You are on page 1of 3

Interview Question

1:-IP Address Class Network and Host Capacities

lass

1st Octet
Decimal
Range

Network/Host
Hosts per
Default Subnet Number of
ID (N=Network,
Network (Usable
Mask
Networks
H=Host)
Addresses)

1 126*

N.H.H.H

255.0.0.0

128 191

N.N.H.H

255.255.0.0

192 223

N.N.N.H

255.255.255.0

126 (27 2)

16,777,214 (224
2)

16,382 (214
65,534 (216 2)
2)
2,097,150
254 (28 2)
(221 2)

D 224 239
Reserved for Multicasting
E 240 254
Experimental; used for research
Note: Class A addresses 127.0.0.0 to 127.255.255.255 cannot be used and is reserved for loopback
and diagnostic functions.

Private IP Addresses
Class Private Networks
A
10.0.0.0
B
172.16.0.0 - 172.31.0.0
C
192.168.0.0

Subnet Mask
Address Range
255.0.0.0
10.0.0.0 - 10.255.255.255
255.240.0.0 172.16.0.0 - 172.31.255.255
255.255.0.0 192.168.0.0 - 192.168.255.255

Q: What are main Email Servers and which are their ports?
A: Email servers can be of two types:
Incoming Mail Server (POP3, IMAP, HTTP)
The incoming mail server is the server associated with an email address account. There cannot be
more than one incoming mail server for an email account. In order to download your emails,
you must have the correct settings configured in your email client program.
Outgoing Mail Server (SMTP)
Most outgoing mail servers use SMTP (Simple Mail Transfer Protocol) for sending emails. The
outgoing mail server can belong to your ISP or to the server where you setup your email account.
The main email ports are:

POP3 port 110


IMAP port 143
SMTP port 25
HTTP port 80
Secure SMTP (SSMTP) port 465
Secure IMAP (IMAP4-SSL) port 585
IMAP4 over SSL (IMAPS) port 993
Secure POP3 (SSL-POP) port 995

What are the LMHOSTS files?


The LMHOSTS file is a static method of resolving NetBIOS names to IP addresses in the same way
that the HOSTS file is a static method of resolving domain names into IP addresses. An LMHOSTS
file is a text file that maps NetBIOS names to IP addresses; it must be manually configured and
updated.

What is DHCP scope?


A scope is a range, or pool, of IP addresses that can be leased to DHCP clients on a given subnet.

What is FQDN?
An FQDN contains (fully qualified domain name) both the hostname and a domain name. It
uniquely identifies a host within a DNS hierarchy

What is the DNS forwarder?


DNS servers often must communicate with DNS servers outside of the local network. A forwarder
is an entry that is used when a DNS server receives DNS queries that it cannot resolve locally. It
then forwards those requests to external DNS servers for resolution.
What is OSI and TCP/IP Model
What are the layers of the OSI reference model?
There are 7 OSI layers: Physical Layer, Data Link Layer, Network Layer, Transport Layer, Session
Layer, Presentation Layer and Application Layer.

Explain why Ubuntu is safe and not affected by viruses?


It does not support malicious e-mails and contents, and before any e-mail is opened by users
it will go through many security checks
Ubuntu uses Linux , which is a super secure O.S system
Unlike other O.S, countless Linux users can see the code at any time and can fix the problem
if there is any
Generally, Malwares and viruses are coded to take advantage of weakness in Windows

What are the types of firewalls?


Packet Filtering Firewall:
This type of Firewall detects packets and block unnecessary packets and makes network traffic
release.
Screening Router Firewalls:
It's a software base firewall available in Router provides only light filtering.
Computer-based Firewall:
It's a firewall stored in server with an existing Operating System like Windows and UNIX.
Hardware base Firewall:
Its device like box allows strong security from public network. Mostly used by big networks.

Proxy Server:
Proxy server allows all clients to access Internet with different access limits. Proxy server has its
own firewall which filters the all packet from web server.

What is the Public Key Encryption?


Public key encryption use public and private key for encryption and decryption. In this mechanism,
public key is used to encrypt messages and only the corresponding private key can be used to
decrypt them. To encrypt a message, a sender has to know recipients public key.
Suppose one client machine is not getting IP from DHCP.What are reasons
Ans:- 1) Lease time period is over(Can increase manually)
2)Client Machine not in Network
Suppose at the time of logg in Domain client machine is taking Time.What are
reasons.
Ans:-PDC emulator is down(PDC sync the time between client and server)
DNS may not resolving host entry.
Suppose we have running a web application on a static IP.You know DHCP can
assign any IP.How can we resolve this issue that DHCP assign same IP every Time.
Ans:- MAC address binding

You might also like