IT NETWORKING INTERVIEW QUESTIONS
Networking Interview Questions with AnswersFor Associate LevelQ.1: What is Routing?Ans: Routing is the process of finding a path on which data can pass from source to destination. Routing is done by a...
View ArticleHOW CISCO ROUTER BOOT IOS
How Cisco Routers Boot IOS Software?When a router starts up it needs to know which software to load and which configuration file to use. The way it determines these two things is by looking at its...
View ArticleDIFFERENCE BETWEEN RIPv1 and RIPv2
Difference between RIPv1 and RIPv2Routing Information Protocol Version 1 (RIPv1)• RIPv1 is a Distance-Vector Routing protocol.• RIPv1 is a Classful routing protocol. Classful routing protocols support...
View ArticleUSB 3.1 TYPE-C WITH REVERSIBLE ENDS
USB 3.1 TYPE-C WITH REVERSIBLE ENDSThe UBS Implementers Forum has finalized the design for the next USB cable and port. USB 3.1 Type-C was created with emerging product designs with smaller ports in...
View ArticleHOW TO ENCRYPT DATA IN WINDOWS
How to Protect Data On a Windows Laptop Even if It’s Lost, Stolen or OtherwiseMicrosoft Windows starting with Windows 2000 has a feature called Encrypting File System (EFS) which lets users easily...
View ArticleHOW TO ENCRYPT EMAIL ATTACHEMENTS
HOW TO SEND ENCRYPTED EMAILÂ ATTACHMENTS?Step 1: Open Microsoft Word (2007 or later).Step 2: Click on the Insert tab.Step 4: Select the Create from File tab.Step 5: Click the Browse button and select...
View ArticleSYSDIG - A SYSTEM TROUBLESHOOTING TOOL
Sysdig - A system troubleshooting tool for Linux (http://www.sysdig.org)Installation (Linux)curl -s https://s3.amazonaws.com/download.draios.com/stable/install-sysdig | sudo bashNote: currently only...
View ArticleWIRESHARK - NETWORK PROTOCOL ANALYZER
WIRESHARKWireshark is network protocol analyzer, which is a tool that can view the details of network traffic. Before the prevalence of network switching, a tool like this could view all traffic that...
View ArticleORACLE LINUX 5 & 6 FEATURES
ORACLE LINUX 5 & 6 COMPARISONSpecificationsOracle Linux 5Oracle Linux 6Latest Version      5.10      6.5Architectures      x86, x86_64, ia64*      x86, x86_64Kernel Versions...
View ArticleORACLE AND REDHAT LINUX COMPARISON
ORACLE AND REDHAT LINUX COMPARISONReasonOracle LinuxRed Hat Enterprise LinuxLower CostOracle Linux is free to download and distributeFree binaries, errata and updatesSupport subscription for Oracle...
View ArticlePURE SINEWAVE AND MODIFIED SINEWAVE
DIFINITION OF PURE SINEWAVE AND MODIFIED/SIMULATED SINEWAVEThe easiest way to compare waveforms is like comparing them to petrol - a pure sinewavpe is like Optimax and a modified sinewave is like...
View ArticleNGINX - OPEN SOURCE WEB APPLICATION ACCELERATOR
NGINXÂ is a high performance, open source web application accelerator that helps over 37% of the world's busiest websites deliver more content, faster, to its users.Companies deploy NGINX to manage the...
View ArticleCOMPUTER BASIC DEFINITIONS
What is bandwidth?The maximum data-carrying capability in devices/wires.What is Uploading vs. Downloading?Uploading is the transfer of files from your computer to another computer or server....
View ArticleDIFFERENCE BETWEEN VPN AND MPLS
Difference Between VPN and MPLSVirtual Private Network (also known as VPN) is a computer network. This network is layered on top of a computer network that resides underneath it. The privacy connotes...
View ArticleDIFFERENCE BETWEEN OSI AND TCP IP
Difference between OSI and TCP IP ModelTCP/IP is a communication protocol that allows for connections of hosts to the internet. OSI, on the other hand, is a communication gateway between the network...
View ArticleDIFFERENCE BETWEEN IPSEC AND GRE
Difference Between IPSEC and GREA computer network consists of a group of two or more computers or other electronic devices that are connected to each other which allow them to share information and...
View ArticleHOW TO SECURE A CISCO ROUTER
How to secure a Cisco Router?Before you begin, keep a copy of your present, working router configuration in pristine condition. Save the edited configuration to a new file. The same goes for IOS code....
View ArticleCREATE RESERVATIONS IN CISCO DHCP SERVER
How to create reservations in Cisco DHCP Server?If you want to configure a DHCP reservation on a switch or router, gather the MAC address of the device. If you are unsure of the MAC address of the...
View ArticleDIFFERENCE BETWEEN TELNET AND SSH
Difference Between Telnet and SSHSecure Shell, commonly known as SSH, and Telnet are two network protocols that have been used widely at one point in time or another. They are both used to connect to...
View Article