Networking Interview Questions for Experienced

This article lists the most commonly asked networking interview questions with detailed answers for experienced job seeker. Going through these interview questions and answers will boost your confidence to face networking interview effectively.

Suppose there are 4 routers. How many connections do we need to connect these routers in fully meshed topology?

To count the total required number of connections in fully meshed topology, following formula is used.

Total required number of connection = N*(N-1)

Here N is the total number of devices.

For 4 routers we need, 4*(4-1) = 12 connections.

What is the difference between a server and a dedicated server?

A dedicate server is also a server but it is deployed to provide a specific service. For example, if a server is providing all regular services in network then it is a server. But if it is providing only a specific service such as web server which provides only web service nothing else then it will be considered as a dedicate server.

Based on application access, what are the differences between Internet, Intranet and Extranet?

  • In Internet anyone can access the application from anywhere in the world.
  • In Intranet only the authorized users from the company for which the application was built can access the application.
  • In Extranet selected external users can access the application which is built for the Intranet.

How does ring topology work?

In ring topology all computers connect in a circle. When a computer has some data for another computer, it puts that data packet in circle. Each computer looks at each packet to figure out whether the packet is intended for it or not. If packet is intended for it, it will process that packet, otherwise ignore it

A loose terminator gets separated from coaxial cable making it open at one end in Bus topology. Will this network work as expected?

No, this network will not work. In bus topology both ends of cable must be terminated.

This article is the fourth part of the article “Collection of Networking Questions with Answer for Beginners”. Other parts of this article are following.

Networking Interview Questions for Fresher

Basic Networking Interview Questions with Answers

Networking Interview Questions and Answers

Top 100 Networking Interview Questions with Answers

A cable which was not properly attached with the hub is accidentally pulled out from hub in star topology. Will this network work?

Yes, only the device which was connected with that cable will lose connectivity. Remaining devices work normally.

Due to fluctuation in light a centralized hub is burnt in star topology. Although all connected devices and cables are unaffected, will these devices be able to access the network?

No, in star topology if centralized hub is failed, all devices will lose the connectivity.

Does number of computers matter in LAN and WAN?

No, the number of computers does not matter in LAN and WAN. This categorization is purely based on geographical location of network. For example, we may have 1000 computers connected together in a network. If this network is located in a building or in a campus, it will be considered as a LAN network. Just like this, we may have a network of only two computers. If one computer is located in one city and other computer is located in another city then this network will be considered as a WAN network.

What are the some popular IEEE standards?

Following table lists some popular IEEE standards.

Standard Description
802.1 Standards for LAN/MAN bridging and management
802.2 Standards for Logical Link Control (LLC)
802.3 Ethernet Standards CSMA/CD
802.4 Standards for Token passing bus access
802.5 Standards for token ring access and for communications between LANs and MANs
802.6 Standards for information exchange between systems
802.7 Standards for broadband LAN cabling
802.8 Standards for Fiber optical connection
802.9 Standards for integrated services, like voice and data
802.10 Standards for LAN/MAN security implementations
802.11 Standards for WiFi (Wireless Networking)
802.12 Standards for demand priority access method
802.14 Standards for cable television broadband communications
802.15 Standards for Bluetooth network
802.15 Standards for ZigBee (Wireless Sensor/Control Networks)
802.16 Standards for WiMAX Wireless Networking

What is a firewall?

A firewall is a networking device or application software which, based on preconfigured rules, filters the data which passes through it. There are two types of firewall; hardware firewall and software firewall.

What are the differences between hardware firewall and software firewall?

In hardware firewall, firewall is installed in a device which is specially made for it. Since firewall is integrated at hardware level and uses all processing power and memory of the device, it is extremely fast in comparison of software firewall. In negative side, it is too expensive and complex.

In software firewall, firewall is installed as an add-on application in host OS. In negative side, it is quite slow and less effective in comparison of hardware firewall. In positive side, it is less expensive. Some open source firewalls are available even free of cost.

What is the difference between operating system and application software?

Operating system is the main program while application software is an add-on program. Operating system installs in computer and accesses system resources such as CPU, RAM and Hard disk directly. While application software installs in operating system and accesses system resources through the operating system.

What is the Kerberos?

Kerberos is an authentication mechanism developed by Massachusetts Institute of Technology. It uses encryption to prevent intruders from discovering passwords and gaining unauthorized access to files.

What is difference between Half-Duplex and Full-Duplex mode?

In half-duplex mode, a NIC can either send or receive data at a time. While in full-duplex mode, it can perform both operations simultaneously.

What is an anonymous FTP account?

An anonymous FTP account is a special FTP account that allows guest users to access the FTP server anonymously.

What is a computer bus?

A computer bus is a logical system that allows multiple peripherals or components to connect with system through a single wire or cable. A computer bus can be categorized based on how it transmits the data and where it used.

Based on data transmission, there are two types of bus; parallel bus and serial bus. In parallel bus, several bits of data are transmitted at the same time. While, in serial bus, only a single bit of data is transmitted at a time.

Based on location of usage, again there are two types of bus; internal bus and external bus. Internal buses are used to transfer the data between internal components. Internal components are the components which are either integrated or installed in motherboard such as CPU and RAM.

External buses are used to transfer the data between internal components and peripherals. Peripherals are the devices which connect with motherboard though the cables such as Hard disk and DVD Writer.

Why a Straight-through UTP cable cannot be used to connect two systems directly?

In straight-through cable, pins are arranged in same order at both ends. A system uses pin 1 and 2 for sending data and pin 3 and 6 for receiving data.

straight-through cable connection

If we use straight-through cable to connect two systems, pin 1, 2, 3 and 6 of one system will connect with the pin 1, 2, 3 and 6 of other system. Since, instead of receiving pins, sending pins are connected with sending pins, data transmission will be failed. For a successful data transmission, sending pins must be connected with receiving pins. For this reason, to connect two systems directly, cross cable is used.

cross cable connection

Cross cable connects sending pins with receiving pins.

Which addresses are reserved in IPv4?

In IPv4 following addresses are reserved and cannot be assigned to end devices.

  • 0.0.0.0:- This address represents all networks.
  • 127.0.0.0 to 127.255.255.255: - This IP range is reserved for loopback testing.
  • 224.0.0.0 to 239.255.255.255 (Class D): - This IP class is reserved for multicast.
  • 240.0.0.0 to 255.255.255.254 (Class E): - This IP class is reserved for future use.
  • 255.255.255.255: - This address represents all hosts.

What does the term Trojan horse refer in Computer Networking?

Trojan horse is a malicious code that is hided in a legitimate application. It is used by hackers to gain the unauthorized access in system and once access is gained, to steal the sensitive information from system.

What is a virus?

Virus is a small malicious computer program that is designed to damage the system and annoy the users. Usually it hides in another program and travels with that program. When that program is installed, it is also installed with that program in system.

What is an antivirus?

An antivirus is a program that is used to scans and eliminates the malicious programs from stored data and installed applications. Virus, malware, spyware and adware are the few examples of malicious programs.

How is a cross-over cable made?

In Cross-over cable, the pins which send data from one end connect with the pins which receive data on other end. Pin 1 and 2 (sending pins) connects with pin 3 and pin 6 (receiving pins) respectively.

Networking Interview Questions for Experienced

What is the network relationship type?

The term Network relationship type defines how the nodes communicate with each other in network. There are two types of network relationship; peer to peer and server/client.

In peer to peer network relationship, all nodes are treated equally. Any node can share its resources to the network and can access any shared resource from the network. In this relationship, data is stored in each node individually.

In client/server network relationship, nodes are treated based on their roles in network. Server node has the highest privilege. It shares resources and information in network. Client nodes have less privilege. They access the shared resources from server. In this relationship, usually data is stored in server system only.

That’s all for this part. In next part, we will take more networking interview questions with answers. If you have any suggestion, comment or feedback about this article, please mail me. If you like this collection, please do not forget to share it from your favorite social platform.

ComputerNetworkingNotes Networking Interviews Networking Interview Questions for Experienced