File Name: lan and wan interview questions and answers .zip
A Tell me something about yourself. Tell about your eductaion, place you belong to, some struggle in life which shows that you have positive attitude and will to fight the odds.
It refers to the connection between computers and other network devices that are located within a small physical location. What could be the maximum length of the LAN cable? What is a cross cable? A central component of the Windows platform, Active Directory directory service provides the means to manage the identities and relationships that make up network environments.
For example we can create, manage and administor users, computers and printers in the network from active directory. Why it is used? What are A records and mx records? The computer understands only numbers while we can easily remember names.
So to make it easier for us what we do is we assign names to computers and websites. When we use these names Like yahoo. When DHCP server is not available the Windows client computer assignes an automatic IP address to itself so that it can communicate with the network cmputers.
ITs in the range of Its in the range of What is the difference between a domain and a workgroup? Domain is created when we install Active Directory. Domain can be used to centrally administor computers and we can govern them using common policies called group policies. Please visit the link below to find out how to configure outlook and outlook What file is used by outlook express? PST file is used to store the mails locally when using outlook or OST file is used when we use outlook in cached exchanged mode.
Outlook express useds odb file. What do you do when you get blue screen in a computer? How do you troubleshoot it? BSOD stands for blue screen of Death. If it boots up than the problemis with one of the devices or drivers. RIS stands for remote installation services. You save the installed image on a windows server and then we use RIS to install the configured on in the new hardware. We can use it to deploy both server and client OS.
Imaging or ghosting also does the same job of capturing an installed image and then install it on a new hardware when there is a need. VPN stands for Virtual private network. VPN is used to connect to the corporate network to access the resources like mail and files in the LAN. A reboot of the computer fixes the problem.
What to do to resolve this issue? Update the network card driver. How to recover the data? Install another system. Insall the OS with the lates pathces, Antivirus with latest updates.
Connect the infected HDD as secondary drive in the system. Once done scan and clean the secondary HDD. Once done copy the files to the new system. A link refers to the connectivity between two devices. It includes the type of cables and protocols used in order for one device to be able to communicate with the other. Switch sends the traffic to the port to which its meant for.
Hub sends the traffic to all the ports. Why we use it? Router is a switch which uses routing protocols to process and send the traffic. It also receives the traffic and sends it across but it uses the routing protocols to do so.
Switches which can be administered are calledmanageable switches. For example we can create VLAN for on such switch. A network card, network adapter or NIC network interface controller is a piece of computer hardware designed to allow computers to communicate over a computer network. Devices like Modem, Mouse, Keyboard etc can be connected.
Broadband offer high-speed Internet access and allows telephone calls and a permanent Internet connection to share a single phone line simultaneously whereas in Dialup connection either Internet connection or telephone call can made at given time. Or, less formally, a network that uses routers and public communications links.
Remote Access Services RAS refers to any combination of hardware and software to enable the remote access to tools or information that typically reside on a network of IT devices. Email clients download your emails onto your computer. Using a specialized email program such as Outlook Express or Apple Mail has the advantage of giving you complete control over your email; every email you receive is placed on your computer and you can keep as many large file attachments as you want.
Checking your email through our webmail is similar to using Hotmail or Yahoo! When you are not online, you are not able to see your email. RAM is the most common type of memory found in computers and other devices, such as printers.
Pronounced rahm, acronym for read-only memory, computer memory on which data has been prerecorded. Once data has been written onto a ROM chip, it cannot be removed and can only be read. If the sender of any message cannot be identified then the message is moved into a spam quarantine folder. Messages deposited in the spam quarantine folder can be inspected and either deleted or approved at your leisure. Firewalls can be implemented in both hardware and software, or a combination of both. Firewalls are frequently used to prevent unauthorized Internet users from accessing private networks connected to the Internet, especially intranets.
All messages entering or leaving the intranet pass through the firewall, which examines each message and blocks those that do not meet the specified security criteria. Antivirus is a software program which helps protect a computer against being infected by a virus. The Internet however, is really based on IP addresses. Every time you use a domain name, therefore, a DNS service must translate the name into the corresponding IP address.
For example, the domain name www. Used without parameters, IPConfig displays the IP address, subnet mask, and default gateway for all adapters. It can help you determine why your connections to a given server might be poor, and can often help you figure out where exactly the problem is. It also shows you how systems are connected to each other, letting you see how your ISP connects to the Internet as well as how the target system is connected.
If the first octet begins with a 0 bit, that address is Class A. If it begins with bits 10 then that address is a Class B address. OSPF, or Open Shortest Path First, is a link-state routing protocol that uses routing tables to determine the best possible path for data exchange. Firewalls serve to protect an internal network from external attacks. These external threats can be hackers who want to steal data or computer viruses that can wipe out data in an instant.
It also prevents other users from external networks from gaining access to the private network. Star topology consists of a central hub that connects to nodes. This is one of the easiest to setup and maintain. Gateways provide connectivity between two or more network segments.
It is usually a computer that runs the gateway software and provides translation services. This translation is a key in allowing different systems to communicate on the network. One major disadvantage of star topology is that once the central hub or switch get damaged, the entire network becomes unusable.
This is one of the protocols that are used for remote access. Tracert is a Windows utility program that can used to trace the route taken by data from the router to the destination network.
It also shows the number of hops taken during the entire transmission route. When you are accessing the resources that are shared by one of the workstations on the network, that workstation takes a performance hit.
A hybrid network is a network setup that makes use of both client-server and peer-to-peer architecture. Its main task is to automatically assign an IP address to devices across the network.
It first checks for the next available address not yet taken by any device, then assigns this to a network device. This is a set of protocol layers that is designed to make data exchange possible on different types of computer networks, also known as heterogeneous network. Routers have built in console that lets you configure different settings, like security and data logging.
You can assign restrictions to computers, such as what resources it is allowed access, or what particular time of the day they can browse the internet. You can even put restrictions on what websites are not viewable across the entire network. This is possible because FTP is platform independent.
Solved examples with detailed answer description, explanation are given and it would be easy to understand. Here you can find objective type Networking Wide Area Networks questions and answers for interview and entrance examination. Multiple choice and true or false type questions are also provided. You can easily solve all kind of Networking questions based on Wide Area Networks by practicing the objective type exercises given below, also get shortcut methods to solve Networking Wide Area Networks problems. When setting up Frame Relay for point-to-point subinterfaces, which of the following must not be configured? Which command will display the CHAP authentication process as it occurs between two routers in the network? The Acme Corporation is implementing dial-up services to enable remote-office employees to connect to the local network.
Are you a network engineer and looking for a dream job where you can work as a LAN specialist? If yes, then we can help you. While working on a LAN job , you will be able to analyse, evaluate, support, test and monitor the various hardware and software systems related to the existing network systems. You may also gain experience in providing support to the end users for all applications based on LAN.
ED Jobs M. Com Jobs B. Sc Jobs B. E Jobs Ph.
So learn Local area network LAN with the help of this LAN Local area network Interview questions and answers guide and feel free to comment as your suggestions, questions and answers on any LAN Local area network Interview Question or answer by the comment feature available on the page. Some WLANs however, such as ad-hoc networks have no wired components. Generally these networks are based on the IEEE Is This Answer Correct? Spread spectrum and frequency hopping was originally developed for military use. The technology was designed to keep prying enemy ears from intercepting highly sensitive data.
Network Engineer Interview Questions and Answers. 1) What is a LAN stands for Local Area Network. WAN stands for Wide Area Network.
Your email address will not be published. Required fields are marked *