Vous êtes sur la page 1sur 16

Tips for Crack a Server Administrator /

Network Enginear Interview


Q.1 Explain the concept of DHCP.
Q.2- Explain IP datagram, Fragmentation and MTU.
Answers:
IP datagram can be used to describe a portion of IP data. Each IP datagram has set
of fields arranged in an order. The order is specific which helps to decode and
read the stream easily. IP datagram has fields like Version, header length, Type of
service, Total length, checksum, flag, protocol, Time to live, Identification, source
and destination ip address, padding, options and payload.
MTU:- Maximum Transmission Unit is the size of the largest packet that a
communication protocol can pass. The size can be fixed by some standard or
decided at the time of connection
Fragmentation is a process of breaking the IP packets into smaller pieces.
Fragmentation is needed when the datagram is larger than the MTU. Each
fragment becomes a datagram in itself and transmitted independently from source.
When received by destination they are reassembled.
Q.3- What is "Gateway Of Last Resort"?
Answers:
A Gateway of Last Resort or Default gateway is a route used by the router when
no other known route exists to transmit the IP packet. Known routes are present in
the routing table. Hence, any route not known by the routing table is forwarded to
the default route. Each router which receives this packet will treat the packet the
same way, if the route is known, packet will be forwarded to the known route.
Q.4 What is VPN?
Answers:
A VPN is a service that offers secure, reliable connectivity over a shared public
network infrastructure such as the Internet. VPNs maintain the same security and
management policies as a private network. They are the most cost effective
method of establishing a virtual point-to-point connection between remote users
and an enterprise customer's network.

VPN(VIrtual Private Network)is a service which is usd for making connectivity


of remote user with its corporate network. VPN is point to point connection and is
used through internet.It makes pipelining between user & network, means user
can access their secure data through internet with full safety.?VPNs rely on
tunneling to create a private network that reaches across the Internet. Essentially,
tunneling is the process of placing an entire packet within another packet and
sending it over a network. The protocol of the outer packet is understood by the
network and both points, called tunnel interfaces, where the packet enters and
exits the network.
Q.5- Explain Circuit Level Gateway?
Answers:
A circuit level gateway is used to find if a session in TCP handshaking is
legitimate or not. It can be considered as a layer between application layer and
transport layer. They protect the information of the private network they protect.
Circuit level gateways do not filter packets.
Q.6- Explain the 7 Layers of OSI.
Q.7- What are the differences between a domain and a workgroup?
Q.8- What are Ping and Tracert?
Answers:
Ping and tracert are the commands used to send information to some remote
computers to receive some information. Information is sent and received by
packets. Ping I particularly used to check if the system is in network or not. It also
gives packet lost information. In windows ping command is written as ping
ip_address Tracert is called as trace route. It is used to track or trace the path the
packet takes from the computer where the command is given until the destination.
In windows ping command is written as tracert ip_address
ping is acknowledgement to our system for connecting to internet
ex:ping 192.168.63.233
tracert is used for how the data packets or you typed addresses are reached
destination to you .
ex:tracert www.google.com
note:perform on dos.

Q.9- Explain how NAT works?


Answers:
Network Address Translation translates and IP address used in a network to
another IP address known within another network. A NAT table is maintained for
global to local and local to mapping of IP?s. NAT can be statically defined or
dynamically translate from a pool of addresses. The NAT router is responsible for
translating traffic coming and leaving the network. NAT prevents malicious
activity initiated by outside hosts from reaching local hosts by being dependent on
a machine on the local network to initiate any connection to hosts on the other
side of the router.
Packet format:Flag field: 1 byte: - Indicates frames beginning or end
Address field: 1 byte: - Used for broadcast address (destination address)
Control field: 1 byte: - Used as a control byte
Protocol field: - 1 or 2 bytes: - Setting of protocol in information field (of
datagram)
Information: - 0 or more bytes: - Datagram (whether it contains data or
control information)
Padding: - 0 or more bytes: - optional padding
FCS: - 2 or more bytes: - error check sum
Basically NAT works as a translater it translate the system ip to public ip and it
uses in router it enhanced the security it privent the unauthirised users to access
Q.10- What is the use of IGMP protocol?
Answers:
Internet Group Management Protocol: - It allows internet hosts to participate
in multicasting. The IGMP messages are used to learn which hosts is part of
which multicast groups. The mechanism also allow a host to inform its local
router, that it wants to receive messages.
Q.11- Describe Application layer.
Q.12- What Is a MAC Address?
Q.13- Define Spanning-Tree Protocol (STP)
Answers:
Spanning-Tree Protocol (STP) as defined in the IEEE 802.1D is a link
management protocol that provides path redundancy while preventing undesirable
loops in the network. For an Ethernet network to function properly, only one

active path can exist between two stations. Loops occur in networks for a variety
of reasons. The most common reason you find loops in networks is the result of a
deliberate attempt to provide redundancy - in case one link or switch fails, another
link or switch can
Q.14- what is difference between windows xp and windows 7
Answers:
Window 7 having the built in protection againsts spyware and maliculous
softwares with Window defender but Win xp dont have the same.
Q.15- What is CSMA and CD concept?
Answers:
In CSDA (carrier sense multiple access), presence of any digital signal in a
network is checked before transmission. Data transmission occurs only when no
signal is sensed.
CD, Collision detection is responsible for monitoring carrier in order to avoid
signal jam.
Q.16.- what vpn connection?
Q.17- Define File Transfer Protocol.
Q.18- What is multicasting?
Answers:
Multicasting allows a single message to be sent to a group of recipients. Emailing,
teleconferencing, are examples of multicasting. It uses the network infrastructure
and standards to send messages.

Q.19- Explain RSVP. How does it work?


Answers:
Resource Reservation protocol is used to reserve resources across a network. It is
used for requesting a specific Quality of Service (QoS) from the network. This is
done by carrying the request (that needs a reservation of the resource) of the host
throughout the network. It visits each node in the network. RSVP used two local
modules for reservation of resources. Admission control module confirms if there
are sufficient available resources while policy module checks for the permission

of making a reservation. RSVP offers scalability. On a successful completion of


both checks RSVP uses the packet classifier and packet scheduler for the desired
Qos requested.
Q.20- Explain how NAT works?
Q.21- What is IP Spoofing and how can it be prevented?
Answers:
IP spoofing is a mechanism used by attackers to gain unauthorized access to a
system. Here, the intruder sends messages to a computer with an IP address
indicating that the message is coming from a trusted host. This is done by forging
the header so it contains a different address and make it appear that the packet
was sent by a different machine.
Prevention:Packet filtering: - to allow packets with recognized formats to enter the network
Using special routers and firewalls.
Encrypting the session
Q.22- What is an application gateway?
Answers:
An application gateway is an application program that runs on a firewall between
two networks. An application gateway is used for establishing connection
between client program and destination service. The client negotiates with the
gateway to communicate with the service of destination. Here, gateway can be
called as a proxy. Hence, two connections are made. One between client and
proxy; other, between proxy and destination service. Connections take place
behind the firewall
Q.23- What is the difference Between an Intranet and the Internet?
Answers:
There's one major distinction between an intranet and the Internet: The Internet is
an open, public space, while an intranet is designed to be a private space. An
intranet may be accessible from the Internet, but as a rule it's protected by a
password and accessible only to employees or other authorized users.
From within a company, an intranet server may respond much more quickly than
a typical Web site. This is because the public Internet is at the mercy of traffic
spikes, server breakdowns and other problems that may slow the network. Within
a company, however, users have much more bandwidth and network hardware

may be more reliable. This makes it easier to serve high-bandwidth content, such
as audio and video, over an intranet.
W.24- Define the term Protocol.
Answers:
Protocol is a standard way of communicating across a network. A protocol is the
"language" of the network. It is a method by which two dissimilar systems can
communicate. TCP is a protocol which runs over a network.
protocol is set of rule and regulation for how to trasmite data over the network.the
meaning of protocol is who have more knolege about language that can comnicate
between two person.just doing like same protocol..
Q.25- What is a network? What are the different kinds of network? Explain
them.
Q.26- Explain the functionality of PING.
Q.27- Explain the core naming mechanism, Domain Name System (DNS).
Q.28- Define Telnet?
Q.29- Define SMTP?
Q.30- Define broadcast domain?
Answers:
It is a logical area in a computer network where any computer connected to the
network can directly transmit to any other computer in the domain without having
to go through a routing device.
Q.31- What is a Router?
Q.32- What is firewall?

Q.33- What are the types of firewalls?


Answers:

Packet Filtering Firewall:


This type of Firewall detects packets and block unnecessary packets and makes
network traffic release.
Screening Router Firewalls:
It's a software base firewall available in Router provides only light filtering.
Computer-based Firewall:
It's a firewall stored in server with an existing Operating System like Windows
and UNIX.
Hardware base Firewall:
Its device like box allows strong security from public network. Mostly used by
big networks.
Proxy Server:
Proxy server allows all clients to access Internet with different access limits.
Proxy server has its own firewall which filters the all packet from web server.
Q.34- What is Data encryption?
Answers:
Data encryption ensures data safety and very important for confidential or critical
data. It protect data from being read, altered or forged while transmission.
Data Encryption provides data security. Once the user has encrypted that data
nobody can access that data only the user who has encrypted it can only access it.
Q.35- What is the Public Key Encryption?
Answers:
Public key encryption use public and private key for encryption and decryption.
In this mechanism, public key is used to encrypt messages and only the
corresponding private key can be used to decrypt them. To encrypt a message, a
sender has to know recipient?s public key.
Q.36- What is Digital Signatures?
Answers:
Digital signature is an attachment to an electronic message used for security
purpose. It is used to verify the authenticity of the sender.
Q.37- What is Ethernet technology?
Q.38- what vpn connection?

Technical Interview Questions Networking


* What is an IP address?
* What is a subnet mask?
* What is ARP?
* What is ARP Cache Poisoning?
* What is the ANDing process?
* What is a default gateway? What happens if I don't have one?
* Can a workstation computer be configured to browse the Internet and
yet NOT have a default gateway?
* What is a subnet?
* What is APIPA?
* What is an RFC? Name a few if possible (not necessarily the numbers,
just the ideas behind them)
* What is RFC 1918?
* What is CIDR?
* You have the following Network ID: 192.115.103.64/27. What is the IP
range for your network?
* You have the following Network ID: 131.112.0.0. You need at least 500
hosts per network. How many networks can you create? What subnet
mask will you use?
* You need to view at network traffic. What will you use? Name a few tools
* How do I know the path that a packet takes to the destination?
* What does the ping 192.168.0.1 -l 1000 -n 100 command do?
* What is DHCP? What are the benefits and drawbacks of using it?
* Describe the steps taken by the client and DHCP server in order to
obtain an IP address.
* What is the DHCPNACK and when do I get one? Name 2 scenarios.
* What ports are used by DHCP and the DHCP clients?
* Describe the process of installing a DHCP server in an AD
infrastructure.
* What is DHCPINFORM?
* Describe the integration between DHCP and DNS.
* What options in DHCP do you regularly use for an MS network?
* What are User Classes and Vendor Classes in DHCP?
* How do I configure a client machine to use a specific User Class?

* What is the BOOTP protocol used for, where might you find it in
Windows network infrastructure?
* DNS zones describe the differences between the 4 types.
* DNS record types describe the most important ones.
* Describe the process of working with an external domain name
* Describe the importance of DNS to AD.
* Describe a few methods of finding an MX record for a remote domain on
the Internet.
* What does "Disable Recursion" in DNS mean?
* What could cause the Forwarders and Root Hints to be grayed out?
* What is a "Single Label domain name" and what sort of issues can it
cause?
* What is the "in-addr.arpa" zone used for?
* What are the requirements from DNS to support AD?
* How do you manually create SRV records in DNS?
* Name 3 benefits of using AD-integrated zones.
* What are the benefits of using Windows 2003 DNS when using ADintegrated zones?
* You installed a new AD domain and the new (and first) DC has not
registered its SRV records in DNS. Name a few possible causes.
* What are the benefits and scenarios of using Stub zones?
* What are the benefits and scenarios of using Conditional Forwarding?
* What are the differences between Windows Clustering, Network Load
Balancing and Round Robin, and scenarios for each use?
* How do I work with the Host name cache on a client computer?
* How do I clear the DNS cache on the DNS server?
* What is the 224.0.1.24 address used for?
* What is WINS and when do we use it?
* Can you have a Microsoft-based network without any WINS server on
it? What are the "considerations" regarding not using WINS?
* Describe the differences between WINS push and pull replications.
* What is the difference between tombstoning a WINS record and simply
deleting it?
* Name the NetBIOS names you might expect from a Windows 2003 DC
that is registered in WINS.
* Describe the role of the routing table on a host and on a router.
* What are routing protocols? Why do we need them? Name a few.
* What are router interfaces? What types can they be?
* In Windows 2003 routing, what are the interface filters?
* What is NAT?

* What is the real difference between NAT and PAT?


* How do you configure NAT on Windows 2003?
* How do you allow inbound traffic for specific hosts on Windows 2003
NAT?
* What is VPN? What types of VPN does Windows 2000 and beyond work
with natively?
* What is IAS? In what scenarios do we use it?
* What's the difference between Mixed mode and Native mode in AD
when dealing with RRAS?
* What is the "RAS and IAS" group in AD?
* What are Conditions and Profile in RRAS Policies?
* What types or authentication can a Windows 2003 based RRAS work
with?
* How does SSL work?
* How does IPSec work?
* How do I deploy IPSec for a large number of computers?
* What types of authentication can IPSec use?
* What is PFS (Perfect Forward Secrecy) in IPSec?
* How do I monitor IPSec?
* Looking at IPSec-encrypted traffic with a sniffer. What packet types do I
see?
* What can you do with NETSH?
* How do I look at the open ports on my machine?

Technical Interview Questions Active Directory


* What is Active Directory?

* What is LDAP?
* Can you connect Active Directory to other 3rd-party Directory Services?
Name a few options.
* Where is the AD database held? What other folders are related to AD?
* What is the SYSVOL folder?
* Name the AD NCs and replication issues for each NC
* What are application partitions? When do I use them
* How do you create a new application partition
* How do you view replication properties for AD partitions and DCs?
* What is the Global Catalog?
* How do you view all the GCs in the forest?
* Why not make all DCs in a large forest as GCs?
* Trying to look at the Schema, how can I do that?
* What are the Support Tools? Why do I need them?
* What is LDP? What is REPLMON? What is ADSIEDIT? What is
NETDOM? What is REPADMIN?
* What are sites? What are they used for?
* What's the difference between a site link's schedule and interval?
* What is the KCC?
* What is the ISTG? Who has that role by default?
* What are the requirements for installing AD on a new server?
* What can you do to promote a server to DC if you're in a remote location
with slowWANlink?
* How can you forcibly remove AD from a server, and what do you do
later? Can I get user passwords from the AD database?
* What tool would I use to try to grab security related packets from the
wire?
* Name some OU design considerations.
* What is tombstone lifetime attribute?
* What do you do to install a new Windows 2003 DC in a Windows 2000
AD?
* What do you do to install a new Windows 2003 R2 DC in a Windows
2003 AD?
* How would you find all users that have not logged on since last month?
* What are the DS* commands?
* What's the difference between LDIFDE and CSVDE? Usage
considerations?
* What are the FSMO roles? Who has them by default? What happens
when each one fails?
* What FSMO placement considerations do you know of?

* I want to look at the RID allocation table for a DC. What do I do?
* What's the difference between transferring a FSMO role and seizing
one? Which one should you NOT seize? Why?
* How do you configure a "stand-by operation master" for any of the
roles?
* How do you backup AD?
* How do you restore AD?
* How do you change the DS Restore admin password?
* Why can't you restore a DC that was backed up 4 months ago?
* What are GPOs?
* What is the order in which GPOs are applied?
* Name a few benefits of using GPMC.
* What are the GPC and the GPT? Where can I find them?
* What are GPO links? What special things can I do to them?
* What can I do to prevent inheritance from above?
* How can I override blocking of inheritance?
* How can you determine what GPO was and was not applied for a user?
Name a few ways to do that.
* A user claims he did not receive a GPO, yet his user and computer
accounts are in the right OU, and everyone else there gets the
GPO. What will you look for?
* Name a few differences in Vista GPOs
* Name some GPO settings in the computer and user parts.
* What are administrative templates?
* What's the difference between software publishing and assigning?
* Can I deploy non-MSI software with GPO?
* You want to standardize the desktop environments (wallpaper, My
Documents, Start menu, printers etc.) on the computers in one
department. How would you do that?

PC Hardware
* What is FSB?

* What are Vcore and Vi/o?


* On what type of socket can you install a Pentium 4 CPU?
* What is SMP?
* Which Intel and AMD processors support SMP?
* How do LGA sockets differ from PGA and SEC?
* What is the difference between Pentium 4 and Pentium Core 2 Duo?
Explain the new technology.
* How does IRQ priority works?
* What technology enables you to upgrade your computer's BIOS by
simply using a software?
* What happens if you dissemble the battery located on the MotherBoard?
* How do L1, L2, and L3 work?
* How should we install RAM on a Dual-Channel Motherboard?
* What is the advantage of serial over parallel bus?
* Is USB using serial or parallel bus? What about Firewire?
* How much power is supplied to each USB port?
* When should you change your bus-powered USB hub to a self-powered
USB hub?
* What is a UPS?
* What is the difference between standby and online UPS?
* What is LBA (in Hard-Disks)?
* How many Hard Disks can you install on an E-IDE controller?
* Can you configure two hard disks to use the Master setting on the same
PC?
* What is the difference between Narrow-SCSI and Wide-SCSI?
* What is SAS?
* What are the three main reasons for using RAID?
* Is RAID 0 considered to be a redundant Solution? Why?
* How many disks can be used for RAID 1?
* How RAID 5 works?
* What is the smallest number of disks required for RAID5?
* What other types of RAID do you know?
* What are the six steps for laser printing?
* What is the difference between PCI-EX x1 and PCI-EX x16?

Microsoft-based Operating Systems

* What is the difference between a workgroup and a domain?


* What are the major advantages of working in a domain model?
* What types of operating system installation methods do you know?
* What is an answer file?
* How would you create an answer file for Windows XP? How would you
create one for Windows Vista?
* How do you perform an unattended installation on Windows XP?
* What is Sysprep?
* How do you use Sysprep?
* What is the major difference between Newsid and Sysprep?
* What is the function of the pagefile.sys file?
* What is the function of the hiberfil.sys file?
* What is the Registry?
* How can you edit the Registry? Name at least 3 ways of doing that.
* What should you do if you receive a message stating: "The following file
is missing or corrupt: 'WINDOWS'SYSTEM32'CONFIG'SYSTEM"?
* How would you repair an unsuccessful driver update?
* When should you use each of the fallowing tools: System Restore, LKGC
and Recovery Console?
* How do you set different print priority for different users?
* How can you reset user's passwords if you don't know his current
password?
* What's the difference between changing a user's password and resetting
it?
* You want to grant a user the right to perform backups should you add
him to the administrators group?
* What is MMC?
* What is gpedit.msc?
* How would you use the MMC to manage other servers on your network?
* You set a local policy for your Stand-alone XP Professional would the
local policy effects the administrators group?
* What new in the Windows Vista Local Policy?
* What is the difference between User Privileges and User Permissions?
* What is Safe Mode?
* Which logs can be found in Event Viewer?
* What is msconfig? On which OS can it be found?
* Can you upgrade XP Home Edition to Server 2003?

* Which permission will you grant a user for a folder he need to be able to
create and delete files in, if you do not want him to be able to
change permissions for the older?
* What is the difference between clearing the "allow" permission and
checking the "deny"?

Networking

What is a NIC * What is a MAC Address?


* When would you use a crosslink cable?
* What are the main advantages and disadvantages of Fiber-Optic-based
networks?

* What is the difference between a Hub and a Switch?


* On which OSI layer can a router be found?
* What is CSMA/CD?
* What is multicast?
* What is Broadcast?
* What is the difference between TCP and UDP?
* Describe some of the settings that are added by TCP and by UDP to the
packet's header.
* What are TCP Ports? Name a few.
* What is a TCP Session?
* What three elements make up a socket?
* What will happen if you leave the default gateway information empty
while manually configuring TCP/IP?
* What will happen if you execute the following command: "arp d *"?
* What is ICMP?
* When would you use the ping command with the "-t" switch?
* What command-line tool would help you discover for which port
numbers your computer is listening?
* What is APIPA? How would you recognize it?
* What is a Cyclic Redundancy Check?
* What would you type in at a command prompt to view the IP settings for
the computer that you are sitting at?
* What command would you type in at a command prompt to view the IP
address of the remote computer?
* What is the W Value for class B?
* What is the Net ID of an IP Address of 18.9.25.3 with Subnet Mask of
255.0.0.0?
* What is CIDR?
* What is 255.255.255.255 used for?
* What is the maximum number of hosts for a Class B Network?
* What is the (default) class type of 195.152.12.1?
* What is the subnet mask for 10.0.10.1/17?
* What is the result when changing from a subnet mask of 255.255.224.0 to
a subnet mask of 255.255.240.0?
* How can you access a shared folder from a remote computer? Name at
least 3 methods.

Vous aimerez peut-être aussi