Technical Interview Questions - Networking: What Is An IP Address?

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 7

Technical Interview Questions – Networking

 What is an IP address?

An Internet Protocol address (IP address) is a numerical label that is assigned to any device participating
in a computer network that uses the Internet Protocol for communication between its nodes.[1] An IP
address serves two principal functions: host or network interface identification and location addressing.
Its role has been characterized as follows: "A name indicates what we seek. An address indicates where
it is. A route indicates how to get there

 What is a subnet mask?

A mask used to determine what subnet an IP address belongs to. An IP address has two components,
the network address and the host address. For example, consider the IP address 150.215.017.009.
Assuming this is part of a Class B network, the first two numbers (150.215) represent the Class B
network address, and the second two numbers (017.009) identify a particular host on this network.

 What is ARP?

ARP stands for "Address Resolution Protocol" and is a protocol that used to identify the hardware
address of a network host. This type of protocol is used for local area networking (LAN) and for creating
pathways for network traffic when the location for the next router must be identified. The method of
using Address Resolution Protocol is integrated with numerous different kinds of networks including
Internet, Ethernet, Wide Area Networks (WAN), IP (Internet Protocol) and Local Area Networks (LAN).

http://www.spamlaws.com/how-ARP-works.html

 What is ARP Cache Poisoning?

ARP cache poisoning, also known as ARP spoofing, is the process of falsifying the source Media Access
Control (MAC) addresses of packets being sent on an Ethernet network. It is a MAC layer attack that can
only be carried out when an attacker is connected to the same local network as the target machines,
limiting its effectiveness only to networks connected with switches, hubs, and bridges; not routers.

The principle of ARP spoofing is to send fake, or "spoofed", ARP messages to an Ethernet LAN. Generally,
the aim is to associate the attacker's MAC address with the IP address of another node (such as the
default gateway). Any traffic meant for that IP address would be mistakenly sent to the attacker instead.
The attacker could then choose to forward the traffic to the actual default gateway (passive sniffing) or
modify the data before forwarding it (man-in-the-middle attack). The attacker could also launch a
denial-of-service attack against a victim by associating a nonexistent MAC address to the IP address of
the victim's default gateway.

http://en.wikipedia.org/wiki/ARP_spoofing

 What is the ANDing process?


Introduction

As you would learn in basic TCP/IP, when a host connects to another


host, it has to determine whether or the connection is local or remote
(on the same subnet or on a different subnet). When connections are
local, the two hosts usually directly connect to one another to
communicate. When they are not, however, they have to connect to a
router, which forwards the packets along a path that eventually reaches
the packets' final destination: the remote host.

Well, in order to do this (that is, determining whether or not the


connection is local or remote), the host will execute a simple
mathematical function called an AND function. Even though this all
takes place automatically, it's important to understand it to in turn
understand how IP-based systems know whether to send packets to a host
or a router.

The Operation Itself

The AND function (or operation) is pretty simple...two binary digits are
compared, and based on their combination, a result is produced. It's
not addition, multiplication, subtraction, division, etc... I mean,
there are only 3 outcomes possible when ANDing two binary digits.

CODE :

0 AND 0 = 0
0 AND 1 = 0
1 AND 1 = 1

Anding is a process in which we AND "IP address" with "subnet mask" to get Network ID.

http://www.hackthissite.org/articles/read/902

 What is a default gateway? What happens if I don't have one?

A Default gateway
is a node (a router) on a TCP/IP Network that serves as an access point
to another network. A default gateway is used by a host when the ip's
packet destination address belongs to someplace outside the local subnet.
Without a default gateway you will not be able to route packets out
of your LAN,
http://www.scripts4it.com/interview-questions/networking/what-is-a-default-gateway-what-
happens-if-i-dont-have-one

 Can a workstation computer be configured to browse the Internet and yet NOT have a
default gateway?

Without default gateway you cannot browse internet. It doesnt matter if you are on public or
private network. Default Gateway is required to route your IP packets from your network to
the other networks.

http://wiki.answers.com/Q/Can_a_workstation_computer_be_configured_to_browse_the_Interne
t_and_yet_NOT_have_a_default_gateway

 What is a subnet?

A subnet specifies a range of IP addresses. The special attribute of a subnet is that all the computers
within the subnet (a "sub-network") can talk directly to each other, and don't need a router to
communicate.

http://www.intermapper.com/faq-ip-address/429-what-is-a-subnet-why-do-i-care

 What is APIPA?

APIPA - Automatic Private IP Addressing

A Windows-based computer that is configured to use DHCP can automatically assign itself an Internet
Protocol (IP) address if a DHCP server is not available. For example, this could occur on a network
without a DHCP server, or on a network if a DHCP server is temporarily down for maintenance.

With this feature, a Windows computer can assign itself an Internet Protocol (IP) address in the
event that a DHCP server is not available or does not exist on the network. This feature makes
configuring and supporting a small Local Area Network (LAN) running TCP/IP less difficult.

Note: You may want to read Disable APIPA in Windows 98/ME/2000/XP/2003

The Internet Assigned Numbers Authority (IANA) has reserved 169.254.0.0-169.254.255.255


for Automatic Private IP Addressing. As a result, APIPA provides an address that is guaranteed
not to conflict with routable addresses.
After the network adapter has been assigned an IP address, the computer can use TCP/IP to
communicate with any other computer that is connected to the same LAN and that is also
configured for APIPA or has the IP address manually set to the 169.254.x.y (where x.y is the
client’s unique identifier) address range with a subnet mask of 255.255.0.0. Note that the
computer cannot communicate with computers on other subnets, or with computers that do not
use automatic private IP addressing. Automatic private IP addressing is enabled by default.

Definition: A feature of Microsoft Windows, APIPA is a DHCP failover mechanism. With


APIPA, DHCP clients can obtain IP addresses when DHCP servers are nonfunctional.
APIPA exists in all popular versions of Windows except Windows NT.

When a DHCP server fails, APIPA allocates addresses in the private range 169.254.0.1 to
169.254.255.254. Clients verify their address is unique on the LAN using ARP. When the
DHCP server is again able to service requests, clients update their addresses automatically.

In APIPA, all devices use the default network mask 255.255.0.0 and all reside on the same

 What is an RFC? Name a few if possible (not necessarily the numbers, just the ideas
behind them)

Answer:
A Request For Comments (RFC) document defines a protocol or policy used on the Internet. An
RFC can be submitted by anyone. Eventually, if it gains enough interest, it may evolve into an
Internet Standard ( see FAQ XXX). Each RFC is designated by an RFC number. Once published,
an RFC never changes. Modifications to an original RFC are assigned a new RFC number.

Gordano Products comply with the following RFC's:

 821 - Simple Mail Transfer Protocol


 822 - Standard for the format of ARPA Internet text messages
 974 - Mail routing and the domain system
 1035 - Domain names - implementation and specification
 1123 - Requirements for Internet hosts - application and support
 1321 - The MD5 Message-Digest Algorithm
 1521 - MIME Part One: Mechanisms for Specifying and Describing the Format of Internet
Message Bodies
 1652 - SMTP Service Extension for 8bit-MIMEtransport
 1730 - Internet Message Access Protocol - Version 4. M
 1734 - POP3 AUTHentication command
 1741 - MIME Content Type for BinHex Encoded Files
 1845 - SMTP Service Extension for Checkpoint/Restart
 1846 - SMTP 521 Reply Code
 1854 - SMTP Service Extension for Command Pipelining
 1869 - SMTP Service Extensions
 1870 - SMTP Service Extension for Message Size Declaration
 1891 - SMTP Service Extension for Delivery Status Notifications
 1893 - Enhanced Mail System Status Codes
 1894 - An Extensible Message Format for Delivery Status Notifications
 1939 - Post Office Protocol - Version 3
 1985 - SMTP Service Extension for Remote Message Queue Starting
 2034 - SMTP Service Extension for Returning Enhanced Error Codes
 2045 - MIME Part One: Format of Internet Message Bodies
 2046 - MIME Part Two: Media Types
 2060 - Internet Message Access Protocol - Version 4rev1
 2142 - Mailbox Names for Common Services, Roles and Functions
 2197 - SMTP Service Extension for Command Pipelining
 2505 - Anti-Spam Recommendations for SMTP MTAs
 2554 - SMTP Service Extension for Authentication

http://www.gordano.com/kb.htm?q=270

 What is RFC 1918?


 What is CIDR?
 You have the following Network ID: 192.115.103.64/27. What is the IP range for your
network?
 You have the following Network ID: 131.112.0.0. You need at least 500 hosts per
network. How many networks can you create? What subnet mask will you use?
 You need to view at network traffic. What will you use? Name a few tools
 How do I know the path that a packet takes to the destination?
 What does the ping 192.168.0.1 -l 1000 -n 100 command do?
 What is DHCP? What are the benefits and drawbacks of using it?
 Describe the steps taken by the client and DHCP server in order to obtain an IP address.
 What is the DHCPNACK and when do I get one? Name 2 scenarios.
 What ports are used by DHCP and the DHCP clients?
 Describe the process of installing a DHCP server in an AD infrastructure.
 What is DHCPINFORM?
 Describe the integration between DHCP and DNS.
 What options in DHCP do you regularly use for an MS network?
 What are User Classes and Vendor Classes in DHCP?
 How do I configure a client machine to use a specific User Class?
 What is the BOOTP protocol used for, where might you find it in Windows network
infrastructure?
 DNS zones – describe the differences between the 4 types.
 DNS record types – describe the most important ones.
 Describe the process of working with an external domain name
 Describe the importance of DNS to AD.
 Describe a few methods of finding an MX record for a remote domain on the Internet.
 What does "Disable Recursion" in DNS mean?
 What could cause the Forwarders and Root Hints to be grayed out?
 What is a "Single Label domain name" and what sort of issues can it cause?
 What is the "in-addr.arpa" zone used for?
 What are the requirements from DNS to support AD?
 How do you manually create SRV records in DNS?
 Name 3 benefits of using AD-integrated zones.
 What are the benefits of using Windows 2003 DNS when using AD-integrated zones?
 You installed a new AD domain and the new (and first) DC has not registered its SRV
records in DNS. Name a few possible causes.
 What are the benefits and scenarios of using Stub zones?
 What are the benefits and scenarios of using Conditional Forwarding?
 What are the differences between Windows Clustering, Network Load Balancing and
Round Robin, and scenarios for each use?
 How do I work with the Host name cache on a client computer?
 How do I clear the DNS cache on the DNS server?
 What is the 224.0.1.24 address used for?
 What is WINS and when do we use it?
 Can you have a Microsoft-based network without any WINS server on it? What are the
"considerations" regarding not using WINS?
 Describe the differences between WINS push and pull replications.
 What is the difference between tombstoning a WINS record and simply deleting it?
 Name the NetBIOS names you might expect from a Windows 2003 DC that is registered
in WINS.
 Describe the role of the routing table on a host and on a router.
 What are routing protocols? Why do we need them? Name a few.
 What are router interfaces? What types can they be?
 In Windows 2003 routing, what are the interface filters?
 What is NAT?
 What is the real difference between NAT and PAT?
 How do you configure NAT on Windows 2003?
 How do you allow inbound traffic for specific hosts on Windows 2003 NAT?
 What is VPN? What types of VPN does Windows 2000 and beyond work with natively?
 What is IAS? In what scenarios do we use it?
 What's the difference between Mixed mode and Native mode in AD when dealing with
RRAS?
 What is the "RAS and IAS" group in AD?
 What are Conditions and Profile in RRAS Policies?
 What types or authentication can a Windows 2003 based RRAS work with?
 How does SSL work?
 How does IPSec work?
 How do I deploy IPSec for a large number of computers?
 What types of authentication can IPSec use?
 What is PFS (Perfect Forward Secrecy) in IPSec?
 How do I monitor IPSec?
 Looking at IPSec-encrypted traffic with a sniffer. What packet types do I see?
 What can you do with NETSH?
 How do I look at the open ports on my machine?

You might also like