0% found this document useful (0 votes)
84 views95 pages

100 Network Intervive

Uploaded by

PRABHAT SINGH
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
84 views95 pages

100 Network Intervive

Uploaded by

PRABHAT SINGH
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 95

100+ Networking Interview Questions

and Answers (2024)


1-What is IP Address? what is used?
IP Address stand for internet protocol.it is also known as network. Address,
HOST Address, Simply Address. IP addresses are used to identify a
computer on the internet . Each computer on the internet has
Unique address. Your computer's IP address is automatically
assigned when you connect to the internet. It is also possible to
manually assign an IP address to your computer.

2-How can I find out what my subnet mask


is?
You can find out what your subnet mask is by using the
"ipconfig" command. This command will show you the IP
addresses, masks, and default gateway for your computer .

Q05.What do you know about Microsoft office 365?

Ans: Microsoft Office 365 is a subscription-based service and can be


accessed through the Internet. It does not use the space on your
computer as it is not stored there. It is possible to run SaaS applications in
the Cloud, however, this doesn’t make them a Cloud.

Q06.Have you seen the blue screen of death?

Ans: The blue screen of death will display the stoop or fatal error
message which indicates the windows have become unstable and stops
immediately.

Q08. What is Bit locker?

Ans

BitLocker is a security feature built into Microsoft Windows that encrypts


all hard drives, including the operating system, system files, and user data. The
encryption process is designed to protect sensitive data on a computer from
unauthorized access, theft, or hacking attempts.

Q09. What is SCCM?

Ans: Microsoft System Center Configuration Manager (SCCM) is a


Windows product that enables the management, deployment and
security of devices and applications across an enterprise. Amongst other
potential uses, administrators will commonly use SCCM for endpoint
protection, patch management and software distribution.

Microsoft Endpoint Configuration Manager, formerly known as System Center Configuration


Manager (SCCM), is a Windows-centric endpoint management tool for devices within an
Active Directory domain.

Q10. Difference between 32 BIT and 64 BIT.

Ans: When it comes to computers, the difference between 32-bit and


a 64-bit is all about processing power. Computers with 32-bit processors
are older, slower, and less secure, while a 64-bit processor is newer,
faster, and more secure

Q11. What is Domain?

Ans: Domain is set of computers which network recognize by the


internet .it is used by central administrator computer. it is created when
we instal active directory.

Domain name is the address of your website that people type in the
browser URL bar to visit your website. In simple terms, if your website was
a house, then your domain name will be its address.

Q12. What is safe mode? What is the use of safe mode?

Ans: Safe mode is a diagnostic mode of a computer operating system


(OS). that allows users to access a modified version of Windows and fix any
issues that prevent windows from booting normally.

It is typically used to debug a system that has crashed, won't boot, or is unstable
after installing a new update, device driver, or piece of software. .

Q13. How to configure network printer?

Ans: Click on the Start button, and then select Devices


and Printers.
1. In the Devices and Printers window, click on Add a printer.
2. In the Add Printer window, click on the option Add a local printer.
3. Select Create a new port, and then select Standard TCP/IP Port from
the drop-down menu. …
4. Enter the IP address of your printer.
5. Connect

Q14. What is Active Directory? What activities we can perform in


active directory?

Ans: Active Directory (AD) is Microsoft’s proprietary directory service. It


runs on Window server. It is developed by Microsoft for managing and
organizing network resources .it store information about user computer
and network resources object in a hierarchical stature. For instance, it
help manage use Authentication and access to shared resources.

Q15. Is it possible to recover deleted file or folder from one drive


in O365?

Ans: If you accidentally delete a file or folder in OneDrive, you may


be able to recover it later from the OneDrive recycle bin. … In the
navigation panel select Recycle bin. Select the files or folders you want
to restore by pointing to each item and clicking the circle check box that
appears, and then click Restore.

Q16. Explain on PING Command?

PING is stand for Pocket internet grouper which is use to check physical Ip
connectivity between two or more device. Ping sends out an ICMP echo
request to which it expects an ICMP echo reply response.

How to Check IP address in any computer.

The Windows Command Prompt tool can also help you get your public IP
address. Here’s how to find your external IP address with Command
Prompt.

1. Open the Start menu and type cmd.


2. Enter the following command into the Command Prompt and
press Enter: Ipconfig

Q18. What is operating system.


An Operating System (OS) is a software that acts as an interface between
computer hardware components and the user. Every computer system
must have at least one operating system to run other programs.
Applications like Browsers, MS Office, Notepad Games, etc., need some
environment to run and perform its tasks.

How to Fix the 404 Not Found Error

Retry the web page by pressing F5, clicking/tapping the refresh/reload button, or trying the URL
from the address bar again.
You can clear Cache memory and try again to open that website.

Q21. What do you do if your PC doesn’t turn on in one go?

Ans: First and foremost, you need to check the cable connection and
electricity supply first, and if you find no problem with them, finally you
should report the problem to the IT department of the company.

Ans: What is a Solid-State Drive (SSD)?

Solid State Drive (SSD) is a non-volatile storage device that stores and
retrieves data constantly on solid-state flash memory. However, this data
is stored on interconnected flash instead memory chips of platters, which
makes them faster than HDDs. It provides better performance compared
to HDD.

Q30.What is the Difference between Ram and Rom?

Ans: RAM and ROM both are the internal memories of the computer.
Where RAM is a temporary memory, ROM is a permanent memory of the
computer. There are many differences between RAM and ROM, but the
basic difference is that RAM is a read-write memory and the ROM is a read
only memory.

1. What is DHCP, and how does it work?

Answer: DHCP (Dynamic Host Configuration Protocol) is a network


protocol that automatically assigns IP addresses to devices on
network. when we are turn on laptop and connect to the network
cable wi-fi connection DHCP assign ip address to device that so it
communicates on network

What are single mode fibres optic cable?


Single-mode fibres is common type fibres that used to transmit over longer distance. .A

single mode fibres is also known as a single mode optical fibres ,uni mode fibres ,mono

mode optical fibres and single mode optical waveguide. the highest capacity for commercial

Single Mode Fiber now is 100 Gigabits per second.

What are multi- mode fibres optic cable?


Multi-mode optical fibre is a type of optical fibre mostly used for communication over short

distances, such as within a building or on a campus. Multi-mode links can be used for data rates

up to 800 Gbit/s.

What are Transmission media and type?


Transmission media is a communication channel that carries the
information from the sender to the receiver. Data is transmitted through
the electromagnetic signals. The transmission media is available in the
lowest layer of the OSI reference model, i.e., Physical layer.

There are two type of transmission media.

1.Guided media (wired) 2. Unguided media

What are Guided media?


It is defined physical media through which the signal is transmitted it is

also know bounded media. There are three type of transmission media.

1. Coaxial cable 2. Twisted pair cable 3. Optic fibres cable


What is coaxial cable?
Coaxial cable is very commonly used transmission of audio, video and

communication. Mainly coaxial cables are used as network and broadband cable.

These cables have high bandwidths and transmission capacity. The middle core

is responsible for the data transferring whereas the copper mesh prevents from

the EMI (Electromagnetic interference)


o The inner conductor of the coaxial cable is made up of copper, and
the outer conductor is made up of copper mesh. The middle core is
made up of non-conductive cover that separates the inner
conductor from the outer conductor.
o There are two types of coaxial cable.

1.Thicknet(10base5) 2. Thin net (10base2)

What is thick coaxial cable 10Base5?


10Base5 refers to a standard for Ethernet network technologies that use a thicker
version of coaxial cables. It has the capability to transmit data at speed of 10Mbps
up to 500 meters using baseband transmission. 10Base5 is also known as thick net,
Thick Wire, thick Ethernet and thick coaxial Ethernet.
What is thin net cable used for?
A much thinner and more flexible type of coaxial cable, Thin Net is used on Ethernet
10Base2 networks and can span distances of up to 185 meters. This was usually the
media of choice for connecting computers on a LAN

Advantages Of Coaxial cable:

o The data can be transmitted at high speed.


o It has better shielding as compared to twisted pair cable.
o It provides higher bandwidth.

Disadvantages Of Coaxial cable:

o It is more expensive as compared to twisted pair cable.


o If any fault occurs in the cable causes the failure in the entire
network.

What is twisted pair cable?


Twisted pair cable is very important network media .it can be used for phone communication and

cable ethernet networks. Twisted pair is a type of wiring in which two conductors of single circuit

are twisted together for the purpose of cancelling out electromagnetic interference from external

sources. There are two type of twisted pair cable.


1. UTP (unshielded Twisted pair cable) 2. STP (shielded pair cable)

Unshielded twisted pair cable. UTP cable are mostly used for LAN

network. they can used for low-speed data, high speed data audio and building automation and
control system. utp cable is can be use in both the horizontal and backbone cabling subsystem.

What is advantage and Disadvantage of UTP?


The Advantage of UTP is that are very flexible low-cost media and can be used for either voice or
data communication.

The main disadvantage with UTP is bandwidth we cannot achieve high bandwidth with UTP
cable.

Shielded twisted pair cable. A shielded twisted pair is a cable that


contains the mesh surrounding the wire that allows the higher
transmission rate. It is used in computer and telephone networking
application including wiring Ethernet connection for computer network as
well as commercial residential telephone connection.

What is advantage and Disadvantage of STP?


This cable uses RS-449, RJ-45, RS-232, and RJ-11 connectors for
connecting to the respective port. It has higher data transmission rates
across longer distances. This is one of the main advantages of a shielded
twisted pair cable. One of the most standard protocols which use this
cable is Ethernet; as it provides high-speed data transmission with
efficient noise reduction.

This cable is best suitable for high noise and disturbance areas.

And disadvantage is it is more expensive than UTP cable.

What are fibres optic cable?


Fiber optic cable is a fast information transmission media. fibre optic cable
is carry communication singles using pulses of light generated by small
lasers or light emitting diodes.

The advantage of fibres optic cable 0


1. Fiber optic cables can transmit a large amount of data at high
speeds. They have a much higher bandwidth compared to copper
cables, making them suitable for applications that require fast and
reliable data transmission.
2. Low Signal Loss: Fiber optic cables experience minimal signal loss
over long distances. This allows for data to be transmitted over
greater distances without the need for signal boosters or repeaters.
The Disadvantage of fibres optic cable

3: Fiber optic cables are delicate and can be more prone to damage
than traditional copper cables. They may break or bend if
mishandled during installation or maintenance. This fragility makes
them less suitable for certain environments, such as those with
heavy machinery or high levels of physical disturbance.
4.Installation and Equipment Costs: The initial cost of installing a
fibres optic network can be higher compared to traditional copper
networks. Specialized equipment and skilled technicians are required
for installation, which can contribute to increased expenses.

What is Network Topology?


Topology defines the structure of the network of how all the
components are interconnected to each other. There are two
types of topologies: physical and logical topology.

Types of Network Topology


Physical topology is the geometric representation of all the nodes in a
network. There are six types of network topology which are Bus Topology,
Ring Topology, Tree Topology, Star Topology, Mesh Topology, and Hybrid
Topology.

What is bus Topology?


o The bus topology is designed in such a way that all the stations are
connected through a single cable known as a backbone cable.
o When a node wants to send a message over the network, it puts a
message over the network. All the stations available in the network
will receive the message whether it has been addressed or not.
o The bus topology is mainly used in 802.3 (ethernet) and 802.4
standard networks.
o The backbone cable is considered as a "single lane" through which
the message is broadcast to all the stations.
o The most common access method of the bus topologies
is CSMA (Carrier Sense Multiple Access).

) How many ways to stop collision?


There are two ways stop collision.

CSMA: It is a media access control used to control the data flow so that
data integrity is maintained, i.e., the packets do not get lost. There are
two alternative ways of handling the problems that occur when two nodes
send the messages simultaneously.

o CSMA CD: CSMA CD (Collision detection) is an access method


used to detect the collision. Once the collision is detected, the
sender will stop transmitting the data. Therefore, it works on
"recovery after the collision".
o CSMA CA: CSMA CA (Collision Avoidance) is an access method
used to avoid the collision by checking whether the transmission
media is busy or not. If busy, then the sender waits until the media
becomes idle. This technique effectively reduces the possibility of
the collision. It does not work on "recovery after the collision".

) What is advantage of bus topology?


 It is very easy to connect a node or peripheral in the network.
 Bus network required less cable length than any other
topology.

Disadvantage of bus topology


 As total network is depended on signal cable. so, if any problem

occur in main cable the entire network shut down.

 At the start point and end point of main cable terminator are

required to build up to a network.

 This network cannot be used as a stand-alone solution in a large

building.

What is a ring topology?


When each device serial way to connect in closed ring pattern is called

ring `topology. A node that receives a massage from previous computer

will be retransmitted to next node .in ring topology data flow in one

direction.it is not terminated end and each node connected to another not

and have not any terminated point.

What is advantage of ring topology?

1) What is a Link?
A link refers to the connectivity between two devices. It includes the
type of cables and protocols used for one device to be able to
communicate with the other.

Difference between Serial and Parallel


Transmission
There are two methods used for transferring data between
computers which are given below: Serial Transmission and Parallel
Transmission.

Serial Transmission:
In Serial Transmission, data-bit flows from one computer to another
computer in bi-direction. In this transmission, one-bit flows at one
clock pulse. In Serial Transmission, 8 bits are transferred at a time
having a start and stop bit.
Parallel Transmission:
In Parallel Transmission, many bits are flow together simultaneously
from one computer to another computer. Parallel Transmission is
faster than serial transmission to transmit the bits. Parallel
transmission is used for short distance.

2) What are the layers of the OSI reference model?


There are 7 OSI layers: 1) Physical Layer, 2) Data Link Layer, 3) Network
Layer, 4) Transport Layer, 5) Session Layer, 6) Presentation Layer, and 7)
Application Layer.

3) What is the backbone network?


A backbone network is a centralized infrastructure that is designed to
distribute different routes and data to various networks. It also handles
the management of bandwidth and multiple channels.

4) What is a LAN?

LAN network
LAN stands for Local Area Network. It refers to the connection between
computers and other network devices that are located within a small
physical location.

5) What is a node?
A node refers to a point or joint where a connection takes place. It can
be a computer or device that is part of a network. Two or more nodes
are needed to form a network connection.

6) What are routers?


Router
Routers can connect two or more network segments. These are
intelligent network devices that store information in its routing tables,
such as paths, hops, and bottlenecks. With this info, they can determine
the best path for data transfer. Routers operate at the OSI Network
Layer.

7) What is a point-to-point link?


It refers to a direct connection between two computers on a network. A
point to point connection does not need any other network devices
other than connecting a cable to the NIC cards of both computers.

8) What is anonymous FTP?


FTP stand for file transfer protocol it is standard internet protocol for
sharing large file between computer on internet over TCP/IP
Connection. Anonymous FTP is a way of granting user access to files in
public servers. Users that are allowed access to data in these servers do
not need to identify themselves, but instead, log in as an anonymous
guest.
9) What is a subnet mask?
A subnet mask is combined with an IP address to identify two parts: the
extended network address and the host address. Like an IP address, a
subnet mask is made up of 32 bits.

10) What is the maximum length allowed for a UTP


cable?
A single segment of UTP cable has an allowable length of 90 to 100
meters. This limitation can be overcome by using repeaters and
switches.

11) What is data encapsulation?


Encapsulation is the process of adding additional information when
data is traveling in OSI or TCP/IP model. The additional information
has been added on sender’s side, starting from Application layer to
Physical layer.

What is data encapsulation?


De-encapsulation is the exact reverse process of encapsulation.
The additional information added on the sender’s side (during
encapsulation) gets removed when it travels on the receiver’s side
from the Physical layer to the Application layer.

12) Describe Network Topology


Topology defines the structure of the network of how all
the components are interconnected to each other.
There are two types of topology: physical and logical
topology.

13) What is a VPN?


VPN means Virtual Private Network, a technology that allows a secure
tunnel to be created across a network such as the Internet. For example,
VPNs allow you to establish a secure dial-up connection to a remote
server.
14) Briefly describe NAT
NAT is Network Address Translation. This is a protocol that provides a
way for multiple computers on a common network to share a single
connection to the Internet.

15) What is the job of the Network Layer under the OSI
reference model?
The Network layer is responsible for data routing, packet switching, and
control of network congestion. Routers operate under this layer.

16) How does a network topology affect your decision to


set a network?
Network topology dictates what media you must use to interconnect
devices. It also serves as a basis on what materials, connectors, and
terminations that is applicable for the setup.

17) What is RIP?


RIP, short for Routing Information Protocol is used by routers to send
data from one network to another. It efficiently manages routing data
by broadcasting its routing table to all other routers within the network.
It determines the network distance in units of hops.

18) What are the different ways of securing a computer


network?
There are several ways to do this. Install a reliable and updated anti-
virus program on all computers. Make sure firewalls are setup and
configured correctly. User authentication will also help a lot. All these
combined would make a highly secured network.

19) What is NIC?


NIC is short for Network Interface Card. This is a peripheral card that is
attached to a PC in order to connect to a network. Every NIC has its
own MAC address that identifies the PC on the network.

20) What is WAN?

WAN network
WAN stands for Wide Area Network. It is an interconnection of
computers and devices that are geographically dispersed. It connects
networks that are located in different regions and countries.

Computer Network Engineer Interview


Questions and Answers for Experienced
21) What is the importance of the OSI Physical Layer?
The physical layer does the conversion from data bits to the electrical
signal, and vice versa. This is where network devices and cable types are
considered and setup.

22) How many layers are there under TCP/IP?


There are four layers: 1) The Network Layer, 2) Internet Layer, 3)
Transport Layer, and 4) Application Layer.
TCP/IP Layers

23) What are proxy servers, and how do they protect


computer networks?
Proxy servers primarily prevent external users who are identifying the IP
addresses of an internal network. Without knowledge of the correct IP
address, even the physical location of the network cannot be identified.
Proxy servers can make a network virtually invisible to external users.

24) What is the function of the OSI Session Layer?


This layer provides the protocols and means for two devices on the
network to communicate with each other by holding a session. This
includes setting up the session, managing information exchange during
the session, and tear-down process upon termination of the session.

25) What is the importance of implementing a Fault


Tolerance System?
A fault tolerance system ensures continuous data availability. This is
done by eliminating a single point of failure.

26) What does 10Base-T mean?


The 10 refers to the data transfer rate. In this case, it is 10Mbps. The
word Base refers to baseband, as opposed to broadband.

27) What is a private IP address?


Priv11ate IP addresses are assigned for use on intranets. These
addresses are used for internal networks and are not routable on
external public networks. These ensure that no conflicts are present
among internal networks. At the same time, the same range of private IP
addresses is reusable for multiple intranets since they do not “see” each
other.

28) What is NOS?


NOS, or Network Operating System, is specialized software. The main
task of this software is to provide network connectivity to a computer in
order to communicate with other computers and connected devices.

29) What is DoS?


DoS, or Denial-of-Service attack, is an attempt to prevent users from
being able to access the Internet or any other network services. Such
attacks may come in different forms and are done by a group of
perpetrators. One common method of doing this is to overload the
system server so it cannot anymore process legitimate traffic and will be
forced to reset.

30) What is OSI, and what role does it play in computer


networks?
OSI (Open Systems Interconnect) serves as a reference model for data
communication. It is made up of 7 layers, with each layer defining a
particular aspect of how network devices connect and communicate
with one another. One layer may deal with the physical media used,
while another layer dictates how data is transmitted across the
network.

31) What is the purpose of cables being shielded and


having twisted pairs?
The primary purpose of this is to prevent crosstalk. Crosstalk’s are
electromagnetic interferences or noise that can affect data being
transmitted across cables.

32) What is the advantage of address sharing?


By using address translation instead of routing, address sharing
provides an inherent security benefit. That’s because host PCs on the
Internet can only see the public IP address of the external interface on
the computer. Instead, it provides address translation and not the
private IP addresses on the internal network.

33) What are MAC addresses?


MAC, or Media Access Control, uniquely identifies a device on the
network. It is also known as a physical address or an Ethernet address. A
MAC address is made up of 6-byte parts.
34) What is the equivalent layer or layers of the TCP/IP
Application layer in terms of the OSI reference model?
The TCP/IP Application layer has three counterparts on the OSI model:
1) Session Layer, 2) Presentation Layer, and 3) Application Layer.

35) How can you identify the IP class of a given IP


address?
By looking at the first octet of any given IP address, you can identify
whether it’s Class A, B, or C. If the first octet begins with a 0 bit, that
address is Class A. If it begins with bits 10 then that address is a Class B
address. If it begins with 110, then it’s a Class C network.

36) What is the main purpose of OSPF?


OSPF, or Open Shortest Path First, is a link-state routing protocol that
uses routing tables to determine the best possible path for data
exchange.

37) What are firewalls?


Firewalls serve to protect an internal network from external attacks.
These external threats can be hackers who want to steal data or
computer viruses that can wipe out data in an instant. It also prevents
other users from external networks from gaining access to the private
network.

38) Describe star topology


Star topology consists of a central hub that connects to nodes. This is
one of the easiest to set up and maintain.
Star Topology
Advantages:

Here are pros/benefits of start topology:

 Easy to troubleshoot, set up, and modify.


 Only those nodes are affected, that has failed. Other nodes still
work.
 Fast performance with few nodes and very low network traffic.
 In Star topology, addition, deletion, and moving of the devices are
easy.

Disadvantages:

Here are cons/drawbacks of using Star:

 If the Hub or concentrator fails, attached nodes are disabled.


 The cost of installation of star topology is costly.
 Heavy network traffic can sometimes slow the bus considerably.
 Performance depends on the Hub’s capacity
 A damaged cable or lack of proper termination may bring the
network down.
39) What are gateways?
Gateways provide connectivity between two or more network
segments. It is usually a computer that runs the gateway software and
provides translation services. This translation is key in allowing different
systems to communicate on the network.

40) What is the disadvantage of a star topology?


One major disadvantage of star topology is that once the central Hub or
switch gets damaged, the entire network becomes unusable.

41) What is SLIP?


SLIP, or Serial Line Interface Protocol, is an old protocol developed
during the early UNIX days. This is one of the protocols that are used for
remote access.

42) Give some examples of private network addresses.


10.0.0.0 with a subnet mask of 255.0.0.0172.16.0.0 with subnet mask of
255.240.0.0192.168.0.0 with subnet mask of 255.255.0.0

43) What is tracert?


Tracert is a Windows utility program that can use to trace the route
taken by data from the router to the destination network. It also shows
the number of hops taken during the entire transmission route.

44) What are the functions of a network administrator?


A network administrator has many responsibilities that can be
summarized into 3 key functions: installation of a network, a
configuration of network settings, and maintenance/troubleshooting of
networks.
45) What is the main disadvantage of a peer to peer
network?
Accessing the resources that are shared by one of the workstations on
the network takes a performance hit.

46) What is a Hybrid Network?


A hybrid network is a network setup that makes use of both client-
server and peer-to-peer architecture.

47) What is DHCP?


DHCP is short for Dynamic Host Configuration Protocol. Its main task is
to assign an IP address to devices across the network automatically. It
first checks for the next available address not yet taken by any device,
then assigns this to a network device.

48) What is the main job of the ARP?


The main task of the ARP or Address Resolution Protocol is to map a
known IP address to a MAC layer address.

49) What is TCP/IP?


TCP/IP is short for Transmission Control Protocol / Internet Protocol.
This is a set of protocol layers that is designed to make data exchange
possible on different types of computer networks, also known as a
heterogeneous network.

50) How can you manage a network using a router?


Routers have a built-in console that lets you configure different settings,
like security and data logging. You can assign restrictions to computers,
such as what resources it is allowed access or what particular time of
the day, they can browse the Internet. You can even put restrictions on
what websites are not viewable across the entire network.
51) What protocol can be applied when you want to
transfer files between different platforms, such as UNIX
systems and Windows servers?
Use FTP (File Transfer Protocol) for file transfers between such different
servers. This is possible because FTP is platform-independent.

52) What is the use of a default gateway?


Default gateways provide means for the local networks to connect to
the external network. The default gateway for connecting to the
external network is usually the address of the external router port.

53) What can be considered as good passwords?


Good passwords are made up of not just letters, but by combining
letters and numbers. A password that combines uppercase and
lowercase letters is favorable than one that uses all upper case or all
lower-case letters. Passwords must be not words that can easily be
guessed by hackers, such as dates, names, favorites, etc. Longer
passwords are also better than short ones.

54) What is the proper termination rate for UTP cables?


The proper termination for unshielded twisted pair network cable is 100
ohms.

55) What is netstat?


Netstat is a command-line utility program. It provides useful
information about the current TCP/IP settings of a connection.

56) What is the number of network IDs in a Class C


network?
For a Class C network, the number of usable Network ID bits is 21. The
number of possible network IDs is 2 raised to 21 or 2,097,152. The
number of host IDs per network ID is 2 raised to 8 minus 2, or 254.

57) What happens when you use cables longer than the
prescribed length?
Cables that are too long would result in signal loss. It means that data
transmission and reception would be affected because the signal
degrades over length.

58) What common software problems can lead to


network defects?
Software related problems can be any or a combination of the
following:

 Client-server problems
 Application conflicts
 Error in configuration
 Protocol mismatch
 Security issues
 User policy and rights issues

59) What is ICMP?


ICMP is an Internet Control Message Protocol. It provides messaging and
communication for protocols within the TCP/IP stack. This is also the
protocol that manages error messages that are used by network tools
such as PING.

60) What is Ping?


Ping is a utility program that allows you to check connectivity between
network devices on the network. You can ping a device by using its IP
address or device name, such as a computer name.
61) What is peer to peer?

P2P Network
Peer to peer (P2P) are networks that do not rely on a server. All PCs on
this network act as individual workstations.

62) What is DNS?


DNS is the Domain Name System. The main function of this network
service is to provide host names to TCP/IP address resolution.

63) What advantages does fiber optics have over other


media?
One major advantage of fiber optics is that it is less susceptible to
electrical interference. It also supports higher bandwidth, meaning
more data can be transmitted and received. Signal degrading is also
very minimal over long distances.

64) What is the difference between a hub and a switch?


Here is the major difference between Hub and switch:

Hub Switch
A hub operates on the physical layer. A switch operates on the data link layer.
Hubs perform frame flooding that can be It performs broadcast, then the unicast a
unicast, multicast, or broadcast. needed.
Just a singular domain of collision is
Varied ports have separate collision dom
present in a hub.
The transmission mode is Half-duplex The transmission mode is Full duplex
Hubs operate as a Layer 1 device per the Network switches help you to operate at
OSI model. OSI model.
To connect a network of personal
computers should be joined through a Allow connecting multiple devices and po
central hub.
Uses electrical signal orbits Uses frame & packet
Does not offer Spanning-Tree Multiple Spanning-Tree is possible
Collisions occur mostly in setups using
No collisions occur in a full-duplex switch
hubs.
Hub is a passive device A switch is an active device
Switches use CAM (Content Accessible Me
A network hub can’t store MAC addresses. be accessed by ASIC (Application Specific
Chips).
Not an intelligent device Intelligent device
Its speed is up to 10 Mbps 10/100 Mbps, 1 Gbps, 10 Gbps
Does not use software Has software for administration

65) What are the different network protocols that are


supported by Windows RRAS services?
There are three main network protocols supported: NetBEUI, TCP/IP,
and IPX.

66) What are the maximum networks and hosts in class


A, B, and C network?
For Class A, there are 126 possible networks and 16,777,214 hosts. For
Class B, there are 16,384 possible networks and 65,534 hosts. For Class
C, there are 2,097,152 possible networks and 254 hosts

67) What is the standard color sequence of a straight-


through cable?
Orange/white, orange, green/white, blue, blue/white, green,
brown/white, brown.

68) What protocols fall under the Application layer of the


TCP/IP stack?
The following are the protocols under the TCP/IP Application layer: FTP,
TFTP, Telnet, and SMTP.

69) You need to connect two computers for file sharing.


Is it possible to do this without using a hub or a router?
Yes, you can connect two computers, using only one cable. A crossover
type cable can be used in this scenario. In this setup, the data transmit
pin of one cable is connected to the data receive pin of the other cable,
and vice versa.

70) What is ipconfig?


Ipconfig is a utility program that is commonly used to identify the
addresses information of a computer on a network. It can show the
physical address as well as the IP address.

71) What is the difference between a straight-through


and crossover cable?
A straight-through cable is used to connect computers to a switch, hub,
or router. A crossover cable is used to connect two similar devices, such
as a PC to PC or Hub, to the Hub.
72) What is the client/server?
Client/server is a type of network wherein one or more computers act as
servers. Servers provide a centralized repository of resources such as
printers and files. Clients refer to a workstation that accesses the server.

73) Describe networking.


Networking refers to the interconnection between computers and
peripherals for data communication. Networking can be done using
wired cabling or through a wireless link.

74) When you move the NIC cards from one PC to another
PC, does the MAC address gets transferred as well?
Yes, that’s because MAC addresses are hard-wired into the NIC circuitry,
not the PC. This also means that a PC can have a different MAC address
when another one replaced the NIC card.

75) Explain clustering support


Clustering support refers to the ability of a network operating system to
connect multiple servers in a fault-tolerant group. The main purpose of
this is the if one server fails, all processing will continue with the next
server in the cluster.

76) Where is the best place to install an Anti-virus


program?
An anti-virus program must be installed on all servers and workstations
to ensure protection. That’s because individual users can access any
workstation and introduce a computer virus. You can plug in their
removable hard drives or flash drives.

77) Describe Ethernet


.

Ethernet is one of the popular networking technologies used these days.


It was developed during the early 1970s and is based on specifications,
as stated in the IEEE. Ethernet is used in local area networks.

78) What are some drawbacks of implementing a ring


topology?
In case one workstation on the network suffers a malfunction, it can
bring down the entire network. Another drawback is that when there
are adjustments and reconfigurations needed to be performed on a
particular network, the entire network must be temporarily brought
down.

79) What is the difference between CSMA/CD and


CSMA/CA?
CSMA/CD, or Collision Detect, retransmits data frames whenever a
collision occurred. CSMA/CA, or Collision Avoidance, will first broadcast
intent to send prior to data transmission.

80) What is SMTP?


SMTP is short for Simple Mail Transfer Protocol. This protocol deals with
all internal mail and provides the necessary mail delivery services on the
TCP/IP protocol stack.

81) What is multicast routing?


Multicast routing is a targeted form of broadcasting that sends a
message to a selected group of the user instead of sending it to all users
on a subnet.

82) What is the importance of Encryption on a network?


Encryption is the process of translating information into a code that is
unreadable by the user. It is then translated back or decrypted back to
its normal readable format using a secret key or password. Encryption
ensures that information that is intercepted halfway would remain
unreadable because the user must have the correct password or key for
it.

83) How are IP addresses arranged and displayed?


IP addresses are displayed as a series of four decimal numbers that are
separated by period or dots. Another term for this arrangement is the
dotted-decimal format. An example is 192.168.101.2

84) Explain the importance of authentication.


Authentication is the process of verifying a user’s credentials before he
can log into the network. It is normally performed using a username and
password. This provides a secure means of limiting access from
unwanted intruders on the network.

85) What is meaning by tunnel mode?


This is a mode of data exchange wherein two communicating
computers do not use IPsec themselves. Instead, the gateway that is
connecting their LANs to the transit network creates a virtual tunnel. So,
it uses the IPsec protocol to secure all communication that passes
through it.

86) What are the different technologies involved in


establishing WAN links?
 Analog connections – using conventional telephone lines
 Digital connections – using digital-grade telephone lines
 Switched connections – using multiple sets of links between the
sender and receiver to move data.
87) Explain Mesh Topology
The mesh topology has a unique network design in which each
computer on the network connects to every other. It is developing a P2P
(point-to-point) connection between all the devices of the network. It
offers a high level of redundancy, so even if one network cable fails,
data still has an alternative path to reach its destination.

Types of Mesh Topology:

Partial Mesh Topology: In this type of topology, most of the devices are
connected almost similarly as full topology. The only difference is that
few devices are connected with just two or three devices.

Partially Connected Mesh Topology


Full Mesh Topology: In this topology, every node or device are directly
connected with each other.
Fully Connected Mesh Topology

88) When troubleshooting computer network problems,


what common hardware-related problems can occur?
A large percentage of a network is made up of hardware. Problems in
these areas can range from malfunctioning hard drives, broken NICs,
and even hardware startups. Incorrect hardware configuration is also
one of those culprits to look into.

89) How can you fix signal attenuation problems?


A common way of dealing with such a problem is to use repeaters and
hubs because it will help regenerate the signal and therefore prevent
signal loss. Checking if cables are properly terminated is also a must.

90) How does dynamic host configuration protocol aid in


network administration?
Instead of having to visit each client computer to configure a static IP
address, the network administrator can apply dynamic host
configuration protocol to create a pool of IP addresses known as scopes
that can be dynamically assigned to clients.

91) Explain profile in terms of networking concepts


Profiles are the configuration settings made for each user. A profile may
be created that puts a user in a group, for example.

92) What is sneakernet?


Sneakernet is believed to be the earliest form of networking wherein
data is physically transported using removable media, such as disk,
tapes.

93) What is the role of the IEEE in computer networking?


IEEE, or the Institute of Electrical and Electronics Engineers, is an
organization composed of engineers that issues and manages standards
for electrical and electronic devices. This includes networking devices,
network interfaces, cablings, and connectors.

94) What protocols fall under the TCP/IP Internet Layer?


There are 4 protocols that are being managed by this layer. These are
ICMP, IGMP, IP, and ARP.

95) When it comes to networking, what are rights?


Rights refer to the authorized permission to perform specific actions on
the network. Each user on the network can be assigned individual
rights, depending on what must be allowed for that user.

96) What is one basic requirement for establishing


VLANs?
A VLAN is required because at the switch level. There is only one
broadcast domain. It means whenever a new user is connected to
switch. This information is spread throughout the network. VLAN on
switch helps to create a separate broadcast domain at the switch level.
It is used for security purposes.

97) What is IPv6?


IPv6, or Internet Protocol version 6, was developed to replace IPv4. At
present, IPv4 is being used to control internet traffic but is expected to
get saturated in the near future. IPv6 was designed to overcome this
limitation.

98) What is the RSA algorithm?


RSA is short for the Rivest-Shamir-Adleman algorithm. It is the most
commonly used public-key encryption algorithm in use today.

99) What is mesh topology?


Mesh topology is a setup wherein each device is connected directly to
every other device on the network. Consequently, it requires that each
device has at least two network connections.

100) what is the maximum segment length of a 100Base-


FX network?
The maximum allowable length for a network segment using 100Base-
FX is 412 meters. The maximum length for the entire network is 5
kilometers.

101) What is the 5-4-3 rule, and in which architecture is it


used?
The 5-4-3 rule is used in 10Base2 and 10Base5 Ethernet architectures. In
this rule, there can be a maximum of five segments in a network
connected with four repeaters. Out of these five segments, only three
segments can be populated with nodes.

102) What is the difference between TCP and UDP?


Here are some major differences between TCP and UDP protocols:

TCP UDP
It is a connection-oriented protocol. It is a connectionless protocol.
UDP messages contain packets t
TCP reads data as streams of bytes, and the
one by one. It also checks for int
message is transmitted to segment boundaries.
arrival time.
TCP messages make their way across the Internet It is not connection-based, so on
from one computer to another. send lots of packets to another.
UDP protocol has no fixed order
TCP rearranges data packets in the specific order.
packets are independent of each
The speed for TCP is slower. UDP is faster as error recovery is
Header size is 20 bytes The header size is 8 bytes.
TCP is heavy-weight. TCP needs three packets to
UDP is lightweight. There are no
set up a socket connection before any user data
connections, ordering of messag
can be sent.
TCP does error checking and also makes error UDP performs error checking, bu
recovery. erroneous packets.
Acknowledgment segments No Acknowledgment segments
Using handshake protocol like SYN, SYN-ACK, ACK No handshake (so connectionles
TCP is reliable as it guarantees delivery of data to The delivery of data to the destin
the destination router. guaranteed in UDP.
TCP offers extensive error checking mechanisms
UDP has just a single error check
because it provides flow control and
that is used for checksums.
acknowledgment of data.

103) What are the important elements of the protocol?


Here, are three most important elements of the protocol:
 Syntax: It is the format of the data. It is an order the data is
displayed.
 Semantics: It describes the meaning of the bits in each section.
 Timing: What time the data is to be sent and how fast it is to be
sent.

104) What is the maximum segment length of a 100Base-


FX network?
The maximum length for a network segment using 100Base-FX is 412
meters.

105) What is a Decoder?


The decoder is a type of circuit that converts the encoded data to its
original format. It also converts the digital signal into an analog signal.

106) What is Brouter?


Brouter is also known as Bridge Router. It is a device that acts as both a
bridge and a router. As a bridge can forwards data between the
networks. It also routes the data to specified systems within a network.

107) How to use VPN?


By using a Virtual Private Network (VPN), users can connect to the
organization’s network. Corporate companies, educational institutions,
government offices.

108) Why the standard OSI model is known as 802.xx?


The OSI model was started in February 1980. In 802.XX, ’80’ stands for
the year 1980, and ‘2’ represents the month of February.

109) What is NVT (Network Virtual Terminal)?


NVT is a set of pre-defined rules to very simple virtual terminal
interaction. This terminal helps you to start a Telnet session.

110) What is the source route?


The source route is a sequence of IP addresses that helps you to identify
the route a datagram. You can include the source route in the IP
datagram header.

111) Explain the term Pipelining


Pipelining describes the sequencing of processes. When any new task
begins before an ongoing task is finished, it is called sequencing.

112) Which measurement unit is used to measure the


transmission speed of Ethernet?
The transmission speed of Ethernet is mostly measured in Mbps.

113) What is the maximum length of Thinnet cable?


The length of the Thinnet cable is 185 meters.

114) Which cable is also called as the RG8 cable?


Thicknet cable is also called as the RG8 cable.

115) Is coaxial cable still used in the computer network?


No, Nowadays, coaxial cable no longer used in a computer network.

116) Which cable uses the RJ11 connector?


Most of the telephone cable uses the RJ11 connector.

117) Explain Multi-homed Host


It is a host that has multiple network interfaces that multiple IP
addresses is called a Multi-homed Host.

118) Explain EGP


The full form of EGP is Exterior Gateway Protocol. It is the protocol of
the routers. It is the neighboring autonomous systems that help you to
identify the set of networks that you will able to reach within or via each
independent system.

119) Explain the term Passive Topology


When a computer in the network listen and receive the signal, they are
called passive topology.

120) What is the use of a Pseudo TTY?


It is a false terminal which allows you external machines to connect
through Telnet or log in. Without this, no connection can take place.

121) Explain Redirector


Redirector is a kind of software which intercepts file or prints I/O
requests and translates them into network requests. This component
comes under the presentation layer.

122) What Is TCP Three-Way Handshake?


TCP Three-Way Handshake
THREE-WAY handshake or a TCP 3-way handshake is a process that is
used in a TCP/IP network to make a connection between the server and
client. It is a three-step process that requires both the client and server
to exchange synchronization and acknowledgment packets before the
real data communication process starts.

123) What is a Hamming code?


Hamming code is a liner code that is useful for error detection up to two
immediate bit errors. It is capable of single-bit errors.

In Hamming code, the source encodes the message by adding


redundant bits in the message. These redundant bits are mostly
inserted and generated at certain positions in the message to
accomplish the error detection and correction process.

124) What is the Application of Hamming code?


Here are some common applications of using Hemming code:

 Satellites
 Computer Memory
 Modems
 PlasmaCAM
 Open connectors
 Shielding wire
 Embedded Processor
125) What are the benefits of the Hamming code?
Here, are important benefits of Hamming code

 The Hamming code method is effective on networks where the


data streams are given for the single-bit errors.
 Hamming code not only provides the detection of a bit error but
also helps you to indent bit containing error so that it can be
corrected.
 The ease of use of hamming codes makes it suitable for use in
computer memory and single-error correction.

126) What is a MAC Address?


MAC address is a unique identifier that is assigned to a NIC (Network
Interface Controller/ Card). It consists of a 48 bit or 64-bit address,
which is associated with the network adapter. MAC address can be in
hexadecimal format. The full form of MAC address is Media Access
Control address.

127) Why Use MAC Address?


Here are the important reasons for using MAC address:

 It provides a secure way to find senders or receivers in the


network.
 MAC address helps you to prevent unwanted network access.
 MAC address is a unique number. Hence it can be used to track the
device.
 Wi-Fi networks at the airport use the MAC address of a specific
device in order to identify it.

128) What are the types of MAC Addresses?


Here are the important types of MAC addresses:
 Universally Administered AddressUAA(Universally Administered
Address) is the most used type of MAC address. It is given to the
network adapter at the time of manufacturing.
 Locally Administered AddressLAA (Locally Administered Address)
is an address that changes the MAC address of the adapter. You
may assign this address to a device used by network
administrator.

129) What are the important differences between MAC


address and IP address
Here, are some difference between MAC and IP address:

MAC IP address
The MAC address stands for Media Access Control
IP address stands for Internet Pr
Address.
It consists of a 48-bit address. It consists of a 32-bit address.
MAC address works at the link layer of the OSI IP address works at the network
model. model.
It is referred to as a physical address. It is referred to as a logical addre
You can retrieve the MAC address of any device You can retrieve the MAC addres
using ARP protocol. RARP protocol.
Classes are not used in MAC address. In IP, IPv4 uses A, B, C, D, and E c

130) What is an Analog Signal?


Analog Signal
Analog signal is a continuous signal in which one time-varying quantity
represents another time-based variable. These kind of signals works
with physical values and natural phenomena such as earthquake,
frequency, volcano, speed of wind, weight, lighting, etc.

131) What is a Digital Signal?


Digital Signal
A digital signal is a signal that is used to represent data as a sequence of
separate values at any point in time. It can only take on one of a fixed
number of values. This type of signal represents a real number within a
constant range of values.

132) What are the differences between analog and digital


signal?
Here are the main differences between Analog and Digital Signal:

Analog Digital
An analog signal is a continuous signal that Digital signals are time separated sig
represents physical measurements. generated using digital modulation.
It is denoted by sine waves It is denoted by square waves.
It uses a continuous range of values that help The Digital signal uses discrete 0 and
you to represent information. information.
The analog signal bandwidth is low The digital signal bandwidth is high
Analog hardware never offers flexible Digital hardware offers flexibility in
implementation. implementation.
It is suited for audio and video transmission. It is suited for Computing and digita
The Analog signal doesn’t offer any fixed range. Digital signal has a finite number, i.e

133) What is MAN?

MAN network
A Metropolitan Area Network or MAN is consisting of a computer
network across an entire city, college campus, or a small region. This
type of network is large than a LAN, which is mostly limited to a single
building or site. Depending upon the type of configuration, this type of
network allows you to cover an area from several miles to tens of miles.

134) What is Modem?


A modem (modulator-demodulator) is a device that modulates an
analog signal to digital information. It also decodes carrier signals to
demodulates the transmitted information.

The main aim of the Modem is to produce a signal that can be


transmitted easily and decoded to reproduce the digital data in its
original form. Modems are also used for transmitting analog signals,
from Light Emitting Diodes (LED) to radio.
Modem

135) What are the advantages of a Modem?


Here, are pros/advantage of Modem:

 More useful in connecting LAN with the Internet


 Speed depends on the cost
 The Modem is the most widely used data communication
roadway.

14) What is NIC?

o NIC stands for Network Interface Card. It is a peripheral card


attached to the PC to connect to a network. Every NIC has its own
MAC address that identifies the PC on the network.
o It provides a wireless connection to a local area network.
o NICs were mainly used in desktop computers.

15) What is the meaning of 10Base-T?


It is used to specify data transfer rate. In 10Base-T, 10 specify the data
transfer rate, i.e., 10Mbps. The word Base specifies the baseband as
opposed to broadband. T specifies the type of the cable which is a twisted
pair.
16) What is NOS in computer networking?

o NOS stands for Network Operating System. It is specialized software


which is used to provide network connectivity to a computer to
make communication possible with other computers and connected
devices.
o NOS is the software which allows the device to communicate, share
files with other devices.
o The first network operating system was Novel NetWare released in
1983. Some other examples of NOS are Windows 2000, Windows XP,
Linux, etc.

17) What are the different types of networks?


Networks can be divided on the basis of area of distribution. For example:

o PAN (Personal Area Network): Its range limit is up to 10 meters.


It is created for personal use. Generally, personal devices are
connected to this network. For example computers, telephones, fax,
printers, etc.
o LAN (Local Area Network): It is used for a small geographical
location like office, hospital, school, etc.
o HAN (House Area Network): It is actually a LAN that is used
within a house and used to connect homely devices like personal
computers, phones, printers, etc.
o CAN (Campus Area Network): It is a connection of devices within
a campus area which links to other departments of the organization
within the same campus.
o MAN (Metropolitan Area Network): It is used to connect the
devices which span to large cities like metropolitan cities over a
wide geographical area.
o WAN (Wide Area Network): It is used over a wide geographical
location that may range to connect cities and countries.
o GAN (Global Area Network): It uses satellites to connect devices
over global are.
18) What is POP3?
POP3 stands for Post Office Protocol version3. POP is responsible for
accessing the mail service on a client machine. POP3 works on two models
such as Delete mode and Keep mode.

19) What do you understand by MAC address?


MAC stands for Media Access Control. It is the address of the device at the
Media Access Control Layer of Network Architecture. It is a unique address
means no two devices can have same MAC addresses.

20) What is IP address?


IP address is a unique 32 bit software address of a computer in a network
system.

21) What is private IP address?


There are three ranges of IP addresses that have been reserved for IP
addresses. They are not valid for use on the internet. If you want to
access internet on these private IPs, you must have to use proxy server or
NAT server.

22) What is public IP address?


A public IP address is an address taken by the Internet Service Provider
which facilitates you to communication on the internet.

23) What is APIPA?


APIPA is an acronym stands for Automatic Private IP Addressing. This
feature is generally found in Microsoft operating system.
24) What is the full form of ADS?

o ADS stands for Active Directory Structure.


o ADS is a microsoft technology used to manage the computers and
other devices.
o ADS allows the network administrators to manage the domains,
users and objects within the network.
o ADS consists of three main tiers:
o Domain: Users that use the same database will be grouped
into a single domain.
o Tree: Multiple domains can be grouped into a single tree.
o Forest: Multiple trees can be grouped into a single forest.

25) What is RAID?


RAID is a method to provide Fault Tolerance by using multiple Hard Disc
Drives.

26) What is anonymous FTP?


Anonymous FTP is used to grant users access to files in public servers.
Users which are allowed access to data in these servers do not need to
identify themselves, but instead log in as an anonymous guest.

27) What is protocol?


A protocol is a set of rules which is used to govern all the aspects of
information communication.

28) What are the main elements of a protocol?


The main elements of a protocol are:

o Syntax: It specifies the structure or format of the data. It also


specifies the order in which they are presented.
o Semantics: It specifies the meaning of each section of bits.
o Timing: Timing specifies two characteristics: When data should be
sent and how fast it can be sent.

29 What is the Domain Name System?


There are two types of client/server programs. First is directly used by the
users and the second supports application programs.

The Domain Name System is the second type supporting program that is
used by other programs such as to find the IP address of an e-mail
recipient.

30) What is link?


A link is connectivity between two devices which includes the cables and
protocols used in order to make communication between devices.

31)What is OSI Model?


OSI Model is Open system interconnection or OSI Model was first proposed
by international standard organization to solve the multiple problem faced
in interconnection.

It is a conceptual model of telecommunication networking where the all


process divided in seven effective layers .it synchronizes the whole
process and help one understand interoperation of the diverse
communication system under the standard protocol .the seven layer we
taking about are abstract layer and layer are connected to either one or
two layers depending on potision.

31) How many layers are in OSI reference model?


OSI reference model: OSI reference model is an ISO standard which
defines a networking framework for implementing the protocols in seven
layers. These seven layers can be grouped into three categories:
o Network layer: Layer 1, Layer 2 and layer 3 are the network
layers.
o Transport layer: Layer 4 is a transport layer.
o Application layer. Layer 5, Layer 6 and Layer 7 are the application
layers.

There are 7 layers in the OSI reference model.

1. Physical Layer

o It is the lowest layer of the OSI reference model.


o This layer is primary modal of osi model and consist of connecting
device, such as Ethernet cable, token ring, hub, repeater, and
electrical specification for data connection.
o This layer is responsible for connecting the device to physical
transmission media such as copper or optical cable radio frequency
or pulses of infrared. When we work at physical layer data is
transmitted Through electric voltage radio frequency or pulses.

2. Datalink Layer

o It is used for transferring the data from one node to another node.
o It receives the data from the network layer and converts the data
into data frames and then attach the physical address to these
frames which are sent to the physical layer.
o It enables the error-free transfer of data from one node to another
node.
Functions of Data-link layer:
o Frame synchronization: Data-link layer converts the data into
frames, and it ensures that the destination must recognize the
starting and ending of each frame.
o Flow control: Data-link layer controls the data flow within the
network.
o Error control: It detects and corrects the error occurred during the
transmission from source to destination.
o Addressing: Data-link layer attach the physical address with the
data frames so that the individual machines can be easily identified.
o Link management: Data-link layer manages the initiation,
maintenance and, termination of the link between the source and
destination for the effective exchange of data.

3. Network Layer

o Network layer converts the logical address into the physical


address.
o It provides the routing concept means it searching the best route for
the packet to travel from source to the destination.
Functions of network layer:
o Routing: The network layer determines the best route from source
to destination. This function is known as routing.
o Logical addressing: The network layer defines the addressing
scheme to identify each device uniquely.
o Packetizing: The network layer receives the data from the upper
layer and converts the data into packets. This process is known as
packetizing.
o Internetworking: The network layer provides the logical
connection between the different types of networks for forming a
bigger network.
o Fragmentation: It is a process of dividing the packets into the
fragments.

4. Transport Layer

o Transport layer is to be responsible for deliver the entire massage


from source to destination and receiving data without any error.
different transport protocol may support a range of optional
capabilities including error recovery, flow control and support for re
– transmission.
o There are some protocol work at layer like UDP (user data
protocol),TCP (Transfer control protocol) and also SPX ( sequential
packet Exchange)
o It provides two kinds of services:
o Connection-oriented transmission: In this transmission,
the receiver sends the acknowledgement to the sender after
the packet has been received.
o Connectionless transmission: In this transmission, the
receiver does not send the acknowledgement to the sender.
o Some of protocol work at this layer. Ip(internet
protocol) ,ICMP( internet control massage protocol) ,

5. Session Layer

o The main responsibility of the session layer it is sole capacity of


managing and terminating connection and helping to establish
connection between local and remote application .it is also as 5
layer of osi model.
o It builds to support multiple type of network that can be created
dynamically and run over individual network.
o Session layer also reports the error coming from the upper layers.
o Ther are several protocol used in session layer like Real-time Transport
Control Protocol (RTCP), Point-to-Point Tunnelling Protocol (PPTP), AppleTalk
Data Stream Protocol (ADSP), Remote Procedure Call Protocol (RPC),
Password Authentication Protocol (PAP), Sockets Direct Protocol (SDP), and
Internet Storage Name Service (iSNS).

o RTCP: It is an abbreviation for Real-time Transport Control Protocol.


It is used to provide audio and video over the Internet. Basically, it
periodically transmits control packets to all participants in the
session. It provides feedback on QoS (Quality of Service) to all
participants in the session. It is used in video conferencing,
television services, etc.
o PPTP: It is the full form of Point-to-Point Tunneling Protocol. This is
the technology used to implement VPN. With the help of PPTP, data
can be transmitted securely from one node to another through a
tunnel.
o PAP: It is an abbreviation for Password Authentication Protocol. The
point-to-point protocol uses it to authenticate the user. It takes care
of whether the user is authentic or not and then grants access. It
works in such a way that the user will enter the id and password,
then after the authentication, the server will reply with a
confirmation. It is a weak type of authentication system as it is
highly vulnerable to attackers.
o ADSP: It is an abbreviation for AppleTalk Data Stream Protocol. It is
a networking protocol that was introduced 38 years ago, in 1985,
and was created for Apple Macintosh networks. It allows users to
share printers and folders for access by other network users.
o RPC: It is an abbreviation for Remote Procedure Call Protocol. It
helps in communication between processes that are residing in
different systems connected over a network. It helps one program to
request a service from another program located on another
computer on a network. The processes that are communicating do
not need to comprehend the details of the network.
o iSNS: It is an abbreviation for Internet Storage Name Service. It
manages and configures Fibre Channel and iSCSI devices. This
protocol is used by many platforms.
o SDP: It is an abbreviation for Sockets Direct Protocol. It is a
standard wire protocol that supports stream sockets on RDMA
(Remote Direct Memory Access) fabrics.

6. Presentation Layer

The presentation layer of the OSI model is responsible for translating, encrypting,
and compressing data within the model. It is responsible for integrating all data
formats into acceptable and compatible formats.

What protocols are used in the presentation layer?


The presentation layer is known as a translator because it converts data from a
complex format into one that the application layer understands. Presentation layer
protocols include MIDI, MPEG, TDI, TLS, XDR, and HTTP/ HTML.

What are the three functions of the presentation layer?


The three main functions of the presentation layer are data encryption and
decryption, data translation, and data compression. These functions allow the data
to be compatible, acceptable, and secure.
7. Application Layer

o Application layer enables the user to access the network.


o It is the topmost layer of the OSI reference model.
o Application layer protocols are file transfer protocol (FTP), simple
mail transfer protocol (SMTP), domain name system, etc.
o The most widely used application protocol is HTTP (Hypertext
transfer protocol). A user sends the request for the web page using
HTTP.

32) What is the usage of OSI physical layer?


The OSI physical layer is used to convert data bits into electrical signals
and vice versa. On this layer, network devices and cable types are
considered and setup.

33) Explain the functionality of OSI session layer?


OSI session layer provides the protocols and means for two devices on the
network to communicate with each other by holding a session. This layer
is responsible for setting up the session, managing information exchange
during the session, and tear-down process upon termination of the
session.

34) What is the maximum length allowed for a UTP cable?


The maximum length of UTP cable is 90 to 100 meters.

35) What is RIP?

o RIP stands for Routing Information Protocol. It is accessed by the


routers to send data from one network to another.
o RIP is a dynamic protocol which is used to find the best route from
source to the destination over a network by using the hop count
algorithm.
o Routers use this protocol to exchange the network topology
information.
o This protocol can be used by small or medium-sized networks.

36) What do you understand by TCP/IP?


TCP/IP is short for Transmission Control Protocol /Internet protocol. It is a
set of protocol layers that is designed for exchanging data on different
types of networks.

37) What is netstat?


The "netstat" is a command line utility program. It gives useful
information about the current TCP/IP setting of a connection.

What do netstat results mean?


The netstat command shows active network connections and displays information
about them. It includes the status of the connection, the networking protocol, local
and remote computer IP address, and more.

38) What do you understand by ping command?


The "ping" is a utility program that allows you to check the connectivity
between the network devices. You can ping devices using its IP address or
name.

39) What is Sneakernet?


Sneakernet is the earliest form of networking where the data is physically
transported using removable media.

40) Explain the peer-peer process.


The processes on each machine that communicate at a given layer are
called peer-peer process.

41) What is a congested switch?


A switch receives packets faster than the shared link. It can accommodate
and stores in its memory, for an extended period of time, then the switch
will eventually run out of buffer space, and some packets will have to be
dropped. This state is called a congested state.

42) What is multiplexing in networking?


In Networking, multiplexing is the set of techniques that is used to allow
the simultaneous transmission of multiple signals across a single data link.

43) What are the advantages of address sharing?


Address sharing provides security benefit instead of routing. That's
because host PCs on the Internet can only see the public IP address of the
external interface on the computer that provides address translation and
not the private IP addresses on the internal network.

44) What is RSA Algorithm?


RSA is short for Rivest-Shamir-Adleman algorithm. It is mostly used for
public key encryption.

45) How many layers are in TCP/IP?


There are basic 4 layers in TCP/IP:

1. Application Layer
2. Transport Layer
3. Internet Layer
4. Network Layer
46) What is the difference between TCP/IP model and the OSI
model?
Following are the differences between the TCP/IP model and OSI model:

TCP/IP model OSI model

Full form of TCP is Full form of OSI is Open System


transmission control protocol. Interconnection.

TCP/IP has 4 layers. OSI has 7 layers.

TCP/IP is more reliable than OSI model is less reliable as


the OSI model. compared to the TCP/IP model.

TCP/IP model uses horizontal OSI model uses vertical approach.


approach.

TCP/IP model uses both OSI Reference model uses separate


session and presentation session and presentation layers.
layer in the application layer.

TCP/IP model developed the OSI model developed the model first
protocols first and then and then protocols.
model.

In Network layer, TCP/IP In the Network layer, the OSI model


model supports only supports both connection-oriented
connectionless and connectionless communication.
communication.

TCP/IP model is a protocol OSI model is a protocol independent.


dependent.

47) What is the difference between domain and workgroup?

Workgroup Domain

A workgroup is a peer-to-peer A domain is a Client/Server network.


computer network.

A Workgroup can consist of A domain can consist up to 2000


maximum 10 computers. computers.
Every user can manage the There is one administrator to
resources individually on their administer the domain and its
PCs. resources.

All the computers must be on The computer can be on any network


the same local area network. or anywhere in the world.

Each computer must be Any change made to the computer


changed manually. will reflect the changes to all the
computers.

Second Phase of Desktop Support


Engineer
6. How can I boot my computer into safe mode?

There are two methods for starting a system in safe mode. Close any open
programs and restart the computer. Press F8 several times as the OS begins
to boot. This will open a popup with the option to start in safe mode along
with several other booting options.

The run command can also be used to complete the task. To invoke the Run
command, simultaneously press the Windows key and R. Enter MSConfig into
the window after typing it. The safe boot options will be displayed in a
window. Restart the machine after selecting the basic setting. Your computer
will boot up in safe mode.

7. What exactly do you mean by group policy?

It is a feature of Windows Active Directory that gives the user and the user
accounts more control. They provide efficient access to all network users. It is
also used to provide a user's security and network rules.

You can use it to manage certain operations like stopping the user from
logging out, executing a command, accessing the control panel, etc.

8. Describe VPN Server.

A private server is the Virtual Private Network (VPN) server. Government


agencies, businesses, and other organizations frequently use it to have
private communications over local or public networks. It functions as a safe
conduit between your device and the internet. They guard against
censorship, surveillance, and other forms of interference with the web flow.
You can browse the internet anonymously by concealing your IP address and
location. Your communication is encrypted, and you may rapidly stream all of
your favorite stuff.

9. What differentiates a parallel transmission from a serial transmission?

Serial Transmission Parallel Transmission

Bit by bit, data travels through this transmission One byte of data is transmitted through
in both directions. line at a time.

It is cost-effective. This is relatively pricey.

Bits are transported one at a time. The transmission moves slowly.

8 bits of data are sent at a time. The transmission moves quickly

It is used for transmissions across smal


utilized for long-distance transfers, such as
distances, including those from a comp
those between computers.
printer.

It simply requires one channel for


Multiple communication routes are requ
communication.

For the purpose of transforming the signals as


Converters are not required.
needed, converters are required.

It connects the data in series using a D-shaped There are 17 signal lines and 8 ground
9-pin cable. the 25-pin port

10. What is Active Directory?

Active Directory is directory services which develop by Microsoft for


managing and organizing network resource’s its share information about the
user computer and other network recourses object in hierarchical structure.
for instance, it helps manage use authentication and access to share
resource’s

Related Article: Azure Active Directory

11. What OS knowledge do you have?

An application uses the operating system as a user interface and as an


interpreter between the computer hardware and the programme. Windows
95, Windows 98, Windows ME, etc., are examples of simple operating
systems, whereas Windows MT, Windows 2000, Windows 2003, etc., are
examples of network operating systems.

12. Do you know what Firewire Ports are?

It is an external port, much like a USB port. Firewire ports enable a quick
connection between a computer and a peripheral device. It has a 400 MBPS
data transfer rate. It is simple to recognize and frequently seen in external
storage devices, coupled with video and audio equipment.

Unless the device is compatible with USB 3.0, always choose Firewire when
you have a device that supports both USB and Firewire. Split connections and
ad hoc networks can both be established using it. However, because of USB
3.0, Firewire ports are no longer often used.

13. What exactly are a desktop support engineer's responsibilities?

The following are some of the primary duties of a desktop support engineer:

 Perfectly installing the OS.


 preserving every installed OS.
 updating each of them and installing new software.
 Sync up distant desktops.
 Use antivirus software to scan the OS to guard against virus threats
routinely.
 managing the backup and recovery processes in their entirety.
 routinely maintaining and optimizing the OS.

14. What does "Blue Screen of Death" mean exactly?

This error screen appears on the computer after a fatal system error or a
system crash, such as:

 Excessive processing and CPU use.


 Memory error
 Installing flawed software.
The operating system can no longer function reliably, so to speak. However,
the error can be fixed by cleaning the RAM chip, and if it persists, check it on
another machine to determine whether the problem is with RAM. Each fault
on the Blue Screen of Death has a specific code. Simply copy it, look it up on
Google, or talk to someone who is familiar with it.

15. What is the difference between rights, policy, and permissions?

On network resources like printers, files, and folders, permissions are


assigned. Active Directory containers like Domain, Site, OU, etc. are given a
policy. Users and groups have rights.

Desktop Support Interview Questions for Experienced

16. Can Hard Disk be changed to Dynamic? If yes, how?

Yes. Launch the Run window after logging in with the administrator account.
In it, type the diskmgmt.msc command. A new window will open up after you
hit enter. To switch to the Dynamic hard disc option, right-click the Basic hard
disc option.

17. What is DHCP, and how does it function?

To facilitate communication between several computers on a network and


other IP networks, the Dynamic Host Setup Protocol (DHCP) is used to
dynamically assign IP addresses and other network configuration parameters
to the computers.

This enables the PCs to join a network with a unique IP address each time.
18. Is a Default Gateway truly required?

A routing device called a default gateway is used to route ignored traffic to


the local area subnet. Having a default gateway is not required. You don't
need to provide a router if your network is without one.

You only utilize the default gateway address when attempting to connect to a
computer on a different network. You will encounter an error notice if you
attempt to connect to other networks without it.

19. What distinguishes OST files from PST files?

OST Files PST Files

This folder is for offline storage. It's a personal or online storage folder.

Even when Outlook is online, these can be


It is used for locally kept data and files.
utilized

Only the Microsoft Exchange server is Although it is not advised, PST files can
supported by OST. utilized with an Exchange configuration

These files provide offline users with the ability These features are not available for the
to browse, read, compose, and reply to emails.

To export the OST mailbox as PST files, follow these steps.

 Choosing the files option.


 Click on import and export after going to open and export.
 Next, select the Export a file option.
 Select the Microsoft Exchange server, then select Next once again.
 Click next after choosing the folder you wish to export.
 To save the new PST file, select a location.
 Select the duplicate item alternatives.
 Finish

To store OST files as PST, use archiving.

 Start Outlook and choose an option from the file menu.


 Click on auto-archive settings after selecting the advanced option.
 Choose how frequently to execute the auto-archiving.
 Choose the folder where the archived files will be saved and offer the
options for archiving.
 You're done when you click OK.

Without needing server connectivity or an Exchange profile, OST files can be


converted to PST files using a professional solution.

20. What do you mean by "Windows Cannot Connect For Updates"?

There are often two causes for this error:

 either as a result of damaged, absent, or destroyed files, or


 if the update services are not active.

The user has two options when this mistake occurs: either they can fix it
themselves, or they may report it to Microsoft. Launch the Run command,
and type services.msc into it, then press Enter to start fixing the problem
yourself. Locate the Windows updating option in the new window and use the
right-click menu to pick properties.

Enter "enable" in the start-up blank, then click "start." Once you click OK, the
problem will be fixed.

21. Why is clustering beneficial?

When two or more computers cooperate as a single system and share


resources, this is known as clustering.

It offers two key benefits:

 Clustering enables customers to use an alternative server in the event


that one server fails since multiple servers are used.
 In order to balance the demand on the servers, it automatically assigns
the user to the server with the lowest load.

22. What is the best technique to connect to the client from the server when it is
in a different place?

It is possible to connect to the client from a different location than the server
using the MSTSC command or Remote Desktop Connection. You can use
another person's computer as if you were sitting right next to it, but you need
to either know the distant computer's IP address or be on the same network.

Start the Run Window and enter the command mstsc /v: COMPUTER /f, where
V stands for the remote computer and f stands for full screen. Next, click.

You can alternatively type mstsc and press Input to launch the Remote
Desktop dialogue box, where you can enter the computer's name or IP
address to log in.

23. What is the use of the ‘IPCONFIG’ command?

A console program called IPCONFIG is made to run from the Windows


command prompt. It offers a variety of command line options.

 Ipconfig provides a brief overview of the network adapter's


configuration data, including a gateway, IP address, subnet mask, etc.
 The comprehensive information about network devices, including DNS,
MAC address, gateway, subnet mask, DHCP, IP address, etc, is
displayed by ipconfig /all.
 Using release/ipconfig, the network adapter's IP address is made
available. Most network adapters that receive their IP addresses from
DHCP servers use it.
 With ipconfig /renew, the IP address is refreshed.
 The content of the DNS Resolver Cache is seen with ipconfig
/displaydns.
 The DNS Resolver Cache is cleared with ipconfig /flushdns.
 The detailed command usage information is displayed using the
ipconfig /? command.

24. List the differences between a forest and a tree.

Tree Forest

It is a collection of trees that share a


It is a collection of domains that are connected
configuration but not a name for a cont
by a common namespace.
place.

Every Tree has a different name. Forests do not require names.

In a forest, there is a transitive and bidirectional One or more trees in a forest don't crea
bond of trust between every tree. continuous namespace.
A forest can be made up of just one tree, and For the purposes of building trust relati
each tree there can exist independently. trees in a forest constitute a hierarchy.

25. What is the NTLDR Error?

This error frequently happens when the computer tries to boot from a flash
drive or hard drive that isn't a bootable source. This error can occasionally
also be brought on by corrupt files, loose IDE connectors, obsolete BIOS,
corrupt hard drives, and issues with OS upgrades.

To resolve this problem, take the following actions:

 Start up your computer. If the errType is an anomaly, it will be


corrected.
 Check your floppy drive and optical disc.
 Take away any external drives.
 Verify the BIOS settings for each drive to ensure they are accurate.
 Use the original Windows CD to restore the critical system files.
 Repair or Replace the boot.ini file.
 Create a fresh boot sector for a Windows partition.
 Windows master boot record repair
 Reset all internal data and power cables.
 Your motherboard's BIOS should be updated.
 Your OS installation has to be fixed.
 Perform a fresh OS installation.

26. What is the child domain and what makes it unique from a tree domain?

In the DNS hierarchy, a child domain is a smaller domain that is a part of a


larger domain. It might be pronounced as a different name for the
subdomain.

Child Domain Tree Domain

A network domain's child domains are logically A tree domain is a collection of domains
grouped together under their parent domain. make up the structure of an active dire

A tree domain's subdomains are all me


It is a child domain of another domain.
the same DNS.

It falls under another domain. It consists of various domains.

When a domain is utilized as a particular The parent-child domain's structure affe


domain, it is referred to as a child domain. the tree domain is organized.

27. Can a system be added to a domain? If so, how?

A system can only be added to a domain if you have administrator access or


something similar.
To join a domain, perform the following:

 the control panel, go there.


 system and security options.
 Toggle the system on.
 Navigate to Workgroup Settings, Computer Name, and Domain.
 Change settings by selecting.
 Select change under the Computer Name tab.
 Under the Member Of option, select Domain.
 The domain name that you want the system to join should be typed in.
 Click "Ok," then repeat the process.
 System restart.

After the computer reboots, your system will join the domain.

28. What is the difference between DC and ADC?

The domain controller, or DC, is a computer running MS Windows or NT that


answers to requests for user ID and password security authentication inside
of a Windows Server domain. It is in charge of giving the host access to
Windows domain resources.

The extra domain controller serves as the primary domain controller's


backup. While DC has all five operational responsibilities, including Domain
Name Master and Schema Master, ADC only has three, namely RID Master,
PDC Emulator, and Infrastructure Master.

29. When my computer turns on or reboots, how can I access my desktop


without logging in?

You can do it by taking the actions listed below:

 Fire up Run Window.


 For Windows 10 and manage userpasswords2 for all previous Windows
versions, type netplwiz.
 Your browser will open the User Accounts window. Here, you may
manage their many features and attributes. Next, select the Users Tab.
 To use, users must enter their username and password. By default, this
Computer is selected; uncheck it.
 Select a user account to automatically log in after a restart.
 Enter the password and user name.
 Select OK.

That's it. The following time you restart the computer, you will immediately
log in to the selected account's desktop.

30. How is crossover different from Ethernet cables?

It is difficult to determine the difference between the Ethernet cable and the
Crossover cable because they both have similar appearances. They have the
same number of pins and a similar design since they are intended to be used
in the same port. They are distinct, though, and have colored labels on their
pins that are set up differently.

31. Can Outlook create a backup of your emails?

Yes. Go to the mail option in the control panel after opening it. Click to open
the personal folder after opening the data file there and selecting it. To take
a backup of your emails, copy.pst and paste it where you need to.

32. What do you mean by "reservation"?

Some computer systems or network hardware requires a specific IP address.


In those circumstances, reservations are established for that specific machine
in the DHCP server. It blocks other systems from using them and grants that
specific IP address access to that specific system.

Here are the components of a reservation:

 A reservation name is something the administrators give to a


reservation.
 A client's IP address.
 The client's Media Access Control (MAC) address.
 The administration gives the label.
 DHCP Reservation, the Boot Protocol, or both.

33. What distinguishes differential backup from incremental backup?

Differential Backup Incremental Backup

Whether incremental or full, they back


Only files that have changed since the most
data that has changed since the previo
recent full backup are backed up.
backup.

Let's say you made a backup of five 40 MB files


on Monday. You modify two lines in one file on The incremental backup in the identica
Tuesday. The 40 MB file containing the circumstance will only back up the data
modifications will be backed as part of the to those two lines.
differential back.

The entire backup size will therefore be given in These outperform a full backup in spee
bytes. flexibility.

Until the full backup, you can run them


These are both much smaller and faster than
daily. You can run them virtually every
differential backup.
because they are so little.

34. Do you know what the Syswow64 folder is?


Similar to the System32 folder in the 32-bit OS, this folder is frequently
encountered in the 64-bit OS. It is a valid file that uses 32-bit files on the 64-
bit OS while managing 64-bit files on the Windows operating system.

However, occasionally it consumes a lot of memory and system resources,


slowing the machine down and leading to the assumption that it is a virus.

35.

36. Can 50 PCs with the same configuration have the same OS installed?

Yes, you can use the Windows Deployment Service to accomplish this. WDS
enables users to complete a network-based Windows OS installation. It
lessens the expense and difficulty of performing manual OS installations on
several computers.

With WDS, you won't need any physical support like Windows DVDs or USB
drives to format any number of new computers—just plug in the Ethernet.

To use WDS, you need three things:

 Services for Active Directory Domains.


 On the server, at least one partition needs to be formatted as NTFS.
 The IP address of the WDS client must be assigned to one live DHCP
server.

Both the server and clients must have a boot OS image and network bootable
NIC configurations. The OS will be installed on all PCs by restarting the
system.

Desktop Support FAQs

37. What is the role of a desktop support engineer?

The role of Desktop Support Engineer mainly involves resolving computer


systems and software issues. They also assist in the updation, installation,
troubleshooting, and maintenance of systems.

38. What skills are required for a Desktop Support Engineer?

A successful Desktop Support Engineer possesses a good combination of


technical and interpersonal skills. Some worthwhile skills may include:

 Knowledge of software and hardware.


 Proficiency in software support tools.
 Knowledge of troubleshooting, ethernet, and IP configuration of
networks.
 Customer service best practices.
39. Is desktop support a good career?

Yes, desktop support is a good career choice for many people. This is an ideal
job to get into big tech. It acts as a stepping stone to getting into the
technical side.

40. Help Desk vs. Desktop Support

Desktop support is a specialized service. While a help desk can resolve a


variety of IT problems, desktop support is limited to fixing computer issues.

Tips to clear Desktop Support Interview

Research the company: This is not an option! It's important to have a


fundamental understanding of the company you are interviewing with.

Analyze the job description: Be sure to take note of the primary focus
areas of the position you applied for along with the firm you are researching.
Make a list of the reasons why you believe you can perform these specific
tasks after thoroughly reading the job description.

Brush up on basics: You can expect some challenging questions


regardless of your level of experience. If you are a beginner, review the
basics of your subject. In the case of experienced professionals, be sure to
communicate your ideas clearly.

Prepare for potential interview questions: Most interviews involve


many common questions. Make a list of potential questions about the job
profile, background, company, etc., and be ready with answers in advance.

Customize your answers: When asked about a particular skill set, avoid
using the same response for every company you apply to. Instead, prepare a
list of how your skills might help the company and the position for which you
are interviewing.

4. What do you mean by "Safe Mode"?

Windows has a feature called Safe Mode that may be used to scan the OS
and clean it of any adware. It is also used to configure applications and
troubleshoot driver issues. In contrast to normal mode, it enables you to run
diagnostics and uninstall unwanted apps from the OS.

uestion 1: A user reports that their computer is running slowly. Upon


investigation, you notice that the computer’s hard drive is almost full. What
steps would you take to resolve the issue?
Answer: I would first try to determine what files or programs are taking up the most
space on the hard drive. I would use a disk cleanup tool to remove unnecessary files
and programs. If the user has important files that they cannot delete, I would suggest
moving them to an external hard drive or cloud storage. Additionally, I would
recommend the user to regularly clean up their computer and remove unnecessary
files to avoid future issues.

Question 2: A user reports that their printer is not working. Upon inspection,
you find that the printer is not connected to the computer. What steps would
you take to resolve the issue?

Answer: I would first check that the printer is powered on and properly connected to
the computer. If it is not connected, I would connect it and try to print a test page to
ensure that the printer is working. If the printer is still not working, I would check the
printer drivers and reinstall them if necessary. I would also ensure that the correct
printer is selected in the print dialog box.

Question 3: A user reports that they cannot access the internet. What steps
would you take to resolve the issue?

Answer: I would first check that the computer is connected to the internet and that
there are no issues with the network. If the network is working, I would check the
browser settings to ensure that the user is not using a proxy server. If that doesn’t
resolve the issue, I would check the DNS settings and flush the DNS cache. I would
also check the firewall settings to ensure that they are not blocking internet access.

Question 4: A user reports that they are unable to access a shared drive on the
network. What steps would you take to resolve the issue?

Answer: I would first check that the user has the necessary permissions to access
the shared drive. If the user has the correct permissions, I would check that the
shared drive is properly connected and that there are no network issues. I would also
ensure that the user is using the correct username and password to access the
drive. If necessary, I would map the shared drive to the user’s computer to make it
easier to access.

Question 5: A user reports that their computer is not turning on. What steps
would you take to resolve the issue?

Answer: I would first check that the computer is properly plugged in and that there
are no issues with the power outlet. If the computer is still not turning on, I would
check the power supply and ensure that it is working properly. If the power supply is
functioning correctly, I would check the motherboard and RAM to ensure that there
are no hardware issues. If necessary, I would replace any faulty hardware
components.

Question 6: A user reports that their computer is infected with malware. What
steps would you take to resolve the issue?
Answer: I would first disconnect the computer from the network to prevent the
further spread of the malware. I would then run a malware scan using an antivirus
program and remove any detected threats. If the malware is persistent, I would boot
the computer into Safe Mode and run another scan. I would also ensure that the user
is educated on safe browsing practices to prevent future infections.

Question 7: A user reports that their computer is displaying a blue screen


error. What steps would you take to resolve the issue?

Answer: I would first try to determine the error message displayed on the blue
screen. If it is a known error, I would look up the solution online and follow the
recommended steps. If it is an unknown error, I would try to determine if any recent
changes were made to the computer, such as software updates or new hardware
installations. I would also check the computer’s hardware components, such as the
RAM or hard drive, to ensure that there are no issues. If necessary, I would perform
a system restore or reinstall the operating system.

Question 8: A user reports that they are unable to open a specific application.
What steps would you take to resolve the issue?

Answer: I would first try to determine if the application is installed correctly and up-
to-date. If it is, I would try to repair the application using the built-in repair tool or
reinstall it if necessary. I would also check the computer’s security settings to ensure
that the application is not being blocked by a firewall or antivirus program. If
necessary, I would contact the application’s support team for further assistance.

Question 9: A user reports that their computer is overheating and shutting


down. What steps would you take to resolve the issue?

Answer: I would first ensure that the computer’s fans are functioning correctly and
are not blocked by dust or debris. If the fans are working properly, I would check the
computer’s temperature using a software tool and monitor it while the computer is in
use. If the temperature is consistently high, I would recommend the user to clean the
computer’s internals or replace any faulty components, such as the CPU or GPU.

Question 10: A user reports that they are unable to send or receive emails.
What steps would you take to resolve the issue?

Answer: I would first check that the user’s email account is properly configured in
their email client and that there are no issues with the email server. If the email client
is properly configured and the server is working correctly, I would check the user’s
internet connection and firewall settings to ensure that they are not blocking email
traffic. If necessary, I would contact the email provider for further assistance.

Question 11: A user reports that their computer is running very slow. What
steps would you take to resolve the issue?

Answer: I would first check the computer’s performance using a software tool and
identify any resource-intensive applications or processes. I would then try to optimize
the computer’s performance by closing unnecessary applications, disabling startup
programs, and performing disk cleanup. If necessary, I would upgrade the
computer’s hardware components, such as the RAM or hard drive.

Question 12: A user reports that they are unable to connect to the internet.
What steps would you take to resolve the issue?

Answer: I would first check the user’s internet connection and verify that their
network adapter is functioning correctly. I would then check the computer’s IP
address and DNS settings and ensure that they are properly configured. If
necessary, I would reset the network settings, update the network adapter driver, or
contact the internet service provider for further assistance.

Question 13: A user reports that they are unable to print from their computer.
What steps would you take to resolve the issue?

Answer: I would first check that the printer is properly connected to the computer
and that its drivers are up-to-date. I would then check the printer’s queue and ensure
that there are no print jobs stuck in the queue. If necessary, I would clear the queue
and restart the print spooler service. If the issue persists, I would check the printer’s
hardware components, such as the ink cartridges or paper trays.

Question 14: A user reports that they are unable to access a specific website.
What steps would you take to resolve the issue?

Answer: I would first check that the user’s internet connection is working correctly
and that there are no issues with the website’s server. I would then check the user’s
browser settings and ensure that the website is not blocked by a firewall or antivirus
program. If necessary, I would clear the browser’s cache and cookies or try
accessing the website using a different browser.

Question 15: A user reports that their computer is displaying a “low disk
space” warning. What steps would you take to resolve the issue?

Answer: I would first check the computer’s storage capacity and identify any large or
unnecessary files that can be deleted. I would then perform a disk cleanup to clear
temporary files and free up space. If necessary, I would transfer files to an external
hard drive or upgrade the computer’s storage capacity.

Question 16: A user reports that they are unable to access a shared folder on
the network. What steps would you take to resolve the issue?

Answer: I would first check the user’s network connection and verify that they are
authorized to access the shared folder. I would then check the computer hosting of
the shared folder and ensure that it is properly configured and accessible. If
necessary, I would check the network’s firewall settings or contact the network
administrator for further assistance.

Question 17: A user reports that they are unable to hear sound from their
computer. What steps would you take to resolve the issue?
Answer: I would first check the computer’s volume settings and ensure that the
speakers or headphones are properly connected. I would then check the computer’s
sound drivers and ensure that they are up-to-date. If necessary, I would troubleshoot
the audio hardware components, such as the speakers or sound card.

Question 18: A user reports that their computer is displaying a “no boot
device” error. What steps would you take to resolve the issue?

Answer: I would first check the computer’s boot order in the BIOS and ensure that
the correct device is selected as the primary boot device. I would then check the
computer’s hard drive and ensure that it is properly connected and detected by the
BIOS. If necessary, I would try to repair the computer’s startup files using a Windows
recovery tool or reinstall the operating system.

Question 19: A user reports that their computer is not responding to any input.
What steps would you take to resolve the issue?

Answer: I would first check if the computer is frozen by trying to open the task
manager using the keyboard shortcut or by pressing CTRL + ALT + DELETE. If the
task manager opens, I would check the performance and identify any resource-
intensive applications or processes. If the computer is completely unresponsive, I
would try to force shut down the computer using the power button and perform a
system restore or repair.

Question 20: A user reports that their computer is restarting unexpectedly.


What steps would you take to resolve the issue?

Answer: I would first check the computer’s event log and identify any errors or
warnings related to the restart. I would then check the computer’s hardware
components, such as the RAM or power supply, and ensure that they are properly
connected and functioning correctly. If necessary, I would update the computer’s
drivers and perform a virus scan to identify any malware that may be causing the
issue.

Question 21: A user reports that they are unable to log in to their computer.
What steps would you take to resolve the issue?

Answer: I would first verify that the user is entering the correct username and
password. If the login credentials are correct, I would check the computer’s network
connection and ensure that it is properly configured. If necessary, I would try to log in
using a different account or perform a password reset.

Question 22: A user reports that their computer is displaying a blue screen
error. What steps would you take to resolve the issue?

Answer: I would first check the error code displayed on the blue screen and
research it online to identify the cause. I would then check the computer’s hardware
components, such as the RAM or hard drive, and ensure that they are properly
connected and functioning correctly. If necessary, I would try to update the
computer’s drivers or perform a system restore to a previous working state.
Question 23: A user reports that their computer is running very slow. What
steps would you take to resolve the issue?

Answer: I would first check the computer’s resource usage using the task manager
and identify any resource-intensive applications or processes. I would then perform a
virus scan and remove any malware that may be causing the issue. If necessary, I
would try to upgrade the computer’s hardware components, such as the RAM or
hard drive, or optimize the computer’s settings to improve performance.

Question 24: A user reports that they are unable to access a particular
website. What steps would you take to resolve the issue?

Answer: I would first check if the website is accessible from other devices on the
same network. If the website is inaccessible on all devices, I would check the
computer’s network connection and ensure that it is properly configured. If
necessary, I would try to flush the computer’s DNS cache or reset the computer’s
network settings. If the issue persists, I would contact the website’s administrator or
internet service provider for further assistance.

Question 25: A user reports that they are unable to print from their computer.
What steps would you take to resolve the issue?

Answer: I would first check if the printer is properly connected to the computer and
turned on. I would then check the printer’s status in the control panel and ensure that
it is set as the default printer. If necessary, I would try to reinstall the printer drivers
or perform a printer self-test to identify any hardware issues.

Basic Interview Questions


26. Differentiate between an ‘A’ record and an ‘MX’ record in DNS.

An ‘A’ record, also known as a host record, is used to map a domain name to an IP
address. It allows DNS servers to locate a website or other services using its IP
address. An ‘MX’ record, also known as a mail exchanger record, is used to specify
the mail server responsible for accepting email messages on behalf of a domain. It
allows email to be delivered to the correct mail server.

27. What does IPCONFIG command do?

The IPCONFIG command displays the IP address, subnet mask, and default
gateway for a network adapter on a computer. It can also be used to release and
renew DHCP leases and flush the DNS resolver cache.

28. If switches are not available, how can two computers be connected?

If switches are not available, two computers can be connected using a crossover
cable. A crossover cable is a type of Ethernet cable that allows two devices to
communicate directly without the need for a switch.

29. Define the term Domain in network administration.


In network administration, a domain is a logical group of network resources that
share a common directory database. A domain can include user accounts, computer
accounts, and other resources such as printers and network shares. It allows for
centralized management of network resources and simplifies user and computer
authentication and access control.

30. How would you restore data if your system is infected with a virus?

To restore data after a virus infection, you would need to install a new hard drive with
the latest anti-virus software and an operating system with all the latest updates.
Next, connect the infected hard drive as a secondary drive and scan it with the anti-
virus software to remove the virus. Finally, copy the files from the infected hard drive
to the new hard drive.

31. How do you assist users in setting up and configuring new hardware and software?

When assisting with new hardware setup, I would carefully follow the manufacturer’s
instructions and ensure all connections are made correctly. For software
installations, I will either use a standardized image with pre-installed software or
guide the user through the installation process step by step, ensuring they
understand each stage of the setup.

32. What are the different kinds of operating systems, or O.S.?

I would first check if there is power to the system and if the power cable is securely
plugged in. If there’s power, then I would look for any error messages or beeps
during boot-up, indicating hardware issues. If no errors are visible, then I would boot
the system into safe mode to identify if a software or driver issue is causing the
problem. Based on my observations, will proceed with appropriate repairs or
escalate the issue if needed.

33. What is the RAS server?

A Remote Access Server (RAS) enables users to remotely access network


resources over a communication link, such as a phone line or the internet. It allows
users to access resources such as files, printers, and databases on a remote
network as if they were directly connected to it.

34. What exactly is a VPN server?

A Virtual Private Network (VPN) server is a secure communication network that


allows users to connect to a private network over the internet. It provides a secure
way to access resources on a private network from a remote location, such as a
home office or a public Wi-Fi hotspot.

35. What is the distinction between a RAS server and a VPN server?

A RAS server allows remote users to access network resources over a


communication link, while a VPN server creates a secure connection between
remote users and a private network over the internet. A RAS server typically uses
dial-up connections, while a VPN server uses internet connections.
36. What exactly is an IAS server?

An Internet Authentication Service (IAS) server is a Microsoft Windows Server


component that provides authentication and authorization for network access. It
supports various types of network access, including remote access, wireless access,
and authenticating switches.

37. What is the use of a Ping Command?

The Ping command is a network troubleshooting tool that sends an ICMP Echo
Request message to a target device and waits for an ICMP Echo Reply message. It
measures the round-trip time for packets to travel from the source device to the
target device and back, allowing network administrators to test network connectivity
and identify network problems.

38. What exactly do you mean when you say clustering? What are the advantages?

Clustering is the process of connecting two or more computers to work together as a


single system. It is used to improve system performance, provide fault tolerance, and
increase scalability. Clustering provides several advantages, including load
balancing, high availability, and easy maintenance.

39. What is the definition of a group?

In computer networks, a group is a collection of user accounts that share common


permissions, privileges, and access rights. It simplifies network administration by
allowing administrators to assign permissions to a group instead of to individual user
accounts.

40. What is the definition of a child domain?

In Windows Server Active Directory, a child domain is a subdomain of a parent


domain. It inherits the security policies and settings of the parent domain but can
have its own organizational structure, policies, and permissions. Child domains can
help to organize resources and simplify administration in large network
environments.

41. What advantages can be obtained from implementing a child domain?

Having a low network traffic


Reducing administrative costs
Creating a defensible perimeter
42. What does the term OU mean in Active Directory?

OU stands for Organizational Unit and it’s a container in Active Directory used to
hold users, groups, and machines. It is the smallest unit where a group policy can be
applied by an administrator.

43. What is the definition of group policy and what is it used for?

Group policy is used to set security and network settings for users on a network. It
provides an expedited access for all users and allows for the control of some
functions such as preventing users from shutting down the system, accessing the
control panel, or running certain commands.

44. In terms of Active Directory, what is the difference between policy, rights, and permission?

Policy is used in Active Directory to refer to settings at the site, domain, and OU
levels. Rights are given to users and groups, while permissions are granted to
network resources like files, folders, and printers.

45. What do DC and ADC abbreviations stand for in Active Directory?

DC stands for Domain Controller, which is a server that verifies security information
like user ID and password. ADC stands for Additional Domain Controller, which is a
backup for the domain controller.

46. What is the main difference between a Domain Controller and an Additional Domain
Controller in Active Directory?

The main difference between a DC and ADC is that the former has all five
operational roles, while the latter only has three.

47. What are the operational roles of a Domain Controller and an Additional Domain Controller
in Active Directory?

DC has the following operational roles: Master of Domain Naming, Master Schema,
Master RID, Emulator for PDC, and Master of Infrastructure. ADC has the following
operational roles: Emulator for PDC, Master RID, and Master of Infrastructure.

48. What is the definition of a Default Gateway?

A Default Gateway is the IP address of the network router. Whenever a user wants
to connect to a different network or cannot find their own, their inquiry will be sent to
the Default Gateway.

49. What are the steps to create a backup of emails in Microsoft Outlook?

To create a backup in MS Outlook, go to the Control Panel, select the Mail option,
open the data file, pick Personal Folder, and click Open Folder. Then, copy the .pst
file and paste it to the desired backup location.

50. What is the difference between a trusting and a trusted domain?


In a trusting domain, resources are available, while in a trusted domain, a user’s
account is available.

51. What is the BUS speed?

The BUS speed is the rate of communication between the microprocessor and the
RAM.

52. What is the term used to refer to Active Directory Partitions?

Active Directory partitions are divided into three categories: Schema partition,
Configuration partition, and Domain partition.

53. What is the primary difference between a Gateway and a Router?

A Gateway uses a different network architecture than a Router, which uses the same
one.

54. What does a packet consist of?

A packet is a logical grouping of data that includes a header with location

55. Define SCSI and its functionality.

SCSI stands for Small Computer System Interface, which is a standard interface that
enables personal computers to communicate with peripheral devices like printers,
CD-ROM drives, disc drives, and tape drives. Data transfer rates are typically fast
with SCSI.

56. How are IP addresses categorized, and what are their respective ranges?

There are five classes of IP addresses, namely Class A, B, C, D, and E. The ranges
for each class are as follows: Class A – 0 to 126 (127 is reserved for loopback);
Class B – 128 to 191; Class C – 192 to 223; Class D – 224 to 239; and Class E –
240 to 255.

57. What is the meaning of FIXMBR?

FIXMBR is a repair program that fixes the Master Boot Record of the Partition Boot
Sector.

58. What is SID an abbreviation for?

SID stands for Security Identifier, which is a unique ID assigned to each computer
entity.

59. Differentiate incremental and differential backups.

Incremental backups only back up data that has changed since the last backup,
while differential backups select only files that have changed since the previous
backup. Incremental backups back up the changed data corresponding to each file,
whereas differential backups back up the entire changed file.

60. How does a server operating system differ from a desktop operating system?

Server operating systems allow for centralised user administration, shared


resources, and enhanced security features, while desktop operating systems only
allow for local administration.

61. Explain the difference between MSI and EXE files.

MSI (Microsoft Installer) is a single-file installation, uninstallation, and repair


software. On the other hand, EXE files require two files for installation and
uninstallation. MSI prompts users to uninstall the existing software first before
installing the new one, whereas EXE can detect the existing software version and
give users the option to uninstall it.

62. What is BSOD, and how can it be resolved?

BSOD stands for Blue Screen Of Death, which occurs when the operating system or
hardware fails, resulting in a blue screen with a code. Restarting the computer
usually resolves the issue, but starting the computer in safe mode can also help.

63. What is the PTR record, and how is it related to the ‘A’ record?

PTR (Program Trouble Record) is the reverse lookup record that checks if a server
name is associated with an IP address. It is also known as a pointer record or
Reverse DNS record. The ‘A’ record is the forward lookup record that checks if a
name is associated with an IP address.

64. What is a reservation in the context of DHCP server?

In a DHCP server, a reservation is used when certain network equipment or


computer systems require a specific IP address. A reservation is made for that
computer system in the DHCP server, giving it exclusive access to that IP address
and preventing other computers from using it.

65. What distinguishes an SMTP server from a POP server?

SMTP (Simple Mail Transfer Protocol) is used for sending mail, while POP (Post
Office Protocol) is used for receiving mail.

66. What is RIS, and why is it used?

RIS (Remote Installation Services) is used to transfer a Windows server image to


new hardware. RIS is used because installing the OS from a CD every time is time-
consuming.

67. What is the bootloader, and what is its function?


The bootloader facilitates the installation of the operating system on the computer. It
makes the booting process easier and provides users with the option to choose the
operating system when starting the computer.

68. What is the purpose of Domain Name System (DNS) and how does it work?

DNS, or Domain Name System, is responsible for translating domain names into IP
addresses and vice versa. It serves as a translator for computers by allowing them to
communicate using numerical IP addresses instead of domain names. For example,
when you type “hotmail.com” into your browser, DNS will convert it into an IP
address that your computer can use to access the website.

69. What is a Blue Screen of Death (BSOD) and how can you troubleshoot it?

A Blue Screen of Death (BSOD) is a system error that causes your computer to
crash and display a blue screen with an error message. To troubleshoot a BSOD,
start by checking your computer’s RAM and booting into safe mode. It’s also
recommended to run an antivirus scan and update your drivers with software
approved by the motherboard or suggested by the manufacturer.

70. How can you convert a basic disk into a dynamic disk?

To convert a basic disk to a dynamic disk, open the Run dialog box and type
“diskmgmt.msc”. From there, select the basic disk you want to convert, right-click on
it, and choose the “Convert to Dynamic Disk” option.

71. What is the process for creating a Windows system service file?

Enabling Windows File Protection ensures that altering or deleting a system file that
does not have a file lock will result in Windows restoring the original file from a
cached folder containing backup copies of these files.

72. What is the difference between desktop support and help desk?

Desktop support involves on-site troubleshooting, while help desk support involves
remote troubleshooting for issues reported via phone or email.

73. How can you make desktop icons appear larger?

Right-click on the desktop, go to properties > appearance > effects, choose the
option to use a larger font, then click OK to apply the changes.
74. What is TFT?

TFT-LCD (Thin Film Transistor-Liquid Crystal Display) is a type of Liquid Crystal


Display that uses Thin-Film Transistor (TFT) technology to improve image quality.
TFT displays are often found in flat panel screens and projectors, and are rapidly
replacing CRT technology in computers.

75. What is an IP range on the networking side? How can Outlook problems be fixed? How can
LDAP be set up in Outlook?

An IP range is a range of IP addresses used by DHCP and address pools. To fix


Outlook problems, LDAP can be set up by going to Tools > Account Settings >
Address Books > New Address Book > selecting LDAP and entering server
information.

76. What is the best way to make desktop icons smaller or larger?

Right-click on the desktop, go to properties > appearance > advanced > scroll down
to “desktop” and click on “icons,” then increase the font size of the icons.

78. What is the most dependable method to access a client in a different location from the
server?

The most dependable method is to use Remote Desktop Connection (MSTSC) to


access the server from the client system, then remote access the other location’s
server from the server, and finally access the clients of that location.

79. What is the best way to install a pre-existing printer on a user’s computer?

Navigate to the control panel, then to the add hardware wizard. Insert the software
CD if required, otherwise, the system will install it automatically. Restart the
computer.

80. How can you reboot directly to your desktop without having to login every time?

Right-click on “My Computer” and select “Manage” > go to “Users and Groups” >
right-click on the user name and select “Set Password” > enter a password and click
OK. The computer will then boot directly to the desktop.

81. How can you check if the print spool is running, where is it located, and where does it store
spooled print jobs?

The print spool is a critical service in Windows that allows for printing on a local or
network printer. It can be checked by going to “Services” in the Control Panel. The
spooler files are located in the “system32\spool\PRINTERS” folder, and spooled print
jobs are stored in this folder as well.

82. What is a FireWire port and how does it work?

A FireWire port is a type of serial port that uses FireWire technology to transfer data
quickly between electronic devices. It can be used to connect a variety of different
devices, such as scanners to a computer system, and has a transmission rate of up
to 400Mbps.

83. What are the responsibilities of a Desktop Support Engineer?

A Desktop Support Engineer is responsible for maintaining all installed operating


systems, installing new software, connecting remote desktops, running regular
antivirus scans, managing backup and recovery operations, and optimizing and
maintaining operating systems.

84. What is the purpose of the IPCONFIG command?

The IPCONFIG command is used to provide network adapter configuration


information such as IP address, subnet mask, and gateway in a concise manner. It
also provides extensive network adapter information such as DNS, MAC address,
DHCP, and more when used with the /all command-line argument. Additionally, the
command can be used to release and renew IP addresses or display the DNS
resolver cache.

85. What are the components of a reservation?

A reservation typically includes a name assigned by administrators, an IP address


for the client, the media access control (MAC) address of the client, a description
assigned by administrators, and a boot protocol, DHCP reservation, or both.

86. What is meant by “reservation”?

In networking, reservation refers to the process of assigning a specific IP address to


a particular computer system or network device. This is done by creating an entry in
the Dynamic Host Configuration Protocol (DHCP) server, which grants access to that
system through that IP address and prevents other systems from accessing it.

87. How can you export the OST mailbox as PST files?

To export the OST mailbox as PST files, select the “Files” option in Outlook, navigate
to “Open & Export” and click “Import and Export”. Next, select “Export a file” and click
“Next”. Then, click on “Microsoft Exchange Server” and click “Next” again. Select the
folder that you want to export and click “Next”. Browse to select a location to save
the new PST file, choose the options for duplicate items, and click “Finish”.

88. How can you use Archiving to save OST files as PST?
To use Archiving to save OST files as PST, launch Outlook and select “Advanced
Options” from the file menu. Click on “AutoArchive Settings” and select the frequency
for running auto-archiving. Pick the folder for saving the archived files and provide
the options for archiving. Click “OK” to complete the process.

89. What is an NTLDR Error?

NTLDR error is an issue that commonly occurs when a computer attempts to boot
from a non-bootable flash drive or hard drive. It can also be caused by corrupt and
misconfigured hard drives, OS upgrade problems, obsolete BIOS, loose IDE
connectors, and corrupt files.

90. How can you fix an NTLDR Error?

To fix an NTLDR error, restart the system and check if the issue was a fluke. If the
error persists, check your optical disk and floppy drive, disconnect any external drive,
and check the settings of all drives in the BIOS to make sure they are correct.
Restore the important system files from the original Windows CD, replace or repair
the boot.ini file, write a new Windows partition boot sector, repair the master boot
record for Windows, reset all power cables and internal data, update the BIOS of
your motherboard, repair the installation of your OS, or perform a clean installation of
the OS.

91. How can the constant restarting of a system be fixed?

To correct the issue of a system that constantly restarts, there are a few options.
First, turn off the auto-restart feature by pressing the F8 key when the Windows logo
appears after turning on the computer. From the boot menu that displays on the
screen, select safe mode and open the Run Window. Then type sysdm.cp and click
OK. In the advanced tab of the Startup and Recovery section’s settings, uncheck the
Automatically Restart option box under System Failure and click OK to save
changes. Finally, delete problematic registry entries.

92. How can I bypass the login screen and go straight to my desktop on Windows?

To bypass the login screen and go straight to the desktop on Windows, launch the
Run Window and type netplwiz for Windows 10 or control userpasswords2 for other
versions of Windows. In the User Accounts window, go to the Users Tab and
uncheck the box beside “Users Must Enter A User Name And Password To Use This
Computer” option. Choose the account to log in automatically on reboot, enter the
username and password, and click OK. The system will log in to the desktop of the
chosen account directly on the next restart.

93. How can a system be added to a domain?

To add a system to a domain, go to the control panel, select system and security,
and click on the system. Then, go to Computer name, domain, and workgroup
settings and select change settings. In the Computer Name tab, select change, and
then click on Domain under the Member Of option. Type in the domain name that
you want the system to join, click OK, and then restart the system.
94. What is the difference between a RAS and a VPN Server?

RAS and VPN Servers are two different remote connection methods. RAS is an
industry-standard remote connection method that is meant for small networks, while
VPN is designed for medium and large-sized networks. RAS can be expensive,
unstable, and difficult to deal with, while VPN is extremely economical, stable, and
hassle-free to deal with.

95. What is a Parallel Port?

A parallel port is a female connector with 25 pins that transmits data in parallel. It
sends data in 8-bit increments and is faster than a serial port.

96. What is the purpose of a Serial Port?

A serial port is a male connector with 9 or 25 pins that sends data in a sequential
format. It transfers data one bit at a time, making it slower than a parallel port. Its
purpose is to provide a method of transferring data between devices one bit at a
time.

97. How can you modify folder permissions?

To change folder permissions, you can use Group Policy or do it locally with
Administrator Privileges. Go to the folder properties, select the Security tab, and click
on the Edit button. A pop-up will appear, allowing you to add users and grant them
Read, Write, Execute, or Full permissions.

98. What distinguishes a Switch from a Hub?

A Switch and a Hub have several key differences. While a Hub connects multiple
computers to a single network, a Switch divides the same network into multiple
segments. In addition, with a Hub, all computers linked to it receive data packets
simultaneously, causing latency issues. In contrast, a Switch can control this by
sending data packets only to the computers that have requested them.

99. How would you recover data from a virus-infected computer?

To recover data from a virus-infected computer, remove the hard drive and connect it
as a slave to a computer with the latest virus definitions, Microsoft patches, and
drivers. Scan the disk for viruses, remove them, and then extract the necessary data.

100. What is the difference between RAM and ROM?


RAM (Random Access Memory) is used to temporarily store data that the computer
is currently processing. It is volatile, meaning the data is lost when the computer is
turned off. On the other hand, ROM (Read-Only Memory) is a type of permanent
memory storage that contains essential data. The BIOS is an example of data stored
in ROM.

Important Question for Desktop


support Engineer…
 What is Active Directory and how does it work?
Active Directory (AD) is Microsoft's proprietary directory service. It runs on
Windows Server and enables administrators to manage permissions and access
to network resources. Active Directory stores data as objects.
As a database, Active Directory allows you to store user information such as emails,
phone numbers, and passwords. As a directory service, it allows users to
authenticate themselves to access a resource, and authorizes access for users in
the network itself.

What is APIPA and subnetting mask?


APIPA is automatic private internet protocol addressing .it is part of operating system
that allow automatically self-configuration IP and subnet mask. If DHCP server are
not reachable. APIPA range of predefine address 162,254,0,0 to 168,225,225,255
and automatic assign that address itself.
If I Talk about subnetting mask the purpose of subnetting mask identify which part of
network part and which part of host part.
Subnet mask is bit number which is used identify subnet mask of an address. Subnet
mask is Combination of 1s to 0s. where 1s is represented by network and subnet ID
While 0s is represented by host.

What s different between IP Address IP4 and IP6?


T

What is TCP/IP Protocol?


TCP/IP stand for transmission control protocol that is work transport layer of
protocol. which provide facility to transmit packet from source to destination. it is
connection oriented that it establishes host to host communication that occur
between computer device in network.
What is DARPA?
It is TCP/IP reference model is known DARPA Model. DARPA is stand for
defence advance research project agency. after us government agency that initially
developed it. It consists of four layers as opposed to the seven-layer open system
interconnection model. The four layers of TCP/IP reference model are.
1.Application layer 2. Transport layer 3. Internet layer 4. Network interface layer

What is Application layer?


Application layer is the top most layer of TCP/IP model. That used to create interface between user
and application. This layer performs all the task that are performed by the session layer, presentation
layer and application layer. The protocols used at application layer conveys the user request to
transport layer. These protocols help to transfer mail, sharing of file and terminal login.

What is Transport layer?


Transport layer is responsible to provides the reliable connection between two communication
devices. in which incoming data divided in to packet by transport layer and make an
acknowledgement when packet is received by the sender UDP and TCP/IP is protocol used as
transport layer.

Transport layer provides end to end connection to ensure that packet arrive in sequence and without
error.

What is internet layer?


Internet layer is also known as network layer that data is send accurately and faster by controlling
flow, routing traffic. If the network traffic is more than its take time to more to transfer data. The core
protocol internet layer includes IP (internet protocol), ARP (address resolution protocol), ICMP
(internet control massage protocol), IGMP (internet group management protocol).

What is Network access layer?


Network access layer is lowest layer of TCP/IP model. It is combination of data link layer and physical
layer in present in TCP/IP model. The main function of network access layer to Transfer information
from one computer to another computer That are connect to in the same network.

What is DNS?
DNS stand for domain name system is a Decentralized naming system and used by computer system
and other device over the internet .it is translating the domain name into Ip address and Ip address
into domain name.

What is different between static Ip Address


and Dynamic Address?
It is provided by ISP (Internet Service Provider). The static IP address does not change at IP any time,
which means if a static Ip address is provided then it can’t be changed or modified.

While it is provided by DHCP (Dynamic Host Configuration Protocol). dynamic IP addresses static
changes at any time.
What is Hamming code?
It is a set of error-correction codes that can be used to detect and correct the errors that can occur
when the data is moved or stored from the sender to the receiver.

What is Checksum?
It is more reliable than other modes of error detection, it uses a checksum generator on the sender
side and a checksum checker on the receiver side

What is subnetting?
Subnetting is technique which in computer network to divide a single network in to multiple smaller
networks is known as subnetting. The purpose of subnetting is partition a large network in to smaller
network that is more effective subnet which can improve network performance security and
organization

What is super netting?


Multiple smaller networks are combined to form a bigger network. It is mainly used in router
summarization, etc.

How TCP protocol provides reliability?


TCP is reliable as it uses checksum for error detection, attempts to recover lost or corrupted packets
by re-transmission, acknowledgment policy, and timers. It uses features like byte numbers and
sequence numbers and acknowledgment numbers so as to ensure reliability.

8.Write down the name of services provided by TCP?


 Process to process communication
 Stream orientation
 Full duplex service
 Multiplexing
 Reliability

24.Explain the process of three-way handshaking protocol?


Process of three-way handshaking protocol
 Step 1 (SYN): In the first step, the client wants to establish a connection with the server, so it
sends a segment with SYN (Synchronize Sequence Number) which informs the server that
the client is likely to start communication and with what sequence number it starts
segments.
 Step 2 (SYN + ACK): Server responds to the client request with the SYN-ACK signal bits set.
Acknowledgment (ACK) signifies the response of the segment it received and SYN signifies
with what sequence number it is likely to start the segment.
 Step 3 (ACK): In the final part, the client acknowledges the response of the server and they
both establish a reliable connection with which they will start the actual data transfer.

What is the protocol and port no of DNS?


 Protocol – TCP/UDP
 Port number- 53
What is different between TCP and UDP?
TCP is a connection-oriented protocol. Connection orientation means that the communicating
devices should establish a connection before transmitting data and should close the connection after
transmitting the data. TCP is reliable as it guarantees the delivery of data to the destination router.
TCP provides extensive error-checking mechanisms. It is because it provides flow control and
acknowledgment of data. TCP doesn’t support Broadcasting. TCP is used by HTTP, HTTPs, FTP, SMTP
and Telnet.
While UDP is the Datagram-oriented protocol. This is because there is no overhead for opening a
connection, maintaining a connection, or terminating a connection. UDP is efficient for broadcast and
multicast types of network transmission. The delivery of data to the destination cannot be
guaranteed in UDP.UDP has only the basic error-checking mechanism using checksums. No
acknowledgment segments. There is no sequencing of data in UDP. If the order is required, it has to
be managed by the application layer. UDP supports Broadcasting. it is used by DNS, DHCP, TFTP,
SNMP, RIP, and VoIP.

TCP (Transmission Control Protocol) is one of the main protocols of the Internet protocol suite. It lies
between the Application and Network Layers which are used in providing reliable delivery services. It
is a connection-oriented protocol for communications that helps in the exchange of messages
between different devices over a network. The Internet Protocol (IP), which establishes the
technique for sending data packets between computers, works with TCP.

Advantages of TCP

It is reliable for maintaining a connection between Sender and Receiver.

It is responsible for sending data in a particular sequence.

Its operations are not dependent on OS.

It allows and supports many routing protocols.

It can reduce the speed of data based on the speed of the receiver.

Disadvantages of TCP
It is slower than UDP and it takes more bandwidth.

Slower upon starting of transfer of a file.

Not suitable for LAN and PAN Networks.

It does not have a multicast or broadcast category.

It does not load the whole page if a single data of the page is missing.

User Datagram Protocol (UDP)


User Datagram Protocol (UDP) is a Transport Layer protocol. it is an unreliable and connectionless
protocol. So, there is no need to establish a connection before data transfer. The UDP helps to
establish low-latency and loss-tolerating connections establish over the network. The UDP enables
process-to-process communication.

Advantages of UDP
It does not require any connection for sending or receiving data.

Broadcast and Multicast are available in UDP.

UDP can operate on a large range of networks.

UDP has live and real-time data.

UDP can deliver data if all the components of the data are not complete.

Disadvantages of UDP

We cannot have any way to acknowledge the successful transfer of data.

UDP cannot have the mechanism to track the sequence of data.

UDP is connectionless, and due to this, it is unreliable to transfer data.

In case of a Collision, UDP packets are dropped by Routers in comparison to TCP.

UDP can drop packets in case of detection of errors.

Where TCP is Used?


 Sending Emails
 Transferring Files
 Web Browsing
Where UDP is Used?
 Gaming
 Video Streaming
 Online Video Chats

Network switches can operate in which layers?


Network switches can operate at data link layer or network layer. Data link layer forwards the data
based on the MAC address of of destination and network layer switches forwards the data based on
the destination of IP address.

What is meant by VLAN in terms of networking?


VLAN stands for Virtual Local Area Network. It is a virtualized connection that is used to connect
various devices in the one logical network that are in different LAN networks.

What is the maximum and minimum size of TCP


header?
The maximum size of TCP header is 60 bytes and minimum size is 20 bytes.

1. Which is faster: TCP or UDP?


UDP is faster than TCP. The reason for the faster UDP is its non-existent acknowledge packet (ACK)
which allows the streaming of continuous packets where as TCP always works on the
acknowledgment of a set of packets calculated with the help of TCP window size and Round Trip
Time (RTT).

2. Which is better for Video Conferencing?


Both Protocols, TCP and UDP have several practical uses in day-to-day life, but TCP has come as a
better solution nowadays in the modern era as a solution for this question of who is better at Video
Conferencing. The reason for this is because of the ability of UDP to order data correctly and it also
produces the output without error. TCP can also be used for Video Conferencing when we have to
focus more on quality rather than speed. UDP is generally used when speed matters most rather
than the quality of the product. Some data packets might be lost or somehow received out of order,
but UDP is more prominently used in the case of live streaming.

What is the Need of DNS?


Every host is identified by the IP address but remembering numbers is very difficult for people also
the IP addresses are not static therefore a mapping is required to change the domain name to the IP
address. So DNS is used to convert the domain name of the websites to their numerical IP address.

Types of Domains
There are various kinds of domain:

Generic domains: .com(commercial), .edu(educational), .mil(military), .org (nonprofit


organization), .net(similar to commercial) all these are generic domains.

Country domain: .in (India) .us .uk

Inverse domain: if we want to know what is the domain name of the website. Ip to domain name
mapping. So DNS can provide both the mapping for example to find the IP addresses of
geeksforgeeks.org then we have to type

Asked Questions on Microsoft Outlook


Q 1. How can I log in to my MS Outlook mail?
Ans. To login to the MS Outlook mail, visit Outlook.com and enter the email address
and password/phone number to access your account.
Q2
Q 2. What is the difference between Gmail and MS
Outlook mail?
Ans. Gmail does the work of sending and receiving mails, on the other hand, MS
Outlook mail acts as an email client which consumes the services of email service
provider.
Q3
Q 3. What are the limitations of using MS Outlook?
Ans. Following are the limitations of using MS Outlook:

 It is less flexible
 Information is saved on the Microsoft server
 There is a limitation to the number of emails that can be sent per day
 Financial Management – Prasanna Chandra
 Cost issues

Q4
Q 4. What is the file extension for an MS Outlook
file?
Ans. The extension for an MS Outlook file is ‘.pst’.
Q5
Q 5. Does MS Outlook have an option to manage and
schedule a timetable?
Ans. Yes, MS Outlook does have an option of Calendar, where the user can save
dates and schedule meetings and have easy access to them.
Q 5. How many type of version available in outlook ?

Version Specification

Outlook 97  Released on January 16, 1997


 It had replaced the existing Microsoft’s email clients including Exchange
Client, Schedule+ etc.

Outlook 98  Released on June 21, 1998


 It was freely distributed with books and magazines to cope up with the
latest Internet standard
 Involved usage of HTML mail

Outlook  Released on May 31, 2001


2002  Introduced in Office XP
 Brought in new features like coloured tables, hyperlinks, autocomplete
and MSN messenger integration

Outlook  Released on June 27, 1999


2003  Desktop alerts for emails were introduced
 Filtering of mails to skip spam
 Expandable distribution list
 Unicode support

Outlook  Released on January 27, 2007


2007  Feature to preview the attachments was introduced
 Excel, Word, PowerPoint files were now supported by Outlook
 Features like calendar sharing, export of PDF and XLS files, unified
messaging support, etc. were also added to the application

Outlook  Released on July 15, 2010


2010  Group messages could now be shared
 The feature of social connector, where the files could be shared on
social networking platforms was introduced

Outlook  Released on January 29, 2013


2013  A reminder to ask the user to attach files with mail was introduced
 People hub
 Compression of Outlook data file
 Improvement in start up performances

Outlook  Released on September 22, 2015


2016  Almost similar features, only cloud computing was added

Outlook  Released on September 24, 2018


2019  Filtering and sorting of mails became easier
 Supported a focussed inbox
 Multiple time zones could be added

Basic MS Outlook Shortcut Keys


There are certain shortcut keys which make using MS Outlook even more
convenient and quicker. Given below are such navigation, functional and
formatting shortcut keys:

MS Outlook – Shortcut Keys

Shortcut Keys Function

Alt+H Go to Home tab

Alt+S Send a message

Ctrl+2 Go to calendar
Ctrl+M Check for new messages

Ctrl+1 Switch to mail view

Ctrl+3 Switch to the contacts view

Ctrl+Shift+B Open the Address Book

Ctrl+Shift+A To create an appointment

Ctrl+Shift+L To create a contact group

Ctrl+Shift+Q Create a meeting request

Ctrl+Shift+N To create a note

You might also like