Technical Interview Questions – Networking

1. What is an IP address?
2. What is a subnet mask?
3. What is ARP?
4. What is ARP Cache Poisoning?
5. What is the ANDing process?
6. What is a default gateway? What happens if I don't have one?
7. Can a workstation computer be configured to browse the
Internet and yet NOT have a default gateway?
8. What is a subnet?
9. What is APIPA?
10. What is an RFC? Name a few if possible (not necessarily
the numbers, just the ideas behind them)
11. What is RFC 1918?
12. What is CIDR?
13. You have the following Network ID: 192.115.103.64/27.
What is the IP range for your network?
14. You have the following Network ID: 131.112.0.0. You need
at least 500 hosts per network. How many networks can you
create? What subnet mask will you use?
15. You need to view at network traffic. What will you use?
Name a few tools
16. How do I know the path that a packet takes to the
destination?
17. What does the ping 192.168.0.1 -l 1000 -n 100 command do?
18. What is DHCP? What are the benefits and drawbacks of
using it?
19. Describe the steps taken by the client and DHCP server
in order to obtain an IP address.
20. What is the DHCPNACK and when do I get one? Name 2
scenarios.
21. What ports are used by DHCP and the DHCP clients?
22. Describe the process of installing a DHCP server in an
AD infrastructure.
23. What is DHCPINFORM?
24. Describe the integration between DHCP and DNS.
25. What options in DHCP do you regularly use for an MS
network?
26. What are User Classes and Vendor Classes in DHCP?
27. How do I configure a client machine to use a specific
User Class?
28. What is the BOOTP protocol used for, where might you
find it in Windows network infrastructure?
29. DNS zones – describe the differences between the 4 types.
30. DNS record types – describe the most important ones.
31. Describe the process of working with an external domain
name
32. Describe the importance of DNS to AD.
33. Describe a few methods of finding an MX record for a
remote domain on the Internet.
34. What does "Disable Recursion" in DNS mean?
35. What could cause the Forwarders and Root Hints to be
grayed out?
36. What is a "Single Label domain name" and what sort of
issues can it cause?
37. What is the "in-addr.arpa" zone used for?
38. What are the requirements from DNS to support AD?
39. How do you manually create SRV records in DNS?
40. Name 3 benefits of using AD-integrated zones.
41. What are the benefits of using Windows 2003 DNS when
using AD-integrated zones?
42. You installed a new AD domain and the new (and first) DC
has not registered its SRV records in DNS. Name a few
possible causes.
43. What are the benefits and scenarios of using Stub zones?
44. What are the benefits and scenarios of using Conditional
Forwarding?
45. What are the differences between Windows Clustering,
Network Load Balancing and Round Robin, and scenarios for
each use?
46. How do I work with the Host name cache on a client
computer?
47. How do I clear the DNS cache on the DNS server?
48. What is the 224.0.1.24 address used for?
49. What is WINS and when do we use it?
50. Can you have a Microsoft-based network without any WINS
server on it? What are the "considerations" regarding not
using WINS?
51. Describe the differences between WINS push and pull
replications.
52. What is the difference between tombstoning a WINS record
and simply deleting it?
53. Name the NetBIOS names you might expect from a Windows
2003 DC that is registered in WINS.
54. Describe the role of the routing table on a host and on
a router.
55. What are routing protocols? Why do we need them? Name a
few.
56. What are router interfaces? What types can they be?
57. In Windows 2003 routing, what are the interface filters?
58. What is NAT?
59. What is the real difference between NAT and PAT?
60. How do you configure NAT on Windows 2003?
61. How do you allow inbound traffic for specific hosts on
Windows 2003 NAT?
62. What is VPN? What types of VPN does Windows 2000 and
beyond work with natively?
63. What is IAS? In what scenarios do we use it?
64. What's the difference between Mixed mode and Native mode
in AD when dealing with RRAS?
65. What is the "RAS and IAS" group in AD?
66. What are Conditions and Profile in RRAS Policies?
67. What types or authentication can a Windows 2003 based
RRAS work with?
68. How does SSL work?
69. How does IPSec work?
70. How do I deploy IPSec for a large number of computers?
71. What types of authentication can IPSec use?
72. What is PFS (Perfect Forward Secrecy) in IPSec?
73. How do I monitor IPSec?
74. Looking at IPSec-encrypted traffic with a sniffer. What
packet types do I see?
75. What can you do with NETSH?
76. How do I look at the open ports on my machine?

Answer Posted / dheeraj thakur

What is an IP address?
This definition is based on Internet Protocol Version 4.
See Internet Protocol Version 6 (IPv6) for a description of
the newer 128-bit IP address. Note that the system of IP
address classes described here, while forming the basis for
IP address assignment, is generally bypassed today by use
of Classless Inter-Domain Routing (CIDR) addressing.
In the most widely installed level of the Internet Protocol
(IP) today, an IP address is a 32-bit number that
identifies each sender or receiver of information that is
sent in packets across the Internet. When you request an
HTML page or send e-mail, the Internet Protocol part of
TCP/IP includes your IP address in the message (actually,
in each of the packets if more than one is required) and
sends it to the IP address that is obtained by looking up
the domain name in the Uniform Resource Locator you
requested or in the e-mail address you're sending a note
to. At the other end, the recipient can see the IP address
of the Web page requestor or the e-mail sender and can
respond by sending another message using the IP address it
received.

An IP address has two parts: the identifier of a particular
network on the Internet and an identifier of the particular
device (which can be a server or a workstation) within that
network. On the Internet itself - that is, between
therouter that move packets from one point to another along
the route - only the network part of the address is looked
at.

IP V6 IPv6 (Internet Protocol Version 6) is the latest
level of the Internet Protocol (IP) and is now included as
part of IP support in many products including the major
computer operating systems. IPv6 has also been called
"IPng" (IP Next Generation). Formally, IPv6 is a set of
specifications from the Internet Engineering Task Force
(IETF). IPv6 was designed as an evolutionary set of
improvements to the current IP Version 4. Network hosts and
intermediate nodes with either IPv4 or IPv6 can handle
packets formatted for either level of the Internet
Protocol. Users and service providers can update to IPv6
independently without having to coordinate with each other.

The most obvious improvement in IPv6 over the IPv4 is that
IP addresses are lengthened from 32 bits to 128 bits. This
extension anticipates considerable future growth of the
Internet and provides relief for what was perceived as an
impending shortage of network addresses.

IPv6 describes rules for three types of addressing: unicast
(one host to one other host), anycast (one host to the
nearest of multiple hosts), andmulticast (one host to
multiple hosts). Additional advantages of IPv6 are:

Options are specified in an extension to the header that is
examined only at the destination, thus speeding up overall
network performance.
The introduction of an "anycast" address provides the
possibility of sending a message to the nearest of several
possible gateway hosts with the idea that any one of them
can manage the forwarding of the packet to others. Anycast
messages can be used to update routing tables along the
line.
Packets can be identified as belonging to a particular
"flow" so that packets thatare part of a multimedia
presentation that needs to arrive in "real time" can be
provided a higher quality-of-service relative to other
customers.
The IPv6 header now includes extensions that allow a packet
to specify a mechanism for authenticating its origin, for
ensuring data integrity, and for ensuring privacy.
What is a subnet mask?
A subnet mask allows you to identify which part of an IP
address is reserved for the network, and which part is
available for host use. If you look at the IP address
alone, especially now with classless inter-domain routing,
you can't tell which part of the address is which. Adding
the subnet mask, or netmask, gives you all the information
you need to calculate network and host portions of the
address with ease. In summary, knowing the subnet mask can
allow you to easily calculate whether IP addresses are on
the same subnet, or not.
What is ARP?
ARP is a very important part of IP networking. ARP is used
to connect OSI Layer 3 (Network) to OSI Layer 2 (Data-
Link). For most of us, that means that ARP is used to link
our IP addressing to our Ethernet addressing (MAC
Addressing). For you to communicate with any device on your
network, you must have the Ethernet MAC address for that
device. If the device is not on your LAN, you go through
your default gateway (your router). In this case, your
router will be the destination MAC address that your PC
will communicate with.
What is ARP Cache Poisoning?
ARP cache poisoning, also known as ARP spoofing, is the
process of falsifying the source Media Access Control (MAC)
addresses of packets being sent on an Ethernet network. It
is a MAC layer attack that can only be carried out when an
attacker is connected to the same local network as the
target machines, limiting its effectiveness only to
networks connected with switches, hubs, and bridges; not
routers.
What is the ANDing process?
Notice that when the resulting AND values are converted
back to binary, it becomes clear that the two hosts are on
different networks. Computer A is on subnet 192.168.56.0,
while the destination host is on subnet 192.168.64.0, which
means that Computer A will next be sending the data to a
router. Without ANDing, determining local and remote hosts
can be difficult. Once you’re very familiar with subnetting
and calculating ranges of addresses, recognizing local and
remote hosts will become much more intuitive.
Whenever you’re in doubt as to whether hosts are local or
remote, use the ANDing process. You should also notice that
the ANDing process always produces the subnet ID of a given
host.
What is a default gateway? What happens if I don't have
one?
In computer networking, a default network gateway is the
device that passes traffic from the local subnet to devices
on other subnets. The default gateway often connects a
local network to the Internet, although internal gateways
for connecting two local networks also exist.
Can a workstation computer be configured to browse the
Internet and yet NOT have a default gateway?
What is a subnet?
What is APIPA?
Short for Automatic Private IP Addressing, a feature of
later Windows operating systems. With APIPA, DHCP clients
can automatically self-configure an IP address and subnet
mask when a DHCPserver isn't available. When a DHCP client
boots up, it first looks for a DHCP server in order to
obtain an IP address and subnet mask. If the client is
unable to find the information, it uses APIPA to
automatically configure itself with an IP address from a
range that has been reserved especially for Microsoft. The
IP address range is 169.254.0.1 through 169.254.255.254.
The client also configures itself with a default class B
subnet mask of 255.255.0.0. A client uses the self-
configured IP address until a DHCP server becomes
available.
The APIPA service also checks regularly for the presence of
a DHCP server (every five minutes, according to Microsoft).
If it detects a DHCP server on the network, APIPA stops,
and the DHCP server replaces the APIPA networking addresses
with dynamically assigned addresses.

APIPA is meant for nonrouted small business environments,
usually less than 25 clients.

What is an RFC? Name a few if possible (not necessarily the
numbers, just the ideas behind them)
Short for Request for Comments, a series of notes about the
Internet, started in 1969 (when the Internet was the
ARPANET). An Internet Document can be submitted to the IETF
by anyone, but the IETF decides if the document becomes an
RFC. Eventually, if it gains enough interest, it may evolve
into an Internet standard.
Each RFC is designated by an RFC number. Once published, an
RFC never changes. Modifications to an original RFC are
assigned a new RFC number.

Is This Answer Correct ?    47 Yes 1 No



Post New Answer       View All Answers


Please Help Members By Posting Answers For Below Questions

i made lan connections ,then how can i establish the network....with that connections only is the network is established ...tell me the procedure for giving the lan connection for some(10) pc's?

1296


why multiple inheritence concept is not supported in c#?

1536


WHERE CAN I GET SQL SERVER NOTES SOFT COPY?

1332


Why DG Set manufacturers do not give options for alternative fuels. They even do not allow to change at the cost of custmers.

1363


Explain the concept of segmentaion.

1696






How to freely move a ball in graphics mode.

1898


compare the conditional operator with if-else-if statement.

1427


what are register variables?what are the advantages of using register variables in c language?

2491


Why is it that a single, all – encompassing metric cannot be developed for programme complexity or programme quality?

1517


sir/medam i had completed my B-TECH(CSE)2011 with 61%.i have to go USA for futhure studies.i dnt know what is steps for do futhure studies in USA so could you please tell me

1508


plz tell me which books r important for gate exam (CSE)

1926


What are daemon Threads?

1891


what is the number of water, sand and cement required for moulding brick?

900


is built-in data-type are abstract data-types in java

1459


#include int fn(int v); main() { printf("%d\n",fn(7)); } int fn(int v) { if(v==1 || v==0) return 1; if(v%2==0) return fn(v/2)+2; else return fn(v-1)+3; }

1510