InterviewSolution
This section includes InterviewSolutions, each offering curated multiple-choice questions to sharpen your knowledge and support exam preparation. Choose a topic below to get started.
| 51. |
What Is Egp (exterior Gateway Protocol) ? |
|
Answer» It is the protocol the ROUTERS in neighboring autonomous systems use to identify the set of NETWORKS that can be reached WITHIN or via each autonomous system. It is the protocol the routers in neighboring autonomous systems use to identify the set of networks that can be reached within or via each autonomous system. |
|
| 52. |
What Is Autonomous System ? |
|
Answer» It is a COLLECTION of routers under the control of a SINGLE administrative authority and that USES a common Interior GATEWAY PROTOCOL. It is a collection of routers under the control of a single administrative authority and that uses a common Interior Gateway Protocol. |
|
| 53. |
What Is Bgp (border Gateway Protocol) ? |
|
Answer» It is a PROTOCOL USED to advertise the set of networks that can be REACHED with in an autonomous system. BGP enables this information to be shared with the autonomous system. This is newer than EGP (Exterior Gateway Protocol). It is a protocol used to advertise the set of networks that can be reached with in an autonomous system. BGP enables this information to be shared with the autonomous system. This is newer than EGP (Exterior Gateway Protocol). |
|
| 54. |
What Is Gateway-to-gateway Protocol ? |
|
Answer» It is a protocol FORMERLY used to exchange routing information between INTERNET CORE ROUTERS. It is a protocol formerly used to exchange routing information between Internet core routers. |
|
| 55. |
What Is Nvt (network Virtual Terminal) ? |
|
Answer» It is a set of rules DEFINING a very simple virtual TERMINAL interaction. The NVT is used in the START of a TELNET session. It is a set of rules defining a very simple virtual terminal interaction. The NVT is used in the start of a Telnet session. |
|
| 56. |
What Is A Multi-homed Host ? |
|
Answer» It is a HOST that has a multiple NETWORK INTERFACES and that requires multiple IP ADDRESSES is called as a Multi-homed Host. It is a host that has a multiple network interfaces and that requires multiple IP addresses is called as a Multi-homed Host. |
|
| 57. |
What Is Kerberos ? |
|
Answer» It is an authentication SERVICE DEVELOPED at the MASSACHUSETTS Institute of Technology. Kerberos uses encryption to prevent intruders from DISCOVERING passwords and gaining unauthorized ACCESS to files. It is an authentication service developed at the Massachusetts Institute of Technology. Kerberos uses encryption to prevent intruders from discovering passwords and gaining unauthorized access to files. |
|
| 58. |
What Is Ospf ? |
|
Answer» It is an INTERNET routing protocol that scales well, can ROUTE TRAFFIC along multiple paths, and uses knowledge of an Internet’s topology to make ACCURATE routing DECISIONS. It is an Internet routing protocol that scales well, can route traffic along multiple paths, and uses knowledge of an Internet’s topology to make accurate routing decisions. |
|
| 59. |
What Is Proxy Arp ? |
|
Answer» It is USING a router to ANSWER ARP requests. This will be done when the originating HOST believes that a destination is LOCAL, when in fact is lies BEYOND router. It is using a router to answer ARP requests. This will be done when the originating host believes that a destination is local, when in fact is lies beyond router. |
|
| 60. |
What Is Slip (serial Line Interface Protocol) ? |
|
Answer» It is a very simple protocol used for TRANSMISSION of IP DATAGRAMS ACROSS a serial LINE. It is a very simple protocol used for transmission of IP datagrams across a serial line. |
|
| 61. |
What Is Rip (routing Information Protocol) ? |
|
Answer» It is a SIMPLE PROTOCOL used to exchange information between the ROUTERS. It is a simple protocol used to exchange information between the routers. |
|
| 62. |
What Is Source Route ? |
|
Answer» It is a sequence of lP addresses identifying the ROUTE a DATAGRAM MUST follow. A source route may optionally be included in an IP datagram header. It is a sequence of lP addresses identifying the route a datagram must follow. A source route may optionally be included in an IP datagram header. |
|
| 63. |
What Are The Advantages And Disadvantages Of The Three Types Of Routing Tables ? |
|
Answer» The three TYPES of routing tables are fixed, dynamic, and fixed central. The fixed table must be MANUALLY modified every time there is a change. A dynamic table CHANGES its information based on NETWORK traffic, reducing the amount of manual maintenance. A fixed central table lets a MANAGER modify only one table, which is then read by other devices. The fixed central table reduces the need to update each machine’s table, as with the fixed table. Usually a dynamic table causes the fewest problems for a network administrator, although the table’s contents can change without the administrator being aware of the change. The three types of routing tables are fixed, dynamic, and fixed central. The fixed table must be manually modified every time there is a change. A dynamic table changes its information based on network traffic, reducing the amount of manual maintenance. A fixed central table lets a manager modify only one table, which is then read by other devices. The fixed central table reduces the need to update each machine’s table, as with the fixed table. Usually a dynamic table causes the fewest problems for a network administrator, although the table’s contents can change without the administrator being aware of the change. |
|
| 64. |
What Is The Hello Protocol Used For ? |
|
Answer» The HELLO protocol uses time INSTEAD of DISTANCE to DETERMINE OPTIMAL routing. It is an alternative to the Routing Information Protocol. The HELLO protocol uses time instead of distance to determine optimal routing. It is an alternative to the Routing Information Protocol. |
|
| 65. |
What Is The Difference Between Interior And Exterior Neighbor Gateways ? |
|
Answer» Interior GATEWAYS connect LANS of ONE organization, whereas exterior gateways connect the organization to the OUTSIDE world. Interior gateways connect LANs of one organization, whereas exterior gateways connect the organization to the outside world. |
|
| 66. |
What Protocol Is Used By Dns Name Servers ? |
|
Answer» DNS uses UDP for COMMUNICATION between servers, It is a better choice than TCP because of the improved SPEED a CONNECTIONLESS protocol offers. Of course, transmission reliability suffers with UDP. DNS uses UDP for communication between servers, It is a better choice than TCP because of the improved speed a connectionless protocol offers. Of course, transmission reliability suffers with UDP. |
|
| 67. |
What Is A Dns Resource Record ? |
|
Answer» A resource record is an entry in a NAME server’s database. There are several TYPES of resource records USED, including name-to-address resolution INFORMATION. Resource records are maintained as ASCII files. A resource record is an entry in a name server’s database. There are several types of resource records used, including name-to-address resolution information. Resource records are maintained as ASCII files. |
|
| 68. |
Bootp Helps A Diskiess Workstation Boot. How Does It Get A Message To The Network Looking For Its Lp Address And The Location Of Its Operating System Boot Files ? |
|
Answer» BQOTP sends a UDP message with a subnetwork broadcast ADDRESS and waits for a reply from a server that gives it the IP address. The same message MIGHT contain the NAME of the machine that has the boot files on it. If the boot image location is not specified, the workstation sends another UDP message to query the server. BQOTP sends a UDP message with a subnetwork broadcast address and waits for a reply from a server that gives it the IP address. The same message might contain the name of the machine that has the boot files on it. If the boot image location is not specified, the workstation sends another UDP message to query the server. |
|
| 69. |
What Is External Data Representation ? |
|
Answer» External Data REPRESENTATION is a method of ENCODING data WITHIN an RPC message, USED to ensure that the data is not system-dependent. External Data Representation is a method of encoding data within an RPC message, used to ensure that the data is not system-dependent. |
|
| 70. |
What Does The Mount Protocol Do ? |
|
Answer» The Mount PROTOCOL returns a file handle and the name of the file SYSTEM in which a requested file RESIDES. The MESSAGE is sent to the client from the server after reception of a client’s REQUEST. The Mount protocol returns a file handle and the name of the file system in which a requested file resides. The message is sent to the client from the server after reception of a client’s request. |
|
| 71. |
What Is Rex ? |
|
Answer» What ADVANTAGE does REX OFFER other SIMILAR UTILITIES What advantage does REX offer other similar utilities |
|
| 72. |
What Is A Pseudo Tty ? |
|
Answer» A pseudo tty or false terminal enables EXTERNAL machines to connect through TELNET or RLOGIN. Without a pseudo tty, no connection can TAKE PLACE. A pseudo tty or false terminal enables external machines to connect through Telnet or rlogin. Without a pseudo tty, no connection can take place. |
|
| 73. |
What Is Anonymous Ftp And Why Would You Use It |
|
Answer» Anonymous FTP ENABLES users to connect to a host without using a valid LOGIN and password. Usually, anonymous FTP USES a login called anonymous or guest, with the password usually requesting the user’s ID for TRACKING purposes only. Anonymous FTP is used to enable a large number of users to access files on the host without having to GO to the trouble of setting up logins for them all. Anonymous FTP systems usually have strict controls over the areas an anonymous user can access. Anonymous FTP enables users to connect to a host without using a valid login and password. Usually, anonymous FTP uses a login called anonymous or guest, with the password usually requesting the user’s ID for tracking purposes only. Anonymous FTP is used to enable a large number of users to access files on the host without having to go to the trouble of setting up logins for them all. Anonymous FTP systems usually have strict controls over the areas an anonymous user can access. |
|
| 74. |
What Is A Management Information Base (mib) ? |
|
Answer» A Management INFORMATION Base is part of EVERY SNMP-managed device. Each SNMP agent has the MIB database that CONTAINS information about the device’s status, its PERFORMANCE, CONNECTIONS, and configuration. The MIB is queried by SNMP. A Management Information Base is part of every SNMP-managed device. Each SNMP agent has the MIB database that contains information about the device’s status, its performance, connections, and configuration. The MIB is queried by SNMP. |
|
| 75. |
Explain The Function Of Transmission Control Block ? |
|
Answer» A TCB is a complex DATA structure that contains a considerable AMOUNT of INFORMATION about each CONNECTION. A TCB is a complex data structure that contains a considerable amount of information about each connection. |
|
| 76. |
What Is The Difference Between An Unspecified Passive Open And A Fully Specified Passive Open ? |
|
Answer» An UNSPECIFIED passive open has the SERVER waiting for a connection REQUEST from a CLIENT. A FULLY specified passive open has the server waiting for a connection from a specific client. An unspecified passive open has the server waiting for a connection request from a client. A fully specified passive open has the server waiting for a connection from a specific client. |
|
| 77. |
What Are 10base2, 10base5 And 10baset Ethernet Lans ? |
|
Answer» 10Base2: An ETHERNET term meaning a maximum transfer rate of 10 Megabits per second that uses baseband signaling, with a contiguous CABLE segment length of 100 meters and a maximum of 2 SEGMENTS. 10Base5: An Ethernet term meaning a maximum transfer rate of 10 Megabits per second that uses baseband signaling, with 5 CONTINUOUS segments not exceeding 100 meters per segment. 10BASET: An Ethernet term meaning a maximum transfer rate of 10 Megabits per second that uses baseband signaling and twisted pair cabling. 10Base2: An Ethernet term meaning a maximum transfer rate of 10 Megabits per second that uses baseband signaling, with a contiguous cable segment length of 100 meters and a maximum of 2 segments. 10Base5: An Ethernet term meaning a maximum transfer rate of 10 Megabits per second that uses baseband signaling, with 5 continuous segments not exceeding 100 meters per segment. 10BaseT: An Ethernet term meaning a maximum transfer rate of 10 Megabits per second that uses baseband signaling and twisted pair cabling. |
|
| 78. |
Which Protocol Does Https Uses At The Transport Layer For Sending And Receiving Data? |
|
Answer» TCP. TCP. |
|
| 79. |
Which Feature On A Network Switch Can Be Used To Protect Against Cam Flooding Attacks? |
|
Answer» PORT-Security feature can be USED for the same. In a cam flooding attack, the attacker sends a storm of mac-addresses (frames) with different VALUES. The goal of the attacker is to fill up the cam table. Port-Security can be used to limit the NUMBER of mac-addresses allowed on the port. Port-Security feature can be used for the same. In a cam flooding attack, the attacker sends a storm of mac-addresses (frames) with different values. The goal of the attacker is to fill up the cam table. Port-Security can be used to limit the number of mac-addresses allowed on the port. |
|
| 80. |
Why Is Rip V1 Insecure In A Network? |
|
Answer» RIP v1 does not use a PASSWORD for authentication as with Rip v2. This MAKES it POSSIBLE to attackers to SEND rogue RIP packets and corrupt the routing table. RIP v1 does not use a password for authentication as with Rip v2. This makes it possible to attackers to send rogue RIP packets and corrupt the routing table. |
|
| 81. |
In An Icmp Address Mask Request, What Is The Attacker Looking For? |
|
Answer» The ATTACKER is looking for the subnet/network MASK of the victim. This would help the attacker to MAP the internal network. The attacker is looking for the subnet/network mask of the victim. This would help the attacker to map the internal network. |
|
| 82. |
How Can You Prevent A Brute Force Attack On A Windows Login Page? |
|
Answer» Setup a account LOCKOUT for specific number of attempts, so that the USER account would be locked up AUTOMATICALLY after the SPECIFIED number. Setup a account lockout for specific number of attempts, so that the user account would be locked up automatically after the specified number. |
|
| 83. |
Provide A Reason As To Why Https Should Be Used Instead Of Http? |
|
Answer» HTTP sends data in clear TEXT WHEREAS HTTPS sends data ENCRYPTED. HTTP sends data in clear text whereas HTTPS sends data encrypted. |
|
| 84. |
Name One Secure Network Protocol Which Can Be Used Instead Of Telnet To Manage A Router? |
|
Answer» SSH. SSH. |
|
| 85. |
Which Feature On A Cisco Ios Firewall Can Be Used To Block Incoming Traffic On A Ftp Server? |
| Answer» | |
| 86. |
Which Feature On A Network Switch Can Be Used To Prevent Rogue Dhcp Servers? |
|
Answer» DHCP Snooping. |
|
| 87. |
Why Does Active Ftp Not Work With Network Firewalls? |
|
Answer» When a user initiates a connection with the FTP SERVER, two TCP connections are ESTABLISHED. The second TCP connection (FTP data connection) is initiated and established from the FTP server. When a firewall is between the FTP CLIENT and server, the firewall would BLOCK the connection initiated from the FTP server since it is a connection initiated from outside. To resolve this, Passive FTP can be used or the firewall rule can be modified to ADD the FTP server as trusted. When a user initiates a connection with the FTP server, two TCP connections are established. The second TCP connection (FTP data connection) is initiated and established from the FTP server. When a firewall is between the FTP client and server, the firewall would block the connection initiated from the FTP server since it is a connection initiated from outside. To resolve this, Passive FTP can be used or the firewall rule can be modified to add the FTP server as trusted. |
|