NETWORKING_2

THIS IS NOTES FOR NETWORKING_2

























1. What is computer networking?


Computer networking is the practice of connecting devices to share resources and communicate, using protocols like TCP/IP. It enables data exchange in LANs, WANs, or the internet, supporting applications like email and web browsing.



2. What is the OSI model?


The OSI (Open Systems Interconnection) model is a 7-layer framework for network communication, from Physical (Layer 1) to Application (Layer 7). Each layer handles specific tasks, like data transmission or formatting, aiding protocol design and troubleshooting.



3. What are the seven layers of the OSI model?


The OSI model layers are Physical, Data Link, Network, Transport, Session, Presentation, and Application. They handle tasks from signal transmission (Physical) to user interfaces (Application), standardizing network functions.



4. What is the TCP/IP model?


The TCP/IP model is a 4-layer framework (Link, Internet, Transport, Application) used in the internet. It maps to the OSI model but is more practical, guiding protocols like IP and TCP.



5. How does the TCP/IP model differ from the OSI model?


The TCP/IP model has 4 layers (Link, Internet, Transport, Application) compared to OSI’s 7, combining OSI’s Session, Presentation, and Application into one. TCP/IP is practical and internet-focused, while OSI is theoretical and broader.



6. What is the Physical layer in the OSI model?


The Physical layer (Layer 1) handles the transmission of raw bits over physical media, like cables or wireless signals. It defines hardware specifications, such as voltages, connectors, and signal encoding.



7. What is the Data Link layer in the OSI model?


The Data Link layer (Layer 2) ensures reliable data transfer between adjacent nodes, handling framing, error detection, and MAC addressing. Protocols like Ethernet and switches operate at this layer.



8. What is the Network layer in the OSI model?


The Network layer (Layer 3) manages logical addressing and routing, determining data paths across networks. Protocols like IP and devices like routers function at this layer.



9. What is the Transport layer in the OSI model?


The Transport layer (Layer 4) provides reliable data transfer, handling segmentation, flow control, and error correction. Protocols like TCP and UDP operate here, ensuring end-to-end communication.



10. What is the Session layer in the OSI model?


The Session layer (Layer 5) manages sessions between applications, establishing, maintaining, and terminating connections. It ensures data exchange is synchronized, like in video streaming or remote logins.



11. What is the Presentation layer in the OSI model?


The Presentation layer (Layer 6) translates data formats, handling encryption, compression, and character encoding. It ensures data is readable by the receiving application, e.g., converting JPEG to displayable images.



12. What is the Application layer in the OSI model?


The Application layer (Layer 7) provides network services to user applications, like browsers or email clients. Protocols like HTTP, FTP, and SMTP operate here, enabling user interactions.



13. What is a protocol in networking?


A protocol is a set of rules governing data communication, defining formats, timing, and error handling. Examples include TCP for reliable delivery and HTTP for web browsing.



14. What is an IP address?


An IP address is a unique numerical identifier for devices on a network, enabling routing and communication. IPv4 uses 32 bits (e.g., 192.168.1.1), while IPv6 uses 128 bits for larger address space.



15. What is the difference between IPv4 and IPv6?


IPv4 uses 32-bit addresses (e.g., 192.168.1.1), supporting ~4.3 billion addresses, while IPv6 uses 128-bit addresses (e.g., 2001:0db8::1), offering vast scalability. IPv6 also improves routing and auto-configuration.



16. What is a MAC address?


A MAC (Media Access Control) address is a unique 48-bit identifier for network interfaces, used at the Data Link layer. It’s hardware-based (e.g., 00:1A:2B:3C:4D:5E) and facilitates local network communication.



17. What is the difference between an IP address and a MAC address?


An IP address is a logical, network-layer identifier for routing across networks, while a MAC address is a physical, data-link-layer identifier for local communication. IP addresses can change; MAC addresses are fixed to hardware.



18. What is ARP in networking?


ARP (Address Resolution Protocol) maps IP addresses to MAC addresses in a local network. For example, a device uses ARP to find the MAC address of 192.168.1.2 before sending data.



19. What is a subnet?


A subnet is a logical division of an IP network, grouping devices to improve efficiency and security. It’s defined by a subnet mask (e.g., 255.255.255.0), isolating traffic within the subnet.



20. What is a subnet mask?


A subnet mask separates an IP address into network and host portions, e.g., 255.255.255.0 for a /24 subnet. It determines which part of the IP identifies the network versus the device.



21. What is CIDR in networking?


CIDR (Classless Inter-Domain Routing) is a method for allocating IP addresses using a prefix length, e.g., 192.168.1.0/24. It replaces classful addressing, optimizing address space and routing efficiency.



22. What is a gateway in networking?


A gateway is a device (often a router) that connects different networks, forwarding packets between them. It translates protocols or address schemes, e.g., linking a LAN to the internet.



23. What is a router in networking?


A router is a Layer 3 device that forwards packets between networks using IP addresses and routing tables. It connects LANs to WANs, enabling internet access and inter-network communication.



24. What is a switch in networking?


A switch is a Layer 2 device that forwards frames within a LAN using MAC addresses. It creates efficient network segments, reducing collisions compared to hubs, e.g., connecting devices in an office.



25. What is a hub in networking?


A hub is a basic Layer 1 device that broadcasts data to all connected devices, causing collisions and inefficiency. It’s largely obsolete, replaced by switches for better performance in LANs.







26. What is the difference between a router and a switch?


A router operates at Layer 3, forwarding packets between networks using IP addresses, while a switch operates at Layer 2, forwarding frames within a LAN using MAC addresses. Routers connect networks; switches connect devices.



27. What is a bridge in networking?


A bridge is a Layer 2 device that connects network segments, filtering traffic based on MAC addresses. It reduces collisions by segmenting LANs, less common today due to switches.



28. What is a firewall in networking?


A firewall is a security device or software that monitors and controls network traffic based on rules. It blocks unauthorized access, e.g., allowing only HTTP traffic on port 80.



29. What is NAT in networking?


NAT (Network Address Translation) maps private IP addresses to a public IP, enabling multiple devices to share one public address. It conserves IPv4 addresses and adds security by hiding internal IPs.



30. What is PAT in networking?


PAT (Port Address Translation), a type of NAT, maps multiple private IPs to one public IP using unique ports. It allows many devices to share a single public IP, common in home routers.



31. What is a VPN in networking?


A VPN (Virtual Private Network) creates a secure, encrypted tunnel over a public network, like the internet. It protects data privacy and enables remote access, e.g., connecting to a company network.



32. What is DNS in networking?


DNS (Domain Name System) translates domain names (e.g., google.com) to IP addresses (e.g., 172.217.0.1). It acts like a phonebook, enabling user-friendly internet navigation.



33. What is DHCP in networking?


DHCP (Dynamic Host Configuration Protocol) automatically assigns IP addresses and network settings to devices. It simplifies network management, e.g., leasing 192.168.1.100 to a laptop.



34. What is a LAN in networking?


A LAN (Local Area Network) is a network connecting devices in a small area, like an office or home, typically using Ethernet or Wi-Fi. It enables local resource sharing, like printers or files.



35. What is a WAN in networking?


A WAN (Wide Area Network) connects multiple LANs over large distances, often via the internet or leased lines. The internet is the largest WAN, linking global networks.



36. What is a MAN in networking?


A MAN (Metropolitan Area Network) spans a city or campus, connecting multiple LANs using high-speed links like fiber. It’s larger than a LAN but smaller than a WAN, e.g., a university network.



37. What is the difference between a LAN and a WAN?


A LAN connects devices in a small area (e.g., office) with high speed and low latency, while a WAN spans large distances (e.g., cities) with slower speeds and higher latency. LANs use switches; WANs use routers.



38. What is a VLAN in networking?


A VLAN (Virtual Local Area Network) logically segments a physical LAN into isolated networks without additional hardware. It improves security and efficiency, e.g., separating guest and employee traffic.



39. What is trunking in networking?


Trunking allows multiple VLANs to share a single physical link between switches, using tagging (e.g., 802.1Q). It enables VLAN traffic to cross network segments while maintaining isolation.



40. What is the 802.1Q standard in networking?


The 802.1Q standard defines VLAN tagging, adding a 4-byte tag to Ethernet frames to identify VLAN membership. It enables trunking, allowing switches to handle multiple VLANs on one link.



41. What is a frame in networking?


A frame is a Data Link layer (Layer 2) data unit, containing a header (e.g., MAC addresses), payload, and trailer (e.g., CRC). Ethernet frames are used for local network communication.



42. What is a packet in networking?


A packet is a Network layer (Layer 3) data unit, including a header (e.g., IP addresses) and payload. It’s encapsulated in frames for transmission and routed across networks.



43. What is a segment in networking?


A segment is a Transport layer (Layer 4) data unit, used by protocols like TCP, containing a header (e.g., port numbers) and data. It’s encapsulated in packets for delivery.



44. What is the difference between a frame, packet, and segment?


A frame (Layer 2) carries data locally with MAC addresses, a packet (Layer 3) routes data with IP addresses, and a segment (Layer 4) manages data delivery with ports. Each is encapsulated in the layer below.



45. What is TCP in networking?


TCP (Transmission Control Protocol) is a reliable, connection-oriented Transport layer protocol ensuring data delivery. It uses handshakes, sequencing, and retransmissions, ideal for applications like HTTP and email.



46. What is UDP in networking?


UDP (User Datagram Protocol) is a connectionless, lightweight Transport layer protocol for fast data transmission. It lacks reliability features, making it suitable for streaming or DNS queries.



47. What is the difference between TCP and UDP?


TCP is reliable, connection-oriented, with error checking and retransmissions, suited for HTTP, while UDP is connectionless, faster, but less reliable, ideal for video streaming or gaming. TCP ensures delivery; UDP prioritizes speed.



48. What is a TCP three-way handshake?


The TCP three-way handshake establishes a connection using SYN, SYN-ACK, and ACK packets. The client sends SYN, the server responds with SYN-ACK, and the client sends ACK, ensuring reliable communication.



49. What is a port in networking?


A port is a 16-bit number identifying a specific process or service on a device, e.g., 80 for HTTP. It works with IP addresses to direct traffic, like 192.168.1.1:80.



50. What is a well-known port?


A well-known port is a port number (0-1023) reserved for standard services, e.g., 80 for HTTP, 443 for HTTPS. They’re defined by IANA, ensuring consistent protocol usage.







51. What is an ephemeral port?


An ephemeral port is a temporary, high-numbered port (e.g., 49152-65535) assigned to client-side connections. It’s used during communication, like a browser connecting to a web server, then released.



52. What is HTTP in networking?


HTTP (Hypertext Transfer Protocol) is an Application layer protocol for transmitting web content, using requests (e.g., GET) and responses. It operates over TCP, typically on port 80.



53. What is HTTPS in networking?


HTTPS (HTTP Secure) is HTTP with encryption via TLS/SSL, securing web communication. It uses port 443, protecting data like passwords or credit card details during transmission.



54. What is FTP in networking?


FTP (File Transfer Protocol) is an Application layer protocol for transferring files between systems, using ports 20 (data) and 21 (control). It’s less secure than SFTP, which uses SSH.



55. What is SFTP in networking?


SFTP (SSH File Transfer Protocol) is a secure file transfer protocol using SSH for encryption, typically on port 22. It’s more secure than FTP, protecting file transfers from interception.



56. What is SSH in networking?


SSH (Secure Shell) is a protocol for secure remote access and command execution, using encryption on port 22. It’s widely used for managing servers, e.g., via `ssh user@host`.



57. What is Telnet in networking?


Telnet is an Application layer protocol for remote command-line access, using port 23. It’s insecure, transmitting data in plaintext, and largely replaced by SSH for secure connections.



58. What is SMTP in networking?


SMTP (Simple Mail Transfer Protocol) is an Application layer protocol for sending emails, typically on port 25 or 587. It works with protocols like POP3 or IMAP for email retrieval.



59. What is POP3 in networking?


POP3 (Post Office Protocol version 3) is an Application layer protocol for retrieving emails from a server, typically on port 110 or 995 (secure). It downloads emails, often deleting them from the server.



60. What is IMAP in networking?


IMAP (Internet Message Access Protocol) is an Application layer protocol for accessing emails on a server, using port 143 or 993 (secure). It syncs emails, keeping copies on the server.



61. What is SNMP in networking?


SNMP (Simple Network Management Protocol) monitors and manages network devices, using ports 161 and 162. It collects data like bandwidth usage, aiding network administration and troubleshooting.



62. What is ICMP in networking?


ICMP (Internet Control Message Protocol) is a Network layer protocol for diagnostic and error messages, e.g., used by `ping` or `traceroute`. It supports network troubleshooting, like reporting unreachable hosts.



63. What is IGMP in networking?


IGMP (Internet Group Management Protocol) manages IP multicast group memberships, used in streaming or video conferencing. It operates at Layer 3, enabling devices to join or leave multicast groups.



64. What is BGP in networking?


BGP (Border Gateway Protocol) is a routing protocol for exchanging routing information between autonomous systems, like ISPs, on the internet. It uses TCP port 179, ensuring stable, scalable routing.



65. What is OSPF in networking?


OSPF (Open Shortest Path First) is a link-state routing protocol for internal networks, using Dijkstra’s algorithm. It’s fast-converging and scalable, ideal for enterprise LANs, operating at Layer 3.



66. What is RIP in networking?


RIP (Routing Information Protocol) is a distance-vector routing protocol for small networks, using hop count as a metric. It’s simple but limited, with a maximum of 15 hops, operating at Layer 3.



67. What is EIGRP in networking?


EIGRP (Enhanced Interior Gateway Routing Protocol) is a Cisco proprietary routing protocol combining distance-vector and link-state features. It’s fast and efficient, used in enterprise networks, supporting IPv4 and IPv6.



68. What is the difference between static and dynamic routing?


Static routing uses manually configured routes, suitable for small, stable networks, while dynamic routing uses protocols like OSPF or BGP to adapt to changes. Dynamic routing is scalable but more complex.



69. What is a routing table in networking?


A routing table is a database in a router listing paths to network destinations, including next-hop addresses. It’s used to forward packets, updated by static entries or dynamic protocols like OSPF.



70. What is a default gateway?


A default gateway is the IP address of a router used when a device sends packets to an unknown network, like the internet. It’s typically set via DHCP, e.g., 192.168.1.1.



71. What is a loopback address?


A loopback address (e.g., 127.0.0.1 for IPv4) is a virtual interface for testing network software on a device. It allows communication within the same host, used for diagnostics like `ping localhost`.



72. What is a private IP address?


A private IP address is reserved for internal networks, like 192.168.0.0/16, 10.0.0.0/8, or 172.16.0.0/12. It’s non-routable on the internet, requiring NAT for external communication.



73. What is a public IP address?


A public IP address is globally unique and routable on the internet, assigned by ISPs or registries. It’s used for direct communication, unlike private IPs, which rely on NAT.



74. What is APIPA in networking?


APIPA (Automatic Private IP Addressing) assigns IPs (169.254.0.0/16) when DHCP fails, enabling local communication. It’s used in Windows and other systems for temporary, non-routable addressing.



75. What is a broadcast address?


A broadcast address (e.g., 192.168.1.255 for a /24 subnet) sends packets to all devices in a network. It’s used for protocols like DHCP or ARP, operating at Layer 2 or 3.







76. What is a multicast address?


A multicast address sends packets to a group of devices, e.g., 224.0.0.0/4 for IPv4. It’s used for streaming or group communication, managed by IGMP, reducing network load.



77. What is an anycast address?


An anycast address routes data to the nearest device in a group sharing the same IP, common in IPv6. It’s used for load balancing, like DNS servers, improving efficiency and redundancy.



78. What is the difference between unicast, broadcast, and multicast?


Unicast sends data to one device (e.g., HTTP request), broadcast to all devices in a network (e.g., ARP), and multicast to a specific group (e.g., video streaming). Each optimizes traffic differently.



79. What is Ethernet in networking?


Ethernet is a Layer 2 technology for wired LANs, using frames and MAC addresses, defined by IEEE 802.3. It supports speeds like 1Gbps or 10Gbps, connecting devices via switches or cables.



80. What is Fast Ethernet?


Fast Ethernet is an Ethernet standard (IEEE 802.3u) supporting 100 Mbps, an upgrade from 10 Mbps Ethernet. It uses twisted-pair or fiber cabling, common in older LANs before Gigabit Ethernet.



81. What is Gigabit Ethernet?


Gigabit Ethernet (IEEE 802.3ab) supports 1 Gbps, using twisted-pair (Cat5e/Cat6) or fiber. It’s widely used in modern LANs, offering higher bandwidth for applications like video streaming.



82. What is a collision domain in networking?


A collision domain is a network segment where devices share the same medium, risking packet collisions. Switches reduce collision domains by creating separate domains per port, unlike hubs.



83. What is a broadcast domain in networking?


A broadcast domain is a network segment where broadcast packets reach all devices, like a VLAN. Routers separate broadcast domains, while switches propagate broadcasts within them.



84. What is CSMA/CD in networking?


CSMA/CD (Carrier Sense Multiple Access with Collision Detection) is an Ethernet protocol for managing shared media. Devices listen before transmitting, stopping and retrying if collisions occur, used in early Ethernet.



85. What is a network interface card (NIC)?


A NIC is hardware connecting a device to a network, providing a physical or wireless interface. It handles Layer 1 and 2 tasks, like encoding signals and MAC addressing.



86. What is a packet sniffer in networking?


A packet sniffer captures and analyzes network traffic, e.g., Wireshark inspecting packets on port 80. It’s used for debugging, monitoring, or security analysis, but can be misused for eavesdropping.



87. What is Wireshark in networking?


Wireshark is a packet analyzer for capturing and inspecting network traffic, displaying protocols like TCP or HTTP. It’s used for troubleshooting, security audits, and protocol analysis.



88. What is tcpdump in networking?


tcpdump is a command-line packet analyzer for capturing network traffic, e.g., `tcpdump -i eth0 port 80`. It’s lightweight, used for diagnostics and monitoring, common on Linux systems.



89. What is the ping command in networking?


The ping command tests connectivity using ICMP echo requests, e.g., `ping google.com`. It measures round-trip time and packet loss, helping diagnose network issues.



90. What is the traceroute command in networking?


The traceroute command maps the path packets take to a destination, e.g., `traceroute google.com`. It shows hops and latency, used to diagnose routing or connectivity problems.



91. What is the nslookup command in networking?


The nslookup command queries DNS servers, e.g., `nslookup google.com` returns IP addresses. It’s used for troubleshooting DNS issues or verifying domain records.



92. What is the dig command in networking?


The dig command queries DNS with detailed output, e.g., `dig google.com` shows A, MX, or NS records. It’s more powerful than nslookup, used for DNS diagnostics.



93. What is the netstat command in networking?


The netstat command displays network statistics, like open ports or connections, e.g., `netstat -tuln`. It’s used for monitoring and troubleshooting, though `ss` is often preferred.



94. What is the ss command in networking?


The ss command shows socket statistics, e.g., `ss -tuln` lists listening TCP/UDP ports. It’s faster and more detailed than netstat, ideal for network diagnostics.



95. What is the ip command in networking?


The ip command manages network interfaces and routing, e.g., `ip addr show` lists IPs. It’s the modern Linux replacement for ifconfig, handling addresses, routes, and links.



96. What is the ifconfig command in networking?


The ifconfig command displays or configures network interfaces, e.g., `ifconfig eth0` shows IP and status. It’s legacy, replaced by `ip` in modern Linux systems.



97. What is the arp command in networking?


The arp command manages the ARP cache, e.g., `arp -n` lists IP-to-MAC mappings. It’s used for troubleshooting Layer 2 connectivity issues in local networks.



98. What is the route command in networking?


The route command displays or modifies the routing table, e.g., `route -n` shows routes. It’s used for network configuration, though `ip route` is preferred in modern systems.



99. What is the curl command in networking?


The curl command transfers data via HTTP, FTP, etc., e.g., `curl https://example.com`. It’s used for testing APIs, downloading files, or debugging web services.



100. What is the wget command in networking?


The wget command downloads files from the web, e.g., `wget https://example.com/file.zip`. It supports recursive downloads and resuming, ideal for bulk or interrupted transfers.







101. What is the iptables command in networking?


The iptables command configures Linux firewall rules, e.g., `iptables -A INPUT -p tcp --dport 22 -j ACCEPT`. It’s used for network security, though nftables is newer.



102. What is the nftables command in networking?


The nftables command manages firewall and NAT rules, e.g., `nft add rule ip filter input tcp dport 22 accept`. It’s the modern replacement for iptables, with a unified framework.



103. What is firewalld in networking?


Firewalld is a dynamic firewall manager, using `firewall-cmd`, e.g., `firewall-cmd --add-port



104. What is a proxy server in networking?


A proxy server intermediates between clients and servers, forwarding requests and responses, e.g., caching web content. It enhances security, anonymity, or load balancing, like Squid or Nginx.



105. What is a reverse proxy in networking?


A reverse proxy forwards client requests to backend servers, hiding server details, e.g., Nginx distributing traffic. It’s used for load balancing, caching, or security, unlike forward proxies for clients.



106. What is a load balancer in networking?


A load balancer distributes network traffic across multiple servers, e.g., using round-robin or least connections. It improves scalability and reliability, like HAProxy or AWS ELB.



107. What is the difference between a proxy and a load balancer?


A proxy intermediates traffic, often caching or filtering, while a load balancer distributes traffic across servers for scalability. Proxies focus on client-server mediation; load balancers optimize server performance.



108. What is SSL in networking?


SSL (Secure Sockets Layer) is a protocol for encrypting network communication, superseded by TLS. It secures data, like HTTPS traffic, using certificates and handshakes to ensure privacy.



109. What is TLS in networking?


TLS (Transport Layer Security) is a modern encryption protocol replacing SSL, securing data over networks, e.g., HTTPS on port 443. It uses stronger algorithms and handshakes for secure communication.



110. What is a certificate authority (CA) in networking?


A CA is a trusted entity issuing digital certificates, verifying identities for SSL/TLS, e.g., Let’s Encrypt. Certificates authenticate servers, ensuring secure connections for HTTPS or VPNs.



111. What is a digital certificate in networking?


A digital certificate is an electronic document binding a public key to an identity, used in SSL/TLS. It’s issued by a CA, enabling secure communication, like verifying a website’s authenticity.



112. What is a public key in networking?


A public key is part of asymmetric encryption, used to encrypt data or verify signatures, e.g., in SSL/TLS. It’s shared openly, paired with a private key for secure communication.



113. What is a private key in networking?


A private key is a secret key in asymmetric encryption, used to decrypt data or sign messages, e.g., in SSL/TLS. It’s kept secure, paired with a public key for authentication.



114. What is asymmetric encryption in networking?


Asymmetric encryption uses a public-private key pair, e.g., RSA in SSL/TLS. The public key encrypts or verifies, while the private key decrypts or signs, enabling secure key exchange and authentication.



115. What is symmetric encryption in networking?


Symmetric encryption uses a single shared key for encryption and decryption, e.g., AES in TLS. It’s faster than asymmetric encryption, used for bulk data after key exchange.



116. What is a handshake in networking?


A handshake is a process establishing communication parameters, like the TLS handshake negotiating encryption keys. It ensures both parties agree on protocols, ciphers, and authentication before data transfer.



117. What is a cipher suite in networking?


A cipher suite is a set of cryptographic algorithms used in TLS/SSL, e.g., AES_256_GCM_SHA384. It defines encryption, key exchange, and authentication methods for secure communication.



118. What is a man-in-the-middle (MITM) attack in networking?


A MITM attack intercepts communication between two parties, e.g., eavesdropping on unencrypted Wi-Fi. It’s mitigated by encryption (TLS/SSL) and certificate validation to ensure authenticity.



119. What is a DDoS attack in networking?


A DDoS (Distributed Denial of Service) attack overwhelms a server with traffic from multiple sources, disrupting service. Mitigation includes rate limiting, CDNs, or DDoS protection services like Cloudflare.



120. What is port scanning in networking?


Port scanning probes a host for open ports, e.g., using `nmap` to check port 22. It’s used for security audits or by attackers to find vulnerabilities, often mitigated by firewalls.



121. What is a packet filter in networking?


A packet filter is a firewall mechanism that blocks or allows packets based on headers, e.g., IP or port. It operates at Layer 3/4, like iptables, providing basic network security.



122. What is a stateful firewall in networking?


A stateful firewall tracks connection states, allowing or blocking packets based on session context, e.g., permitting return traffic for established TCP connections. It’s more advanced than stateless packet filters.



123. What is a stateless firewall in networking?


A stateless firewall filters packets based on headers without tracking connection state, e.g., blocking port 23. It’s simpler but less secure than stateful firewalls, missing session context.



124. What is an IDS in networking?


An IDS (Intrusion Detection System) monitors network traffic for suspicious activity, e.g., detecting malware signatures. It alerts administrators but doesn’t block, unlike an IPS, used for security analysis.



125. What is an IPS in networking?


An IPS (Intrusion Prevention System) actively blocks malicious traffic, e.g., stopping a detected SQL injection. It extends IDS functionality, used for real-time network security enforcement.







126. What is a DMZ in networking?


A DMZ (Demilitarized Zone) is a network segment hosting public-facing services, like web servers, isolated from internal networks. It enhances security by limiting access to sensitive systems.



127. What is QoS in networking?


QoS (Quality of Service) manages network traffic to prioritize certain data, e.g., VoIP over email. It uses techniques like bandwidth allocation or traffic shaping to ensure performance.



128. What is bandwidth in networking?


Bandwidth is the maximum data transfer rate of a network, measured in bps (e.g., 100 Mbps). It determines how much data can flow, impacting performance for applications like streaming.



129. What is latency in networking?


Latency is the time taken for data to travel from source to destination, measured in milliseconds. It affects responsiveness, e.g., high latency slows down real-time applications like gaming.



130. What is jitter in networking?


Jitter is the variation in packet arrival times, impacting real-time applications like VoIP. It’s caused by network congestion or routing changes, mitigated by QoS or buffering.



131. What is throughput in networking?


Throughput is the actual data transfer rate achieved, often less than bandwidth due to overhead or congestion. It’s measured in bps, reflecting real-world network performance.



132. What is packet loss in networking?


Packet loss occurs when packets fail to reach their destination, caused by congestion, errors, or faulty hardware. It degrades performance, especially for TCP or real-time applications, detectable via ping.



133. What is a collision in networking?


A collision occurs when two devices transmit simultaneously on a shared medium, corrupting data, common in early Ethernet. CSMA/CD mitigates it, but switches eliminate collisions by segmenting traffic.



134. What is a network topology?


A network topology defines the physical or logical arrangement of devices, like star, bus, or ring. It impacts performance, scalability, and reliability, e.g., star is common in LANs.



135. What is a star topology in networking?


A star topology connects all devices to a central hub or switch, common in LANs. It’s reliable and easy to manage, but the central point is a single point of failure.



136. What is a bus topology in networking?


A bus topology connects all devices to a single cable, used in early Ethernet networks. It’s simple but prone to collisions and failures if the cable is damaged.



137. What is a ring topology in networking?


A ring topology connects devices in a circular loop, with data passing through each node. It’s used in token ring networks, but a single node failure can disrupt the entire network.



138. What is a mesh topology in networking?


A mesh topology connects devices with multiple paths, ensuring redundancy and reliability. It’s used in critical networks, like WANs, but is complex and costly to implement.



139. What is a hybrid topology in networking?


A hybrid topology combines multiple topologies, like star and ring, to balance benefits and costs. It’s common in large networks, offering flexibility and scalability.



140. What is a point-to-point topology in networking?


A point-to-point topology directly connects two devices, like a serial link between routers. It’s simple and reliable, used in WANs or direct server-to-server links.



141. What is Wi-Fi in networking?


Wi-Fi is a wireless networking technology based on IEEE 802.11 standards, enabling devices to connect via radio waves. It’s used in LANs, with speeds and ranges varying by standard (e.g., Wi-Fi 6).



142. What is the 802.11 standard in networking?


The 802.11 standard (Wi-Fi) defines wireless LAN protocols, like 802.11ac or 802.11ax (Wi-Fi 6). It specifies radio frequencies, modulation, and data rates for wireless communication.



143. What is Wi-Fi 6 in networking?


Wi-Fi 6 (802.11ax) is a Wi-Fi standard offering higher speeds (up to 9.6 Gbps), better efficiency, and lower latency. It supports more devices, ideal for dense environments like stadiums.



144. What is an access point in networking?


An access point (AP) is a device providing wireless connectivity to a wired network, like a Wi-Fi router. It bridges wireless devices to LANs, supporting multiple clients.



145. What is a wireless controller in networking?


A wireless controller manages multiple access points, centralizing configuration and security, e.g., in enterprise Wi-Fi. It ensures seamless roaming and load balancing across APs.



146. What is SSID in networking?


SSID (Service Set Identifier) is the name of a Wi-Fi network, e.g., “HomeWiFi”. It’s broadcast by access points, allowing devices to identify and connect to the network.



147. What is a hidden SSID in networking?


A hidden SSID is a Wi-Fi network name not broadcast by the access point, requiring manual entry to connect. It adds minimal security, as tools can still detect it.



148. What is WPA in networking?


WPA (Wi-Fi Protected Access) is a security protocol for Wi-Fi, e.g., WPA2 or WPA3, using encryption like AES. It protects wireless data, stronger than WEP, preventing unauthorized access.



149. What is WPA3 in networking?


WPA3 is the latest Wi-Fi security protocol, improving encryption and authentication over WPA2. It offers stronger protection, like individualized data encryption, used in modern Wi-Fi networks.



150. What is WEP in networking?


WEP (Wired Equivalent Privacy) is an outdated Wi-Fi security protocol using weak RC4 encryption. It’s easily cracked, replaced by WPA/WPA2 for secure wireless communication.







151. What is a MAC filter in networking?


A MAC filter restricts Wi-Fi or network access to specific devices based on their MAC addresses. It’s used for security but can be bypassed by spoofing, requiring additional measures.



152. What is a wireless channel in networking?


A wireless channel is a frequency band used by Wi-Fi, e.g., channels 1, 6, or 11 in 2.4 GHz. Choosing non-overlapping channels reduces interference, improving performance.



153. What is the 2.4 GHz band in networking?


The 2.4 GHz band is a Wi-Fi frequency range offering longer range but lower speeds and more interference. It’s used by older devices and IoT, with channels like 1, 6, and 11.



154. What is the 5 GHz band in networking?


The 5 GHz band is a Wi-Fi frequency range offering higher speeds and less interference but shorter range. It’s used by modern devices, supporting more channels for less congestion.



155. What is MU-MIMO in networking?


MU-MIMO (Multi-User, Multiple Input, Multiple Output) allows Wi-Fi access points to serve multiple devices simultaneously. It improves efficiency in dense networks, supported by Wi-Fi 5 and 6.



156. What is a hotspot in networking?


A hotspot is a Wi-Fi access point, often public, enabling internet access for devices, e.g., café Wi-Fi. It may require authentication and can be created by smartphones or routers.



157. What is a mesh network in networking?


A mesh network uses multiple interconnected nodes to extend Wi-Fi coverage, e.g., in homes or offices. Nodes relay data, ensuring seamless connectivity and redundancy, like Google Wi-Fi.



158. What is Bluetooth in networking?


Bluetooth is a short-range wireless technology for connecting devices, like headphones or keyboards, using the 2.4 GHz band. It’s low-power, ideal for personal area networks (PANs).



159. What is NFC in networking?


NFC (Near Field Communication) is a short-range wireless technology for close-proximity data exchange, like contactless payments. It operates at 13.56 MHz, used in smartphones and cards.



160. What is Zigbee in networking?


Zigbee is a low-power, wireless protocol for IoT devices, like smart home sensors, using the 2.4 GHz band. It supports mesh networking, enabling long-range communication via relays.



161. What is Z-Wave in networking?


Z-Wave is a wireless protocol for smart home devices, like lights or locks, using sub-1 GHz frequencies. It’s low-power, supporting mesh networks for reliable IoT communication.



162. What is a PAN in networking?


A PAN (Personal Area Network) connects devices within a short range, like a smartphone and headset, often via Bluetooth. It’s used for personal, low-power communication, smaller than a LAN.



163. What is SDN in networking?


SDN (Software-Defined Networking) separates the control plane from the data plane, centralizing network management via software. It improves flexibility and automation, used in data centers and cloud networks.



164. What is NFV in networking?


NFV (Network Functions Virtualization) runs network services, like firewalls or routers, as software on virtual machines. It reduces hardware dependency, enhancing scalability in modern networks.



165. What is a virtual switch in networking?


A virtual switch is software connecting virtual machines within a host or to external networks, like vSwitch in VMware. It operates at Layer 2, supporting VLANs and traffic management.



166. What is VXLAN in networking?


VXLAN (Virtual Extensible LAN) encapsulates Layer 2 frames in UDP packets, enabling VLANs across Layer 3 networks. It’s used in cloud data centers for scalable, isolated virtual networks.



167. What is MPLS in networking?


MPLS (Multiprotocol Label Switching) routes packets using labels instead of IP addresses, improving speed and QoS. It’s used in ISP and enterprise WANs for efficient traffic engineering.



168. What is a VPN tunnel in networking?


A VPN tunnel is an encrypted connection between two endpoints, like a client and server, over a public network. It uses protocols like IPsec or OpenVPN, securing data in transit.



169. What is IPsec in networking?


IPsec (Internet Protocol Security) is a protocol suite for securing IP communications, using encryption and authentication. It’s used in VPNs, supporting modes like tunnel or transport.



170. What is OpenVPN in networking?


OpenVPN is an open-source VPN protocol using SSL/TLS for encryption, operating over UDP or TCP. It’s flexible, secure, and widely used for remote access and site-to-site VPNs.



171. What is PPTP in networking?


PPTP (Point-to-Point Tunneling Protocol) is an older VPN protocol using GRE and PPP for tunneling. It’s fast but insecure due to weak encryption, largely replaced by OpenVPN or IPsec.



172. What is L2TP in networking?


L2TP (Layer 2 Tunneling Protocol) is a VPN protocol often paired with IPsec for encryption. It tunnels Layer 2 data, used for secure remote access, but slower than OpenVPN.



173. What is GRE in networking?


GRE (Generic Routing Encapsulation) is a tunneling protocol encapsulating packets to create virtual point-to-point links. It’s used in VPNs or routing, often with IPsec for security.



174. What is a site-to-site VPN?


A site-to-site VPN connects entire networks, like branch offices, over the internet using encrypted tunnels. It’s used for secure inter-office communication, typically with IPsec or MPLS.



175. What is a remote access VPN?


A remote access VPN allows individual users to connect securely to a network, like employees accessing company servers. It uses protocols like OpenVPN, requiring client software or configurations.







176. What is a DMVPN in networking?


DMVPN (Dynamic Multipoint VPN) is a Cisco VPN solution creating hub-and-spoke or spoke-to-spoke tunnels dynamically. It uses GRE and IPsec, ideal for scalable, secure WANs.



177. What is a VRF in networking?


VRF (Virtual Routing and Forwarding) creates isolated routing tables within a router, segmenting traffic. It’s used in MPLS or enterprise networks for multi-tenancy or traffic separation.



178. What is a content delivery network (CDN)?


A CDN is a network of distributed servers caching content closer to users, e.g., Cloudflare or Akamai. It reduces latency, improves load times, and enhances reliability for web content.



179. What is Anycast routing in networking?


Anycast routing directs traffic to the nearest server sharing the same IP address, used in CDNs or DNS. It improves performance and redundancy by leveraging BGP routing.



180. What is a network bottleneck?


A network bottleneck is a point of congestion, like a slow link or overloaded router, reducing performance. It’s identified via monitoring tools and mitigated by upgrading hardware or optimizing traffic.



181. What is network congestion in networking?


Network congestion occurs when traffic exceeds capacity, causing delays, jitter, or packet loss. It’s managed with QoS, load balancing, or increasing bandwidth to restore performance.



182. What is a network segment in networking?


A network segment is a portion of a network separated logically (e.g., VLAN) or physically (e.g., switch). It reduces congestion and improves security by isolating traffic.



183. What is a leased line in networking?


A leased line is a dedicated, private connection between two locations, offering consistent bandwidth and low latency. It’s used for enterprise WANs, like connecting offices, but is costly.



184. What is MPLS VPN in networking?


MPLS VPN uses MPLS to create secure, virtual private networks over a provider’s backbone. It supports multiple customers with isolated traffic, used for enterprise site-to-site connectivity.



185. What is a dark pool in networking?


A dark pool is unused fiber optic capacity in a network, available for future use or leasing. It’s called “dark” because it’s installed but not transmitting data, common in telecom.



186. What is a network bridge in networking?


A network bridge connects two network segments at Layer 2, forwarding frames based on MAC addresses. It’s used to extend LANs or segment traffic, less common than switches today.



187. What is a network tap in networking?


A network tap is a hardware device mirroring traffic for monitoring, e.g., to an IDS or analyzer. It provides passive, non-intrusive access to data, used for security and diagnostics.



188. What is a port mirror in networking?


Port mirroring copies traffic from one switch port to another for monitoring, e.g., to a packet analyzer. It’s used for troubleshooting or security, like detecting intrusions.



189. What is a network analyzer in networking?


A network analyzer is a tool, like Wireshark, capturing and inspecting traffic to diagnose issues or monitor performance. It decodes protocols, helping troubleshoot connectivity or security problems.



190. What is network monitoring in networking?


Network monitoring tracks performance, traffic, and issues using tools like Nagios or Zabbix. It detects anomalies, ensures uptime, and aids capacity planning for reliable networks.



191. What is SNMP trap in networking?


An SNMP trap is an unsolicited message sent by a device to an SNMP manager, reporting events like link failures. It’s used for real-time monitoring and alerting in network management.



192. What is NetFlow in networking?


NetFlow is a Cisco protocol collecting IP traffic data, like source/destination IPs and ports. It’s used for bandwidth monitoring, security analysis, and network optimization.



193. What is sFlow in networking?


sFlow is a sampling-based protocol for monitoring network traffic, collecting packet headers. It’s lightweight, used for high-speed networks to analyze performance or detect anomalies.



194. What is a network management system (NMS)?


An NMS is software, like SolarWinds or PRTG, for monitoring and managing network devices. It uses SNMP, NetFlow, or traps to track performance, faults, and configurations.



195. What is a network baseline in networking?


A network baseline is a snapshot of normal network performance, like bandwidth or latency. It’s used to detect deviations, aiding troubleshooting or capacity planning.



196. What is a network diagram in networking?


A network diagram visually represents network topology, showing devices, connections, and IPs. It’s used for planning, troubleshooting, or documentation, created with tools like Visio or Draw.io.



197. What is a network audit in networking?


A network audit assesses network performance, security, and configuration, identifying vulnerabilities or inefficiencies. It involves analyzing logs, configs, and traffic, ensuring compliance and optimization.



198. What is a network protocol analyzer?


A network protocol analyzer, like Wireshark, captures and decodes packets to inspect protocols and troubleshoot issues. It’s used for diagnosing connectivity, performance, or security problems.



199. What is a network emulator in networking?


A network emulator simulates network conditions, like latency or packet loss, for testing applications. Tools like GNS3 or Mininet replicate real-world scenarios without physical hardware.



200. What is a network simulator in networking?


A network simulator models network behavior, like Cisco Packet Tracer or NS-3, for design and testing. It predicts performance or trains engineers without affecting live networks.







201. What is GNS3 in networking?


GNS3 is a network simulator for designing and testing virtual networks, supporting Cisco IOS and other devices. It’s used for training, certification prep, or prototyping network configurations.



202. What is Cisco Packet Tracer in networking?


Cisco Packet Tracer is a network simulation tool for learning and designing networks, supporting Cisco devices. It’s used in CCNA training, offering a GUI for configuring routers and switches.



203. What is a network fabric in networking?


A network fabric is a high-speed, scalable network architecture, like in data centers, using spine-leaf topology. It ensures low latency and redundancy, supporting SDN or cloud workloads.



204. What is a spine-leaf architecture in networking?


Spine-leaf architecture is a two-tier data center network design, with spine switches connecting to leaf switches. It offers high bandwidth, low latency, and scalability for east-west traffic.



205. What is east-west traffic in networking?


East-west traffic is data flow between servers or devices within a data center, like VM-to-VM communication. It’s optimized by spine-leaf architectures, unlike north-south traffic to external networks.



206. What is north-south traffic in networking?


North-south traffic is data flow between a data center and external networks, like users accessing a web server. It’s managed by edge routers or firewalls, unlike east-west internal traffic.



207. What is a data center network?


A data center network connects servers, storage, and services in a data center, using high-speed switches and fabrics. It supports cloud, virtualization, and big data with low latency and redundancy.



208. What is a campus network?


A campus network connects buildings in a localized area, like a university or office park, using LAN technologies. It supports wired and wireless access, managed centrally for scalability.



209. What is a branch network?


A branch network connects remote offices to a central network, often via WAN or VPN. It uses routers, switches, and SD-WAN for secure, reliable access to corporate resources.



210. What is SD-WAN in networking?


SD-WAN (Software-Defined Wide Area Network) optimizes WAN connectivity using software to manage multiple links, like MPLS or broadband. It improves performance, reduces costs, and supports cloud applications.



211. What is a network overlay in networking?


A network overlay creates a virtual network on top of physical infrastructure, like VXLAN or GRE tunnels. It enables flexible, isolated networks, common in cloud or SDN environments.



212. What is a network underlay in networking?


A network underlay is the physical infrastructure, like switches and routers, supporting virtual overlays. It handles raw packet transport, ensuring connectivity for protocols like VXLAN.



213. What is network slicing in networking?


Network slicing creates isolated virtual networks on shared infrastructure, tailored for specific use cases, like 5G IoT or gaming. It uses SDN/NFV for dynamic resource allocation.




A network address is the portion of an IP address identifying the network, determined by the subnet mask, e.g., 192.168.1.0 in 192.168.1.1/24. It’s used for routing and addressing within a subnet.




A host address is the portion of an IP address identifying a specific device within a network, e.g., .1 in 192.168.1.1/24. It’s assigned uniquely to each device in the subnet.




A network interface is a hardware or software component connecting a device to a network, e.g., eth0 on a Linux server. It handles data transmission and is assigned IP or MAC addresses.




A socket is an endpoint for communication, combining an IP address and port, e.g., 192.168.1.1:80. It’s used by applications to send or receive data over TCP or UDP.




A network stack is a set of layered protocols, like TCP/IP, implemented in an OS for communication. It processes data from application to physical layers, enabling network functionality.




A network driver is software enabling communication between an OS and a network interface card (NIC). It handles low-level tasks, like packet transmission, specific to the NIC’s hardware.




A network protocol stack is a layered set of protocols, like TCP/IP or OSI, handling different networking tasks. Each layer (e.g., Transport, Network) processes data for end-to-end communication.




A network service is a program or process providing functionality over a network, like DNS or HTTP. It listens on specific ports, enabling client-server communication, e.g., Apache on port 80.




A network appliance is a specialized device, like a firewall or load balancer, designed for specific networking tasks. It’s optimized for performance, often running proprietary software, e.g., Cisco ASA.




A network port is a logical endpoint, identified by a number (0-65535), used with an IP address to direct traffic to services, e.g., 443 for HTTPS. It’s critical for application communication.




A network zone is a logical grouping of devices or services with similar security policies, like a DMZ or internal zone. It’s used in firewalls, like firewalld, to manage traffic.




A network segment is a portion of a network separated by switches, routers, or VLANs, reducing congestion and enhancing security. It limits broadcast domains, e.g., a department’s VLAN.




A network packet is a unit of data transmitted over a network, containing headers (e.g., IP, TCP) and payload. It’s routed at Layer 3, encapsulated in frames for local delivery.




A network flow is a sequence of packets between two endpoints, identified by IPs, ports, and protocol, e.g., a TCP session. It’s analyzed for monitoring or security using tools like NetFlow.




A network bridge connects two network segments at Layer 2, forwarding frames based on MAC addresses. It’s used to extend LANs or segment traffic, less common than switches today.




A network tap is a hardware device mirroring traffic for monitoring, e.g., to an IDS or analyzer. It provides passive, non-intrusive access to data, used for security and diagnostics.




Port mirroring copies traffic from one switch port to another for monitoring, e.g., to a packet analyzer. It’s used for troubleshooting or security, like detecting intrusions.




A network analyzer, like Wireshark, captures and decodes packets to inspect protocols and troubleshoot issues. It’s used for diagnosing connectivity, performance, or security problems.




Network monitoring tracks performance, traffic, and issues using tools like Nagios or Zabbix. It detects anomalies, ensures uptime, and aids capacity planning for reliable networks.




An SNMP trap is an unsolicited message sent by a device to an SNMP manager, reporting events like link failures. It’s used for real-time monitoring and alerting in network management.




NetFlow is a Cisco protocol collecting IP traffic data, like source/destination IPs and ports. It’s used for bandwidth monitoring, security analysis, and network optimization.




sFlow is a sampling-based protocol for monitoring network traffic, collecting packet headers. It’s lightweight, used for high-speed networks to analyze performance or detect anomalies.




An NMS is software, like SolarWinds or PRTG, for monitoring and managing network devices. It uses SNMP, NetFlow, or traps to track performance, faults, and configurations.




A network baseline is a snapshot of normal network performance, like bandwidth or latency. It’s used to detect deviations, aiding troubleshooting or capacity planning.




A network diagram visually represents network topology, showing devices, connections, and IPs. It’s used for planning, troubleshooting, or documentation, created with tools like Visio or Draw.io.




A network audit assesses network performance, security, and configuration, identifying vulnerabilities or inefficiencies. It involves analyzing logs, configs, and traffic, ensuring compliance and optimization.




A network protocol analyzer, like Wireshark, captures and decodes packets to inspect protocols and troubleshoot issues. It’s used for diagnosing connectivity, performance, or security problems.




A network emulator simulates network conditions, like latency or packet loss, for testing applications. Tools like GNS3 or Mininet replicate real-world scenarios without physical hardware.




A network simulator models network behavior, like Cisco Packet Tracer or NS-3, for design and testing. It predicts performance or trains engineers without affecting live networks.




GNS3 is a network simulator for designing and testing virtual networks, supporting Cisco IOS and other devices. It’s used for training, certification prep, or prototyping network configurations.




Cisco Packet Tracer is a network simulation tool for learning and designing networks, supporting Cisco devices. It’s used in CCNA training, offering a GUI for configuring routers and switches.




A network fabric is a high-speed, scalable network architecture, like in data centers, using spine-leaf topology. It ensures low latency and redundancy, supporting SDN or cloud workloads.




Spine-leaf architecture is a two-tier data center network design, with spine switches connecting to leaf switches. It offers high bandwidth, low latency, and scalability for east-west traffic.




East-west traffic is data flow between servers or devices within a data center, like VM-to-VM communication. It’s optimized by spine-leaf architectures, unlike north-south traffic to external networks.




North-south traffic is data flow between a data center and external networks, like users accessing a web server. It’s managed by edge routers or firewalls, unlike east-west internal traffic.




A data center network connects servers, storage, and services in a data center, using high-speed switches and fabrics. It supports cloud, virtualization, and big data with low latency and redundancy.




A campus network connects buildings in a localized area, like a university or office park, using LAN technologies. It supports wired and wireless access, managed centrally for scalability.




A branch network connects remote offices to a central network, often via WAN or VPN. It uses routers, switches, and SD-WAN for secure, reliable access to corporate resources.




SD-WAN (Software-Defined Wide Area Network) optimizes WAN connectivity using software to manage multiple links, like MPLS or broadband. It improves performance, reduces costs, and supports cloud applications.




A network overlay creates a virtual network on top of physical infrastructure, like VXLAN or GRE tunnels. It enables flexible, isolated networks, common in cloud or SDN environments.




A network underlay is the physical infrastructure, like switches and routers, supporting virtual overlays. It handles raw packet transport, ensuring connectivity for protocols like VXLAN.




Network slicing creates isolated virtual networks on shared infrastructure, tailored for specific use cases, like 5G IoT or gaming. It uses SDN/NFV for dynamic resource allocation.



List Memory Pages
Share Via Whastapp/Facebook
Share to Your Friends

Share this protal to share friends and complete unlimited tests here. You can also make friends on our protal also start mutual competition tests with your firends easily.

Share to Facebook Share to WhatsApp Promote & Earn