Top 50 Computer Network Security Interview Questions
Q1. What Is Region ?
When hierarchical routing is used, the routers are divided into what we call areas, with each router understanding all of the information about how to route packets to destinations inside its very own location, but knowing nothing approximately the internal shape of different regions.
Q2. What Is Attenuation ?
The degeneration of a sign over distance on a community cable is known as attenuation.
Q3. What Is Kerberos ?
It is an authentication service developed on the Massachusetts Institute of Technology. Kerberos uses encryption to save you intruders from coming across passwords and gaining unauthorized get admission to to files.
Q4. What Is Igp (interior Gateway Protocol) ?
It is any routing protocol used within an autonomous machine.
Q5. What Are Major Types Of Networks And Explain ?
Server-based community
Peer-to-peer community
Peer-to-peer community, computer systems can act as each servers sharing resources and as customers the usage of the resources.
Server-based totally networks offer centralized control of network sources and rely on server computer systems to offer security and network administration.
Q6. What Is Brouter ?
Hybrid gadgets that integrate the functions of both bridges and routers.
Q7. What Is Source Route ?
It is a sequence of lP addresses identifying the path a datagram ought to comply with. A supply path can also optionally be protected in an IP datagram header.
Q8. What Is Raid ?
A approach for providing fault tolerance by means of the use of a couple of tough disk drives.
Q9. What Is Slip (serial Line Interface Protocol) ?
It is a completely simple protocol used for trmission of IP datagrams throughout a serial line.
Q10. What Does The Mount Protocol Do ?
The Mount protocol returns a report deal with and the name of the document device in which a requested record resides. The message is despatched to the client from the server after reception of a patron’s request.
Q11. What Are The Two Types Of Trmission Technology Available ?
Broadcast and
point-to-point
Q12. Which Protocol Does Https Uses At The Trport Layer For Sending And Receiving Data?
TCP.
Q13. What Is The Minimum And Maximum Length Of The Header In The Tcp Segment And Lp Datagram?
The header have to have a minimum period of 20 bytes and may have a maximum period of 60 bytes.
Q14. What Is A Management Information Base (mib) ?
A Management Information Base is part of each SNMP-controlled device. Each SNMP agent has the MIB database that incorporates data about the device’s reputation, its overall performance, connections, and configuration. The MIB is queried by means of SNMP.
Q15. What Is The Range Of Addresses In The Classes Of Internet Addresses ?
Class A zero.0.0.0 - 127.255.255.255
Class B 128.0.0.Zero - 191 .255.255.255
Class C 192.0.Zero.0 - 223.255.255.255
Class D 224.Zero.Zero.0 - 239.255.255.255
Class E 240.0.Zero.0 - 247.255.255.255
Q16. What Are 10base2, 10base5 And 10baset Ethernet L ?
10Base2: An Ethernet term which means a most trfer rate of 10 Megabits per 2d that makes use of baseband signaling, with a contiguous cable phase period of 100 meters and a most of 2 segments.
10Base5: An Ethernet term which means a most trfer fee of 10 Megabits according to second that makes use of baseband signaling, with 5 non-stop segments no longer exceeding 100 meters per segment.
10BaseT: An Ethernet time period that means a maximum trfer rate of 10 Megabits per 2nd that makes use of baseband signaling and twisted pair cabling.
Q17. In An Icmp Address Mask Request, What Is The Attacker Looking For?
The attacker is seeking out the subnet/community mask of the victim. This would help the attacker to map the inner community.
Q18. What Protocol Is Used By Dns Name Servers ?
DNS uses UDP for communique among servers, It is a better choice than TCP because of the progressed velocity a connectionless protocol gives. Of route, trmission reliability suffers with UDP.
Q19. Why Is Rip V1 Insecure In A Network?
RIP v1 does now not use a password for authentication as with Rip v@This makes it viable to attackers to send rogue RIP packets and corrupt the routing table.
Q20. What Is Gateway-to-gateway Protocol ?
It is a protocol formerly used to exchange routing data between Internet center routers.
Q21. What Is A Multi-homed Host ?
It is a bunch that has a more than one community interfaces and that calls for a couple of IP addresses is known as as a Multi-homed Host.
Q22. What Is The Hello Protocol Used For ?
The HELLO protocol makes use of time in preference to distance to determine top of the line routing. It is an alternative to the Routing Information Protocol.
Q23. What Is External Data Representation ?
External Data Representation is a method of encoding statistics inside an RPC message, used to make sure that the information is not machine-established.
Q24. What Is Passive Topology ?
When the computers at the network genuinely concentrate and receive the sign, they're referred to as passive because they don’t expand the sign in any way. Example for passive topology - linear bus.
Q25. Explain The Function Of Trmission Control Block ?
A TCB is a complex records shape that contains a large amount of data approximately every connection.
Q26. What Is Beaconing ?
The method that lets in a network to self-restore networks issues. The stations at the community notify the opposite stations on the ring when they may be no longer receiving the trmissions. Beaconing is used in Token ring and FDDI networks.
Q27. What Is The Difference Between Routable And Non- Routable Protocols ?
Routable protocols can paintings with a router and may be used to construct large networks. Non-Routable protocols are designed to paintings on small, local networks and can't be used with a router
Q28. Bootp Helps A Diskiess Workstation Boot. How Does It Get A Message To The Network Looking For Its Lp Address And The Location Of Its Operating System Boot Files ?
BQOTP sends a UDP message with a subnetwork broadcast address and waits for a reply from a server that offers it the IP deal with. The same message would possibly include the name of the system that has the boot files on it. If the boot picture area isn't always specific, the workstation sends every other UDP message to question the server.
Q29. Name One Secure Network Protocol Which Can Be Used Instead Of Telnet To Manage A Router?
SSH.
Q30. What Is Virtual Channel ?
Virtual channel is generally a connection from one source to one vacation spot, even though multicast connections are also authorized. The other call for virtual channel is virtual circuit.
Q31. What Is Bandwidth
Every line has an upper restriction and a lower restriction on the frequency of signals it could bring. This confined variety is known as the bandwidth.
Q32. What Is Mac Address ?
The cope with for a tool as it's far identified on the Media Access Control (MAC) layer in the community structure. MAC deal with is generally stored in ROM at the network adapter card and is particular.
Q33. Difference Between Bit Rate And Baud Rate?
Bit rate is the variety of bits trmitted throughout one 2d whereas baud fee refers back to the number of sign devices in keeping with 2nd which can be required to represent those bits.
Baud rate = bit charge / N
where N is not any-of-bits represented by each signal shift.
Q34. What Is Netbios And Netbeui ?
NETBIOS is a programming interface that permits I/O requests to be despatched to and obtained from a far off pc and it hides the networking hardware from packages.
NETBEUI is NetBIOS extended person interface. A trport protocol designed via microsoft and IBM for the use on small subnets.
Q35. Which Feature On A Cisco Ios Firewall Can Be Used To Block Incoming Traffic On A Ftp Server?
Extended ACL.
Q36. What Is A Dns Resource Record ?
A resource file is an access in a call server’s database. There are several varieties of aid facts used, inclusive of name-to-cope with decision facts. Resource data are maintained as ASCII documents.
Q37. What Is Difference Between Baseband And Broadband Trmission ?
In a base band trmission, the entire bandwidth of the cable is consumed via a unmarried sign. In broadband trmission, signals are sent on a couple of frequencies, allowing more than one alerts to be despatched simultaneously.
Q38. What Do You Meant By "triple X" In Networks ?
The characteristic of PAD (Packet Assembler Disassembler) is described in a report known as X.@The wellknown protocol has been described among the terminal and the PAD, known as X.28; every other fashionable protocol exists among hte PAD and the community, known as X.2@Together, those three recommendations are often known as “triple X”
Q39. What Is A Pseudo Tty ?
A pseudo tty or fake terminal enables outside machines to connect thru Telnet or rlogin. Without a pseudo tty, no connection can take region.
Q40. What Is Sap ?
Series of interface factors that allow other computer systems to speak with the alternative layers of network protocol stack.
Q41. What Is Rip (routing Information Protocol) ?
It is a simple protocol used to alternate records among the routers.
Q42. What Is Silly Window Syndrome ?
It is a hassle that could damage TCP performance. This trouble takes place while information are handed to the sending TCP entity in big blocks, but an interactive software at the receiving side reads 1 byte at a time.
Q43. What Are The Important Topologies For Networks ?
BUS topology: In this each pc is directly linked to number one network cable in a single line.
Advantages: Inexpensive, smooth to install, simple to understand, easy to increase.
STAR topology: In this all computers are connected the use of a vital hub.
Advantages: Can be less expensive, clean to install and reconfigure and smooth to problem shoot physical issues.
RING topology: In this all computer systems are related in loop.
Advantages: All computers have equal access to network media, installation can be simple, and sign does now not degrade as a lot as in other topologies because each computer regenerates it.
Q44. What Are The Types Of Trmission Media ?
Signals are usually trmitted over some trmission media that are extensively categorised in to 2 categories.
Guided Media: These are those that offer a conduit from one device to every other that consist of twisted-pair, coaxial cable and fiber-optic cable. A signal visiting along any of these media is directed and is contained by means of the bodily limits of the medium. Twisted-pair and coaxial cable use metallic that receive and trport signals within the form of electrical current. Optical fiber is a pitcher or plastic cable that accepts and trports alerts within the form of mild.
Unguided Media: This is the wi-fi media that trport electromagnetic waves with out the usage of a physical conductor. Signals are broadcast both thru air. This is achieved via radio communication, satellite communique and mobile telephony.
Q45. What Is Nvt (network Virtual Terminal) ?
It is a fixed of policies defining a very simple virtual terminal interaction. The NVT is used in the start of a Telnet session.
Q46. What Is Mesh Network ?
A network in which there are multiple community hyperlinks between computers to offer more than one paths for records to travel.
Q47. What Is Wide-mouth Frog ?
Wide-mouth frog is the only acknowledged key distribution center (KDC) authentication protocol.
Q48. What Is Terminal Emulation, In Which Layer It Comes
Telnet is likewise referred to as as terminal emulation. It belongs to utility layer.
Q49. What Is Anonymous Ftp And Why Would You Use It
Anonymous FTP enables users to hook up with a number without the usage of a legitimate login and password. Usually, nameless FTP makes use of a login known as nameless or visitor, with the password usually asking for the consumer’s ID for monitoring functions best. Anonymous FTP is used to allow a big range of customers to get entry to documents on the host without having to visit the problem of putting in logins for all of them. Anonymous FTP systems usually have strict controls over the areas an anonymous consumer can get right of entry to.
Q50. What Is Proxy Arp ?
It is using a router to wer ARP requests. This can be done when the originating host believes that a destination is nearby, while in reality is lies beyond router.
