Golgappa.net | Golgappa.org | BagIndia.net | BodyIndia.Com | CabIndia.net | CarsBikes.net | CarsBikes.org | CashIndia.net | ConsumerIndia.net | CookingIndia.net | DataIndia.net | DealIndia.net | EmailIndia.net | FirstTablet.com | FirstTourist.com | ForsaleIndia.net | IndiaBody.Com | IndiaCab.net | IndiaCash.net | IndiaModel.net | KidForum.net | OfficeIndia.net | PaysIndia.com | RestaurantIndia.net | RestaurantsIndia.net | SaleForum.net | SellForum.net | SoldIndia.com | StarIndia.net | TomatoCab.com | TomatoCabs.com | TownIndia.com
Interested to Buy Any Domain ? << Click Here >> for more details...



Networking Interview Questions
Questions Answers Views Company eMail

Which command will mount /usr/local from server called machine1?

1 4501

What is ARP padding?

HCL,

1 8345

Explain the automation frame work?

HCL, Tech Mahindra,

1 3886

Can we extend the range of Wifi with the use of some softwares, if yes, which one? Or is there any hardware to do so, how much will it cost?

2621

Draw diagrams for the waveforms you would expect when the bit sequence 10111001 is transmitted on IEEE 802.3 

3140

With the aid of a diagram explain how CSMA/CD is implemented in a 10BASE T hub network. Why is Ethernet mostly used as a 'best effort' datagram service?

Sri Lanka Institute of Information Technology (SLIIT), Virtusa,

1 5822

hey friends….  i m working in Avaya India Pvt. Ltd.(on third party payroll) as customer support engineer since last 1 year. Now i m thinking to do Protocol development course (LTE,MAC,RLC,RRC,3G etc). but i m a bit confuse that it will help me or not. whether i can get a good job or not. so please help me out by your suggestions...

1 2730

What happend if the token lost in token ring IEEE802.5?

1 2461

How does FDDI node determine whether it can send asynchronous traffic and synchronous traffic

2120

How would you monitor and maintain the local area network, email, internet & intranet systems to ensure data security and prevent occurrence of faults?

HCL,

2230

congestion at network due to buffer overflows and packet dropping leads to a message confidentiality threat named.....

1586

Networking?

CMS, XL Dynamics,

2 3483

what are the different types of datasets related to the network intrusion detection system?

OVGU,

1496

SonicWALL keep on fail over after upgrade from 6.2.2.2 to 6.2.6.0.anyone have encounter this and what is the next step to solve the issue

1532

What are the two reasons for using layered protocols?

3899


Un-Answered Questions { Networking }

Define the proper termination rate for utp cables?

953


What is network management?

1018


What is difference between baseband and broadband transmission

1092


explain how do we do authentication with message digest(md5)? (Usually md is used for finding tampering of data)

883


What is an ip address?

1112


who is a hacker?

999


how do u share printer through FTP(fire transfer protocol)?

2435


Compare satellite with fiber as a communication medium and enumerate the application areas where satellite still holds a niche(or special)marker.

1756


What is the maximum length allowed for a utp cable?

424


What is the number of network ids in a class c network?

421


What ftp means?

1068


Discuss in detail, the reasons why a layered Network Architecture Model is used to construct a communications network.

297


Why does ATM use the cell of small and fixed length ?

2606


What is 3 way handshake?

999


What is the meaning of 10base-t?

420