Networking Interview Questions and Answers
Categories: Hardware & Networking
Q1. What are ‘firewalls’? Ans. A firewall is a network security system responsible for managing network traffic. It uses a set of security rules to prevent remote access and content filtering. Firewalls protect the systems or networks from viruses, worms, malware, etc. Q2. How does a firewall work? Ans. This is among the popularly asked networking interview questions. The firewall ‘listens’ for what information packets are trying to leave or enter the computer system. Blocking can be done based on various criteria, such as the IP to which they are destined, the type of port used to send them, or the application of origin. Q3. What are the major types of networks? Ans. There are two major types of networks: Server-based networks and Peer-to-peer networks. Q4. What are the important topologies for networks? Ans. There are three essential topologies: Star, Bus, and Ring. Q5. Differentiate between static IP addressing and dynamic IP addressing. Ans. A computer (or another device) is always configured to use the same IP address in a static IP address. In a dynamic IP address, the IP address can change periodically and is managed by a centralized network service. Q6. What are the different ways to exchange data? Ans. Following are the different ways to exchange data: a. Simplex b. Half-duplex c. Full-duplex Q7. What are routers? Ans. Routers connect two or more network segments. These intelligent network devices store information such as paths, hops, and bottlenecks in their routing tables. They determine the most accurate data transfer paths and operate in Open Systems Interconnection (OSI) Network Layer. Q8. What are the criteria for the best path selection of a router? Ans. The following parameters define the path selection: a. Longest prefix match b. Minimum AD (administrative distance) c. Lowest metric value Q9. Explain what is a source route. Ans. The source route is defined as a sequence of IP addresses used to identify a datagram’s route. You can also involve the source route in the IP datagram header. Q10. What is the difference between ‘standard’ and ‘extended’ ACL (access control list)? Ans. Standard ACLs are source-based, whereas extended ACLs are source- and destination-based