HTTP | What is the difference between PUT and POST? |
HTTP | What are the differences between PUT and POST in HTTP? |
IP | Why is the UDP checksum different from the IP checksum? |
IP | How is TTL used to prevent router loops?
|
SNMP | Is the command from the SNMP control center to restart the same for a UNIX machine and for a Windows machine? |
PING | What does a successful response from PING tell you about the machine that sent the response? |
Ethernet | Is the Good Citizen Principle used by ethernet? Explain.
|
Security | What is a firewall? Explain. |
UDP | Without changing UDP, how could an application use UDP to obtain reliable communications? |
UDP | How does UDP handle an undeliverable IP datagram? Is this different from other protocols? Explain |
UDP | How would you change UDP so that it could provide reliable communication? |
ICMP | What happens if an ICMP message is undeliverable? |
Addressing | How is a MAC address different from an IP address? |
SMTP | What are the key steps for SMTP to transmit a message? |
SMTP | Does SMTP provide assured dellivery of messages to users? |
DNS | Give 3 important advantages and 3 important disadvantages of DNS caching. |
DNS | Describe the step-by-step process of DNS resolution when a user enters a domain name into a web browser. |
DNS | Would you recommend changing DHCP to deliver the URL instead of the IP address of the DNS server?
|
General | What’s the difference between the roles of a router and switch in a local network? |
General | Suppose you have to send an email to your aunt in ASIA from the us. Draw a diagram to show how the packets will reach its destination if NAT is involved on both ends. Show all addresses within the data that is transferred. |
Routing | When will the split horizon technique prevent slow convergence? |
IoT | How can IoT devices use SMTP? Explain. |
SNMP | What is the role of the MIB in SNMP and how does it contribute to machine independence? |
NAT | Compare how NAT works for outbound and inbound communication. |
General | Why can packets arrive out of order? |
General | Why use port numbers when we could identify processes by the process ID on each machine? |
SMTP | What is the role of the MX record in email transmission? |
IP | How does IP forwarding alter the original datagram? |
Ethernet | How does a switch reduce broadcast traffic and ARP traffic? |
DNS | Explain how a DNS poisoning attack works and outline measures that can be taken to prevent it. |
VPN | What are the comparative advantages and disadvantages of split tunneling and full tunneling VPN implementations? |
FTP | What protocols does FTP use? |
FTP | How many connections does FTP use? Why? |
FTP | Compare active and passive FTP with regard to security and data transfer and NAT. |
Telnet | Compare Telnet and SSH for remote terminal access. |
SMTP | What protocol does SMTP use to transmit messages? Explain. |
IMAP | What’s the difference in server resource utilization between IMAP and POP? |
DHCP | List four items of information that a host needs upon connection to the internet.
|
Addressing | What is the primary purpose of using subnetting in IP addressing? |
TCP | In what scenario would UDP be preferred over TCP? Give a specific example. |
VPN | How does a VPN contribute to secure mobile communications? |
General | Why is the Good Citizen Principle important? |
General | From the standpoint of protocol design, what is the scarcest resource on the Internet? |
Sockets | How does a program specify a process to connect to? |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |