NETWORK ENGINEER Interview Questions & Answers 2023
NETWORK ENGINEER Interview Questions & Answers 2023
30 day trial - no
ftosor
commitment
ESET
Add th
NETWORK ENGINEER Interview
extens
Questions Microsoft
ESET
B) Technical Questions :-
1) What is a LAN?
LAN is short for Local Area Network. It refers to the connection between
computers and other network devices that are located within a small
physical location.
The way the paired wires are connected to the connector (RJ45) is
different in cross cable and normal LAN cable.
The theoritical length is 100 meters but after 80 meters you may see
drop in speed due to loss of signal.
Math Probl
Algebra Geometry
Number Theory Co
he.net
Cross cable: Its used to connect same type of devices without using a
switch/hub so that they can communicate.
NETWORK ENGINEER
Interview Questions
11) What is a PST file and what is the difference between a PST
file and OST file? What file is used by outlook express?
PST file is used to store the mails locally when using outlook 2000 or
2003. OST file is used when we use outlook in cached exchanged mode.
Outlook express useds odb file.
12) What is BSOD? What do you do when you get blue screen in
a computer? How do you troubleshoot it?
BSOD stands for blue screen of Death. when there is a hardware or OS
fault due to which the windows OS can run it give a blue screen with a
code. Best way to resolve it is to boot the computer is “LAst known good
configuration”. If this doesn’t work than boot the computer in safe mode.
If it boots up than the problemis with one of the devices or drivers.
Data Entry
Join
Guaranteed Month
SimplyEarnOnline.c
Data Entry
Join
Guaranteed Month
SimplyEarnOnline.c
29) Spamguard
Spam Guard is an Outlook add-in that filters email that arrives in your
inbox. If the sender of any message cannot be identified then the message
is moved into a spam quarantine folder. Messages deposited in the spam
quarantine folder can be inspected and either deleted or approved at your
leisure.
31) DNS
Short for Domain Name System (or Service or Server), an Internet service
that translates domain names into IP addresses. Because domain names
are alphabetic, they”re easier to remember. The Internet however, is really
based on IP addresses. Every time you use a domain name, therefore, a
DNS service must translate the name into the corresponding IP address.
For example, the domain name www.example.com might translate to
198.105.232.4.
32) IPConfig
IPConfig is a command line tool used to control the network connections
on Windows NT/2000/XP machines. There are three main commands:
“all”, “release”, and “renew”. IPConfig displays all current TCP/IP
network configuration values and refreshes Dynamic Host Configuration
Protocol (DHCP) and Domain Name System (DNS) settings. Used without
parameters, IPConfig displays the IP address, subnet mask, and default
gateway for all adapters.
The TCP/IP Application layer actually has three counterparts on the OSI
model: the Session layer, Presentation Layer and Application Layer.
By looking at the first octet of any given IP address, you can identify
whether it’s Class A, B or C. If the first octet begins with a 0 bit, that
address is Class A. If it begins with bits 10 then that address is a Class B
address. If it begins with 110, then it’s a Class C network.
Star topology consists of a central hub that connects to nodes. This is one
of the easiest to setup and maintain.
One major disadvantage of star topology is that once the central hub or
switch get damaged, the entire network becomes unusable.
Tracert is a Windows utility program that can used to trace the route
taken by data from the router to the destination network. It also shows the
number of hops taken during the entire transmission route.
When you are accessing the resources that are shared by one of the
workstations on the network, that workstation takes a performance hit.
DHCP is short for Dynamic Host Configuration Protocol. Its main task is
to automatically assign an IP address to devices across the network. It
first checks for the next available address not yet taken by any device,
then assigns this to a network device.
Routers have built in console that lets you configure different settings, like
security and data logging. You can assign restrictions to computers, such
as what resources it is allowed access, or what particular time of the day
they can browse the internet. You can even put restrictions on what
websites are not viewable across the entire network.
51) What protocol can be applied when you want to transfer
files between different platforms, such between UNIX systems
and Windows servers?
Use FTP (File Transfer Protocol) for file transfers between such different
servers. This is possible because FTP is platform independent.
Default gateways provide means for the local networks to connect to the
external network. The default gateway for connecting to the external
network is usually the address of the external router port.
Good passwords are made up of not just letters, but by combining letters
and numbers. A password that combines uppercase and lowercase letters
is favorable than one that uses all upper case or all lower case letters.
Passwords must be not words that can easily be guessed by hackers, such
as dates, names, favorites, etc. Longer passwords are also better than
short ones.
The proper termination for unshielded twisted pair network cable is 100
ohms.
For a Class C network, the number of usable Network ID bits is 21. The
number of possible network IDs is 2 raised to 21 or 2,097,152. The
number of host IDs per network ID is 2 raised to 8 minus 2, or 254.
57) What happens when you use cables longer than the
prescribed length?
Cables that are too long would result in signal loss. This means that data
transmission and reception would be affected, because the signal
degrades over length.
Peer to peer are networks that does not reply on a server. All PCs on this
network act as individual workstations.
DNS is Domain Name System. The main function of this network service
is to provide host names to TCP/IP address resolution.
63) What advantages does fiber optics have over other media?
One major advantage of fiber optics is that is it less susceptible to
electrical interference. It also supports higher bandwidth, meaning more
data can be transmitted and received. Signal degrading is also very
minimal over long distances.
For Class A, there are 126 possible networks and 16,777,214 hosts
For Class B, there are 16,384 possible networks and 65,534 hosts
For Class C, there are 2,097,152 possible networks and 254 hosts
The following are the protocols under TCP/IP Application layer: FTP,
TFTP, Telnet and SMTP.
74) When you move the NIC cards from one PC to another PC,
does the MAC address gets transferred as well?
Yes, that’s because MAC addresses are hard-wired into the NIC circuitry,
not the PC. This also means that a PC can have a different MAC address
when the NIC card was replace by another one.
SMTP is short for Simple Mail Transfer Protocol. This protocol deals with
all Internal mail, and provides the necessary mail delivery services on the
TCP/IP protocol stack.
In the event that one link fails, there will always be another available.
Mesh topology is actually one of the most fault-tolerant network topology.
Profiles are the configuration settings made for each user. A profile may
be created that puts a user in a group, for example.
There are 4 protocols that are being managed by this layer. These are
ICMP, IGMP, IP and ARP.
The maximum allowable length for a network segment using 100Base-FX
is 412 meters. The maximum length for the entire network is 5 kilometers.
------>>[MOST IMPORTANT]<<------
Data Entry
Join
Guaranteed Month
SimplyEarnOnline.c
Engineering 2023 , FAQs Interview Questions , Theme by Engineering|| Privacy Policy|| Terms and
Conditions|| ABOUT US|| Contact US||
Engineering interview questions,Mcqs,Objective Questions,Class Lecture Notes,Seminor topics,Lab
Viva Pdf PPT Doc Book free download. Most Asked Technical Basic CIVIL | Mechanical | CSE | EEE |
ECE | IT | Chemical | Medical MBBS Jobs Online Quiz Tests for Freshers Experienced .