Questions: Computer Networks & Cisco
Back to Topics List

Computer Networks & Cisco Questions

Page 4 of 6 (Displaying Questions 301 – 400 of 542 Total)

301. What is the term for a permanent circuit between two communication points?

Show Answer

This is known as a Leased Line or a Dedicated Circuit.

Added: Dec 01, 2025

302. What is the typical frequency range used by Wi-Fi signals (in Gigahertz)?

Show Answer

Wi-Fi typically uses the 2.4 GHz and 5 GHz frequency bands.

Added: Dec 01, 2025

303. What is the main advantage of the 2.4 GHz Wi-Fi band?

Show Answer

The main advantage is that it provides a longer range and can penetrate walls and obstacles better.

Added: Dec 01, 2025

304. What is the main advantage of the 5 GHz Wi-Fi band?

Show Answer

The main advantage is that it offers much faster data speeds and has more available channels, leading to less interference and congestion.

Added: Dec 01, 2025

305. What is "SSID" in wireless networking?

Show Answer

SSID (Service Set Identifier) is the name of the Wi-Fi network that you see when you try to connect (e.g., "Home Wi-Fi").

Added: Dec 01, 2025

306. What does the term "Channel Bonding" refer to in Wi-Fi?

Show Answer

Channel bonding is the technique of combining two or more wireless channels into one wider channel to achieve faster data transfer rates.

Added: Dec 01, 2025

307. What is the difference between a Half-Duplex and Full-Duplex network?

Show Answer

Half-duplex allows data to flow in both directions, but only one way at a time. Full-duplex allows data to flow in both directions simultaneously.

Added: Dec 01, 2025

308. Why does a Switch usually operate in Full-Duplex mode, while a Hub does not?

Show Answer

A switch operates in full-duplex because it creates a dedicated path between the two communicating devices. A hub uses a shared connection, forcing half-duplex.

Added: Dec 01, 2025

309. What is "Crosstalk" in twisted pair cables?

Show Answer

Crosstalk is when the signal from one pair of wires interferes with the signal on an adjacent pair, causing signal degradation and errors.

Added: Dec 01, 2025

310. How do twisted pair cables minimize crosstalk?

Show Answer

By twisting the individual pairs of wires, the electromagnetic interference from one pair is cancelled out by the interference from the other pair.

Added: Dec 01, 2025

311. What is the primary physical component inside a Fiber Optic cable?

Show Answer

It contains thin strands of glass or plastic fiber that transmit data using pulses of light.

Added: Dec 01, 2025

312. What is the main benefit of using light (Fiber Optic) over electrical signals (Copper)?

Show Answer

Light signals are immune to electrical interference and can travel much longer distances without losing signal strength (attenuation).

Added: Dec 01, 2025

313. What are the two main types of Fiber Optic cable?

Show Answer

The two types are Single-Mode Fiber (SMF) for very long distances and Multimode Fiber (MMF) for shorter distances.

Added: Dec 01, 2025

314. What is a "UTP" cable (Unshielded Twisted Pair)?

Show Answer

UTP is the most common type of networking cable (Ethernet) that has no extra foil or braiding around the wires to protect against outside interference.

Added: Dec 01, 2025

315. What is an "STP" cable (Shielded Twisted Pair)?

Show Answer

STP is a type of twisted pair cable that has an extra metallic shielding layer inside to protect the wires from external electromagnetic interference.

Added: Dec 01, 2025

316. What is the maximum effective distance for a standard UTP Ethernet cable run?

Show Answer

The maximum distance is typically about 100 meters (328 feet).

Added: Dec 01, 2025

317. What is the purpose of the "time to live" (TTL) field in an IP packet?

Show Answer

TTL prevents a packet from circulating endlessly on the network by forcing it to be discarded once its hop count (or time limit) reaches zero.

Added: Dec 01, 2025

318. What is a "Man-in-the-Middle" (MITM) attack?

Show Answer

An attack where the hacker places themselves secretly between two communicating parties, intercepting, reading, and possibly altering the data without either party knowing.

Added: Dec 01, 2025

319. What is a "Cryptographic Hash"?

Show Answer

A hash is a mathematical algorithm that turns any amount of data into a fixed-length string of characters. It is used to quickly check if a file has been changed (data integrity).

Added: Dec 01, 2025

320. What is the key principle of a secure hash function?

Show Answer

A small change in the original data will cause a completely different hash value, and it should be impossible to go from the hash back to the original data.

Added: Dec 01, 2025

321. What is the difference between a "Virus" and "Malware"?

Show Answer

Malware (Malicious Software) is a general term for all harmful software. A virus is a specific type of malware that self-replicates and attaches itself to clean files.

Added: Dec 01, 2025

322. What is a "Zero-Day Vulnerability"?

Show Answer

It is a security flaw in software that is unknown to the vendor (developer) and has no existing patch or fix, making it a very serious security risk.

Added: Dec 01, 2025

323. What is "Two-Factor Authentication" (2FA)?

Show Answer

2FA is a security method that requires two different forms of verification to gain access, such as a password (something you know) and a code from your phone (something you have).

Added: Dec 01, 2025

324. What is the function of a "Digital Certificate" (or SSL Certificate)?

Show Answer

It verifies the identity of a website or server to the client and contains the necessary public key for secure, encrypted communication (HTTPS).

Added: Dec 01, 2025

325. What is "Certificate Revocation"?

Show Answer

Certificate revocation is the process of permanently invalidating a digital certificate before its expiration date, usually because the private key has been compromised.

Added: Dec 01, 2025

326. What is the role of an Antivirus program?

Show Answer

An antivirus program detects, prevents, and removes malicious software, such as viruses, worms, and Trojans, from a computer system.

Added: Dec 01, 2025

327. What is "Spam" in network terms?

Show Answer

Spam refers to unwanted, unsolicited digital messages, usually sent in bulk via email.

Added: Dec 01, 2025

328. What is "Adware"?

Show Answer

Adware is software that automatically displays or downloads unwanted advertisements when a user is online, often installed without their knowledge.

Added: Dec 01, 2025

329. What is a "Rootkit"?

Show Answer

A rootkit is a set of programs designed to hide the presence of malware from users and security systems, allowing a hacker to maintain control over a system.

Added: Dec 01, 2025

330. What is the main security threat when using an unencrypted public Wi-Fi hotspot?

Show Answer

The main threat is eavesdropping, where a hacker can easily intercept and read your data, including passwords and personal information.

Added: Dec 01, 2025

331. What is the highest level of security encryption generally recommended for Wi-Fi today?

Show Answer

WPA3 is the current recommended highest standard, replacing WPA2.

Added: Dec 01, 2025

332. What is the difference between a DoS and a DDoS attack?

Show Answer

A DoS (Denial of Service) attack comes from one single source, while a DDoS (Distributed Denial of Service) attack comes from many different, spread-out sources at the same time.

Added: Dec 01, 2025

333. What is a "Botnet"?

Show Answer

A botnet is a large network of compromised computers ("bots" or "zombies") controlled remotely by a single attacker, often used to launch DDoS attacks.

Added: Dec 01, 2025

334. What is "Social Engineering" in the context of security?

Show Answer

It is the psychological manipulation of people into performing actions or divulging confidential information, often through trickery like phishing.

Added: Dec 01, 2025

335. What is "Dumpster Diving" as a security risk?

Show Answer

It is the act of sifting through a company's or individual's trash to find valuable information that can be used to launch an attack.

Added: Dec 01, 2025

336. What is the purpose of a "Security Policy" in an organization?

Show Answer

A security policy is a set of rules and guidelines that states how an organization manages, protects, and handles its sensitive information and technology assets.

Added: Dec 01, 2025

337. What does the term "Non-Repudiation" mean in security?

Show Answer

It means that a party in a communication cannot successfully deny having sent a message or committed an action, often ensured through digital signatures.

Added: Dec 01, 2025

338. What is "Penetration Testing"?

Show Answer

Penetration testing is a simulated cyber attack against your computer system to check for exploitable vulnerabilities before a real hacker finds them.

Added: Dec 01, 2025

339. What is the term for a planned test that uses outside experts (attackers) against internal employees (defenders)?

Show Answer

This is often called a Red Team/Blue Team exercise.

Added: Dec 01, 2025

340. What is "Disaster Recovery" (DR) in networking?

Show Answer

DR is a set of procedures or plans to quickly restore a company's network, applications, and data access after a disaster, like a fire or a massive security breach.

Added: Dec 01, 2025

341. What is the difference between a "Cold Site" and a "Hot Site" for disaster recovery?

Show Answer

A hot site is a fully equipped backup location ready to go immediately. A cold site is a basic location that requires time (days or weeks) to install equipment and services.

Added: Dec 01, 2025

342. What is the job of the `ipconfig` command on a Windows computer?

Show Answer

It displays all current TCP/IP network configuration values for all network adapters on the computer.

Added: Dec 01, 2025

343. What is the job of the `ping` command?

Show Answer

It tests whether a remote device (server) is reachable across a network and measures the round-trip time for a message to be delivered.

Added: Dec 01, 2025

344. What is the job of the `tracert` (or `traceroute`) command?

Show Answer

It traces the path (hops) that a packet takes from your device to a destination on the network and reports the delay at each step.

Added: Dec 01, 2025

345. What is the job of the `netstat` command?

Show Answer

It displays active network connections, routing tables, and a variety of network interface statistics for your computer.

Added: Dec 01, 2025

346. What does the error message "Request Timed Out" usually mean during a ping test?

Show Answer

It usually means that the destination is unreachable, perhaps due to a blocked firewall, a faulty router, or simply being offline.

Added: Dec 01, 2025

347. What is "jitter" and why is it bad for video calls?

Show Answer

Jitter is the variation in the arrival time of data packets. It is bad because it makes video and audio choppy, broken, or difficult to understand.

Added: Dec 01, 2025

348. What is the first step you should generally take when troubleshooting an IP connectivity issue?

Show Answer

Check the physical connections (cables) and confirm that the device has received a valid IP address from the network (using `ipconfig`/`ifconfig`).

Added: Dec 01, 2025

349. If you can ping 127.0.0.1 but cannot ping your router, what does that tell you?

Show Answer

It tells you that the network software on your computer is working correctly, but there is an issue with your network card, cable, or the router itself.

Added: Dec 01, 2025

350. What is a "Cloud" in networking terms?

Show Answer

The "cloud" is a simple way of describing a network of remote servers that are hosted on the Internet to store, manage, and process data, instead of using a local server or personal computer.

Added: Dec 01, 2025

351. What is the main benefit of "Cloud Computing"?

Show Answer

The main benefit is flexibility, reduced local maintenance costs, and the ability to easily scale (increase or decrease) resources like storage and processing power.

Added: Dec 01, 2025

352. What does the term "Virtualization" mean?

Show Answer

Virtualization is the technology that creates a software-based version of something physical, like a computer, server, storage device, or network resource.

Added: Dec 01, 2025

353. What is a "Virtual Machine" (VM)?

Show Answer

A VM is a computer file, typically called an image, that acts like an actual computer, allowing you to run a full operating system within another operating system.

Added: Dec 01, 2025

354. What is a "Container" (like Docker) and how is it different from a VM?

Show Answer

A container packages an application and its necessary code and settings. Unlike a VM, it shares the host operating system, making it much smaller and faster to start up.

Added: Dec 01, 2025

355. What does "IaaS" (Infrastructure as a Service) mean in cloud networking?

Show Answer

IaaS is a cloud service that provides the basic computing resources, like virtual machines and network infrastructure, which the user manages themselves.

Added: Dec 01, 2025

356. What does "SaaS" (Software as a Service) mean in cloud networking?

Show Answer

SaaS is a cloud service that provides ready-to-use software applications over the Internet, like email or office tools, where the user manages almost nothing.

Added: Dec 01, 2025

357. What does "PaaS" (Platform as a Service) mean in cloud networking?

Show Answer

PaaS is a cloud service that provides a computing platform and environment, allowing users to develop, run, and manage applications without dealing with the infrastructure complexity.

Added: Dec 01, 2025

358. What is "Hybrid Cloud"?

Show Answer

Hybrid cloud is a mixed environment where an organization uses a combination of on-premise (local) infrastructure, private cloud, and public cloud services.

Added: Dec 01, 2025

359. What is a "Service Level Agreement" (SLA) in cloud services?

Show Answer

An SLA is a contract between the provider and the user that guarantees a specific level of service, particularly uptime (how long the service will be available).

Added: Dec 01, 2025

360. What is "Eavesdropping" in network security?

Show Answer

Eavesdropping (or sniffing) is secretly listening to private communication over a network without consent, often by intercepting unencrypted data.

Added: Dec 01, 2025

361. What is the main purpose of "Stealth Mode" in a network device?

Show Answer

Stealth mode means the device is configured not to respond to common network probes (like pings or port scans), making it difficult for an attacker to detect its presence.

Added: Dec 01, 2025

362. What is the difference between an Internal Router and an Edge Router?

Show Answer

An Internal Router handles traffic within a company network. An Edge Router sits at the boundary and connects the internal network to the outside network (Internet).

Added: Dec 01, 2025

363. What is the primary role of a "Core Router"?

Show Answer

A core router sits in the center of a large network and is designed for maximum speed and performance to handle the main backbone traffic, but not necessarily policy or filtering.

Added: Dec 01, 2025

364. What is a "Logical Topology"?

Show Answer

The logical topology describes how the data flows through the network, regardless of the physical arrangement of the wires and devices.

Added: Dec 01, 2025

365. What is a "Physical Topology"?

Show Answer

The physical topology describes the actual wire layout of the network and where the cables, devices, and connections are physically located.

Added: Dec 01, 2025

366. What is the term for devices that are connected only to their two adjacent neighbors?

Show Answer

This arrangement is called a Ring Topology.

Added: Dec 01, 2025

367. What is the term for a network where all devices share a single communication path?

Show Answer

This is a Bus Topology.

Added: Dec 01, 2025

368. What is a "Metropolitan Area Network" (MAN)?

Show Answer

A MAN is a network that covers a geographic area larger than a LAN but smaller than a WAN, typically spanning an entire city or large campus.

Added: Dec 01, 2025

369. What is a "Personal Area Network" (PAN)?

Show Answer

A PAN is a network used for communication among different technological devices close to one person, like connecting your phone, earbuds, and smartwatch using Bluetooth.

Added: Dec 01, 2025

370. What does the term "Quality of Service" (QoS) refer to?

Show Answer

QoS is a set of techniques used to manage network resources by prioritizing certain types of traffic (like voice or video) over other, less urgent traffic.

Added: Dec 01, 2025

371. How does QoS help improve VoIP (Voice over IP) calls?

Show Answer

It ensures that the voice data packets are given priority and experience minimal delay (low latency) and minimal variation in delay (low jitter).

Added: Dec 01, 2025

372. What is "Data Link Layer Addressing"?

Show Answer

Data Link Layer addressing refers to the use of MAC addresses, which are physical addresses unique to each network card.

Added: Dec 01, 2025

373. What is "Network Layer Addressing"?

Show Answer

Network Layer addressing refers to the use of IP addresses, which are logical addresses that change depending on the network.

Added: Dec 01, 2025

374. What is "Port Address Translation" (PAT)?

Show Answer

PAT is a form of NAT that allows multiple internal private IP addresses to share a single public IP address by using different port numbers for each connection.

Added: Dec 01, 2025

375. What is the main role of a DHCP Reservation?

Show Answer

A DHCP reservation ensures that a specific device (identified by its MAC address) always receives the same, unchanging IP address from the DHCP server.

Added: Dec 01, 2025

376. What is the key difference between an "Access Point" and a "Wireless Router"?

Show Answer

A Wireless Router is a combination of a router, a switch, and an access point. An Access Point is just a radio transmitter to connect wireless devices to a wired network.

Added: Dec 01, 2025

377. What is a "Captive Portal"?

Show Answer

A captive portal is the web page that forces users to see or interact with it before granting them access to a public Wi-Fi network (e.g., in an airport or coffee shop).

Added: Dec 01, 2025

378. What is the purpose of "WPS" (Wi-Fi Protected Setup)?

Show Answer

WPS is a simplified method to connect new wireless devices to a router without having to enter the full Wi-Fi password, usually by pressing a button.

Added: Dec 01, 2025

379. What is the primary danger of using WPS?

Show Answer

The protocol has a known security flaw that makes it vulnerable to brute-force attacks, allowing a hacker to quickly guess the PIN.

Added: Dec 01, 2025

380. What is "Wireless Site Survey"?

Show Answer

A site survey is the process of planning and designing a wireless network by measuring signal strength, noise, and interference in a physical location to optimize access point placement.

Added: Dec 01, 2025

381. What is the main concern when using a "Daisy Chain" arrangement of switches?

Show Answer

It can create unnecessary network loops or overly long paths, which can be inefficient and hard to troubleshoot.

Added: Dec 01, 2025

382. What is the job of a "Media Converter"?

Show Answer

A media converter is a simple networking device that connects two different types of network media, such as converting a copper Ethernet signal to a fiber optic signal.

Added: Dec 01, 2025

383. What is a "Demarcation Point" or "Demarc"?

Show Answer

The demarc is the physical point where the public network (ISP) ends and the private customer network begins. It marks the responsibility line for troubleshooting.

Added: Dec 01, 2025

384. What is the typical default port number for Telnet?

Show Answer

The standard default port for Telnet is 23.

Added: Dec 01, 2025

385. What is the typical default port number for SMTP?

Show Answer

The standard default port for SMTP is 25.

Added: Dec 01, 2025

386. What is the typical default port number for Secure HTTP (HTTPS)?

Show Answer

The standard default port for HTTPS is 443.

Added: Dec 01, 2025

387. What is the term for a connection that remains active and reserved for a certain period of time?

Show Answer

This is known as a Persistent Connection.

Added: Dec 01, 2025

388. What is the HTTP status code range that indicates a successful request?

Show Answer

The 2xx range (like 200 OK) indicates success.

Added: Dec 01, 2025

389. What is the HTTP status code range that indicates an error on the client side?

Show Answer

The 4xx range (like 404 Not Found) indicates a client error.

Added: Dec 01, 2025

390. What is the HTTP status code range that indicates an error on the server side?

Show Answer

The 5xx range (like 500 Internal Server Error) indicates a server error.

Added: Dec 01, 2025

391. What is the benefit of a "Hot Standby Router Protocol" (HSRP)?

Show Answer

It allows two or more routers to share a single virtual IP address, ensuring that if the main router fails, a backup router automatically takes over without interruption.

Added: Dec 01, 2025

392. What is "Load Sharing" in networking?

Show Answer

Load sharing is a routing technique where a single stream of network traffic is distributed across multiple paths to increase overall bandwidth and reliability.

Added: Dec 01, 2025

393. What is the term for the entire set of networks controlled by a single organization that uses internal routing protocols?

Show Answer

This is an Autonomous System (AS).

Added: Dec 01, 2025

394. What is "Multiplexing" in networking?

Show Answer

Multiplexing is the technique of sending multiple data streams over a single physical communication link at the same time, often used to save on cable costs.

Added: Dec 01, 2025

395. What is the term for the opposite of multiplexing, separating the combined data streams?

Show Answer

This is called Demultiplexing.

Added: Dec 01, 2025

396. What is the main goal of "Data Compression" in networking?

Show Answer

To reduce the total number of bits needed to represent the data, which increases the speed of transmission and reduces the amount of bandwidth used.

Added: Dec 01, 2025

397. What is the difference between "Lossless" and "Lossy" data compression?

Show Answer

Lossless compression allows the original data to be perfectly reconstructed. Lossy compression permanently discards some less important data to achieve a much smaller file size.

Added: Dec 01, 2025

398. What is the purpose of the "checksum" field in a data packet?

Show Answer

The checksum is a small number used to check for errors. The receiver recalculates the checksum and compares it to the one sent to see if the data was corrupted during transit.

Added: Dec 01, 2025

399. What is "Encapsulation" at the OSI model?

Show Answer

It is the process of wrapping data with the necessary protocol information (headers and trailers) as it moves down the layers of the sending device.

Added: Dec 01, 2025

400. What is "Decapsulation" at the OSI model?

Show Answer

It is the process of stripping off the protocol information (headers and trailers) as the data moves up the layers of the receiving device, until the original data is revealed to the application.

Added: Dec 01, 2025