ccna interview questions Flashcards
- What is a node?
A node refers to a point or a joint where a connection takes place. It can be a computer or
device that is part of a network. Two or more nodes are needed to form a network
connection.
- What is a point to point link?
It refers to a direct connection between two computers on a network. A point to point
connection does not need any other network devices other than connecting a cable to the
NIC cards of both computers.
- What is a subnet mask?
A subnet mask is combined with an IP address to identify two parts: the network address
and the host address. Like an IP address, a subnet mask is made up of 32 bits.
- What is the maximum length allowed for a UTP cable?
A single segment of UTP cable has an allowable length of 90 to 100 meters. This limitation
can be overcome by using repeaters and switches.
- What is data encapsulation?
Data encapsulation is the process of breaking down information into smaller, manageable
chunks before it is transmitted across the network. In this process that the source and
destination addresses are attached to the headers, along with parity checks.
- What is a VPN?
VPN means Virtual Private Network, a technology that allows a secure tunnel to be created
across a network such as the Internet. For example, VPNs allow you to establish a secure
dial-up connection to a remote server.
- Briefly describe NAT
NAT – Network Address Translation. This is a process that provides a way for multiple
computers on a common network to share a single connection to the Internet.
- What is the job of the Network Layer under the OSI reference model?
The Network layer is responsible for data routing, packet switching, and control of network
congestion. Routers operate under this layer.
- How does a network topology affect your decision to set a network?
Network topology dictates what media you must use to interconnect devices. It also serves
as a basis on what materials, connectors, and terminations that is applicable for the setup.
- What are the different ways of securing a computer network?
There are several ways to do this:
- Install a reliable and updated anti-virus program on all computers.
- Make sure firewalls are setup and configured correctly.
- User authentication will also help a lot.
All these combined would make a highly secured network
- What is the importance of the OSI Physical Layer?
The physical layer does the conversion from data bits to the electrical signal, and vice versa.
This is where network devices and cable types are considered and setup.
- What are proxy servers, and how do they protect computer networks?
Proxy servers primarily prevent external users who are identifying the IP addresses of an
internal network. Without knowledge of the correct IP address, even the physical location of
the network cannot be identified. Proxy servers can make a network virtually invisible to
external users.
- What is the importance of implementing a Fault Tolerance System?
A fault tolerance system ensures continuous data availability. This is done by eliminating a
single point of failure.
- What does 10Base-T mean?
The 10 refers to the data transfer rate. In this case, it is 10Mbps. The word Base refers to
baseband, as opposed to broadband.
- What is a private IP address?
Private IP addresses are assigned for use on intranets. These addresses are used for internal
networks and are not routable on external public networks. These ensure that no conflicts
are present among internal networks. At the same time, the same range of private IP
addresses is reusable for multiple intranets since they do not “see” each other.
- What is NOS?
NOS – Network Operating System - Is specialized software. The main task of this software is
to provide network connectivity to a computer in order to communicate with other
computers and connected devices
- What is DOS (Denial of Service) attack?
DOS – Denial-of-Service attack – Is an attempt to prevent users from being able to access
the Internet or any other network services. Such attacks may come in different forms and
are done by a group of perpetrators. One common method of doing this is to overload the
system server so it cannot anymore process legitimate traffic and will be forced to reset.