Networking Questions for Freshers with Answers

Symmetric Cryptosystems: The same key is used for both encryption and decryption......
The following are the disadvantages of Symmetric Cryptosystems: - Key transportation is one disadvantage of Symmetric Cryptosystems.......
The following are the disadvantages of Asymmetric Cryptosystems: -The encryption speed is the disadvantage of Asymmetric Cryptosystems. Popular secret-key encryption methods......
Public Key Infrastructure: A set of hardware, software, people, policies and procedures comprises the Public Key Infrastructure (PKI) and digital certificates are revoked.......
PKI Client: PKI Client is software which enables the USB of eToken operation and implementation of eToken solutions which are PKI based.......
A digital certificate is a credential which validates the certificate owner’s identity.......
A way in which data is transmitted between networks in a secured manner. The complete data is segmented into packets and then transmitted through the tunnel........
VPN Tunneling Packets are packets to transmit over VPN in a specific VPN protocol format........
Voluntary Tunnel: The user creates a voluntary tunnel model. This model is typically uses a L2TP enabled client........
Static Tunnel: The manually created tunnels are called Static Tunnels. Static tunnels creation is the only choice......
Point-to-Point Protocol is known as data link protocol. This protocol is most commonly for establishment of direct connection among network nodes........
The following are the fields in the format of PPP packet. The fields transmission is from left to right........
PPTP is one of the methods to implement Virtual Private Networks. Confidentiality or encryption does not provided by PPTP.......
Generic Routing Encapsulation is a protocol for Point-to-Point Protocol........
Challenge-Handshake Authentication Protocol authenticates to an authenticating entity of a user or network.......
Password Authentication Protocol is one of the simple authentication protocols which are used for the purpose of authenticating a user to a network access server........
Data origin authentication, data integrity and replay protection are provided by the Authentication Header protocol......
Encapsulating Security Payload is a protocol for the inter security architecture. It is the key protocol.......
NetBIOS protocol utilizes the 802.2 type 1 mode for the purpose of providing the NetBIOS/NetBEUI name service and also the datagram service......
The transmission of datagram to a host group is done in IP multicasting by setting zero or more hosts that are identified by a single IP destination address......
Multicasting is a technology for the purpose of delivering information to a destinations group simultaneously........
Ping: Ping is used for verification of IP-Level connectivity. The following are the processes for using ping:........
An ICMP echo packet to the named host is sent by Tracert. It sends packet with a TTL of 1, then TTL of 2 and so on.......
Real-time Transport Protocol is a standardized packet format. It is used for delivering audio and video over internet........
RTP multiplexing is a concept used for carrying multiple voice streams between IP telephony gateways, in one RTP packet........
RSVP allocates resources for signaling messages which traverse the network. RSVP is receiver-initiated.......
The basic communication protocol for internet is TCP/IP. It is also being used as communication protocol in a private network.......
TCP/IP protocol maps four layers namely Application Layer, Transport and Internet Layer and Network Interface Layer.......
TCP headers should perform various tasks. The tasks are performed by various ports as follows:.......
CDMA is communication technique which is based on multiple-access scheme........
Dynamic Host Configuration Protocol is one of the communication protocol which lets the network administrators manage and assignment of internet protocol addresses of an enterprise automatically.......
In a workgroup: All computer systems are peers and no computer can not control another computer......
Baseband: Digital signals are used, Frequency division multiplexing is not possible.......
The core concept of Redundant Array of Independent Disks is two or more drives are combined together for improvement of performance and fault tolerance......
Terminal service is a client-server environment. In this environment, one computer acts as a server which receives requests from the clients........
The following are the problems in brief in a switched LAN. Packet sniffing – the ports need to be picked by one and replicate them for monitoring port........
Socket activities are monitored by IP and Socket Monitor tool. Socket monitor is designed for programming using IP and Sockets.......
Mutex: A mutex object allows only one thread among the threads concurrently executed, into a controlled section in a serialized fashion.......
Priority inversion is the scenario in scheduling where a task holds shared resources which have lower priority for the higher priority resource.......
Microsoft Message Queue is a protocol for messaging. Applications are allowed for running on disparate servers for communicating in a fail-safe manner.......