Interview Questions - Part 1st

Q-1) What is safe mode ? How do you get to it and what is it used for ?
Ans:-In order to reach safe mode, Computer must be restarted and by pressing F8 key before the OS loads you will arrive at the selection screen at which you will scroll up to select "Safe Mode". Safe mode is used to troubleshoot driver issues, hardware issues and remove viruses or unwanted software. In windows 10 the combination key is "Shift + Restart".

Q-2) Why do you want to work as desktop support specialist ?
Ans:- I've loved solving computer problems since I was a child. I remember opening my childhood computer and toys to look at what's going on inside them and I tried to understand how they worked. I think desktop support provides me an opportunity to refine my problem-solving skills in the area of IT.

Q-3) What is Networking ?
Ans:- – A computer networking is a set of computers. Computers on a network are called as nodes. The connection between computers can be done via cabling, most commonly the Ethernet cables or wirelessly through radio waves. Connected computers can share resources, like access to internet, printers, file servers and others. A network is a multipurpose connection, which allows a single computer to do more.

Q-4) What is the difference between Router and Switch ?
Ans:-  
RouterSwitch
Router works on Network Layer (layer 3 of OSI model)Switch works on Data Link Layer (layer 2 of OSI model)
Router is used to connect different networksSwitch is used to connect computers or networking devices in a LAN
Router uses Packets.Switch uses Frames.
Numbers of ports are less (i.e. port density is low) e.g. 2,4,5,8.Numbers of ports are more (i.e. port density is high) e.g. 24, 48.
It is used in LAN, MAN and WAN.It is used in LAN
In router, every port has its own broadcast domain.Switch has one broadcast domain.
It uses IP address.It uses MAC address.
Its manufacturers are Cisco, Netgear, Linksys, Asus, TP-Link, D-Link.Its manufacturers are Cisco, D-Link and Juniper.

Q-5) How many collision domains are there in switch?
Ans:-  As many ports are there in a switch that many collision domains are there. For example switch with 24 ports has 24 collision domains.  

Q-6) How many broadcast domains are there in a switch? 
Ans:- Only one broadcast domain is there in any switch. 

Q-7) What is collision domain? 
Ans:- A collision domain is, as name implies, a part of a network where packet collisions can occur. A collision occurs when two devices send a packet at the same time on the shared network segment. 

Q-8) What is broadcast domain? 
Ans:- A broadcast domain is a domain in which a broadcast is forwarded. A broadcast domain contains all devices that can reach each other at the data link layer (OSI layer 2) by using broadcast. 

Q-9) What is Topology? What are the different types of topologies? 
Ans:- A topology determines the physical arrangement of the devices in a network. Different types of topologies are bus, star, ring, partial mesh, full mesh, tree and hybrid topologies. 

Q-10) What is a star topology? 
Ans:- A star topology is a topology for a LAN in which all nodes (computers) are individually connected to a central point, like a hub or a switch. A star takes more cable than e.g. a bus, but the benefit is that a cable fails; only one node will be brought down.
 
Q-11) What is a bus topology? 
Ans:- A bus topology is a topology for a LAN in which all nodes (computers) are connected to a coaxial cable in a liner method, the coaxial cable is also known as backbone or trunk which needs to be terminated at the both ends. If a backbone is broken, the entire segment fails. 

Q-12) What is cloud computing?
Ans:- Cloud computing is a type of computing that relies on shared computing resources rather than having local servers or personal devices to handle applications. In its most simple description, cloud computing is taking services and moving them outside an organization’s firewall. Applications, storage and other services are accessed via the Web.

Q-13) What is E-mail Client? Name of any 5?
Ans:- E-mail client is an application which allows you to store mails locally on your computer so that you can access previously stored mail even you are not connected to internet. MS-Outlook, Windows-Mail, Mozilla Thunderbird, Lotus notes, Postbox and Apple mail are some famous email clients.

Q-14) What is Office 365? 
Ans:- Microsoft Office 365 is Software as a Service (SaaS) solution that includes Microsoft Office and other services, such as email and collaboration, from Microsoft's cloud server. Microsoft Office 365 provides desktop functionalities and is available by subscription. 

Q-15) What are the different ways to share the internet? 
Ans:- Followings are the ways to share the internet 
A) Internet Connection Sharing (ICS) 
B) Network Address Translation 
C) Proxy 

Q-16) What is the MAC filtering? 
Ans:- MAC Filtering refers to a security access control method whereby the 48-bit address assigned to each network card is used to determine access to the network. 

Q-17) What is SSID in wireless network? 
Ans:- SSID is the name assigned to a Wi-Fi (wireless) network. All devices in the network must use this case-sensitive name to communicate over Wi- Fi. Wireless routers and access points have a default SSID, which may be the manufacturer’s name, such as “Linksys” or “netgear” or simply “default”. Some devices use their model number as the SSID. Using browser, the SSID (and password) can be manually changed in the device’s configuration settings. 

Q-18) What is the deference between Ad-Hoc and Infrastructure wireless Network? 
Ans:- In Ad-hoc network devices are connected in wireless network using their LAN cards and Access Point or Wireless Router is not required in Ad-Hoc. In Infrastructure network devices are connected in network through Wireless Access Point of Wireless Route.  

Q-19) What are the ways to secure wireless network? 
Ans:- Following are the way to secure wireless Network 
  1. Change the default setting of wireless router (IP Address, SSID, Admin Password etc) 
  2. Configure Network Password 
  3. Enable encryption 
  4. Configure MAC filtering 
  5. Disable SSID broadcast 
  6. Configure 802.1x 
  7. Physical security of Wireless Router/Access Point 
Define the following… 
A. SSID- SSID is technical term for a wireless network name. When you set up a wireless network, you give it a name that is called SSID. SSID is a case sensitive, 32 alphanumeric. 
B. Mac Filtering refers to a security access control method whereby the 48-bit address assigned to each network card is used to determine access to the network.   
C. WEP and WPA are the encryption method used in wireless network. WEP provides 56 or 128-bit encryption whereas WPA provides 256- bit encryption.

Q-20) What is the difference between wired and wireless LAN? 

Wired_LANWireless_LAN
A wired network uses wires to communicateA wireless network uses radio wave for communication
IEEE standard 802.3IEEE standard 802.11
Device are physically connectedDevice are logically connected
More secureLess secure
Faster data transfer rateSlower data transfer rate
Covers large distanceCovers short distance

Q-21) What is a Telnet? 
Ans:- Telnet is an application protocol for accessing remote computers. Through Telnet, an administrator or another user can access other computers remotely. 

Q-22) What is ping command? 
Ans:- The Packet Internet Gopher (Ping) command helps to verify IP-level connectivity. When troubleshooting, you can use ping to send an ICMP echo request to a target host name or IP address. 

Q-23) What is use of tracert command? 
Ans:- Tracert command can show you the path of packet from your computer to the Destination. It will list all the routers it passes through until it reaches its destination. 

Q-24) What is the use of pathping command? 
Ans:- The pathping command is a route tracing tool that combines features of the ping and tracert commands. The pathping command sends packets to each router on the way to a final destination over a period of time .

Q-25) What is a switch? 
Ans:- A Switch operates of the Data link layer of OSI model. It connects multiple devices together in a single network segment. It is called an intelligent network device because it creates own MAC address table to forward the frame to the appropriate destination. It operates in full duplex mode and provides guaranteed bandwidth to the connected device.

Q-26) What is a router? 
Ans:- Router is a network layer device which communicates deferent networks which may be near or very far. A router sends or forwards the packets to the destination network using the best route. 

Q-27) What is FTP? 
Ans:- The File Transfer Protocol (FTP) is a standard network protocol used to transfer computer files from one host to another host over a TCP-based network.

Q-28) What is difference between HTTP and HTTPS?


HTTPHTTPS
HTTP (Hyper Text Transfer Protocol) is used in networking. It uses port no 80 for communication.HTTPS (Hyper Text Transfer Protocol) is used in networking. It uses port no. 443.
Its UnsecuredIts Secured
No EncryptionIts encrypted
No Certificate requiredSSL certificate
Work on Application LayerWork on Transport Layer

Q-29) What are differences between TCP and UDP?

TCPUDP
TCP is the connection orianted protocol.UDP is the connectionless protocol.
TCP is reliableUDP is unreliable
TCP is SlowTCP is Fast
TCP does error checking.UDP does error checking but no recovery.
Acknoledgment is thereNo Acknowledgement
TCP does flow controlUDP does not do flow control.


No comments:

Post a Comment

Computer Hardware_(A+) & Operating System with Networking

Microprocessor Motherboard About Operating System Create Bootable Pen Drive via Command Map Network Drive File Transfer Protocol in Windows ...