Hardware and Networking Interview Questions

Checkout Vskills Interview questions with answers in Hardware and Networking Interview Questions to prepare for your next job role. The questions are submitted by professionals to help you to prepare for the Interview.

Q.1 When you arrive at the customer's desk the computer is giving a continuous beep noise that will not stop. What is the problem?
A key on the key board is stuck in the down position.
Q.2 A Windows 9x system fails to successfully detect new devices that are added. What should you check first?
BIOS settings in CMOS for Plug and Play.
Q.3 What can a crossover cable in an Ethernet network be used to do?
Connect two network devices without a Hub.
Q.4 What is an appropriate use of a default route?
To provide routing to a destination that is not specified in the routing table and which is outside the local network.
Q.5 What are the functional ICs used in SMPS?
The functional ICs used in SMPS are IC TL 494 & IC LM 339.
Q.6 What are proxy servers and how do they protect computer networks?
Proxy servers are used to prevent external users from identifying the IP addresses of an internal network. Moreover, they make a network virtually invisible to external users, and disables them to identify the physical location of a network without knowledge of the proper IP address.
Q.7 What is SLIP?
SLIP stands for Serial Line Interface Protocol. This was developed during the early UNIX days and is used for remote access.
Q.8 What common software problems lead to network defects?

The common software problems leading to network defects are:

  • Application conflicts
  • Configuration error
  • Client-server problems
  • Security issues
  • Protocol mismatch
  • User policy & rights issues
Q.9 Name the layers that are there in the OSI model.
There are seven layers in the OSI model namely physical, session , data link, presentation, network, transport, and application.
Q.10 What are the types of errors?

The two types of errors are:

  • Single-bit error
  • Burst error
Q.11 What is the use of Virtual Private Networking?

VPN is used to –

  • access region-restricted websites
  • protect the computer from untrustworthy Wi-Fi hotspots
  • shield browsing activity
  • gain anonymity by hiding location
  • conduct work remotely and prevent unauthorised users from prying on the traffic
  • offer a secure connection for safe data transfer while working remotely
Q.12 What is Host in Networking?
A host is a computer device that is linked with other devices connected within a network. These network hosts are at least assigned one network address configured manually by an administrator or assigned by means of DHCP.
Q.13 What are protocols?
Protocols are usually a set of instructions or rules or guidelines that are used in forming communications between computers of a network.
Q.14 What is the job of the Network Layer under the OSI reference model?
Well, the Network layer is responsible for packet switching, data routing and control of network congestion. Also, routers operate under this layer.
Q.15 What is SNMP?
SNMP refers to Simple Network Management Protocol. It is a network protocol that is used for collecting, organizing and exchanging information within network devices. This protocol is largely used in network management for configuring network devices.
Q.16 What is the maximum length allowed for a UTP cable?
Well, a single segment of UTP cable has a maximum length of 90 to 100 meters. This drawback can be overcome with the use of repeaters and switches.
Q.17 What is the point to point link?
Point to point link refers to a direct connection between two computers on a network. This connection does not need any other network devices instead of connecting a cable to the NIC cards of both computers.
Q.18 What is a LAN?
LAN is the short form for Local Area Network. It refers to the connection between computers and other network devices located within a small physical location.
Q.19 What is the difference between domain and work group?

The difference between domain and workgroup is as follows:

Workgroup

  • Every PC is responsible for its security
  • No centralized administration
  • Main focus is to save hardware resource
  • Best suite in a training institute, school, cyber cafe

Domain:

  • Server is responsible for data safety
  • Centralized administration
  • Main focus is to secure data
  • Best suite in company environments
Q.20 What is the backbone network?
Well, a backbone network is a centralized infrastructure designed for the distribution of various routes and data to different networks. Moreover, it handles the management of bandwidth and multiple channels.
Q.21 What are the types of ACLs?

The four types of ACLs are:

  • Standard ACL
  • Dynamic ACL
  • Extended ACL
  • Reflexive ACL
Q.22 What is encryption?
Encryption is basically the process of changing data from its readable format to an unreadable format in order to ensure network security. It needs the user to use a secret key or password so as to decrypt the data.
Q.23 Explain why the standard OSI model is known as 802.xx?
Since, the OSI model was introduced in February 1980 therefore it is known as 802.XX, where, ‘80’ is named for the year 1980, and ‘2’ is named as the month of February.
Q.24 What are nodes?
Well, nodes are the devices or data points. They are actually the separate parts of a larger data structure and contain data. They also link other nodes.
Q.25 What is TCP/IP?
TCP/IP is the abbreviation of the Transmission Control Protocol / Internet Protocol. It is a collection of protocol layers that are designed to facilitate data exchange on the heterogeneous networks.
Q.26 Define unicasting.
Generally, when a piece of information or a packet is sent from a specific source to a particular destination then it is known as Unicasting.
Q.27 What is a link?
Well, nodes are the devices or data points. They are actually the separate parts of a larger data structure and contain data. They also link other nodes and the physical communication medium they use is called a link.
Q.28 A gateway works in which layer of the OSI model?
The gateway works in the transport layer of the OSI model.
Q.29 What is a subnet mask?
A subnet mask is combined with an IP address in order to identify two parts: the extended network address as well as the host address. A subnet mask is made up of 32 bits like an IP address.
Q.30 How many layers does TCP/IP have?

TCP/IP consists of five layers –

  • Application Layer
  • Data Link Layer
  • Network Layer
  • Transport Layer
  • Physical Layer
Q.31 What is a VPN?
VPN stands for Virtual Private Network. This is a technology allowing a secure tunnel to be established across a network like the Internet. For instance, VPNs allow us to create a secure dial-up connection to a remote server.
Q.32 How does a network topology affect your decision to set a network?
Well, network topology dictates what media should you use in order to interconnect devices. It also acts as a basis on what materials, terminations and connectors that is applicable for the setup.
Q.33 Describe the transport layer of the OSI model?
The transport layer makes sure that the messages are delivered in sequence and without any loss or duplication.
Q.34 Mention the characteristics of networking.

The main characteristics of networking:

  • Topology
  • Protocols
  • Medium
Q.35 What is a Switch in Networking?
A switch is a hardware device which connects multiple devices like computers, servers, printers etc to a network in order to facilitate the sharing of information and resources.
Q.36 What is Switching in Networking?
Switching is the process of exchanging information and data between various computer networks or a network segment with the use of different layers of the OSI model.
Q.37 What is ACL in Networking?
ACL is the short form for Access Control Lists. It is a suite of rules that are used to control the network traffic and decrease network attacks. ACL works as a network filter and can be configured only on devices with packet filtering capabilities like routers.
Q.38 What is Multiplexing in Networking?
Multiplexing is the process of combining various data streams into a signal over a single medium. Moreover, the hardware device used for multiplexing is called a Multiplexer that combines the ‘n’ number of input signals into a single output signal.
Q.39 What is Bandwidth in Networking?
The network bandwidth is the maximum transfer capacity of a wired or wireless network communication. Moreover, it measures the amount of data that can be sent and received at a time.
Q.40 What is the full form of IDEA?
The term IDEA stands for International Data Encryption Algorithm.
Q.41 What is Routing in Networking?
Routing is a process of choosing a path for traffic across one or more networks. Moreover, the network routing protocols use metrics for determining the optimal path for data packet delivery.
Q.42 What is Subnetting in Networking?
Subnetting is the process of partitioning a larger network into further smaller networks. The main purpose of subnetting is to decrease network congestion by splitting into subnets or subnetworks, thus, creating a resilient computer network.
Q.43 Name the different types of network topologies.

Network topologies are classified as below:

1. Bus Topology

2. Star Topology

3. Ring Topology

4. Mesh Topology

Q.44 Define various types of Internet connections?

The three types of Internet connections are:

1. Broadband Connection

2. Wi-Fi

3. WiMAX

Q.45 What are the different types of a network?

The 4 major types of networks are:

1. Personal Area Network (PAN)

2. Metropolitan Area Network (MAN)

3. Local Area Network (LAN)

4. Wide Area Network (WAN)

Q.46 How many types of modes are used in data transferring through networks?

These are of three types

1. Simplex

2. Half Duplex

3. Full Duplex

Q.47 What is anonymous FTP?
Anonymous FTP is basically a way of granting user access to the files in public servers. The users that are allowed access to data in these servers don’t need to identify themselves but log in as an anonymous guest.
Q.48 What are the three types of routing?

Routing can be classified into three categories –

  • Static routing
  • Default routing
  • Dynamic routing
Q.49 Define a Domain Name System.
The Domain Name System (DNS) is a supporting program that is used by programs such as to find the IP address of an email recipient.
Q.50 What are routers?
Routers are capable of connecting two or more network segments. These are brilliant network devices useful for storing information in its routing tables, like paths, hops, and bottlenecks
Q.51 What is the advantage and disadvantage of mesh topology?
The advantage of mesh topology is that even if one link breaks then it doesn’t affect the whole network and the disadvantage is that huge cabling is needed and it is expensive.
Q.52 Differentiate Communication and Transmission?
The data gets transferred from source to destination through transmission. Thus, it is treated as the physical movement of data. On the other hand, communication refers to the process of sending and receiving data between two media.
Q.53 Describe Network Topology
Network topology refers to the layout of a computer network. It represents how devices and cables are physically laid out and how are they connected.
Q.54 Briefly describe NAT.
NAT is the short form for Network Address Translation. This is a general protocol that gives a way for multiple computers on a common network to share a single connection to the Internet.
Q.55 What is data encapsulation?
Data encapsulation is basically the process of breaking down of information into smaller and manageable chunks before transmitting it across the network. In this process, the source and destination addresses are attached to the headers with parity check.
Q.56 When you arrive at the customer's desk the computer is giving a continuous beep noise that will not stop. What is the problem?
A key on the key board is stuck in the down position.
Q.57 A Windows 9x system fails to successfully detect new devices that are added. What should you check first?
BIOS settings in CMOS for Plug and Play.
Q.58 What can a crossover cable in an Ethernet network be used to do?
Connect two network devices without a Hub.
Q.59 What is an appropriate use of a default route?
To provide routing to a destination that is not specified in the routing table and which is outside the local network.
Q.60 What are the functional ICs used in SMPS?
The functional ICs used in SMPS are IC TL 494 & IC LM 339.
Get Govt. Certified Take Test