1) What is a link?

A link is a connection between two devices. It includes the type of cable and the protocol used to enable one device to communicate with the other.

2) What are the layers of the OSI reference model?

There are 7 OSI layers: physical layer, data link layer, network layer, transport layer, session layer, presentation layer and application layer.

3) What is a backbone network?

The backbone network is a centralized infrastructure designed to distribute different routes and data to various networks. It also handles bandwidth management and various channels.

4) What is LAN?

LAN is the abbreviation of Local Area Network. It refers to the connection between computers and other network devices located in a small physical location.

5) What is a node?

A node refers to the point where a connection occurs. It can be a computer or a device that is part of a network. To form a network connection, two or more nodes are required.

6) What is a router?

Routers can connect two or more network segments. These are intelligent network devices that store information in their routing tables, such as path, number of hops, etc. With this information, they can determine the best path for data transmission. Routers operate at the OSI Network layer.

7) What is a point-to-point link?

It refers to a direct connection between two computers on a network. A point-to-point connection does not require any other network equipment other than connecting the cable to the NIC cards of the two computers.

8) What is anonymous FTP?

Anonymous FTP is a way of granting users access to files on public servers . Users who are allowed to access data on these servers do not need to identify themselves, but log in as anonymous guests.

9) What is a subnet mask?

The subnet mask is combined with the IP address to identify two parts: the extended network address and the host address. Like the IP address, the subnet mask consists of 32 bits.

10) What is the maximum allowed length of UTP cable?

A single segment of UTP cable has an allowable length of 90 to 100 meters. This limitation can be overcome by using repeaters and switches.

11) What is data encapsulation?

Data encapsulation is the process of breaking information into smaller manageable chunks before transmitting it over the network. In this process, the source and destination addresses are appended to the header along with a parity check.

12) Describe the network topology

Network topology refers to the layout of a computer network. It shows the physical layout of devices and cables, and how they are connected to each other.

13) What is a VPN?

VPN means Virtual Private Network, a technology that allows the creation of a secure tunnel over a network such as the Internet.

For example, a VPN allows you to establish a secure dial-up connection to a remote server.

14) Briefly describe NAT.

NAT is Network Address Translation. It is a protocol that provides a way for multiple computers on a public network to share a single connection to the Internet.

15) What is the job of the Network layer under the OSI reference model?

The network layer is responsible for data routing, packet switching, and network congestion control. Routers operate under this layer.

16) How does network topology affect your decisions when building a network?

The network topology determines what medium must be used to interconnect devices. It also serves as the basis for the materials, connectors, and terminals that are appropriate for the setup.

17) What is RIP?

RIP, short for Routing Information Protocol is used by routers to send data from one network to another.

It manages routing data efficiently by broadcasting its routing table to all other routers in the network. It determines the network distance in terms of number of hops.

18) What are the different ways to secure a computer network?

There are several ways to do this. Install reliable and updated antivirus programs on all computers. Make sure the firewall is set up and configured correctly. User authentication will also help a lot. All of these combined will make for a highly secure network.

19) What is NIC?

NIC is the abbreviation of Network Interface Card (NIC). This is the card that is connected to the PC to connect to the network. Each NIC has its own MAC address that identifies the PC on the network.

20) What is WAN?

WAN stands for Wide Area Network. It is the interconnection of geographically dispersed computers and devices. It connects networks located in different regions and countries.

21) What is the importance of OSI physical layer?

The physical layer does the conversion from data bits to electrical signals and vice versa. This is where the network equipment and cable types are considered and set up.

22) How many layers are there under TCP/IP?

There are four layers: network layer, internet layer, transport layer, and application layer.

23) What are proxy servers and how do they protect computer networks?

Proxy servers primarily prevent outside users from identifying the IP addresses of an internal network. Without knowing the correct IP address, even the physical location of the network cannot be identified. Proxy servers can make a network virtually invisible to outside users.

24) What is the function of the OSI session layer?

This layer provides the protocols and methods for two devices on the network to communicate with each other by holding a session. This includes setting up the session, managing the information exchange during the session, and the teardown process when the session is terminated.

25) What is the importance of implementing a fault tolerant system? Is it limited?

Fault-tolerant systems ensure continuous data availability . This is achieved by eliminating single points of failure. However, there are certain situations where this type of system will not be able to protect data, such as accidental deletion.

26) What does 10Base-T mean?

The 10 refers to the data rate, in this case 10Mbps. “Base” refers to baseband. The T stands for twisted pair, which is the cable used for this network.

27) What is a private IP address?

Private IP addresses are assigned for use on internal networks. These addresses are used for internal networks and are not routable on the external public network. This ensures that there are no conflicts between internal networks, and the same range of private IP addresses can be reused for multiple internal networks as they will not “see” each other.

28) What is NOS?

NOS or Network Operating System is specialized software whose main task is to provide network connectivity to a computer so that it can communicate with other computers and connected devices.

29) What is DoS?

A DoS or Denial of Service attack is an attempt to prevent users from accessing the Internet or any other network service. This attack can take different forms and consist of a group of perpetrators. A common way of doing this is to overload the system server so that it can no longer handle legitimate traffic and will be forced to reset.

30) What is OSI and what role does it play in computer networking?

OSI (Open Systems Interconnection) serves as a reference model for data communications. It consists of 7 layers, each of which defines a specific aspect of how network devices connect and communicate with each other. One layer may deal with the physical medium used, while another layer dictates how data is actually transmitted over the network.

31) What is the purpose of cables being shielded and having twisted pairs?

Its main purpose is to prevent crosstalk, which is electromagnetic interference or noise that can affect data transmitted over the cable.

32) What are the advantages of address sharing?

By using address translation instead of routing, address sharing provides an inherent security advantage. This is because hosts on the Internet see only the public IP address of the external interface on the computer providing address translation, not the private IP addresses on the internal network.

33) What is a MAC address?

MAC or Media Access Control, uniquely identifies a device on a network. It is also called a physical address or Ethernet address. A MAC address consists of 6 bytes.

34) In terms of the OSI reference model, what is the equivalent layer or layers to the TCP/IP application layer?

The TCP /IP application layer actually has three counterparts on the OSI model: the session layer, the presentation layer, and the application layer.

35) How to identify the IP class of a given IP address?

By looking at the first octet of any given IP address, you can identify whether it is Class A, Class B, or Class C. If the first octet begins with bit 0, then the address is Class A. If it begins with bit 10, then the address is a Class B address. If it begins with 110, then it is a Class C network.

36) What is the main purpose of OSPF?

OSPF, or Open Shortest Path First, is a link-state routing protocol that uses routing tables to determine the best path for data exchange.

Source: Weak Current Talk

37) What is a firewall?

A firewall is used to protect an internal network from external attacks. These external threats could be hackers who want to steal data or computer viruses that can instantly wipe out data. It also prevents other users from external networks from accessing the private network.

38) Describe star topology

The star topology consists of a central hub connected to the nodes. It is one of the simplest to set up and maintain.

39) What is a gateway?

A gateway provides a connection between two or more network segments. It is usually a computer that runs gateway software and provides translation services. This translation is key to allowing different systems to communicate on the network.

40) What are the disadvantages of star topology?

A major disadvantage of the star topology is that once the central hub or switch is damaged, the entire network becomes unusable.

41) What is SLIP?

SLIP or Serial Line Interface Protocol is actually an old protocol developed in the early days of UNIX. It is one of the protocols used for remote access.

42) Give some examples of private network addresses.

10.0.0.0, subnet mask is 255.0.0.0

172.16.0.0, subnet mask is 255.240.0.0

1,000-person CCIE certification exchange group 463904693

Get the latest CCIE exam question bank

CCIE certification experience sharing group: 463904693

192.168.0.0, subnet mask is 255.255.0.0

43) What is tracert?

Tracert is a Windows utility that can be used to trace the route taken by data from a router to a destination network . It also displays the number of hops taken during the entire transmission route.

44) What are the functions of a network administrator?

A network administrator has many responsibilities that can be summarized into 3 key functions: installing the network, configuring network settings, and maintaining/troubleshooting the network.

45) Describe a disadvantage of peer-to-peer networks.

When you are accessing resources that are shared by a workstation on the network, the performance of that workstation may be degraded.

46) What is a hybrid network?

A hybrid network is a network setup that utilizes both client-server and peer-to-peer architectures.

47) What is DHCP?

DHCP is the abbreviation of Dynamic Host Configuration Protocol. Its main task is to automatically assign IP addresses to devices on the network. It first checks for the next available address that is not already occupied by any device and then assigns it to the network device.

48) What is the main function of ARP?

The main task of ARP or Address Resolution Protocol is to map known IP addresses to MAC layer addresses.

49) What is TCP/IP?

TCP/IP is the abbreviation of Transmission Control Protocol/Internet Protocol. It is a set of protocol layers designed to facilitate data exchange over different types of computer networks, also known as heterogeneous networks.

50) How to manage the network using a router?

The router has a console built into it that allows you to configure different settings, such as security and data logging. You can assign restrictions to computers, such as the resources they are allowed to access, or the specific times of the day when they can browse the Internet.

You can even impose restrictions on sites that are not visible across the entire web.

51) When you want to transfer files between different platforms (such as between a UNIX system and a Windows server), what protocol can you apply?

File transfer between these different servers is done using FTP (File Transfer Protocol). This is possible because FTP is platform independent.

52) What is the use of default gateway?

The default gateway provides a way for the local network to connect to the external network. The default gateway used to connect to the external network is usually the address of an external router port.

53) One way to protect a network is to use passwords. What is considered a good password?

A good password consists not only of letters, but also of a combination of letters and numbers. Passwords that combine uppercase and lowercase letters are better than passwords that use all uppercase letters or all lowercase letters. Passwords must not be easily guessed by hackers, such as dates, names, favorites, etc.

54) What is the correct termination ratio for UTP cable?

The normal termination for unshielded twisted pair network cables is 100 ohms.

55) What is netstat?

Netstat is a command-line utility that provides useful information about the current TCP/IP settings of a connection.

56) What is the number of network IDs in a Class C network?

For a Class C network, the number of network ID bits available is 21. The number of possible network IDs is 2, increasing to 21, or 2,097,152. The number of host IDs per network ID is 2, increasing to 8 minus 2, or 254.

57) What happens when you use a cable that is longer than the specified length?

A cable that is too long will result in signal loss. This means that data transmission and reception will be affected as the signal decreases over length.

58) What common software problems can cause network defects?

Software-related issues can be any one or a combination of the following:

  • Client Server Issues
  • Application Conflicts
  • Configuration Error
  • Protocol mismatch
  • Security Question
  • User Policy and Rights Issues
59) What is ICMP?

ICMP is the Internet Control Message Protocol. It provides messaging and communication for protocols within the TCP/IP protocol stack. This is also the protocol that manages error messages used by network tools such as PING.

60) What is Ping?

Ping is a utility that allows you to check connectivity between network devices on a network. You can ping a device using its IP address or device name (such as your computer name).

61) What is peer-to-peer (P2P)?

Peer-to-peer is a network that does not reply on a server. All PCs on this network are individual workstations.

62) What is DNS?

DNS is Domain Name System. The main function of this network service is to provide host name for TCP/IP address resolution.

63) What are the advantages of optical fiber over other media?

One of the main advantages of fiber optics is that it is less susceptible to electrical interference. It also supports higher bandwidth, meaning more data can be sent and received. Signal degradation over long distances is also very minimal.

64) What is the difference between a hub and a switch?

A hub acts as a multi-port repeater. However, as more and more devices are connected to it, it will not be able to effectively manage the traffic passing through it. A switch provides a better alternative that can improve performance, especially when high traffic is expected on all ports.

65) What are the different network protocols supported by the Windows RRAS service?

Supports three major network protocols: NetBEUI, TCP/IP and IPX.

66) What are the maximum networks and hosts in class A, B, and C networks?

For class A, there are 126 possible networks and 16,777,214 hosts

For class B, there are 16,384 possible networks and 65,534 hosts

For class C, there are 2,097,152 possible networks and 254 hosts

67) What is the standard color order for straight-through cables?

Orange/white, orange, green/white, blue, blue/white, green, brown/white, brown.

68) What protocol falls below the application layer of the TCP/IP protocol stack?

The following are TCP/IP application layer protocols: FTP, TFTP, Telnet, and SMTP.

9) You need to connect two computers for file sharing. Is it possible to do this without using a hub or router?

Yes, you can connect two computers together using a single cable. A crossover type cable can be used in this case. In this setup, the data transmission pins of one cable are connected to the data receiving pins of the other cable and vice versa.

70) What is ipconfig?

Ipconfig is a utility that is often used to identify the address information of a computer on a network. It can display the physical address as well as the IP address.

71) What is the difference between straight-through and crossover cables?

A straight-through cable is used to connect a computer to a switch, hub, or router. A crossover cable is used to connect two similar devices together, such as PC to PC or hub to hub.

72) What is client/server?

Client/server is a type of network in which one or more computers act as servers. The server provides a centralized repository of resources, such as printers and files. The client refers to the workstation that accesses the server.

73) Describe the network.

A network refers to the interconnection between computers and peripheral devices for data communication. Network connections can be made using wired cables or through wireless links.

Follow the WeChat public account: Weak Current Talk

74) When a NIC card is moved from one PC to another, is the MAC address also transferred?

Yes, that’s because the MAC address is hardwired to the NIC circuitry, not the PC. This also means that the PC can have a different MAC address when the NIC card is replaced with another one.

75) Explain clustering support

Cluster support refers to the ability of a network operating system to connect multiple servers in a fault-tolerant group. The main purpose of this is that in the event of a failure of one server, the next server in the cluster will continue all processing.

76) In a network consisting of two servers and twenty workstations, where is the best place to install an antivirus program?

An antivirus program must be installed on all servers and workstations to ensure protection. This is because an individual user can access any workstation and introduce a computer virus when inserting a removable hard drive or flash drive.

77) Describe Ethernet.

Ethernet is one of the popular network technologies used today. It was developed in the early 1970s and is based on specifications set out in the IEEE. Ethernet is used in local area networks.

78) What are the disadvantages of implementing a ring topology?

If one workstation on the network fails, it may result in the loss of the entire network. Another disadvantage is that when adjustments and reconfigurations need to be made on a specific part of the network, the entire network must also be temporarily shut down.

79) What is the difference between CSMA/CD and CSMA/CA?

CSMA/CD or collision detection, resends the data frame whenever a collision occurs. CSMA/CA or collision avoidance, will first broadcast the intention to send before data transmission.

80) What is SMTP?

SMTP is the abbreviation of Simple Mail Transfer Protocol. This protocol handles all internal mails and provides the necessary mail delivery services on top of the TCP/IP protocol stack.

81) What is multicast routing?

Multicast routing is a targeted form of broadcasting that sends messages to a selected group of users rather than sending them to all users on a subnet.

82) What is the importance of encryption on the Internet?

Encryption is the process of converting information into a code that is unreadable to the user. It is then translated or decrypted back to its normal readable format using a secret key or cipher. Encryption helps ensure that information that is intercepted along the way remains unreadable because the user must have the correct cipher or key.

83) How are IP addresses arranged and displayed?

IP addresses appear as a series of four decimal numbers separated by periods or dots. Another term for this arrangement is dotted decimal format. An example is 192.168.101.2

84) Explain the importance of certification.

Authentication is the process of verifying a user’s credentials before they log into a network. It is usually done using a username and password. This provides a secure means of limiting access from harmful intruders on the network.

85) What does tunnel mode mean?

This is a data exchange mode in which the two communicating computers do not use IPSec themselves. Instead, the gateway connecting the LAN to the transit network creates a virtual tunnel that uses the IPSec protocol to protect all communications passing through it.

86) What are the different technologies involved in establishing a WAN link?

Analog connection – uses regular phone lines; Digital connection – uses digital phone lines; Switched connection – uses multiple sets of links between the sender and receiver to move data.

87) What is one advantage of mesh topology?

In the event that one link fails, there is always another link available. Mesh topology is actually one of the most fault-tolerant network topologies.

88) When troubleshooting computer network problems, what common hardware-related issues might occur?

The majority of your network is made up of hardware. Problems in these areas can include hard drive failures, NIC damage, or even hardware booting. Improper hardware configuration is also a problem.

89) What can be done to fix signal degradation issues?

A common way to deal with this kind of problem is to use repeaters and hubs as it will help in regenerating the signal thus preventing signal loss. Checking if the cable is properly terminated is also a must.

90) How does Dynamic Host Configuration Protocol assist in network management?

Instead of having to visit each client computer to configure a static IP address, a network administrator can apply Dynamic Host Configuration Protocol to create a pool of IP addresses, called a range, that can be dynamically assigned to clients.

91) Explain the concept of network in general?

A profile is a configuration setting that is set for each user. For example, you can create a profile that places users into groups.

92) What is Sneakernet?

Sneakernet is considered to be the earliest form of networking in which data was physically transferred using removable media (such as disks, tapes).

93) What is the role of IEEE in computer networking?

IEEE or the Institute of Electrical and Electronics Engineers is an organization of engineers that publishes and manages standards for electrical and electronic equipment. This includes network equipment, network interfaces, cablings, and connectors.

94) What protocols are there under the TCP/IP Internet layer?

There are 4 protocols managed by this layer. These are ICMP, IGMP, IP and ARP.

95) When it comes to networking, what are permissions?

Permissions are authorized permissions to perform specific actions on the network. Each user on the network can be assigned individual permissions, depending on what that user must allow.

96) What is a basic requirement for establishing a VLAN?

A VLAN is required because there is only one broadcast domain at the switch level, which means whenever a new user connects, that information is propagated throughout the network. VLAN on a switch helps in creating separate broadcast domains at the switch level. It is used for security purposes.

97) What is IPv6?

IPv6 or Internet Protocol version 6 was developed to replace IPv4. Currently, IPv4 is being used to control Internet traffic, but IPv4 has become saturated. IPv6 is able to overcome this limitation.

98) What is RSA algorithm?

RSA is the abbreviation of Rivest-Shamir-Adleman algorithm. It is the most commonly used public key encryption algorithm.

99) What is mesh topology?

A mesh topology is a setup where every device is directly connected to every other device on the network. Therefore, it requires each device to have at least two network connections.

100) What is the maximum segment length of a 100Base-FX network?

The maximum permissible length of a network segment using 100Base-FX is 412 meters. The maximum length of the entire network is 5 kilometers.

Leave a Reply

Your email address will not be published. Required fields are marked *