# NE assesement

| **Layer** | **Question** | **Best Answer** | **Explanation** |
|-----------|-------------|-----------------|-----------------|
| **1 - Physical** | What are the differences between single-mode and multi-mode fiber in terms of distance and bandwidth? | **Single-mode fiber (SMF)** supports longer distances (up to 40 km) using a small core and a laser light source, while **multi-mode fiber (MMF)** is limited to shorter distances (typically up to 550m) using an LED light source. | SMF is preferred for long-haul and metro networks, whereas MMF is used in short-range applications like data centers. |
| **1 - Physical** | How does signal attenuation affect network performance, and how can you mitigate it in fiber and copper cabling? | Signal attenuation weakens signals over distance. In **copper**, use repeaters or shorter cables. In **fiber**, use higher-quality optics and proper splicing. | Attenuation leads to packet loss and slower speeds; fiber is less prone to interference than copper. |
| **2 - Data Link** | What is the difference between VLANs and VXLANs, and how do they impact network segmentation? | VLANs segment Layer 2 traffic within a local network, while VXLANs extend Layer 2 segments over Layer 3 using encapsulation (UDP port 4789). | VXLANs allow scalability beyond traditional VLANs (4094 limit) and support multi-tenant cloud environments. |
| **2 - Data Link** | Explain how Spanning Tree Protocol (STP) prevents network loops and describe one alternative protocol that can replace STP. | STP detects and disables redundant links to prevent loops, using a root bridge election. **Alternative:** **RSTP (Rapid STP)** provides faster convergence, or **TRILL/SPB** eliminates the need for STP by using shortest-path forwarding. | Without STP, broadcast storms can cripple networks. Modern alternatives improve convergence and efficiency. |
| **3 - Network** | How does BGP determine the best route to a destination, and what factors can influence its decision? | BGP selects the best path using attributes like AS-Path (shortest route wins), Local Preference (higher is better), MED (lower is preferred), and Next-Hop reachability. | BGP is a path-vector protocol used for inter-domain routing and is critical for internet and ISP-level routing. |
| **3 - Network** | Explain the difference between NAT, PAT, and how they impact IPv4 addressing in a corporate environment. | **NAT (Network Address Translation)** maps private IPs to a public IP; **PAT (Port Address Translation)** allows multiple private IPs to share one public IP using port numbers. | PAT is widely used in enterprises to conserve public IPs, enabling many devices to access the internet using a single IP. |
| **4 - Transport** | Compare and contrast TCP and UDP. In what scenarios would you choose one over the other? | **TCP** is reliable (error checking, retransmissions) and used for HTTP, SSH, etc. **UDP** is faster but unreliable, used for VoIP, DNS, and video streaming. | TCP is preferred for critical applications, while UDP is used when low latency is required. |
| **4 - Transport** | Explain the significance of the TCP three-way handshake and how it impacts security vulnerabilities such as SYN floods. | The handshake (SYN → SYN-ACK → ACK) establishes a connection. **SYN flood attacks** exploit this by sending repeated SYNs without completing the handshake. | Firewalls and SYN cookies can help mitigate SYN flood attacks by preventing resource exhaustion. |
| **5 - Session** | How does SSL/TLS establish a secure session between a client and a server? | It uses asymmetric encryption for key exchange (handshake) and symmetric encryption for data transfer (AES, ChaCha20). | TLS ensures confidentiality, integrity, and authentication using certificates (X.509). |
| **5 - Session** | What is the role of session persistence (sticky sessions) in load balancing, and how does it affect performance? | It ensures requests from the same client go to the same backend server, improving user experience. | While helpful for stateful applications, it can cause uneven load distribution if not managed properly. |
| **6 - Presentation** | How do encryption and compression impact network performance at the presentation layer? | Encryption secures data but increases CPU usage. Compression reduces data size, improving transmission speeds. | Balancing security (encryption) and efficiency (compression) is key in optimizing network performance. |
| **6 - Presentation** | Explain the difference between Base64 encoding and actual encryption. In what scenarios would you use each? | **Base64** encodes data for safe transport but is reversible. **Encryption (AES, RSA, etc.)** secures data by making it unreadable without a key. | Use Base64 for data encoding (e.g., email attachments). Use encryption for security (e.g., passwords, confidential data). |
| **7 - Application** | What are the differences between HTTP/1.1, HTTP/2, and HTTP/3 in terms of performance and security? | HTTP/1.1 uses sequential requests; HTTP/2 introduces multiplexing and header compression; HTTP/3 uses QUIC for lower latency and better security. | HTTP/3 improves web performance by reducing round-trip delays and mitigating TCP head-of-line blocking. |
| **7 - Application** | How does DNS caching work, and what are the security risks associated with DNS cache poisoning? | DNS caching stores query results locally to speed up lookups. **Cache poisoning** injects malicious IP mappings into caches, redirecting users to fraudulent sites. | Mitigations include **DNSSEC** (signing records) and validating responses to prevent tampering. |
| **7 - Application** | What is the role of an API gateway in modern cloud networking, and how does it impact microservices architectures? | It manages API traffic, enforcing authentication, rate limiting, and load balancing for microservices. | API gateways help decouple services, improve security, and enable scalable architectures. |