Networking basics technical interview question
1. How long is an IPv6 address? A. 32 bits B. 128 bytes C. 64 bits D. […]
1. How long is an IPv6 address? A. 32 bits B. 128 bytes C. 64 bits D. […]
11. Which protocol does DHCP use at the Transport layer? A. IP B. TCP C. UDP D.
6. Which WLAN IEEE specification allows up to 54Mbps at 2.4GHz? A. A B. B C. G
1. How long is an IPv6 address? A. 32 bits B. 128 bytes C. 64 bits D.
133. What is Proxy ARP? It is using a router to answer ARP requests. This will be done when the
127. What is BGP (Border Gateway Protocol)? It is a protocol used to advertise the set of networks that can
121. Expand IDEA. IDEA stands for International Data Encryption Algorithm. 122. What is wide-mouth frog? Wide-mouth frog is the simplest
115. What is packet filter? Packet filter is a standard router equipped with some extra functionality. The extra functionality allows
109. What MAU? In token Ring , hub is called Multistation Access Unit(MAU). 110. What is the difference between routable
103. What is the difference between TFTP and FTP application layer protocols? The Trivial File Transfer Protocol (TFTP) allows a
97. What are the different type of networking / internetworking devices? Repeater: Also called a regenerator, it is an electronic
91. What is MAC address? The address for a device as it is identified at the Media Access Control (MAC)
85. What is passive topology? When the computers on the network simply listen and receive the signal, they are referred
79. What is frame relay, in which layer it comes? Frame relay is a packet switching technology. It will operate
73. What are the two types of transmission technology available? (i) Broadcast and (ii) point-to-point 74. What is subnet? A
67. What is Stop-and-Wait Protocol? In Stop and wait protocol, sender sends one frame, waits until it receives confirmation from
61. What is Fixed Size Framing? In fixed-size framing, there is no need for defining the boundaries of the frames.
55. What are Code Words? “r” redundant bits are added to each block to make the length n = k
49. List the steps involved in creating the checksum. a. Divide the data into sections b. Add the sections together
43. What is Error Detection? What are its methods? Data can be corrupted during transmission. For reliable communication errors must
37. What are the responsibilities of Presentation Layer? The Presentation layer is concerned with the syntax and semantics of the
31. Which layer links the network support layers and user support layers? The Transport layer links the network support layers
25. What is WDM? WDM is conceptually the same as FDM, except that the multiplexing and demultiplexing involve light signals
19. What is semantic gap? Defining a useful channel involves both understanding the applications requirements and recognizing the limitations of
103. What is the difference between TFTP and FTP application layer protocols? The Trivial File Transfer Protocol (TFTP) allows a