This section of the website contains networking assignment questions, network security assignment questions, CCNA assignment questions ,interview and objective questions, lab assignments. Sample questions are provided below. The detailed answers to the questions are available in the respective ebooks which can be purchased from Amazon.
Networking assignment Questions
The following are networking based questions ideal for assignments , interview and self assessment. Sample questions are provided below. The detailed answers to questions is included in the ebook 250 Computer Networking assignment questions and answers on Amazon
PC1 PC2 and PC3 are connected to the internet via a NAT router which does port address translation. If the three PC’s simultaneously initiate a HTTP session with the web server, explain how the NAT router would handle the communication
If NAT is configured for internet sharing on a router, is it required to setup additional routing for forwarding packets to the internet or would NAT take care of the same.
An organization has a main office and 5 branch offices. It is required to connect the offices with options of using leased lines and frame relay. Give one reason from a business perspective why the organization should use frame relay for its WAN design.
A computer is connected to the internet via an ADSL router. The ADSL router is configured with appropriate DNS server IP address. Is it required to configure the DNS server IP address on the computer as well for internet access.
Telnet uses TCP port 23. Does this imply that the telnet connection initiated by a user connecting to the router from a computer uses TCP port 23
The detailed answers to questions is included in the ebook 250 Computer Networking assignment questions and answers on Amazon
CCNA assignment Questions
The following are CCNA based questions ideal for assignments , interview and self assessment. Sample questions are provided below. The detailed answers to questions is included in the ebook CCNA Interview Questions and Answers
Two interfaces of a router is configured with IP addresses 192.168.1.1, subnet mask 255.255.255.0
and IP address 192.168.2.1, subnet mask 255.255.255.0. Would the routing table of the router contain any information?
There are two computers connected to a switch. The switch is powered on. After the switch boots, how many entries would be available in the mac-address table of the switch?
A network has to be designed for an organization. The organization has 5 departments each of which has different network addresses, which require communication with each other. What strategy and technology can be used for achieving the same?
A PC is connected to a 5 port ethernet hub operating at 100 Mbps. Other ports of the hub are free and not connected to any other devices. At what duplex setting can the hub operate?
The IP address of a PC is 192.168.1.2/24 and its default gateway is 192.168.1.1/24. The user on the PC pings an IP address which is on a different network (IP address: 192.168.2.2, Default gateway: 192.168.2.1). What would be the destination IP address in the IP header in the ping response packet coming from the IP address 192.168.2.2?
Network security assignment questions
The following are network security based questions ideal for assignments , interview and self assessment. Sample questions are provided below. The detailed answers to questions is included in the ebook Network Security Interview Questions and Answers
An organization uses a Cisco router for routing between its internal networks. What feature on the router can be used to block access specifically between two internal networks
An organization has a HTTPS based server behind a firewall. A website is hosted on the Web server. Which port should be open on the firewall for allowing outside users to access the HTTPS based website.
Two IPSEC routers are configured to communicate with each other. Pre-shared keys are used on both the routers. Are these keys used for encrypting data on the IPSEC tunnel
A user in an organization wishes to connect to a Web server, which is residing on the internet. The user is behind the organization firewall. What configuration should be setup on the firewall for the user to access the Web server.
A user receives a virus infected file in his email inbox. There is no antivirus on the system. Would the virus infect the system, if the user deletes the file from the inbox.
Recommended Ebooks for Assignments, Q&A, Self assessment.
250+ Network Engineer Interview Questions & Answers
The Ebook contains 250+ interview questions based on different networking and security concepts. Objective and scenario based questions with detailed answers are included.