| HTTP | What is the difference between PUT and POST? |
| HTTP | What are the differences between PUT and POST in HTTP? |
| IP | Why is the UDP checksum different from the IP checksum? |
| IP | How is TTL used to prevent router loops?
|
| SNMP | Is the command from the SNMP control center to restart the same for a UNIX machine and for a Windows machine? |
| PING | What does a successful response from PING tell you about the machine that sent the response? |
| Ethernet | Is the Good Citizen Principle used by ethernet? Explain.
|
| Security | What is a firewall? Explain. |
| UDP | Without changing UDP, how could an application use UDP to obtain reliable communications? |
| UDP | How does UDP handle an undeliverable IP datagram? Is this different from other protocols? Explain |
| UDP | How would you change UDP so that it could provide reliable communication? |
| ICMP | What happens if an ICMP message is undeliverable? |
| Addressing | How is a MAC address different from an IP address? |
| SMTP | What are the key steps for SMTP to transmit a message? |
| SMTP | Does SMTP provide assured dellivery of messages to users? |
| DNS | Give 3 important advantages and 3 important disadvantages of DNS caching. |
| DNS | Describe the step-by-step process of DNS resolution when a user enters a domain name into a web browser. |
| DNS | Would you recommend changing DHCP to deliver the URL instead of the IP address of the DNS server?
|
| Routing | When will the split horizon technique prevent slow convergence? |
| IoT | How can IoT devices use SMTP? Explain. |
| SNMP | What is the role of the MIB in SNMP and how does it contribute to machine independence? |
| NAT | Compare how NAT works for outbound and inbound communication. |
| General | Why can packets arrive out of order? |
| General | What’s the difference between the roles of a router and switch in a local network? |
| General | Suppose you have to send an email to your aunt in ASIA from the us. Draw a diagram to show how the packets will reach its destination if NAT is involved on both ends. Show all addresses within the data that is transferred. |
| General | Why is the Good Citizen Principle important? |
| General | Explain the soft state principle |
| General | From the standpoint of protocol design, what is the scarcest resource on the Internet? |
| General | Why use port numbers when we could identify processes by the process ID on each machine? |
| SMTP | What is the role of the MX record in email transmission? |
| IP | How does IP forwarding alter the original datagram? |
| Ethernet | How does a switch reduce broadcast traffic and ARP traffic? |
| DNS | Explain how a DNS poisoning attack works and outline measures that can be taken to prevent it. |
| VPN | What are the comparative advantages and disadvantages of split tunneling and full tunneling VPN implementations? |
| FTP | What protocols does FTP use? |
| FTP | Why does FTP use two TCP connections for a transfer? |
| FTP | How many connections does FTP use? Why? |
| FTP | Compare active and passive FTP with regard to security and data transfer and NAT. |
| Telnet | Compare Telnet and SSH for remote terminal access. |
| SMTP | What protocol does SMTP use to transmit messages? Explain. |
| IMAP | What’s the difference in server resource utilization between IMAP and POP? |
| DHCP | List four items of information that a host needs upon connection to the internet.
|
| Addressing | What is the primary purpose of using subnetting in IP addressing? |
| TCP | In what scenario would UDP be preferred over TCP? Give a specific example. |
| VPN | How does a VPN contribute to secure mobile communications? |
| Sockets | How does a program specify a process to connect to? |
| HTTP | Why was HTTP designed as a stateless protocol? |
| ICMP | How does ICMP violate the layering principle? |
| |
| |
| |
| |
| |
| |
| |
| |
| |