Questions: Computer Networks & Cisco
Back to Topics List

Computer Networks & Cisco Questions

Page 2 of 6 (Displaying Questions 101 – 200 of 542 Total)

101. What is the process of scrambling data so only authorized people can read it called?

Show Answer

This process is called Encryption.

Added: Dec 01, 2025

102. What is the difference between Symmetric and Asymmetric Encryption?

Show Answer

Symmetric encryption uses one secret key for both scrambling and unscrambling data. Asymmetric encryption uses a pair of keys (public and private) for security.

Added: Dec 01, 2025

103. What is a "Digital Signature"?

Show Answer

A digital signature is a mathematical technique used to prove the authenticity and integrity (that it hasn't been changed) of a digital message or document.

Added: Dec 01, 2025

104. What is the function of POP3 (Post Office Protocol version 3)?

Show Answer

POP3 is an email protocol used by a client to retrieve and download email messages from an email server.

Added: Dec 01, 2025

105. What is the function of IMAP (Internet Message Access Protocol)?

Show Answer

IMAP is an email protocol that allows a client to access and manage email messages on a mail server, keeping the messages synchronized across multiple devices.

Added: Dec 01, 2025

106. What does the term "PDU" (Protocol Data Unit) mean?

Show Answer

PDU is a generic term for the unit of data used by a specific layer of the network model. For example, a packet is the PDU of the Network Layer.

Added: Dec 01, 2025

107. What is a "Frame" in the Data Link Layer (Layer 2)?

Show Answer

A frame is the unit of data that the Data Link Layer uses. It includes the MAC addresses and a data packet from the layer above.

Added: Dec 01, 2025

108. What is the unit of data at the Physical Layer (Layer 1)?

Show Answer

The unit of data at the Physical Layer is called a Bit (a stream of ones and zeros).

Added: Dec 01, 2025

109. What is "Unicast" communication?

Show Answer

Unicast is a one-to-one transmission of data from one single sender to one single receiver.

Added: Dec 01, 2025

110. What is "Broadcast" communication?

Show Answer

Broadcast is a one-to-all transmission of data from one sender to all possible receivers on a network segment.

Added: Dec 01, 2025

111. What is "Multicast" communication?

Show Answer

Multicast is a one-to-many transmission of data from one sender to a specific group of multiple receivers that are interested in the information.

Added: Dec 01, 2025

112. What is a "Hotspot"?

Show Answer

A hotspot is a physical location where people can connect to a wireless network, often providing Internet access through a WAP connected to an ISP.

Added: Dec 01, 2025

113. What is the main purpose of SNMP (Simple Network Management Protocol)?

Show Answer

SNMP is used by network administrators to monitor and manage network devices, such as routers and switches, and check their performance and status.

Added: Dec 01, 2025

114. What is the concept of a "lease time" in DHCP?

Show Answer

Lease time is the period for which a DHCP client is allowed to use the IP address assigned to it by the DHCP server before needing to renew it.

Added: Dec 01, 2025

115. What is the key benefit of a Mesh Topology?

Show Answer

The key benefit is high redundancy and fault tolerance because every device is connected to every other device, so if one path fails, there is always another one.

Added: Dec 01, 2025

116. What is a "T-1 line"?

Show Answer

A T-1 line is a dedicated digital communication line that can transmit data at a speed of 1.544 Megabits per second.

Added: Dec 01, 2025

117. What is "Congestion" in a network?

Show Answer

Congestion occurs when too much data traffic tries to flow through a network segment, exceeding the capacity of the path, which causes delays and dropped packets.

Added: Dec 01, 2025

118. What does the term "Ethernet" refer to?

Show Answer

Ethernet is the most widely used family of networking technologies for connecting devices in a local area network (LAN).

Added: Dec 01, 2025

119. What are the two common types of twisted pair cables (based on shielding)?

Show Answer

The two types are UTP (Unshielded Twisted Pair) and STP (Shielded Twisted Pair).

Added: Dec 01, 2025

120. What is the "DORA" process in DHCP?

Show Answer

DORA stands for the four steps a client uses to get an IP address: Discover, Offer, Request, Acknowledge.

Added: Dec 01, 2025

121. What is a "Demilitarized Zone" (DMZ)?

Show Answer

A DMZ is a small, isolated network segment placed between a private internal network and the public Internet. It hosts public-facing servers to protect the internal network.

Added: Dec 01, 2025

122. What is the purpose of an "Access Control List" (ACL) on a router?

Show Answer

An ACL is a list of rules that controls which users or network traffic are allowed or denied access to specific areas of the network.

Added: Dec 01, 2025

123. What is "Load Testing" in networking?

Show Answer

Load testing is the process of putting a high demand on a network, server, or application to measure its response time and see how much traffic it can handle before performance drops.

Added: Dec 01, 2025

124. What is "Port Scanning" in network security?

Show Answer

Port scanning is a technique used to find out which communication ports on a remote device are open and listening for network connections, often used to find vulnerabilities.

Added: Dec 01, 2025

125. What is a "Digital Signature" used for in an email?

Show Answer

It is used to verify that the email actually came from the claimed sender and that its content has not been tampered with during transmission.

Added: Dec 01, 2025

126. What is the common HTTP status code for a successful request?

Show Answer

The common success code is 200 (OK).

Added: Dec 01, 2025

127. What does the HTTP status code 404 mean?

Show Answer

The 404 Not Found code means that the web server cannot find the file or page that the user requested.

Added: Dec 01, 2025

128. What is the difference between a Straight-Through cable and a Crossover cable?

Show Answer

A Straight-Through cable connects unlike devices (like a PC to a switch). A Crossover cable connects like devices (like a PC to a PC or switch to a switch).

Added: Dec 01, 2025

129. What is "PoE" (Power over Ethernet)?

Show Answer

PoE is a technology that allows network cables to carry electrical power to devices (like phones or cameras) along with data.

Added: Dec 01, 2025

130. What is the purpose of a "Bridge" in a network?

Show Answer

A bridge connects two separate network segments, mainly to filter traffic and reduce the number of collisions within each segment.

Added: Dec 01, 2025

131. What is an "Autonomous System" (AS)?

Show Answer

An AS is a collection of IP networks and routers controlled by a single administrative entity, such as a large corporation or an Internet Service Provider (ISP).

Added: Dec 01, 2025

132. What is BGP (Border Gateway Protocol) used for?

Show Answer

BGP is the main protocol used to exchange routing and reachability information between different Autonomous Systems across the public Internet.

Added: Dec 01, 2025

133. What is "Packet Switching"?

Show Answer

Packet switching is a method where data is broken into small packets that are sent independently over various network paths and reassembled at the destination.

Added: Dec 01, 2025

134. What is "Circuit Switching"?

Show Answer

Circuit switching is a method where a dedicated, continuous communication path is reserved between two parties for the entire duration of their connection (like old phone systems).

Added: Dec 01, 2025

135. What is the role of an ISP (Internet Service Provider)?

Show Answer

An ISP is a company that provides customers with access to the Internet.

Added: Dec 01, 2025

136. What is the primary role of a Repeater at the Physical Layer?

Show Answer

A repeater receives a signal, cleans it up by removing noise, and retransmits it with full power to extend the reach of the network segment.

Added: Dec 01, 2025

137. What is "Netmask"?

Show Answer

Netmask is another name for the Subnet Mask, a number that separates the network part of an IP address from the device part.

Added: Dec 01, 2025

138. What is the main purpose of OSPF (Open Shortest Path First)?

Show Answer

OSPF is a routing protocol used within large company networks to determine the most efficient path for data based on the shortest path calculation.

Added: Dec 01, 2025

139. What is "Ransomware"?

Show Answer

Ransomware is a type of malicious software that encrypts a user's files and demands a payment (ransom) for their decryption key.

Added: Dec 01, 2025

140. What is a "Trojan Horse" in network security?

Show Answer

A Trojan Horse is malicious software disguised as a useful or harmless program that, once installed, performs unauthorized or malicious actions.

Added: Dec 01, 2025

141. What is the role of the "traceroute" command on a Mac or Linux system?

Show Answer

It shows the route packets take to a network host, including the delay at each hop (router).

Added: Dec 01, 2025

142. What is a "Patch" in software or networking?

Show Answer

A patch is a small piece of software code designed to fix a bug or a security vulnerability in a program or operating system.

Added: Dec 01, 2025

143. What is the common default port for the DNS service?

Show Answer

The common default port for DNS is 53 (both TCP and UDP).

Added: Dec 01, 2025

144. What is "Session Hijacking"?

Show Answer

Session hijacking is a security attack where an attacker takes over an established communication session between two devices by stealing the session token or identifier.

Added: Dec 01, 2025

145. What is "Network Segmentation"?

Show Answer

Network segmentation is the practice of dividing a large network into smaller, isolated pieces, which helps to improve security and performance.

Added: Dec 01, 2025

146. What does the term "Media Access Control" (MAC) refer to?

Show Answer

MAC refers to the rule set that governs how devices share and gain access to the physical network medium (cable or airwaves).

Added: Dec 01, 2025

147. What is "CSMA/CD" (Carrier Sense Multiple Access with Collision Detection)?

Show Answer

It is a set of rules used in older Ethernet networks where devices listen before transmitting and stop and wait if a collision is detected.

Added: Dec 01, 2025

148. What is the difference between a "Host ID" and a "Network ID" in an IP address?

Show Answer

The Host ID identifies the specific device on a network. The Network ID identifies the network itself.

Added: Dec 01, 2025

149. What is the standard port for Telnet?

Show Answer

The standard port for Telnet is 23.

Added: Dec 01, 2025

150. What is Telnet used for?

Show Answer

Telnet is a simple protocol used to establish a remote connection to a device or server over a network, although it is less secure than SSH.

Added: Dec 01, 2025

151. What is the primary role of the Transport Layer (Layer 4)?

Show Answer

Its primary role is to ensure reliable or rapid (TCP or UDP) delivery of data between the sender application and the receiver application.

Added: Dec 01, 2025

152. What is an "Intrusion Detection System" (IDS)?

Show Answer

An IDS is a security system that monitors network traffic for suspicious activity and sends alerts when it finds potential threats.

Added: Dec 01, 2025

153. What is an "Intrusion Prevention System" (IPS)?

Show Answer

An IPS is like an IDS, but it can also actively block or stop threats once they are detected, rather than just alerting the administrator.

Added: Dec 01, 2025

154. What is "Trunking" in the context of VLANs?

Show Answer

Trunking is the process of setting up a single physical connection between two switches that can carry data traffic for multiple different VLANs by tagging the data.

Added: Dec 01, 2025

155. What is the name of the standard that defines how VLANs are tagged?

Show Answer

The standard is 802.1Q.

Added: Dec 01, 2025

156. What is a "Static IP address"?

Show Answer

A static IP address is one that is manually assigned to a device and remains the same indefinitely. It is permanent.

Added: Dec 01, 2025

157. What is a "Dynamic IP address"?

Show Answer

A dynamic IP address is one that is automatically assigned to a device by a DHCP server for a temporary period (a lease).

Added: Dec 01, 2025

158. What is the use of the "ipconfig" command in Windows or "ifconfig" in Linux/Mac?

Show Answer

These commands are used to view and manage the network interface settings of the local computer, such as its IP address, subnet mask, and default gateway.

Added: Dec 01, 2025

159. What is "packet filtering"?

Show Answer

Packet filtering is a simple firewall technique that examines the source and destination IP addresses and ports of data packets to decide whether to allow or deny them.

Added: Dec 01, 2025

160. What is a "System Log" (Syslog) server?

Show Answer

A Syslog server is a central location where network devices send their event messages, warnings, and error logs for safe storage and easy monitoring.

Added: Dec 01, 2025

161. What is the main goal of using a "Digital Signature"?

Show Answer

The main goal is Non-Repudiation, meaning the sender cannot later deny that they sent the message.

Added: Dec 01, 2025

162. What is the term for the entire collection of protocols used for the Internet?

Show Answer

This collection is often called the TCP/IP Protocol Suite or the Internet Protocol Stack.

Added: Dec 01, 2025

163. What is a "Bus Topology"?

Show Answer

A bus topology is a network setup where all devices are connected to a single central cable, or backbone. Data travels from one end to the other.

Added: Dec 01, 2025

164. What is a "Ring Topology"?

Show Answer

A ring topology is a network setup where devices are connected in a circle, and data travels around the loop in one direction.

Added: Dec 01, 2025

165. What is the term for the maximum size of a packet that can be sent over a network without being broken up?

Show Answer

This is the Maximum Transmission Unit (MTU).

Added: Dec 01, 2025

166. What is "Packet Loss"?

Show Answer

Packet loss is when one or more packets of data traveling across a computer network fail to reach their destination, which often leads to retransmission and delays.

Added: Dec 01, 2025

167. What is the purpose of an "IP Conflict"?

Show Answer

An IP conflict occurs when two or more devices on the same network are assigned the same IP address, which prevents either device from communicating correctly.

Added: Dec 01, 2025

168. What does the abbreviation SFTP stand for?

Show Answer

SFTP stands for SSH File Transfer Protocol. It is a secure way to transfer files using the SSH connection.

Added: Dec 01, 2025

169. What is "Man-in-the-Middle" (MITM) attack?

Show Answer

A MITM attack is when an attacker secretly intercepts and controls the communication between two parties who believe they are communicating directly with each other.

Added: Dec 01, 2025

170. What is the difference between a Modem and a Router?

Show Answer

A modem connects your home network to your ISP and the Internet. A router connects all the devices within your home network together and shares the modem's connection.

Added: Dec 01, 2025

171. What is the standard port for SMTP (Simple Mail Transfer Protocol)?

Show Answer

The common standard port for SMTP is 25.

Added: Dec 01, 2025

172. What is "SOHO" in networking?

Show Answer

SOHO stands for Small Office/Home Office and refers to networking equipment and setups designed for smaller, residential, or office environments.

Added: Dec 01, 2025

173. What is the primary function of a "bridge" in a network?

Show Answer

A bridge connects two network segments at the Data Link layer and forwards data frames between them based on the MAC addresses.

Added: Dec 01, 2025

174. What is "Fiber to the Home" (FTTH)?

Show Answer

FTTH is a technology that runs fiber optic cables directly from the service provider's central office to individual homes, providing very high-speed Internet access.

Added: Dec 01, 2025

175. What is "PDU" at the Transport Layer (Layer 4)?

Show Answer

The PDU at the Transport Layer is called a Segment (for TCP) or a Datagram (for UDP).

Added: Dec 01, 2025

176. What is "Packet Fragmentation"?

Show Answer

Packet fragmentation is the process where a data packet is divided into smaller pieces (fragments) because its original size is larger than the Maximum Transmission Unit (MTU) of a network link.

Added: Dec 01, 2025

177. What is "MAC Flooding"?

Show Answer

MAC flooding is a security attack that tries to overload a network switch's memory (its MAC address table) by sending many frames with different fake source MAC addresses, causing the switch to flood all traffic.

Added: Dec 01, 2025

178. What is "ARP Spoofing"?

Show Answer

ARP Spoofing is a malicious technique where an attacker sends false ARP messages to link their own MAC address with the IP address of a legitimate device, often to intercept data.

Added: Dec 01, 2025

179. What is the difference between "Digital" and "Analog" signals?

Show Answer

Digital signals are discrete and use binary (1s and 0s). Analog signals are continuous and use waves to represent data.

Added: Dec 01, 2025

180. What is the basic idea of "Carrier Sense" in networking?

Show Answer

Carrier Sense means that a device listens to the network medium (cable) before transmitting data to check if another device is currently sending information.

Added: Dec 01, 2025

181. What is "Throttling" (Bandwidth Throttling)?

Show Answer

Throttling is the intentional slowing down of Internet service by an ISP or network administrator to manage network usage or minimize congestion.

Added: Dec 01, 2025

182. What is a "Top-Level Domain" (TLD)?

Show Answer

The TLD is the part of a website address that comes after the final dot (like .com, .org, or .net).

Added: Dec 01, 2025

183. What is the main advantage of using UDP over TCP?

Show Answer

UDP is much faster than TCP because it does not waste time performing the handshake or checking for errors and guaranteed delivery.

Added: Dec 01, 2025

184. What is "DNS poisoning"?

Show Answer

DNS poisoning is a security attack where incorrect information is introduced into a DNS server's cache, causing users to be directed to malicious websites.

Added: Dec 01, 2025

185. What is the role of a "Default Gateway" for a device that wants to reach the Internet?

Show Answer

The device sends all traffic meant for the Internet to the default gateway, which is usually the router.

Added: Dec 01, 2025

186. What are "Beacons" in wireless networking?

Show Answer

Beacons are small frames regularly sent by a Wireless Access Point (WAP) to announce its presence and provide necessary information (like the network name) to connecting devices.

Added: Dec 01, 2025

187. What is the purpose of the TCP "Three-Way Handshake"?

Show Answer

It is the process used by TCP to establish a reliable, connection-oriented session between two devices before any actual data transmission begins.

Added: Dec 01, 2025

188. What is a "client-server" model in networking?

Show Answer

It is a network architecture where the work is distributed between service providers (servers) and service requestors (clients).

Added: Dec 01, 2025

189. What is a "Peer-to-Peer" network?

Show Answer

A peer-to-peer network is one where all computers have equal status and can act as both clients and servers to share resources without needing a central server.

Added: Dec 01, 2025

190. What is "Redundancy" in network design?

Show Answer

Redundancy means having backup or extra components (like power supplies, links, or routes) so that the network can continue to function even if one part fails.

Added: Dec 01, 2025

191. What is "DLP" (Data Loss Prevention)?

Show Answer

DLP is a set of security tools and procedures designed to ensure that sensitive data is not lost, misused, or accessed by unauthorized users.

Added: Dec 01, 2025

192. What is a "Root Bridge" in the Spanning Tree Protocol (STP)?

Show Answer

The Root Bridge is the primary switch in an STP-enabled network, acting as the reference point for all path calculations to prevent network loops.

Added: Dec 01, 2025

193. What is the general name for an unauthorized user gaining access to a computer system or network?

Show Answer

This is commonly called Hacking or Unauthorized Access.

Added: Dec 01, 2025

194. What is the term for a device that sends a signal further along a cable by amplifying it?

Show Answer

This device is a Repeater or an Amplifier.

Added: Dec 01, 2025

195. What is the main role of a DHCP Relay Agent?

Show Answer

A DHCP Relay Agent is a feature on a router that forwards DHCP requests from clients to a DHCP server located on a different network segment.

Added: Dec 01, 2025

196. What is "S-FTP"?

Show Answer

S-FTP stands for Simple File Transfer Protocol, a secure alternative to FTP.

Added: Dec 01, 2025

197. What is the function of EIGRP (Enhanced Interior Gateway Routing Protocol)?

Show Answer

EIGRP is an efficient routing protocol used within a private network (Autonomous System) that keeps track of the best routes and backup routes.

Added: Dec 01, 2025

198. What is "SNMP Trap"?

Show Answer

An SNMP Trap is a warning message sent by a network device to the central monitoring station (SNMP manager) when an important event or error occurs.

Added: Dec 01, 2025

199. What is "ICMP Flooding"?

Show Answer

ICMP flooding is a DoS attack where a target system is overwhelmed with a large number of ICMP Echo Request packets (pings).

Added: Dec 01, 2025

200. What is a "Wireless Ad-hoc Mode"?

Show Answer

Ad-hoc mode is a wireless network where devices communicate directly with each other without relying on a central router or access point.

Added: Dec 01, 2025