Documente Academic
Documente Profesional
Documente Cultură
1. What is VPN?
A VPN is a service that offers secure, reliable connectivity over a shared public network infrastructure
such as the Internet. VPNs maintain the same security and management policies as a private network.
They are the most cost effective method of establishing a virtual point-to-point connection between
remote users and an enterprise customer's network.
Remote Access VPN: Also called as Virtual Private dial-up network (VPDN) is mainly used in
scenarios where remote access to a network becomes essential. Remote access VPN allows data
to be accessed between a company’s private network and remote users through a third party
service provider; Enterprise service provider. E.g. Sales team is usually present over the globe.
Using Remote access VPN, the sales updates can be made.
Site to Site VPN – Intranet based: This type of VPN can be used when multiple Remote
locations are present and can be made to join to a single network. Machines present on these
remote locations work as if they are working on a single network.
Site to Site VPN – Extranet based: This type of VPN can be used when several different
companies need to work in a shared environment. E.g. Distributors and service companies. This
network is more manageable and reliable.
Ping and Tracert are the commands used to send information to some remote computers to receive
some information. Information is sent and received by packets. Ping I particularly used to check if the
system is in network or not. It also gives packet lost information. In windows ping command is written
as ping ip_address Tracert is called as trace route. It is used to track or trace the path the packet takes
from the computer where the command is given until the destination. In windows ping command is
written as Tracert ip_address
4. What is Tunneling?
Tunneling is a mechanism provided to transfer data securely between two networks. The data is split
into smaller packets and passed through the tunnel. The data passing through the tunnel has 3 layers of
encryption. The data is encapsulated. Tunneling can be approached by Point to Point tunneling
protocol.
In a domain, one or more computer can be a server to manage the network. On the other hand in a
workgroup all computers are peers having no control on each other. In a domain, user doesn’t need an
account to logon on a specific computer if an account is available on the domain. In a work group user
needs to have an account for every computer.
In a domain, Computers can be on different local networks. In a work group all computers needs to be
a part of the same local network.
Static IP is also called as permanent address assigned to each device in a network, whereas Dynamic IP,
a temporary address assigned to the device via DHCP software. IP address assigned to your service by
your cable or DSL Internet provider is typically dynamic IP. In routers and operating systems, the
default configuration for clients is dynamic IP
FTP is File Transfer Protocol. It used to exchange files on the internet. To enable the data transfer FTP
uses TCP/IP, FTP is most commonly used to upload and download files from the internet. FTP can be
invoked from the command prompt or some graphical user interface. FTP also allows to update
(delete, rename, move, and copy) files at a server. It uses a reserved port no 21.
Transmission Control Protocol / Internet Protocol: - It is a family of protocols used for communication
and connection between hosts on the internet. It is the most widely used standard for transmitting
data over the internet. The four layers in the protocol are (from bottom to top):- Physical layer, Data
link layer, Network layer, transport layer and application layer, also called as the OSI model. In
TCP/IP, IP is responsible for forwarding packets while TCP ensures the correct delivery of data from
client to server. TCP detects loss of data as well.
TCP guarantees the delivery of data. UDP on the other hand, does not guarantee delivery of data. TCP
delivers messages in the order they were sent. UDP has no ordering mechanisms. In TCP data is sent as
a stream while UDP sends data as individual packets. UDP is faster than TCP. TCP is a connection
oriented protocol while UDP is connectionless.
In order to change password remotely and force replacement of cached credential user needs to
connect via VPN and when he is connected to press on ctrl-alt-delete and press on change password.
After password is changed he needs to lock the computer by pressing ctrl-alt-delete and then unlock it
with “new” password. That should replace cached credentials.
Domain name system/server is used to translate the IP address into the hostname and hostname into the IP
address. DNS is mostly used on the internet and the networks.
Dynamic host configuration protocol is used to dynamically assign the IP address to the networked computers
and devices. DHCP is a network protocol that automatically assigns static and dynamic IP addresses from its
own range.
15. What is a Router?
Router is the most important network device that is used to connect two logically and physically different
networks. Router defines the short possible route for the data to reach its destination. A router works with
built-in intelligent software known as routing table, which helps to determine the route between the two
networks.
A gateway is software or a hardware that is used to connect the local area network with the internet. A
gateway is a network entrance point and a router usually works as a gateway.
WLAN or Wireless local area network is simply a type of network that doesn’t use wired Ethernet
connections for networking. WLAN uses wireless network devices such as wireless routers etc.
A subnet mask is used to determine the number of networks and the number of host computers. Every
class of the IP address uses the different range of the subnet mask. Subnet masks allow the IP based
networks to be divided into the sub networks for performance and security purposes.
An IP address is a unique identifier of a computer or network device on the local area network, WAN or
on internet. Every host computer on the internet must have a unique IP address. IP addresses on the
internet are usually assigned by the local ISPs to which users are connected.
WiFi or wireless fidelity is a base band network technology that is used for the wireless data
communication.
WiFi is a next form of the Wifi. WiMax is a very high speed broadband network technology that is
designed for the corporate offices, roaming and home users.
The seven layers of the OSI are Application, Presentation, Sessions, Transport, Network, Data Link and
Physical layer.
Lightweight Directory Access Protocol is used to access the directory services from the Active directory
in Windows operation systems.
24. Answer port number for the following protocol: SMTP, POP3, IMAP4, RPC, LDAP, and FTP?
SMTP – 25, POP3 – 110, IMAP4 – 143, RPC – 135, LDAP, FTP-21, HTTP-80
UDP or user datagram protocol is a connectionless protocol that is used to transfer the data without
any error handling.
A firewall is usually a software program that is installed on the network server or gateway. The purpose
of the firewall is to protect the network resources from the intruders and unauthorized persons.
VPN or virtual private network is used to connect two networks by means internet. VPN uses PPTP
(point to point tunneling protocol) and other security procedures to make a secure tunnel on internet.
RAS or remote access server allows you to remote dial in through the desktop computers, laptops and
GSM mobile phones.
In computer networking, a default gateway is the device that passes traffic from the local subnet to
devices on other subnets. The default gateway often connects a local network to the Internet, although
internal gateways for local networks also exist.
DORA
D (Discover): DHCP Client sends a broadcast packet to identify the dhcp server; this packet will contain
the source MAC.
O (Offer): Once the packet is received by the DHCP server, the server will send the packet containing
Source IP and Source MAC.
R (Request): Client will now contact the DHCP server directly and request for the IP address.
A (Acknowledge): DHCP server will send an ack packet which contains the IP address.
Hub - It is networking device that operates at Layer 2 of the OSI Model. When a hub receives a packet
(chunk) of data (a frame in Ethernet lingo) at one of its ports from a PC on the network, it transmits
(repeats) the packet to all of its ports.
Switch – It is network device that connects multiple computers together within one LAN. It operates at
Layer 2 of the OSI Model. Switches control the flow of network traffic based on the address information
in each packet. A switch learns which devices are connected to its ports (by monitoring the packets it
receives), and then forwards on packets to the appropriate port only.
WINS stands for Windows Internet Name Service. WINS is a NetBIOS Name Server that registers your
NetBIOS names and resolves into IP addresses.
-It allows an enterprise to bundle multiple ISDN connections into one internet connection.
Multicasting is the process of distributing data to multiple recipients, e.g. Audio/Video streaming
broadcasts. Using multicasting, a source can send a single copy of data to a single multicast address,
which is then distributed to an entire group of recipients.
The Internet protocols TCP /IP support a feature known as a directed broadcast, which allows a remote
person the ability to send a single packet to an entire subnet.
37. What would you type in at a command prompt to view the IP settings for the computer that you
are sitting at?
IPCONFIG /ALL
43.Itself. System log files may contain information about device changes, device
drivers, system changes, events, operations and more.
connection can be made from client to server, and from then on any data
46. When would you use the ping command with the "-t" switch?
47. How do I know the path that a packet takes to the destination?
a. Tracert command is used to conduct trace routes using their network to
determine the number of hops a packet must take. the number of hops a
packet is taking out your network and through an ISP’s network and
more.
a.127.0.0.0