxy is an intermediary server that acts as a gateway between a local network and the internet.

  • A proxy server can be used to improve security by filtering traffic and blocking malicious websites.

  • It can also be used to improve performance by caching frequently accessed resources.

  • Proxy servers can be configured to allow or deny access to specific websites or resources.

  • Examples of popular proxy servers include Squid, Apache, and Nginx.

Add your answer

Q136. Tell us about the Technical Knowledge you have about Linux and Networking.

Ans.

I have extensive technical knowledge in Linux and Networking, including experience with system administration, network configuration, and troubleshooting.

  • Proficient in Linux operating systems such as Ubuntu, CentOS, and Red Hat

  • Experience with network protocols such as TCP/IP, DNS, DHCP, and VPN

  • Skilled in configuring routers, switches, firewalls, and other network devices

  • Knowledge of security practices and tools for securing networks and systems

  • Familiar with virtualization tec...read more

Add your answer

Q137. Make a list of the benefit Optical Fibre connection.

Ans.

Optical Fibre connection offers numerous benefits for high-speed and reliable communication.

  • High-speed data transmission: Optical Fibre connection provides faster data transfer rates compared to traditional copper cables.

  • Large bandwidth capacity: Optical Fibre can carry a large amount of data simultaneously, allowing for high-quality video streaming, online gaming, and other bandwidth-intensive applications.

  • Low signal loss: Optical Fibre has minimal signal loss over long dist...read more

View 2 more answers

Q138. What is the mean of nfs. What is nfs config file.

Ans.

NFS stands for Network File System. It is a protocol used for sharing files/folders between Unix/Linux systems over a network.

  • NFS allows a user on a client computer to access files over a network as if they were on the local hard drive.

  • The NFS configuration file is /etc/exports, which lists the directories that can be exported to remote systems.

  • NFS uses RPC (Remote Procedure Call) to communicate between the client and server.

  • NFS can be used to share files between Linux/Unix s...read more

Add your answer

Q139. what is SIP call flow

Ans.

SIP call flow is the sequence of events that occur during a SIP call.

  • SIP INVITE message is sent to initiate the call

  • SIP 100 Trying response is sent to acknowledge the request

  • SIP 180 Ringing response is sent to indicate the call is being connected

  • SIP 200 OK response is sent to confirm the call is connected

  • Media is exchanged between the parties

  • SIP BYE message is sent to end the call

Add your answer

Q140. Check all the services running on services.

Ans.

To check all the services running on services, we can use the command 'services.msc' on Windows or 'systemctl list-units --type=service' on Linux.

  • On Windows, open the 'Run' dialog box and type 'services.msc' to open the Services Manager. This will display all the services running on the system.

  • On Linux, use the command 'systemctl list-units --type=service' to list all the services running on the system.

  • Alternatively, you can use the command 'service --status-all' on Linux to ...read more

Add your answer
Frequently asked in

Q141. How to assign ip

Ans.

IP can be assigned using various methods like DHCP, static IP, or command-line tools like ifconfig or ip.

  • DHCP assigns IP automatically to devices on the network

  • Static IP is manually assigned to a device and remains the same

  • ifconfig and ip are command-line tools used to assign IP

  • Example: sudo ifconfig eth0 192.168.1.100 netmask 255.255.255.0

  • Example: sudo ip addr add 192.168.1.100/24 dev eth0

View 1 answer
Frequently asked in

Q142. Difference between DR and DT?

Ans.

DR stands for Defect Removal and DT stands for Defect Tracking.

  • DR refers to the process of identifying and removing defects from a product or system.

  • DT refers to the process of recording and tracking defects throughout their lifecycle.

  • DR focuses on preventing defects from reaching the customer.

  • DT focuses on managing and resolving defects that have been identified.

  • DR involves activities like inspections, reviews, and testing to identify and remove defects.

  • DT involves activitie...read more

View 1 answer

Q143. Find out the subnet mask for ip 192.168.45.21

Ans.

The subnet mask for IP 192.168.45.21 is typically 255.255.255.0.

  • Subnet masks determine the network and host portions of an IP address.

  • The default subnet mask for a Class C network is 255.255.255.0.

  • Subnet masks are represented in dotted decimal notation.

Add your answer

Q144. How do you ensure a file has been transferred from one client to another over a server without any corruption?

Ans.

To ensure file transfer without corruption, use checksums, error detection codes, and data validation techniques.

  • Calculate and compare checksums before and after transfer

  • Use error detection codes like CRC or MD5

  • Implement data validation techniques like parity checks or hash functions

  • Verify file integrity using digital signatures or secure hash algorithms

View 1 answer

Q145. Explain Transport & Network layer

Ans.

Transport layer ensures reliable data transfer between end systems. Network layer provides logical addressing and routing.

  • Transport layer segments and reassembles data into a stream of packets.

  • Transport layer provides error checking and flow control.

  • Network layer determines the best path for data to travel from source to destination.

  • Network layer uses logical addressing to identify devices on a network.

  • Examples of transport layer protocols include TCP and UDP.

  • Examples of netw...read more

Add your answer

Q146. What is difference between OLT AND ONT

Ans.

OLT is a device used by service providers to connect multiple ONTs to their network.

  • OLT stands for Optical Line Terminal

  • It is used by service providers to connect multiple ONTs to their network

  • OLT is located at the service provider's central office or data center

  • ONT stands for Optical Network Terminal

  • It is located at the customer's premises and connects to the OLT

  • ONT is responsible for converting optical signals to electrical signals and vice versa

Add your answer

Q147. What are different classes of IP addresses?

Ans.

IP addresses are divided into classes based on the range of numbers they use to identify devices on a network.

  • There are five classes of IP addresses: A, B, C, D, and E.

  • Class A addresses are used for large networks and start with a number between 1 and 126.

  • Class B addresses are used for medium-sized networks and start with a number between 128 and 191.

  • Class C addresses are used for small networks and start with a number between 192 and 223.

  • Class D addresses are used for multic...read more

Add your answer

Q148. What is the difference between CCNA and MCSE

Ans.

CCNA is a Cisco certification for networking while MCSE is a Microsoft certification for system administration.

  • CCNA focuses on networking while MCSE focuses on system administration

  • CCNA covers topics such as routing, switching, and network security

  • MCSE covers topics such as server installation, configuration, and management

  • CCNA is more specialized while MCSE is more broad in scope

  • CCNA is a prerequisite for some advanced Cisco certifications

  • MCSE is a prerequisite for some adva...read more

View 5 more answers

Q149. What is the difference between domain & workgroup?

Ans.

Domain is a centralized network where all computers are managed by a server while workgroup is a decentralized network where each computer manages itself.

  • Domain is managed by a server while workgroup is not.

  • Domain allows for centralized management of users, computers, and resources while workgroup does not.

  • Domain requires a domain controller while workgroup does not.

  • Domain is more secure than workgroup.

  • Examples of domain: Microsoft Active Directory, Novell eDirectory. Example...read more

Add your answer

Q150. How a Cisco router can be formatted

Ans.

A Cisco router can be formatted by resetting it to its factory default settings.

  • Access the router's console port using a console cable

  • Enter the command 'erase startup-config' to delete the current configuration

  • Reload the router using the 'reload' command

  • Follow the setup wizard to configure the router with default settings

Add your answer

Q151. How to create the IP sec tunnel?

Ans.

To create an IPsec tunnel, configure the necessary parameters on both ends of the connection.

  • Configure the IPsec parameters such as encryption algorithms, authentication methods, and key exchange protocols on both the source and destination devices.

  • Establish a secure communication channel by setting up the IPsec tunnel between the two endpoints.

  • Ensure that the IPsec tunnel is properly configured and tested for secure data transmission.

  • Monitor the IPsec tunnel for any potentia...read more

Add your answer
Frequently asked in

Q152. What is email ?

Ans.

Email is a digital message sent and received through the internet.

  • Email stands for electronic mail.

  • It allows users to send and receive messages, files, and documents over the internet.

  • Emails can be sent to one or multiple recipients.

  • Emails can be accessed through web-based email clients or desktop email clients.

  • Examples of email providers include Gmail, Yahoo Mail, and Outlook.

Add your answer

Q153. Explain the working of relay.

Ans.

Relay is an electrically operated switch that uses an electromagnet to mechanically open or close a circuit.

  • Relays are used to control high voltage or high current circuits with low voltage signals.

  • They are commonly used in industrial automation, automotive applications, and household appliances.

  • Relays can be classified into different types based on their construction and operation, such as electromagnetic relays, solid-state relays, and thermal relays.

  • Electromagnetic relays ...read more

Add your answer

Q154. What is send filter

Ans.

A send filter is a mechanism used to control the transmission of data or messages.

  • Send filters are used to restrict or allow certain types of data or messages from being transmitted.

  • They can be implemented at various levels, such as network level, application level, or protocol level.

  • Send filters can be based on criteria like content, source, destination, or specific attributes of the data or message.

  • For example, an email send filter may block messages containing certain keyw...read more

View 1 answer

Q155. What is the Visibility?

Ans.

Visibility refers to the degree to which a product or brand is seen or noticed by potential customers.

  • Visibility is an important factor in sales as it determines the likelihood of a product being purchased.

  • It can be influenced by various factors such as advertising, shelf placement, and online presence.

  • For example, a product placed at eye level on a store shelf will have higher visibility compared to one placed on a lower shelf.

  • Similarly, a brand that invests in online market...read more

View 5 more answers

Q156. What is voip call flow

Ans.

VoIP call flow refers to the sequence of events that occur during a VoIP call.

  • The call is initiated by the caller's device sending a SIP INVITE message to the recipient's device.

  • The recipient's device responds with a SIP 180 Ringing message to indicate that the call is being set up.

  • Once the call is answered, the devices exchange RTP packets containing the audio data.

  • When the call is finished, the devices send SIP BYE messages to end the call.

Add your answer

Q157. Which domain is created to connect VMM domains?

Ans.

The domain created to connect VMM domains is called the Logical Switch domain.

  • Logical Switch domain is created in System Center Virtual Machine Manager (VMM) to connect VMM domains.

  • It is used to provide connectivity between virtual machines and physical networks.

  • It allows for centralized management of virtual switches and network policies.

  • Logical Switch domain can be used to create virtual networks that span multiple hosts and clusters.

  • It supports network virtualization and c...read more

Add your answer

Q158. What is MOS

Ans.

MOS stands for Metal Oxide Semiconductor. It is a type of transistor used in electronic devices.

  • MOS is a type of transistor that is commonly used in electronic devices.

  • It is made up of a metal gate, oxide insulator, and semiconductor material.

  • MOS transistors are used in digital circuits, amplifiers, and memory devices.

  • Examples of MOS-based devices include microprocessors, memory chips, and LCD screens.

View 2 more answers

Q159. Explain dhcp process and dora process

Ans.

DHCP process involves four steps - Discover, Offer, Request, Acknowledge. DORA process is the sequence of these steps.

  • DHCP Discover - Client broadcasts a request for IP address

  • DHCP Offer - Server responds with an available IP address

  • DHCP Request - Client requests the offered IP address

  • DHCP Acknowledge - Server confirms the IP address assignment

Add your answer

Q160. How to share Printer in Network?

Ans.

To share a printer in a network, you need to set up printer sharing and configure the necessary settings.

  • Connect the printer to a computer that will act as the print server

  • Enable printer sharing on the computer

  • Configure the printer settings on the print server

  • Add the shared printer to other computers on the network

  • Test the printer to ensure it is working properly

Add your answer

Q161. Whats is difference between cell throughput and user throughput?

Ans.

Cell throughput refers to the amount of data transmitted by a cell, while user throughput is the amount of data received by a user.

  • Cell throughput is the total amount of data transmitted by a cell, including data sent to all users within the cell.

  • User throughput is the amount of data received by a single user within the cell.

  • Cell throughput is affected by factors such as the number of users, signal strength, and available bandwidth.

  • User throughput is affected by factors such ...read more

Add your answer

Q162. How you take online plc? Define communication protocol.

Ans.

Online PLC can be taken through various methods. Communication protocol is a set of rules for data exchange between devices.

  • Online PLC can be taken through remote access software or web-based interfaces.

  • Communication protocol defines the format and rules for data exchange between devices.

  • Common communication protocols for PLCs include Modbus, Profibus, and Ethernet/IP.

  • These protocols specify how data is transmitted, addressed, and verified for error-free communication.

  • For exa...read more

View 1 answer

Q163. Do you know about installation of server

Ans.

Yes, I am familiar with the installation of servers.

  • I have experience installing various server operating systems such as Windows Server and Linux.

  • I am familiar with setting up server hardware and configuring network settings.

  • I have installed and configured server software such as Apache, Nginx, and Microsoft Exchange.

  • I am knowledgeable about RAID configurations and server virtualization.

  • I have experience troubleshooting server installation issues.

View 2 more answers

Q164. Which cable we are using Switch to Router connectivity

Ans.

The cable used for Switch to Router connectivity is Ethernet cable.

  • Ethernet cable is commonly used for connecting switches and routers.

  • It provides high-speed data transmission and is widely available.

  • Ethernet cables come in different categories such as Cat5, Cat6, etc.

  • The choice of cable depends on the network requirements and the distance between the devices.

View 1 answer
Frequently asked in

Q165. What is CAN and it's functionality

Ans.

CAN is a communication protocol used in automotive and industrial applications.

  • CAN stands for Controller Area Network.

  • It is a message-based protocol used for communication between electronic devices.

  • CAN is used in automotive and industrial applications for tasks such as engine control, transmission control, and body control.

  • It allows for high-speed communication between devices and is highly reliable.

  • CAN uses a bus topology, where multiple devices are connected to a single co...read more

Add your answer

Q166. What is communication ? Define TP IP protocol?

Ans.

Communication is the exchange of information between two or more parties.

  • Communication involves a sender, a message, a channel, a receiver, and feedback.

  • It can be verbal or nonverbal, written or spoken, and can occur through various mediums such as email, phone, or face-to-face.

  • Effective communication is essential for successful relationships, both personal and professional.

  • TCP/IP is a protocol used for communication between devices on a network.

  • TCP (Transmission Control Prot...read more

Add your answer
Frequently asked in

Q167. What is different between POP ,&IMAP

Ans.

POP and IMAP are email protocols used for retrieving emails from a mail server.

  • POP downloads emails from the server to the local device and deletes them from the server.

  • IMAP syncs emails between the server and the local device, allowing access to emails from multiple devices.

  • POP is a one-way communication protocol while IMAP is a two-way communication protocol.

  • POP is less secure than IMAP as it doesn't support encryption.

  • Examples of email clients that use POP include Microsof...read more

Add your answer
Frequently asked in

Q168. What is AD? What is a cluster?Etc.

Ans.

AD stands for Active Directory, a directory service developed by Microsoft. A cluster is a group of connected servers that work together.

  • Active Directory is used to manage users, computers, and other resources in a network.

  • It provides a centralized location for authentication and authorization.

  • A cluster is used to improve the availability and scalability of applications and services.

  • It involves multiple servers working together to provide redundancy and load balancing.

  • Example...read more

Add your answer

Q169. What is EDI and SFTP

Ans.

EDI is Electronic Data Interchange and SFTP is Secure File Transfer Protocol.

  • EDI is a standard format for exchanging business documents electronically.

  • SFTP is a secure way to transfer files over the internet.

  • EDI and SFTP are often used together to securely exchange business documents.

  • EDI can be used for transactions like purchase orders, invoices, and shipping notices.

  • SFTP provides encryption and authentication to protect data during transfer.

Add your answer

Q170. Explain the working of traceroute

Ans.

Traceroute is a network diagnostic tool used to track the path packets take from one networked device to another.

  • Traceroute sends out packets with increasing TTL values to map the path to the destination.

  • Each router along the path decrements the TTL and sends back an ICMP Time Exceeded message.

  • The sender records the IP address of each router to trace the route taken by the packets.

  • Traceroute helps identify network issues like high latency or packet loss.

  • Example: 'traceroute w...read more

Add your answer
Frequently asked in

Q171. What do you understand by Three way handshake ?

Ans.

Three way handshake is a method used in TCP/IP communication to establish a connection between a client and a server.

  • Three way handshake involves three steps: SYN, SYN-ACK, and ACK.

  • The client sends a SYN packet to the server to initiate the connection.

  • The server responds with a SYN-ACK packet, acknowledging the client's request.

  • Finally, the client sends an ACK packet to the server, confirming the connection establishment.

  • This process ensures reliable and synchronized communic...read more

View 1 answer

Q172. What are Interceptor

Ans.

Interceptors are functions that can be used to intercept incoming and outgoing HTTP requests in Angular applications.

  • Interceptors can be used to modify or log outgoing requests before they are sent.

  • They can also be used to modify or log incoming responses before they are passed to the application.

  • Interceptors are commonly used for adding authentication tokens to requests, error handling, or logging.

  • An example of using interceptors in Angular is adding a JWT token to the Autho...read more

Add your answer
Frequently asked in

Q173. 2. How to calculate the line size

Ans.

Line size calculation depends on flow rate, fluid properties, and pressure drop.

  • Determine the required flow rate

  • Determine the fluid properties such as viscosity and density

  • Calculate the pressure drop based on the length of the line and the fittings used

  • Select a line size that can handle the required flow rate with an acceptable pressure drop

  • Consider factors such as cost and space limitations

  • Use industry standards and guidelines for reference

  • Perform simulations and testing if ...read more

Add your answer

Q174. What is ACL AD value,As number

Ans.

ACL AD value and AS number are related to network security and routing protocols.

  • ACL AD value is the Access Control List Administrative Distance value, which is used to determine the priority of a particular ACL entry in case of multiple entries matching a packet.

  • AS number is the Autonomous System number, which is used in Border Gateway Protocol (BGP) to identify a group of networks under a single administrative domain.

  • ACL AD value and AS number are both important in network ...read more

Add your answer

Q175. Describe on HA & ASR

Ans.

HA stands for High Availability and ASR stands for Azure Site Recovery.

  • HA ensures that a system is always operational with minimal downtime.

  • ASR is a disaster recovery service that allows replication of VMs to a secondary location.

  • HA can be achieved through load balancing, clustering, and redundant hardware.

  • ASR helps in protecting applications by orchestrating the failover and failback processes.

  • Both HA and ASR are important for ensuring business continuity and minimizing disr...read more

View 1 answer
Frequently asked in

Q176. How does SSL pinning works?

Ans.

SSL pinning is a security technique that ensures a client only communicates with a server using a pre-defined public key.

  • SSL pinning involves hardcoding the server's public key in the client's code or configuration.

  • During the SSL handshake, the client checks if the server's public key matches the pinned key.

  • If the keys match, the connection is established; otherwise, it is rejected.

  • Pinning prevents man-in-the-middle attacks by verifying the server's identity.

Add your answer
Frequently asked in

Q177. Explain about bottleneck

Ans.

Bottleneck is a point in a process where the flow of work is limited or slowed down.

  • Bottlenecks can occur in any process, from manufacturing to software development.

  • They can be caused by a lack of resources, inefficient processes, or unexpected events.

  • Identifying and addressing bottlenecks is important for improving efficiency and productivity.

  • Examples of bottlenecks include a single machine in a production line that slows down the entire process, or a team member in a softwa...read more

Add your answer

Q178. what is RDP ?

Ans.

RDP stands for Remote Desktop Protocol. It is a proprietary protocol developed by Microsoft for remote access to Windows-based systems.

  • RDP allows users to connect to a remote computer and control it as if they were physically present.

  • It provides a graphical interface for remote management and allows file sharing, printing, and clipboard access.

  • RDP uses TCP port 3389 for communication.

  • It supports various encryption methods to ensure secure remote connections.

  • Popular RDP client...read more

View 1 answer

Q179. What is the difference between color coding of 568A and 568B ?

Ans.

The difference between color coding of 568A and 568B is the arrangement of the wire pairs in the Ethernet cable.

  • 568A uses a different order for the green and orange wire pairs compared to 568B.

  • 568A: white-green, green, white-orange, blue, white-blue, orange, white-brown, brown

  • 568B: white-orange, orange, white-green, blue, white-blue, green, white-brown, brown

  • Both standards are used for Ethernet connections, but 568B is more commonly used in the United States.

  • The color coding ...read more

View 1 answer

Q180. What is T-up?

Ans.

T-up is a testosterone booster supplement used to increase muscle mass and strength.

  • T-up contains D-aspartic acid which helps in increasing testosterone levels

  • It also contains vitamin D3 which is essential for testosterone production

  • T-up is commonly used by bodybuilders and athletes to enhance their performance

  • It is recommended to take T-up for 4-8 weeks followed by a break to avoid any side effects

Add your answer

Q181. What is a root bridge

Ans.

A root bridge is a bridge in a network that serves as a reference point for all other bridges in the network.

  • The root bridge is elected based on the lowest bridge ID, which consists of a priority value and a MAC address.

  • All other bridges in the network determine the best path to the root bridge for forwarding network traffic.

  • The root bridge is responsible for ensuring that there are no loops in the network topology.

Add your answer

Q182. What are the DNZ records

Ans.

DNZ records are used to map domain names to IP addresses for external-facing services.

  • DNZ stands for DeMilitarized Zone

  • DNZ records are used for external-facing services like web servers, email servers, etc.

  • They map domain names to IP addresses

  • DNZ records are used for security purposes to separate internal and external networks

Add your answer
Frequently asked in

Q183. What is OLT and ONT?

Ans.

OLT stands for Optical Line Terminal and ONT stands for Optical Network Terminal.

  • OLT is a device used in fiber optic networks to aggregate and distribute data to multiple ONTs.

  • OLT is typically located at the service provider's central office or data center.

  • ONT is a device used at the customer's premises to convert optical signals into electrical signals for communication.

  • ONT is responsible for connecting the customer's devices to the fiber optic network.

  • OLT and ONT work toget...read more

View 4 more answers

Q184. What is connection details?

Ans.

Connection details refer to the specific information required to establish a connection between two devices or systems.

  • Connection details include information such as IP addresses, port numbers, and authentication credentials.

  • They are necessary for establishing communication between devices or systems.

  • For example, connection details are required to connect to a Wi-Fi network or to access a remote server.

  • They can also be used to establish secure connections, such as SSL/TLS con...read more

Add your answer

Q185. What are the key protocols in AV over iP

Ans.

AV over IP protocols include H.264, H.265, and JPEG 2000.

  • H.264 is a widely used compression standard for video transmission over IP networks.

  • H.265 is a newer compression standard that offers better compression and higher quality video.

  • JPEG 2000 is a lossless compression standard that is often used for high-quality video applications.

  • Other protocols include MPEG-2, MPEG-4, and VC-2.

  • AV over IP protocols also include network protocols such as TCP/IP, UDP, and RTP/RTCP.

Add your answer

Q186. Explain event monitoring and the tools used in support

Ans.

Event monitoring is the process of tracking and analyzing system events to identify issues and improve performance.

  • Tools used for event monitoring include Nagios, Zabbix, and SolarWinds.

  • Event monitoring can help detect security breaches, system failures, and performance issues.

  • It involves setting up alerts and notifications for specific events and analyzing data to identify patterns and trends.

  • Event monitoring can also be used for compliance and auditing purposes.

  • Real-time mo...read more

Add your answer

Q187. What is patching process

Ans.

The patching process is the procedure of applying updates or fixes to software or systems to address vulnerabilities or improve functionality.

  • Patching involves identifying and downloading the necessary updates or patches.

  • Before applying patches, it is important to test them in a non-production environment.

  • Patches can be applied manually or through automated tools.

  • After applying patches, systems should be thoroughly tested to ensure proper functionality.

  • Regular patching helps ...read more

Add your answer
Frequently asked in

Q188. Which are the device which come into play in a wireless network

Ans.

Devices used in wireless networks include routers, access points, modems, and wireless adapters.

  • Routers: used to connect multiple devices to a network and manage traffic

  • Access points: used to extend the range of a wireless network

  • Modems: used to connect to the internet

  • Wireless adapters: used to connect devices to a wireless network

View 2 more answers

Q189. How do you automate firmware update and backup ?

Ans.

Automate firmware update and backup by using scripting languages and configuration management tools.

  • Use scripting languages like Python, PowerShell, or Bash to automate the process of downloading and applying firmware updates.

  • Utilize configuration management tools such as Ansible, Puppet, or Chef to automate the deployment of firmware updates across multiple devices.

  • Schedule regular backups of firmware configurations and settings using tools like Cron jobs or Task Scheduler.

  • S...read more

Add your answer

Q190. What is Network Architecture?

Ans.

Network architecture refers to the design and layout of a computer network.

  • It includes the physical components of the network such as routers, switches, and cables.

  • It also includes the logical components such as protocols and network topologies.

  • The architecture should be designed to meet the needs of the organization and provide efficient and secure communication.

  • Examples of network architectures include client-server, peer-to-peer, and cloud-based.

  • Network architecture can be...read more

Add your answer

Q191. How wireless is working?

Ans.

Wireless technology enables devices to communicate without the need for physical connections.

  • Wireless communication uses radio waves to transmit data between devices.

  • Devices such as smartphones, laptops, and routers use wireless technology to connect to the internet.

  • Wireless networks can be secured using encryption protocols like WPA2.

  • Wireless signals can be affected by factors like distance, interference, and obstacles.

  • Examples of wireless technologies include Wi-Fi, Bluetoo...read more

Add your answer

Q192. What is VOIP and advantages of SIP Protocol?

Ans.

VOIP stands for Voice over Internet Protocol. SIP Protocol is a communication protocol used for initiating and managing voice and video calls over IP networks.

  • VOIP allows for making phone calls over the internet instead of traditional phone lines

  • SIP Protocol is used to establish, modify, and terminate multimedia sessions such as voice and video calls

  • Advantages of SIP Protocol include flexibility, scalability, and cost-effectiveness

  • SIP Protocol supports various communication f...read more

Add your answer
Frequently asked in

Q193. What are IP Classes?

Ans.

IP Classes are a way of categorizing IP addresses based on their network and host portions.

  • There are five classes of IP addresses: A, B, C, D, and E.

  • Classes A, B, and C are used for public IP addresses, while classes D and E are reserved for special purposes.

  • The class of an IP address determines the range of values that can be used for the network and host portions.

  • Class A addresses have a range of 1-126 for the first octet, while class B addresses have a range of 128-191.

  • Cla...read more

Add your answer

Q194. How many types of Filters present?

Ans.

There are various types of filters present such as low-pass, high-pass, band-pass, band-stop, etc.

  • Low-pass filter allows low-frequency signals to pass through and attenuates high-frequency signals.

  • High-pass filter allows high-frequency signals to pass through and attenuates low-frequency signals.

  • Band-pass filter allows a specific range of frequencies to pass through and attenuates others.

  • Band-stop filter attenuates a specific range of frequencies and allows others to pass thr...read more

Add your answer

Q195. Is any need to internet for access the standalone application?

Ans.

No, internet is not required to access standalone applications.

  • Standalone applications are designed to work independently without internet connectivity.

  • They are installed on the local machine and can be accessed without any internet connection.

  • Examples of standalone applications are Microsoft Word, Adobe Photoshop, etc.

Add your answer

Q196. how to configure rsvp-te in cisco

Ans.

RSVP-TE can be configured on Cisco routers using the MPLS traffic engineering feature.

  • Enable MPLS on the router

  • Configure RSVP-TE on the interfaces participating in MPLS TE tunnels

  • Define MPLS TE tunnel paths and assign bandwidth constraints

  • Verify the configuration using show commands

Add your answer

Q197. What's STP protocol?

Ans.

STP (Spanning Tree Protocol) is a network protocol that prevents loops in Ethernet networks by creating a loop-free logical topology.

  • STP is used to prevent broadcast storms and network congestion caused by loops.

  • It works by electing a root bridge and calculating the shortest path to the root bridge for each network segment.

  • STP uses Bridge Protocol Data Units (BPDU) to exchange information between switches.

  • It employs a tree-like structure with designated ports and blocked port...read more

View 2 more answers

Q198. What is DHCP server and how it works?

Ans.

DHCP server is a network server that automatically assigns IP addresses and other network configuration settings to devices on a network.

  • DHCP stands for Dynamic Host Configuration Protocol.

  • It eliminates the need for manual IP address configuration.

  • DHCP server leases IP addresses to devices for a specific period of time.

  • It uses a four-step process: Discover, Offer, Request, and Acknowledge (DORA).

  • DHCP server also provides additional network configuration information like subne...read more

View 1 answer

Q199. 3. What is spanning tree protocol ?

Ans.

Spanning Tree Protocol (STP) is a network protocol that prevents loops in a network topology.

  • STP is used to prevent broadcast storms caused by loops in a network.

  • It works by selecting a root bridge and disabling redundant paths to prevent loops.

  • STP is implemented in switches and bridges in a network.

  • It is defined in IEEE 802.1D standard.

  • STP has several variants such as Rapid STP (RSTP) and Multiple STP (MSTP).

Add your answer

Q200. What is the difference between Latency and Delay.

Ans.

Latency is the time taken for a signal to travel from one point to another, while delay is the time taken for a signal to be processed.

  • Latency is the time taken for a signal to travel from one point to another, usually measured in milliseconds.

  • Delay is the time taken for a signal to be processed, which can be affected by factors such as network congestion or processing time.

  • Latency can be reduced by improving network infrastructure, while delay can be reduced by optimizing pr...read more

Add your answer
Frequently asked in
1
2
3
Interview Tips & Stories
Ace your next interview with expert advice and inspiring stories

Interview experiences of popular companies

3.7
 • 10.4k Interviews
3.8
 • 8.1k Interviews
3.6
 • 7.5k Interviews
3.7
 • 5.6k Interviews
3.8
 • 5.6k Interviews
3.7
 • 4.7k Interviews
3.5
 • 3.8k Interviews
3.5
 • 3.8k Interviews
3.9
 • 1.6k Interviews
3.3
 • 254 Interviews
View all
Networking Interview Questions
Share an Interview
Stay ahead in your career. Get AmbitionBox app
qr-code
Helping over 1 Crore job seekers every month in choosing their right fit company
70 Lakh+

Reviews

5 Lakh+

Interviews

4 Crore+

Salaries

1 Cr+

Users/Month

Contribute to help millions

Made with ❤️ in India. Trademarks belong to their respective owners. All rights reserved © 2024 Info Edge (India) Ltd.

Follow us
  • Youtube
  • Instagram
  • LinkedIn
  • Facebook
  • Twitter