Network Engineer Interview Questions
Network Engineer Interview Questions
Network Engineer Interview Questions
OSPF
ACLs
What are they
Diff types
Write an example if you want to allow and to deny
Well-known port numbers (DNS - 53 and etc)
QOS
What is that
What is the diff b/w L2 and L3 QoS
How it works
Network:
Draw the typical network diagram you have to deal with
PRAKASH
1.
2.
3.
4.
5.
PRAKASH
6.
What are the networking protocol options for the Windows clients
if for some reason you do not want to use TCP/IP? NWLink (Novell),
NetBEUI, AppleTalk (Apple).
7.
What is data link layer in the OSI reference model responsible
for? Data link layer is located above the physical layer, but below the
network layer. Taking raw data bits and packaging them into frames. The
network layer will be responsible for addressing the frames, while the
physical layer is reponsible for retrieving and sending raw data bits.
8.
What is binding order? The order by which the network protocols
are used for client-server communications. The most frequently used
protocols should be at the top.
9.
How do cryptography-based keys ensure the validity of data
transferred across the network? Each IP packet is assigned a checksum,
so if the checksums do not match on both receiving and transmitting ends,
the data was modified or corrupted.
10.
Should we deploy IPSEC-based security or certificate-based
security? They are really two different technologies. IPSec secures the
TCP/IP communication and protects the integrity of the packets. Certificatebased security ensures the validity of authenticated clients and servers.
11.
What is LMHOSTS file? Its a file stored on a host machine that is
used to resolve NetBIOS to specific IP addresses.
12.
Whats the difference between forward lookup and reverse lookup
in DNS? Forward lookup is name-to-address, the reverse lookup is addressto-name.
13.
How can you recover a file encrypted using EFS? Use the domain
recovery agent.
^Back to Top
Read more at TechInterviews.com
Network engineer/architect interview questions
1.
Explain how traceroute, ping, and tcpdump work and what they are
used for?
2.
Describe a case where you have used these tools to troubleshoot.
3.
What is the last major networking problem you troubleshot and solved
on your own in the last year?
PRAKASH
4.
What LAN analyzer tools are you familiar with and describe how you
use them to troubleshoot and on what media and network types.
5.
Explain the contents of a routing table (default route, next hop, etc.)
6.
What routing protocols have you configured?
7.
Describe the commands to set up a route.
8.
What routing problems have you troubleshot?
9.
How do you display a routing table on a Cisco? On a host?
10.
How do you use a routing table and for what?
11.
What is a route flap?
12.
What is a metric?
13.
When do you use BGP, IGRP, OSPF, Static Routes?
14.
What do you see as current networking security issues (e.g. NFS
mounting, spoofing, one time passwords, etc.)?
15.
Describe a routing filter and what it does.
16.
Describe an access list and what it does.
17.
What is a network management system?
18.
Describe how SNMP works.
19.
Describe the working environment you are currently in, e.g. frequent
interruptions, frequent priority shifting, team or individual.
20.
What do you use to write documentation? Editor? Mail reader?
21.
What platform (s) do you currently work on at your desk?
22.
How do you manage multiple concurrent high level projects?
23.
Describe a recent short term stressful situation and how you managed
it.
24.
How do you manage a long term demanding stressful work
environment?
25.
Have you worked in an assignment based environment, e.g. work
request/trouble ticket system, and if so, describe that environment.
26.
Describe what network statistics or measurement tools you are
familiar with and how you have used them.
27.
Describe what a VPN is and how it works.
28.
Describe how VoIP works.
29.
Describe methods of QoS.
30.
How does ToS bit work?
^Back to Top
CCNA/Cisco admin interview questions
PRAKASH
1.
1.
2.
3.
4.
5.
2.
1.
2.
3.
4.
5.
3.
1.
2.
3.
4.
5.
4.
1.
2.
3.
4.
5.
1.
2.
3.
You need to retrieve a file from the file server for your word
processing application, which layer of the OSI model is responsible for
this function?
Presentation layer
Application layer
Session layer
Transport layer
Datalink layer
You are working in a word processing program, which is run from
the file server. Your data comes back to you in an unintelligible manner.
Which layer of the OSI model would you investigate?
Application layer
Presentation layer
Session layer
Network layer
Datalink layer
The IEEE subdivided the datalink layer to provide for
environments that need connectionless or connection-oriented services.
What are the two layers called?
Physical
MAC
LLC
Session
IP
You are working with graphic translations. Which layer of the
OSI model is responsible for code formatting and conversion and
graphic standards.
Network layer
Session layer
Transport layer
Presentation layer
Which is the best definition of encapsulation?
Each layer of the OSI model uses encryption to put the PDU
from the upper layer into its data field. It adds header and trailer information
that is available to its counterpart on the system that will receive it.
Data always needs to be tunneled to its destination so
encapsulation must be used.
Each layer of the OSI model uses compression to put the PDU
from the upper layer into its data field. It adds header and trailer information
that is available to its counterpart on the system that will receive it.
PRAKASH
4.
Each layer of the OSI model uses encapsulation to put the PDU
from the upper layer into its data field. It adds header and trailer information
that is available to its counterpart on the system that will receive it.
6.
Routers can be configured using several sources. Select which of
the following sources can be used.
1.
Console Port
2.
Virtual Terminals
3.
TFTP Server
4.
Floppy disk
5.
Removable media
7.
Which memory component on a Cisco router contains the
dynamic system configuration?
1.
ROM
2.
NVRAM
3.
Flash
4.
RAM/DRAM
8.
Which combination of keys will allow you to view the previous
commands that you typed at the router?
1.
ESC-P
2.
Ctrl-P
3.
Shift-P
4.
Alt-P
9.
Which commands will display the active configuration
parameters?
1.
show running-config
2.
write term
3.
show version
4.
display term
10.
You are configuring a router, which prompt tells you that you are
in the privileged EXEC mode?
1.
@
2.
>
3.
!
4.
:
5.
#
11.
What does the command IP name-server 255.255.255.255
accomplish?
1.
It disables domain name lookup.
2.
It sets the domain name lookup to be a local broadcast.
3.
This is an illegal command.
PRAKASH
4.
PRAKASH
Explain the layered aspect of a UNIX system. What are the layers?
What does it mean to say they are layers?
A UNIX system has essentially three main layers:
. The hardware
. The operating system kernel
. The user-level programs
The kernel hides the systems hardware underneath an abstract, high-level
programming interface. It is responsible for implementing many of the
facilities that users and user-level programs take for granted.
The kernel assembles all of the following UNIX concepts from lower-level
hardware features:
. Processes (time-sharing, protected address space)
. Signals and semaphores
. Virtual Memory (swapping, paging, and mapping)
. The filesystem (files, directories, namespace)
. Pipes and network connections (inter-process communication)
Read more at TechInterviews.com
PRAKASH