<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>CSS Corp Pvt Ltd interview questions and answers - Wikitechy</title>
	<atom:link href="https://www.wikitechy.com/interview-questions/tag/css-corp-pvt-ltd-interview-questions-and-answers/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.wikitechy.com/interview-questions/tag/css-corp-pvt-ltd-interview-questions-and-answers/</link>
	<description>Interview Questions</description>
	<lastBuildDate>Tue, 14 Jun 2022 09:48:13 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9</generator>

<image>
	<url>https://www.wikitechy.com/interview-questions/wp-content/uploads/2025/10/cropped-wikitechy-icon-32x32.png</url>
	<title>CSS Corp Pvt Ltd interview questions and answers - Wikitechy</title>
	<link>https://www.wikitechy.com/interview-questions/tag/css-corp-pvt-ltd-interview-questions-and-answers/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>What is TCP/IP reference model ?</title>
		<link>https://www.wikitechy.com/interview-questions/networking/what-is-tcp-ip-reference-model/</link>
					<comments>https://www.wikitechy.com/interview-questions/networking/what-is-tcp-ip-reference-model/#respond</comments>
		
		<dc:creator><![CDATA[Editor]]></dc:creator>
		<pubDate>Sat, 17 Jul 2021 20:29:37 +0000</pubDate>
				<category><![CDATA[Networking]]></category>
		<category><![CDATA[Accenture interview questions and answers]]></category>
		<category><![CDATA[Allstate Solutions Pvt Ltd interview questions and answers]]></category>
		<category><![CDATA[Applied Mate interview questions and answers]]></category>
		<category><![CDATA[Atos interview questions and answers]]></category>
		<category><![CDATA[Bharti Airtel interview questions and answers]]></category>
		<category><![CDATA[Capgemini interview questions and answers]]></category>
		<category><![CDATA[CASTING NETWORKS INDIA PVT LIMITED interview questions and answers]]></category>
		<category><![CDATA[Ciena Corporation interview questions and answers]]></category>
		<category><![CDATA[CSS Corp Pvt Ltd interview questions and answers]]></category>
		<category><![CDATA[Dell International Services India Pvt Ltd interview questions and answers]]></category>
		<category><![CDATA[difference between osi and tcp ip]]></category>
		<category><![CDATA[difference between osi and tcp ip model]]></category>
		<category><![CDATA[dod model vs tcp/ip model]]></category>
		<category><![CDATA[explain in brief osi tcp model]]></category>
		<category><![CDATA[Flipkart interview questions and answers]]></category>
		<category><![CDATA[fundamentals of osi and tcp/ip model]]></category>
		<category><![CDATA[HCL Technologies interview questions and answers]]></category>
		<category><![CDATA[IBM interview questions and answers]]></category>
		<category><![CDATA[Indecomm Global Services interview questions and answers]]></category>
		<category><![CDATA[Infosys Technologies interview questions and answers]]></category>
		<category><![CDATA[Mavenir interview questions and answers]]></category>
		<category><![CDATA[modele tcp ip]]></category>
		<category><![CDATA[Mphasis interview questions and answers]]></category>
		<category><![CDATA[NCR Corporation interview questions and answers]]></category>
		<category><![CDATA[NetApp interview questions and answers]]></category>
		<category><![CDATA[Oracle Corporation interview questions and answers]]></category>
		<category><![CDATA[osi and tcp ip model]]></category>
		<category><![CDATA[osi model layers]]></category>
		<category><![CDATA[osi reference model]]></category>
		<category><![CDATA[osi tcp ip]]></category>
		<category><![CDATA[osi tcp/ip layers and protocols]]></category>
		<category><![CDATA[PeopleStrong interview questions and answers]]></category>
		<category><![CDATA[polaris financial technology interview questions and answers]]></category>
		<category><![CDATA[R Systems interview questions and answers]]></category>
		<category><![CDATA[RBS India Development Centre Pvt Ltd interview questions and answers]]></category>
		<category><![CDATA[Reliance Industries Ltd interview questions and answers]]></category>
		<category><![CDATA[SAP Labs India Pvt Ltd interview questions and answers]]></category>
		<category><![CDATA[similarities and difference between tcp and osi model]]></category>
		<category><![CDATA[similarities between osi and tcp/ip model]]></category>
		<category><![CDATA[Tata Communications interview questions and answers]]></category>
		<category><![CDATA[tcp ip]]></category>
		<category><![CDATA[tcp ip layers]]></category>
		<category><![CDATA[tcp ip model]]></category>
		<category><![CDATA[tcp ip model chart]]></category>
		<category><![CDATA[tcp ip model layers]]></category>
		<category><![CDATA[tcp ip networking]]></category>
		<category><![CDATA[tcp ip osi model]]></category>
		<category><![CDATA[tcp ip packet]]></category>
		<category><![CDATA[tcp ip protocol]]></category>
		<category><![CDATA[tcp ip protocol layers]]></category>
		<category><![CDATA[tcp ip protocol suite]]></category>
		<category><![CDATA[tcp ip reference model]]></category>
		<category><![CDATA[tcp ip stack]]></category>
		<category><![CDATA[tcp ip transport layer]]></category>
		<category><![CDATA[tcp ip vs osi which is better]]></category>
		<category><![CDATA[tcp/ip and osi model explained]]></category>
		<category><![CDATA[tcp/ip layers and their functions]]></category>
		<category><![CDATA[tcp/ip model 5 layers]]></category>
		<category><![CDATA[tcp/ip model vs osi model]]></category>
		<category><![CDATA[tcp/ip reference model tutorialspoint]]></category>
		<category><![CDATA[tcpip]]></category>
		<category><![CDATA[Tech Mahindra interview questions and answers]]></category>
		<category><![CDATA[understanding tcp ip]]></category>
		<category><![CDATA[UnitedHealth Group interview questions and answers]]></category>
		<category><![CDATA[Virtela interview questions and answers]]></category>
		<category><![CDATA[what is tcp ip]]></category>
		<category><![CDATA[why are the osi and tcp/ip network models important in networking]]></category>
		<category><![CDATA[why tcp ip is used instead of osi]]></category>
		<guid isPermaLink="false">https://www.wikitechy.com/interview-questions/?p=792</guid>

					<description><![CDATA[Answer : TCP/IP means Transmission Control Protocol and Internet Protocol...]]></description>
										<content:encoded><![CDATA[<div class="TextHeading">
<div class="hddn">
<h2 id="what-is-tcp-ip-reference-model" class="color-pink" style="text-align: justify;">What is TCP/IP reference model ?</h2>
</div>
</div>
<div class="Content" style="text-align: justify;">
<div class="hddn">
<ul>
<li><a href="https://castr.io/blog/udp-vs-tcp-what-is-the-difference-between-tcp-and-udp/">UDP vs TCP</a> &#8211; TCP/IP means Transmission Control <a href="https://www.wikitechy.com/final-year-project/dotnet/server-hacking/what-is-protocol" target="_blank" rel="noopener">Protocol</a> and Internet Protocol. It is the network model used in the current Internet architecture as well.</li>
<li>Protocols are set of rules which govern every possible communication over a network.</li>
<li>These protocols describe the movement of data between the source and destination or the internet. They also offer simple naming and addressing schemes.</li>
</ul>
</div>
</div>
<div class="ImageContent" style="text-align: justify;">
<div class="hddn"><img fetchpriority="high" decoding="async" class="alignnone size-full wp-image-4294 aligncenter" src="https://www.wikitechy.com/interview-questions/wp-content/uploads/2021/07/tcp-ip-model.png" alt="" width="1474" height="1461" srcset="https://www.wikitechy.com/interview-questions/wp-content/uploads/2021/07/tcp-ip-model.png 1474w, https://www.wikitechy.com/interview-questions/wp-content/uploads/2021/07/tcp-ip-model-300x297.png 300w, https://www.wikitechy.com/interview-questions/wp-content/uploads/2021/07/tcp-ip-model-1024x1015.png 1024w, https://www.wikitechy.com/interview-questions/wp-content/uploads/2021/07/tcp-ip-model-150x150.png 150w, https://www.wikitechy.com/interview-questions/wp-content/uploads/2021/07/tcp-ip-model-768x761.png 768w, https://www.wikitechy.com/interview-questions/wp-content/uploads/2021/07/tcp-ip-model-80x80.png 80w, https://www.wikitechy.com/interview-questions/wp-content/uploads/2021/07/tcp-ip-model-390x387.png 390w, https://www.wikitechy.com/interview-questions/wp-content/uploads/2021/07/tcp-ip-model-820x813.png 820w, https://www.wikitechy.com/interview-questions/wp-content/uploads/2021/07/tcp-ip-model-1180x1170.png 1180w" sizes="(max-width: 1474px) 100vw, 1474px" /></div>
</div>
<div class="TextHeading" style="text-align: justify;">
<div class="hddn">
<h2 id="features-of-tcp-ip-reference-model" class="color-purple">Features of TCP/IP reference model</h2>
</div>
</div>
<div class="Content" style="text-align: justify;">
<div class="hddn">
<ul>
<li>Support for a flexible architecture. Adding more machines to a network was easy.</li>
<li>The network was robust, and connections remained intact until the source and destination machines were functioning.</li>
</ul>
</div>
</div>
<div class="ImageContent" style="text-align: justify;">
<div class="hddn"><img decoding="async" class="img-responsive center-block aligncenter" src="https://cdn.wikitechy.com/interview-questions/networking/what-is-tcp-ip-reference-model.png" alt=" " /></div>
</div>
<p style="text-align: justify;" align="center">Protocol and networks in the TCP/IP model</p>
<div class="TextHeading" style="text-align: justify;">
<div class="hddn">
<h2 id="different-layers-of-tcp-ip-reference-model" class="color-purple">Different Layers of TCP/IP Reference Model</h2>
<p><img decoding="async" class="alignnone size-full wp-image-4295" src="https://www.wikitechy.com/interview-questions/wp-content/uploads/2021/07/tcp-ip-reference-model.png" alt="" width="874" height="698" srcset="https://www.wikitechy.com/interview-questions/wp-content/uploads/2021/07/tcp-ip-reference-model.png 874w, https://www.wikitechy.com/interview-questions/wp-content/uploads/2021/07/tcp-ip-reference-model-300x240.png 300w, https://www.wikitechy.com/interview-questions/wp-content/uploads/2021/07/tcp-ip-reference-model-768x613.png 768w, https://www.wikitechy.com/interview-questions/wp-content/uploads/2021/07/tcp-ip-reference-model-390x311.png 390w, https://www.wikitechy.com/interview-questions/wp-content/uploads/2021/07/tcp-ip-reference-model-820x655.png 820w" sizes="(max-width: 874px) 100vw, 874px" /></p>
</div>
</div>
<div class="TextHeading" style="text-align: justify;">
<div class="hddn">
<h2 id="layer-1-host-to-network-layer" class="color-green">Layer 1: Host-to-network Layer</h2>
</div>
</div>
<div class="Content" style="text-align: justify;">
<div class="hddn">
<ul>
<li>Lowest layer of the all.</li>
<li>Protocol is used to connect to the host, so that the packets can be sent over it. Varies from host to host and network to network.</li>
</ul>
</div>
</div>
<div class="TextHeading" style="text-align: justify;">
<div class="hddn">
<h2 id="layer-2-internet-layer" class="color-green">Layer 2: Internet Layer</h2>
</div>
</div>
<div class="Content" style="text-align: justify;">
<div class="hddn">
<ul>
<li>Selection of a packet switching network which is based on a connectionless internetwork layer is called a internet layer. This layer which holds the whole architecture together.</li>
<li>It helps the packet to travel independently to the destination.</li>
<li>Order in which packets are received is different from the way they are sent.</li>
<li>IP (Internet Protocol) is used in this layer.</li>
</ul>
</div>
</div>
<div class="subheading" style="text-align: justify;">
<h2 id="the-various-functions-performed-by-the-internet-layer-are">The various functions performed by the Internet Layer are</h2>
</div>
<div class="Content" style="text-align: justify;">
<div class="hddn">
<ul>
<li>Delivering IP packets.</li>
<li>Performing <a href="https://www.wikitechy.com/interview-questions/networking/what-is-routing/" target="_blank" rel="noopener">routing</a>.</li>
<li>Avoiding congestion.</li>
</ul>
</div>
</div>
<div class="TextHeading" style="text-align: justify;">
<div class="hddn">
<h2 id="layer-3-transport-layer" class="color-green">Layer 3: Transport Layer</h2>
</div>
</div>
<div class="Content" style="text-align: justify;">
<div class="hddn">
<ul>
<li>It decides if data transmission should be on parallel path or single path.</li>
<li>Functions such as multiplexing, segmenting or splitting on the data is done by transport layer.</li>
<li>The applications can read and write to the transport layer.</li>
<li>Transport layer adds header information to the data.</li>
<li>Transport layer breaks the message (data) into small units so that they are handled more efficiently by the network layer.</li>
<li>Transport layer also arrange the packets to be sent, in sequence.</li>
</ul>
</div>
</div>
<div class="TextHeading" style="text-align: justify;">
<div class="hddn">
<h2 id="layer-4-application-layer" class="color-green">Layer 4: Application Layer</h2>
</div>
</div>
<div class="Content" style="text-align: justify;">
<div class="hddn">
<ul>
<li>The TCP/IP specifications described a lot of applications that were at the top of the protocol stack. Some of them were <b>TELNET, FTP, SMTP, DNS</b> etc.
<ul>
<li><b>TELNET</b> is a two-way communication protocol which allows connecting to a remote machine and run applications on it.</li>
<li><b>FTP (File Transfer Protocol)</b> is a protocol, that allows File transfer amongst computer users connected over a network. It is reliable, simple and efficient.</li>
<li><b>SMTP (Simple Mail Transport Protocol)</b> is a protocol, which is used to transport electronic mail between a source and destination, directed via a route.</li>
<li><b>DNS (Domain Name Server)</b> resolves an IP address into a textual address for Hosts connected over a network.</li>
</ul>
</li>
<li>It allows peer entities to carry conversation.</li>
<li>It defines two end-to-end protocols : <b class="color-pink">TCP and UDP</b>
<ul>
<li><b>TCP (Transmission Control Protocol) : </b>It is a reliable connection-oriented protocol which handles byte-stream from source to destination without error and flow control.</li>
<li><b>UDP (User-Datagram Protocol) : </b>It is an unreliable connection-less protocol that do not want TCPs, sequencing and flow control. For Example One-shot request-reply kind of service.</li>
</ul>
</li>
</ul>
</div>
</div>
<div class="TextHeading" style="text-align: justify;">
<div class="hddn">
<h2 id="advantages-of-tcp-ip-model" class="color-purple">Advantages of TCP/IP model</h2>
</div>
</div>
<div class="Content" style="text-align: justify;">
<div class="hddn">
<ul>
<li>It operated independently.</li>
<li>It is scalable.</li>
<li>Client/server architecture.</li>
<li>Supports a number of routing protocols.</li>
<li>Can be used to establish a connection between two computers.</li>
</ul>
</div>
</div>
<div class="TextHeading" style="text-align: justify;">
<div class="hddn">
<h2 id="disadvantages-of-tcp-ip-model" class="color-purple">Disadvantages of TCP/IP Model</h2>
</div>
</div>
<div class="Content">
<div class="hddn">
<ul>
<li style="text-align: justify;">In this layer does not guarantee delivery of packets.</li>
<li style="text-align: justify;">The model cannot be used in any other application.</li>
<li style="text-align: justify;">Replacing protocol is not easy.</li>
<li style="text-align: justify;">It has not clearly separated its services, interfaces and protocols.</li>
</ul>
</div>
</div>
]]></content:encoded>
					
					<wfw:commentRss>https://www.wikitechy.com/interview-questions/networking/what-is-tcp-ip-reference-model/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>What is Switching ?</title>
		<link>https://www.wikitechy.com/interview-questions/networking/what-is-switching/</link>
					<comments>https://www.wikitechy.com/interview-questions/networking/what-is-switching/#respond</comments>
		
		<dc:creator><![CDATA[Editor]]></dc:creator>
		<pubDate>Sat, 17 Jul 2021 20:26:14 +0000</pubDate>
				<category><![CDATA[Networking]]></category>
		<category><![CDATA[Accenture interview questions and answers]]></category>
		<category><![CDATA[Allstate Solutions Pvt Ltd interview questions and answers]]></category>
		<category><![CDATA[Applied Mate interview questions and answers]]></category>
		<category><![CDATA[Atos interview questions and answers]]></category>
		<category><![CDATA[Bharti Airtel interview questions and answers]]></category>
		<category><![CDATA[Capgemini interview questions and answers]]></category>
		<category><![CDATA[CASTING NETWORKS INDIA PVT LIMITED interview questions and answers]]></category>
		<category><![CDATA[Ciena Corporation interview questions and answers]]></category>
		<category><![CDATA[circuit switching]]></category>
		<category><![CDATA[circuit switching advantages and disadvantages]]></category>
		<category><![CDATA[circuit switching in networking]]></category>
		<category><![CDATA[circuit switching in telecommunication]]></category>
		<category><![CDATA[cisco routing and switching]]></category>
		<category><![CDATA[classification of switching system]]></category>
		<category><![CDATA[code switching definition]]></category>
		<category><![CDATA[CSS Corp Pvt Ltd interview questions and answers]]></category>
		<category><![CDATA[datagram packet switching]]></category>
		<category><![CDATA[Dell International Services India Pvt Ltd interview questions and answers]]></category>
		<category><![CDATA[difference between circuit switching and packet switching and message switching]]></category>
		<category><![CDATA[explain switching in computer networks]]></category>
		<category><![CDATA[Flipkart interview questions and answers]]></category>
		<category><![CDATA[HCL Technologies interview questions and answers]]></category>
		<category><![CDATA[how does packet switching work]]></category>
		<category><![CDATA[IBM interview questions and answers]]></category>
		<category><![CDATA[Indecomm Global Services interview questions and answers]]></category>
		<category><![CDATA[Infosys Technologies interview questions and answers]]></category>
		<category><![CDATA[lan switching]]></category>
		<category><![CDATA[manual switching system]]></category>
		<category><![CDATA[Mavenir interview questions and answers]]></category>
		<category><![CDATA[message switching]]></category>
		<category><![CDATA[message switching geeksforgeeks]]></category>
		<category><![CDATA[message switching slideshare]]></category>
		<category><![CDATA[message switching vs packet switching]]></category>
		<category><![CDATA[Mphasis interview questions and answers]]></category>
		<category><![CDATA[NCR Corporation interview questions and answers]]></category>
		<category><![CDATA[need of switching in networking]]></category>
		<category><![CDATA[NetApp interview questions and answers]]></category>
		<category><![CDATA[network routing and switching]]></category>
		<category><![CDATA[network switching equipment]]></category>
		<category><![CDATA[networking and switching]]></category>
		<category><![CDATA[Oracle Corporation interview questions and answers]]></category>
		<category><![CDATA[packet switching]]></category>
		<category><![CDATA[packet switching advantages and disadvantages]]></category>
		<category><![CDATA[packet switching diagram]]></category>
		<category><![CDATA[packet switching in computer networks]]></category>
		<category><![CDATA[packet switching in networking]]></category>
		<category><![CDATA[packet switching technology]]></category>
		<category><![CDATA[packet switching vs circuit switching]]></category>
		<category><![CDATA[PeopleStrong interview questions and answers]]></category>
		<category><![CDATA[polaris financial technology interview questions and answers]]></category>
		<category><![CDATA[R Systems interview questions and answers]]></category>
		<category><![CDATA[raise two main advantages of packet switching compared to message switching]]></category>
		<category><![CDATA[RBS India Development Centre Pvt Ltd interview questions and answers]]></category>
		<category><![CDATA[Reliance Industries Ltd interview questions and answers]]></category>
		<category><![CDATA[routing and switching]]></category>
		<category><![CDATA[SAP Labs India Pvt Ltd interview questions and answers]]></category>
		<category><![CDATA[simple switching network]]></category>
		<category><![CDATA[switching cost]]></category>
		<category><![CDATA[switching in data communication]]></category>
		<category><![CDATA[switching in data communication and networking]]></category>
		<category><![CDATA[switching in networking]]></category>
		<category><![CDATA[switching in telecommunication]]></category>
		<category><![CDATA[switching network in telecommunication]]></category>
		<category><![CDATA[switching process in networking]]></category>
		<category><![CDATA[switching regulator]]></category>
		<category><![CDATA[switching system in networking]]></category>
		<category><![CDATA[switching techniques]]></category>
		<category><![CDATA[switching technologies in networking]]></category>
		<category><![CDATA[Tata Communications interview questions and answers]]></category>
		<category><![CDATA[Tech Mahindra interview questions and answers]]></category>
		<category><![CDATA[types of packet switching]]></category>
		<category><![CDATA[types of switching in computer networks]]></category>
		<category><![CDATA[types of switching in networking]]></category>
		<category><![CDATA[UnitedHealth Group interview questions and answers]]></category>
		<category><![CDATA[Virtela interview questions and answers]]></category>
		<category><![CDATA[what is a circuit in networking]]></category>
		<category><![CDATA[what is circuit switching]]></category>
		<category><![CDATA[what is circuit switching and packet switching]]></category>
		<category><![CDATA[what is packet switching]]></category>
		<category><![CDATA[what is packet switching in networking]]></category>
		<category><![CDATA[what is switching]]></category>
		<category><![CDATA[what is switching cost]]></category>
		<category><![CDATA[what is switching in networking and its types]]></category>
		<category><![CDATA[what is switching in telecommunication]]></category>
		<category><![CDATA[what is switching regulator]]></category>
		<guid isPermaLink="false">https://www.wikitechy.com/interview-questions/?p=791</guid>

					<description><![CDATA[Answer : Switching is the most valuable asset...]]></description>
										<content:encoded><![CDATA[<div class="TextHeading">
<div class="hddn">
<h2 id="what-is-switching" class="color-pink" style="text-align: justify;">What is Switching ?</h2>
</div>
</div>
<div class="Content" style="text-align: justify;">
<div class="hddn">
<ul>
<li>Switching is the most valuable asset of computer networking.</li>
<li>Everytime in computer network you have access the internet or another computer network outside your immediate location, or your messages are sent through a maze of transmission media and connection devices.</li>
<li>The mechanism for exchange of information between different computer networks and network segments is called switching in Networking.</li>
<li>On the other words we can say that any type signal or data element directing or Switching toward a particular hardware address or hardware pieces.</li>
<li>Hardware devices that can be used for switching or transferring data from one location to another that can use multiple layers of the Open Systems Interconnection (OSI) model.</li>
</ul>
<p><img decoding="async" class="alignnone size-full wp-image-4298 aligncenter" src="https://www.wikitechy.com/interview-questions/wp-content/uploads/2021/07/network-switch.png" alt="" width="1254" height="385" srcset="https://www.wikitechy.com/interview-questions/wp-content/uploads/2021/07/network-switch.png 1254w, https://www.wikitechy.com/interview-questions/wp-content/uploads/2021/07/network-switch-300x92.png 300w, https://www.wikitechy.com/interview-questions/wp-content/uploads/2021/07/network-switch-1024x314.png 1024w, https://www.wikitechy.com/interview-questions/wp-content/uploads/2021/07/network-switch-768x236.png 768w, https://www.wikitechy.com/interview-questions/wp-content/uploads/2021/07/network-switch-390x120.png 390w, https://www.wikitechy.com/interview-questions/wp-content/uploads/2021/07/network-switch-820x252.png 820w, https://www.wikitechy.com/interview-questions/wp-content/uploads/2021/07/network-switch-1180x362.png 1180w" sizes="(max-width: 1254px) 100vw, 1254px" /></p>
</div>
</div>
<div class="TextHeading" style="text-align: justify;">
<div class="hddn">
<h2 id="types-of-switching-techniques" class="color-purple">Types of Switching Techniques</h2>
</div>
<p><img loading="lazy" decoding="async" class="alignnone size-full wp-image-4297" src="https://www.wikitechy.com/interview-questions/wp-content/uploads/2021/07/methods-of-switching.png" alt="" width="1234" height="842" srcset="https://www.wikitechy.com/interview-questions/wp-content/uploads/2021/07/methods-of-switching.png 1234w, https://www.wikitechy.com/interview-questions/wp-content/uploads/2021/07/methods-of-switching-300x205.png 300w, https://www.wikitechy.com/interview-questions/wp-content/uploads/2021/07/methods-of-switching-1024x699.png 1024w, https://www.wikitechy.com/interview-questions/wp-content/uploads/2021/07/methods-of-switching-768x524.png 768w, https://www.wikitechy.com/interview-questions/wp-content/uploads/2021/07/methods-of-switching-390x266.png 390w, https://www.wikitechy.com/interview-questions/wp-content/uploads/2021/07/methods-of-switching-820x560.png 820w, https://www.wikitechy.com/interview-questions/wp-content/uploads/2021/07/methods-of-switching-1180x805.png 1180w" sizes="(max-width: 1234px) 100vw, 1234px" /></p>
</div>
<div class="Content" style="text-align: justify;">
<div class="hddn">
<ul>
<li>There are basically three types of switching methods are available.
<ul>
<li>Circuit Switching</li>
<li>Packet Switching</li>
<li>Message Switching</li>
</ul>
</li>
</ul>
</div>
</div>
<div class="TextHeading" style="text-align: justify;">
<div class="hddn">
<h2 id="circuit-switching" class="color-purple">Circuit Switching</h2>
<p><img loading="lazy" decoding="async" class="alignnone size-full wp-image-4300 aligncenter" src="https://www.wikitechy.com/interview-questions/wp-content/uploads/2021/07/circuit-switching.png" alt="" width="1367" height="595" srcset="https://www.wikitechy.com/interview-questions/wp-content/uploads/2021/07/circuit-switching.png 1367w, https://www.wikitechy.com/interview-questions/wp-content/uploads/2021/07/circuit-switching-300x131.png 300w, https://www.wikitechy.com/interview-questions/wp-content/uploads/2021/07/circuit-switching-1024x446.png 1024w, https://www.wikitechy.com/interview-questions/wp-content/uploads/2021/07/circuit-switching-768x334.png 768w, https://www.wikitechy.com/interview-questions/wp-content/uploads/2021/07/circuit-switching-390x170.png 390w, https://www.wikitechy.com/interview-questions/wp-content/uploads/2021/07/circuit-switching-820x357.png 820w, https://www.wikitechy.com/interview-questions/wp-content/uploads/2021/07/circuit-switching-1180x514.png 1180w" sizes="(max-width: 1367px) 100vw, 1367px" /></p>
</div>
</div>
<div class="Content" style="text-align: justify;">
<div class="hddn">
<ul>
<li>Circuit-switching is the real-time connection-oriented system. In Circuit Switching a dedicated channel (or circuit) is set up for a single connection between the sender and recipient during the communication session.</li>
<li>In telephone communication system, the normal voice call is the example of Circuit Switching. The telephone service provider maintain a unbroken link for each telephone call.</li>
<li>Circuit switching is pass through three phases, that are circuit establishment, data transfer and circuit disconnect.</li>
</ul>
</div>
</div>
<div class="ImageContent" style="text-align: justify;">
<div class="hddn"><img decoding="async" class="img-responsive center-block aligncenter" src="https://cdn.wikitechy.com/interview-questions/networking/circuit-switching.gif" alt=" " /></div>
</div>
<div class="TextHeading" style="text-align: justify;">
<div class="hddn">
<h2 id="packet-switching" class="color-purple">Packet Switching</h2>
</div>
</div>
<div class="Content" style="text-align: justify;">
<div class="hddn">
<ul>
<li>The basic example of Packet Switching is the Internet. In Packet Switching, data can be fragmented into suitably-sized pieces in variable length or blocks that are called packets that can be routed independently by network devices based on the destination address contained certain “formatted” header within each packet.</li>
<li>The packet switched networks allow sender and recipient without reserving the circuit. Multiple paths are exist between sender and recipient in a packet switching network.</li>
<li>They does not require a call setup to transfer packets between sender and recipient.</li>
</ul>
</div>
</div>
<div class="ImageContent" style="text-align: justify;">
<div class="hddn"><img decoding="async" class="img-responsive center-block aligncenter" src="https://cdn.wikitechy.com/interview-questions/networking/packet-switching.gif" alt="Packet Switching" width="70%" /></div>
</div>
<p style="text-align: center;" align="center">Packet Switching</p>
<div class="Content" style="text-align: justify;">
<div class="hddn">
<ul>
<li>There are two type of Packet Switching connectionless or Connection-Oriented.</li>
</ul>
</div>
</div>
<div class="TextHeading" style="text-align: justify;">
<div class="hddn">
<h2 id="connectionless-packet-switching" class="color-purple">Connectionless Packet Switching</h2>
</div>
</div>
<div class="Content" style="text-align: justify;">
<div class="hddn">
<ul>
<li>It is also known as datagram switching. In this type of network each packet routed individually by network devices based on the destination address contained within each packet.</li>
<li>Due to each packet is routed individually, the result is that each packet is delivered out-of-order with different paths of transmission, it depend on the networking devices like (switches and routers) at any given time.</li>
<li>After reaching recipient location, the packets are reassemble to the original form.</li>
</ul>
</div>
</div>
<div class="TextHeading" style="text-align: justify;">
<div class="hddn">
<h2 id="connection-oriented-packet-switching" class="color-purple">Connection-Oriented Packet Switching</h2>
</div>
</div>
<div class="Content" style="text-align: justify;">
<div class="hddn">
<ul>
<li>It is also known as virtual circuit switching. In this type of Networking packets are send in sequential order over a defined route.</li>
</ul>
</div>
</div>
<div class="TextHeading" style="text-align: justify;">
<div class="hddn">
<h2 id="message-switching" class="color-purple">Message Switching</h2>
</div>
</div>
<div class="Content" style="text-align: justify;">
<div class="hddn">
<ul>
<li>Message switching does not set up a dedicated channel (or circuit) between the sender and recipient during the communication session.</li>
<li>In Message Switching each message is treated as an independent blocks.</li>
<li>In this type of networking, each message is then transmitted from first network device to second network device through the internetwork i.e. message is transmitted from the sender to intermediate device.</li>
</ul>
</div>
</div>
<div class="ImageContent" style="text-align: justify;">
<div class="hddn"><img decoding="async" class="img-responsive center-block aligncenter" src="https://cdn.wikitechy.com/interview-questions/networking/message-switching.jpg" alt=" " /></div>
</div>
<p style="text-align: justify;" align="center">Message Switching</p>
<div class="Content">
<div class="hddn">
<ul>
<li style="text-align: justify;">The intermediate device stores the message for a time being, after inspects it for errors, intermediate device transmitting the message to the next node with its routing information. Because the message switching networks are called store and forward networks in networking.</li>
</ul>
</div>
</div>
]]></content:encoded>
					
					<wfw:commentRss>https://www.wikitechy.com/interview-questions/networking/what-is-switching/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>What is Routing ?</title>
		<link>https://www.wikitechy.com/interview-questions/networking/what-is-routing/</link>
					<comments>https://www.wikitechy.com/interview-questions/networking/what-is-routing/#respond</comments>
		
		<dc:creator><![CDATA[Editor]]></dc:creator>
		<pubDate>Sat, 17 Jul 2021 20:22:05 +0000</pubDate>
				<category><![CDATA[Networking]]></category>
		<category><![CDATA[Accenture interview questions and answers]]></category>
		<category><![CDATA[advantages of static routing]]></category>
		<category><![CDATA[Allstate Solutions Pvt Ltd interview questions and answers]]></category>
		<category><![CDATA[Applied Mate interview questions and answers]]></category>
		<category><![CDATA[Atos interview questions and answers]]></category>
		<category><![CDATA[Bharti Airtel interview questions and answers]]></category>
		<category><![CDATA[Capgemini interview questions and answers]]></category>
		<category><![CDATA[CASTING NETWORKS INDIA PVT LIMITED interview questions and answers]]></category>
		<category><![CDATA[Ciena Corporation interview questions and answers]]></category>
		<category><![CDATA[CSS Corp Pvt Ltd interview questions and answers]]></category>
		<category><![CDATA[default and static routing basics]]></category>
		<category><![CDATA[default route linux]]></category>
		<category><![CDATA[default route vs default gateway]]></category>
		<category><![CDATA[default routing in cisco packet tracer]]></category>
		<category><![CDATA[Dell International Services India Pvt Ltd interview questions and answers]]></category>
		<category><![CDATA[dynamic routing advantages]]></category>
		<category><![CDATA[dynamic routing example]]></category>
		<category><![CDATA[dynamic routing packet tracer]]></category>
		<category><![CDATA[Flipkart interview questions and answers]]></category>
		<category><![CDATA[HCL Technologies interview questions and answers]]></category>
		<category><![CDATA[IBM interview questions and answers]]></category>
		<category><![CDATA[Indecomm Global Services interview questions and answers]]></category>
		<category><![CDATA[Infosys Technologies interview questions and answers]]></category>
		<category><![CDATA[Mavenir interview questions and answers]]></category>
		<category><![CDATA[Mphasis interview questions and answers]]></category>
		<category><![CDATA[NCR Corporation interview questions and answers]]></category>
		<category><![CDATA[NetApp interview questions and answers]]></category>
		<category><![CDATA[network router]]></category>
		<category><![CDATA[Oracle Corporation interview questions and answers]]></category>
		<category><![CDATA[PeopleStrong interview questions and answers]]></category>
		<category><![CDATA[polaris financial technology interview questions and answers]]></category>
		<category><![CDATA[R Systems interview questions and answers]]></category>
		<category><![CDATA[RBS India Development Centre Pvt Ltd interview questions and answers]]></category>
		<category><![CDATA[Reliance Industries Ltd interview questions and answers]]></category>
		<category><![CDATA[router]]></category>
		<category><![CDATA[router check]]></category>
		<category><![CDATA[router definition]]></category>
		<category><![CDATA[router definition in networking]]></category>
		<category><![CDATA[router in computer network]]></category>
		<category><![CDATA[router meaning]]></category>
		<category><![CDATA[router number]]></category>
		<category><![CDATA[routing]]></category>
		<category><![CDATA[routing algorithms in computer networks]]></category>
		<category><![CDATA[routing in a network]]></category>
		<category><![CDATA[routing protocols]]></category>
		<category><![CDATA[routing protocols and concepts]]></category>
		<category><![CDATA[routing protocols cisco]]></category>
		<category><![CDATA[routing protocols comparison]]></category>
		<category><![CDATA[routing protocols in computer networks]]></category>
		<category><![CDATA[routing table]]></category>
		<category><![CDATA[routing techniques in computer networks]]></category>
		<category><![CDATA[SAP Labs India Pvt Ltd interview questions and answers]]></category>
		<category><![CDATA[should i enable dynamic routing]]></category>
		<category><![CDATA[static and dynamic routing]]></category>
		<category><![CDATA[static routing]]></category>
		<category><![CDATA[static routing configuration]]></category>
		<category><![CDATA[static routing example with diagram]]></category>
		<category><![CDATA[static routing vs dynamic routing]]></category>
		<category><![CDATA[Tata Communications interview questions and answers]]></category>
		<category><![CDATA[tatic routing]]></category>
		<category><![CDATA[Tech Mahindra interview questions and answers]]></category>
		<category><![CDATA[types of dynamic routing]]></category>
		<category><![CDATA[types of routing algorithms]]></category>
		<category><![CDATA[types of routing in computer networks]]></category>
		<category><![CDATA[types of static routing protocols]]></category>
		<category><![CDATA[UnitedHealth Group interview questions and answers]]></category>
		<category><![CDATA[Virtela interview questions and answers]]></category>
		<category><![CDATA[what does route mean]]></category>
		<category><![CDATA[what is a router]]></category>
		<category><![CDATA[what is a routing number]]></category>
		<category><![CDATA[what is aba routing number]]></category>
		<category><![CDATA[what is default routing in ccnadefault routing]]></category>
		<category><![CDATA[what is dynamic routing protocol]]></category>
		<category><![CDATA[what is my routing number]]></category>
		<category><![CDATA[what is routing]]></category>
		<category><![CDATA[what is routing in networking]]></category>
		<category><![CDATA[what is routing in networking and its types]]></category>
		<category><![CDATA[what is routing protocol]]></category>
		<category><![CDATA[what's my routing number]]></category>
		<category><![CDATA[whats a routing number]]></category>
		<category><![CDATA[when to use static routing]]></category>
		<category><![CDATA[why do static and default routing still play a role in many modern network designs]]></category>
		<guid isPermaLink="false">https://www.wikitechy.com/interview-questions/?p=790</guid>

					<description><![CDATA[Answer : Routing refers to establishing the routes that data packets...]]></description>
										<content:encoded><![CDATA[<div class="TextHeading">
<div class="hddn">
<h2 id="what-is-routing" class="color-pink" style="text-align: justify;">What is Routing ?</h2>
</div>
</div>
<div class="Content" style="text-align: justify;">
<div class="hddn">
<ul>
<li>Routing refers to establishing the routes that data packets take on their way to a particular destination.</li>
<li>This term can be applied to data traveling on the Internet, over 3G or 4G networks, or over similar networks used for telecom and other digital communications setups. Routing can also take place within proprietary networks.</li>
</ul>
</div>
</div>
<div class="ImageContent" style="text-align: justify;">
<div class="hddn"><img decoding="async" class="img-responsive center-block" src="https://cdn.wikitechy.com/interview-questions/networking/what-is-routing.png" alt="What is Routing " /></div>
</div>
<div class="TextHeading" style="text-align: justify;">
<div class="hddn">
<h2 id="how-routing-protocols-work" class="color-purple">How Routing Protocols Work</h2>
<p><img loading="lazy" decoding="async" class="alignnone size-full wp-image-4303 aligncenter" src="https://www.wikitechy.com/interview-questions/wp-content/uploads/2021/07/how-protocols-works.png" alt="" width="1208" height="681" srcset="https://www.wikitechy.com/interview-questions/wp-content/uploads/2021/07/how-protocols-works.png 1208w, https://www.wikitechy.com/interview-questions/wp-content/uploads/2021/07/how-protocols-works-300x169.png 300w, https://www.wikitechy.com/interview-questions/wp-content/uploads/2021/07/how-protocols-works-1024x577.png 1024w, https://www.wikitechy.com/interview-questions/wp-content/uploads/2021/07/how-protocols-works-768x433.png 768w, https://www.wikitechy.com/interview-questions/wp-content/uploads/2021/07/how-protocols-works-390x220.png 390w, https://www.wikitechy.com/interview-questions/wp-content/uploads/2021/07/how-protocols-works-820x462.png 820w, https://www.wikitechy.com/interview-questions/wp-content/uploads/2021/07/how-protocols-works-1180x665.png 1180w" sizes="(max-width: 1208px) 100vw, 1208px" /></p>
</div>
</div>
<div class="Content" style="text-align: justify;">
<div class="hddn">
<ul>
<li>Every network Routing protocol performs three basic functions:
<ul>
<li><b>Discovery &#8211;</b> Identify other routers on the network.</li>
<li><b>Route Management &#8211;</b> Keep track of all the possible destinations (for network messages) along with some data describing the pathway of each.</li>
<li><b>Path Determination &#8211;</b> Make dynamic decisions for where to send each network message.</li>
</ul>
</li>
</ul>
</div>
</div>
<div class="subheading" style="text-align: justify;">
<h4 id="there-are-3-types-of-routing">There are 3 types of Routing</h4>
<p><img loading="lazy" decoding="async" class="alignnone size-full wp-image-4304 aligncenter" src="https://www.wikitechy.com/interview-questions/wp-content/uploads/2021/07/types-of-routing.png" alt="" width="853" height="411" srcset="https://www.wikitechy.com/interview-questions/wp-content/uploads/2021/07/types-of-routing.png 853w, https://www.wikitechy.com/interview-questions/wp-content/uploads/2021/07/types-of-routing-300x145.png 300w, https://www.wikitechy.com/interview-questions/wp-content/uploads/2021/07/types-of-routing-768x370.png 768w, https://www.wikitechy.com/interview-questions/wp-content/uploads/2021/07/types-of-routing-390x188.png 390w, https://www.wikitechy.com/interview-questions/wp-content/uploads/2021/07/types-of-routing-820x395.png 820w" sizes="(max-width: 853px) 100vw, 853px" /></p>
<ul>
<li>Static Routing</li>
<li>Dafault Routing</li>
<li>Dynamic Routing</li>
</ul>
</div>
<div class="TextHeading" style="text-align: justify;">
<div class="hddn">
<h2 id="static-routing" class="color-green">Static Routing</h2>
</div>
</div>
<div class="Content" style="text-align: justify;">
<div class="hddn">
<ul>
<li>Static Routing is a process in which we have to manually add routes in Routing table.</li>
</ul>
</div>
</div>
<div class="ImageContent" style="text-align: justify;">
<div class="hddn"><img decoding="async" class="img-responsive center-block aligncenter" src="https://cdn.wikitechy.com/interview-questions/networking/static-routing.png" alt="Static Routing " /></div>
</div>
<div class="TextHeading" style="text-align: justify;">
<div class="hddn">
<h2 id="advantages" class="color-purple">Advantages</h2>
</div>
</div>
<div class="Content" style="text-align: justify;">
<div class="hddn">
<ul>
<li>No Routing overhead for router CPU which means a cheaper router can be used to do Routing.</li>
<li>It adds security because only administrator can allow Routing to particular networks only.</li>
<li>No bandwidth usage between routers.</li>
</ul>
</div>
</div>
<div class="TextHeading" style="text-align: justify;">
<div class="hddn">
<h2 id="disadvantages" class="color-purple">Disadvantages</h2>
</div>
</div>
<div class="Content" style="text-align: justify;">
<div class="hddn">
<ul>
<li>For a large network, it is a difficult task for administrator to manually add each route for the network in the Routing table on each router.</li>
<li>The administrator should have good knowledge of the topology.</li>
<li>If a new administrator comes, then he has to manually add each route so he should have very good knowledge of the routes of the topology.</li>
</ul>
</div>
</div>
<div class="TextHeading" style="text-align: justify;">
<div class="hddn">
<h2 id="default-routing" class="color-green">Default Routing</h2>
</div>
</div>
<div class="Content" style="text-align: justify;">
<div class="hddn">
<ul>
<li>This method where the router is configured to send all packets towards a single router (next hop).</li>
<li>It is very useful method for small networks or networks with a single entry and exit point.</li>
<li>Basically this method used in addition to <a href="https://www.wikitechy.com/interview-questions/networking/what-is-the-difference-between-static-and-dynamic-ip/" target="_blank" rel="noopener">Static and/or Dynamic</a> routing.</li>
<li>It is generally used with stub routers. A stub router is a router which has only one route to reach all other networks.</li>
</ul>
</div>
</div>
<div class="ImageContent" style="text-align: justify;">
<div class="hddn"><img decoding="async" class="img-responsive center-block aligncenter" src="https://cdn.wikitechy.com/interview-questions/networking/default-routing.png" alt="Default Routing" /></div>
</div>
<div class="TextHeading" style="text-align: justify;">
<div class="hddn">
<h2 id="dynamic-routing" class="color-green">Dynamic Routing</h2>
<p><img loading="lazy" decoding="async" class="alignnone size-full wp-image-4305" src="https://www.wikitechy.com/interview-questions/wp-content/uploads/2021/07/dynamic-routing-protocol.png" alt="" width="1346" height="719" srcset="https://www.wikitechy.com/interview-questions/wp-content/uploads/2021/07/dynamic-routing-protocol.png 1346w, https://www.wikitechy.com/interview-questions/wp-content/uploads/2021/07/dynamic-routing-protocol-300x160.png 300w, https://www.wikitechy.com/interview-questions/wp-content/uploads/2021/07/dynamic-routing-protocol-1024x547.png 1024w, https://www.wikitechy.com/interview-questions/wp-content/uploads/2021/07/dynamic-routing-protocol-768x410.png 768w, https://www.wikitechy.com/interview-questions/wp-content/uploads/2021/07/dynamic-routing-protocol-390x208.png 390w, https://www.wikitechy.com/interview-questions/wp-content/uploads/2021/07/dynamic-routing-protocol-820x438.png 820w, https://www.wikitechy.com/interview-questions/wp-content/uploads/2021/07/dynamic-routing-protocol-1180x630.png 1180w" sizes="(max-width: 1346px) 100vw, 1346px" /></p>
</div>
</div>
<div class="Content" style="text-align: justify;">
<div class="hddn">
<ul>
<li style="list-style-type: none;">
<ul>
<li>Dynamic Routing makes automatic adjustment of the routes according to the current state of the route in the Routing table.</li>
<li>Dynamic Routing uses protocols to discover network destinations and the routes to reach it.</li>
<li>RIP and OSPF are the best examples of dynamic Routing protocol. Automatic adjustment will be made to reach the network destination if one route goes down.</li>
</ul>
</li>
</ul>
<div class="ImageContent">
<div class="hddn"><img loading="lazy" decoding="async" class="alignnone size-full wp-image-4306" src="https://www.wikitechy.com/interview-questions/wp-content/uploads/2021/07/dynamic-routing.png" alt="" width="1251" height="475" srcset="https://www.wikitechy.com/interview-questions/wp-content/uploads/2021/07/dynamic-routing.png 1251w, https://www.wikitechy.com/interview-questions/wp-content/uploads/2021/07/dynamic-routing-300x114.png 300w, https://www.wikitechy.com/interview-questions/wp-content/uploads/2021/07/dynamic-routing-1024x389.png 1024w, https://www.wikitechy.com/interview-questions/wp-content/uploads/2021/07/dynamic-routing-768x292.png 768w, https://www.wikitechy.com/interview-questions/wp-content/uploads/2021/07/dynamic-routing-390x148.png 390w, https://www.wikitechy.com/interview-questions/wp-content/uploads/2021/07/dynamic-routing-820x311.png 820w, https://www.wikitechy.com/interview-questions/wp-content/uploads/2021/07/dynamic-routing-1180x448.png 1180w" sizes="(max-width: 1251px) 100vw, 1251px" /></div>
</div>
<p align="center">Dynamic Routing</p>
<ul>
<li>A dynamic protocol have following features,
<ul>
<li>The routers should have the same dynamic protocol running in order to exchange routes.</li>
<li>When a router finds a change in the topology then router advertises it to all other routers.</li>
</ul>
</li>
</ul>
</div>
</div>
<div class="TextHeading" style="text-align: justify;">
<div class="hddn">
<h2 id="advantages-2" class="color-purple">Advantages</h2>
</div>
</div>
<div class="Content" style="text-align: justify;">
<div class="hddn">
<ul>
<li>Easy to configure.</li>
<li>More effective at selecting the best route to a destination remote network and also for discovering remote network.</li>
</ul>
</div>
</div>
<div class="TextHeading" style="text-align: justify;">
<div class="hddn">
<h2 id="disadvantages-2" class="color-purple">Disadvantages</h2>
</div>
</div>
<div class="Content">
<div class="hddn">
<ul>
<li style="text-align: justify;">Consumes more bandwidth for communicating with other neighbours.</li>
<li style="text-align: justify;">Less secure than static Routing.</li>
</ul>
</div>
</div>
]]></content:encoded>
					
					<wfw:commentRss>https://www.wikitechy.com/interview-questions/networking/what-is-routing/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>What is Optical Network ?</title>
		<link>https://www.wikitechy.com/interview-questions/networking/what-is-optical-network/</link>
					<comments>https://www.wikitechy.com/interview-questions/networking/what-is-optical-network/#respond</comments>
		
		<dc:creator><![CDATA[Editor]]></dc:creator>
		<pubDate>Sat, 17 Jul 2021 20:16:48 +0000</pubDate>
				<category><![CDATA[Networking]]></category>
		<category><![CDATA[Accenture interview questions and answers]]></category>
		<category><![CDATA[active optical network]]></category>
		<category><![CDATA[adva optical networking]]></category>
		<category><![CDATA[adva optical networking se]]></category>
		<category><![CDATA[Allstate Solutions Pvt Ltd interview questions and answers]]></category>
		<category><![CDATA[Applied Mate interview questions and answers]]></category>
		<category><![CDATA[Atos interview questions and answers]]></category>
		<category><![CDATA[Bharti Airtel interview questions and answers]]></category>
		<category><![CDATA[Capgemini interview questions and answers]]></category>
		<category><![CDATA[CASTING NETWORKS INDIA PVT LIMITED interview questions and answers]]></category>
		<category><![CDATA[Ciena Corporation interview questions and answers]]></category>
		<category><![CDATA[CSS Corp Pvt Ltd interview questions and answers]]></category>
		<category><![CDATA[Dell International Services India Pvt Ltd interview questions and answers]]></category>
		<category><![CDATA[Flipkart interview questions and answers]]></category>
		<category><![CDATA[gigabit passive optical network]]></category>
		<category><![CDATA[HCL Technologies interview questions and answers]]></category>
		<category><![CDATA[IBM interview questions and answers]]></category>
		<category><![CDATA[Indecomm Global Services interview questions and answers]]></category>
		<category><![CDATA[Infosys Technologies interview questions and answers]]></category>
		<category><![CDATA[Mavenir interview questions and answers]]></category>
		<category><![CDATA[Mphasis interview questions and answers]]></category>
		<category><![CDATA[NCR Corporation interview questions and answers]]></category>
		<category><![CDATA[NetApp interview questions and answers]]></category>
		<category><![CDATA[optical network]]></category>
		<category><![CDATA[optical network router]]></category>
		<category><![CDATA[optical network switch]]></category>
		<category><![CDATA[optical network terminal]]></category>
		<category><![CDATA[optical network terminal ont]]></category>
		<category><![CDATA[optical network termination]]></category>
		<category><![CDATA[optical network unit]]></category>
		<category><![CDATA[optical network unit onu]]></category>
		<category><![CDATA[optical networks]]></category>
		<category><![CDATA[Oracle Corporation interview questions and answers]]></category>
		<category><![CDATA[passive optical network]]></category>
		<category><![CDATA[PeopleStrong interview questions and answers]]></category>
		<category><![CDATA[pon passive optical network]]></category>
		<category><![CDATA[R Systems interview questions and answers]]></category>
		<category><![CDATA[RBS India Development Centre Pvt Ltd interview questions and answers]]></category>
		<category><![CDATA[Reliance Industries Ltd interview questions and answers]]></category>
		<category><![CDATA[SAP Labs India Pvt Ltd interview questions and answers]]></category>
		<category><![CDATA[synchronous optical network]]></category>
		<category><![CDATA[Tata Communications interview questions and answers]]></category>
		<category><![CDATA[Tech Mahindra interview questions and answers]]></category>
		<category><![CDATA[UnitedHealth Group interview questions and answers]]></category>
		<category><![CDATA[Virtela interview questions and answers]]></category>
		<category><![CDATA[wdm optical networks]]></category>
		<category><![CDATA[what is optical network]]></category>
		<category><![CDATA[what is optical network terminal]]></category>
		<guid isPermaLink="false">https://www.wikitechy.com/interview-questions/?p=789</guid>

					<description><![CDATA[Answer : An optical network is a type of data communication network...]]></description>
										<content:encoded><![CDATA[<div class="TextHeading">
<div class="hddn">
<h2 id="what-is-optical-network" class="color-pink" style="text-align: justify;">What is Optical Network ?</h2>
</div>
</div>
<div class="Content" style="text-align: justify;">
<div class="hddn">
<ul>
<li>An optical network is a type of data communication network built with optical fiber technology.</li>
<li>It utilizes optical fiber cables as the primary communication medium for converting data and passing data as light pulses between sender and receiver nodes.</li>
<li>An optical network is also known as an optical fiber network, fiber optic network or photonic network.</li>
</ul>
</div>
</div>
<div class="ImageContent" style="text-align: justify;">
<div class="hddn"><img decoding="async" class="img-responsive center-block aligncenter" src="https://cdn.wikitechy.com/interview-questions/networking/what-is-optical-network.png" alt="What is Optical Network" width="600px" /></div>
</div>
<div class="Content" style="text-align: justify;">
<div class="hddn">
<ul>
<li>There are various types of optical networking</li>
</ul>
<p><img loading="lazy" decoding="async" class="alignnone size-full wp-image-4308" src="https://www.wikitechy.com/interview-questions/wp-content/uploads/2021/07/types-of-optical-network.png" alt="" width="1138" height="543" srcset="https://www.wikitechy.com/interview-questions/wp-content/uploads/2021/07/types-of-optical-network.png 1138w, https://www.wikitechy.com/interview-questions/wp-content/uploads/2021/07/types-of-optical-network-300x143.png 300w, https://www.wikitechy.com/interview-questions/wp-content/uploads/2021/07/types-of-optical-network-1024x489.png 1024w, https://www.wikitechy.com/interview-questions/wp-content/uploads/2021/07/types-of-optical-network-768x366.png 768w, https://www.wikitechy.com/interview-questions/wp-content/uploads/2021/07/types-of-optical-network-390x186.png 390w, https://www.wikitechy.com/interview-questions/wp-content/uploads/2021/07/types-of-optical-network-820x391.png 820w" sizes="(max-width: 1138px) 100vw, 1138px" /></p>
<ul>
<li style="list-style-type: none;">
<ul>
<li>Passive Optical Network</li>
<li>Active Optical Network</li>
<li>Synchronous Optical Network</li>
<li>Star networking</li>
</ul>
</li>
</ul>
</div>
</div>
<div class="TextHeading" style="text-align: justify;">
<div class="hddn">
<h2 id="passive-optical-network" class="color-purple">Passive Optical Network</h2>
</div>
</div>
<div class="Content" style="text-align: justify;">
<div class="hddn">
<ul>
<li>This type of optical networking in which only single stand of fiber optics can take part and build a connection between the multiple computer networking clients from different areas is called as the passive optical networking.</li>
<li>But some times customers complained that it can lower the rate of internet connection.</li>
</ul>
</div>
</div>
<div class="ImageContent" style="text-align: justify;">
<div class="hddn"><img decoding="async" class="img-responsive center-block aligncenter" src="https://cdn.wikitechy.com/interview-questions/networking/passive-optical-network.png" alt="Passive Optical Network" /></div>
</div>
<div class="TextHeading" style="text-align: justify;">
<div class="hddn">
<h2 id="active-optical-network" class="color-purple">Active Optical Network</h2>
</div>
</div>
<div class="Content" style="text-align: justify;">
<div class="hddn">
<ul>
<li>Active optical network relies on electrically powered network equipment to distribute the signal, such as a switch or router.</li>
<li>Usually, the data need optical-electrical-optical transformation in the Active optical network.</li>
<li>Each signal leaving the central office is directed only to the customer for whom it is intended.</li>
</ul>
</div>
</div>
<div class="ImageContent" style="text-align: justify;">
<div class="hddn"><img decoding="async" class="img-responsive center-block aligncenter" src="https://cdn.wikitechy.com/interview-questions/networking/active-optical-network.png" alt="Active Optical Network" /></div>
</div>
<div class="TextHeading" style="text-align: justify;">
<div class="hddn">
<h2 id="synchronous-optical-network" class="color-purple">Synchronous Optical Network</h2>
</div>
</div>
<div class="Content" style="text-align: justify;">
<div class="hddn">
<ul>
<li>This type of optical networking that deals with the data transmission is the synchronous optical networking.</li>
<li>In this case optical networks can screen that all the data related to the information can pass easily from one place to another.</li>
<li>It is more effective then the physical networking. It also observes the type of data; the type of data should be of one form and can be relayed properly.</li>
</ul>
</div>
</div>
<div class="TextHeading" style="text-align: justify;">
<div class="hddn">
<h2 id="star-networking" class="color-purple">Star networking</h2>
</div>
</div>
<div class="Content" style="text-align: justify;">
<div class="hddn">
<ul>
<li>Networking carried out with the help of star networks is called as the star networking.</li>
<li>Star networks deals with connection between the main computer systems to the other multiple computers over the network.</li>
<li>They are also able to enhance the performance of the connection’s an the network.</li>
</ul>
</div>
</div>
<div class="ImageContent" style="text-align: justify;">
<div class="hddn"><img decoding="async" class="img-responsive center-block aligncenter" src="https://cdn.wikitechy.com/interview-questions/networking/star-networking.png" alt="Star Networking" /></div>
</div>
<div class="TextHeading" style="text-align: justify;">
<div class="hddn">
<h2 id="how-it-works" class="color-purple">How it Works ?</h2>
</div>
</div>
<div class="Content" style="text-align: justify;">
<div class="hddn">
<ul>
<li>The optical <a href="https://www.wikitechy.com/interview-questions/networking/what-is-ip/">networking</a> depends upon the different components used in the optical networks such as the fiber optical cables.</li>
<li>In optical networking with the help of fiber optics user scan deliver the date between two points at higher speed with similar to that of the light.</li>
<li>Core is the main source of transmission in the optical networking. These cores are packed in a special type of layer which maintains the light signals in it. This wrapping also prevents the light to move outward from the cores of fiber optics.</li>
<li>This step really prevents the data losing during transmission. According to this optical networks works on large distances and facilitate the users at long areas.</li>
</ul>
</div>
</div>
<div class="TextHeading" style="text-align: justify;">
<div class="hddn">
<h2 id="why-use-optical-networking" class="color-purple">Why use Optical Networking</h2>
</div>
</div>
<div class="Content">
<div class="hddn">
<ul>
<li style="text-align: justify;">Optical networks have three important attributes:
<ul>
<li>speed,</li>
<li>range,</li>
<li>capacity.</li>
</ul>
</li>
<li style="text-align: justify;">Optical networking reduces latency between endpoints on the network. Where an electric current moves data at about 10% of the speed of light around 18,600 miles per second or 30,000 kilometers per second optical signals in fiber optic cable travel 10 times faster, at the speed of light 186,000 miles per second or 300,000 kilometers per second.</li>
<li style="text-align: justify;">Optical networks can also move more data across a cable at longer distances: Using electronics and copper, speeds top out at around 100 Gbps over short distances.</li>
<li style="text-align: justify;"><a href="https://www.wikitechy.com/mesothelioma/asbestos-fibers" target="_blank" rel="noopener">Fiber</a> can move data at 100 Gbps over a single data channel and across multi-kilometer distances and even further with amplification.</li>
<li style="text-align: justify;">Even greater speeds can be obtained by dividing a single optical cable into multiple data channels.</li>
</ul>
</div>
</div>
]]></content:encoded>
					
					<wfw:commentRss>https://www.wikitechy.com/interview-questions/networking/what-is-optical-network/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>What is Authorization ?</title>
		<link>https://www.wikitechy.com/interview-questions/networking/what-is-authorization/</link>
					<comments>https://www.wikitechy.com/interview-questions/networking/what-is-authorization/#respond</comments>
		
		<dc:creator><![CDATA[Editor]]></dc:creator>
		<pubDate>Sat, 17 Jul 2021 20:15:35 +0000</pubDate>
				<category><![CDATA[Networking]]></category>
		<category><![CDATA[Accenture interview questions and answers]]></category>
		<category><![CDATA[Allstate Solutions Pvt Ltd interview questions and answers]]></category>
		<category><![CDATA[Applied Mate interview questions and answers]]></category>
		<category><![CDATA[Atos interview questions and answers]]></category>
		<category><![CDATA[authentication and authorization]]></category>
		<category><![CDATA[authentication authorization]]></category>
		<category><![CDATA[authentication vs authorization]]></category>
		<category><![CDATA[authorised]]></category>
		<category><![CDATA[authority definition]]></category>
		<category><![CDATA[authorization]]></category>
		<category><![CDATA[authorization bearer]]></category>
		<category><![CDATA[authorization code]]></category>
		<category><![CDATA[authorization header]]></category>
		<category><![CDATA[authorized meaning]]></category>
		<category><![CDATA[authorized user]]></category>
		<category><![CDATA[Bharti Airtel interview questions and answers]]></category>
		<category><![CDATA[Capgemini interview questions and answers]]></category>
		<category><![CDATA[CASTING NETWORKS INDIA PVT LIMITED interview questions and answers]]></category>
		<category><![CDATA[Ciena Corporation interview questions and answers]]></category>
		<category><![CDATA[CSS Corp Pvt Ltd interview questions and answers]]></category>
		<category><![CDATA[define authorization]]></category>
		<category><![CDATA[Dell International Services India Pvt Ltd interview questions and answers]]></category>
		<category><![CDATA[difference between authentication and authorization]]></category>
		<category><![CDATA[ecare technology labs interview questions and answers]]></category>
		<category><![CDATA[Flipkart interview questions and answers]]></category>
		<category><![CDATA[HCL Technologies interview questions and answers]]></category>
		<category><![CDATA[how to authorize a computer on itunes]]></category>
		<category><![CDATA[http authorization header]]></category>
		<category><![CDATA[IBM interview questions and answers]]></category>
		<category><![CDATA[Indecomm Global Services interview questions and answers]]></category>
		<category><![CDATA[Infosys Technologies interview questions and answers]]></category>
		<category><![CDATA[Mavenir interview questions and answers]]></category>
		<category><![CDATA[Mphasis interview questions and answers]]></category>
		<category><![CDATA[NCR Corporation interview questions and answers]]></category>
		<category><![CDATA[NetApp interview questions and answers]]></category>
		<category><![CDATA[Oracle Corporation interview questions and answers]]></category>
		<category><![CDATA[PeopleStrong interview questions and answers]]></category>
		<category><![CDATA[pre authorization]]></category>
		<category><![CDATA[prior authorization]]></category>
		<category><![CDATA[R Systems interview questions and answers]]></category>
		<category><![CDATA[RBS India Development Centre Pvt Ltd interview questions and answers]]></category>
		<category><![CDATA[Reliance Industries Ltd interview questions and answers]]></category>
		<category><![CDATA[SAP Labs India Pvt Ltd interview questions and answers]]></category>
		<category><![CDATA[spell authority]]></category>
		<category><![CDATA[Tata Communications interview questions and answers]]></category>
		<category><![CDATA[Tech Mahindra interview questions and answers]]></category>
		<category><![CDATA[UnitedHealth Group interview questions and answers]]></category>
		<category><![CDATA[Virtela interview questions and answers]]></category>
		<category><![CDATA[what does authority mean]]></category>
		<category><![CDATA[what is authority]]></category>
		<category><![CDATA[what is prior authorization]]></category>
		<guid isPermaLink="false">https://www.wikitechy.com/interview-questions/?p=788</guid>

					<description><![CDATA[Answer : Authorization is a security mechanism to determine...]]></description>
										<content:encoded><![CDATA[<div class="TextHeading">
<div class="hddn">
<h2 id="what-is-authorization" class="color-pink" style="text-align: justify;">What is Authorization ?</h2>
<p><img loading="lazy" decoding="async" class="alignnone size-full wp-image-4310 aligncenter" src="https://www.wikitechy.com/interview-questions/wp-content/uploads/2021/07/authorization.png" alt="" width="935" height="499" srcset="https://www.wikitechy.com/interview-questions/wp-content/uploads/2021/07/authorization.png 935w, https://www.wikitechy.com/interview-questions/wp-content/uploads/2021/07/authorization-300x160.png 300w, https://www.wikitechy.com/interview-questions/wp-content/uploads/2021/07/authorization-768x410.png 768w, https://www.wikitechy.com/interview-questions/wp-content/uploads/2021/07/authorization-390x208.png 390w, https://www.wikitechy.com/interview-questions/wp-content/uploads/2021/07/authorization-820x438.png 820w" sizes="(max-width: 935px) 100vw, 935px" /></p>
</div>
</div>
<div class="Content" style="text-align: justify;">
<div class="hddn">
<ul>
<li><a href="https://www.wikitechy.com/tutorials/oauth/what-is-oauth" target="_blank" rel="noopener">Authorization</a> is a security mechanism to determine access levels or user/client privileges related to system resources.</li>
<li>Including files, services, computer programs, data and application features.</li>
<li>This is the process of granting or denying access to a network resource which allows the user access to various resources based on the user&#8217;s identity.</li>
<li>There are two types of authorization
<ul>
<li>Server-side Authorization</li>
<li><a href="https://www.wikitechy.com/tutorials/oauth/oauth-client-credentials" target="_blank" rel="noopener">Client-side Authorization</a></li>
</ul>
</li>
</ul>
</div>
</div>
<div class="ImageContent" style="text-align: justify;">
<div class="hddn"><img decoding="async" class="img-responsive center-block aligncenter" src="https://cdn.wikitechy.com/interview-questions/networking/what-is-authorization.jpg" alt="What is Authorization" /></div>
</div>
<div class="TextHeading" style="text-align: justify;">
<div class="hddn">
<h2 id="server-side-authorization" class="color-purple">Server-side Authorization</h2>
</div>
</div>
<div class="Content" style="text-align: justify;">
<div class="hddn">
<ul>
<li>The server has three authorization modes. Depending on the authorization mode we choose, the server will decide if it accepts or declines an incoming invocation.</li>
</ul>
<p><img loading="lazy" decoding="async" class="alignnone size-full wp-image-4311 aligncenter" src="https://www.wikitechy.com/interview-questions/wp-content/uploads/2021/07/authorization-example.png" alt="" width="2074" height="1006" srcset="https://www.wikitechy.com/interview-questions/wp-content/uploads/2021/07/authorization-example.png 2074w, https://www.wikitechy.com/interview-questions/wp-content/uploads/2021/07/authorization-example-300x146.png 300w, https://www.wikitechy.com/interview-questions/wp-content/uploads/2021/07/authorization-example-1024x497.png 1024w, https://www.wikitechy.com/interview-questions/wp-content/uploads/2021/07/authorization-example-768x373.png 768w, https://www.wikitechy.com/interview-questions/wp-content/uploads/2021/07/authorization-example-1536x745.png 1536w, https://www.wikitechy.com/interview-questions/wp-content/uploads/2021/07/authorization-example-2048x993.png 2048w, https://www.wikitechy.com/interview-questions/wp-content/uploads/2021/07/authorization-example-390x189.png 390w, https://www.wikitechy.com/interview-questions/wp-content/uploads/2021/07/authorization-example-820x398.png 820w, https://www.wikitechy.com/interview-questions/wp-content/uploads/2021/07/authorization-example-1180x572.png 1180w" sizes="(max-width: 2074px) 100vw, 2074px" /></p>
</div>
</div>
<div class="subheading" style="text-align: justify;">
<h2 id="none">None</h2>
</div>
<div class="Content" style="text-align: justify;">
<div class="hddn">
<ul>
<li>This is the simplest type of authorization. No authorization will be performed.</li>
</ul>
</div>
</div>
<div class="subheading" style="text-align: justify;">
<h2 id="self">Self</h2>
</div>
<div class="Content" style="text-align: justify;">
<div class="hddn">
<ul>
<li>A client will be allowed to use a grid service if the client&#8217;s identity is the same as the service&#8217;s identity.</li>
</ul>
</div>
</div>
<div class="subheading" style="text-align: justify;">
<h2 id="gridmap">Gridmap</h2>
</div>
<div class="Content" style="text-align: justify;">
<div class="hddn">
<ul>
<li>A gridmap is a list of &#8216;authorized users&#8217; akin to an ACL (Access Control List).</li>
<li>When this type of authorization is used, only the users that are listed in the service&#8217;s gridmap may invoke it.</li>
</ul>
</div>
</div>
<div class="TextHeading" style="text-align: justify;">
<div class="hddn">
<h2 id="client-side-authorization" class="color-purple">Client-side Authorization</h2>
</div>
</div>
<div class="Content" style="text-align: justify;">
<div class="hddn">
<ul>
<li>This allows the client to figure out when it will allow a grid service to be invoked.</li>
<li>This might seem like an odd type of authorization, since authorization is generally seen from the server&#8217;s perspective (&#8220;Do I allow client FOO to connect to grid service BAR?&#8221;).</li>
<li>However, in GSI, clients have every right to be picky about the services they can access.</li>
</ul>
</div>
</div>
<div class="subheading" style="text-align: justify;">
<h2 id="none-2">None</h2>
</div>
<div class="Content" style="text-align: justify;">
<div class="hddn">
<ul>
<li>No authorization will be performed.</li>
</ul>
</div>
</div>
<div class="subheading" style="text-align: justify;">
<h2 id="self-2">Self</h2>
</div>
<div class="Content" style="text-align: justify;">
<div class="hddn">
<ul>
<li>The client will authorize an invocation if the service&#8217;s identity is the same as the client.</li>
<li>If we use both client-side and server-side Self authorization, a service can be invoked if and only if its identity matches the client&#8217;s.</li>
</ul>
</div>
</div>
<div class="subheading" style="text-align: justify;">
<h2 id="host">Host</h2>
</div>
<div class="Content">
<div class="hddn">
<ul>
<li style="text-align: justify;">The client will authorize an invocation if the host returns an identity containing the hostname.</li>
<li style="text-align: justify;">This is done using host certificates.</li>
</ul>
</div>
</div>
]]></content:encoded>
					
					<wfw:commentRss>https://www.wikitechy.com/interview-questions/networking/what-is-authorization/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>What is port and port number ?</title>
		<link>https://www.wikitechy.com/interview-questions/networking/what-is-port-and-port-number/</link>
					<comments>https://www.wikitechy.com/interview-questions/networking/what-is-port-and-port-number/#respond</comments>
		
		<dc:creator><![CDATA[Editor]]></dc:creator>
		<pubDate>Sat, 17 Jul 2021 20:14:19 +0000</pubDate>
				<category><![CDATA[Networking]]></category>
		<category><![CDATA[Accenture interview questions and answers]]></category>
		<category><![CDATA[Allstate Solutions Pvt Ltd interview questions and answers]]></category>
		<category><![CDATA[Applied Mate interview questions and answers]]></category>
		<category><![CDATA[Atos interview questions and answers]]></category>
		<category><![CDATA[Bharti Airtel interview questions and answers]]></category>
		<category><![CDATA[Capgemini interview questions and answers]]></category>
		<category><![CDATA[CASTING NETWORKS INDIA PVT LIMITED interview questions and answers]]></category>
		<category><![CDATA[Ciena Corporation interview questions and answers]]></category>
		<category><![CDATA[Comodo India Interview Questions and Answers]]></category>
		<category><![CDATA[computer ports]]></category>
		<category><![CDATA[computer ports list]]></category>
		<category><![CDATA[CSS Corp Pvt Ltd interview questions and answers]]></category>
		<category><![CDATA[Dell International Services India Pvt Ltd interview questions and answers]]></category>
		<category><![CDATA[Flipkart interview questions and answers]]></category>
		<category><![CDATA[HCL Technologies interview questions and answers]]></category>
		<category><![CDATA[how to find port number in windows 7 using cmd]]></category>
		<category><![CDATA[how to find someones port with their ip]]></category>
		<category><![CDATA[how to get ip address and port number from url]]></category>
		<category><![CDATA[how to port number]]></category>
		<category><![CDATA[https port]]></category>
		<category><![CDATA[https port number]]></category>
		<category><![CDATA[IBM interview questions and answers]]></category>
		<category><![CDATA[Indecomm Global Services interview questions and answers]]></category>
		<category><![CDATA[Infosys Technologies interview questions and answers]]></category>
		<category><![CDATA[Mavenir interview questions and answers]]></category>
		<category><![CDATA[Mphasis interview questions and answers]]></category>
		<category><![CDATA[NCR Corporation interview questions and answers]]></category>
		<category><![CDATA[NetApp interview questions and answers]]></category>
		<category><![CDATA[network port]]></category>
		<category><![CDATA[Oracle Corporation interview questions and answers]]></category>
		<category><![CDATA[PeopleStrong interview questions and answers]]></category>
		<category><![CDATA[port]]></category>
		<category><![CDATA[port list]]></category>
		<category><![CDATA[port number]]></category>
		<category><![CDATA[port number classification]]></category>
		<category><![CDATA[port number list]]></category>
		<category><![CDATA[port number table]]></category>
		<category><![CDATA[R Systems interview questions and answers]]></category>
		<category><![CDATA[RBS India Development Centre Pvt Ltd interview questions and answers]]></category>
		<category><![CDATA[Reliance Industries Ltd interview questions and answers]]></category>
		<category><![CDATA[SAP Labs India Pvt Ltd interview questions and answers]]></category>
		<category><![CDATA[Tata Communications interview questions and answers]]></category>
		<category><![CDATA[tcp port]]></category>
		<category><![CDATA[Tech Mahindra interview questions and answers]]></category>
		<category><![CDATA[types of ports in networking]]></category>
		<category><![CDATA[UnitedHealth Group interview questions and answers]]></category>
		<category><![CDATA[Virtela interview questions and answers]]></category>
		<category><![CDATA[web portal]]></category>
		<category><![CDATA[well known port numbers]]></category>
		<category><![CDATA[what is my port id]]></category>
		<category><![CDATA[what is my port number]]></category>
		<category><![CDATA[what is my port number mac]]></category>
		<category><![CDATA[what is port]]></category>
		<category><![CDATA[what is port address in computer network]]></category>
		<category><![CDATA[what is port in computer]]></category>
		<category><![CDATA[what is port in computer network]]></category>
		<category><![CDATA[what is port number]]></category>
		<category><![CDATA[whats in port]]></category>
		<category><![CDATA[why do we need port numbers in networking]]></category>
		<guid isPermaLink="false">https://www.wikitechy.com/interview-questions/?p=787</guid>

					<description><![CDATA[Answer : One of the circuit connection point on a front end processor...]]></description>
										<content:encoded><![CDATA[<div class="TextHeading">
<div class="hddn">
<h2 id="what-is-port-and-port-number" class="color-pink">What is port and port number ?</h2>
<ul>
<li>One of the circuit connection point on a front end processor or local intelligence control is called port.</li>
<li>In computer networks, the term <a href="https://www.wikitechy.com/tutorials/linux/how-to-open-read-and-write-from-serial-port-in-c" target="_blank" rel="noopener">port</a> can refer either physical or virtual connection point.</li>
</ul>
<p><img loading="lazy" decoding="async" class="alignnone size-full wp-image-4313" src="https://www.wikitechy.com/interview-questions/wp-content/uploads/2021/07/ports.png" alt="" width="960" height="827" srcset="https://www.wikitechy.com/interview-questions/wp-content/uploads/2021/07/ports.png 960w, https://www.wikitechy.com/interview-questions/wp-content/uploads/2021/07/ports-300x258.png 300w, https://www.wikitechy.com/interview-questions/wp-content/uploads/2021/07/ports-768x662.png 768w, https://www.wikitechy.com/interview-questions/wp-content/uploads/2021/07/ports-390x336.png 390w, https://www.wikitechy.com/interview-questions/wp-content/uploads/2021/07/ports-820x706.png 820w" sizes="(max-width: 960px) 100vw, 960px" /></p>
</div>
</div>
<div class="TextHeading">
<div class="hddn">
<h2 id="characteristics-of-ports" class="color-green">Characteristics of Ports</h2>
</div>
</div>
<div class="Content">
<div class="hddn">
<p>A port has the following characteristics −</p>
<ul>
<li>External devices are connected to a computer using cables and ports.</li>
<li>Ports are slots on the motherboard into which a cable of external device is plugged in.</li>
<li>Examples of external devices attached via ports are the mouse, keyboard, monitor, microphone, speakers, etc.</li>
</ul>
</div>
</div>
<div class="ImageContent">
<div class="hddn"><img decoding="async" class="img-responsive center-block aligncenter" src="https://cdn.wikitechy.com/interview-questions/networking/what-is-port.jpg" alt="What is port" /></div>
</div>
<div class="TextHeading">
<div class="hddn">
<h2 id="port-number" class="color-green">Port Number</h2>
</div>
</div>
<div class="Content">
<div class="hddn">
<ul>
<li>A port number is the logical address of each application or process that uses a network or the Internet to communicate.</li>
<li>A port number uniquely identifies a network-based application on a computer.</li>
<li>Each application/program is allocated a 16-bit integer port number.</li>
<li>This number is assigned automatically by the <a href="https://www.wikitechy.com/technology/27-handy-chrome-os-commands-run-crosh/" target="_blank" rel="noopener">OS</a>, manually by the user or is set as a default for some popular applications.</li>
</ul>
</div>
</div>
<div class="ImageContent">
<div class="hddn"><img decoding="async" class="img-responsive center-block" src="https://cdn.wikitechy.com/interview-questions/networking/what-is-port-number.png" alt=" What is port number" /></div>
</div>
]]></content:encoded>
					
					<wfw:commentRss>https://www.wikitechy.com/interview-questions/networking/what-is-port-and-port-number/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>What is MAC Address and How to get mac address in my computer ?</title>
		<link>https://www.wikitechy.com/interview-questions/networking/what-is-mac-address-and-how-to-get-mac-address-in-my-computer/</link>
					<comments>https://www.wikitechy.com/interview-questions/networking/what-is-mac-address-and-how-to-get-mac-address-in-my-computer/#respond</comments>
		
		<dc:creator><![CDATA[Editor]]></dc:creator>
		<pubDate>Sat, 17 Jul 2021 20:11:35 +0000</pubDate>
				<category><![CDATA[Networking]]></category>
		<category><![CDATA[Accenture interview questions and answers]]></category>
		<category><![CDATA[Allstate Solutions Pvt Ltd interview questions and answers]]></category>
		<category><![CDATA[Applied Mate interview questions and answers]]></category>
		<category><![CDATA[Atos interview questions and answers]]></category>
		<category><![CDATA[Bharti Airtel interview questions and answers]]></category>
		<category><![CDATA[Capgemini interview questions and answers]]></category>
		<category><![CDATA[CASTING NETWORKS INDIA PVT LIMITED interview questions and answers]]></category>
		<category><![CDATA[Ciena Corporation interview questions and answers]]></category>
		<category><![CDATA[Comodo India Interview Questions and Answers]]></category>
		<category><![CDATA[CSS Corp Pvt Ltd interview questions and answers]]></category>
		<category><![CDATA[Dell International Services India Pvt Ltd interview questions and answers]]></category>
		<category><![CDATA[find device by mac address]]></category>
		<category><![CDATA[find device details from mac address]]></category>
		<category><![CDATA[find device name by mac address]]></category>
		<category><![CDATA[find mac]]></category>
		<category><![CDATA[find my iphone on mac]]></category>
		<category><![CDATA[find my mac]]></category>
		<category><![CDATA[Flipkart interview questions and answers]]></category>
		<category><![CDATA[HCL Technologies interview questions and answers]]></category>
		<category><![CDATA[how to find ip address on mac]]></category>
		<category><![CDATA[how to find mac address]]></category>
		<category><![CDATA[IBM interview questions and answers]]></category>
		<category><![CDATA[Indecomm Global Services interview questions and answers]]></category>
		<category><![CDATA[Infosys Technologies interview questions and answers]]></category>
		<category><![CDATA[ipconfig mac]]></category>
		<category><![CDATA[mac address]]></category>
		<category><![CDATA[mac address finder]]></category>
		<category><![CDATA[mac address lookup]]></category>
		<category><![CDATA[mac address search]]></category>
		<category><![CDATA[mac address to ip]]></category>
		<category><![CDATA[mac id]]></category>
		<category><![CDATA[mac identifier]]></category>
		<category><![CDATA[mac ip]]></category>
		<category><![CDATA[mac lookup]]></category>
		<category><![CDATA[Mavenir interview questions and answers]]></category>
		<category><![CDATA[Mphasis interview questions and answers]]></category>
		<category><![CDATA[my mac address]]></category>
		<category><![CDATA[NCR Corporation interview questions and answers]]></category>
		<category><![CDATA[NetApp interview questions and answers]]></category>
		<category><![CDATA[Oracle Corporation interview questions and answers]]></category>
		<category><![CDATA[PeopleStrong interview questions and answers]]></category>
		<category><![CDATA[R Systems interview questions and answers]]></category>
		<category><![CDATA[RBS India Development Centre Pvt Ltd interview questions and answers]]></category>
		<category><![CDATA[Reliance Industries Ltd interview questions and answers]]></category>
		<category><![CDATA[SAP Labs India Pvt Ltd interview questions and answers]]></category>
		<category><![CDATA[Tata Communications interview questions and answers]]></category>
		<category><![CDATA[Tech Mahindra interview questions and answers]]></category>
		<category><![CDATA[UnitedHealth Group interview questions and answers]]></category>
		<category><![CDATA[Virtela interview questions and answers]]></category>
		<category><![CDATA[what is mac address]]></category>
		<category><![CDATA[wifi mac address]]></category>
		<guid isPermaLink="false">https://www.wikitechy.com/interview-questions/?p=786</guid>

					<description><![CDATA[Answer : A Media Access Control (MAC) address is a 48-bit address stored...]]></description>
										<content:encoded><![CDATA[<div class="TextHeading">
<div class="hddn">
<h2 id="what-is-protocol" class="color-pink" style="text-align: justify;">What is Protocol ?</h2>
</div>
</div>
<div class="Content" style="text-align: justify;">
<div class="hddn">
<ul>
<li><a href="https://www.wikitechy.com/final-year-project/dotnet/server-hacking/what-is-protocol" target="_blank" rel="noopener">Protocol</a> is a <b>special set of rules</b> for communication data.</li>
<li>Network protocol = Rules and conventions/conditions for communication between network devices.</li>
<li><b>Network protocols</b> defines the mechanism of devices to identify and establish the connections between each other + formatting rules that specify how data is packaged into messages sent and received.</li>
</ul>
</div>
</div>
<div class="ImageContent" style="text-align: justify;">
<div class="hddn"><img decoding="async" class="img-responsive center-block aligncenter" src="https://cdn.wikitechy.com/tutorials/ethical-hacking/mac-address-lookup.png" alt=" MAC Address Lookup" /></div>
</div>
<div class="TextHeading" style="text-align: justify;">
<div class="hddn">
<h2 id="what-is-mac-address" class="color-purple">What is MAC Address ?</h2>
<p><img loading="lazy" decoding="async" class="alignnone size-full wp-image-4315 aligncenter" src="https://www.wikitechy.com/interview-questions/wp-content/uploads/2021/07/mac.png" alt="" width="790" height="502" srcset="https://www.wikitechy.com/interview-questions/wp-content/uploads/2021/07/mac.png 790w, https://www.wikitechy.com/interview-questions/wp-content/uploads/2021/07/mac-300x191.png 300w, https://www.wikitechy.com/interview-questions/wp-content/uploads/2021/07/mac-768x488.png 768w, https://www.wikitechy.com/interview-questions/wp-content/uploads/2021/07/mac-390x248.png 390w" sizes="(max-width: 790px) 100vw, 790px" /></p>
</div>
</div>
<div class="Content" style="text-align: justify;">
<div class="hddn">
<ul>
<li>A <b>Media Access Control (MAC) address is a 48-bit address</b> stored in the network Interface card.</li>
<li>It is used for <b>communication between two hosts</b> in an Ethernet environment.</li>
<li>It is nothing but a hardware /physical address of a computer.</li>
<li>A MAC address is supposed to be globally unique and this will not be duplicated.</li>
<li>The 48 bit contains &#8211; First 24 bits ( <b>User ID -&gt; Card Buyer ID</b> ) + second 24 bits (<b>card manufacturer</b>)</li>
<li>The address is written in the form of <b>12</b> hexadecimal digits. For example, consider the following MAC address:
<ul>
<li><b>D8-D3-85-EB-12-E3</b></li>
</ul>
</li>
</ul>
</div>
</div>
<div class="ImageContent" style="text-align: justify;">
<div class="hddn"><img decoding="async" class="img-responsive center-block aligncenter" src="https://cdn.wikitechy.com/tutorials/ethical-hacking/mac-address-search.png" alt=" MAC Address Search" /></div>
</div>
<div class="Content" style="text-align: justify;">
<div class="hddn">
<ul>
<li>Every hexadecimal character represents 4 bits, so the first six hexadecimal characters represent the vendor (in this case, Hewlett Packard).</li>
</ul>
</div>
</div>
<div class="TextHeading" style="text-align: justify;">
<div class="hddn">
<h2 id="levels-of-addressing" class="color-red">Levels Of Addressing</h2>
</div>
</div>
<div class="Content" style="text-align: justify;">
<div class="hddn">
<ul>
<li><a href="https://www.wikitechy.com/interview-questions/networking/what-is-an-addressing-scheme/" target="_blank" rel="noopener">Four levels of addresses</a> are used in an internet employing the <b>TCP/IP protocols</b>:
<ul>
<li>Physical Addresses</li>
<li>Logical Addresses</li>
<li>Port Addresses</li>
<li>Specific Addresses</li>
</ul>
</li>
</ul>
</div>
</div>
<div class="TextHeading" style="text-align: justify;">
<div class="hddn">
<h2 id="to-get-mac-address" class="color-green">To get MAC address</h2>
</div>
</div>
<div class="TextHeading" style="text-align: justify;">
<div class="hddn">
<h2 id="option-1" class="color-pink">Option 1 :</h2>
</div>
</div>
<div class="Content" style="text-align: justify;">
<div class="hddn">
<ul>
<li>Click the <b>Network Icon</b> on Taskbar</li>
<li>Click the connected network and <b>click the properties</b> which are shown in the figure</li>
</ul>
</div>
</div>
<div class="ImageContent" style="text-align: justify;">
<div class="hddn"><img decoding="async" class="img-responsive center-block aligncenter" src="https://cdn.wikitechy.com/tutorials/ethical-hacking/find-my-mac.png" alt=" Find my MAC" /></div>
</div>
<div class="Content" style="text-align: justify;">
<div class="hddn">
<ul>
<li>The network setting window open and shows the mac address.</li>
</ul>
</div>
</div>
<div class="ImageContent" style="text-align: justify;">
<div class="hddn"><img decoding="async" class="img-responsive center-block aligncenter" src="https://cdn.wikitechy.com/tutorials/ethical-hacking/mac-address-finder.png" alt=" MAC Address Finder" /></div>
</div>
<div class="TextHeading" style="text-align: justify;">
<div class="hddn">
<h2 id="option-2" class="color-pink">Option 2 :</h2>
</div>
</div>
<div class="Content" style="text-align: justify;">
<div class="hddn">
<ul>
<li>Open command prompt and type <code>getmac</code> to get the mac address</li>
</ul>
</div>
</div>
<div class="ImageContent" style="text-align: justify;">
<div class="hddn"><img decoding="async" class="img-responsive center-block aligncenter" src="https://cdn.wikitechy.com/tutorials/ethical-hacking/my-mac-address.png" alt=" My MAC Address" /></div>
</div>
<div class="TextHeading" style="text-align: justify;">
<div class="hddn">
<h2 id="option-3" class="color-pink">Option 3 :</h2>
</div>
</div>
<div class="Content" style="text-align: justify;">
<div class="hddn">
<ul>
<li>Navigate to <b>Control Panel &gt; Network and Internet &gt; Network Connections</b></li>
<li>Right click the connection and <b>click status</b> within the dropdown</li>
</ul>
</div>
</div>
<div class="ImageContent" style="text-align: justify;">
<div class="hddn"><img decoding="async" class="img-responsive center-block aligncenter" src="https://cdn.wikitechy.com/tutorials/ethical-hacking/how-to-find-mac-address.png" alt=" How to find MAC Address" /></div>
</div>
<div class="Content" style="text-align: justify;">
<div class="hddn">
<ul>
<li>Click <b>Details</b> buttons in the status window</li>
<li>Then the Network Details windows open and shows the MAC address(Physical address)</li>
</ul>
</div>
</div>
<div class="ImageContent" style="text-align: justify;">
<div class="hddn"><img decoding="async" class="img-responsive center-block aligncenter" src="https://cdn.wikitechy.com/tutorials/ethical-hacking/mac-identifier.png" alt=" MAC Identifier" /></div>
</div>
<div class="TextHeading" style="text-align: justify;">
<div class="hddn">
<h2 id="option-4" class="color-pink">Option 4 :</h2>
</div>
</div>
<div class="Content" style="text-align: justify;">
<div class="hddn">
<ul>
<li>Open command prompt and type <a href="https://www.wikitechy.com/technology/use-ipconfig-windows-command-line-utility/" target="_blank" rel="noopener">ipconfig /all</a> (have a gap between g and /).</li>
</ul>
</div>
</div>
<div class="ImageContent">
<div class="hddn"><img decoding="async" class="img-responsive center-block aligncenter" src="https://cdn.wikitechy.com/tutorials/ethical-hacking/ipconfig-mac.png" alt=" ipconfig MAC" /></div>
</div>
]]></content:encoded>
					
					<wfw:commentRss>https://www.wikitechy.com/interview-questions/networking/what-is-mac-address-and-how-to-get-mac-address-in-my-computer/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>What is Spoofing ?</title>
		<link>https://www.wikitechy.com/interview-questions/networking/what-is-spoofing/</link>
					<comments>https://www.wikitechy.com/interview-questions/networking/what-is-spoofing/#respond</comments>
		
		<dc:creator><![CDATA[Editor]]></dc:creator>
		<pubDate>Sat, 17 Jul 2021 20:10:24 +0000</pubDate>
				<category><![CDATA[Networking]]></category>
		<category><![CDATA[Accenture interview questions and answers]]></category>
		<category><![CDATA[account spoofing]]></category>
		<category><![CDATA[Allstate Solutions Pvt Ltd interview questions and answers]]></category>
		<category><![CDATA[Applied Mate interview questions and answers]]></category>
		<category><![CDATA[Atos interview questions and answers]]></category>
		<category><![CDATA[Bharti Airtel interview questions and answers]]></category>
		<category><![CDATA[Capgemini interview questions and answers]]></category>
		<category><![CDATA[CASTING NETWORKS INDIA PVT LIMITED interview questions and answers]]></category>
		<category><![CDATA[Ciena Corporation interview questions and answers]]></category>
		<category><![CDATA[Comodo India Interview Questions and Answers]]></category>
		<category><![CDATA[CSS Corp Pvt Ltd interview questions and answers]]></category>
		<category><![CDATA[Dell International Services India Pvt Ltd interview questions and answers]]></category>
		<category><![CDATA[differentiate between spoofing]]></category>
		<category><![CDATA[dns spoofing]]></category>
		<category><![CDATA[email spoofing]]></category>
		<category><![CDATA[email spoofing tool]]></category>
		<category><![CDATA[Flipkart interview questions and answers]]></category>
		<category><![CDATA[gps spoof]]></category>
		<category><![CDATA[HCL Technologies interview questions and answers]]></category>
		<category><![CDATA[how to detect ip spoofing]]></category>
		<category><![CDATA[how to stop email spoofing]]></category>
		<category><![CDATA[IBM interview questions and answers]]></category>
		<category><![CDATA[Indecomm Global Services interview questions and answers]]></category>
		<category><![CDATA[Infosys Technologies interview questions and answers]]></category>
		<category><![CDATA[ip spoofing]]></category>
		<category><![CDATA[Mavenir interview questions and answers]]></category>
		<category><![CDATA[measuresarp spoofing]]></category>
		<category><![CDATA[Mphasis interview questions and answers]]></category>
		<category><![CDATA[NCR Corporation interview questions and answers]]></category>
		<category><![CDATA[NetApp interview questions and answers]]></category>
		<category><![CDATA[network spoofer]]></category>
		<category><![CDATA[Oracle Corporation interview questions and answers]]></category>
		<category><![CDATA[PeopleStrong interview questions and answers]]></category>
		<category><![CDATA[phishing and pharming with respect to the internetdns spoofing vs phishing]]></category>
		<category><![CDATA[phishing and spoofing attacks definition]]></category>
		<category><![CDATA[phishing and spoofing cases]]></category>
		<category><![CDATA[R Systems interview questions and answers]]></category>
		<category><![CDATA[RBS India Development Centre Pvt Ltd interview questions and answers]]></category>
		<category><![CDATA[Reliance Industries Ltd interview questions and answers]]></category>
		<category><![CDATA[SAP Labs India Pvt Ltd interview questions and answers]]></category>
		<category><![CDATA[spoof app]]></category>
		<category><![CDATA[spoof call]]></category>
		<category><![CDATA[spoof caller id]]></category>
		<category><![CDATA[spoof email address]]></category>
		<category><![CDATA[spoof meaning]]></category>
		<category><![CDATA[spoofee]]></category>
		<category><![CDATA[spoofing]]></category>
		<category><![CDATA[spoofing attack]]></category>
		<category><![CDATA[spoofing attack counter]]></category>
		<category><![CDATA[spoofing email]]></category>
		<category><![CDATA[spoofing example]]></category>
		<category><![CDATA[spoofing is an example of deception]]></category>
		<category><![CDATA[spoofing meaning]]></category>
		<category><![CDATA[spoofing meaning in networking]]></category>
		<category><![CDATA[spoofing vs phishing]]></category>
		<category><![CDATA[Tata Communications interview questions and answers]]></category>
		<category><![CDATA[Tech Mahindra interview questions and answers]]></category>
		<category><![CDATA[types of spoofing]]></category>
		<category><![CDATA[UnitedHealth Group interview questions and answers]]></category>
		<category><![CDATA[Virtela interview questions and answers]]></category>
		<category><![CDATA[what is email spoofing]]></category>
		<category><![CDATA[what is spoofing]]></category>
		<category><![CDATA[what is spoofing attack]]></category>
		<category><![CDATA[what is spoofing email]]></category>
		<category><![CDATA[what is spoofing in computer]]></category>
		<category><![CDATA[what is the difference between phishing spamming spoofing and sniffing]]></category>
		<category><![CDATA[which of the following is an example of spoofing]]></category>
		<guid isPermaLink="false">https://www.wikitechy.com/interview-questions/?p=785</guid>

					<description><![CDATA[Answer : Spoofing is that the act of disguising a communication...]]></description>
										<content:encoded><![CDATA[<div class="TextHeading">
<div class="hddn">
<h2 id="what-is-spoofing" class="color-pink" style="text-align: justify;">What is Spoofing ?</h2>
</div>
</div>
<div class="Content" style="text-align: justify;">
<div class="hddn">
<ul>
<li>Spoofing is that the act of disguising a communication from an unknown resource as being from a well-known, trusted resource.</li>
<li>Spoofing will apply to emails, <a href="https://www.wikitechy.com/technology/top-20-android-apps-used-hackers-hacking/" target="_blank" rel="noopener">phone</a> calls, and websites, or will be a lot of technical, like a pc spoofing an IP address, Address Resolution Protocol (ARP), or Domain name System (DNS) server.</li>
<li>Spoofing will be used to gain access to a target’s personal information, describe malware through infected links or attachments, bypass <a href="https://www.wikitechy.com/tutorials/javascript/how-does-access-control-allow-origin-header-work" target="_blank" rel="noopener">network access controls</a>, or distribute traffic to conduct a denial-of-service attack.</li>
<li>Spoofing is usually the means a vulgar actor gains access so as to execute a bigger cyber attack like a complicated persistent threat or a man-in-the-middle attack.</li>
<li>Successful attacks on organizations will cause infected pc systems and networks, data breaches, and/or loss of revenue-all vulnerable to have an effect on the organization’s public reputation.</li>
<li>Additionally, spoofing that ends up in the rerouting of web traffic will overwhelm networks or lead customers/clients to malicious sites aimed at stealing info or distributing malware.</li>
</ul>
</div>
</div>
<div class="ImageContent" style="text-align: justify;">
<div class="hddn"><img decoding="async" class="img-responsive center-block aligncenter" src="https://cdn.wikitechy.com/interview-questions/networking/what-is-spoofing.png" alt="What is spoofing" /></div>
</div>
<div class="text-center row" style="text-align: justify;">
<div class="col-sm-12">
<div id="bsa-zone_1590522538159-8_123456"></div>
</div>
</div>
<div class="TextHeading" style="text-align: justify;">
<div class="hddn">
<h2 id="email-spoofing" class="color-green">Email spoofing</h2>
</div>
</div>
<div class="Content" style="text-align: justify;">
<div class="hddn">
<ul>
<li>Email spoofing is that the fake of an email header so the message seems to have originated from somebody or somewhere apart from the particular source.</li>
<li>Email spoofing may be a plan of action utilized in phishing and <a href="https://www.wikitechy.com/interview-questions/networking/what-is-spam/">spam</a> campaigns because people are more likely to open an email after they assume it&#8217;s been sent by a legitimate source.</li>
<li>The goal of email spoofing is to need recipients to open, and probably even answer, a solicitation.</li>
</ul>
</div>
</div>
<div class="ImageContent" style="text-align: justify;">
<div class="hddn"><img decoding="async" class="img-responsive center-block aligncenter" src="https://cdn.wikitechy.com/interview-questions/networking/email-spoofing.png" alt="Email Spoofing" /></div>
</div>
<div class="TextHeading" style="text-align: justify;">
<div class="hddn">
<h2 id="ip-spoofing" class="color-green">IP Spoofing</h2>
<p><img loading="lazy" decoding="async" class="alignnone size-full wp-image-4317 aligncenter" src="https://www.wikitechy.com/interview-questions/wp-content/uploads/2021/07/ip-spoofing.webp" alt="" width="1456" height="663" srcset="https://www.wikitechy.com/interview-questions/wp-content/uploads/2021/07/ip-spoofing.webp 1456w, https://www.wikitechy.com/interview-questions/wp-content/uploads/2021/07/ip-spoofing-300x137.webp 300w, https://www.wikitechy.com/interview-questions/wp-content/uploads/2021/07/ip-spoofing-1024x466.webp 1024w, https://www.wikitechy.com/interview-questions/wp-content/uploads/2021/07/ip-spoofing-768x350.webp 768w, https://www.wikitechy.com/interview-questions/wp-content/uploads/2021/07/ip-spoofing-390x178.webp 390w, https://www.wikitechy.com/interview-questions/wp-content/uploads/2021/07/ip-spoofing-820x373.webp 820w, https://www.wikitechy.com/interview-questions/wp-content/uploads/2021/07/ip-spoofing-1180x537.webp 1180w" sizes="(max-width: 1456px) 100vw, 1456px" /></p>
</div>
</div>
<div class="Content" style="text-align: justify;">
<div class="hddn">
<ul>
<li><a href="https://www.wikitechy.com/tutorials/ethical-hacking/computer-hacking-tutorial/ip-spoofing" target="_blank" rel="noopener">IP (Internet Protocol)</a> forms the third layer of the ISO model. It is the network protocol which is used for the transmission of messages over the internet. Every email message sent has details in the message header of the IP address of the sender (source address). Hackers and scammers alter the header details to mask their true identity by editing the source address. The emails then look to have been transmitted by a trusted source. There are two types of IP spoofing.
<ul>
<li>Man in the Middle Attacks</li>
<li>Denial of Service (DoS) Attacks</li>
</ul>
</li>
</ul>
</div>
</div>
<div class="ImageContent" style="text-align: justify;">
<div class="hddn"><img loading="lazy" decoding="async" class="alignnone size-full wp-image-4318" src="https://www.wikitechy.com/interview-questions/wp-content/uploads/2021/07/ip.png" alt="" width="1138" height="489" srcset="https://www.wikitechy.com/interview-questions/wp-content/uploads/2021/07/ip.png 1138w, https://www.wikitechy.com/interview-questions/wp-content/uploads/2021/07/ip-300x129.png 300w, https://www.wikitechy.com/interview-questions/wp-content/uploads/2021/07/ip-1024x440.png 1024w, https://www.wikitechy.com/interview-questions/wp-content/uploads/2021/07/ip-768x330.png 768w, https://www.wikitechy.com/interview-questions/wp-content/uploads/2021/07/ip-390x168.png 390w, https://www.wikitechy.com/interview-questions/wp-content/uploads/2021/07/ip-820x352.png 820w" sizes="(max-width: 1138px) 100vw, 1138px" /></div>
</div>
<div class="TextHeading" style="text-align: justify;">
<div class="hddn">
<h2 id="caller-id-spoofing" class="color-green">Caller ID Spoofing</h2>
</div>
</div>
<div class="Content" style="text-align: justify;">
<div class="hddn">
<ul>
<li>Caller ID spoofing is when a caller with intent fakes the information transmitted to your caller ID display to disguise their identity.</li>
<li>Spoofing is often used as part of an attempt to trick someone into giving away valuable personal information so it can be used in fraudulent activity or sold illegally, but also can be used legitimately, for example, to display the toll-free number for a business.</li>
</ul>
</div>
</div>
<div class="TextHeading" style="text-align: justify;">
<div class="hddn">
<h2 id="arp-spoofing" class="color-green">ARP Spoofing</h2>
</div>
</div>
<div class="Content" style="text-align: justify;">
<div class="hddn">
<ul>
<li>ARP poison routing (APR) or ARP cache poisoning, a method of attacking an Ethernet LAN by updating the target computer&#8217;s.</li>
<li>ARP cache with both a fake ARP request and reply packets in an effort to change the Layer 2 Ethernet MAC address (i.e., the address of the network card) to one that the attacker can monitor.</li>
<li>Because the ARP replies have been fake, the target computer sends frames that were meant for the original destination to the attacker&#8217;s computer first so the frames can be read.</li>
<li>A successful APR attempt is invisible to the user.</li>
</ul>
</div>
</div>
<div class="ImageContent" style="text-align: justify;">
<div class="hddn"><img decoding="async" class="img-responsive center-block aligncenter" src="https://cdn.wikitechy.com/interview-questions/networking/arp-spoofing.png" alt="ARP Spoofing" /></div>
</div>
<div style="text-align: justify;">
<div id="bsa-zone_1590522394795-6_123456"></div>
</div>
<div class="TextHeading" style="text-align: justify;">
<div class="hddn">
<h2 id="dns-server-spoofing" class="color-green">DNS Server Spoofing</h2>
</div>
</div>
<div class="Content" style="text-align: justify;">
<div class="hddn">
<ul>
<li><a href="https://www.wikitechy.com/interview-questions/networking/what-is-dns-and-dns-port-number" target="_blank" rel="noopener">DNS</a> (Domain Name System) servers resolve URLs and email addresses to corresponding IP addresses.</li>
<li>DNS spoofing allows attackers to distract traffic to a different IP address, leading victims to sites that extent malware.</li>
</ul>
</div>
</div>
<div class="ImageContent" style="text-align: justify;">
<div class="hddn"><img decoding="async" class="img-responsive center-block aligncenter" src="https://cdn.wikitechy.com/interview-questions/networking/dns-spoofing.png" alt="DNS Spoofing" /></div>
</div>
<div class="TextHeading" style="text-align: justify;">
<div class="hddn">
<h2 id="website-spoofing" class="color-green">Website Spoofing</h2>
</div>
</div>
<div class="Content">
<div class="hddn">
<ul>
<li style="text-align: justify;">Website spoofing means when a website is designed to copycat an existing site known and/or trusted by the user.</li>
<li style="text-align: justify;">Attackers use these sites to gain login and other personal information from users.</li>
</ul>
</div>
</div>
]]></content:encoded>
					
					<wfw:commentRss>https://www.wikitechy.com/interview-questions/networking/what-is-spoofing/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>What is IP ?</title>
		<link>https://www.wikitechy.com/interview-questions/networking/what-is-ip/</link>
					<comments>https://www.wikitechy.com/interview-questions/networking/what-is-ip/#respond</comments>
		
		<dc:creator><![CDATA[Editor]]></dc:creator>
		<pubDate>Sat, 17 Jul 2021 20:05:57 +0000</pubDate>
				<category><![CDATA[Networking]]></category>
		<category><![CDATA[4 addresswhat can you learn from an ip address]]></category>
		<category><![CDATA[Accenture interview questions and answers]]></category>
		<category><![CDATA[advanced ip scanner]]></category>
		<category><![CDATA[Allstate Solutions Pvt Ltd interview questions and answers]]></category>
		<category><![CDATA[Applied Mate interview questions and answers]]></category>
		<category><![CDATA[Atos interview questions and answers]]></category>
		<category><![CDATA[Bharti Airtel interview questions and answers]]></category>
		<category><![CDATA[Capgemini interview questions and answers]]></category>
		<category><![CDATA[CASTING NETWORKS INDIA PVT LIMITED interview questions and answers]]></category>
		<category><![CDATA[check ip]]></category>
		<category><![CDATA[Ciena Corporation interview questions and answers]]></category>
		<category><![CDATA[Comodo India Interview Questions and Answers]]></category>
		<category><![CDATA[CSS Corp Pvt Ltd interview questions and answers]]></category>
		<category><![CDATA[Dell International Services India Pvt Ltd interview questions and answers]]></category>
		<category><![CDATA[Flipkart interview questions and answers]]></category>
		<category><![CDATA[HCL Technologies interview questions and answers]]></category>
		<category><![CDATA[how to change ip address]]></category>
		<category><![CDATA[how to find someone using their ip address]]></category>
		<category><![CDATA[IBM interview questions and answers]]></category>
		<category><![CDATA[if someone has my ip address what can they doidentify ip address owner]]></category>
		<category><![CDATA[Indecomm Global Services interview questions and answers]]></category>
		<category><![CDATA[Infosys Technologies interview questions and answers]]></category>
		<category><![CDATA[ip address]]></category>
		<category><![CDATA[ip address classes]]></category>
		<category><![CDATA[ip address example]]></category>
		<category><![CDATA[ip address format]]></category>
		<category><![CDATA[ip address location]]></category>
		<category><![CDATA[ip address lookup]]></category>
		<category><![CDATA[ip address tracker]]></category>
		<category><![CDATA[ip adress]]></category>
		<category><![CDATA[ip location]]></category>
		<category><![CDATA[ip lookup]]></category>
		<category><![CDATA[ip tracker]]></category>
		<category><![CDATA[Mavenir interview questions and answers]]></category>
		<category><![CDATA[mi ip]]></category>
		<category><![CDATA[Mphasis interview questions and answers]]></category>
		<category><![CDATA[my ip address location]]></category>
		<category><![CDATA[my ip location]]></category>
		<category><![CDATA[NCR Corporation interview questions and answers]]></category>
		<category><![CDATA[NetApp interview questions and answers]]></category>
		<category><![CDATA[Oracle Corporation interview questions and answers]]></category>
		<category><![CDATA[PeopleStrong interview questions and answers]]></category>
		<category><![CDATA[public ip address range]]></category>
		<category><![CDATA[R Systems interview questions and answers]]></category>
		<category><![CDATA[RBS India Development Centre Pvt Ltd interview questions and answers]]></category>
		<category><![CDATA[Reliance Industries Ltd interview questions and answers]]></category>
		<category><![CDATA[SAP Labs India Pvt Ltd interview questions and answers]]></category>
		<category><![CDATA[Tata Communications interview questions and answers]]></category>
		<category><![CDATA[Tech Mahindra interview questions and answers]]></category>
		<category><![CDATA[track ip address exact location]]></category>
		<category><![CDATA[types of ip address]]></category>
		<category><![CDATA[UnitedHealth Group interview questions and answers]]></category>
		<category><![CDATA[Virtela interview questions and answers]]></category>
		<category><![CDATA[what does an ip address tell you]]></category>
		<category><![CDATA[what is ip]]></category>
		<category><![CDATA[what is ip address]]></category>
		<category><![CDATA[what is ipv4 address]]></category>
		<category><![CDATA[what is my ipv]]></category>
		<category><![CDATA[what is my local ip address]]></category>
		<category><![CDATA[who is ip]]></category>
		<category><![CDATA[whois ip]]></category>
		<guid isPermaLink="false">https://www.wikitechy.com/interview-questions/?p=784</guid>

					<description><![CDATA[Answer : IP stands for Internet Protocol which is the communications protocol...]]></description>
										<content:encoded><![CDATA[<div class="TextHeading">
<div class="hddn">
<h2 id="what-is-ip" class="color-pink">What is IP ?</h2>
<p><img loading="lazy" decoding="async" class="alignnone size-full wp-image-4320 aligncenter" src="https://www.wikitechy.com/interview-questions/wp-content/uploads/2021/07/ip-addressing.png" alt="" width="1411" height="674" srcset="https://www.wikitechy.com/interview-questions/wp-content/uploads/2021/07/ip-addressing.png 1411w, https://www.wikitechy.com/interview-questions/wp-content/uploads/2021/07/ip-addressing-300x143.png 300w, https://www.wikitechy.com/interview-questions/wp-content/uploads/2021/07/ip-addressing-1024x489.png 1024w, https://www.wikitechy.com/interview-questions/wp-content/uploads/2021/07/ip-addressing-768x367.png 768w, https://www.wikitechy.com/interview-questions/wp-content/uploads/2021/07/ip-addressing-390x186.png 390w, https://www.wikitechy.com/interview-questions/wp-content/uploads/2021/07/ip-addressing-820x392.png 820w, https://www.wikitechy.com/interview-questions/wp-content/uploads/2021/07/ip-addressing-1180x564.png 1180w" sizes="(max-width: 1411px) 100vw, 1411px" /></p>
</div>
</div>
<div class="Content">
<div class="hddn">
<ul>
<li>IP stands for <a href="https://www.wikitechy.com/interview-questions/networking/what-is-the-difference-between-static-and-dynamic-ip/" target="_blank" rel="noopener">Internet Protocol</a> which is the communications protocol of digital message formats and rules for exchanging messages between computers across a single network or a series of interconnected networks, using the Internet Protocol Suite (often referred to as <a href="https://www.wikitechy.com/interview-questions/networking/what-is-an-addressing-scheme/" target="_blank" rel="noopener">TCP/IP</a></li>
<li>Internet Protocol is connectionless and unreliable protocol. It ensures no guarantee of successfully transmission of data.</li>
<li>Messages are exchanged as datagrams, also known as data packets or just packets.</li>
<li>IP consisting of four abstraction <a href="https://www.wikitechy.com/interview-questions/networking/what-are-the-layers-of-osi/" target="_blank" rel="noopener">layers</a> : link layer (lowest), Internet layer, transport layer and application layer (highest).</li>
</ul>
</div>
</div>
<div class="read-also"><img decoding="async" class="img-responsive center-block aligncenter" src="https://cdn.wikitechy.com/interview-questions/networking/what-is-ip.jpg" alt=" What is IP Address" /></div>
<h3 id="basics-of-ip-address-in-networking">Basics of IP Address in Networking</h3>
<div></div>
<div><img loading="lazy" decoding="async" class="alignnone size-full wp-image-4321" src="https://www.wikitechy.com/interview-questions/wp-content/uploads/2021/07/ip-address.png" alt="" width="1528" height="872" srcset="https://www.wikitechy.com/interview-questions/wp-content/uploads/2021/07/ip-address.png 1528w, https://www.wikitechy.com/interview-questions/wp-content/uploads/2021/07/ip-address-300x171.png 300w, https://www.wikitechy.com/interview-questions/wp-content/uploads/2021/07/ip-address-1024x584.png 1024w, https://www.wikitechy.com/interview-questions/wp-content/uploads/2021/07/ip-address-768x438.png 768w, https://www.wikitechy.com/interview-questions/wp-content/uploads/2021/07/ip-address-390x223.png 390w, https://www.wikitechy.com/interview-questions/wp-content/uploads/2021/07/ip-address-820x468.png 820w, https://www.wikitechy.com/interview-questions/wp-content/uploads/2021/07/ip-address-1180x673.png 1180w" sizes="(max-width: 1528px) 100vw, 1528px" /></div>
<div></div>
<h3 id="ip-address-range-table">IP Address Range Table</h3>
<p><img loading="lazy" decoding="async" class="alignnone size-full wp-image-4322" src="https://www.wikitechy.com/interview-questions/wp-content/uploads/2021/07/ip-address-range-table.png" alt="" width="1933" height="745" srcset="https://www.wikitechy.com/interview-questions/wp-content/uploads/2021/07/ip-address-range-table.png 1933w, https://www.wikitechy.com/interview-questions/wp-content/uploads/2021/07/ip-address-range-table-300x116.png 300w, https://www.wikitechy.com/interview-questions/wp-content/uploads/2021/07/ip-address-range-table-1024x395.png 1024w, https://www.wikitechy.com/interview-questions/wp-content/uploads/2021/07/ip-address-range-table-768x296.png 768w, https://www.wikitechy.com/interview-questions/wp-content/uploads/2021/07/ip-address-range-table-1536x592.png 1536w, https://www.wikitechy.com/interview-questions/wp-content/uploads/2021/07/ip-address-range-table-390x150.png 390w, https://www.wikitechy.com/interview-questions/wp-content/uploads/2021/07/ip-address-range-table-820x316.png 820w, https://www.wikitechy.com/interview-questions/wp-content/uploads/2021/07/ip-address-range-table-1180x455.png 1180w" sizes="(max-width: 1933px) 100vw, 1933px" /></p>
<div class="ImageContent"></div>
]]></content:encoded>
					
					<wfw:commentRss>https://www.wikitechy.com/interview-questions/networking/what-is-ip/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>What is DNS and DNS port number ?</title>
		<link>https://www.wikitechy.com/interview-questions/networking/what-is-dns-and-dns-port-number/</link>
					<comments>https://www.wikitechy.com/interview-questions/networking/what-is-dns-and-dns-port-number/#respond</comments>
		
		<dc:creator><![CDATA[Editor]]></dc:creator>
		<pubDate>Sat, 17 Jul 2021 20:02:50 +0000</pubDate>
				<category><![CDATA[Networking]]></category>
		<category><![CDATA[Accenture interview questions and answers]]></category>
		<category><![CDATA[Allow Both TCP and UDP Port 53 to Your DNS Servers]]></category>
		<category><![CDATA[Allstate Solutions Pvt Ltd interview questions and answers]]></category>
		<category><![CDATA[Applied Mate interview questions and answers]]></category>
		<category><![CDATA[Atos interview questions and answers]]></category>
		<category><![CDATA[Bharti Airtel interview questions and answers]]></category>
		<category><![CDATA[Capgemini interview questions and answers]]></category>
		<category><![CDATA[CASTING NETWORKS INDIA PVT LIMITED interview questions and answers]]></category>
		<category><![CDATA[Ciena Corporation interview questions and answers]]></category>
		<category><![CDATA[Comodo India Interview Questions and Answers]]></category>
		<category><![CDATA[CSS Corp Pvt Ltd interview questions and answers]]></category>
		<category><![CDATA[Dell International Services India Pvt Ltd interview questions and answers]]></category>
		<category><![CDATA[dn sport]]></category>
		<category><![CDATA[dns example]]></category>
		<category><![CDATA[dns port]]></category>
		<category><![CDATA[dns port 53]]></category>
		<category><![CDATA[dns port number]]></category>
		<category><![CDATA[dns protocol]]></category>
		<category><![CDATA[dns protocol port]]></category>
		<category><![CDATA[dns query]]></category>
		<category><![CDATA[DNS query types and how to use DNS in performance troubleshooting]]></category>
		<category><![CDATA[dns server]]></category>
		<category><![CDATA[DNS servers and firewall settings]]></category>
		<category><![CDATA[dns tcp or udp]]></category>
		<category><![CDATA[dns tcp port]]></category>
		<category><![CDATA[dns types]]></category>
		<category><![CDATA[dns udp port]]></category>
		<category><![CDATA[Domain Name System]]></category>
		<category><![CDATA[Flipkart interview questions and answers]]></category>
		<category><![CDATA[HCL Technologies interview questions and answers]]></category>
		<category><![CDATA[How DNS Query Works]]></category>
		<category><![CDATA[How do I configure my firewall for DNS]]></category>
		<category><![CDATA[http port]]></category>
		<category><![CDATA[IBM interview questions and answers]]></category>
		<category><![CDATA[Indecomm Global Services interview questions and answers]]></category>
		<category><![CDATA[Infosys Technologies interview questions and answers]]></category>
		<category><![CDATA[Mavenir interview questions and answers]]></category>
		<category><![CDATA[Mphasis interview questions and answers]]></category>
		<category><![CDATA[NCR Corporation interview questions and answers]]></category>
		<category><![CDATA[NetApp interview questions and answers]]></category>
		<category><![CDATA[Oracle Corporation interview questions and answers]]></category>
		<category><![CDATA[PeopleStrong interview questions and answers]]></category>
		<category><![CDATA[port 23]]></category>
		<category><![CDATA[port 53]]></category>
		<category><![CDATA[port 53 domain]]></category>
		<category><![CDATA[port 53 vulnerabilities]]></category>
		<category><![CDATA[port number]]></category>
		<category><![CDATA[port number table]]></category>
		<category><![CDATA[R Systems interview questions and answers]]></category>
		<category><![CDATA[RBS India Development Centre Pvt Ltd interview questions and answers]]></category>
		<category><![CDATA[Reliance Industries Ltd interview questions and answers]]></category>
		<category><![CDATA[SAP Labs India Pvt Ltd interview questions and answers]]></category>
		<category><![CDATA[Specifying Port Settings for DNS]]></category>
		<category><![CDATA[Tata Communications interview questions and answers]]></category>
		<category><![CDATA[tcp port number]]></category>
		<category><![CDATA[Tech Mahindra interview questions and answers]]></category>
		<category><![CDATA[UnitedHealth Group interview questions and answers]]></category>
		<category><![CDATA[Virtela interview questions and answers]]></category>
		<category><![CDATA[What is a DNS Query]]></category>
		<category><![CDATA[what is dns and how it works]]></category>
		<category><![CDATA[What Is DNS Server Or Protocol Port Number]]></category>
		<category><![CDATA[what is port 53 used for]]></category>
		<category><![CDATA[Why DNS Works On Both TCP and UDP]]></category>
		<guid isPermaLink="false">https://www.wikitechy.com/interview-questions/?p=783</guid>

					<description><![CDATA[Answer : The Domain Name System (DNS) is the phonebook of the Internet...]]></description>
										<content:encoded><![CDATA[<div class="TextHeading">
<div class="hddn">
<h2 id="what-is-dns-and-dns-port-number" class="color-pink">What is DNS and DNS port number ?</h2>
</div>
</div>
<div class="Content">
<div class="hddn">
<ul>
<li>The <a href="https://www.wikitechy.com/technology/power-dns-authoritative-recursor-dns-server/" target="_blank" rel="noopener">Domain Name System (DNS)</a> is the phonebook of the Internet. Humans access information online through domain names, like wikitechy.com. Web browsers interact through Internet Protocol (IP) addresses. DNS translates domain names to <a href="https://www.wikitechy.com/tutorials/linux/how-to-get-the-ip-address-of-the-machine-in-linux" target="_blank" rel="noopener">IP addresses</a> so browsers can load Internet resources.</li>
<li>Each device connected to the Internet has a unique IP address which other machines use to find the device. <a href="https://www.wikitechy.com/technology/flush-dns-cache-linux/" target="_blank" rel="noopener">DNS servers</a> eliminate the need for humans to memorize IP addresses such as 192.168.1.1 (in IPv4), or more complex newer alphanumeric IP addresses such as 2400:cb00:2048:1::c629:d7a2 (in IPv6).</li>
<li>The DNS uses TCP Port 53 for zone transfers, for maintaining coherence between the DNS database and the server.</li>
</ul>
</div>
</div>
<div class="text-center row">
<div class="col-sm-12">
<div id="bsa-zone_1590522538159-8_123456"></div>
</div>
</div>
<div class="ImageContent">
<div class="hddn"><img decoding="async" class="img-responsive center-block" src="https://cdn.wikitechy.com/interview-questions/networking/what-is-dns.png" alt=" What is DNS" /></div>
</div>
]]></content:encoded>
					
					<wfw:commentRss>https://www.wikitechy.com/interview-questions/networking/what-is-dns-and-dns-port-number/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>What is DND ?</title>
		<link>https://www.wikitechy.com/interview-questions/networking/what-is-dnd/</link>
					<comments>https://www.wikitechy.com/interview-questions/networking/what-is-dnd/#respond</comments>
		
		<dc:creator><![CDATA[Editor]]></dc:creator>
		<pubDate>Sat, 17 Jul 2021 19:39:55 +0000</pubDate>
				<category><![CDATA[Networking]]></category>
		<category><![CDATA[Accenture interview questions and answers]]></category>
		<category><![CDATA[activate dnd]]></category>
		<category><![CDATA[Allstate Solutions Pvt Ltd interview questions and answers]]></category>
		<category><![CDATA[Applied Mate interview questions and answers]]></category>
		<category><![CDATA[Atos interview questions and answers]]></category>
		<category><![CDATA[Bharti Airtel interview questions and answers]]></category>
		<category><![CDATA[Capgemini interview questions and answers]]></category>
		<category><![CDATA[CASTING NETWORKS INDIA PVT LIMITED interview questions and answers]]></category>
		<category><![CDATA[Ciena Corporation interview questions and answers]]></category>
		<category><![CDATA[Comodo India Interview Questions and Answers]]></category>
		<category><![CDATA[CSS Corp Pvt Ltd interview questions and answers]]></category>
		<category><![CDATA[Dell International Services India Pvt Ltd interview questions and answers]]></category>
		<category><![CDATA[dnd]]></category>
		<category><![CDATA[dnd activation]]></category>
		<category><![CDATA[dnd complaint]]></category>
		<category><![CDATA[dnd meaning]]></category>
		<category><![CDATA[dnd meaning phone]]></category>
		<category><![CDATA[dnd mode]]></category>
		<category><![CDATA[dnd number]]></category>
		<category><![CDATA[dnd service deactivation]]></category>
		<category><![CDATA[dnd sms format]]></category>
		<category><![CDATA[dnd statu]]></category>
		<category><![CDATA[do not]]></category>
		<category><![CDATA[do not disturb]]></category>
		<category><![CDATA[do not disturb alarm]]></category>
		<category><![CDATA[do not disturb iphone]]></category>
		<category><![CDATA[do not disturb iphone text messages]]></category>
		<category><![CDATA[do not disturb mode]]></category>
		<category><![CDATA[do not disturb number]]></category>
		<category><![CDATA[do not disturbde]]></category>
		<category><![CDATA[does do not disturb block alarms]]></category>
		<category><![CDATA[Flipkart interview questions and answers]]></category>
		<category><![CDATA[HCL Technologies interview questions and answers]]></category>
		<category><![CDATA[how to activate dnd]]></category>
		<category><![CDATA[how to deactivate dnd service]]></category>
		<category><![CDATA[IBM interview questions and answers]]></category>
		<category><![CDATA[Indecomm Global Services interview questions and answers]]></category>
		<category><![CDATA[Infosys Technologies interview questions and answers]]></category>
		<category><![CDATA[Mavenir interview questions and answers]]></category>
		<category><![CDATA[Mphasis interview questions and answers]]></category>
		<category><![CDATA[NCR Corporation interview questions and answers]]></category>
		<category><![CDATA[NetApp interview questions and answers]]></category>
		<category><![CDATA[Oracle Corporation interview questions and answers]]></category>
		<category><![CDATA[PeopleStrong interview questions and answers]]></category>
		<category><![CDATA[R Systems interview questions and answers]]></category>
		<category><![CDATA[RBS India Development Centre Pvt Ltd interview questions and answers]]></category>
		<category><![CDATA[Reliance Industries Ltd interview questions and answers]]></category>
		<category><![CDATA[SAP Labs India Pvt Ltd interview questions and answers]]></category>
		<category><![CDATA[start dnd]]></category>
		<category><![CDATA[strai dnd]]></category>
		<category><![CDATA[Tata Communications interview questions and answers]]></category>
		<category><![CDATA[Tech Mahindra interview questions and answers]]></category>
		<category><![CDATA[UnitedHealth Group interview questions and answers]]></category>
		<category><![CDATA[Virtela interview questions and answers]]></category>
		<category><![CDATA[what does do not disturb do]]></category>
		<category><![CDATA[what does do not disturb do on iphone]]></category>
		<category><![CDATA[what is dnd in mobile]]></category>
		<category><![CDATA[what is dnd mean]]></category>
		<category><![CDATA[what is dnd mode]]></category>
		<category><![CDATA[what is do not disturb]]></category>
		<guid isPermaLink="false">https://www.wikitechy.com/interview-questions/?p=781</guid>

					<description><![CDATA[Answer : DND means Do Not Disturb...]]></description>
										<content:encoded><![CDATA[<div class="TextHeading">
<div class="hddn">
<h2 id="what-is-dnd" class="color-pink" style="text-align: justify;">What is DND ?</h2>
</div>
</div>
<div class="Content" style="text-align: justify;">
<div class="hddn">
<ul>
<li><a href="https://www.wikitechy.com/technology/how-to-block-unknown-callers-in-iphone-natively/" target="_blank" rel="noopener">DND</a> means Do Not Disturb.This is an initiative by TRAI (Telecom Regulatory Authority of India) to save consumers from unsolicited calls/SMS.</li>
<li>Register with the service provider’s Do No Disturb registry to avoid receiving unwanted telemarketing calls and messages.</li>
<li>In turn the service provider register your number at the National Do Not Call (NDNC) registry within 45 days.</li>
<li>Telemarketers have to verify the calling number list in the NDNC registry before making a call.</li>
<li>So rest assured, the telemarketers will not trouble you else they will be fined for calling you.</li>
</ul>
</div>
</div>
<div class="TextHeading" style="text-align: justify;">
<div class="hddn">
<h2 id="features-of-dnd" class="color-green">Features of DND</h2>
</div>
</div>
<div class="Content">
<div class="hddn">
<ul>
<li style="text-align: justify;">It allows phone users to disable audible ringing for incoming calls.</li>
<li style="text-align: justify;">When DND is enabled, incoming calls do not ring on the phone, however there is visual alerting and the call information displays, and a call can be answered if desired.</li>
<li style="text-align: justify;">When a phone calls in the DND state, the message “Ring out DND” displays on the calling phone that indicate the target phone is in the DND state.</li>
</ul>
</div>
</div>
]]></content:encoded>
					
					<wfw:commentRss>https://www.wikitechy.com/interview-questions/networking/what-is-dnd/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>What is DHCP ?</title>
		<link>https://www.wikitechy.com/interview-questions/networking/what-is-dhcp/</link>
					<comments>https://www.wikitechy.com/interview-questions/networking/what-is-dhcp/#respond</comments>
		
		<dc:creator><![CDATA[Editor]]></dc:creator>
		<pubDate>Sat, 17 Jul 2021 19:36:27 +0000</pubDate>
				<category><![CDATA[Networking]]></category>
		<category><![CDATA[Accenture interview questions and answers]]></category>
		<category><![CDATA[Allstate Solutions Pvt Ltd interview questions and answers]]></category>
		<category><![CDATA[Applied Mate interview questions and answers]]></category>
		<category><![CDATA[Atos interview questions and answers]]></category>
		<category><![CDATA[Bharti Airtel interview questions and answers]]></category>
		<category><![CDATA[Capgemini interview questions and answers]]></category>
		<category><![CDATA[CASTING NETWORKS INDIA PVT LIMITED interview questions and answers]]></category>
		<category><![CDATA[Ciena Corporation interview questions and answers]]></category>
		<category><![CDATA[Comodo India Interview Questions and Answers]]></category>
		<category><![CDATA[CSS Corp Pvt Ltd interview questions and answers]]></category>
		<category><![CDATA[Dell International Services India Pvt Ltd interview questions and answers]]></category>
		<category><![CDATA[dhcp]]></category>
		<category><![CDATA[dhcp basics]]></category>
		<category><![CDATA[dhcp configuration]]></category>
		<category><![CDATA[dhcp configuration packet tracer]]></category>
		<category><![CDATA[dhcp configuration steps]]></category>
		<category><![CDATA[dhcp connecting]]></category>
		<category><![CDATA[dhcp definition]]></category>
		<category><![CDATA[dhcp full form]]></category>
		<category><![CDATA[dhcp in networking]]></category>
		<category><![CDATA[dhcp meaning]]></category>
		<category><![CDATA[dhcp port]]></category>
		<category><![CDATA[dhcp process steps]]></category>
		<category><![CDATA[dhcp protocol]]></category>
		<category><![CDATA[dhcp server]]></category>
		<category><![CDATA[dhcp stands for]]></category>
		<category><![CDATA[Flipkart interview questions and answers]]></category>
		<category><![CDATA[HCL Technologies interview questions and answers]]></category>
		<category><![CDATA[how dhcp works cisco]]></category>
		<category><![CDATA[how dhcp works diagram]]></category>
		<category><![CDATA[how dhcp works dora]]></category>
		<category><![CDATA[how to enable dhcp]]></category>
		<category><![CDATA[IBM interview questions and answers]]></category>
		<category><![CDATA[Indecomm Global Services interview questions and answers]]></category>
		<category><![CDATA[Infosys Technologies interview questions and answers]]></category>
		<category><![CDATA[Mavenir interview questions and answers]]></category>
		<category><![CDATA[Mphasis interview questions and answers]]></category>
		<category><![CDATA[NCR Corporation interview questions and answers]]></category>
		<category><![CDATA[NetApp interview questions and answers]]></category>
		<category><![CDATA[Oracle Corporation interview questions and answers]]></category>
		<category><![CDATA[PeopleStrong interview questions and answers]]></category>
		<category><![CDATA[purpose of dhcp]]></category>
		<category><![CDATA[R Systems interview questions and answers]]></category>
		<category><![CDATA[RBS India Development Centre Pvt Ltd interview questions and answers]]></category>
		<category><![CDATA[Reliance Industries Ltd interview questions and answers]]></category>
		<category><![CDATA[SAP Labs India Pvt Ltd interview questions and answers]]></category>
		<category><![CDATA[Tata Communications interview questions and answers]]></category>
		<category><![CDATA[Tech Mahindra interview questions and answers]]></category>
		<category><![CDATA[UnitedHealth Group interview questions and answers]]></category>
		<category><![CDATA[Virtela interview questions and answers]]></category>
		<category><![CDATA[what does dhcp stand for]]></category>
		<category><![CDATA[what is dhc]]></category>
		<category><![CDATA[what is dhcp]]></category>
		<category><![CDATA[what is dhcp and how it works]]></category>
		<category><![CDATA[what is dhcp client]]></category>
		<category><![CDATA[what is dhcp concept]]></category>
		<category><![CDATA[what is dhcp in networking]]></category>
		<category><![CDATA[what is dhcp server]]></category>
		<guid isPermaLink="false">https://www.wikitechy.com/interview-questions/?p=779</guid>

					<description><![CDATA[Answer : DHCP (Dynamic Host Configuration Protocol) is a protocol...]]></description>
										<content:encoded><![CDATA[<div class="TextHeading">
<div class="hddn">
<h2 id="what-is-dhcp" class="color-pink" style="text-align: justify;">What is DHCP ?</h2>
</div>
</div>
<div class="Content" style="text-align: justify;">
<div class="hddn">
<ul>
<li>DHCP (Dynamic Host Configuration Protocol) is a protocol used to provide quick, automatic, and central management for the distribution of IP addresses within a network.</li>
<li>DHCP is also used to configure the proper subnet mask, default gateway, and DNS server information on the device.</li>
<li>DHCP allows hosts to obtain required TCP/IP configuration information from a DHCP server.</li>
</ul>
</div>
</div>
<div class="ImageContent" style="text-align: justify;">
<div class="hddn"><img decoding="async" class="img-responsive center-block aligncenter" src="https://cdn.wikitechy.com/interview-questions/networking/what-is-dhcp.png" alt="What is DHCP" /></div>
</div>
<div class="TextHeading" style="text-align: justify;">
<div class="hddn">
<h2 id="how-dhcp-works" class="color-blue">How DHCP Works</h2>
</div>
</div>
<div class="Content">
<div class="hddn">
<ul>
<li style="text-align: justify;">A DHCP server is used to concern single IP address and automatically configure other network information.</li>
<li style="text-align: justify;">Maximum the home and small businesses, the router acts as the <b>DHCP server</b>. In large networks, a single computer might act as the DHCP server.</li>
<li style="text-align: justify;">A device (the client) requests an <a href="https://www.wikitechy.com/errors-and-fixes/android/obtaining-ip-address-error-in-android" target="_blank" rel="noopener">IP address</a> from a router (the host), after which the host assigns an available IP address to allow the client to communicate on the network.</li>
<li style="text-align: justify;">Once a device is turned on and connected to a network that has a DHCP server, it will send a request to the server, called a <b>DHCPDISCOVER</b> request.</li>
<li style="text-align: justify;">After the <b>DISCOVER</b> packet reaches the DHCP server, the server goes to hold on to an <a href="https://www.wikitechy.com/tutorials/linux/how-to-get-the-ip-address-of-the-machine-in-linux" target="_blank" rel="noopener">IP address</a> that the device can use, and then offers the client the address with a <b>DHCPOFFER</b> packet.</li>
<li style="text-align: justify;">Once the offer has been made for the chosen IP address, the device responds to the DHCP server with a <b>DHCPREQUEST</b> packet to accept it, after which the server sends an ACK that&#8217;s used to confirm that the device has that specific IP address and to define the amount of time that the device can use the address before getting a new one.</li>
<li style="text-align: justify;">If the server decides that the device cannot have the IP address, it will send a <b>ACK</b>.</li>
</ul>
</div>
</div>
]]></content:encoded>
					
					<wfw:commentRss>https://www.wikitechy.com/interview-questions/networking/what-is-dhcp/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>What is Cyber Security ?</title>
		<link>https://www.wikitechy.com/interview-questions/networking/what-is-cyber-security/</link>
					<comments>https://www.wikitechy.com/interview-questions/networking/what-is-cyber-security/#respond</comments>
		
		<dc:creator><![CDATA[Editor]]></dc:creator>
		<pubDate>Sat, 17 Jul 2021 19:32:15 +0000</pubDate>
				<category><![CDATA[Networking]]></category>
		<category><![CDATA[Accenture interview questions and answers]]></category>
		<category><![CDATA[Allstate Solutions Pvt Ltd interview questions and answers]]></category>
		<category><![CDATA[Applied Mate interview questions and answers]]></category>
		<category><![CDATA[Atos interview questions and answers]]></category>
		<category><![CDATA[Bharti Airtel interview questions and answers]]></category>
		<category><![CDATA[Capgemini interview questions and answers]]></category>
		<category><![CDATA[CASTING NETWORKS INDIA PVT LIMITED interview questions and answers]]></category>
		<category><![CDATA[Ciena Corporation interview questions and answers]]></category>
		<category><![CDATA[Comodo India Interview Questions and Answers]]></category>
		<category><![CDATA[computer security]]></category>
		<category><![CDATA[CSS Corp Pvt Ltd interview questions and answers]]></category>
		<category><![CDATA[cyber]]></category>
		<category><![CDATA[cyber attack]]></category>
		<category><![CDATA[cyber crime]]></category>
		<category><![CDATA[cyber defense]]></category>
		<category><![CDATA[cyber safety]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[cyber security attacks]]></category>
		<category><![CDATA[cyber security concepts]]></category>
		<category><![CDATA[cyber security definition]]></category>
		<category><![CDATA[cyber security definitions]]></category>
		<category><![CDATA[cyber security examples]]></category>
		<category><![CDATA[cyber security information]]></category>
		<category><![CDATA[cyber security risks]]></category>
		<category><![CDATA[cyber security threats]]></category>
		<category><![CDATA[cyber threats]]></category>
		<category><![CDATA[cybersecurity definition]]></category>
		<category><![CDATA[define cyber]]></category>
		<category><![CDATA[Dell International Services India Pvt Ltd interview questions and answers]]></category>
		<category><![CDATA[Flipkart interview questions and answers]]></category>
		<category><![CDATA[future of cybersecurity]]></category>
		<category><![CDATA[HCL Technologies interview questions and answers]]></category>
		<category><![CDATA[IBM interview questions and answers]]></category>
		<category><![CDATA[Indecomm Global Services interview questions and answers]]></category>
		<category><![CDATA[information and cyber security]]></category>
		<category><![CDATA[Infosys Technologies interview questions and answers]]></category>
		<category><![CDATA[introduction cyber security]]></category>
		<category><![CDATA[introduction to cyber security]]></category>
		<category><![CDATA[list of types of cyber attacks]]></category>
		<category><![CDATA[Mavenir interview questions and answers]]></category>
		<category><![CDATA[Mphasis interview questions and answers]]></category>
		<category><![CDATA[NCR Corporation interview questions and answers]]></category>
		<category><![CDATA[NetApp interview questions and answers]]></category>
		<category><![CDATA[network security]]></category>
		<category><![CDATA[Oracle Corporation interview questions and answers]]></category>
		<category><![CDATA[PeopleStrong interview questions and answers]]></category>
		<category><![CDATA[R Systems interview questions and answers]]></category>
		<category><![CDATA[RBS India Development Centre Pvt Ltd interview questions and answers]]></category>
		<category><![CDATA[Reliance Industries Ltd interview questions and answers]]></category>
		<category><![CDATA[SAP Labs India Pvt Ltd interview questions and answers]]></category>
		<category><![CDATA[Tata Communications interview questions and answers]]></category>
		<category><![CDATA[Tech Mahindra interview questions and answers]]></category>
		<category><![CDATA[types of cyber security]]></category>
		<category><![CDATA[types of cyber security attacks]]></category>
		<category><![CDATA[types of cyber security threats]]></category>
		<category><![CDATA[types of cyber warfare]]></category>
		<category><![CDATA[types of security attacks]]></category>
		<category><![CDATA[UnitedHealth Group interview questions and answers]]></category>
		<category><![CDATA[Virtela interview questions and answers]]></category>
		<category><![CDATA[what is cyber crime]]></category>
		<category><![CDATA[what is cyber security]]></category>
		<category><![CDATA[what is cyber security all about]]></category>
		<guid isPermaLink="false">https://www.wikitechy.com/interview-questions/?p=776</guid>

					<description><![CDATA[Answer : Cyber security or information technology security refers to a set of techniques...]]></description>
										<content:encoded><![CDATA[<div class="TextHeading">
<div class="hddn">
<h2 id="what-is-cyber-security" class="color-pink" style="text-align: justify;">What is Cyber Security ?</h2>
<ul style="text-align: justify;">
<li>Cyber security or information technology security refers to a set of techniques used to protect the integrity of <a href="https://www.wikitechy.com/tutorials/java/java-networking" target="_blank" rel="noopener">networks</a>, programs and data from attack, damage or unauthorized access that are aimed for exploitation.</li>
<li>In a computing context, security comprises cybersecurity and physical security both are used by enterprises to protect against unauthorized access to data centers and other computerized systems.</li>
<li>Information security, which is designed to maintain the confidentiality, integrity and availability of data, is a subset of cybersecurity. <a href="https://texaport.co.uk/it-support-aberdeen/">texaport.co.uk</a></li>
</ul>
</div>
</div>
<div class="text-center row" style="text-align: justify;"></div>
<h2 id="elements-of-cybersecurity" class="color-purple" style="text-align: justify;">Elements of cybersecurity</h2>
<div class="Content" style="text-align: justify;">
<div class="hddn">
<ul>
<li>Ensuring cybersecurity requires the coordination of efforts throughout an information system, which includes:
<ul>
<li><a href="https://www.wikitechy.com/technology/protect-wi-fi-network-hackers/" target="_blank" rel="noopener">Network security</a></li>
<li><a href="https://forums.wikitechy.com/answer/re-how-would-you-ensure-security-over-web-in-your-application/" target="_blank" rel="noopener">Application security</a></li>
<li>Endpoint security</li>
<li><a href="https://www.wikitechy.com/interview-questions/power-bi/what-is-the-level-of-data-security-provided-by-power-bi/" target="_blank" rel="noopener">Data security</a></li>
<li>Identity management</li>
<li>Database and infrastructure security</li>
<li><a href="https://www.wikitechy.com/cloud-computing/cloud-infrastructure-as-a-service/" target="_blank" rel="noopener">Cloud </a>security</li>
<li>Mobile security</li>
<li>Disaster recovery/business continuity planning</li>
<li>End-user education</li>
</ul>
</li>
<li>The most difficult challenge in cyber security is the ever-evolving nature of security risks themselves.</li>
<li>The traditional approach has been to focus resources on crucial system components and protect against the biggest known threats, which meant leaving components undefended and not protecting systems against less dangerous risks.</li>
<li>Today, this approach is insufficient, as the threats advance and change more quickly than organizations can keep up with. As a result, advisory organizations promote more proactive and adaptive approaches to cyber security.</li>
</ul>
</div>
</div>
<div class="ImageContent" style="text-align: justify;">
<div class="hddn"><img decoding="async" class="img-responsive center-block aligncenter" src="https://cdn.wikitechy.com/interview-questions/networking/information-risk-management.png" alt="Information Risk Management" /></div>
</div>
<div class="TextHeading" style="text-align: justify;">
<div class="hddn">
<h2 id="cyberthreats" class="color-purple">Cyberthreats</h2>
</div>
</div>
<p style="text-align: justify;">The core functionality of cybersecurity involves protecting information and systems from major cyberthreats. These cyberthreats take many forms :</p>
<div class="Content" style="text-align: justify;">
<div class="hddn">
<ul>
<li><b>Ransomware</b> is a type of malware that involves an attacker locking the victim&#8217;s computer system files &#8212; typically through encryption &#8212; and demanding a payment to decrypt and unlock them.</li>
<li><b>Malware</b> is any file or program used to harm a computer user, such as worms, computer viruses, Trojan horses and spyware.</li>
<li><b>Social engineering </b>is an attack that relies on human interaction to trick users into breaking security procedures in order to gain sensitive information that is typically protected.</li>
<li><b>Phishing</b> is a form of fraud where fraudulent emails are sent that resemble emails from reputable sources; however, the intention of these emails is to steal sensitive data, such as credit card or login information.</li>
</ul>
</div>
</div>
<div class="TextHeading" style="text-align: justify;">
<div class="hddn">
<h2 id="cyberterrorism" class="color-purple">Cyberterrorism</h2>
<ul>
<li>cyberterrorism is the disruptive use of information technology by terrorist groups to further their ideological or political agenda.</li>
<li>It takes the form of attacks on networks, computer systems and telecommunication infrastructures.</li>
</ul>
</div>
</div>
<div class="TextHeading" style="text-align: justify;">
<div class="hddn">
<h2 id="cyberwarfare" class="color-purple">Cyberwarfare</h2>
<ul>
<li>Cyberwarfare involves nation-states using information technology to penetrate another nation’s networks to cause damage or disruption.</li>
<li>In the U.S. and many other nations, cyberwarfare has been acknowledged as the fifth domain of warfare (following land, sea, air and space).</li>
<li>Cyberwarfare attacks are primarily executed by hackers who are well-trained in exploiting the intricacies of computer networks, and operate under the auspices and support of nation-states.</li>
<li>Rather than “shutting down” a target’s key networks, a cyberwarfare attack may intrude into networks to compromise valuable data, degrade communications, impair such infrastructural services as transportation and medical services, or interrupt commerce.</li>
</ul>
</div>
</div>
<div class="TextHeading" style="text-align: justify;">
<div class="hddn">
<h2 id="cyberespionage" class="color-purple">Cyberespionage</h2>
</div>
</div>
<ul>
<li style="text-align: justify;">Cyberespionage is the practice of using information technology to obtain secret information without permission from its owners or holders.</li>
<li style="text-align: justify;">Cyberespionage is most often used to gain strategic, economic, political or military advantage, and is conducted using cracking techniques and malware.</li>
</ul>
]]></content:encoded>
					
					<wfw:commentRss>https://www.wikitechy.com/interview-questions/networking/what-is-cyber-security/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>What is whitelist ?</title>
		<link>https://www.wikitechy.com/interview-questions/networking/what-is-whitelist/</link>
					<comments>https://www.wikitechy.com/interview-questions/networking/what-is-whitelist/#respond</comments>
		
		<dc:creator><![CDATA[Editor]]></dc:creator>
		<pubDate>Sat, 17 Jul 2021 19:28:32 +0000</pubDate>
				<category><![CDATA[Networking]]></category>
		<category><![CDATA[Accenture interview questions and answers]]></category>
		<category><![CDATA[Allstate Solutions Pvt Ltd interview questions and answers]]></category>
		<category><![CDATA[application whitelisting]]></category>
		<category><![CDATA[Applied Mate interview questions and answers]]></category>
		<category><![CDATA[Atos interview questions and answers]]></category>
		<category><![CDATA[best application whitelisting software]]></category>
		<category><![CDATA[Bharti Airtel interview questions and answers]]></category>
		<category><![CDATA[Capgemini interview questions and answers]]></category>
		<category><![CDATA[CASTING NETWORKS INDIA PVT LIMITED interview questions and answers]]></category>
		<category><![CDATA[check if ip is whitelisted]]></category>
		<category><![CDATA[Ciena Corporation interview questions and answers]]></category>
		<category><![CDATA[Comodo India Interview Questions and Answers]]></category>
		<category><![CDATA[CSS Corp Pvt Ltd interview questions and answers]]></category>
		<category><![CDATA[Dell International Services India Pvt Ltd interview questions and answers]]></category>
		<category><![CDATA[Flipkart interview questions and answers]]></category>
		<category><![CDATA[gmail whitelist]]></category>
		<category><![CDATA[HCL Technologies interview questions and answers]]></category>
		<category><![CDATA[how to whitelist a blacklisted ip address]]></category>
		<category><![CDATA[how to whitelist an email]]></category>
		<category><![CDATA[how to whitelist ip addresses windows]]></category>
		<category><![CDATA[how to whitelist my domain]]></category>
		<category><![CDATA[how to whitelist public ip address]]></category>
		<category><![CDATA[IBM interview questions and answers]]></category>
		<category><![CDATA[Indecomm Global Services interview questions and answers]]></category>
		<category><![CDATA[Infosys Technologies interview questions and answers]]></category>
		<category><![CDATA[ip whitelist check]]></category>
		<category><![CDATA[Mavenir interview questions and answers]]></category>
		<category><![CDATA[Mphasis interview questions and answers]]></category>
		<category><![CDATA[NCR Corporation interview questions and answers]]></category>
		<category><![CDATA[NetApp interview questions and answers]]></category>
		<category><![CDATA[Oracle Corporation interview questions and answers]]></category>
		<category><![CDATA[PeopleStrong interview questions and answers]]></category>
		<category><![CDATA[R Systems interview questions and answers]]></category>
		<category><![CDATA[RBS India Development Centre Pvt Ltd interview questions and answers]]></category>
		<category><![CDATA[Reliance Industries Ltd interview questions and answers]]></category>
		<category><![CDATA[SAP Labs India Pvt Ltd interview questions and answers]]></category>
		<category><![CDATA[Tata Communications interview questions and answers]]></category>
		<category><![CDATA[Tech Mahindra interview questions and answers]]></category>
		<category><![CDATA[UnitedHealth Group interview questions and answers]]></category>
		<category><![CDATA[Virtela interview questions and answers]]></category>
		<category><![CDATA[what does whitelist mean]]></category>
		<category><![CDATA[what is whitelist]]></category>
		<category><![CDATA[what is whitelist email]]></category>
		<category><![CDATA[white lies]]></category>
		<category><![CDATA[whitelist]]></category>
		<category><![CDATA[whitelist definition]]></category>
		<category><![CDATA[whitelist email]]></category>
		<category><![CDATA[whitelist email meaning]]></category>
		<category><![CDATA[whitelist ip]]></category>
		<category><![CDATA[whitelist ip address]]></category>
		<category><![CDATA[whitelist ip address meaning]]></category>
		<category><![CDATA[whitelist meaning]]></category>
		<category><![CDATA[whitelist url]]></category>
		<category><![CDATA[whitelist vs blacklist]]></category>
		<category><![CDATA[whitelisting ip]]></category>
		<category><![CDATA[whitelisting software]]></category>
		<category><![CDATA[whitelisting websites]]></category>
		<guid isPermaLink="false">https://www.wikitechy.com/interview-questions/?p=774</guid>

					<description><![CDATA[Answer : A whitelist is a list of e-mail addresses or domain names...]]></description>
										<content:encoded><![CDATA[<div class="TextHeading">
<div class="hddn">
<h2 id="what-is-whitelist" class="color-pink" style="text-align: justify;">What is whitelist ?</h2>
</div>
</div>
<div class="Content" style="text-align: justify;">
<div class="hddn">
<ul>
<li>A <a href="https://www.wikitechy.com/technology/whitelisting-in-modsecurity/" target="_blank" rel="noopener">whitelist</a> is a list of e-mail addresses or domain names from which an e-mail blocking program will allow messages to be received.</li>
<li>The list can be gradually compiled over a period of time, and can be edited whenever the user wants.</li>
<li>When a whitelist is used, all entities are denied access, except those included in the whitelist.</li>
</ul>
</div>
</div>
<div class="ImageContent" style="text-align: justify;">
<div class="hddn"><img decoding="async" class="img-responsive center-block" src="https://cdn.wikitechy.com/interview-questions/networking/what-is-whitelist.jpg" alt="What is Whitelist" /></div>
</div>
<div class="TextHeading" style="text-align: justify;">
<div class="hddn">
<h2 id="examples-of-different-whitelist-applications" class="color-green">Examples of different whitelist applications</h2>
</div>
</div>
<div class="Content">
<div class="hddn">
<ul>
<li style="text-align: justify;">A network administrator may be configure a firewall with a whitelist that allows only specific IP addresses to access the network.</li>
<li style="text-align: justify;">A protected directory within a website uses whitelist for the purpose of provide limit access to certain IP addresses.</li>
<li style="text-align: justify;">Some <a href="https://www.wikitechy.com/view-article/send-email-in-php" target="_blank" rel="noopener">e-mail system</a> users use whitelist for receiving only accept messages from the e-mail addresses.</li>
<li style="text-align: justify;">Programmers can use whitelists within a program to ensure only certain objects are modified.</li>
</ul>
</div>
</div>
]]></content:encoded>
					
					<wfw:commentRss>https://www.wikitechy.com/interview-questions/networking/what-is-whitelist/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>What is an SSL and how does it works ?</title>
		<link>https://www.wikitechy.com/interview-questions/networking/what-is-an-ssl-and-how-does-it-works/</link>
					<comments>https://www.wikitechy.com/interview-questions/networking/what-is-an-ssl-and-how-does-it-works/#respond</comments>
		
		<dc:creator><![CDATA[Editor]]></dc:creator>
		<pubDate>Sat, 17 Jul 2021 19:24:49 +0000</pubDate>
				<category><![CDATA[Networking]]></category>
		<category><![CDATA[Accenture interview questions and answers]]></category>
		<category><![CDATA[Allstate Solutions Pvt Ltd interview questions and answers]]></category>
		<category><![CDATA[Applied Mate interview questions and answers]]></category>
		<category><![CDATA[Atos interview questions and answers]]></category>
		<category><![CDATA[Bharti Airtel interview questions and answers]]></category>
		<category><![CDATA[Capgemini interview questions and answers]]></category>
		<category><![CDATA[CASTING NETWORKS INDIA PVT LIMITED interview questions and answers]]></category>
		<category><![CDATA[Ciena Corporation interview questions and answers]]></category>
		<category><![CDATA[CSS Corp Pvt Ltd interview questions and answers]]></category>
		<category><![CDATA[define ssl]]></category>
		<category><![CDATA[Dell International Services India Pvt Ltd interview questions and answers]]></category>
		<category><![CDATA[Flipkart interview questions and answers]]></category>
		<category><![CDATA[HCL Technologies interview questions and answers]]></category>
		<category><![CDATA[how does ssl work]]></category>
		<category><![CDATA[how https works step by step]]></category>
		<category><![CDATA[how ssl certificate works between client and server]]></category>
		<category><![CDATA[how ssl certificates work diagram]]></category>
		<category><![CDATA[how ssl hand]]></category>
		<category><![CDATA[how ssl works]]></category>
		<category><![CDATA[how ssl works step by step]]></category>
		<category><![CDATA[IBM interview questions and answers]]></category>
		<category><![CDATA[Indecomm Global Services interview questions and answers]]></category>
		<category><![CDATA[Infosys Technologies interview questions and answers]]></category>
		<category><![CDATA[Mavenir interview questions and answers]]></category>
		<category><![CDATA[Mphasis interview questions and answers]]></category>
		<category><![CDATA[NCR Corporation interview questions and answers]]></category>
		<category><![CDATA[NetApp interview questions and answers]]></category>
		<category><![CDATA[Oracle Corporation interview questions and answers]]></category>
		<category><![CDATA[PeopleStrong interview questions and answers]]></category>
		<category><![CDATA[R Systems interview questions and answers]]></category>
		<category><![CDATA[RBS India Development Centre Pvt Ltd interview questions and answers]]></category>
		<category><![CDATA[Reliance Industries Ltd interview questions and answers]]></category>
		<category><![CDATA[SAP Labs India Pvt Ltd interview questions and answers]]></category>
		<category><![CDATA[secure socket layer]]></category>
		<category><![CDATA[secure sockets layer]]></category>
		<category><![CDATA[secure sockets layer ssl]]></category>
		<category><![CDATA[shake works]]></category>
		<category><![CDATA[ssl]]></category>
		<category><![CDATA[ssl certificate]]></category>
		<category><![CDATA[ssl definition]]></category>
		<category><![CDATA[ssl encryption]]></category>
		<category><![CDATA[ssl handshake]]></category>
		<category><![CDATA[ssl https]]></category>
		<category><![CDATA[ssl key]]></category>
		<category><![CDATA[ssl protocol]]></category>
		<category><![CDATA[ssl protocol stack]]></category>
		<category><![CDATA[ssl security]]></category>
		<category><![CDATA[ssls]]></category>
		<category><![CDATA[Tata Communications interview questions and answers]]></category>
		<category><![CDATA[Tech Mahindra interview questions and answers]]></category>
		<category><![CDATA[UnitedHealth Group interview questions and answers]]></category>
		<category><![CDATA[Virtela interview questions and answers]]></category>
		<category><![CDATA[what does ssl mean]]></category>
		<category><![CDATA[what is ssl]]></category>
		<category><![CDATA[what is ssl certificate]]></category>
		<category><![CDATA[what is ssl how does it work]]></category>
		<guid isPermaLink="false">https://www.wikitechy.com/interview-questions/?p=772</guid>

					<description><![CDATA[Answer : SSL (Secure Sockets Layer) is the standard security technology...]]></description>
										<content:encoded><![CDATA[<div class="TextHeading">
<div class="hddn">
<h2 id="what-is-an-ssl-and-how-does-it-works" class="color-pink" style="text-align: justify;">What is an SSL and how does it works ?</h2>
<ul style="text-align: justify;">
<li><a href="https://www.wikitechy.com/tutorials/node-js/node-js-tls-ssl" target="_blank" rel="noopener">SSL (Secure Sockets Layer)</a> is the standard security technology for establishing an encrypted link between a web server and a browser.</li>
<li>This link ensures that all data passed between the web server and browsers remain private and integral. <a href="https://www.digitalserver.com.mx/certificados-ssl.shtml">Certificado SSL</a></li>
</ul>
</div>
</div>
<div class="text-center row" style="text-align: justify;"></div>
<div class="TextHeading" style="text-align: justify;">
<div class="hddn">
<h2 id="working-of-ssl" class="color-green">Working of SSL:</h2>
</div>
</div>
<div class="ImageContent" style="text-align: justify;">
<div class="hddn"><img decoding="async" class="img-responsive center-block" src="https://cdn.wikitechy.com/interview-questions/networking/ssl.jpg" alt="ssl" /></div>
</div>
<div class="Content">
<div class="hddn">
<ul>
<li style="text-align: justify;">An end-user asks their browser to make a secure connection to a website</li>
<li style="text-align: justify;">The browser obtains the <a href="https://www.wikitechy.com/final-year-project/dotnet/server-hacking/finding-ip-address-module" target="_blank" rel="noopener">IP address</a> of the site from a DNS server then requests a secure connection to the website.</li>
<li style="text-align: justify;">To initiate this secure connection, the browser requests that the server identifies itself by sending a copy of its <a href="https://forums.wikitechy.com/question/pip-install-fails-with-connection-error-ssl-certificate_verify_failed-certificate-verify-failed-_ssl-c598/" target="_blank" rel="noopener">SSL certificate</a> to the browser.</li>
<li style="text-align: justify;">The browser checks the certificate to ensure:
<ul>
<li>That it is signed by a trusted CA.</li>
<li>That it is valid &#8211; that it has not expired or been revoked.</li>
<li>That it confirms to required security standards on key lengths and other items.</li>
<li>That the domain listed on the certificate matches the domain that was requested by the user.</li>
</ul>
</li>
<li style="text-align: justify;">When the browser confirms that the website can be trusted, it creates a symmetric <a href="https://www.wikitechy.com/tutorials/laravel/laravel-session" target="_blank" rel="noopener">session key</a> which it encrypts with the public key in the website&#8217;s certificate. The session key is then sent to the web server.</li>
<li style="text-align: justify;">The web server uses its private key to decrypt the symmetric session key.</li>
<li style="text-align: justify;">The server sends back an acknowledgement that is <a href="https://forums.wikitechy.com/question/how-can-i-encrypt-and-decrypt-a-string-in-c/" target="_blank" rel="noopener">encrypted</a> with the session key.</li>
<li style="text-align: justify;">From now on, all data transmitted between the server and the browser is encrypted and secure.</li>
</ul>
</div>
</div>
]]></content:encoded>
					
					<wfw:commentRss>https://www.wikitechy.com/interview-questions/networking/what-is-an-ssl-and-how-does-it-works/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>What is firewall ?</title>
		<link>https://www.wikitechy.com/interview-questions/networking/what-is-firewall/</link>
					<comments>https://www.wikitechy.com/interview-questions/networking/what-is-firewall/#respond</comments>
		
		<dc:creator><![CDATA[Editor]]></dc:creator>
		<pubDate>Sat, 17 Jul 2021 19:21:08 +0000</pubDate>
				<category><![CDATA[Networking]]></category>
		<category><![CDATA[Accenture interview questions and answers]]></category>
		<category><![CDATA[Allstate Solutions Pvt Ltd interview questions and answers]]></category>
		<category><![CDATA[Applied Mate interview questions and answers]]></category>
		<category><![CDATA[Atos interview questions and answers]]></category>
		<category><![CDATA[Bharti Airtel interview questions and answers]]></category>
		<category><![CDATA[Capgemini interview questions and answers]]></category>
		<category><![CDATA[CASTING NETWORKS INDIA PVT LIMITED interview questions and answers]]></category>
		<category><![CDATA[Ciena Corporation interview questions and answers]]></category>
		<category><![CDATA[comodo firewall]]></category>
		<category><![CDATA[Comodo India Interview Questions and Answers]]></category>
		<category><![CDATA[CSS Corp Pvt Ltd interview questions and answers]]></category>
		<category><![CDATA[Dell International Services India Pvt Ltd interview questions and answers]]></category>
		<category><![CDATA[firewall]]></category>
		<category><![CDATA[firewall definition]]></category>
		<category><![CDATA[firewall device]]></category>
		<category><![CDATA[firewall examples]]></category>
		<category><![CDATA[firewall protection]]></category>
		<category><![CDATA[firewall security]]></category>
		<category><![CDATA[firewall software]]></category>
		<category><![CDATA[firewalls]]></category>
		<category><![CDATA[firewalls types]]></category>
		<category><![CDATA[Flipkart interview questions and answers]]></category>
		<category><![CDATA[HCL Technologies interview questions and answers]]></category>
		<category><![CDATA[how does a firewall work]]></category>
		<category><![CDATA[how does a hardware firewall work]]></category>
		<category><![CDATA[how firewall works]]></category>
		<category><![CDATA[IBM interview questions and answers]]></category>
		<category><![CDATA[Indecomm Global Services interview questions and answers]]></category>
		<category><![CDATA[Infosys Technologies interview questions and answers]]></category>
		<category><![CDATA[managed firewall]]></category>
		<category><![CDATA[Mavenir interview questions and answers]]></category>
		<category><![CDATA[microsoft firewall]]></category>
		<category><![CDATA[Mphasis interview questions and answers]]></category>
		<category><![CDATA[NCR Corporation interview questions and answers]]></category>
		<category><![CDATA[NetApp interview questions and answers]]></category>
		<category><![CDATA[network firewall]]></category>
		<category><![CDATA[network firewall security]]></category>
		<category><![CDATA[network firewall software]]></category>
		<category><![CDATA[Oracle Corporation interview questions and answers]]></category>
		<category><![CDATA[PeopleStrong interview questions and answers]]></category>
		<category><![CDATA[R Systems interview questions and answers]]></category>
		<category><![CDATA[RBS India Development Centre Pvt Ltd interview questions and answers]]></category>
		<category><![CDATA[Reliance Industries Ltd interview questions and answers]]></category>
		<category><![CDATA[SAP Labs India Pvt Ltd interview questions and answers]]></category>
		<category><![CDATA[software firewall definition]]></category>
		<category><![CDATA[stateful firewall]]></category>
		<category><![CDATA[Tata Communications interview questions and answers]]></category>
		<category><![CDATA[Tech Mahindra interview questions and answers]]></category>
		<category><![CDATA[types of firewall]]></category>
		<category><![CDATA[UnitedHealth Group interview questions and answers]]></category>
		<category><![CDATA[Virtela interview questions and answers]]></category>
		<category><![CDATA[virtual firewall]]></category>
		<category><![CDATA[what is a firewall on a computer]]></category>
		<category><![CDATA[what is firewall]]></category>
		<category><![CDATA[what is firewall in networking]]></category>
		<category><![CDATA[windows firewall]]></category>
		<category><![CDATA[working of firewall with diagram]]></category>
		<guid isPermaLink="false">https://www.wikitechy.com/interview-questions/?p=770</guid>

					<description><![CDATA[Answer : A firewall is a piece of hardware or software...]]></description>
										<content:encoded><![CDATA[<div class="TextHeading">
<div class="hddn">
<h2 id="what-is-firewall" class="color-pink" style="text-align: justify;">What is firewall ?</h2>
<ul style="text-align: justify;">
<li>A <a href="https://www.wikitechy.com/technology/how-to-get-firewall-access-on-android-without-root/" target="_blank" rel="noopener">firewall</a> is a piece of hardware or software that helps prevent malware and malicious attacks from entering a computer or a network of computers through the <a href="https://www.wikitechy.com/technology/free-internet-tricks-2017/" target="_blank" rel="noopener">Internet</a>.</li>
<li>Firewalls have been a first line of defense in network security for over 25 years. They establish a barrier between secured and controlled internal networks that can be trusted and untrusted outside networks, such as the Internet.</li>
<li>A firewall can be hardware,software or both.</li>
</ul>
</div>
</div>
<div class="text-center row" style="text-align: justify;"></div>
<div class="TextHeading" style="text-align: justify;">
<div class="hddn">
<h2 id="hardware-firewalls" class="color-green">Hardware firewalls</h2>
</div>
</div>
<div class="Content" style="text-align: justify;">
<div class="hddn">
<ul>
<li>Hardware firewalls are systems that are independent of the computers they protect that filter the Internet as information passes into a computer.</li>
<li>Most broadband Internet routers have their own firewall built in.</li>
<li>In general, hardware firewalls work by examining the data that flows in from the Internet and verifying whether that information is safe.</li>
<li>The ZyXEL ZyWALL, which is a Unified Security Gateway with a firewall and other security features.</li>
<li><b>Cost:</b> $100 to ~$500</li>
<li>NAT, DCHP, Email Notification.</li>
<li>Easier for computers to locally share folders/Printers.</li>
<li>Additional function available &amp; can protect other devices.</li>
</ul>
</div>
</div>
<div class="ImageContent" style="text-align: justify;">
<div class="hddn"><img decoding="async" class="img-responsive center-block aligncenter" src="https://cdn.wikitechy.com/interview-questions/networking/hardware-firewalls.png" alt="zyxel firewall" /></div>
</div>
<div class="TextHeading" style="text-align: justify;">
<div class="hddn">
<h2 id="software-firewalls" class="color-green">Software firewalls</h2>
</div>
</div>
<div class="Content" style="text-align: justify;">
<div class="hddn">
<ul>
<li>Software firewalls are designed to protect a computer by blocking certain programs from sending and receiving information from a local network or the Internet.</li>
<li>The Windows Firewall, an example of a firewall software program included with Microsoft Windows.</li>
<li><b>Cost:</b> Free to $30 per computer.</li>
<li>Each machine need to be configured.</li>
<li>Firewall may be interfere with local network sharing.</li>
</ul>
</div>
</div>
<div class="ImageContent">
<div class="hddn" style="text-align: justify;"><img decoding="async" class="img-responsive center-block aligncenter" src="https://cdn.wikitechy.com/interview-questions/networking/software-firewalls.png" alt="Software firewall" /></div>
</div>
]]></content:encoded>
					
					<wfw:commentRss>https://www.wikitechy.com/interview-questions/networking/what-is-firewall/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>What are the layers of OSI ?</title>
		<link>https://www.wikitechy.com/interview-questions/networking/what-are-the-layers-of-osi/</link>
					<comments>https://www.wikitechy.com/interview-questions/networking/what-are-the-layers-of-osi/#respond</comments>
		
		<dc:creator><![CDATA[Editor]]></dc:creator>
		<pubDate>Sat, 17 Jul 2021 19:17:02 +0000</pubDate>
				<category><![CDATA[Networking]]></category>
		<category><![CDATA[7 layers of networking]]></category>
		<category><![CDATA[Accenture interview questions and answers]]></category>
		<category><![CDATA[Allstate Solutions Pvt Ltd interview questions and answers]]></category>
		<category><![CDATA[application layer]]></category>
		<category><![CDATA[application layer functions]]></category>
		<category><![CDATA[application layer osi model]]></category>
		<category><![CDATA[Applied Mate interview questions and answers]]></category>
		<category><![CDATA[Atos interview questions and answers]]></category>
		<category><![CDATA[Bharti Airtel interview questions and answers]]></category>
		<category><![CDATA[Capgemini interview questions and answers]]></category>
		<category><![CDATA[CASTING NETWORKS INDIA PVT LIMITED interview questions and answers]]></category>
		<category><![CDATA[Ciena Corporation interview questions and answers]]></category>
		<category><![CDATA[Comodo India Interview Questions and Answers]]></category>
		<category><![CDATA[CSS Corp Pvt Ltd interview questions and answers]]></category>
		<category><![CDATA[Dell International Services India Pvt Ltd interview questions and answers]]></category>
		<category><![CDATA[Flipkart interview questions and answers]]></category>
		<category><![CDATA[HCL Technologies interview questions and answers]]></category>
		<category><![CDATA[IBM interview questions and answers]]></category>
		<category><![CDATA[Indecomm Global Services interview questions and answers]]></category>
		<category><![CDATA[Infosys Technologies interview questions and answers]]></category>
		<category><![CDATA[internet layer]]></category>
		<category><![CDATA[layer 2 network]]></category>
		<category><![CDATA[layer 3 network]]></category>
		<category><![CDATA[layer 7]]></category>
		<category><![CDATA[Mavenir interview questions and answers]]></category>
		<category><![CDATA[Mphasis interview questions and answers]]></category>
		<category><![CDATA[NCR Corporation interview questions and answers]]></category>
		<category><![CDATA[NetApp interview questions and answers]]></category>
		<category><![CDATA[network layer]]></category>
		<category><![CDATA[Oracle Corporation interview questions and answers]]></category>
		<category><![CDATA[osi]]></category>
		<category><![CDATA[osi application layer]]></category>
		<category><![CDATA[osi layer protocols and functions]]></category>
		<category><![CDATA[osi layers]]></category>
		<category><![CDATA[osi layers functions each layer]]></category>
		<category><![CDATA[osi layers with examples]]></category>
		<category><![CDATA[osi model]]></category>
		<category><![CDATA[osi model explained]]></category>
		<category><![CDATA[osi model explained in simple terms]]></category>
		<category><![CDATA[osi model explained with example]]></category>
		<category><![CDATA[osi model for beginners]]></category>
		<category><![CDATA[osi model for dummies]]></category>
		<category><![CDATA[osi model layers]]></category>
		<category><![CDATA[osi model layers and its functions]]></category>
		<category><![CDATA[osi model layers explanation]]></category>
		<category><![CDATA[osi model protocols]]></category>
		<category><![CDATA[osi network layer]]></category>
		<category><![CDATA[osi presentation layer]]></category>
		<category><![CDATA[PeopleStrong interview questions and answers]]></category>
		<category><![CDATA[physical layer]]></category>
		<category><![CDATA[physical layer in osi model]]></category>
		<category><![CDATA[physical layer protocols]]></category>
		<category><![CDATA[protocols used in each layer of osi model]]></category>
		<category><![CDATA[R Systems interview questions and answers]]></category>
		<category><![CDATA[RBS India Development Centre Pvt Ltd interview questions and answers]]></category>
		<category><![CDATA[Reliance Industries Ltd interview questions and answers]]></category>
		<category><![CDATA[SAP Labs India Pvt Ltd interview questions and answers]]></category>
		<category><![CDATA[seven layers of osi model]]></category>
		<category><![CDATA[Tata Communications interview questions and answers]]></category>
		<category><![CDATA[Tech Mahindra interview questions and answers]]></category>
		<category><![CDATA[UnitedHealth Group interview questions and answers]]></category>
		<category><![CDATA[Virtela interview questions and answers]]></category>
		<guid isPermaLink="false">https://www.wikitechy.com/interview-questions/?p=768</guid>

					<description><![CDATA[Answer : There are seven Layers in Open Systems Interconnection Model...]]></description>
										<content:encoded><![CDATA[<div class="TextHeading">
<div class="hddn">
<h2 id="what-are-the-layers-of-osi" class="color-pink" style="text-align: justify;">What are the layers of OSI ?</h2>
</div>
</div>
<p style="text-align: justify;">There are seven Layers in Open Systems Interconnection Model.They are:</p>
<div class="ImageContent" style="text-align: justify;">
<div class="hddn"><img decoding="async" class="img-responsive center-block aligncenter" src="https://cdn.wikitechy.com/interview-questions/networking/what-are-the-layers-of-osi.png" alt="What are the layers of OSI" /></div>
</div>
<div class="TextHeading" style="text-align: justify;">
<div class="hddn">
<h2 id="layer-1-the-physical-layer" class="color-blue">Layer 1 : The Physical layer</h2>
</div>
</div>
<div class="Content" style="text-align: justify;">
<div class="hddn">
<ul>
<li>This layer conveys the bit stream across the <a href="https://www.wikitechy.com/errors-and-fixes/windows/network-connection-issues-in-windows" target="_blank" rel="noopener">network</a> either electrically, mechanically or through radio waves.</li>
<li>The physical layer covers a variety of devices and mediums, among them cabling, connectors, receivers, transceivers and repeaters.</li>
</ul>
</div>
</div>
<div class="TextHeading" style="text-align: justify;">
<div class="hddn">
<h2 id="layer-2-the-data-link-layer" class="color-blue">Layer 2 : The Data-link layer</h2>
</div>
</div>
<div class="Content" style="text-align: justify;">
<div class="hddn">
<ul>
<li>This layer sets up links across the physical network, putting packets into network frames.</li>
<li>This layer has two sub-layers: the logical link control layer and the media access control layer (MAC). <a href="https://www.wikitechy.com/tutorials/ethical-hacking/computer-hacking-tutorial/what-is-mac-address-and-how-to-get-mac-address-in-my-computer" target="_blank" rel="noopener">MAC layer</a> types include Ethernet and 802.11 wireless specifications.</li>
</ul>
</div>
</div>
<div class="TextHeading" style="text-align: justify;">
<div class="hddn">
<h2 id="layer-3-the-network-layer" class="color-blue">Layer 3 : The Network layer</h2>
</div>
</div>
<div class="Content" style="text-align: justify;">
<div class="hddn">
<ul>
<li>This layer handles addressing and routing the data &#8212; sending it in the right direction to the right destination on outgoing transmissions and receiving incoming transmissions at the packet level. IP is the network layer for the internet.</li>
</ul>
</div>
</div>
<div class="TextHeading" style="text-align: justify;">
<div class="hddn">
<h2 id="layer-4-the-transport-layer" class="color-blue">Layer 4 : The Transport layer</h2>
</div>
</div>
<div class="Content" style="text-align: justify;">
<div class="hddn">
<ul>
<li>This layer manages packetization of data, then the delivery of the packets, including checking for errors in the data once it arrives.</li>
<li>On the internet, <a href="https://www.wikitechy.com/tutorials/linux/how-to-increase-the-maximum-number-of-tcp-ip-connections-in-linux" target="_blank" rel="noopener">TCP</a> and UDP provide these services for most applications as well.</li>
</ul>
</div>
</div>
<div class="TextHeading" style="text-align: justify;">
<div class="hddn">
<h2 id="layer-5-the-session-layer" class="color-blue">Layer 5 : The Session layer</h2>
</div>
</div>
<div class="Content" style="text-align: justify;">
<div class="hddn">
<ul>
<li>This layer sets up, coordinates and terminates conversations. Its services include authentication and reconnection after an interruption. On the internet, Transmission Control Protocol (TCP) and User Datagram Protocol (UDP) provide these services for most applications.</li>
</ul>
</div>
</div>
<div class="TextHeading" style="text-align: justify;">
<div class="hddn">
<h2 id="layer-6-the-presentation-layer" class="color-blue">Layer 6 : The Presentation layer</h2>
</div>
</div>
<div class="Content" style="text-align: justify;">
<div class="hddn">
<ul>
<li>This layer is usually part of an operating system (OS) and converts incoming and outgoing data from one presentation form to another.</li>
</ul>
</div>
</div>
<div class="TextHeading" style="text-align: justify;">
<div class="hddn">
<h2 id="layer-7-the-application-layer" class="color-blue">Layer 7 : The Application layer</h2>
</div>
</div>
<div class="Content">
<div class="hddn">
<ul>
<li style="text-align: justify;">This is the layer at which communication partners are identified ,network capacity is assessed and where the data or application is presented in a visual form.</li>
<li style="text-align: justify;">This layer is not the application itself, it is the set of services an application should be able to make use of directly, although some applications may perform application-layer functions.</li>
</ul>
</div>
</div>
]]></content:encoded>
					
					<wfw:commentRss>https://www.wikitechy.com/interview-questions/networking/what-are-the-layers-of-osi/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>What is the difference between static and dynamic IP ?</title>
		<link>https://www.wikitechy.com/interview-questions/networking/what-is-the-difference-between-static-and-dynamic-ip/</link>
					<comments>https://www.wikitechy.com/interview-questions/networking/what-is-the-difference-between-static-and-dynamic-ip/#respond</comments>
		
		<dc:creator><![CDATA[Editor]]></dc:creator>
		<pubDate>Sat, 17 Jul 2021 19:12:49 +0000</pubDate>
				<category><![CDATA[Networking]]></category>
		<category><![CDATA[Accenture interview questions and answers]]></category>
		<category><![CDATA[advantages of dynamic ip addressbenefits of static ip from isp]]></category>
		<category><![CDATA[Allstate Solutions Pvt Ltd interview questions and answers]]></category>
		<category><![CDATA[Applied Mate interview questions and answers]]></category>
		<category><![CDATA[Atos interview questions and answers]]></category>
		<category><![CDATA[benefits of static ip address vs dynamic]]></category>
		<category><![CDATA[Bharti Airtel interview questions and answers]]></category>
		<category><![CDATA[Capgemini interview questions and answers]]></category>
		<category><![CDATA[CASTING NETWORKS INDIA PVT LIMITED interview questions and answers]]></category>
		<category><![CDATA[Ciena Corporation interview questions and answers]]></category>
		<category><![CDATA[Comodo India Interview Questions and Answers]]></category>
		<category><![CDATA[CSS Corp Pvt Ltd interview questions and answers]]></category>
		<category><![CDATA[Dell International Services India Pvt Ltd interview questions and answers]]></category>
		<category><![CDATA[difference between static and dynamic]]></category>
		<category><![CDATA[difference between static and dynamic ip]]></category>
		<category><![CDATA[difference between static and dynamic ip address]]></category>
		<category><![CDATA[difference between static and dynamic mapping]]></category>
		<category><![CDATA[difference between static ip and dynamic ip]]></category>
		<category><![CDATA[dynamic ip address definition]]></category>
		<category><![CDATA[dynamic ip address example]]></category>
		<category><![CDATA[dynamic ip router]]></category>
		<category><![CDATA[dynamic vs static]]></category>
		<category><![CDATA[Flipkart interview questions and answers]]></category>
		<category><![CDATA[global static ip address]]></category>
		<category><![CDATA[HCL Technologies interview questions and answers]]></category>
		<category><![CDATA[how to get a dynamic ip]]></category>
		<category><![CDATA[how to get a static ip address]]></category>
		<category><![CDATA[how to get a static public ip addres]]></category>
		<category><![CDATA[IBM interview questions and answers]]></category>
		<category><![CDATA[Indecomm Global Services interview questions and answers]]></category>
		<category><![CDATA[Infosys Technologies interview questions and answers]]></category>
		<category><![CDATA[is my ip address static or dynamic]]></category>
		<category><![CDATA[Mavenir interview questions and answers]]></category>
		<category><![CDATA[Mphasis interview questions and answers]]></category>
		<category><![CDATA[my static ip address]]></category>
		<category><![CDATA[NCR Corporation interview questions and answers]]></category>
		<category><![CDATA[NetApp interview questions and answers]]></category>
		<category><![CDATA[Oracle Corporation interview questions and answers]]></category>
		<category><![CDATA[PeopleStrong interview questions and answers]]></category>
		<category><![CDATA[R Systems interview questions and answers]]></category>
		<category><![CDATA[RBS India Development Centre Pvt Ltd interview questions and answers]]></category>
		<category><![CDATA[Reliance Industries Ltd interview questions and answers]]></category>
		<category><![CDATA[SAP Labs India Pvt Ltd interview questions and answers]]></category>
		<category><![CDATA[show to get a static external ip]]></category>
		<category><![CDATA[static and dynamic]]></category>
		<category><![CDATA[static and dynamic ip]]></category>
		<category><![CDATA[static and dynamic ip address]]></category>
		<category><![CDATA[static dynamic]]></category>
		<category><![CDATA[static ip address definition]]></category>
		<category><![CDATA[static ip address example]]></category>
		<category><![CDATA[static ip advantages]]></category>
		<category><![CDATA[static v dynamic]]></category>
		<category><![CDATA[static vs dynamic]]></category>
		<category><![CDATA[static vs dynamic ip]]></category>
		<category><![CDATA[Tata Communications interview questions and answers]]></category>
		<category><![CDATA[Tech Mahindra interview questions and answers]]></category>
		<category><![CDATA[types of ip]]></category>
		<category><![CDATA[UnitedHealth Group interview questions and answers]]></category>
		<category><![CDATA[Virtela interview questions and answers]]></category>
		<category><![CDATA[what is static and dynamic]]></category>
		<guid isPermaLink="false">https://www.wikitechy.com/interview-questions/?p=766</guid>

					<description><![CDATA[Answer : Static IP configured by the ISP...]]></description>
										<content:encoded><![CDATA[<div class="TextHeading">
<div class="hddn">
<h2 id="what-is-the-difference-between-static-and-dynamic-ip" class="color-pink" style="text-align: justify;">What is the difference between static and dynamic IP ?</h2>
<table class="table-bordered table-striped table table-responsive">
<tbody>
<tr>
<th>Static IP</th>
<th>Dynamic IP</th>
</tr>
<tr>
<td class="text-leftalign">Static IP configured by the <a href="https://www.wikitechy.com/interview-questions/networking/what-is-isp/" target="_blank" rel="noopener">ISP</a><br />
(Internet Service Provider)</td>
<td class="text-leftalign">Dynamic IP configured using <a href="https://www.wikitechy.com/interview-questions/networking/what-is-dhcp/" target="_blank" rel="noopener">DHCP</a><br />
(Dynamic Host Configuration Protocol) .</td>
</tr>
<tr>
<td class="text-leftalign">The static IP is fixed which means it could<br />
not be changed until the user wants to change it.</td>
<td class="text-leftalign">Dynamic IP changes each time when a user connects to a network.</td>
</tr>
<tr>
<td class="text-leftalign">The associated risk of <a href="https://www.wikitechy.com/final-year-project/dotnet/server-hacking/what-is-website" target="_blank" rel="noopener">website hacking</a> is large<br />
in static IP because it is always constant.</td>
<td class="text-leftalign">There is low risk regarding dynamic IP.</td>
</tr>
<tr>
<td class="text-leftalign">When the device is configured with static IP address,<br />
it can be tracked.</td>
<td class="text-leftalign">In case of dynamic <a href="https://forums.wikitechy.com/question/how-do-i-get-user-ip-address-in-django/" target="_blank" rel="noopener">IP address</a> the tracking of the device is difficult as the IP address is always changing.</td>
</tr>
<tr>
<td class="text-leftalign">Expensive than dynamic IP</td>
<td class="text-leftalign">Cheaper than static IP</td>
</tr>
<tr>
<td class="text-leftalign">Use <a href="https://www.wikitechy.com/interview-questions/networking/what-is-dns-and-dns-port-number/" target="_blank" rel="noopener">DNS</a> to map domain name to IP address,<br />
and use domain name to address<br />
the static IP address.</td>
<td class="text-leftalign">Use Dynamic DNS for dynamic IP address, but it&#8217;s not as clean as the static IP address.</td>
</tr>
<tr>
<td class="text-leftalign">No need of additional hardware or special configuration<br />
required in Single computers.</td>
<td class="text-leftalign">No need of additional hardware or special configuration required in Single computers.</td>
</tr>
<tr>
<td class="text-leftalign">Multiple computers requires a Switch or Hub.<br />
No special configuration required.</td>
<td class="text-leftalign">Multiple computers requires a <a href="https://www.wikitechy.com/technology/pro-hack-binatone-router-wifi-password/" target="_blank" rel="noopener">Router</a>.special configuration may be required.</td>
</tr>
</tbody>
</table>
</div>
</div>
<div class="text-center row" style="text-align: justify;">
<div class="col-sm-12">
<div id="bsa-zone_1590522538159-8_123456"></div>
</div>
</div>
<div class="ImageContent">
<div class="hddn"><img decoding="async" class="img-responsive center-block aligncenter" src="https://cdn.wikitechy.com/interview-questions/networking/what-is-the-difference-between-static-and-dynamic-ip-address.png" alt="What is the difference between static and dynamic IP" /></div>
</div>
]]></content:encoded>
					
					<wfw:commentRss>https://www.wikitechy.com/interview-questions/networking/what-is-the-difference-between-static-and-dynamic-ip/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>How to detect phishing ?</title>
		<link>https://www.wikitechy.com/interview-questions/networking/how-to-detect-phishing/</link>
					<comments>https://www.wikitechy.com/interview-questions/networking/how-to-detect-phishing/#respond</comments>
		
		<dc:creator><![CDATA[Editor]]></dc:creator>
		<pubDate>Sat, 17 Jul 2021 19:08:14 +0000</pubDate>
				<category><![CDATA[Networking]]></category>
		<category><![CDATA[7 ways to spot phishing email]]></category>
		<category><![CDATA[Accenture interview questions and answers]]></category>
		<category><![CDATA[Allstate Solutions Pvt Ltd interview questions and answers]]></category>
		<category><![CDATA[Applied Mate interview questions and answers]]></category>
		<category><![CDATA[Atos interview questions and answers]]></category>
		<category><![CDATA[Bharti Airtel interview questions and answers]]></category>
		<category><![CDATA[Capgemini interview questions and answers]]></category>
		<category><![CDATA[CASTING NETWORKS INDIA PVT LIMITED interview questions and answers]]></category>
		<category><![CDATA[Ciena Corporation interview questions and answers]]></category>
		<category><![CDATA[Comodo India Interview Questions and Answers]]></category>
		<category><![CDATA[CSS Corp Pvt Ltd interview questions and answers]]></category>
		<category><![CDATA[Dell International Services India Pvt Ltd interview questions and answers]]></category>
		<category><![CDATA[Flipkart interview questions and answers]]></category>
		<category><![CDATA[HCL Technologies interview questions and answers]]></category>
		<category><![CDATA[how can you identify a phishing email]]></category>
		<category><![CDATA[how to detect phishing attacks]]></category>
		<category><![CDATA[how to identify a spam email]]></category>
		<category><![CDATA[how to prevent phishing]]></category>
		<category><![CDATA[how to prevent phishing and spoofing]]></category>
		<category><![CDATA[how to prevent spam mail]]></category>
		<category><![CDATA[how to prevent spear phishing]]></category>
		<category><![CDATA[how to protect against phishing]]></category>
		<category><![CDATA[how to recognize spam email]]></category>
		<category><![CDATA[how to stop phishing emails]]></category>
		<category><![CDATA[how to stop phishing emails in gmail]]></category>
		<category><![CDATA[how to stop phishing emails outlook]]></category>
		<category><![CDATA[IBM interview questions and answers]]></category>
		<category><![CDATA[identify a phishing attack]]></category>
		<category><![CDATA[Indecomm Global Services interview questions and answers]]></category>
		<category><![CDATA[Infosys Technologies interview questions and answers]]></category>
		<category><![CDATA[Mavenir interview questions and answers]]></category>
		<category><![CDATA[Mphasis interview questions and answers]]></category>
		<category><![CDATA[NCR Corporation interview questions and answers]]></category>
		<category><![CDATA[NetApp interview questions and answers]]></category>
		<category><![CDATA[Oracle Corporation interview questions and answers]]></category>
		<category><![CDATA[PeopleStrong interview questions and answers]]></category>
		<category><![CDATA[phishing]]></category>
		<category><![CDATA[phishing attack]]></category>
		<category><![CDATA[phishing attempt]]></category>
		<category><![CDATA[phishing definition]]></category>
		<category><![CDATA[phishing email]]></category>
		<category><![CDATA[phishing email checker]]></category>
		<category><![CDATA[phishing email examples]]></category>
		<category><![CDATA[phishing mail]]></category>
		<category><![CDATA[phishing meaning]]></category>
		<category><![CDATA[phishing prevention best practices]]></category>
		<category><![CDATA[phishing scams]]></category>
		<category><![CDATA[phishing warning sign]]></category>
		<category><![CDATA[pishing]]></category>
		<category><![CDATA[R Systems interview questions and answers]]></category>
		<category><![CDATA[RBS India Development Centre Pvt Ltd interview questions and answers]]></category>
		<category><![CDATA[Reliance Industries Ltd interview questions and answers]]></category>
		<category><![CDATA[SAP Labs India Pvt Ltd interview questions and answers]]></category>
		<category><![CDATA[show to prevent phishing]]></category>
		<category><![CDATA[show to protect yourself against phishing threat]]></category>
		<category><![CDATA[spear phishing]]></category>
		<category><![CDATA[spear phishing examples]]></category>
		<category><![CDATA[spotting spam emails]]></category>
		<category><![CDATA[Tata Communications interview questions and answers]]></category>
		<category><![CDATA[Tech Mahindra interview questions and answers]]></category>
		<category><![CDATA[UnitedHealth Group interview questions and answers]]></category>
		<category><![CDATA[Virtela interview questions and answers]]></category>
		<category><![CDATA[what does phishing mean]]></category>
		<category><![CDATA[what is phishing]]></category>
		<guid isPermaLink="false">https://www.wikitechy.com/interview-questions/?p=764</guid>

					<description><![CDATA[Answer : There are 5 ways to detect a phishing...]]></description>
										<content:encoded><![CDATA[<div class="TextHeading">
<div class="hddn">
<h2 id="how-to-detect-phishing" class="color-pink" style="text-align: justify;">How to detect phishing ?</h2>
</div>
</div>
<p style="text-align: justify;">There are 5 ways to detect a phishing.They are</p>
<div class="Content" style="text-align: justify;">
<div class="hddn">
<ol>
<li style="list-style-type: none;">
<ol>
<li><b>The email is sent from a public email address</b> &#8211; The sender’s <a href="https://www.wikitechy.com/tutorials/linux/how-to-send-a-file-as-an-email-attachment-using-linux-command-line" target="_blank" rel="noopener">email</a> address, as this can help identify if the person is truly who they claim to be. Frequently, the criminal will use a public <a href="https://www.wikitechy.com/tutorials/javascript/valid-email-address-in-javascript" target="_blank" rel="noopener">email address</a> such as gmail.com. If your bank or team mate is going to email you, it will come from a company email account with the company name in the <a href="https://www.wikitechy.com/angularjs/directives/angularjs-input-email" target="_blank" rel="noopener">email</a> address.</li>
<li><b>Strange attachments</b> &#8211; If you receive an unexpected <a href="https://forums.wikitechy.com/question/using-the-facebook-graph-api-how-to-get-users-email/" target="_blank" rel="noopener">email</a> or an email from someone you don’t know asking you to open an attachment, do not open it. These attachments can contain malware that can damage your computer and capture your personal data.</li>
<li><b>The creation of a sense of urgency</b> &#8211; Phishing <a href="https://www.wikitechy.com/php/php-email-verification-script-for-downloading-e-book" target="_blank" rel="noopener">emails</a> often ask recipients to verify personal information, such as bank details or a password. They can create a sense of urgency by warning that your account has experienced doubtful activity or imagining to be someone you know who is in urgent need of financial help.These are massive warning signs. If you are ever unsure, contact the company or person using the contact details you already have for them or that are on their genuine website. Never use any contact details or click any links provided in the email.How to detect phishing ? &#8211; The email is sent from a public email address.Look at the sender’s email address, as this can help identify if the person is truly who they claim to be. Often, the criminal will use a public email address such as gmail.com.</li>
</ol>
</li>
</ol>
<ol>
<li><b>Links to unrecognised sites or URLs that misspell a familiar domain name</b> &#8211; Phishing emails may ask you to click a link within the email. By hovering your mouse over the link or address, you can see the linked site’s true URL. These URLs can be slightly misspelled or completely different to what you are expecting, so always double check before you click.</li>
<li><b>Poor spelling and grammar</b> &#8211; You can often detect a phishing email by the way it is written. The writing style might be different to that usually used by the sender and it might contain spelling mistakes and poor grammar.</li>
</ol>
</div>
</div>
<p style="text-align: justify;">One of the reasons behind the large increase in phishing attacks is the lack of basic knowledge about them. People are fundamental to cyber security, so it is vital that they can detect security threats and know how to respond.A cyber health check will help you identify your weakest security areas and recommend appropriate measures to mitigate your risks. This includes an online staff questionnaire, whose results will be analysed to gauge their cyber security awareness.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.wikitechy.com/interview-questions/networking/how-to-detect-phishing/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>What is Spam ?</title>
		<link>https://www.wikitechy.com/interview-questions/networking/what-is-spam/</link>
					<comments>https://www.wikitechy.com/interview-questions/networking/what-is-spam/#respond</comments>
		
		<dc:creator><![CDATA[Editor]]></dc:creator>
		<pubDate>Sat, 17 Jul 2021 19:04:02 +0000</pubDate>
				<category><![CDATA[Networking]]></category>
		<category><![CDATA[Accenture interview questions and answers]]></category>
		<category><![CDATA[Allstate Solutions Pvt Ltd interview questions and answers]]></category>
		<category><![CDATA[Applied Mate interview questions and answers]]></category>
		<category><![CDATA[Atos interview questions and answers]]></category>
		<category><![CDATA[best spam messages]]></category>
		<category><![CDATA[Bharti Airtel interview questions and answers]]></category>
		<category><![CDATA[Capgemini interview questions and answers]]></category>
		<category><![CDATA[CASTING NETWORKS INDIA PVT LIMITED interview questions and answers]]></category>
		<category><![CDATA[Ciena Corporation interview questions and answers]]></category>
		<category><![CDATA[Comodo India Interview Questions and Answers]]></category>
		<category><![CDATA[craigslist spam email examples]]></category>
		<category><![CDATA[CSS Corp Pvt Ltd interview questions and answers]]></category>
		<category><![CDATA[define spam]]></category>
		<category><![CDATA[Dell International Services India Pvt Ltd interview questions and answers]]></category>
		<category><![CDATA[example spam email for testing]]></category>
		<category><![CDATA[examples of common spam emails]]></category>
		<category><![CDATA[examples of computer spam]]></category>
		<category><![CDATA[Flipkart interview questions and answers]]></category>
		<category><![CDATA[HCL Technologies interview questions and answers]]></category>
		<category><![CDATA[how to avoid spam and virus]]></category>
		<category><![CDATA[how to block spam]]></category>
		<category><![CDATA[how to eliminate spam email]]></category>
		<category><![CDATA[how to get rid of spam mail]]></category>
		<category><![CDATA[IBM interview questions and answers]]></category>
		<category><![CDATA[Indecomm Global Services interview questions and answers]]></category>
		<category><![CDATA[Infosys Technologies interview questions and answers]]></category>
		<category><![CDATA[is this email address spam]]></category>
		<category><![CDATA[Mavenir interview questions and answers]]></category>
		<category><![CDATA[Mphasis interview questions and answers]]></category>
		<category><![CDATA[NCR Corporation interview questions and answers]]></category>
		<category><![CDATA[NetApp interview questions and answers]]></category>
		<category><![CDATA[Oracle Corporation interview questions and answers]]></category>
		<category><![CDATA[PeopleStrong interview questions and answers]]></category>
		<category><![CDATA[R Systems interview questions and answers]]></category>
		<category><![CDATA[RBS India Development Centre Pvt Ltd interview questions and answers]]></category>
		<category><![CDATA[Reliance Industries Ltd interview questions and answers]]></category>
		<category><![CDATA[report spam meaning]]></category>
		<category><![CDATA[SAP Labs India Pvt Ltd interview questions and answers]]></category>
		<category><![CDATA[spam]]></category>
		<category><![CDATA[spam attack]]></category>
		<category><![CDATA[spam computer]]></category>
		<category><![CDATA[spam email address example]]></category>
		<category><![CDATA[spam email list]]></category>
		<category><![CDATA[spam email meaning]]></category>
		<category><![CDATA[spam mail meaning]]></category>
		<category><![CDATA[spam messages example]]></category>
		<category><![CDATA[spam virus]]></category>
		<category><![CDATA[spam virus definition]]></category>
		<category><![CDATA[Tata Communications interview questions and answers]]></category>
		<category><![CDATA[Tech Mahindra interview questions and answers]]></category>
		<category><![CDATA[types of spam email]]></category>
		<category><![CDATA[UnitedHealth Group interview questions and answers]]></category>
		<category><![CDATA[Virtela interview questions and answers]]></category>
		<category><![CDATA[what is spam]]></category>
		<category><![CDATA[what is spam email]]></category>
		<category><![CDATA[what is spam in computer]]></category>
		<category><![CDATA[what is spam mail]]></category>
		<category><![CDATA[what is spam mail in gmail]]></category>
		<category><![CDATA[what is the purpose of spam emails]]></category>
		<category><![CDATA[whats in spam]]></category>
		<guid isPermaLink="false">https://www.wikitechy.com/interview-questions/?p=762</guid>

					<description><![CDATA[Answer : Spam is garbage mail or garbage newsgroup postings...]]></description>
										<content:encoded><![CDATA[<div class="TextHeading">
<div class="hddn">
<h2 id="what-is-spam" class="color-pink" style="text-align: justify;">What is Spam ?</h2>
</div>
</div>
<div class="Content" style="text-align: justify;">
<div class="hddn">
<ul>
<li>Spam is garbage mail or garbage newsgroup postings and also the spam is defined as unsolicited email.</li>
<li>However, if a long-lost person finds your email address and sends you a message, this could hardly be called spam, even though it is unsolicited.</li>
<li>Real spam is generally email advertising for some product sent to a mailing list or newsgroup.</li>
<li>Unsolicited commercial email messages sent in bulk, often to a purchased (or stolen) mailing list that contained your address.</li>
<li>Counterfeit messages from reliable senders that attempt to trick you into supplying your personal information.</li>
<li>Misleading messages from people you know whose email accounts have been <a href="https://www.wikitechy.com/tutorials/ethical-hacking/" target="_blank" rel="noopener">hacked</a>.</li>
<li>Not all spam is illegal, but some of it is.</li>
</ul>
</div>
</div>
<div class="TextHeading" style="text-align: justify;">
<div class="hddn">
<h2 id="types-of-spam-email" class="color-green">Types of spam email</h2>
</div>
</div>
<div class="TextHeading" style="text-align: justify;">
<div class="hddn">
<h2 id="phishing-fraud-email" class="color-blue">Phishing Fraud Email</h2>
<ul>
<li><a href="https://www.wikitechy.com/technology/best-tips-prevent-secure-phishing-attacks/" target="_blank" rel="noopener">Phishing spam</a> is sent to trick recipients into visiting a website and provide financial information such as a credit card number or other sensitive data.</li>
<li>This spam is cleverly disguised and at first glance actually appear to be from the institution that they are masking.</li>
<li>This type of spam is fraudulent, mis-representative and potentially damaging to the recipient.</li>
</ul>
</div>
</div>
<div class="ImageContent" style="text-align: justify;">
<div class="hddn">
<h2 id="example-update-your-account">Example: Update Your Account</h2>
<p><img decoding="async" class="img-responsive center-block aligncenter" src="https://cdn.wikitechy.com/interview-questions/networking/web-mail-slide.png" alt=" Phishing Fraud Email " /></p>
</div>
</div>
<div class="TextHeading" style="text-align: justify;">
<div class="hddn">
<h2 id="emotional-scam-email" class="color-blue">Emotional Scam Email</h2>
</div>
</div>
<ul style="text-align: justify;">
<li>This type of spam attempts to trick email recipients by playing on their emotions.</li>
<li>This is done primarily in two ways; either by raising the hopes of the recipient with suggestions of monetary winnings (i.e. lottery or International Money Transfer <a href="https://www.wikitechy.com/technology/find-whether-pc-infected-phone-scam/" target="_blank" rel="noopener">scams</a>) or by playing on their sentimental nature (illness, romance, etc.).</li>
</ul>
<h2 id="a-good-example-of-this-is-the-microsoft-global-email-lottery-spam" style="text-align: justify;">A good example of this is the Microsoft Global Email Lottery Spam.</h2>
<div class="ImageContent" style="text-align: justify;">
<div class="hddn"><img decoding="async" class="img-responsive center-block aligncenter" src="https://cdn.wikitechy.com/interview-questions/networking/emotional-scam.gif" alt=" Emotional Scam Email" /></div>
</div>
<div class="TextHeading" style="text-align: justify;">
<div class="hddn">
<h2 id="virus-and-malware-email" class="color-blue">Virus and Malware Email</h2>
</div>
</div>
<ul style="text-align: justify;">
<li>This type of <a href="https://www.wikitechy.com/technology/what-is-an-email-alias-and-how-to-set-it-up-on-gmail-and-outlook/" target="_blank" rel="noopener">email</a> spam will include an attachment or a link to a file that will trigger some virus of <a href="https://www.wikitechy.com/technology/how-to-protect-android-device-against-malware/" target="_blank" rel="noopener">malware</a> to install to the recipients computer when the attachment is opened or the link visited.</li>
<li>Sometimes they are sent automatically from one computer to others using scripts in the <a href="https://www.wikitechy.com/tutorials/ethical-hacking/how-virus-works" target="_blank" rel="noopener">virus</a> that cause the recipient computer to forward it on to other people in their address book without the recipient’s knowledge.</li>
<li>Because these emails appear to be coming from someone that you know, they make recipients vulnerable.</li>
<li>The objective of virus spam is to spread computer viruses across networks via email.</li>
</ul>
<h2 id="example-virus-attachement-email" style="text-align: justify;">Example: Virus attachement email</h2>
<div class="ImageContent" style="text-align: justify;">
<div class="hddn"><img decoding="async" class="img-responsive center-block aligncenter" src="https://cdn.wikitechy.com/interview-questions/networking/virus-and-malware-email.jpg" alt="Virus and Malware Email" /></div>
</div>
<div class="TextHeading" style="text-align: justify;">
<div class="hddn">
<h2 id="viagra-replica-watch-stock-and-weight-loss-email" class="color-blue">Viagra, Replica Watch, Stock and Weight Loss Email</h2>
<ul>
<li>Viagra, Replica Watch, Stock and Weight Loss Email spam is very common. Most of us are inundated with emails encouraging us to purchase prescription medications, replica watches or stock of some kind.</li>
<li>This type of spam doesn’t pretend to be anything but an unsolicited attempt to get people to click &#8211; and people do (one in every 12,500,000 spam messages that are sent!) &#8211; that’s why we keep getting it.</li>
<li>This spam burdens computer resources and networks. As a result, it costs companies and individuals time, productivity and money for anti-spam technology required to reduce it.</li>
</ul>
</div>
</div>
<h2 id="example-online-purchase" style="text-align: justify;">Example: Online purchase</h2>
<div class="ImageContent" style="text-align: justify;">
<div class="hddn"><img decoding="async" class="img-responsive center-block aligncenter" src="https://cdn.wikitechy.com/interview-questions/networking/what-is-spam-viagra.gif" alt="What is Spam Vigra" /></div>
</div>
<div class="TextHeading" style="text-align: justify;">
<div class="hddn">
<h2 id="nonsensical-email" class="color-blue">Nonsensical Email</h2>
</div>
</div>
<ul style="text-align: justify;">
<li>This type of email spam includes those email spam messages that many people receive which don’t appear to have any rationale whatsoever.</li>
<li>They aren’t trying to sell us anything.They do not contain viruses or malware. They don’t try so promote websites or defraud us in any way.</li>
<li>The objective of nonsensical spam is simply to test anti-spam and content filters so that spammers can more successfully deliver future messages.</li>
</ul>
<h2 id="example-nonsensical-email" style="text-align: justify;">Example: Nonsensical Email</h2>
<div class="ImageContent" style="text-align: justify;">
<div class="hddn"><img decoding="async" class="img-responsive center-block aligncenter" src="https://cdn.wikitechy.com/interview-questions/networking/nonsensical-email.gif" alt=" Nonsensical Email " /></div>
</div>
<div class="TextHeading" style="text-align: justify;">
<div class="hddn">
<h2 id="unsolicited-commercial-email" class="color-blue">Unsolicited Commercial Email</h2>
</div>
</div>
<ul style="text-align: justify;">
<li>This type of <a href="https://www.wikitechy.com/tutorials/android/android-send-email-intent" target="_blank" rel="noopener">email</a> messages sent from actual businesses who are trying to spread the news and generate sales for their products and services via email to people who did not sign up directly to receive email from them.</li>
<li>This email based on a promotion of a product.</li>
</ul>
<h2 id="example-email-marketing-promotions" style="text-align: justify;">Example: Email marketing promotions</h2>
<div class="ImageContent">
<div class="hddn"><img decoding="async" class="img-responsive center-block aligncenter" src="https://cdn.wikitechy.com/interview-questions/networking/unsolicited-commercial-email-spam.gif" alt=" Unsolicited Commercial Email" /></div>
</div>
]]></content:encoded>
					
					<wfw:commentRss>https://www.wikitechy.com/interview-questions/networking/what-is-spam/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
	</channel>
</rss>
