SUMMER TRAINING Free Tutorials  Go To Your University  Placement Preparation 
Project Based Best Summer Training Courses in Jaipur
Investing in yourself is easy. Udemy online courses now from INR 455
0 like 0 dislike
in Technical Questions by Goeduhub's Expert (5.8k points)
Interview Questions on computer networking with answers

1 Answer

0 like 0 dislike
by Goeduhub's Expert (5.8k points)
selected by
Best answer

Computer Networks Interview Questions Set 2

Q.1. What do you mean by anonymous FTP?

Answer:- An anonymous FTP is a way of allowing a user to access data that is public. The user does not need to identify himself to the server and has to log in as anonymous.

So in case you are asked to use anonymous ftp, make sure you add “anonymous” in place of your user id. Anonymous FTPs are very effective while distributing large files to a lot of people, without having to give huge numbers of usernames and password combinations.

Q.2. Define Brouter?

Answer:- Brouter or Bridge Router is a device that acts as both a bridge and a router. As a bridge, it forwards data between the networks. And as a router, it routes the data to specified systems within a network.

Q.3. Define Static IP and Dynamic IP?

Answer:- When a device or computer is assigned a specified IP address then it is named as Static IP. It is assigned by the Internet Service Provider as a permanent address.

Dynamic IP is the temporary IP address assigned by the network to a computing device. Dynamic IP is automatically assigned by the server to the network device.

Q.4. What is DHCP?

Answer:- DHCP is short for Dynamic Host Configuration Protocol. Its main task is to automatically assign an IP address to devices across the network. It first checks for the next available address not yet taken by any device, then assigns this to a network device.

Q.5. Define Pipelining?

Answer:- In Networking when a task is in progress another task gets started before the previous task is finished. This is termed as Pipelining.

Q.6. Explain the difference between baseband and broadband transmission?

Answer:- Baseband Transmission: A single signal consumes the whole bandwidth of the cable

Broadband Transmission: Multiple signals of multiple frequencies are sent simultaneously.

Q.7. Define IEEE in the networking world?

Answer:- IEEE stands for the Institute of Electrical and Electronic Engineer. This is used to design or develop standards that are used for networking.

Q.8. What is the difference between Firewall and Antivirus?

Answer:- Firewall and Antivirus are two different security applications used in networking. A firewall acts as a gatekeeper which prevents unauthorized users to access the private networks as intranets. A firewall examines each message and blocks the same which are unsecured.

Antivirus is a software program that protects a computer from any malicious software, any virus, spyware, adware, etc.

Note: A Firewall cannot protect the system from viruses, spyware, adware, etc.

Q.9. What do you mean by a Subnet Mask?

Answer:- A Subnet Mask is the number describing the range of IP addresses that can be used within a network. They are used to assign subnetworks or subnets. These subnetworks are various LAN’s connected to the internet.

This Subnet mask is basically a 32-bit number and it masks the IP address and then divides the IP address into two parts i.e the network address and the host address.

Q.10. What is RIP?

Answer:- RIP (Routing Information Protocol) is a dynamic routing protocol. It makes use of hop count as its primary metric to find the best path between the source and the destination. It works in the application layer and has an AD (Administrative Distance) value of 120.

Q.11. Explain what is DNS?

Answer:- DNS or Domain Name System is a naming system for devices connected over the internet. It is a hierarchical and decentralized system that translates domain names to the numerical IP Addresses which is required to identify and locate devices based on the underlying protocols.

All devices connected to the internet have unique IP addresses which are used to locate them on the network. The process involves conversion on hostnames into IP addresses.

Q.12.  What is a Ping?

Answer:- A ping is a computer program that is used to test the reachability of a host and check if can accept requests on an IP network. It works by sending an ICMP (Internet Control Message Protocol) Echo to some computer on the network and waits for a reply from it. It can also be used for troubleshooting.

Q.13. Explain clustering support

Answer:- Clustering support refers to the ability of a network operating system to connect multiple servers in a fault-tolerant group. The main purpose of this is the in the event that one server fails, all processing will continue on with the next server in the cluster.

Q.14. What is an Encoder and decoder?

Answer:- Encoder is a circuit that uses an algorithm to convert any data or compress audio data or video data for transmission purposes. An encoder converts the analog signal into the digital signal.

Decoder is a circuit that converts the encoded data to its actual format. It converts the digital signal into an analog signal.

Q.15. Explain Data Encapsulation?

Answer:- Encapsulation means adding one thing on top of the other thing. When a message or a packet is passed through the communication network (OSI layers), every layer adds its header information to the actual packet. This process is termed as Data Encapsulation.

Note: Decapsulation is exactly the opposite of encapsulation. The process of removing the headers added by the OSI layers from the actual packet is termed as Decapsulation.

Q.16. Explain Beaconing?

Answer:- If a network self-repair its problem then it is termed as Beaconing. Mainly it is used in the token ring and FDDI (Fiber Distributed Data Interface) networks. If a device in the network is facing any problem, then it notifies the other devices that they are not receiving any signal. Likewise, the problem gets repaired within the network.

Q.17. Define Piggybacking?

Answer:- In data transmission if the sender sends any data frame to the receiver then the receiver should send the acknowledgment to the sender. The receiver will temporarily delay (waits for the network layer to send the next data packet) the acknowledgment and hooks it to the next outgoing data frame, this process is called as Piggybacking.

Q.18. Explain various types of networks based on their sizes?


  • Local Area Network (LAN): A network with a minimum of two computers to a maximum of thousands of computers within an office or a building is termed as LAN. Generally, it works for a single site where people can share resources like printers, data storage, etc.
  • Metropolitan Area Network (MAN): It is larger than LAN and used to connect various LANs across small regions, a city, campus of colleges or universities etc which in turn forms a bigger network.
  • Wide Area Network (WAN): Multiple LANs and MAN’s connected together form a WAN. It covers a wider area like a whole country or world.

Q.19. What is SNMP?

Answer:- SNMP stands for Simple Network Management Protocol. It is a network protocol used for collecting organizing and exchanging information between network devices. SNMP is widely used in network management for configuring network devices like switches, hubs, routers, printers, servers.

Q.20. What are gateways?

Answer:- Gateways provide connectivity between two or more network segments. It is usually a computer that runs the gateway software and provides translation services. This translation is a key in allowing different systems to communicate on the network.

For any queries or doubts refer to comment section mentioning question number  with doubt

For more Technical MCQ's and Interview Questions Click here

Our Mentors(For AI-ML)

Sharda Godara Chaudhary

Mrs. Sharda Godara Chaudhary

An alumna of MNIT-Jaipur and ACCENTURE, Pune


Ms. Nisha

An alumna of IIT-BHU

Related questions


About Us | Contact Us || Terms & Conditions | Privacy Policy || Youtube Channel || Telegram Channel © Social::   |  |