1) What is a link?

A link is a connection between two devices. It includes the type of cable and protocol used by one device to be able to communicate with another.

2) What is the OSI reference model hierarchy?

There are seven OSI layers: physical, data link, network, transport, session, presentation, and application.

3) What is backbone network?

A backbone network is a centralized infrastructure designed to distribute different routes and data to various networks. It also handles bandwidth management and various channels.

4) What is LAN?

LAN is short for local area network. It refers to the connection between a computer and other network devices in a small physical location.

5) What is a node?

A node is a point at which a connection occurs. It can be a computer or device that is part of a network. In order to form a network connection, two or more nodes are required.

6) What is a router?

Routers can connect two or more network segments. These are intelligent network devices that store information in their routing tables, such as paths, hop counts, etc. Armed with this information, they can determine the best path for data transmission. Routers operate at the OSI network layer.

7) What is a peer-to-peer link?

It refers to a direct connection between two computers on a network. Point-to-point connections do not require any other network equipment other than connecting cables to NIC cards on both computers.

8) What is anonymous FTP?

Anonymous FTP is a way to grant users access to files on a public server. Users who are allowed access to data on these servers do not need to identify themselves, but log in as anonymous visitors.

9) What is a subnet mask?

The subnet mask is combined with the IP address to identify two parts: the extended network address and the host address. Like AN IP address, a subnet mask consists of 32 bits.

10) What is the maximum length of UTP cable allowed?

A single segment of UTP cable has an allowable length of 90 to 100 meters. This limitation can be overcome by using Repeaters and switches

11) What is data encapsulation?

Data encapsulation is the process of breaking up information into smaller manageable chunks before it is transmitted over the network. In this process, the source and destination addresses are attached to the header along with parity.

12) Describe the network topology

Network topology refers to the layout of a computer network. It shows the physical layout of devices and cables and how they are connected to each other.

13) What is VPN?

VPN stands for virtual private network, a technology that allows the creation of secure channels over networks such as the Internet.

For example, A VPN allows you to establish a secure dial-up connection to a remote server.

14) What is NAT?

NAT is network address translation. This is a protocol that provides a way for multiple computers on a public network to share a single connection to the Internet.

15) What does the network layer work under the OSI reference model?

The network layer is responsible for data routing, packet switching, and network congestion control. Routers run under this layer.

16) How does network topology affect your network building decisions?

Network topology determines what media interconnect devices must use. It also serves as the basis for materials, connectors and terminals suitable for setup.

17) What is RIP?

RIP, short for Routing Information Protocol, is used by routers to send data from one network to another.

It manages routing data efficiently by broadcasting its routing table to all other routers in the network. It determines network distance in hops.

18) What are the different ways to protect computer networks?

There are several ways to do this. Install a reliable and up-to-date antivirus program on all your computers. Ensure that the firewall is set up and configured correctly. User authentication will also be of great help. All of these will make for a highly secure network.

19) What is NIC?

NIC stands for Network Interface Card (NIC). This is connecting to a PC to connect to a network device. Each NIC has its own MAC address, which identifies a PC on the network.

20) What is WAN?

WAN stands for wide area network. It is the interconnection of geographically dispersed computers and devices. It connects networks located in different regions and countries.

21) What is the importance of the OSI physical layer?

The physical layer converts data bits to electrical signals and vice versa. This is a consideration and setup for network equipment and cable type.

22) How many layers are under TCP/IP?

There are four layers: network layer, Internet layer, transport layer and application layer.

23) What are proxy servers and how do they protect computer networks?

The proxy server prevents external users from identifying IP addresses on the internal network. Not knowing the correct IP address or even the physical location of the network. Proxy servers can make the network virtually invisible to external users.

24) What is the function of the OSI session layer?

This layer provides protocols and methods for two devices on the network to communicate with each other by holding sessions. This includes setting up the session, managing the exchange of information during the session, and the termination process when the session terminates.

25) What is the importance of implementing a fault tolerant system? Limited?

Fault tolerant systems ensure continuous data availability. This is achieved by eliminating single points of failure. However, in some cases, this type of system will not be able to protect data, such as accidental deletion.

26) What does 10BASE-t mean?

10 is the exponential data transfer rate, in this case 10 MBPS. “Base” refers to the Base band. T stands for twisted pair, which is the cable used for the network.

27) What is a private IP address?

Private IP addresses are assigned for use on the Intranet. These addresses are used for internal networks and cannot be used on external public networks. These ensure that there is no conflict between internal networks and that the range of private IP addresses can also be reused for multiple internal networks because they do not “see” each other.

28) What is NOS?

NOS or network operating systems are specialized software whose primary task is to provide a network connection to a computer so that it can communicate with other computers and connected devices.

29) What is DoS?

A DoS or denial of service attack is an attempt to prevent users from accessing the Internet or any other network service. This attack may take different forms, consisting of a group of perennials. A common way to do this is to overload the system server so that it can no longer handle legitimate traffic and will be forced to reset.

30) What is OSI and what role does it play in computer networks?

OSI(Open Systems Interconnection) as the reference model for data communication. It consists of seven layers, each of which defines specific aspects of how network devices connect and communicate with each other. One layer handles the physical media used, while the other indicates how the data is actually transferred over the network.

31) What is the purpose of the cable being shielded and having twisted-pair?

The main purpose is to prevent crosstalk. Crosstalk is electromagnetic interference or noise that can affect data transmitted over a cable.

32) What are the advantages of address sharing?

By using address translation instead of routing, address sharing provides an inherent security advantage. This is because hosts on the Internet can only see the public IP address of the external interface on the computer providing address translation, not the private IP address on the internal network.

33) What is a MAC address?

MAC or media access control that uniquely identifies devices on a network. It is also called a physical address or an Ethernet address. A MAC address consists of six bytes.

34) What are the isolayers or layers of the TCP/IP application layer in terms of the OSI reference model?

The TCP/IP application layer actually has three peers on the OSI model: the session layer, the presentation layer and the application layer.

35) How to identify the IP class for a given IP address?

By looking at the first octet of any given IP address, you can identify whether it is of class A, B, or C. If the first octet starts with 0 bits, the address is Class A. If it starts with bit 10, the address is a class B address. If it starts at 110, it is a class C network.

36) What is the main purpose of OSPF?

OSPF, or Open Shortest Path First, is a link-state routing protocol that uses routing tables to determine the best path for data exchange.

37) What is a firewall?

Firewalls are used to protect internal networks from external attacks. These external threats could be hackers who want to steal data or computer viruses that can instantly erase data. It also prevents other users from the external network from accessing the private network.

38) Describe the star topology

A star topology consists of a central hub connected to a node. This is one of the easiest things to set up and maintain.

39) What is a gateway?

Gateways provide connections between two or more network segments. It is typically a computer that runs gateway software and provides translation services. This translation is key to allowing different systems to communicate over the network.

40) What are the disadvantages of star topology?

A major disadvantage of the star topology is that once the central hub or switch is corrupted, the entire network becomes unusable.

41) What is SLIP?

The SLIP or Serial Line interface protocol is actually an older protocol developed in the early days of UNIX. This is one of the protocols used for remote access.

42) Give some examples of private network addresses.

10.0.0.0 the subnet mask is 255.0.0.0

172.16.0.0. The subnet mask is 255.240.0.0

43) What is Tracert?

Tracert is a Windows utility that can be used to track the route of data collection from the router to the target network. It also shows the number of hops taken during the entire transport routing.

44) What is the role of a network administrator?

The network administrator has many responsibilities, which can be summarized into three key functions: network installation, network configuration, and network maintenance/troubleshooting.

45) Describe a disadvantage of peer-to-peer networks.

When you are accessing a resource shared by a workstation on the network, the workstation’s performance degrades.

46) What is a hybrid network?

Hybrid networking is a network setup that leverages client-server and peer-to-peer architectures.

47) What is DHCP?

DHCP stands for Dynamic Host Configuration Protocol. Its main task is to automatically assign IP addresses to devices on the network. It first checks for the next available address that is not already occupied by any device and then assigns it to the network device.

48) What is ARP’s main job?

The main task of ARP or address resolution protocol is to map known IP addresses to MAC layer addresses.

49) What is TCP/IP?

TCP/IP stands for Transmission Control Protocol/Internet Protocol. This is a set of protocol layers designed to exchange data over different types of computer networks, also known as heterogeneous networks.

50) How to use a router to manage a network?

The router has a built-in console that lets you configure different Settings, such as security and data logging. You can assign restrictions to the computer, such as the resources it is allowed to access, or a specific time of day when you can browse the Internet. You can even impose restrictions on sites that are not visible on the entire network.

51) What protocols can be applied when you want to transfer files between different platforms, such as UNIX systems and Windows servers?

Transfer files between these different servers using FTP(File Transfer Protocol). This is possible because FTP is platform independent.

What is the use of the default gateway?

The default gateway provides a way for the local network to connect to the external network. The default gateway used to connect to the external network is usually the address of the external router port.

53) One way to protect your network is to use passwords. What is considered a good password?

Good passwords consist not only of letters, but also of combinations of letters and numbers. Passwords that combine uppercase and lowercase letters are more advantageous than passwords that use all uppercase or all lowercase letters. Passwords must not be easily guessed by hackers, such as dates, names, favorites, etc.

54) What is the correct termination rate for UTP cables?

The normal termination of an unshielded twisted pair cable is 100 ohms.

55) What is Netstat?

Netstat is a command-line utility. It provides useful information about the connection’s current TCP/IP Settings.

56) What is the number of network ids in class C networks?

For class C networks, the number of available network ID bits is 21. The number of possible network ids is 2, raised to 21 or 2,097,152. The number of host ids per network ID is 2, increasing to 8 minus 2, or 254.

57) What happens when a cable is longer than the specified length?

Too long a cable may cause signal loss. This means that data transmission and reception will be affected as the signal length decreases.

58) What common software problems can cause network defects?

Software-related problems can be any or a combination of the following:

Client server problems; Application conflict; Configuration error; Protocol mismatch; Security issues; User policy and rights issues

59) What is ICMP?

ICMP is an Internet control message protocol. It provides messaging and communication for protocols within the TCP/IP protocol stack. This is also the protocol used to manage error messages used by networking tools such as PING.

60) What is Ping?

Ping is a utility that allows you to check connections between network devices on your network. You can ping a device using its IP address or device name (such as the computer name).

61) What is peer-to-peer?

A peer is a network that does not reply on the server. All PCS on the network are separate workstations.

62) What is DNS?

DNS is the domain name system. The main function of this network service is to provide host names for TCP/IP address resolution.

63) What are the advantages of optical fiber versus other media?

A major advantage of optical fiber is that it is less susceptible to electrical interference. It also supports higher bandwidth, meaning more data can be sent and received. Long-distance signal degradation is also very small.

64) What is the difference between a hub and a switch?

The hub acts as a multi-port repeater. However, as more and more devices are connected to it, it will not be able to effectively manage the traffic passing through it. Switches offer a better alternative that improves performance, especially when high traffic is expected at all ports.

65) What are the different network protocols supported by Windows RRAS services?

Support for three main network protocols: NetBEUI, TCP/IP, and IPX.

66) What are the largest networks and hosts in class A, B, and C networks?

For class A, there are 126 possible networks and 16,777,214 hosts

For category B, there are 16,384 possible networks and 65,534 hosts

For class C, there are 2,097,152 possible networks and 254 hosts

67) What is the standard color sequence for straight-through cables?

Orange/white, orange, green/white, blue, blue/white, green, brown/white, brown.

68) What protocol falls below the application layer of the TCP/IP protocol stack?

The following are TCP/IP application layer protocols: FTP, TFTP, Telnet, and SMTP.

69) You need to connect two computers for file sharing. Is it possible to do this without using a hub or router?

Yes, you can use a cable to connect two computers together. Cross-type cables can be used in this case. In this setup, the data transfer pins of one cable are connected to the data receive pins of the other cable and vice versa.

70) What is ipconfig?

Ipconfig is a utility commonly used to identify the address information of computers on a network. It can display physical addresses as well as IP addresses.

71) What is the difference between straight through and cross cable?

Straight-through cables are used to connect computers to switches, hubs, or routers. Cross cables are used to connect two similar devices together, such as PC to PC or hub to hub.

72) What is client/server?

A client/server is a type of network in which one or more computers act as servers. Servers provide centralized repositories of resources, such as printers and files. A client is a workstation that accesses a server.

73) Describe the network

A network is the interconnection between computers and peripherals used for data communication. The network can be connected by wired cable or by wireless link.

74) Is the MAC address also transferred when the NIC card is moved from one PC to another?

Yes, that’s because the MAC address is hardwired to the NIC circuit, not the PC. This also means that the PC can have a different MAC address when the NIC card is replaced by another.

75) Explain clustering support

Cluster support refers to the ability of a network operating system to connect multiple servers in a fault-tolerant group. The main purpose of this is that in the event of a server failure, the next server in the cluster will continue all processing.

76) Where is the best place to install an antivirus program on a network of two servers and twenty workstations?

Antivirus programs must be installed on all servers and workstations to ensure protection. This is because individual users can access any workstation and introduce computer viruses when inserting removable hard drives or flash drives.

77) Describe Ethernet

Ethernet is one of the popular networking technologies in use today. It was developed in the early 1970s and is based on the specification specified in IEEE. Ethernet is used in local area networks.

78) What are the disadvantages of implementing ring topology?

If one workstation on the network fails, the entire network may be lost. Another disadvantage is that the entire network must also be temporarily shut down when adjustments and reconfigurations are needed in specific parts of the network.

79) What is the difference between CSMA/CD and CSMA/CA?

CSMA/CD or collision detection, resend data frames whenever a collision occurs. CSMA/CA, or collision avoidance, will first broadcast the intent sent before the data is transmitted.

80) What is SMTP?

SMTP is short for Simple Mail Transfer Protocol. This protocol handles all internal mail and provides the necessary mail delivery services on the TCP/IP protocol stack.

81) What is multicast routing?

Multicast routing is a targeted form of broadcasting that sends a message to a selected group of users rather than all users on a subnet.

82) What is the importance of encryption on the network?

Encryption is the process of converting information into code that the user cannot read. It is then translated or decrypted back into its normal readable format using the secret key or password. Encryption helps ensure that intercepted messages remain unreadable because the user must have the correct password or key.

83) How to arrange and display IP addresses?

The IP address is displayed as a series of four decimal digits separated by periods or dots. Another term for this arrangement is the dotted decimal format. An example is 192.168.101.2

84) Explain the importance of certification

Authentication is the process of validating user credentials before they log on to the network. It is usually done using a username and password. This provides security means to limit access from harmful intruders on the network.

85) What does tunnel mode mean?

This is a data exchange mode in which the two communicating computers themselves do not use IPSec. Instead, the gateway connecting the LAN to the transit network creates a virtual tunnel that uses the IPSec protocol to protect all traffic through it.

86) What are the different technologies involved in establishing WAN links?

Analog connection – use regular phone lines; Digital connection – use of digital telephone lines; Switched connections – Use multiple sets of links between sender and receiver to move data.

87) What is one advantage of grid topology?

In case one link fails, there is always another link available. The mesh topology is actually one of the most fault-tolerant network topologies.

88) What common hardware-related problems may occur when troubleshooting computer network problems?

Most networks are made up of hardware. Problems in these areas may include hard disk failure, NIC damage or even hardware boot. Incorrect hardware configuration is also a problem.

89) What can be done to fix the signal attenuation problem?

A common way to deal with this problem is to use Repeaters and hubs, as it will help to regenerate the signal and thus prevent signal loss. It is also necessary to check that the cable terminates correctly.

90) How does dynamic host configuration Protocol assist network management?

Instead of visiting every client computer to configure static IP addresses, the network administrator can apply the Dynamic host configuration protocol to create a pool of IP addresses called a range that can be dynamically assigned to clients.

91) Explain the overview of the network concept?

Profiles are configuration Settings that are set for each user. For example, you can create profiles that place users in groups.

92) What is Sneakernet?

Sneakernet is considered to be the earliest form of networking in which data is physically transmitted using removable media (such as disk, tape).

93) What is the role of IEEE in computer networks?

IEEE or the Institute of Electrical and Electronics Engineers is an organization of engineers who publish and manage standards for electrical and electronic equipment. This includes network equipment, network interfaces, cablings and connectors.

What are the protocols under the TCP/IP Internet layer?

There are four protocols managed by this layer. These are ICMP, IGMP, IP and ARP.

95) Speaking of networks, what are permissions?

A permission is a license to perform a specific operation on a network. Each user on the network can be assigned individual permissions, depending on what the user must allow.

96) What is a basic requirement for establishing a VLAN?

A VLAN is required because there is only one broadcast domain at the switch level, which means that this information is propagated throughout the network every time a new user connects. The VLAN on the switch helps to create a separate broadcast domain at the switch level. It is used for security purposes.

97) What is IPv6?

IPv6 or Internet Protocol Version 6 was developed to replace IPv4. Currently, IPv4 is being used to control Internet traffic, but it is saturated. IPv6 can overcome this limitation.

98) What is RSA algorithm?

RSA stands for Rivest-Shamir-Adleman algorithm. It is the most commonly used public key encryption algorithm.

99) What is grid topology?

A grid topology is a setup in which every device is directly connected to every other device on the network. Therefore, it requires each device to have at least two network connections.

What is the maximum segment length of a 100BASE-FX network?

The maximum allowable length of a network segment using 100BASE-FX is 412 m. The maximum length of the entire network is 5 kilometers.