Вы находитесь на странице: 1из 8

DL interview Questions

1. What is VPN?

A VPN is a service that offers secure, reliable connectivity over a shared public network infrastructure
such as the Internet. VPNs maintain the same security and management policies as a private network.
They are the most cost effective method of establishing a virtual point-to-point connection between
remote users and an enterprise customer's network.

2. What are the different types of VPN?

 Remote Access VPN: Also called as Virtual Private dial-up network (VPDN) is mainly used in
scenarios where remote access to a network becomes essential. Remote access VPN allows data
to be accessed between a company’s private network and remote users through a third party
service provider; Enterprise service provider. E.g. Sales team is usually present over the globe.
Using Remote access VPN, the sales updates can be made.
 Site to Site VPN – Intranet based: This type of VPN can be used when multiple Remote
locations are present and can be made to join to a single network. Machines present on these
remote locations work as if they are working on a single network.
 Site to Site VPN – Extranet based: This type of VPN can be used when several different
companies need to work in a shared environment. E.g. Distributors and service companies. This
network is more manageable and reliable.

3. What are Ping and Tracert?

Ping and Tracert are the commands used to send information to some remote computers to receive
some information. Information is sent and received by packets. Ping I particularly used to check if the
system is in network or not. It also gives packet lost information. In windows ping command is written
as ping ip_address Tracert is called as trace route. It is used to track or trace the path the packet takes
from the computer where the command is given until the destination. In windows ping command is
written as Tracert ip_address

4. What is Tunneling?

Tunneling is a mechanism provided to transfer data securely between two networks. The data is split
into smaller packets and passed through the tunnel. The data passing through the tunnel has 3 layers of
encryption. The data is encapsulated. Tunneling can be approached by Point to Point tunneling
protocol.

5. What are the differences between a domain and a workgroup?

In a domain, one or more computer can be a server to manage the network. On the other hand in a
workgroup all computers are peers having no control on each other. In a domain, user doesn’t need an
account to logon on a specific computer if an account is available on the domain. In a work group user
needs to have an account for every computer.
In a domain, Computers can be on different local networks. In a work group all computers needs to be
a part of the same local network.

6. What is the Difference between Static IP and Dynamic IP?

Static IP is also called as permanent address assigned to each device in a network, whereas Dynamic IP,
a temporary address assigned to the device via DHCP software. IP address assigned to your service by
your cable or DSL Internet provider is typically dynamic IP. In routers and operating systems, the
default configuration for clients is dynamic IP

7. What is FTP (File Transfer Protocol)?

FTP is File Transfer Protocol. It used to exchange files on the internet. To enable the data transfer FTP
uses TCP/IP, FTP is most commonly used to upload and download files from the internet. FTP can be
invoked from the command prompt or some graphical user interface. FTP also allows to update
(delete, rename, move, and copy) files at a server. It uses a reserved port no 21.

8. What is TCP / IP protocol?

Transmission Control Protocol / Internet Protocol: - It is a family of protocols used for communication
and connection between hosts on the internet. It is the most widely used standard for transmitting
data over the internet. The four layers in the protocol are (from bottom to top):- Physical layer, Data
link layer, Network layer, transport layer and application layer, also called as the OSI model. In
TCP/IP, IP is responsible for forwarding packets while TCP ensures the correct delivery of data from
client to server. TCP detects loss of data as well.

9. TCP vs. UDP

TCP guarantees the delivery of data. UDP on the other hand, does not guarantee delivery of data. TCP
delivers messages in the order they were sent. UDP has no ordering mechanisms. In TCP data is sent as
a stream while UDP sends data as individual packets. UDP is faster than TCP. TCP is a connection
oriented protocol while UDP is connectionless.

10. How to change domain password remotely-via VPN?


When user is in home, he basically is logged in to his computer with cached credentials and can’t
change his password until he connects to domain.

In order to change password remotely and force replacement of cached credential user needs to
connect via VPN and when he is connected to press on ctrl-alt-delete and press on change password.

After password is changed he needs to lock the computer by pressing ctrl-alt-delete and then unlock it
with “new” password. That should replace cached credentials.

11. What is MTU?


The MTU is the “Maximum Transmission Unit” used by the TCP protocol. TCP stands for Transmission
Control Protocol. The MTU determines the size of packets used by TCP for each transmission of data.
Too large of an MTU size may mean retransmissions if the packet encounters a router along its route
that can’t handle that large a packet. Too small of an MTU size means relatively more overhead and
more acknowledgements that have to be sent and handled. The MTU is rated in “octets” or groups of 8
bits. The so-called “official” internet standard MTU is 576, but the standard rating for Ethernet is an
MTU of 1500

12. Describe the OSI model.


Open Systems Interconnection (OSI) model is a reference model developed by ISO (International
Organization for Standardization) in 1984, as a conceptual framework of standards for communication
in the network across different equipment and applications by different vendors. It is now considered
the primary architectural model for inter-computing and internetworking communications.
Communication process has been divided into 7 layers.
1. Physical
2.Datalink
3.network
4.transport
5.session
6.presentation
7.application
In all the above layers different works are performed according to the work divided among these
layers.

13. What is DNS?

Domain name system/server is used to translate the IP address into the hostname and hostname into the IP
address. DNS is mostly used on the internet and the networks.

14. What is DHCP?

Dynamic host configuration protocol is used to dynamically assign the IP address to the networked computers
and devices. DHCP is a network protocol that automatically assigns static and dynamic IP addresses from its
own range.
15. What is a Router?

Router is the most important network device that is used to connect two logically and physically different
networks. Router defines the short possible route for the data to reach its destination. A router works with
built-in intelligent software known as routing table, which helps to determine the route between the two
networks.

16. What is Gateway?

A gateway is software or a hardware that is used to connect the local area network with the internet. A
gateway is a network entrance point and a router usually works as a gateway.

17. What is WLAN?

WLAN or Wireless local area network is simply a type of network that doesn’t use wired Ethernet
connections for networking. WLAN uses wireless network devices such as wireless routers etc.

18. What is Subnet Mask?

A subnet mask is used to determine the number of networks and the number of host computers. Every
class of the IP address uses the different range of the subnet mask. Subnet masks allow the IP based
networks to be divided into the sub networks for performance and security purposes.

19. What is a MAC Address?


MAC address or Media Access control is a unique identifier of a computer device. The MAC address is
provided by the manufacturer of the device. MAC addresses are 12 digital hexadecimal numbers.

20. What is an IP Address?

An IP address is a unique identifier of a computer or network device on the local area network, WAN or
on internet. Every host computer on the internet must have a unique IP address. IP addresses on the
internet are usually assigned by the local ISPs to which users are connected.

21. What is Wifi?

WiFi or wireless fidelity is a base band network technology that is used for the wireless data
communication.

22. What is WiMax?

WiFi is a next form of the Wifi. WiMax is a very high speed broadband network technology that is
designed for the corporate offices, roaming and home users.

23. Name the Seven Layers of OSI Model

The seven layers of the OSI are Application, Presentation, Sessions, Transport, Network, Data Link and
Physical layer.

23. What is LDAP?

Lightweight Directory Access Protocol is used to access the directory services from the Active directory
in Windows operation systems.

24. Answer port number for the following protocol: SMTP, POP3, IMAP4, RPC, LDAP, and FTP?

SMTP – 25, POP3 – 110, IMAP4 – 143, RPC – 135, LDAP, FTP-21, HTTP-80

25. What is UDP?

UDP or user datagram protocol is a connectionless protocol that is used to transfer the data without
any error handling.

26. What is Firewall?

A firewall is usually a software program that is installed on the network server or gateway. The purpose
of the firewall is to protect the network resources from the intruders and unauthorized persons.

What is Virtual Private Network (VPN) and how does it work?

VPN or virtual private network is used to connect two networks by means internet. VPN uses PPTP
(point to point tunneling protocol) and other security procedures to make a secure tunnel on internet.

27. Define VOIP


VOIP or voice over internet protocol is a technology that uses IP based networks such as internet or
private networks to transmit the voice communication.

28. What is a RAS server?

RAS or remote access server allows you to remote dial in through the desktop computers, laptops and
GSM mobile phones.

29. What is the range of addresses in the classes of internet addresses?


Class A 0.0.0.0 - 127.255.255.255
Class B 128.0.0.0 - 191.255.255.255
Class C 192.0.0.0 - 223.255.255.255
Class D 224.0.0.0 - 239.255.255.255
Class E 240.0.0.0 - 247.255.255.255

30. What is a default gateway? What happens if I don't have one?

In computer networking, a default gateway is the device that passes traffic from the local subnet to
devices on other subnets. The default gateway often connects a local network to the Internet, although
internal gateways for local networks also exist.

31. Describe the lease process of the DHCP server.


DHCP Server leases the IP addresses to the clients as follows:

DORA
D (Discover): DHCP Client sends a broadcast packet to identify the dhcp server; this packet will contain
the source MAC.
O (Offer): Once the packet is received by the DHCP server, the server will send the packet containing
Source IP and Source MAC.
R (Request): Client will now contact the DHCP server directly and request for the IP address.
A (Acknowledge): DHCP server will send an ack packet which contains the IP address.

32. What is the difference between a Hub and a Switch?

Hub - It is networking device that operates at Layer 2 of the OSI Model. When a hub receives a packet
(chunk) of data (a frame in Ethernet lingo) at one of its ports from a PC on the network, it transmits
(repeats) the packet to all of its ports.

Switch – It is network device that connects multiple computers together within one LAN. It operates at
Layer 2 of the OSI Model. Switches control the flow of network traffic based on the address information
in each packet. A switch learns which devices are connected to its ports (by monitoring the packets it
receives), and then forwards on packets to the appropriate port only.

33. What is WINS and when do we use it?

WINS stands for Windows Internet Name Service. WINS is a NetBIOS Name Server that registers your
NetBIOS names and resolves into IP addresses.

34. What is NAT?


Network Address Translation (NAT) enables a local area network (LAN) to use one set of IP addresses
for internal traffic and a second set of addresses for external traffic. All necessary IP address
translations occur where the LAN interfaces with the broader Internet.

-It acts as a firewall by hiding internal IP addresses

-It allows an enterprise to bundle multiple ISDN connections into one internet connection.

35. What is multicast?

Multicasting is the process of distributing data to multiple recipients, e.g. Audio/Video streaming
broadcasts. Using multicasting, a source can send a single copy of data to a single multicast address,
which is then distributed to an entire group of recipients.

36. What is broadcast?

The Internet protocols TCP /IP support a feature known as a directed broadcast, which allows a remote
person the ability to send a single packet to an entire subnet.

37. What would you type in at a command prompt to view the IP settings for the computer that you
are sitting at?

IPCONFIG /ALL

38. What is a subnet?

a. A subnet is a logical grouping of network addresses ranges used to


separate connected network devices (nodes) from each other. Nodes on
a subnet tend to be located together in close physical proximity on a
LAN.

39. What is an IP address?

An Internet Protocol (IP) address is a numerical identification (logical address) that


is assigned to devices participating in a computer network. The IP address is usually
expressed as four decimal numbers, each representing eight bits, separated by
periods.

40. What is a default gateway? What happens if I don't have one?


a. In computer networking, a default gateway is the device that passes
traffic from the local subnet to devices on other subnets. The default
gateway often connects a local network to the Internet, although internal
gateways for local networks also exist.
41. What is WINS and when do we use it?

a. WINS stands for Windows Internet Name Service. WINS is a NetBIOS


Name Server that registers your NetBIOS names and resolves into IP
addresses.

42. What is System log?


a. The system log file contains events that are logged by the operating
system components. These events are often programmed by the
operating system

43.Itself. System log files may contain information about device changes, device
drivers, system changes, events, operations and more.

44. How does IPSec work?


a. IPSec is a standard suite of protocols that provides data authentication,
integrity, and confidentiality as data is transferred between
communication points across IP networks. IPSec provides data security at
the IP packet level. IPSec protects against possible security exposures by
protecting data while in transit.

45. What is the difference between TCP and UDP?


a. TCP (Transmission Control Protocol) is a connection-oriented protocol, a

connection can be made from client to server, and from then on any data

can be sent along that connection. It uses acknowledgement.

UDP (User Datagram Protocol) is a simpler message-based

connectionless protocol. With UDP you send messages (packets)

across the network in chunks.

46. When would you use the ping command with the "-t" switch?

a. To receive a continuous reply from a device which in on the network.

47. How do I know the path that a packet takes to the destination?
a. Tracert command is used to conduct trace routes using their network to

determine the number of hops a packet must take. the number of hops a

packet is taking out your network and through an ISP’s network and

more.

48. How to add the PC to Domain?

49. What is an event log?

50. What is a look back IP address

a.127.0.0.0

Вам также может понравиться