November 29, 2019
Qualifying an interview for a tech profile is no picnic, and it seems arduous when the competition is high. Since networking interview consists of technical questions, you may feel to have a need of going through a list of questions that a recruiter may ask you. Here are some questions to help you prepare your networking interview.
What is a network?
A network is a set of connected devices including computers, mainframes, servers, peripherals to allow for data sharing.
What do you understand by network topology?
Network topology is a kind of structure that connects nodes of all devices. There are five types of network topology –star topology, mesh topology, bus topology, hybrid topology, and ring topology.
What do you mean by a router?
A router is a hardware device that receives, analyses and forwards data packets between computer networks. In other words, it is a network device that transfers information from source to destination. There are four types of routers – wireless, brouter, core router, and edge router.
Differentiate between a hub, router, and switch
|It is the least expensive and least effective.||It is like a hub, but it works better than a hub.||Routers are expensive, but they are more effective than both hub and switch.|
|It is not much reliable because it provides data to all ports.||It sends information to only the requesting port, thus more reliable than a hub.||They come in all shapes and sizes and are dedicated to routing networking traffic.|
|It is a common connection point for all connected devices to the network.||A switch is a device that forwards packets.||Routers are located at a gateway that moves data packets.|
What do you mean by a private IP address?
A private IP address is one that is used for internal networks. It allows you to create your own private network. It is reserved for private use. They are commonly used for local area networks.
Could you explain the TCP/IP model? What are its types?
TCP/IP refers to Transmission Control Protocol/Internet Protocol. It specifies how data should be packed and transmitted. It is a set of standardised rules that allow computers to transfer data from one place to another on the internet.
There are four layers of the TCP/IP model:
Internet layer: It is also called a network layer. It controls the movement of packets around the network.
Transport layer: This layer ensures a reliable data connection between devices. This layer receives data from the Application layer and divides it into packets. The main role of this layer is to transmit data as successfully as possible. The most common transport layer protocols are TCP and UDP.
Datalink layer: The data link layer is simply called a link layer. It is a network interface layer that handles the physical parts of receiving and sending information.
Application layer: The application layer helps the user to interact. In other words, it handles all the communication details. Emails and messaging come to happen through the application layer.
What is a firewall?
A firewall is an integral part of a comprehensive security network that aims at keeping the network from unauthorised access and malware activities. It enhances the security of devices.
The tasks that a firewall performs are as follows:
- It defends resources.
- It acts as an intermediary.
- It validates access.
- It controls network traffic.
What is DNS?
DNS refers to the Domain Name System. In other words, you can also consider it as the internet’s phone book. Each device has a unique IP address, and all these addresses are stored in the DNS. A computer is a machine that cannot understand your communication language. It understands the language of IP address to transfer data.
When you type a website name in the search bar, the network looks for the DNS associated with the domain, translates it into a machine language, and takes you to the right destination.
- Differentiate between workgroup and domain
|Each computer maintains its own database.||A domain is a form of network in which all connected devices are registered in a central database.|
|Workbook is not bound to follow a security feature, hence it does not require||Security credentials are a must whenever you need to access the domain network.|
|With the workbook, you cannot connect more than 20 devices.||In a domain, you can connect thousands of devices.|
|All connected devices will be on the same local area network.||It can be on a different local network.|
What to do if I do not have funds to invest in a server?
If you are running out of money, you can take out Provident doorstep loans. A representative of a lender will visit your home to have a face-to-face meeting with you. After analysing your credit needs, the representative will lend you money on the spot.