Networking Interview Questions and Answers - Part 2

Network Security - Data Encryption Standard (DES) weakness and strength - The Data Encryption Standard (DES) is a symmetric key block cipher which takes 64-bit plaintext...........
Network Security - The function of a denial of service attack is to flood its target machine with too much traffic.............
Network Security - What are Brute Force Attacks? - Brute forcing is a mechanism which is used by an attacker to break the encryption............
Network Security - How do you use RSA for both authentication and secrecy? - RSA is a public key encryption algorithm. The RSA algorithms are based...........
Network Security - Can you differentiate among encoding, encryption and hashing? - RSA is a public key encryption algorithm. Encoding: Basically encoding is used to protect the integrity of data as............
Network Security - A secure hash function should have the following characteristics:.......
Network Security - A digital signature is an electronic analogue of a written signature; the digital signature can be used to provide assurance............
Network Security - Basically Authentication Header protects IP header and provides the complete authenticity to the IP packets.............
Network Security - The SSL protocol (Secure Socket Layer protocol) was originally developed by Netscape..............
Network Security - What is PIX firewall security? How does it differ from a firewall? - It is a popular IP firewall and NAT (Network Address Translation) appliance..............
Network Security - What are Malware? Explain different types of Malware - Malware is a software program which is developed to destroy a computer system...............
Network Security - What are replay attacks? - Replay attacks are the network attacks in which an attacker spies the conversation...............
Network Security - ‘encrypt’ and ‘compress’ data during transmission - Data should be transmitted over any communication network in such a way..............
Network Security - What is the goal of Information Security in an organization? - Confidentiality, Integrity and Availability...............
Network Security - Symmetric-Key Cryptography: Symmetric-key cryptography uses a single key for both encryption and decryption...............
IP (Internet Protocol) - Addressing: For the purpose of delivering datagram packets, IP needs to know about the address of the destination........
Classes of IP address - IP addresses are organized into classes. For convenience of humans, IP addresses are expressed in the decimal format........
Broadcast, Unicast and Multicast - Unicast: A term used in communication to describe a piece of information to send from one point to another........
What is Network Mask? - A network mask is used for determination of what subnet an IP address belongs to........
Subnetting - A subnet describes a set of networked computers which have common IP address routing prefix.........
User Datagram Protocol (UDP) - User datagram protocol allows computer applications to send messages as datagram packets from source to destination on an Internet Protocol.......
TCP Windowing concept - TCP Windowing is a concept that is used for avoiding congestion in the network traffic........
Domain Name System (DNS) - A hierarchical naming system for computer systems, services or for that matter any resource participating in the internet........
What is the TTL (Time to Live)? - TTL is a value in data packet of Internet Protocol. It communicates to the network router whether or not the packet........
Use of Internet Control Message Protocol (ICMP) - Internet Control Message Protocol is one of the important protocols in the Internet Protocol suite.........
What is the use of IGMP protocol? - Internet Group Management Protocol: - It allows internet hosts to participate in multicasting.........
What are Ping and Tracert? - Ping and tracert are the commands used to send information to some remote computers to receive some information..........
Explain RSVP. How does it work? - Resource Reservation protocol is used to reserve resources across a network. It is used for requesting a specific Quality of Service (QoS) from the network.......
Explain the concept of DHCP - Dynamic Host Configuration Protocol is used assigning IP addresses to computers in a network.........
differences between a domain and a workgroup - In a domain, one or more computer can be a server to manage the network. On the other hand in a workgroup........
Explain how NAT works - Network Address Translation translates and IP address used in a network to another IP address........
What is PPP protocol? Explain PPP packet format - Point to Point protocol helps communication between 2 computers over a serial cable, phone line or........
What is IP Spoofing and how can it be prevented? - IP spoofing is a mechanism used by attackers to gain unauthorized access to a system. Here, the........
IP datagram, Fragmentation and MTU - IP datagram can be used to describe a portion of IP data. Each IP datagram has set of fields arranged.........
What is an application gateway? - An application gateway is an application program that runs on a firewall between two networks. An.........
Circuit Level Gateway - A circuit level gateway is used to find if a session in TCP handshaking is legitimate or not. It can be.........
What is 'Gateway Of Last Resort'? - A Gateway of Last Resort or Default gateway is a route used by the router when no other known route.........
What are switches? Explain the concepts of Layer-3 switches - It is a device that connects multiple network segments..........
What is Router? Explain components of Routers - The way switches connect multiple computers, a router connects multiple networks. Routers comprise .........
Overview of OSI layer - OSI stands for Open Systems Interconnection........
Different layers in the OSI model - Application Layer: Closest to the end user, Interact directly with the software application........
Unicast IP Addresses - It is an IP address that uniquely identifies a host in a network..........
What is IP Multicasting? - It is an IP address that identifies a particular group of hosts in network.........
Classes of IP addresses. Why do we need them? .........
What is Subneting? Explain the advantages of using Subneting - Subneting is dividing a network into several subnets......
What is Superneting? Concept of custom Subneting - Supernetting or Classless Inter-Domain Routing (CIDR)........
What is VLSM, Variable length subnet masking? - VLSM is a means of allocating IP addressing resources to subnets according to their individual need .......
What is Data Fragmentaion? Explain how Data Fragmentaion works - Fragmentation occurs when storage space is used inefficiently due to which storage capacity and performance is reduced. ........
Concepts and capabilities of IP Datagram - Data transmitted over an internet using IP is carried in messages called IP datagrams.........