Networking diagram questions and answers pdf free download






















Question Suppose a person would like to access a file on another computer connected via LAN while working with safe mode. What should he do? Question Tell me what is VPN? Question ba What does negotiation mean when discussing network protocols?

Half-duplex devices let you send and receive, but only one-way at a time. If you've ever used a walkie-talkie, then you know what half-duplex conversations sound like. You have to push the TALK button to send your message.

But as long as you are holding the TALK key, you can't hear what anyone else is saying. You must release the button to receive. Full duplex actually, full duplex is nothing new. In fact, you already know exactly what it sounds like. Your corded or cordless phones are full-duplex devices letting you and your caller speak simultaneously without any dropouts in either one of your voices.

Half- and Full-Duplex ModeEach switch port can operate in either half-duplex or full-duplex mode. As a result, when the switch is connected to another network ui device that is capable of autonegotiation, the two devices communicate common speeds and duplex modes to each other. Then, the highest common capabilities for both devices become the operating modes. The switch has the following operating priorities To reduce attenuation, repeaters are used to boost the signal strength.

Question IP though unreliable it implements routing of network information across the nodes upto the destination. But TCP cannot do this it implements O only the end-to-communication i. M Question Explain what are the important topologies for networks? Answer:- BUS topology: In this each computer is directly connected to primary network cable in a single line.

Advantages: Inexpensive, easy to install, simple to understand, easy to extend. STAR topology:In this all computers are connected using a central hub. Advantages: Can be inexpensive, easy to install and reconfigure and easy to trouble shoot physical problems.

RING topology: In this all computers are connected in loop. Advantages: All computers have equal access to network media, installation can be simple, and signal does not degrade as much as in other topologies because each computer regenerates it. Question Tell us why do we have a minimum and maximum cable length requirement? Answer:- The min and max cable length is required because the signals can travel effectively without loosing their strength to that extent you can increase the cable length apart from preferred by using the repeaters after the length so that the signals will be boosted again.

Question What is cladding in Computer Networks? Common cladding materials include vinyl and extruded or roll-formed aluminum Read More Answers. Question G Explain what is passive topology? Answer:- When the computers on the network simply listen and receive the signal, they are referred to as passive because they don't amplify the signal in any way.

Example for lo passive topology - linear bus. Answer:- lG. In an Exchange environment, using. Think of this as a type of email cache file. This leaves the emails on the server, but also stores a copy of emails since your last sync on the local machine. Question d Suppose you have been given 1 printer and 1 IP Address for installing it in a Networking Environment How will you do it? The printer is now ready to use.

Because it is considered to be the most efficient IGP interior gateway protocol. Question What is the difference between routable and non- routable protocols? Answer:- Routable protocols can work with a router and can be used to build large networks. Non-Routable protocols are designed to work on small, local networks and cannot be used with a router Read More Answers. Question How many levels of signalling is possible with such modulation, in other words what is the number of symbols?

Answer:- Please share your views. Answer:- Short for Media Access Control address, a hardware address that uniquely identifies each node of a network. The MAC layer interfaces directly with the network medium. Consequently, each different type of network medium requires a different MAC layer.

In a session 2. In a LAN 3. In a WAN 4. It is a kind of virtual database used to manage the devices in a network. It consists of record the of network entities e. The database is hierarchical tree structured and entries are addressed through object identifiers.

Question Explain why logical address required is in OSI model? State the difference between guide media and unguide media Answer:- Please share your answers. DNS is resolve the web site name to IP address or you can say. How does it get a message to the network looking for its IP address and the location of its operating system boot files? The same message might contain the name of the machine that has the boot files on it.

If the boot image location is not specified, the workstation sends another UDP message to query the server. Answer:- Short for Multistation Access Unit also abbreviated as MSAU , a token-ring network device that physically connects network computers in a star topology while lo retaining the logical ring structure.

One of the problems with the token-ring topology is that a single non-operating node can break the ring.

The MAU solves this problem because it has the ability to short out non-operating nodes and maintain the ring structure. A MAU is a special type of hub. Network layer is responsible for the packets to be delivered with reliability for every link i.

But E1 leased line is very Costly. Vpn also need internet connection to send data from source to server. O Answer:- It is the protocol the routers in neighboring autonomous systems use to identify the set of networks that can be reached within or via each autonomous system. Question Explain what is the advantage and disadvantage of local area networks? Answer:- In transport layer two protocols are working TCP , transmission control protocol and UDP , user datagram protocol , TCP is also know as reliable protocol , means it is using handshake process , where client requtest to server then establish the connection and then transfer the packet then terminates it.

In UDP , no relaibilty but packets are safe. Question Explain what is autonomous system? Answer:- Autonomous system has been assigned a number which differentiates it from other autonomous systems to communicate. Answer:- Recovery Console for example if you install a software in exsisting windows and due to the software if the system have some problem you can choose Recovery console at Start -programs-accessories-system tools-Recovery consoleenter it and you can see the Timetable of Recovery console select the previous date of which you installed and select Restore.

Question lG Explain difference between the communication and transmission. Transmission is a physical movement of information and concern issues like bit polarity, synchronization, clock etc. Communication means the meaning full exchange of information between two communication media? Answer:- Difference between the communication and transmission. Transmission is a physical movement of information and concern issues like bit polarity, synchronisation, clock etc. Communication means the meaning full exchange of information between two communication media.

Broadband :In this type. Point to Point :In this type of technology there are multiple connections transmission lines between 2 hosts. C What is layer-3 switch in Computer Networks? Answer:- A layer 2 switch provides connectivity but doesn't act upon the packets at all. A layer 3 switch provides connectivity but can also provide routing, access lists, QOS and even security. O These are usually much more expensive switches with IOS's installed. They are best used in video conferencing to keep video packets together through QOS.

For video, your cable should run directly to the layer 3 switch and not pass through any other lessor switch to avoid tiling, delays and other issues that affect video quality. Question Explain what is Active Directory? How does it work? Answer:- In windows and environment ads is a power full sercice ,active directory mainly used for maintaing and promotion of entire company into centralized network administration.

Question Explain what is ipv6? How many octects is it? The best example of stupidity leading to the problem is universities handing out public IP address to students and facility on their networks.

A corporation would be insane to hand out public ip addresses to staff members. IPv6 default subnet is I'm sure it's implemented somewhere, but I've not seen it.

The solution to running out of IP addresses is better management of IPv4 addresses. The students then return to their networks and implement their text book learning's in their networks. Then these students wonder why things are all messed up on their networks.

You should Class 'C' addressing on your private, smaller networks. It'll work out much better for you. Question Explain what is Private IP? Answer:- The address which can't be routed through public internet are private ip addressesand it is scheam of saving public addressex:in class A range is Question Explain what is the difference between collision domain and broadcast domain?

Answer:- G Broadcast Domain: A set of all devices that recieve broadcast frames originating from any device within the set. Broadcast domains are typically bounded by routers or, in a switched network, by VLANs because routers do not forward broadcast frames. Collision Domain: In Ethernet, the network area within which frames that have collided are propagated. Repeaters and Hubs prpagate collisions, LAN switches and bridges do not.

Question ba Explain what is point-to-point protocol? Answer:- In networking, the Point-to-Point Protocol is commonly used to establish a direct connection between two nodes.

Its primary use has been to connect computers using lG a phone line, though it is also occasionally used over broadband connections. Question ui What is difference between layer 2 and layer 3 switch? How much bandwidth support by V. What is difference between V. Router also provide packet filtering by using acess list and when connect two or more network together and use logical addressing IP. Besides, router use routing table to make path selection and forward packet el to remote network.

How will you restore this file Without using Safe Mode Option? C as appropriate to your situation,u can solve it by repair this folder in the first repair in Win XP if u know name of his folder..

Keep in mind we cannot use any other additional equipment? This then translates the IP address of the server, which is likely to be a It keeps track of which server, and where it is going, so it can use the same 'real' IP address on the Internet for both of them.

Question Explain how Gateway is different from Routers? Answer:- Gateway is nothing but the final point that the data crosses finally in a network, it is mostly used for user authentication which router cannot provide.

Gateways can provide authentication to anonymous users, it is used when u have only one single network. It is less costly. Whereas router is used for routing between different networks, providing routing tables and deciding best path for the data to travel.

It is used when you have more than one networks. It is more costly. Question Explain benefits of VPN? An IP VPN is a partitioned private network constructed over a shared IP-based backbone that utilizes technologies to ensure privacy of data. Question which protocol is used for retrieving mails?

How will you connect each devices and configure those devices? Answer:- ba This is using different network build purpose, so connect first router to first switch and connect 10 nodes with first switch, this is one network ex How will you read that switch?

Answer:- ui A switch can have an Ip address for telnetting purpose. So, if you telnet to the switch, and if you have no password on Telnet you can access the switch provided that there is no privileged mode password set and then 'Show Run' , you can read the running configuration.

Answer:- in Piggybacking is gaining access to restricted communication channel by using session that another user has already established. Piggybacking can be defeated by logging off before leaving a workstation or terminal or by initiating a protected mode, such as via a screensaver, that requires re-authentication before access can be resumed. C What advantage does REX offer other similar utilities? O Read More Answers.

Question M Explain what does the Mount protocol do? Answer:- The Mount protocol returns a file handle and the name of the file system in which a requested file resides. The message is sent to the client from the server after reception of a client's request. Question Tell me what is the difference between interior and exterior neighbor gateways? Answer:- Interior gateways connect LANs of one organization, whereas exterior gateways connect the organization to the outside world.

Question What is a pseudo tty in Computer Networks? Answer:- A pseudo tty or false terminal enables external machines to connect through Telnet or rlogin. Without a pseudo tty, no connection can take place. Question What is the difference between an unspecified passive open and a fully specified passive open? Answer:- An unspecified passive open has the server waiting for a connection request from a client.

A fully specified passive open has the server waiting for a connection from a specific client. Question What is the function of Transmission Control Block? Answer:- A TCB is a complex data structure that contains a considerable amount of information about each connection.

Answer:- ba Anonymous FTP enables users to connect to a host without using a valid login and password. Usually, anonymous FTP uses a login called anonymous or guest, with the password usually requesting the user's ID for tracking purposes only.

Anonymous FTP is used to enable a large number of users to access files on the host without having to go to the trouble of setting up logins for them all. Anonymous FTP systems usually have strict controls over the areas an anonymous user can access.

Answer:- ui Terminal emulation is the ability to make one computer terminal appear like some other terminal. Terminal emulation is used to give the users the ability to log on and get direct access to legacy programs in a mainframe operating system. The emulation program runs like any other workstation application as a separate program task. An individual channel can be uniquely identified by its virtual e channel and virtual path number. The insertion of VCs enables to implement policies for allocating the physical channel bandwidth, which enables to support quality of service in applications.

C Question The network address made available to the transport layer should use a uniform numbering plan 1. Question What is Beaconing in Computer Networks?

Answer:- Beaconing is a process which allows the network to render their network problems by them-selfToken ring and FDDI Fibre Distributed Data Interface networks make use of this process. Question Explain what are headers and trailers? How are they added and removed? Answer:- Headers and trailers are the concepts of OSI model. Headers are information structures which identifies the information that follows, such as a block of bytes in communication.

Trailer is the information which occupies several bytes at the end of the block of the data being transmitted. They contain error-checking data which is useful for confirming the accuracy and status of the transmission. During communication of data the sender appends the header and passes it to the lower layer while the receiver removes header and passes it to upper layer. Answer:- The internet layer packs data into data packets known as IP datagrams, which contain source and destination address information that is used to forward the datagrams between hosts and across networks.

The Internet layer is also responsible for routing of IP datagrams. Its job is to allow the host to insert packets to the internet,when data is sent, each layer treats all the information it receives as data and adds control information to the front of that data. This control information is called a header, and the addition of a header is called encapsulation. When data is received, the opposite procedure takes place as each layer removes its header before passing the data to the layer above.

There are two types of IGP lG 1. Distance-vector routing protocol 2. Link-state routing protocol. Answer:- d Using a single IP address and locally splitting it up so that this single network IP address can actually be used on several interconnected local networks is known as netted IP. Answer:- System recovery is a process of an overall plan for system recovery so that we are prepared if the system fails. System recovery is a tow part system,including system e recovery backup and system recovery restore.

The SR Wizard, located in Backup, does the backup portion. The wizard backs up the system state, system services, and all the disks that are associated with the operating system components. T he restore portion restores all the disk signatures, volumes, and partitions on at a minimum the disks that is need to start the computer.

C A system failure will cause the system to freeze, reboot, or stop functioning altogether. System failure can occur because of a hardware failure or a severe software issue, example, when a hard disk drive fails, it will prevent the computer from being able to boot.

When a system fail occurs we use system recovery to recover the system back to its condition. O Question Tell me what is the default subnet mask for an ipv6 address? M Answer:- A default subnet mask Question Suppose If you are given the IP address can u tell how many computers can be connected? What do you look at? Question Tell me how to transfer some data periodically using RTP protocol without any loss?

Answer:- Suppose i want to send some periodic information during the normal voip communication using RTP. How can I make sure that this data can be reached there without any loss??

And also is there any method to send data in such a way Read More Answers. Question What is the difference between networking and telecom domain? Will network protocol testing will come under telecom domain? Question What is ost file?

Answer:- In Microsoft Office Outlook , a new offline folder file format is introduced that offers greater storage capacity for items and folders and supports multilingual G Unicode data. An offline file folder is used to keep a local copy of your Exchange Server mailbox on your computer. The items in your. Steps for offline file folder On the File menu, click Work Offline.

Select or clear the Prompt me at startup so I may choose to work offline or online check box, and then click OK. If you clear the check box, Outlook will automatically start offline if a connection to the server is lo not available.

Click Yes to copy the data from the server to your new Offline Folder file. Answer:- lG Printer driver replication means if you have a network printer and if you want to share it among other Citrix servers, then we can replicate that driver to be used by all the Citrix servers or for few selected Citrix servers, however that driver should be installed in the Citrix server from which we are replicating the driver.

Printer mapping relates to mapping the driver software for specific domain users only, these can be dont by right clicking on the driver or by the printer option on the left plane of Citrix presentation server console.

C Question What is port address in Computer Networks? Please enter your comment! Please enter your name here. You have entered an incorrect email address! Government Scheme. General Awareness.

Government Adda - December 8, 0. General Awareness is the most important section for all the examinations. With the expanded competition in the field of Banking examinations, it has now November 5, Question What is the use of source port number.

This example explains the need of source port number in a TCP header. In the above diagram, assume that the web client opens two instances of a browser and access the website on the web server.

The packet, which is sent from the web client, would contain the source IP address The source ports, in the TCP header would be unique and different for both the connections. If the source port number is not available, the web server would not be able to send a response to the appropriate browser instance, which has initiated the connection. The destination port number is used to identify the application, to which the connection needs to be established with.

In the above diagram, when the web client opens the browser and attempts to access the website on the server, the destination port number 80 is used, which would be used the web server system to identify, which application the incoming packet is intended for.

On the PC screen from where the ping is issued, the reply is from an IP address and not from the website name www. Network communications are based on IP addresses and not domain names. When the command ping www. The laptop is configured behind a wireless router which is connected to the internet. What exactly happen The following are the list of events which happen before you see the home page of the website.

Type the URL on the browser. This is the IP address of the server which hosts the website. The server responds with the files and images of the home page of the website, which is displayed on the browser window. The client version of both the applications are installed on PC1 and the server version of both the applications are installed on PC2.

If the application 1 client residing on PC1 wishes to send data to the corresponding server residing on PC2, it has to first establish transport layer connectivity. This transport layer connectivity is termed as the TCP 3 way handshake. Only after the handshake is successful, data can be send. If the application 2 client wishes to send data to the corresponding server residing on PC2 , then a transport layer connectivity is not required beforehand.

The data can be send instantaneously. Due to this , UDP is always a faster communication protocol. Whether you are browsing the internet, sharing files or printing a file, a network protocol is always involved. Network protocols are developed by protocol design and development engineers. Different protocols would be involved to achieve end to end computer network communication.

The protocol stacks are integrated as part of the Computers operating system. For example, if a computer network has to be setup between a mix of Windows and Linux machines, this protocol can be used.

These network protocols can only be used for network communication between computers or devices from the same vendors. These network protocols are proprietary to the vendors and cannot be used on any other platforms apart from the vendor. Consider an analogy where, a person calls up an organization on the board telephone number, which is a unique number. Once the call is established, the automatic calling system would request the caller to enter the extension number to reach the required person.

In networking, the board number and the extension number corresponds to IP address and port number. The concept of port numbers is explained in detail with the reference to the diagram below. The PC with IP address, wishes to access the website www. The website, is available on the Webserver. What exactly is a website? A website is a set of files , which are hosted saved in a specific location on the hard disk on the Web server.

The IP address of the web server is to be known before the PC can establish connectivity to the Web server. This is done by the DNS resolution process. But the IP address here is like the board number. Every network applications would have a specific port number associated with it. All of them uses specific port numbers. When the request reaches the webserver, it would behave like the analogy example provided above.

A call is received Packet is processed and forwarded to the appropriate extension Based on the TCP port number 80 in the request, the contents of the packet is forwarded to the appropriate application.

So in a real world scenario, what happens to the response, which is sent back from the Webserver? When the client initiates the request, it would generate a random number, which would be used as the port number for identifying the return packet. The destination port number initiated from the client would be TCP port number The server would send the response to the source port specified by the client.

In the below diagram, the PC is on the internal network with the IP address The default gateway of the PC is configured as NAT is configured on the router for allowing internal IP addresses to be sent out to the internet. The Web server, which hosts the Website, has a public IP.

The following sequences of events are followed when a user on the PC types the URL of the website and views the website content on the browser.

The PC has to identify the IP address corresponding to the name www. Once the PC receives the IP address of the webserver on which the website is hosted, it initiates a TCP 3 way handshake to the Web server on destination port Question How does a router forward packets. When an IP packet is received on a router, the destination IP address is looked into. The network address corresponding to the IP address is looked into the routing table of the PC. If the network is a directly connected network, the packet is sent out using the interface which is directly connected to the network.

For this purpose, a frame which would contain the source mac-address as the routers mac-address for the interface and the destination mac-address as the actual destinations mac-address is used. On an ethernet segment, ARP is used for identifying the mac-addresses. If the network is not directly connected, the router would then look for information about how to reach the network, which is typically, configured using static route.

If a static route is not available, the default route on the router, which is used for forwarding packets to unknown destination, is used. Question What happens when a packet is received on a router. In the above diagram, PC1 is configured with the IP address The router is configured with the IP address The IP packet is encapsulated in an ethernet frame, which would have the source mac- address as that of PC1 and destination mac-address as that of the routers interface configured with the IP address When the packet reaches the router, the router would look into the destination mac-address inside the frame.

After verification, the router would look into the destination IP address inside the packet. It would then understand that the packet is intended for itself, and would then process the upper layer of the packet.

The following are the operations that would be performed by the router. The router looks into the destination mac-address inside the frame and checks if it is intended for itself. If the mac-address is incorrect, the frame is dropped.

If correct, the router would calculate and verify the FCS value of the frame. If a match is available, then the router would create a new frame for the exit interface and the IP Packet would be encapsulated in the new frame. The old frame would be discarded by the router. Question How is a routing table created.

Routing table is available on devices which work at layer 3 of the OSI model, which is the network layer. This includes computers, routers, layer 3 switches etc. A routing table is created based on the information configured and provided. For ex on router, when an IP address along with the subnet mask is configured, the network address is derived and the information included in the routing table as a directly connected network.

Additional information related to different networks can be configured using routing techniques like static routing and dynamic routing. This information is also included in the routing table. When a packet reaches a router, the destination IP address in the IP packet is looked into and the corresponding network address is looked into the routing table. Typically, packets which are bound to the internet have varying destination IP address, which would not be available or know before.

Due to this routers are configured with a default route, to forward packets with unknown destination addresses. All packets, bound to the internet would use the default route and would be forwarded to the IP address to which the default route points to, typically the gateway of the internet router. Computers build routing tables based on the information provided. The default gateway configured on the PC, would also be used along with the network address and these information would be used to populate the routing table of a PC.

A packet bounded for a different network, uses the information in the routing table to understand, the gateway address details for forwarding to a different network. Every time the packet crosses a router, the value is decremented by 1. When the TTL value in the packet reaches 1, the packet is dropped, thus avoiding loops incase the packet does not reach the destination. Question What is the difference between default route and default gateway.

A default route is a route entry in a routing table whereas a default gateway is a value, typically an IP address. When an IP packet is received by a router, it looks into the destination IP address in the packet. It then checks in its routing table if it is aware of the network address corresponding to the IP packet.

It would then forward the packet out on the required interface to which the network is connected. If the destination network is unknown, the packet would be dropped. What if the router is directly connected to another router, which knows about the destination network in the IP packet. The default gateway of the first router can be configured with the IP address of the second router. When this configuration is performed, a route entry would be automatically populated in the routing table.

This route entry is known as a default route. Instead of configuring the default gateway, a default route entry can also be configured directly on the router. The IP address configured on one adapter is The IP address configured on the second adapter is Once this is configured it is observed that the routing table entries are created. How is this done? Anding operation Every bit in the IP address is compared with the corresponding subnet bit.

When an IP packet arrives, the router looks into the destination IP address field in the IP header, which is then used for matching routes in the routing table. Question Are frames used on wired and wireless links the same or different Frames used on wired and wireless links are different. Generic ethernet frames are used on wired links.

On the wireless links, Question How many wireless devices can connect to a wireless access point. Wireless clients initially attempts authentication with the access point. On successful authentication, the clients associate with the access point.

Question If a wireless network is secure and encrypted, is the data send from the source to the destination encrypted. The data would be encrypted only between the wireless client and the access point.

Assuming that the destination is on the wired link, to which the access point is connected, data from the access point to the destination would be unencrypted. Question How many keys are required to be configured for encrypting and decrypting based on WEP protocol between a wireless client and access point.

Both use TLS for communication. Question Explain the benefit of using radius servers for wireless networks as opposed to pre- shared keys between clients and access points. When radius servers are used, the key which are used for encryption and decryption are derived dynamically between the client and the server and is unique for every session.

Question What is the alternate way of transporting data if TCP 3 way handshake is unsuccessful between the client and the server. There is no alternative way. If the TCP 3 way handshake is unsuccessful, data cannot be transported. Question Explain a technique by which a home desktop which is behind a home router can be viewed by a user on the internet.

The desktop can be configured to allow remote desktop connections. Port forwarding can be configured on the home router, to allow RDP port Remote desktop to be forwarded to the desktop. Users from the internet can RDP to the public IP of the router, which on receipt would forward the request to the desktop.

Question How can ftp be blocked on internet facing Cisco router. How can users on the LAN network be allowed only for http access to the internet. An ACL can be configured on the router on the interface which is connected to LAN network as inbound which would permit only http access.

All other traffic is denied. Question Name two techniques by which a single internet connection can be shared by multiple users on a LAN. The requirement can be achieved by the use of NAT router Network address translation or a proxy server. This would ensure that RIP updates are not processed by the appropriate interface. Question Can a network layer firewall be used to block access to a wireless access point from a wireless client.

Access control to an access point should be configured on the wireless access point. The firewall would not be able to perform this requirement. OSPF does not use any protocol at the transport layer. It encapsulates and sends data the IP layer. Question Which feature can be used to deny access between two systems connected to the same switch.

Mac-based ACL can be configured to deny access between two systems on the same switch, Question An access point is pre-configured for WPA authentication. There are 5 users connected to the access point. Will each user be pre-configured with the same key or different keys. The keys used by the users would be the same key which is pre-configured on the access point.

Question What is the fundamental difference in implementation between radius and tacacs. Question Can radius servers and clients from different vendors communicate with each other. Radius is a vendor neutral protocol. So a radius client and server from different vendors would be able to communicate without any issues.

Question Name two networking hardware devices which can be configured as radius clients. Switches and access points can be configured as radius clients.

The ACL would make the router understand that the traffic corresponding to the network associated with the ACL, has to be sent encrypted over the ISPEC tunnel and all other traffic is to be send unencrypted. Question What feature on a Cisco router can be used to receive but not send routing updates. The passive interface command can be used for the purpose. Question Which feature on a Cisco router can be used to send selective route updates through an interface.

Distribute list feature can be used for the purpose. Question Which feature on an access point can be configured to hide the availability of the access point. This would make users on the network unable to view the presence of the access point.

Question Which layer of the OSI layer does ping and trace route work. They work at the application layer. Question Does a packet takes a network path which has a lower or higher administrative distance.

A packet always takes the path which has a lower administrative distance. Question Name two protocols which are used for accessing a website and its need. TCP is used between the browser and the server for data transfer. Proxy server and NAT are two different technologies. If NAT is used for sharing internet, proxy server is not required to be configured on the browser.

Question Will internet work if the dns server is configured on a PC but not the default gateway. All packets bound to the internet should be routed through an appropriate gateway. DNS is used only for name resolution. So internet would fail, if the PC is not configured with an appropriate gateway address. Question On which port do a DNS client and server work. DNS clients do not work on a know port. When a DNS request is send, the operating system assigns a random number for the port.

DNS servers work on well known port number FTP clients would have unique source port numbers in them. This would be used for differentiating the connections. Question Which field in the IP header is used at the destination for identifying fragmented IP packets.

The identification field in the IP header is used for identifying fragmented IP packets. Question Name one limitation of network layer firewall. Network layer firewalls would be unable to detect and block vulnerabilities which are specific to application layer protocols. For ex, vulnerabilities specific to FTP protocol cannot be blocked by a network layer firewall. Question Can a packet filter firewall be used to block access to a DNS server on the network.

Packet layer firewalls work on IP and transport layer headers. Access to DNS server can be blocked by a packet filter firewall by creating an access control list which would block all ports to well known port UDP port 53 used by DNS servers.

Question Which layer of the OSI model would respond to a ping request. HTTP is an application layer protocol. Application layer corresponds to Layer 7 of the OSI model Question Name two protocols which are vulnerable to brute force attacks. Telnet and FTP are two protocols which are vulnerable to brute force attacks. It is a layer 2 protocol. Question A router is configured for a static route entry.

RIP is also configured on the router. The router learns the network address corresponding to the static route entry via Rip Update. What would happen? The dynamic route entry would be rejected by the router and the static entry would be retained Question A PC is connected to a 5 port ethernet hub operating at Mbps.

Other ports of the hub are free and not connected to any other devices. At what duplex setting can the hub operate Hubs used a shared medium for communication. Question A PC which has a What would be mac-address learned by the switch on port 2 after successful authentication After successful authentication, the switch port would learn the mac-address of the PC.

This would be the behavior with or without any form of authentication. TCP is used between the authenticator and the authentication server.

The route print command can be used to display the routing table. Question Which command on a Cisco system would display the routing table. Windows server can be configured with two network interface cards and can be setup as a router. On the internet there are devices from different vendors. Question Name two protocols which are used by Question Which protocol does a router use to inform the source that a destination is unreachable. Routers use ICMP protocol. This would be dependent on the parameters configured on the ACL.

For this an extended ACL would be required. So an extended ACL can be used for this purpose.



0コメント

  • 1000 / 1000