YouTube Icon

Interview Questions.

Top 50 Router Interview Questions - Jul 24, 2022

fluid

Top 50 Router Interview Questions

Q1. How Does Tracert Work And What Protocol Does It Use?

Tracert or traceroute depending at the working system permits you to see exactly what routers you touch as you flow along the chain of connections to your final destination. If you end up with a hassle where you can not connect or can't ping your final vacation spot, a tracert can help in that regard as you could inform exactly wherein the chain of connections prevent. With this statistics, you can touch the best people- whether or not it's your personal firewall, your ISP, your vacation spot's ISP or someplace within the middle. Tracert, like ping, makes use of the ICMP protocol however also has the ability to use the first step of the TCP three-way handshake to send out SYN requests for a response.

Q2. What Is A Firewall?

A Firewall placed genuinely maintains stuff from right here talking to stuff over there. Firewalls exist in many one of a kind feasible configurations with both hardware and software alternatives as well as community and host types. Most of the overall user base had their first introduction to Firewalls whilst Windows XP SP2 came along with Windows Firewall set up. This came with a whole lot of complications, however to Microsoft's credit it did lots of top matters. Over the years it has progressed a incredible deal and while there are nevertheless many options that cross above and past what it does, what Windows Firewall accomplishes it does very well. Enhanced server-grade versions have been launched as nicely, and have a terrific deal of customization available to the admin.

Q3. What Is Ipx?

If you did any multiplayer PC gaming inside the 90s and early 2000s, you likely knew of the IPX protocol as 'the one that truely works'. IPX or Internetwork Packet Exchange become an exceedingly light-weight protocol, which as a result for the boundaries of computer systems of the age turned into a excellent issue. A competitor to TCP/IP, it features thoroughly in small networks and did not require elements like DHCP and required little to no configuration, but does now not scale nicely for packages like the Internet. As a result, it fell by the wayside and is no longer a required protocol for maximum factors.

Q4. What Is The Difference Between Ifconfig And Ipconfig?

Ipconfig is one of the number one community connection troubleshooting and statistics gear to be had for Windows Operating Systems. It allows the person to see what the modern-day information is, pressure a launch of those settings if set through DHCP, force a new request for a DHCP lease, and clear out the neighborhood DNS cache amongst other capabilities it could cope with. Ifconfig is a similar utility for Unix/Linux structures that at the same time as at the beginning look seems to be same, it certainly is not. It does permit for extremely short (and thorough) get entry to to community connection information, it does now not permit for the DHCP capabilities that ipconfig does. These capabilities in truth are treated by using a separate service/daemon referred to as dhcpd.

Q5. What Is The Difference Between A Print Server And A Network Attached Printer?

A print server can check with two different alternatives- an real server that shares out many one-of-a-kind printers from a relevant management factor, or a small dedicated field that lets in a legacy printer to hook up with a community jack. A network attached printer on the other hand has a network card constructed into it, and as a consequence has no need for the latter choice. It can nevertheless benefit from the former but, as network connected printers are extraordinarily beneficial in a corporate environment seeing that they do not require the printer to be connected without delay to a unmarried user's machine.

Q6. Explain What Is The Difference Between Single Mode And Multimode Fiber?

The easy answer is that Multimode is less expensive however cannot transmit as far. Single Mode has a smaller center (the part that handles mild) than Multimode, but is better at keeping the mild intact. This permits it to travel more distances and at better bandwidths than Multimode. The hassle is that the requirements for Single Mode are very specific and as a end result it generally is greater expensive than Multimode. Therefore for applications, you'll typically see Multimode in the datacenter with Single Mode for lengthy-haul connections.

Q7. Explain What Is A Subnet Mask?

A subnet masks tells the community how massive it is. When an address is in the masks, it is going to be dealt with internally as part of the neighborhood community. When it's miles outside, it will be treated otherwise because it isn't part of the local community. The right use and calculation of a subnet masks can be a incredible benefit while designing a network as well as for gauging destiny growth.

Q8. What Basic Set-up Equipment Is Needed For Voip?

For general VoIP set up we require the following things:

Broadband connection

VoIP smartphone

Nexton soft-switches

Router

Audiocodec

Astric server

Q9. Explain What Are The Main Differences Between Windows Home, Windows Pro And Windows Server?

If you have been to ask a Microsoft Sales Rep this query, they would no question have masses of tweaks and overall performance boosts from device to system. In fact however there are two most important differences among the Windows Home version and Windows Professional: Joining a domain and built-in encryption. Both functions are energetic in Professional only, as joining a site is sort of a mandatory requirement for organizations. EFS (Encrypted File System) in and its successor Bitlocker are both also best present in Pro. While there are workarounds for both of those items, they do gift a pleasing best-of-lifestyles improve in addition to allow simpler standardization throughout more than one systems. That being said, the jump from Windows Pro to Windows Server is a monumental paradigm shift.

While we could undergo all the bells and whistles of what makes Windows Server…Windows Server, it can be summed up very in brief as this: Windows Home and Pro are designed to attach outwards by using default and are optimized as such. Windows Server is designed to have other items connect to it, and as a end result it's miles optimized significantly for this reason. Windows Server 2012 has taken this to a new intense with being capable of perform an set up style very similar to that of a Unix/Linux gadget and not using a GUI in any way. As a result, they declare that the assault vector of the Operating System has been decreased vastly (while putting in it in that mode)

Q10. Explain What Is Icmp?

ICMP is the Internet Control Message Protocol. Most users will understand the call via the usage of equipment which includes ping and traceroute, as this is the protocol that those offerings run over amongst other matters. Its number one reason is to tell structures whilst they're seeking to connect remotely if the other quit is available. Like TCP and UDP, it's miles part of the IP suite and uses IP port number @Please note, this isn't TCP port 1 or UDP port 1 as that is a exceptional numbering scheme that for reference may be located right here (For your reference, TCP makes use of IP port 6, while UDP makes use of IP port 17). That being said, distinctive capabilities of ICMP use specific ports on TCP and UDP. For example, the 'echo' portion of ping (the part in which a person else is capable of ping you) makes use of TCP port 7.

Q11. Why Would You Virtualize Systems?

Virtual Machines have handiest recently come into mainstream use, however they had been round below many distinct names for a long term. With the massive increase of hardware outstripping software program requirements, it is now possible to have a server lying dormant ninety% of the time even as having different older structures at max capability. Virtualizing the ones systems would permit the older working systems to be copied completely and strolling along the server running machine- allowing using the newer greater dependable hardware with out losing any data on the legacy systems. On top of this, it allows for plenty simpler backup solutions as the entirety is on a unmarried server.

Q12. Why Would You Add Local Users When On A Domain Machine?

Giving a user as few privileges as viable has a tendency to motive a few aggravation by means of the user, but with the aid of the same token it also gets rid of lots of easily preventable infection vectors. Still, on occasion customers want to have neighborhood admin rights so that it will troubleshoot issues- especially if they are on the street with a computer. Therefore, developing a nearby admin account can also from time to time be the best manner to maintain these privileges separate.

Q13. What Is Difference Between Packet Switch And Circuit Switch Network?

To make a baseband network practical for many computer systems to share, the records transmitted by means of every machine is damaged up into separate gadgets referred to as packets. When your laptop transmits facts it is probably damaged up into many packets, and the pc transmits every packet one at a time. When all the packets constituting a selected transmission reach their vacation spot, the receiving laptop reassembles them back into authentic statistics. This is the idea for a packet-switching community.

Circuit-switching manner that the 2 structures looking to talk establish a circuit earlier than they transmit any records. That circuit stays open all through the life of the alternate, and is handiest broken while the 2 structures are finished speaking. Circuit switching is more common in environments just like the public switched cellphone community (PSTN), wherein the connection among your telephone and that of the character you're calling remains open for the entire duration of the decision.

Q14. Explain What Are Routers?

The system of routing is completed through the gadgets called Routers. Routers are the community layer gadgets.

Q15. Tell Me What Are Sticky Ports?

Sticky ports are one of the network admin's great pals and worst complications. They will let you set up your community in order that each port on a transfer handiest lets in one (or a number which you specify) pc to attach on that port via locking it to a specific MAC deal with. If every other laptop plugs into that port, the port shuts down and also you get hold of a call that they can not connect anymore. If you have been the one that originally ran all of the network connections then this isn't always a large problem, and likewise if it's far a predictable sample then it additionally isn't an issue. However if you're running in a hand-me-down network wherein chaos is the norm then you definitely would possibly become spending a while toning out precisely what they are connecting to.

Q16. What Is The Difference Between Rip And Igrp?

RIP relies upon on wide variety of hops to decide the best course to the network even as, IGRP considers many elements earlier than makes a decision the first-rate path to take i.E. Bandwidth, reliability, MTU and hops depend.

Q17. What Is The Difference Between Rdp And Kvm?

RDP or Remote Desktop Protocol is the primary technique by using which Windows Systems may be remotely accessed for troubleshooting and is a software program-pushed method. KVM or Keyboard Video and Mouse then again allows for the quick-switching between many exceptional structures, however the use of the same keyboard, display and mouse for all. KVM is usually a hardware-pushed gadget, with a junction box located between the consumer and the systems in question- but there are some alternatives which can be improved by using software. KVM also would not require an energetic network connection, so it is able to be very useful for the use of the equal setup on a couple of networks without having cross-communicate.

Q18. What Is The Difference Between A Hub And A Switch?

At first glance it may be hard to decide the difference between a hub and a transfer due to the fact that each appearance kind of the equal. They both have a huge variety of capacity connections and are used for the equal simple purpose- to create a network. However the biggest distinction isn't on the outside, but on the inner inside the way that they manage connections. In the case of a hub, it pronounces all records to each port. This could make for serious security and reliability concerns, in addition to reason a number of collisions to arise on the network. Old fashion hubs and gift-day wireless get right of entry to points use this approach.

Switches then again create connections dynamically, so that typically simplest the asking for port can acquire the information destined for it. An exception to this rule is that if the switch has its maintenance port became on for an NIDS implementation, it could reproduction all facts going throughout the transfer to a specific port that allows you to scan it for troubles. The easiest manner to make sense of all of it is by using considering it in the case of old fashion phone connections. A hub would be a 'celebration line' where everyone is speakme all on the same time. It is possible to transmit on such a system, however it may be very nerve-racking and probably release statistics to humans which you do not want to have get admission to to it. A transfer then again is like a phone operator- developing connections among ports on an as-wished basis.

Q19. What Are Services?

Services are applications that run inside the historical past primarily based on a selected device popularity along with startup. Services exist across almost all modern operating structures, even though vary of their naming conventions relying on the OS- as an example, offerings are known as daemons in Unix/Linux-type running systems. Services additionally have the capability to set up actions to be completed if the program stops or is closed down. In this way, they can be configured to remain strolling at all times.

Q20. What Is Ftp And What Port Does It Use?

FTP or File Transfer Protocol, is one of the huge legacy protocols that possibly have to be retired. FTP is frequently designed for big report transfers, with the functionality of resuming downloads if they're interrupted. Access to an FTP server can be completed using  exclusive techniques: Anonymous get entry to and Standard Login. Both of those are basically the identical, except Anonymous get admission to does now not require an lively consumer login at the same time as a Standard Login does. Here's in which the large problem with FTP lies but- the credentials of the consumer are transmitted in cleartext which means that every body listening on the cord could sniff the credentials extraordinarily easily. Two competing implementations of FTP that take care this problem are SFTP (FTP over SSH) and FTPS (FTP with SSL). FTP makes use of TCP ports 20 and 21.

Q21. Explain What Is Routing Protocol?

Routing protocol specifies how the routers talk, disseminating the statistics which allows the routers to be selected among  nodes in a network.

Q22. What Is Protocol?

A set of standards that define all operations within a network. There are numerous protocols that perform at numerous levels of the OSI community model which include delivery protocols include TCP.

Q23. What Is Routing Protocols Purposes?

Routing protocol interacts and informs the hardware this is had to transmit the records among transmitter and the receiver for transmission over community.

Q24. What Is Ssh And What Port Does It Use?

SSH or Secure Shell is most well known via Linux users, however has a extremely good deal that it could be used for. SSH is designed to create a comfy tunnel among gadgets, whether or not that be structures, switches, thermostats, toasters, and many others. SSH additionally has a completely unique capacity to tunnel different packages through it, similar in idea to a VPN so even insecure programs or packages going for walks across unsecure connections may be used in a relaxed kingdom if configured efficaciously. SSH runs over TCP port 22.

Q25. Do You Know Who Develop The Osi Modal?

The International Organization for Standardization (ISO) developed the Open Systems Interconnection (OSI) Reference Model to explain how facts is transferred from one system to another.

Q26. Explain What Is Port Forwarding?

When seeking to talk with systems at the inside of a secured community, it can be very hard to accomplish that from the outdoor- and with accurate purpose. Therefore, the usage of a port forwarding desk within the router itself or different connection control tool, can allow for specific visitors to be robotically forwarded on to a particular vacation spot. For instance, in case you had a web server running in your network and you desired get entry to to be granted to it from the out of doors, you would setup port forwarding to port 80 on the server in question. This might suggest that every body installing your IP cope with in an internet browser might be linked as much as the server's website at once. Please note, this is typically no longer endorsed to permit get entry to to a server from the outside immediately into your community.

Q27. What Is Voip?

Voice over Internet Protocol (VoIP) is the era to ship your voice (analog data) over the internet (digital data) to an end person. It enables customers to use the Internet because the transmission medium for voice calls at a totally low value.

Q28. What Is Bonjour?

Although you can in no way have heard of this program, but if you have ever handled Apple devices you've seen its results. Bonjour is one of the programs that come bundled with nearly each piece of Apple software program (maximum substantially iTunes) that handles quite a few its automated discovery strategies. Best described as a hybrid of IPX and DNS, Bonjour discovers broadcasting gadgets on the community with the aid of using mDNS (multicast DNS) with little to no configuration required. Many admins will intentionally disable this carrier in a company surroundings due to capability protection problems, but in a domestic environment it could be left as much as the user to determine if the chance is well worth the benefit.

Q29. Why Would You Create Logon Scripts?

Logon scripts are, fairly sufficient, scripts that run at logon time. These are used maximum instances to permit for the continued access to proportion and device mapping as well as forcing updates and configuration modifications. In this manner, it permits for one-step changes if servers get modified, stocks get renamed, or printers get switched out for example.

Q30. What Is Distance Vector Routing Protocols?

The principal purpose of Distance Vector Routing Protocols Is to find out the nice direction for he facts packet to attain the destination. Distance here can be the hops. The three specific styles of Distance Vector routing protocols encompass:- Routing Information Protocol (RIP v1 and v2) and Interior Gateway Routing Protocol. The protocol is easy to control however no longer properly scalable.

The Distance Vector protocol to start with prepares a Routing table that's shared with other routers. This routing table is shared between routers present within the identical network. A new routing table is prepared when a few new facts is obtained from some other router. Now, the awful routing paths are eliminated retaining handiest the smallest hop paths. This new desk is then communicated to different routers.

Q31. Can You Explain What Is Routing Table?

A routing desk shops the routes of the numerous nodes in a network. Nodes may be any electronic device connected to the community. The desk is commonly saved in a router or the community computer as a database or document. This facts enables to fond the fine possible direction. The routing desk has at the least 3 fields: the vacation spot community identification, fee of the course, subsequent hop or address to ship the packet.

Q32. Explain Internal Routers Components?

ROM:- Used to save the routers bootstrap info, running gadget software program.

Flash memory: - holds the running structures photos. The content is retained when the router is restarted.

RAM: - Used to shop the Routing tables, configuration files, caching and buffering info. Content is misplaced whilst lost router is switched off or restarted.

NVRAM:- Stores the routers startup config files. Data is non unstable.

Network interfaces to connect router to community.

Q33. What Is The Difference Between Switch And Hub?

Switch

Switches are used at data link layer.

Switches create separate collision area and a unmarried broadcast domain.

Address gaining knowledge of

Forward/filter choice the use of mac address.

Hub

Hubs are used at bodily layer.

Hubs create unmarried collision domain and a single broadcast area.

No addressing.

No filtering.

Q34. Explain What Are Shadow Copies?

Shadow copies are a versioning gadget in place on Windows operating structures. This lets in for customers to go again to a previously to be had version of a file with out the want for restoring the record from a widespread backup- despite the fact that the particular functions of shadow copies range from model to version of the OS. While it isn't important to use a backup feature at the side of Shadow Copies, it's miles recommended due to the additional stability and reliability it presents. Please notice- Shadow Copies aren't Delta Files. Delta files allow for clean comparison between versions of files, at the same time as Shadow Copies keep whole preceding versions of the files.

Q35. What Is Tia/eia?

A cooperative alternate affiliation liable for the "Commercial Building Telecommunication Cabling Standard," also referred to as EIA/TIA 568, which specifies how community cables must be established in a commercial website online.

Q36. Explain What Is Dhcp?

Dynamic Host Configuration Protocol is the default manner for connecting as much as a network. The implementation varies across Operating Systems, but the simple rationalization is that there may be a server on the network that fingers out IP addresses whilst asked. Upon connecting to a network, a DHCP request may be despatched out from a new member machine. The DHCP server will reply and problem an address lease for a various quantity of time. If the gadget connects to every other community, it'll be issued a brand new deal with via that server however if it re-connects to the authentic network before the lease is up- it will be re-issued that identical deal with that it had earlier than.

To illustrate this point, say you have your telephone set to wifi at your property. It will pick out up a DHCP cope with from your router, earlier than you head to work and connect with your corporate community. It might be issued a new deal with by your DHCP server before you visit starbucks for your mid-morning coffee in which you'll get every other deal with there, then on the local restaurant wherein you get lunch, then at the grocery keep, and so on and so on.

Q37. Explain External Routers Components?

Virtual terminals: For getting access to routers 

Network management stations.

Q38. Do You Know What Is /etc/passwd?

/and so on/passwd is the number one document in Unix/Linux running gadget that shops records about person debts and may be study via all users. /and so on/shadow often is utilized by the running machine as a substitute due to security concerns and increased hashing abilities. /and many others/shadow more frequently than not is tremendously constrained to privileged customers.

Q39. Explain What Is Boot To Lan?

Boot to LAN is most usually used when you are doing a sparkling deploy on a device. What you will do is setup a network-based totally installer capable of community-booting via PXE. Boot to LAN permits this by means of allowing a pre-boot environment to search for a DHCP server and connect to the broadcasting network set up server. Environments that have very big numbers of structures more regularly than no longer have the capability of pushing out snap shots thru the network. This reduces the quantity of hands-on time that is required on each system, and keeps the installs more regular.

Q40. What Are 127.0.0.1 And Localhost?

Being able to ping out to a server and spot if its responding is a awesome way to troubleshoot connectivity troubles. But what in case you're now not capable of ping ANY server? Does that mean that your complete community is down? Does it suggest that your community cable wishes to be replaced? Does it suggest that your community card goes bad? Or ought to it probable be that sunspots, magnets, aliens and the Men In Black are all conspiring in opposition to you? The solutions to those questions will be very hard, but at the very least you may rule out if your network card goes horrific. 127.Zero.Zero.1 is the loopback connection on your community interface card (NIC)- pinging this cope with will see if it is responding. If the ping is a success, then the hardware is good. If it is not, then you definately may have some maintenance for your destiny. 127.Zero.Zero.1 and localhost suggest the equal factor as far as maximum functions are concerned, but be cautious when the use of them in conditions like internet programming as browsers can deal with them very in a different way.

Q41. Explain Different Types Of Connector Used In Lan?

RJ-11 ( Registered Jack-11) a 4- or six-twine connector on the whole used to attach telephone device.

RJ-45 (Registered Jack-forty five) connector is an eight-wire connector this is commonly used to connect computers to a nearby place community (LAN), specifically Ethernet LANs.

AUI( Attachment Unit Interface.) is the a part of the Ethernet wellknown that specifies how a Thicknet cable is to be related to an Ethernet card. AUI specifies a coaxial cable linked to a transceiver that plugs into a 15-pin socket at the network interface card (NIC).

BNC stand for British Naval Connector (or Bayonet Nut Connector or Bayonet Neill Concelman)a kind of connector used with coaxial cables along with RG-fifty eight.BNC connectors are used on each Thicknet and Thinnet.

Q42. What Are Some Disadvantages Of Using Voip?

VoIP is a long way better than conventional telephony however it has a few drawbacks as listed beneath:

Some VoIP offerings do not work throughout power outages and the provider company won't offer backup strength.

Not all VoIP services connect immediately to emergency services via nine-1-@

VoIP providers may or may not offer listing assistance/white page listings.

Q43. Explain What Are The Port Number / Socket Number And Connection Multiplexing?

Transport layer assigns a unique set of numbers for every connection. These numbers are known as port or socket numbers TCP, and UDP, offer a multiplexing feature for a device: This permits multiple applications to simultaneously send and obtain information.

Q44. What Is The Purpose Of Data Link Layer?

The predominant reason of records hyperlink layer is to check that whether messages are despatched to the proper devices. Another feature of facts hyperlink layer is framing.

Q45. What Is A Proxy Server?

Similar to how a DNS server caches the addresses of accessed websites, a proxy server caches the contents of those web sites and handles the heavy lifting of get right of entry to and retrieval for users. Proxy servers can also keep a list of blacklisted and whitelisted web sites which will prevent users from getting effortlessly preventable infections. Depending at the intentions of the employer, Proxy servers can also be used for monitoring web activity by means of customers to make sure that touchy facts isn't always leaving the constructing. Proxy servers additionally exist as Web Proxy servers, permitting customers to either no longer display their true access point to websites they are getting access to and/or getting around place blocking.

Q46. Explain What Is Http And What Port Does It Use?

HTTP or HyperText Transfer Protocol, is the primary protocol accountable for vivid content material on the Web. Most webpages nevertheless use this protocol to transmit their simple internet site content material and lets in for the show and navigation of 'hypertext' or hyperlinks. While HTTP can use some of one of a kind provider protocols to move from device to system, the number one protocol and port used is TCP port eighty.

Q47. Explain The Utp Cable?

UTP cable comes in a variety of various grades, known as "classes" via the Electronics Industry Association (EIA) and the Telecommunications Industry Association (TIA), the aggregate being called EIA/TIA.

Cat 1 :- Used for voice-grade smartphone networks best; not for records transmissions

Cat 2 :- Used for voice-grade telephone networks

Cat three :-Used for voice-grade smartphone networks, 10 Mbps Ethernet, four Mbps Token Ring,

Cat 4 :-Used for 16 Mbps Token Ring networks

Cat 5 :-Used for 100BaseTX Fast Ethernet, SONet, and OC-three ATM

Cat 5e:- Used for Gigabit (a thousand Mbps) Ethernet protocols

Q48. What Are Strong Password Requirements?

Use a minimum password period of 12 to fourteen characters if authorized.

Include lowercase and uppercase alphabetic characters, numbers and emblems if authorised.

Generate passwords randomly in which feasible.

Avoid the usage of the equal password twice (eg. Across a couple of consumer debts and/or software program systems).

Avoid man or woman repetition, keyboard styles, dictionary phrases, letter or variety sequences, usernames, relative or pet names, romantic hyperlinks (contemporary or beyond) and biographical information (e.G. ID numbers, ancestors' names or dates).

Avoid the usage of information that is or may grow to be publicly associated with the consumer or the account.

Avoid the usage of information that the consumer's colleagues and/or associates might recognise to be related to the consumer.

Do now not use passwords which consist utterly of any simple mixture of the aforementioned susceptible components.

Q49. Where Would You Use Cross And Straight Cable?

A directly-through cable is used for DTE-to-DCE connections.

A hub to a router, PC, or report server

A transfer to a router, PC, or file server

Crossover cables should with the aid of used while you join a DTE to another DTE or a DCE to another DCE.

A hub to every other hub

A switch to another transfer

A hub to a switch

A PC, router, or record server to any other PC, router, or report server

Q50. Explain What Is Crosstalk?

A type of sign interference as a result of signals transmitted on one pair of wires bleeding over into the alternative pairs. Crosstalk can reason community alerts to degrade, in the end rendering them unviable.




CFG