Category Archives: Network and Security Interview Questions

What is the difference between TFTP and FTP application layer protocols. | Network and Security Questions

The Trivial File Transfer Protocol (TFTP) allows a local host to obtain files from a remote host but does not provide reliability or security. It uses the fundamental packet delivery services offered by UDP. The File Transfer Protocol (FTP) is … Continue reading

Posted in Network and Security Interview Questions | Leave a comment

What protocol is used by DNS name servers. | Network and Security Questions

DNS uses UDP for communication between servers. It is a better choice than TCP because of the improved speed a connection less protocol offers. Of course, transmission reliability suffers with UDP.

Posted in Network and Security Interview Questions | Leave a comment

What is a DNS resource record. | Network and Security Questions

A resource record is an entry in a name server’s database. There are several types of resource records used, including name-to-address resolution information. Resource records are maintained as ASCII files.

Posted in Network and Security Interview Questions | Leave a comment

What are manageable and non manageable switches? | Network and Security Questions

Switches which can be administered are called manageable switches. For example we can create VLAN for on such switch. On no manageable swiches we can’t do so.

Posted in Network and Security Interview Questions | Leave a comment

What is the difference between a switch and a hub? | Network and Security Questions

Switch sends the traffic to the port to which its meant for. Hub sends the traffic to all the ports.

Posted in Network and Security Interview Questions | Leave a comment

What is RIS? What is Imaging/ghosting? | Network and Security Questions

RIS stands for remote installation services. You save the installed image on a windows server and then we use RIS to install the configured on in the new hardware. We can use it to deploy both server and client OS. … Continue reading

Posted in Network and Security Interview Questions | Leave a comment

What is BSOD? What do you do when you get blue screen in a computer? How do you troubleshoot it? | Network and Security Questions

BSOD stands for blue screen of Death. when there is a hardware or OS fault due to which the windows OS can run it give a blue screen with a code. Best way to resolve it is to boot the … Continue reading

Posted in Network and Security Interview Questions | Leave a comment

What is IPCONFIG command? Why it is used? | Network and Security Questions

IPCONFIG command is used to display the IP information assigned to a computer. From the output we can find out the IP address, DNS IP address, gateway IP address assigned to that computer.

Posted in Network and Security Interview Questions | Leave a comment

What are the types of LAN cables used? What is a cross cable? | Network and Security Questions

Types of LAN cables that are in use are “Cat 5” and “Cat 6”. “Cat 5” can support 100 Mbps of speed and “CAT 6” can support 1Gbps of speed. Cross cable: Its used to connect same type of devices … Continue reading

Posted in Network and Security Interview Questions | Leave a comment

Finally, who is a hacker? | Network and Security Questions

A hacker is a person who breaks into computers usually by gaining access to administrative controls. He uses to access the user id and password without taking the permission. As a result of this article, you will definitely going to … Continue reading

Posted in Network and Security Interview Questions | Leave a comment