Blog

Windows Networking Interview Questions

  • (4.0)
  • | 541 Ratings |
  • Last Updated May 15, 2018

If you're looking for Windows Networking Interview Questions for Experienced or Freshers, you are at right place. There are lot of opportunities from many reputed companies in the world. According to research Windows Networking has a market share of about 89.7% according to net applications. So, You still have opportunity to move ahead in your career in Windows Specialist. Mindmajix offers Advanced Windows Networking Interview Questions 2018 that helps you in cracking your interview & acquire dream career as Windows System Admin Specialist.

Enroll in Learning Windows networking Training Course to gain hands-on experience on networking with Windows Server. Enroll Now For Free Demo..!

Q1) Define Computer Network.
Computer Network can be defined as a set of computers connected with each other to communicate and  share resources such as software, hardware and data.

Q2) What is the use of NIC? Can a computer work without NIC in network?
NIC stands for Network Interface Card. NIC is the bridge between computer and network.
Without NIC Card, computer cannot connect in any network. It can also be called Ethernet card or Network Adaptor.

Q3) Explain Network topology
Network topology is physical structure of computers. It states the way computers, cables, devices etc. are connected with each other.

Q4) Define Node and Routers.
Node:
Node can be described as a point or joint where connection is built. Any device connected in network is considered a node. To establish a network, two or more nodes are required.

Node and Routers

Router: Routers can be termed as a device through which network segments are connected. These network devices saves information like routing tables, hops etc. By using this information, routers can determine best path available to transfer the data from source to destination.

Q5) Tell me different types of network along with its area of usage.

  1. PAN: Personal Area Network - mostly used in home
  2. LAN: Local Area Network - used in small cafes or offices
  3. MAN: Metropolitan Area Network - used in city or town
  4. WAN: Wide Area Network - spread across the world

Q6) Can you tell me the most basic use of switch in networking
Switch can connect various computers together. For instance, 7 port switch can join 7 computers in a single network

Q7) In which topology centralized device is used for connectivity?
Star topology utilizes hub or switch as a centralized device for connectivity.

Q8). Name a topology which uses coaxial Cable and terminators
Bus Topology

Q9) Explain the mechanism in ring topology
In ring topology, every computer is connected with two more computers and this is how the loop will be formed. Here the data will be flown only in single direction.

Mechanism in Ring Topology

Source computer transmits the data in circle. Each computer will checks whether data has been intended for them and if yes, they will pick up the data packet from ring. If it is not then they will pass data packet  to the next computer. This is how data packet will reach to destination computer.

Q10) Explain the mechanism used in mesh topology
In Mesh topology, each device is connected with all the rest of the devices residing in network,
To connect n nodes, n(n-1)/2 connections are required in mesh topology. So to connect 4 devices, 6 connections will be required in mesh network.

Mechanism in Mesh Topology

Q11) Describe the pros and cons of Bus topology.
Pros:
Bus topology incurs lowest cost amongst all the topologies available. 
Cons: In Bus topology, all the devices are connected with  a single cable. So if the main cable breaks then the whole network will be affected.

Q12) Explain Hybrid topology.
Hybrid topology consists of more than one topology in the same network. For example, hybrid star-bus topology, here multiple star topologies are joined with single bus topology.

Q13) Please explain potential difference between Internet, Intranet and Extranet.
These terms can described as a way network applications are being accessed.

Internet - Everyone and anyone around the world can access the applications
Intranet - Only authorized users from organization can access the application for which it has been built. 
Extranet - Selected external users are allowed to use the application which was built for Internet 

Q14) Explain OSI Reference Model.
OSI -
Open System Interconnection. OSI Model describes the way application interacts with each other over a network. 

Q15) What is TCP/IP model.
TCP/IP -
Transmission Control Protocol / Internet Protocol - It is most widely used  protocol.
It describes how data should be packaged, transferred and routed in network.

Check Out IT Networking Security Tutorials

Q16) Explain HTTP and HTTPs.
HTTP:
Hyper Text Transfer Protocol is used to transmit web content. It uses TCP port 80
HTTPS: It is secure HTTP. To avoid any tampering with data, HTTPS encrypts data packets transmitted in network. It uses TCP port 443.

Q17) Explain the difference between transmission and communication.
Transmission:
Data is transferred from source to destination. This involves physical movement of data
Communication: Data is transmitted between source and destination. This involves sending and receiving of data packets between source and destination.

Q18) What are the data transmission modes available to transfer data over a network? 
There are 3 data transmission modes available to transmit the data

1. Simplex: Data transfer can be established only in one direction. For example radio signal
2. Half Duplex: Data transfer can be established in both the directions but not at same time. For example internet browsing, once we send request to server then server will process it and show us the results
3. Full Duplex: Data transfer can be established in both directions simultaneously. For example phone communication.

Q19) Full form of IDEA and ASCII

IDEA: International Data Encryption Algorithm
ASCII: American Standard Code for Information Interchange

Q20) What is DNS?
DNS is Domain Naming Server. It is bridge between domain names and IP addresses. Computer only gets numbers whereas humans only remembers names. For example, gmail.com is the name given by human but when we hit gmail.com, DNS translated it to numbers and process our requests. 

Q21) What is Piggybacking?
For any sent data frame, receiver must acknowledge to sender. Instead of sending acknowledgement stand alone, receiver will wait and send acknowledgement along with next data frame. This process is termed as piggybacking.

Q22) Explain ipconfig and ifconfig
Ipconfig:
Internet Protocol Configuration. This command is used for viewing and configuring network interface on Microsoft Windows. It is also used to identify DHCP protocol and DNS settings. 

Ifconfig: Interface Configuration. This command is for Linux, Mac and Unix OS. Through this command, we can configure and control the TCP/IP network interface from command line. We can see the IPs of these networks using this command.

Q23) What is Round Trip Time?
Round Trip Time can also be known as Round Trip Delay. It is total time taken by a signal to reach the destination node and come back to sender node with acknowledgement.

Q24) Define Beaconing
If any problem in network is identified and repaired by network itself then it is known as beaconing. FDDI and token ring uses this mainly.

Q25) Is there any way to recover data of a system which is infected by virus?
Yes. 

  • Prepare a new system with OS and antivirus.
  • Connect the HDD of infected system with new system as secondary drive
  • Scan it and clean it
  • Once cleaned, transfer the data from secondary drive to new system

Q26) Differentiate between baseband and broadband transmission
In baseband transmission, full bandwidth of the cable will be taken by a single signal. Whereas in broadband transmission, multiple signals with multiple frequencies can be sent simultaneously.

Q27) Define Crosstalk
Crosstalk is the disturbance generated by adjacent wires.

Q28) Explain the use of tracert
Tracert is a tools used to list the path taken by data packet from router to destination node. It also mentions count of total hops taken in entire route.

Q29) What is the use of netstat ?
Netstat is a command line tool. It is used to list out all important TCP/IP settings of a connection.

Q30) If you use longer cables then the preferred ones, will it make any difference?
If we use longer cables then the preferred ones, it will cause signal loss in transmission.

Explore Windows Networking Sample Resumes! Download & Edit, Get Noticed by Top Employers!Download Now!

 

 

Subscribe For Free Demo

Free Demo for Corporate & Online Trainings.


DMCA.com Protection Status