Top 100 Networking Interview Questions with Answers

Looking for Networking Interview questions and answers, here is the list of top 100 networking interview questions with detailed answers. These questions and answers will help you to face any networking interview confidently.

Q1:- What is the difference between physical topology and logical topology?

A physical topology describes how computers are connected with each other’s physically. While a logical topology describes how data is transmitted over the physical topology.

Q2:- What is the cookie?

A cookie is a small piece of information that is stored in user’s browser by a website for various purposes such as tracking, advertising, etc.

Q3:- What is an IP address?

An IP address is a unique identity of an interface in IP network. An IP address consists 32 bits. These bits are divided in four equal sections. Sections are separated by periods and written in a sequence.

Q4:- What is the difference between baseband and broadband technology?

Both technologies are used to transmit the signals in wire. Baseband technology uses bidirectional digital signals for transmission which mean a single channel is used for both sending and receiving data singles. Broadband uses unidirectional analog signals for transmission which means two separate channels are used for sending and receiving the data.

Q5:- What is the Bandwidth?

Bandwidth is the amount of data a cable can carry. Bandwidth is computed by subtracting the lower frequency of data signals from the higher one. For digital signal, it is measured in bps (bits per seconds) and for analog signal it is measured in Hz (Hertz).

Q6:- What is the use of ARP and RARP in network?

In LAN network, a node needs two addresses (IP address and MAC address) to communicate with others. When it has only the one address and needs the other address, it uses ARP and RARP. It uses ARP, when it has IP address and needs MAC address of other node. It uses RARP, when it has MAC address and needs IP address of other node.

Q7:- What is a junk email?

A junk mail is an unsolicited mail. Usually it contains newsletters or advertising contents and it arrives from an address which is not listed in address book.

Q8:- What is the Auto Responder in email system?

In email system, Auto Responder is a service that automatically sends prewritten answer e-mail to the sender as soon as it receives e-mail.

Q9:- What is the Packet Sniffer?

Packet Sniffer is a program or device that captures data packet from wire.

Q10:-What is the Telnet?

Telnet is a program that allows users to remotely access the system or device in which it is running.

Q11:- In OSI model, what is the Encapsulation?

Encapsulation is the process of preparing data for transmission. In this process, first the data is encrypted and compressed. Later this data is packaged through the layers. Each layer adds its own individual information in header. In transmission this information is read and used by various devices and protocols to deliver this package at correct destination.

Q12:- In OSI model, what is the Decapsulation?

Decapsulation is the process of extracting original data from encoded data package. When a data package is received from network, it is wrapped in several headers. In this process, these headers are removed. Once headers are removed, package data is decrypted and decompressed.

Q13:- What is the ANSI?

The ANSI stands for American National Standards Institute. It is an organization that officially defines standards in America. The official website of ANSI is the

Q14:- Which layers in OSI model are known as lower layers?

Application, Data Link and Network layers are known as lower layers.

Q15:- Which are the upper layers in OSI model?

The upper layers in OSI model are Application, Presentation, Session and Transport.

Q33:- What do the extensions .com, .net, .org, .info, .biz and .in stand for?

The extensions .com, .net, .org, .info, .biz and .in stand for commercial, network, organization, information, business and India respectively.

Q34:- What is a MAC address?

MAC address is the physical address of a NIC. It is 48 bits in length. It is written in Hexadecimal format. Usually it is stored in ROM of NIC.

Q18:- What does a router use to determine the best path to a destination?

Routing table

Q19:- What is used on the Internet to find the numeric address of a computer host that resides on the Internet?

DNS server

Q20:- What is a daemon?

A daemon is an application or a process that is running on a server for the purpose of providing client and server access and communication.

Q21:- What functionality can be used to disguise addresses from a private address space to be seen on the Internet?

NAT (Network Address Translation)

Q22:- What is the protocol that resolves IP addresses to hardware addresses?

ARP (Address Resolution Protocol)

Q23:- What is a proprietary standard?

A proprietary standard is a standard that is developed and owned by a specific vendor.

Q24:- What is a de facto standard?

A de facto standard is a standard that began as a proprietary standard and then grew to a standard that is used by pretty much everyone.

Q25:- What is the maximum rate of collision in a healthy Ethernet LAN?

Collision rate should not be more than 30% in a healthy Ethernet.

Q26:- When a broadcast is made in Ethernet LAN, which devices examine it?

A broadcast message is examined by all devices in network.

Q27:- Is broadcast message intended for a specific device in network?

No, broadcast message is intended for all devices in network.

Q28:- What does OSI stand for?

OSI stands for Open System Interconnection.

Q29:- What does FTP stand for?

FTP stands for File Transfer Protocol.

Q30:- What does DHCP stand for?

DHCP stands for Dynamic host configuration protocol.

Q31:- What is a router?

Router is a device that is used to connect two different networks.

Q32:- What is a MAU?

MAU (Multi-station Access Unit) is a topology specific Hub. In term of functionalities and characteristics, it is same as Hub. But it is only used in token ring.

Q33:- Which is the bottom layer of OSI model?

Physical layer is the bottom layer of OSI model.

This article is the last part of the article “Collection of Networking Questions with Answer for Beginners”. Other parts of this article are following.

Networking Interview Questions for Fresher

Basic Networking Interview Questions with Answers

Networking Interview Questions and Answers

Networking Interview Questions for Experienced

Q34:- Which is the top layer of OSI model?

Application layer is the top layer of OSI model.

Q35:- What does the term driver refer in computer networking?

A driver is the software that contains technical information about a specific device. This information includes what that specific device is, how it works in system and what it needs to communicate and coexist with other devices.

Q36:- Are 10Base2 and 10Base5 Ethernet architectures used in modern network?

No, both architectures are used in bus topology which is no longer used to build the networks.

Q37:- In which topology 10BaseT architecture is used?

10BaseT architecture is used in start topology. It provides maximum 10 Mbps speed. It uses Baseband transmission technology and UTP (CAT-3) cable.

Q38:- In Bus topology, to remove a workstation from the network, the T connector is removed from NIC. Will this network work normally?

Yes, this network will work normally because removing T connector does not interrupt the signal flow in main cable.

Q39:- What is a drop cable?

A drop cable is a cable that connects workstation with backbone cable in bus topology.

Q40:- What is the maximum length of Thicknet coaxial cable?

Maximum length of Thicknet coaxial cable is 500 meter.

Q41:- Which cable is known as the RG58 cable?

The Thinnet cable is known as the RG58 cable.

Q42:- Why coaxial cable is no longer used in computer network?

Coaxial cable is used in bus topology. Bus topology is no longer used in computer network.

Q43:- What is the maximum distance of UTP cable?

Maximum distance of UTP cable is 100 meter.

Q44:- Which connector is used to connect UTP cable with NIC?

RJ45 connector is used to connect the UTP cable with NIC.

Q45:- Which cable uses RJ11 connector?

The telephone cable uses RJ11 connector.

Q46:- Can we use Cateogry1 (UTP) cable for data transmission?

No, we can’t use Cateogry1 (UTP) cable for data transmission. It is used in telephone network for voice transmission.

Q47:- Which port does the PING use?

The PING does not use any port. Any application, which operates in layer 4, needs port. Since PING is a layer 3 network management tool, it does not require any port to operate.

Q48:- Which topology uses a centralized device for connectivity?

Star topology uses a centralized device (HUB or Switch) for connectivity.

Q49:- Which topology uses coaxial cable and terminators?

Bus topology uses coaxial cable and terminators.

Q50:- What is the daisy chaining technique and which topology uses this technique?

Star topology uses the daisy chaining technique to extend the network. In this technique, a hub or switch is connected to another hub or switch as the node of the existing topology. Then that hub or switch is used to connect the more devices in network.

Q51:- What is the signal bouncing issue and how it can be solved?

Signal bouncing issue occurs in bus topology. Bus topology uses coaxial cable to connect the computers. In this topology when a computer sends signal, the signal travels in both directions from the sending computer. When this signal reaches at the end of the cable, it bounces back and returns in the original direction. This is known as signal bouncing issue. To solve this issue, terminators are used in both ends of the cable. Terminator absorbs the signals, when they reach to it. This resolves the signal bouncing issue.

Q52:- What is the backbone network?

The network which connects two or more networks together is considered as a backbone network. Usually backbone network contains high speed data transferring devices such as routers and switches. Backbone network should never be used for end user connectivity. The network which provides end user connectivity should be connected through the backbone network.

Q53:- What is the PAN network and how it is different from the LAN network?

A PAN network is the shorter version of LAN network. Unlike LAN networks which are mainly built for a group of users, PAN networks are built for individual users. Usually a PAN network is built to connect multiple personal devices such as smartphone, PDA, laptop and computer together for data sharing.

Q53:- A company has offices in Jaipur and Delhi. What type of computer network it will use to connect these offices?

WAN (Wide Area Network) network is used to connect the networks which are spread over the different geographical location.

Q54:- What is the intranet?

The term intranet refers an IP based network which is administered and controlled by a single entity. In this type of network, only authorized users are allowed to access the network resource.

Q55:- A company does not have sufficient budget for lease line connection. Which cost effective alternate will you suggest for this company?

VPN (Virtual Private Network) is the cost effective alternative for leased line.

Q56:- A company wants to extend its intranet network to certain business partners. What type of network it has to build?

Extranet, when we extend the intranet to external parties, we create Extranet.

Q57:- How many wires does UTP cable contain?

UTP cable contains four pairs of wires. Each pair has two wires which are twisted with each other. This way, there are total eight wires in a UTP cable.

Top 100 Networking Interview Questions with Answers

Q58:- How many wires are used for data transmission in UTP cable?

In UTP cable, from eight wires, only four wires are used for data transmission.

Q59:- Which wires are used for data transmission in UTP cable?

In UTP cable, wire 1, 2, 3 and 6 are used for data transmission. The wire 1 and 2 are used to transmit the data while wires 3 and 6 are used to receive the data.

Q60:- What is the maximum data transmission speed of Category 5 UTP cable, Category 5e UTP cable and Category 6 UTP cable?

The maximum transmission speed of Category 5 UTP cable, Category 5e UTP cable and Category 6 UTP cable is 100Mbps, 1000Mbps and 10Gbps respectively.

Q61:- There are two pairs of cables; RG58 & RG8 and RG59 & RG6. From these, which pair is used in computer network and where remaining is used?

RG58 and RG8 cables are used in computer network while RG59 and RG6 cables are used in TV cable network.

Q62:- Can we use RG59 and RG6 cables in computer network?

No, these cables can’t be used in computer network. These cables are built for cable TV network.

Q63:- Is coaxial cable still used in computer network?

No, coaxial is no longer used in computer network.

Q64:- What is the maximum data transmission speed of Category 2 UTP cable, Category 3 UTP cable and Category 4 UTP cable?

The maximum transmission speed of Category 2 UTP cable, Category 3 UTP cable and Category 4 UTP cable is 4 Mbps, 10 Mbps and 16 Mbps respectively.

Q65:- What is the 802.3 and what it defines?

IEEE 802.3 is a collection of IEEE standards. It defines standards for Physical layer including access methods used in Data Link Layer.

Q66:- What is the 5-4-3 rule and in which architecture it is used?

The 5-4-3 rule is used in 10Base2 and 10Base5 Ethernet architectures. In this rule, there can be maximum five segments in a network, connected with four repeaters. From these five segments, only three segments can be populated with nodes.

Q67:- What does 10Base2 stand for?

In 10Base2 architecture, 10 stands for speed, Base stands for Baseband transmission and 2 stands for 200 meters (Maximum distance it can span).

Q68:- What are the differences between a TCP port and a physical port?

A TCP port is a logical number. Transport layer uses it for the connection multiplexing. In connection multiplexing a local process is mapped with remote node by using the port numbers.

A physical port is the connection point of a node. External device or cable connects with node on this port.

Q68:- Why IP protocol is considered a connectionless protocol?

An IP protocol is considered a connectionless protocol because it does not establish a connection before sending data to endpoint.

Q69:- What is a Link?

A Link is a physical or logical connection between two nodes in network.

Q70:- What is a Node?

In network any device or system that has a NIC and uses an IP address to communicate with others is considered as a node.

Q71:- List any five application which uses TCP port.

Telnet, FTP, SSH, SMTP and POP

Q72:- What are the 2 sub layers of the Data Link layer?

Logical Link Control (LLC) and Media Access Control (MAC)

Q73:- What technology can be used to create a point-to-point network connection over the Internet?

VPN (virtual private network)

Q74:- What does NIC stand for?

The NIC stands for network interface controller.

Q75:- In which layers of OSI model, does NIC operate?

NIC operates in layer1 and layer2 of OSI model.

Q76:- Which Ethernet architecture uses BNC connector?

10Base2 and 10Base5 Ethernet architectures use BNC connector.

Q77:- Which access method is used in 1000BaseTX network?

CSMA/CD access method is used in 1000BaseTX network.

Q78:- How many network segments can be populated in 10Base2?

Maximum three network segments can be populated in 10Base2.

Q79:- Which cable is used in 10BaseFL network?

Fiber optical cable is used in 10BaseFL network.

Q80:- What is the maximum length of Thinnet cable?

Maximum length of the Thinnet cable is 185 meter.

Q81:- Which cable is known as the RG8 cable?

Thicknet cable is known as the RG8 cable.

Q82:- Which cable is used as the backbone cable in bus topology?

Thicknet (RG8) cable is used as the backbone cable in bus topology.

Q83:- What does ISO stand for?

ISO stands for International Organization for Standardization.

Q84:- What does OSI stand for?

OSI stands for Open System Interconnection.

Q85:- What is the OSI layer model?

OSI Layer model is a logical structure which defines the process of data transmission from one computer to other computer.

Q86:- How many layers are there in OSI model?

There are seven distinct layers in OSI model. The names of layer are Physical, Data link, Network, Transport, Session, Presentation and Application.

Q87:- What is a unicast message?

Unicast message is a message that is sent on a specific address and intended for a specific node in network.

Q88:- What is a multicast message?

Multicast message is a message that is sent on a multicast address and intended for a group of nodes in network.

Q89:- What is a broadcast message?

Broadcast message is a message that is sent on a broadcast address and intended for all nodes of network.

Q90:- What does the standard IEEE802.3ab define?

IEEE802.3ab standard defines 1000BaseTX Ethernet implementation. 1000BaseTX uses UTP (CAT 5e or CAT6) cable. It provides speed of 1000Mbps. It supports a maximum distance of 100 meter.

Q91:- What is a Mail Gateway?

It is a system that performs a protocol translation between different electronic mail delivery protocols.

Q92:- Which network does VPN uses for data transportation?

VPN uses public network such as Internet for data transportation.

Q93:- What is the use of tunneling protocols in VPN?

In VPN, tunneling protocols are used for data encryption and decryption.

Q94:- How many classes are there in IPv4?

In IPv4, there are five classes

Q95:- What is the range of each class in IPv4?

Class Starting address Ending address

Q96:- What does the term Pipelining describe?

Pipelining describes the sequencing of processes. When an additional task is started before ongoing task is finished, it is known as sequencing.

Q97:- What is difference between Baseband and Broadband transmission?

In Baseband transmission, only one signal is allowed to transmit at a time. While in Broadband transmission, multiple signals are allowed to transmit simultaneously.

Q98:- What does the SLIP stand for?

The SLIP stands for Serial Line Interface Protocol. It is used in WAN technology for transmitting IP datagrams over a serial line.

Q99:- Which measurement unit is used to measure the transmission speed of Ethernet?

The transmission speed of Ethernet is measured in Mbps (millions of bits per second).

Q100:- What are the key elements of a protocol?

A protocol is a set of rules which is used to govern all the aspects of information communication. There are three key elements in a protocol; Syntax, Semantics and Timing. Syntax defines the format in which data is displayed. Semantics describes the data bits of each section. Timing controls what time and how fast data is transmitted.

That’s all for this article. If you have any suggestion, comment or feedback about this article, please mail me. If you like this collection, please do not forget to share it from your favorite social platform.


ComputerNetworkingNotes Career Resources Top 100 Networking Interview Questions with Answers