Basic Network Support

If you are a network support person looking for your next job, then checkout these frequently asked questions in Basic Network support to prepare for the next job as a network support administrator.



Q.1 Define point-to-point links.
This can be defined as a direct connection between two computers on a network. A point-to-point connection does not require any other network devices other than connecting a cable to the NIC cards of both computers.
Q.2 What do you understand about anonymous FTP?
Anonymous FTP is a way of providing user access to files on public servers. However, users that are allowed access to data in these servers will not have to authorize themselves. But instead, log in as an anonymous guest.
Q.3 Define subnet mask.
A subnet mask is integrated with an IP address for identifying two parts, the extended network address, and the host address. Like an IP address, a subnet mask is made up of 32 bits.
Q.4 Define a Node.
A node can be considered as a point where a connection begins, In this, two or more computers are connected directly by an optical fiber or any other cable. However, it is a network component that is used for sending, receiving, and forwarding electronic information. Further, a device connected to a network is also termed as Node.
Q.5 What do you understand about Network Topology?
Network topology can be defined as a physical layout of the computer network which specifies how the computers, devices, cables, etc. are connected to each other.
Q.6 Define TCP/IP Model.
The TCP/IP (Transmission Control Protocol and Internet Protocol) defines how data should be packaged, transmitted, and routed in their end-to-end data communication.
Q.7 Explain the various layers of the TCP/IP model.

There are four layers of the TCP/IP model:

1. Application Layer - This is the top layer in the TCP/IP model which includes processes that use the Transport Layer Protocol for transmitting the data to their destination. There are different Application Layer Protocols such as HTTP, FTP, SMTP, SNMP protocols, etc.

2. Transport Layer - This layer gets the data from the Application Layer which is above the Transport Layer. However, this behaves as a backbone between the host’s systems connected with each other and it mainly concerns the transmission of data. TCP and UDP are mainly used as Transport Layer protocols.

3. Network or Internet Layer-   This layer sends the packets across the network. However, packets mainly consist of source & destination IP addresses and actual data to be transmitted.

4. Network Interface Layer - This is the lowest layer of the TCP/IP model which transfers the packets between different hosts. This includes encapsulation of IP packets into frames, mapping IP addresses to physical hardware devices, etc.

Q.8 Define HTTP. What port does it use?
HTTP stands for HyperText Transfer Protocol which is responsible for web content. However, many web pages are using HTTP that helps in transmitting the web content and allowing the display and navigation of HyperText. It is the primary protocol and the port used here is TCP port 80.
Q.9 Define HTTPs.
HTTPs can be considered as Secure HTTP. This is used for securing communication over a computer network. HTTPs provide authentication of websites that stops unwanted attacks. However, in bi-directional communication, the HTTPs protocol encrypts the communication so that the interference of the data gets avoided. Moreover, using the support of an SSL certificate, HTTPs checks if the requested server connection is a valid connection or not. HTTPs use TCP with port 443.
Q.10 Differentiate between TCP and UDP.
TCP stands for Transmission Control Protocol in which once the connection is set up, data can be sent bi-directional. This is used for applications where time is not a critical part of data transmission. Further, the TCP transmission occurs in a sequential manner. On the other hand, UDP stands for User Datagram Protocol or Universal Datagram Protocol which is a connectionless, simple protocol. Using UDP, messages are sent as packets. However, this is best for applications that need the fast transmission of data and time. Further, the UDP transmission also occurs in a sequential manner but it does not maintain the same sequence when it reaches the destination.
Q.11 Define a Firewall.
A firewall refers to a network security system used for protecting computer networks from unauthorized access. It stops malicious access from outside to the computer network. Moreover, it can also grant limited access to outside users. This consists of a hardware device, software program, or a combined configuration of both. Further, the messages that route via firewall are validated by specific security criteria and the messages which meet the criteria are successfully traversed via the network, or else those messages are blocked.
Q.12 Define Network Cable.
A cable refers to a cord that is made up of different conductors, which are insulated from each other. This cord is usually secured by a wrap for better strength and flexibility. Moreover, network cables can connect two computers or computer systems directly. Further, for choosing a network cable, many aspects must be taken into account: Firstly, the distance that must be covered with that cable Secondly, the type of network to be created Thirdly, the maximum data transmission speed Then, the coating of the cable Lastly, the type of braiding, shielding, and/or sheath
Q.13 Name the various types of network cables used in networking?

Some types of cables used in networks are –

  • Unshielded Twisted Pair (UTP) Cable
  • Shielded Twisted Pair (STP)
  • Cable Coaxial Cable
  • Fiber Optic Cable
  • Wireless LANs
  • Unshielded Twisted Pair (UTP) Cable
Q.14 Define DNS.
The Domain Name System (DNS) is a core part of the internet, providing a way to match names to numbers. Anything connected to the internet laptops, tablets, mobile phones, and websites contains an Internet Protocol (IP) address made up of numbers.
Q.15 Explain the various types of network topologies.

1. Bus - In the bus network topology, every workstation is connected to a main cable called a bus.

2. Star - In the star network topology, there is a central computer or server to which all workstations are directly connected. Each workstation is indirectly connected to the other via the central computer.

3. Ring - In the ring network topology, the workstations are connected in a closed-loop configuration. However, adjacent workstation pairs are directly connected and other pairs of workstations are indirectly connected, passing data via one or more intermediate nodes.

4. Mesh - Mesh network topology has two forms: Firstly, full mesh topology, in which every workstation is directly connected to each other. Secondly, partial mesh topology, in which some workstations are connected to all the others, and some are connected only to the other nodes with which they exchange more data.

5. Tree - The tree network topology uses two or more star networks connected to each other. The central computers in star networks are connected to the main bus.

6. Signal - Signal or Logical topology refers to the nature of the paths that signals follow from node to node. In many cases, the logical topology is the same as the physical topology.

Q.16 Define client and server in a network.
A client application is the component of communication that requests or requests a network service. For example, accessing a web page, or downloading a file, or sending an email. Whereas, a server application is the component of communication that responds to customer requests, providing the required service, that is, sending the web page or the requested file or email.
Q.17 Define frame relay.
Frame Relay refers to a data link layer digital packet-switched network protocol technology designed for connecting local area networks (LANs) and transferring data over wide area networks (WANs). Frame Relay shares some of the same underlying technology as X.25.
Q.18 Explain the working of Frame Relay.
Frame Relay supports the multiplexing of traffic from multiple connections across a shared physical link. This uses hardware components that include router frames, bridges, and switches for packing data into individual frame relay messages. However, every connection uses a 10-bit Data Link Connection Identifier (DLCI) for unique channel addressing. Further, there are two types of connections: Firstly, Permanent Virtual Circuits (PVCs) for persistent connections that are planned to be maintained for long periods even if data is not actively transferred. Secondly, Switched Virtual Circuits (SVCs) for temporary connections that last only one session.
Q.19 What do you understand about MAC address?
A MAC (Media Access Control) address refers to the unique 48-bit hardware address of a LAN card, commonly stored in the ROM of the network adapter card. This unique identifier is assigned by manufacturers to a network card or device that is also known as a physical address defined by hexadecimal digits. In this hexadecimal (6 pairs of numbers), the first three pairs help to identify the manufacturer and the next three to the specific model.
Q.20 Define beaconing.
Beaconing is the process that allows a network to self-repair network problems.
Q.21 Define the following: Attenuation, Distortion and Noise.

1. Attenuation When a signal travels via a medium, it loses some of its energy due to the resistance of the medium. This loss of energy is called attenuation.

2. Distortion When a signal travels via a medium from one point to another, it may change the form or shape of the signal. This is known as distortion.

3. Noise Noise is unwanted electrical or electromagnetic energy that reduces the quality of signals and data.

Q.22 What do you understand about an IP address?
An Internet Protocol address (IP address) refers to a numerical unique address of a device in a network. IP is a datagram-oriented connectionless protocol, therefore every packet must consist of a header with the source IP address, the destination IP address, and other data in order to be delivered successfully.
Q.23 Explain the types of IP addresses.

There are two types of IPs –

  • Firstly, Private IP Address. This refers to a set of numbers that are allocated to each computer or system, connected to a private network. An example of a private IP address is a mobile phone.
  • Secondly, Public IP Addresses. These are the global addresses, visible to anyone browsing the Internet. A user just requires an internet connection to connect to such devices.
Q.24 Explain the steps for finding the IP address of a website?
Firstly, click on “Start” button on your computer Then, type in the program and file browser “cdm” and press enter. After that, the MS-DOS console will open, where you must type “nslookup google.com”. Instead of “google.com”, you must write the domain name of the page you want to consult. Lastly, you will be able to see the IP address
Q.25 Name some of the network troubleshooting issues.

The tools include:

  • server log files
  • network analyzers
  • error messages
  • README files
  • telephone support
  • vendor technical support
  • websites CD-ROMs.
Q.26 How to find out where a cable is routed?
Use a tone generator and tone locator for finding out where cables are routed. These tools are known as fox and hound devices.
Q.27 While installing a Windows XP-based Tcp/IP Network, by mistake I set workstation B to the same Ip address as workstation A. At which workstation(s) error message will appear?
Using broadcasts, both workstations will identify if there is a duplicate IP address on the network and will display error messages to that effect.
Q.28 Name the file that must be located at the root folder of the active partition for dual booting of Windows XP and Windows to boot?
The file name is Boot.ini.
Q.29 After restarting the Windows XP computer, the monitor was showing a blank blue screen. How to fix this?
Firstly, restart the computer and start tapping on the F8 Key to go to the Windows Advanced Options Menu and select the option “Last Known Good Configuration” and press the key.
Q.30 Which file system is used if you need to dual-boot a computer with Windows XP and Windows Me? And, there must be a partition accessible from both OS.
For this, we will use FAT32.
Q.31 Define Blue Screen Of Death (BSOD).
A Blue Screen of Death is a sign of a Critical System Problem wherein the Computer freezes all together and does not respond to anything. However, for solving this, try restarting the computer or Booting into Safe Mode.
Q.32 What do you understand about NOS?
NOS, or Network Operating System, is specialized software that is used for providing network connectivity to a computer in order to communicate with other computers and connected devices.
Q.33 Define DoS.
DoS, or Denial-of-Service attack, is an attempt for preventing users from being able to access the Internet or any other network services. These kinds of attacks may come in different forms and are done by a group of perpetrators. One way for doing this is by overloading the system server so it cannot anymore process legitimate traffic and will be forced to reset.
Q.34 What do you understand about tracert?
Tracert refers to a Windows utility program that can be used for tracing the route taken by data from the router to the destination network. This displays the number of hops taken during the entire transmission route.
Q.35 Define DHCP.
DHCP stands for Dynamic Host Configuration Protocol. This is used for allocating an IP address to devices over the network automatically. This examines for the next available address not yet taken by any device, then allocated this to a network device.
Q.36 What is the full form of ICMP? Explain its use.
ICMP stands for an Internet Control Message Protocol. This is used for providing messaging and communication for protocols inside the TCP/IP stack. This is also referred to as the protocol that manages and controls the error messages that are used by network tools such as PING.
Q.37 Define the term ping.
Ping refers to a utility program that allows you for checking connectivity between network devices on the network. However, you can ping a device by using its IP address or device name, for example, a computer name.
Q.38 What do you understand about peer to peer?
Peer-to-peer (P2P) are networks that do not depend on a server. In other words, all PCs on the network act as individual workstations.
Q.39 Define 127.0.0.1.
The IP address 127.0.0.1, is reserved for loopback or localhost connections. These networks are commonly reserved for the biggest customers or some of the original members of the Internet. In this, for identifying any connection issue, the initial step is to ping the server and check if it is responding. Further, 127.0.0.1 is a loopback connection on the Network Interface Card (NIC) and if you are able to ping this server successfully, then it means that the hardware is in a good shape and condition.
Q.40 What do you understand about NIC?
NIC stands for Network Interface Card or Network Adapter or Ethernet Card. This is in the form of an add-in card and is installed on a computer to help the computer stay connected to a network. However, every NIC contains a MAC address which helps in identifying the computer on a network.
Q.41 Differentiate between the Internet, Intranet, and Extranet.
The terminologies Internet, Intranet, and Extranet are used for defining how the applications in the network can be accessed. All of them use similar TCP/IP technology but vary in terms of access levels for each user inside the network and outside the network. Internet includes the applications that are accessed by anyone from any location using the web. Intranet provides limited access to users in the same organization. Extranet consists of external users who are allowed or provided with access for using the network application of the organization.
Q.42 Define VPN and its types.
VPN is the Virtual Private Network that is built on the Internet as a private wide area network. They are used for connecting offices remotely and are less expensive when compared to WAN connections. They provide secure transactions and allows confidential data to be transferred between multiple offices. The types of VPN are: Firstly, Access VPN. It provides connectivity to mobile users and telecommuters. This can be considered as an alternative option for dial-up connections or ISDN connections with low-cost solutions and a wide range of connectivity. Secondly, Intranet VPN. They are useful for connecting remote offices using shared infrastructure with the same policy as a private network. Lastly, Extranet VPN. This uses shared infrastructure across an intranet, in which suppliers, customers, and partners are connected using dedicated connections.
Q.43 What do you understand about Bandwidth?
Bandwidth is defined as the amount of data that can be transmitted or carried in a fixed interval of time.
Q.44 CDP is running between two devices. What information is supplied by CDP?
The information about Device Identifiers is supplied by CDP.
Q.45 Which layer of the OSI reference model is responsible for ensuring reliable end-to-end delivery of data?
Transport layer of the OSI reference model is responsible for ensuring reliable end-to-end delivery of data
Q.46 Why does the data communication industry use the layered OSI reference model?
It encourages industry standardization by defining what functions occur at each layer of the model
Q.47 What is the highest layer used during the FTP sessions?
Application
Q.48 What is the use of CSU?
CSU is used for the followings: 1. used to perform loopback testing 3. perform bit stuffing 4. provide a framing and formatting pattern
Q.49 In the configuration of NAT, what does the keyword overload signify?
Multiple internal hosts will use one IP address to access external network resources.
Q.50 What is a characteristic of Telnet?
It sends data in clear text format.
Q.51 Define a network.
A network contains two or more separate devices associated together for creating communication between them. Networking provides smooth data communication between computers and peripherals which is done via wired cabling or wireless links. Further, Networks can be categorized on the basis of different criteria like scope, type of connection, functional relationship, topology, or function.
Q.52 Explain the various types of networks?

The network can be classified as:

1. PAN (Personal Area Network) This contains the devices used by a single person with having a range of a few meters.

2. WPAN (Wireless Personal Area Network) This uses wireless technologies as a medium.

3. LAN (Local Area Network) This network has a range limited to a relatively small area like a room, building, airplane, etc.

4. WLAN (Wireless Local Area Network) This refers to a LAN network that uses wireless means of communication. This is the most used network because of its scalability and no requirement for the installation of cables.

5. CAN (Campus Area Network) This refers to a network of high-speed devices that connects LANs in a limited geographical area like a university campus.

6. MAN (Metropolitan Area Network) This is a high-speed (broadband) network providing coverage in a larger geographic area.

7. WAN (Wide Area Network) This expands across a large geographical area using unusual means of communication like satellites or fiber optics.

8. VLAN This is a type of logical or virtual LAN, mounted on a physical network that is used for increasing security and performance.

Q.53 What steps to be considered while troubleshooting a networking issue?
The important thing while troubleshooting any problem is to divide the tasks of problem resolution into a systematic process of elimination. This can be: Firstly, defining the problem. Secondly, collecting detailed information. Thirdly, finding the cause for the failure. Then, planning to solve the problem. Implementing the plan. After that, examining the results of the implementation. Repeating the process if the plan does not resolve the problem. Lastly, registering the changes made to solve the problem.
Q.54 What is your process for prioritizing support issues?
For this, I focus on the following components: Firstly, Total network failure: affects everyone. Secondly, Partial network failure: affects small groups of users. Thirdly, Small network failure: affects a small, single group of users. Then, Total workstation failure: single user can’t work at all. Partial workstation failure: single user can’t do most tasks. Lastly, Minor issues. single user has problems that arrived now and again.
Q.55 How will you solve the problem in which users can access roaming profiles?

We can solve the problem in which users can access roaming profiles by - 

  • Firstly, make sure that the path to the profile directory is correct on the user’s account properties.
  • Secondly, check that the server where the profile resides is accessible.
  • Lastly, check that the user has complete control permissions to the Profile directory.
Q.56 Name the various layers of the OSI reference model?

The OSI layers are:

  • Physical Layer
  • Data Link Layer
  • Network Layer
  • Transport Layer
  • Session Layer
  • Presentation Layer
  • Application Layer.
Q.57 Define routers.
Routers can be used for connecting two or more network segments. These can be considered as intelligent network devices that store information in their routing tables like paths, hops, and bottlenecks. Moreover, using this information, they can direct for the best path for data transfer. However, the routers operate at the OSI Network Layer.
Get Govt. Certified Take Test