Questions: Computer Networks & Cisco
Back to Topics List

Computer Networks & Cisco Questions

Page 5 of 6 (Displaying Questions 401 – 500 of 542 Total)

401. How do you renew an IP address on a Windows PC using the command line?

Show Answer

Use the command ipconfig /renew.

Added: Dec 01, 2025

402. How do you release an IP address on a Windows PC using the command line?

Show Answer

Use the command ipconfig /release.

Added: Dec 01, 2025

403. What is the key difference between a Class C and a Class B network, regarding host capacity?

Show Answer

A Class C network can support up to 254 devices. A Class B network can support up to 65,534 devices.

Added: Dec 01, 2025

404. What is the primary motivation for shifting from IPv4 to IPv6?

Show Answer

The primary motivation is the exhaustion of the available pool of unique IPv4 addresses worldwide.

Added: Dec 01, 2025

405. What is "Unicast" traffic?

Show Answer

Unicast is a one-to-one transmission, meaning one sender sends data to one specific receiver.

Added: Dec 01, 2025

406. What is "Multicast" traffic?

Show Answer

Multicast is a one-to-many transmission, meaning one sender sends data to a specific group of multiple receivers who are subscribed to that group.

Added: Dec 01, 2025

407. What is "Broadcast" traffic?

Show Answer

Broadcast is a one-to-all transmission, meaning one sender sends data to all devices on the current network segment.

Added: Dec 01, 2025

408. What is "Anycast" traffic (primarily used in IPv6)?

Show Answer

Anycast is a one-to-nearest transmission, meaning one sender sends data to the geographically closest server among a group of servers that share the same IP address.

Added: Dec 01, 2025

409. What is "Cloud bursting"?

Show Answer

Cloud bursting is a setup where an organization runs its applications locally but switches to a public cloud when its local resource needs exceed capacity.

Added: Dec 01, 2025

410. What is the job of a "Hypervisor" in virtualization?

Show Answer

A hypervisor is the core software layer that creates and manages virtual machines (VMs), allowing multiple operating systems to run on a single physical server.

Added: Dec 01, 2025

411. What is "Zero Trust" security model?

Show Answer

Zero Trust is a security concept that states that no user, device, or application, whether inside or outside the network, should be trusted by default.

Added: Dec 01, 2025

412. What is the most common default IP address used by home routers?

Show Answer

The most common default IP addresses are 192.168.0.1 or 192.168.1.1.

Added: Dec 01, 2025

413. What is the term for the process where a router looks up the destination IP address in its table?

Show Answer

This process is called Routing Table Lookup.

Added: Dec 01, 2025

414. What is a "Static Route"?

Show Answer

A static route is a path that a network administrator manually programs into a router, which does not change unless manually reconfigured.

Added: Dec 01, 2025

415. What is a "Dynamic Route"?

Show Answer

A dynamic route is a path that a router automatically learns and updates by exchanging information with other routers using a routing protocol (like OSPF or RIP).

Added: Dec 01, 2025

416. What does RIP (Routing Information Protocol) primarily use to determine the best path?

Show Answer

RIP uses the Hop Count (the number of routers to pass through) as its primary way to determine the best path.

Added: Dec 01, 2025

417. What is the role of an Intrusion Detection System (IDS)?

Show Answer

An IDS monitors network traffic and alerts administrators when it finds suspicious activity or signs of an attack.

Added: Dec 01, 2025

418. What is the role of an Intrusion Prevention System (IPS)?

Show Answer

An IPS is similar to an IDS but also has the power to actively block or stop the malicious traffic once it detects an attack signature.

Added: Dec 01, 2025

419. What is a "Pharming" attack?

Show Answer

Pharming is a type of attack that redirects users to a malicious website even if they correctly type the website address, often by poisoning DNS records.

Added: Dec 01, 2025

420. What is the difference between a "White Hat" and a "Black Hat" hacker?

Show Answer

White Hat hackers are ethical security experts who help organizations find vulnerabilities. Black Hat hackers are malicious and try to exploit vulnerabilities for personal gain.

Added: Dec 01, 2025

421. What is "WarDriving"?

Show Answer

WarDriving is the act of searching for unprotected wireless networks from a moving vehicle, often using a laptop and an antenna.

Added: Dec 01, 2025

422. What is "Packet Sniffing"?

Show Answer

Packet sniffing is the use of a tool to capture and analyze the data (packets) traveling over a network, often for troubleshooting or security interception.

Added: Dec 01, 2025

423. What is a "Head-end" in networking?

Show Answer

The head-end is a central location where a service provider terminates its main cables and connects the public network to the communication backbone (used often in cable TV/Internet).

Added: Dec 01, 2025

424. What is "Symmetric Cryptography"?

Show Answer

Symmetric cryptography is an encryption method that uses the same single secret key for both scrambling (encryption) and unscrambling (decryption) the data.

Added: Dec 01, 2025

425. What is "Asymmetric Cryptography"?

Show Answer

Asymmetric cryptography is an encryption method that uses a pair of related keys: a Public Key for encryption and a Private Key for decryption.

Added: Dec 01, 2025

426. Which type of cryptography (Symmetric or Asymmetric) is faster for encrypting large amounts of data?

Show Answer

Symmetric cryptography is much faster for encrypting large amounts of data.

Added: Dec 01, 2025

427. What is the role of the "Public Key" in Asymmetric Cryptography?

Show Answer

The Public Key can be shared freely and is used by others to encrypt a message that only the owner of the matching Private Key can read.

Added: Dec 01, 2025

428. What is the role of the "Private Key" in Asymmetric Cryptography?

Show Answer

The Private Key must be kept secret and is used to decrypt messages that were encrypted with the matching Public Key.

Added: Dec 01, 2025

429. What is "Ethernet over Powerline" (EoP)?

Show Answer

EoP is a technology that uses a building's existing electrical wiring to transmit network data, creating a wired network connection through power outlets.

Added: Dec 01, 2025

430. What is "Latency" in networking?

Show Answer

Latency is the time delay from when a data packet is sent until it is received at the destination.

Added: Dec 01, 2025

431. What is "Round Trip Time" (RTT)?

Show Answer

RTT is the amount of time it takes for a signal to go from one point to another and then back again, often measured by the ping command.

Added: Dec 01, 2025

432. What is the common term for the maximum amount of data a user can send or receive over a period of time (e.g., 500GB per month)?

Show Answer

This is called a Data Cap or Data Allowance.

Added: Dec 01, 2025

433. What is the main goal of using a "Content Delivery Network" (CDN)?

Show Answer

A CDN is a geographically distributed group of servers that work together to provide fast delivery of Internet content by placing the content close to the end-users.

Added: Dec 01, 2025

434. What is a "Proxy" server?

Show Answer

A proxy server acts as an intermediary for requests from clients seeking resources from other servers, often used for security, filtering, or caching.

Added: Dec 01, 2025

435. What is the difference between a Forward Proxy and a Reverse Proxy?

Show Answer

A Forward Proxy sits in front of clients to protect them and filter outgoing traffic. A Reverse Proxy sits in front of web servers to protect them and balance incoming traffic.

Added: Dec 01, 2025

436. What is the purpose of the "time" function in the TCP Three-Way Handshake?

Show Answer

It is used to synchronize the timing and sequence numbers between the sender and receiver before data transfer begins.

Added: Dec 01, 2025

437. What is a "Sub-Domain" in a URL (e.g., `blog.example.com`)?

Show Answer

The sub-domain is the part of the domain name that comes before the main domain name (e.g., "blog" in this case).

Added: Dec 01, 2025

438. What is the purpose of the "default-deny" security stance for a firewall?

Show Answer

It means that the firewall automatically blocks all network traffic unless a specific rule is created to explicitly allow it.

Added: Dec 01, 2025

439. What is the "DMZ" (Demilitarized Zone) and why is it used?

Show Answer

The DMZ is a small, isolated subnet placed between the internal network and the Internet to host servers that must be publicly accessible, keeping them away from internal assets.

Added: Dec 01, 2025

440. What is "Port Security" on a switch?

Show Answer

Port security is a feature that restricts which specific MAC addresses are allowed to connect to a switch port, helping to prevent unauthorized devices from joining the network.

Added: Dec 01, 2025

441. What is "Rate Limiting" in networking?

Show Answer

Rate limiting is the technique of restricting the amount of data that a specific connection or user can send or receive over a certain time, often used to protect against DoS attacks.

Added: Dec 01, 2025

442. What is "Traffic Shaping"?

Show Answer

Traffic shaping is a network management technique used to delay certain types of data packets to ensure other, more important packets get through quickly, based on policy rules.

Added: Dec 01, 2025

443. What is the difference between a "Virus" and a "Worm"?

Show Answer

A virus needs a human to run an infected program to spread. A worm is a standalone program that can spread itself automatically across a network without human action.

Added: Dec 01, 2025

444. What is a "Trojan Horse" in computer security?

Show Answer

A Trojan Horse is malicious software disguised as a useful or harmless program that, once executed, secretly carries out harmful functions in the background.

Added: Dec 01, 2025

445. What is the purpose of "Hashing Passwords"?

Show Answer

Hashing passwords is a security measure that converts the password into an irreversible, unique string, so that even if the database is stolen, the actual passwords are not exposed.

Added: Dec 01, 2025

446. What is "Salting" a password hash?

Show Answer

Salting is adding a unique, random string of characters (the "salt") to a password before hashing it. This prevents attackers from using pre-calculated rainbow tables to crack the password.

Added: Dec 01, 2025

447. What is the main role of a Certificate Authority (CA)?

Show Answer

A CA is a trusted third party that issues, signs, and manages digital certificates, verifying the identity of the domain owner for secure communications.

Added: Dec 01, 2025

448. What is "Voice over IP" (VoIP)?

Show Answer

VoIP is the technology that allows you to make telephone calls and other voice communication using an Internet connection instead of traditional analog phone lines.

Added: Dec 01, 2025

449. What is the typical network device used to connect VoIP phones in a large office?

Show Answer

A PoE (Power over Ethernet) Switch is typically used, as it provides both data connectivity and power over the same Ethernet cable.

Added: Dec 01, 2025

450. What is the key difference between an Analog and a Digital signal?

Show Answer

An analog signal is a continuous wave. A digital signal is discrete, composed of distinct 1s and 0s (binary).

Added: Dec 01, 2025

451. What is the role of the "Codec" in digital communication?

Show Answer

A codec is a program or device that encodes a data stream for transmission and decodes it for viewing (e.g., converting analog voice into digital data for VoIP).

Added: Dec 01, 2025

452. What is the common speed of a 10BASE-T Ethernet connection?

Show Answer

The speed is 10 Megabits per second (10 Mbps).

Added: Dec 01, 2025

453. What is the common speed of a 100BASE-T Ethernet connection?

Show Answer

The speed is 100 Megabits per second (100 Mbps).

Added: Dec 01, 2025

454. What is the common speed of a 1000BASE-T (Gigabit) Ethernet connection?

Show Answer

The speed is 1000 Megabits per second or 1 Gigabit per second (1 Gbps).

Added: Dec 01, 2025

455. What is the term for a connection that allows communication between devices of the same type (like router to router)?

Show Answer

This often requires a Crossover Cable (unless the devices have an auto-sensing feature).

Added: Dec 01, 2025

456. What is the term for a connection that allows communication between devices of different types (like PC to Switch)?

Show Answer

This uses a Straight-Through Cable.

Added: Dec 01, 2025

457. What is the term for a temporary wire that is used to directly configure networking hardware?

Show Answer

This is commonly called a Console Cable or Rollover Cable.

Added: Dec 01, 2025

458. What does the term "Auto-MDIX" refer to?

Show Answer

Auto-MDIX is a feature on modern network devices that automatically detects whether to use a straight-through or crossover cable wiring configuration.

Added: Dec 01, 2025

459. What is the standard name for the fiber optic connector that is small and rectangular (often used with Multimode Fiber)?

Show Answer

The standard name is an LC (Lucent Connector).

Added: Dec 01, 2025

460. What is the standard name for the older, larger square fiber optic connector (often used with Multimode Fiber)?

Show Answer

The standard name is an SC (Subscriber Connector).

Added: Dec 01, 2025

461. What is "WiMAX" (Worldwide Interoperability for Microwave Access)?

Show Answer

WiMAX is a technology standard for wireless broadband access over a large metropolitan area, similar to a high-speed cellular network but for Internet access.

Added: Dec 01, 2025

462. What is the difference between FDM and TDM in communication?

Show Answer

FDM (Frequency Division Multiplexing) separates signals by assigning them different frequency bands. TDM (Time Division Multiplexing) separates signals by assigning them different time slots.

Added: Dec 01, 2025

463. What is a "Data Center"?

Show Answer

A data center is a dedicated physical facility used to house a large group of networked computer servers, data storage systems, and communication equipment.

Added: Dec 01, 2025

464. What is "Redundancy" in a data center?

Show Answer

Redundancy is having duplicate or backup systems (servers, power, cooling, network links) so that if one component fails, the system can continue operating without interruption.

Added: Dec 01, 2025

465. What is the purpose of a "KVM Switch"?

Show Answer

A KVM (Keyboard, Video, Mouse) switch allows a single keyboard, monitor, and mouse to control multiple different computers or servers.

Added: Dec 01, 2025

466. What is the difference between a "Hub" and an "Unmanaged Switch" in terms of how they handle broadcasts?

Show Answer

Both send broadcasts to all connected devices, but a switch sends regular unicast traffic only to the intended recipient, while a hub sends everything to everyone.

Added: Dec 01, 2025

467. What is the maximum number of hops allowed by the RIP protocol?

Show Answer

The maximum hop count for RIP is 15. A hop count of 16 means the destination is unreachable.

Added: Dec 01, 2025

468. What is the main goal of using "Port Mirroring" (or SPAN)?

Show Answer

Port mirroring is a technique to copy all network traffic from one or more switch ports to another port, usually for monitoring and analysis by an IDS or protocol analyzer.

Added: Dec 01, 2025

469. What is the function of "DHCP Snooping"?

Show Answer

DHCP snooping is a security feature on a switch that prevents malicious or rogue DHCP servers from operating on the network and handing out false IP addresses.

Added: Dec 01, 2025

470. What does the term "Default Gateway" mean to a device on a network?

Show Answer

It is the IP address of the router that acts as the entrance/exit point for all traffic destined outside the local network.

Added: Dec 01, 2025

471. What is a "Failover" system?

Show Answer

A failover system is a backup operational mode that automatically takes over a function when the primary system or component fails, ensuring continuous service.

Added: Dec 01, 2025

472. What is "Load Balancing" used for in DNS?

Show Answer

DNS load balancing is a technique where the DNS server returns different IP addresses to different requests for the same website name, distributing the load across multiple servers.

Added: Dec 01, 2025

473. What is the role of the "MAC Address Table" in a switch?

Show Answer

It is an internal list in the switch that maps the MAC address of each connected device to the specific physical port it is connected to, allowing the switch to forward traffic efficiently.

Added: Dec 01, 2025

474. What is "Forward Error Correction" (FEC)?

Show Answer

FEC is a system that allows a receiver to detect and fix a certain number of errors in the data stream without needing the sender to retransmit the data.

Added: Dec 01, 2025

475. What is the term for a permanent digital connection that is always active?

Show Answer

This is typically called an "Always-On" connection.

Added: Dec 01, 2025

476. What is "Hot Swapping"?

Show Answer

Hot swapping is the ability to replace or install a component (like a disk drive or power supply) into a computer or server while the system remains powered on and running.

Added: Dec 01, 2025

477. What is the key difference between a "Link State" and a "Distance Vector" routing protocol?

Show Answer

Link State protocols (like OSPF) build a full map of the network. Distance Vector protocols (like RIP) only know about their immediate neighbors and the distance to a network.

Added: Dec 01, 2025

478. What is the term for an attack where a hacker impersonates a legitimate user to gain access?

Show Answer

This is called Spoofing.

Added: Dec 01, 2025

479. What is the danger of "ARP Spoofing"?

Show Answer

It allows an attacker to intercept traffic between devices on a local network by falsely claiming to be the gateway router, enabling a Man-in-the-Middle attack.

Added: Dec 01, 2025

480. What is a "Single Point of Failure" in a network?

Show Answer

It is any non-redundant part of a network where a failure would immediately cause the entire network or system to stop functioning.

Added: Dec 01, 2025

481. What is the common term for the device that provides the clock signal and synchronization for a digital network?

Show Answer

This is the Clock Source or Clocking Device.

Added: Dec 01, 2025

482. What does the term "Latency-Sensitive" mean for an application?

Show Answer

It means the application requires a very low amount of delay (latency) to function properly, such as a financial trading platform or a video call.

Added: Dec 01, 2025

483. What is the most secure wireless encryption protocol available today?

Show Answer

WPA3 is the most secure protocol generally available for Wi-Fi networks.

Added: Dec 01, 2025

484. What is the key feature WPA3 adds over WPA2?

Show Answer

WPA3 introduces Simultaneous Authentication of Equals (SAE), which protects against offline password guessing attacks.

Added: Dec 01, 2025

485. What does the term "Evil Twin" refer to in wireless security?

Show Answer

An Evil Twin is a fraudulent wireless access point that mimics a legitimate one (using the same SSID) to trick users into connecting to it so the attacker can steal their data.

Added: Dec 01, 2025

486. What is "Bluejacking"?

Show Answer

Bluejacking is sending unsolicited messages over Bluetooth to Bluetooth-enabled devices, often used for pranks or spreading advertisements.

Added: Dec 01, 2025

487. What is "Bluesnarfing"?

Show Answer

Bluesnarfing is the unauthorized access and theft of information (like contacts, calendars, or pictures) from a device using a Bluetooth connection.

Added: Dec 01, 2025

488. What is the purpose of the "NetBIOS" protocol?

Show Answer

NetBIOS is an older networking protocol that allows computers to communicate on a local area network by using names instead of IP addresses.

Added: Dec 01, 2025

489. What is the difference between a "client" and a "server" device?

Show Answer

A client is a computer that requests resources or services. A server is a computer that provides and manages resources or services.

Added: Dec 01, 2025

490. What is the term for the entire set of IP addresses that a company or network controls?

Show Answer

This is called the IP Address Space or Address Range.

Added: Dec 01, 2025

491. What is the term for a specific program on a computer that listens for or sends network traffic?

Show Answer

This is typically called a Network Service or Daemon.

Added: Dec 01, 2025

492. What is the purpose of the "time" field in a data packet?

Show Answer

It is often used in protocols like TCP to ensure synchronization and to prevent old, delayed packets from being processed as current data.

Added: Dec 01, 2025

493. What is "Domain Hijacking"?

Show Answer

Domain hijacking is the act of illegally changing the registration of a domain name without the permission of the owner, often to redirect users to a malicious site.

Added: Dec 01, 2025

494. What is the function of the "whois" public database?

Show Answer

The whois database contains records of domain name registrations, including the owner, registrar, and contact information.

Added: Dec 01, 2025

495. What is the term for the technology that runs one operating system inside another?

Show Answer

This technology is called Virtualization.

Added: Dec 01, 2025

496. What is the main benefit of using a VPN (Virtual Private Network)?

Show Answer

A VPN provides an encrypted "tunnel" over a public network, securing your data and hiding your real location or public IP address.

Added: Dec 01, 2025

497. What are the three main layers of the TCP/IP Model (Application, Transport, Internet, Network Access)?

Show Answer

The main layers are Application, Transport, and Internet (or Network).

Added: Dec 01, 2025

498. What is the term for an older networking device that simply broadcasts data to all ports in a network segment?

Show Answer

This device is a Hub.

Added: Dec 01, 2025

499. What is the term for a newer networking device that intelligently forwards data only to the correct port based on the destination MAC address?

Show Answer

This device is a Switch.

Added: Dec 01, 2025

500. What is the term for the software or hardware that connects two different networks and makes routing decisions based on IP addresses?

Show Answer

This device is a Router.

Added: Dec 01, 2025