Unix Question
Unix Question
TTeecchhnnoollooggyy
I IInnt tteer rrvvi iieeww QQuuees sst tti iioonns ss: :: page 1 Network
Specialist I, II, III
Confidential Copyright ©2005 I-Team All rights reserved. Last revised by: DFR. Jan 26,2006 NS Page 1of 13
Thee IIntteerrvviieew
This initial interview, whether conducted in person or via telephone, is designed to efficiently
assess two
critical aspects of a candidates’ qualifications for Network specialist level’s I,II,II,.
1)Relevant job skills and experience. 2) Interpersonal competencies.
This worksheet is designed to help determine these candidate attributes.
This interview includes questions relating to these categories:
Experience and accomplishments
Teamwork and management
Work style
The questions in this interview correspond with the candidate assessment spreadsheet that's
included in this
hiring package.
These interview questions and the corresponding assessment are designed to be used for network
specialist level’s
I,II,or III. However, in the technical categories, you will have to consider lowering the standard of
expectancy & accuracy
to be appropriate for less experienced applicants. You may choose to eliminate or replace certain
questions up front, but
it is recommended that you lower the job qualifications benchmark standards in the candidate
assessment sheet so they
are appropriate for positions with lower skill set requirements. Please note: that although there are
technical assessment
questions in this interview, this is not a technical test. You should also never remove any of the
interpersonal or
communication skills questions.
The questions are grouped into eight categories:
1. Technical skills and knowledge
2. On-the-job experience
3. Communication
4. Proactive actions and positive attitude
5. Troubleshooting
6. UNIX administration
7. Windows administration
8. General network administration
An answer key covering the questions in the last three categories appears in a separate section at the
end of this
document.
Federal and state laws prohibits asking questions that are not related to the job you are hiring for.
Questions should not
used to find out personal information. DO NOT ask about race, gender, religion, marital status, age,
disabilities, ethnic
background, country of origin, sexual preferences or age.
I-Team Technologies IInnffoorrmaattiioonn
TTeecchhnnoollooggyy
I IInnt tteer rrvvi iieeww QQuuees sst tti iioonns ss: :: page 2 Network
Specialist I, II, III
Confidential Copyright ©2005 I-Team All rights reserved. Last revised by: DFR. Jan 26,2006 NS Page 2of 13
Candidate information
Position: Network Specialist level 1 level 2 level 3
Candidate's name:
Address: street city sta zip
Contact info: Phone: Cell:
E- mail:
Candidate ad source Referred by or job posting info:
Interview date:
Interviewed by:
Salary range discussed: $___________ to $____________
Interview Notes
Was the candidate punctual? Describe the candidate’s appearance? What was their demeanor during the
interview? Did they seem interested in the company and the position?
Interview follow-up action
I-Team Technologies IInnffoorrmaattiioonn
TTeecchhnnoollooggyy
I IInnt tteer rrvvi iieeww QQuuees sst tti iioonns ss: :: page 3 Network
Specialist I, II, III
Confidential Copyright ©2005 I-Team All rights reserved. Last revised by: DFR. Jan 26,2006 NS Page 3of 13
Technical skills and knowledge
1. What special skills or knowledge can you bring to our organization? Why would this be valuable to us?
How would
you apply it given what you know about our company and the job we are trying to fill?
2. How do you keep up with what's going on in your company/industry/profession? Give an example of
how you have
applied what you have learned to your current job.
3. What diagnostic tools are you familiar with, and what server platforms?
4. Rank your experience with these infrastructure technologies. Choose from no experience,
beginner,
intermediate, or advanced.
On-the-job experience
1. Tell me about your current job. What do you like about it? What do you dislike?
Citrix Metaframe 1 2 3 4 Virus defense 1 2 3 4
Windows servers 2K & 2003 OS, 1 2 3 4 Vulnerability testing 1 2 3 4
Active Directory 1 2 3 4 Intrusion detection 1 2 3 4
Windows Exchange 1 2 3 4 Firewall (Sonicwall, Black ice) 1 2 3 4
I-Team Technologies IInnffoorrmaattiioonn
TTeecchhnnoollooggyy
I IInnt tteer rrvvi iieeww QQuuees sst tti iioonns ss: :: page 4 Network
Specialist I, II, III
Confidential Copyright ©2005 I-Team All rights reserved. Last revised by: DFR. Jan 26,2006 NS Page 4of 13
2. Describe the workload in your current (or most recent) job. How do you prioritize and
organize your work?
What do you do when you have conflicting priorities? Provide a specific example of a time
you had
several "urgent" and key projects that had deliverables due at approximately the same time.
How did you
get the work done?
3. What is the single most rewarding thing you have accomplished, and why do you cite this
above all your
other accomplishments? What did you learn from it?
4. What's the biggest mistake you've made? How did you recover, and what did you learn?
5. Describe your net admin security expertise/experience: technologies you're familiar with
or security
projects you've completed at your current job.
I-Team Technologies IInnffoorrmaattiioonn
TTeecchhnnoollooggyy
I IInnt tteer rrvvi iieeww QQuuees sst tti iioonns ss: :: page 5 Network
Specialist I, II, III
Confidential Copyright ©2005 I-Team All rights reserved. Last revised by: DFR. Jan 26,2006 NS Page 5of 13
Communication
1. Describe your preferred communication style.
2. Describe a situation in which you received negative feedback on a work product. What
was the
feedback? How was it delivered and what did you do in response to the feedback?
3. Describe a time that you had a conflict with a coworker, peer, manager, or customer.
How did you
respond to the conflict? What was the result? What did you learn and what, if anything,
would you do
differently?
4. How do you resolve conflict on a project team?
5. The network was brought down by a user who clicked on an e-mail attachment that had a
virus. It wasn't
caught by the antivirus program housed on the e-mail server because it is a brand-new
virus exploiting a
newly discovered weakness in the OS. The company is upset about the downtime caused.
Given the
money spent on tools to prevent such problems, you're being asked to explain why this
happened. How
do you explain to the CIO that the end user is the CEO/company executive?
I-Team Technologies IInnffoorrmaattiioonn
TTeecchhnnoollooggyy
I IInnt tteer rrvvi iieeww QQuuees sst tti iioonns ss: :: page 6 Network
Specialist I, II, III
Confidential Copyright ©2005 I-Team All rights reserved. Last revised by: DFR. Jan 26,2006 NS Page 6of 13
Proactive actions and positive attitude
1. Tell me about a time you looked at processes or work flow and made them more efficient.
2. Can you describe some things you have done to demonstrate proactive/innovative
thinking to solve a
potential problem?
3. What was your most difficult decision in the last six months?
4. Tell me about a team project you worked on and how you contributed to it.
I-Team Technologies IInnffoorrmaattiioonn
TTeecchhnnoollooggyy
I IInnt tteer rrvvi iieeww QQuuees sst tti iioonns ss: :: page 7 Network
Specialist I, II, III
Confidential Copyright ©2005 I-Team All rights reserved. Last revised by: DFR. Jan 26,2006 NS Page 7of 13
Troubleshooting
1. The network is experiencing periods of slow response, and you are asked to find a
solution. What
troubleshooting techniques would you use to diagnose and resolve the problem?
2. Users can send e-mail locally, but cannot send e-mail to external recipients. Please
describe how you
would troubleshoot and resolve this problem.
3. A user's roaming profile is not accessible in a Windows 2000 network. Describe how you
would solve
this problem.
UNIX administration
Please answer the following questions on basic UNIX system administration.
Do you have any UNIX experience? If no, go to the windows administration questions. (yes) (no)
1. You want to find out the possible parameters for a command but don’t have the
administration manual.
What do you do?
2. You want to see the IP address of the server. What command do you use?
3. You are curious about how much disk space your server has. What command do you
use?
4. What command do you use to find out what processes are running on your UNIX server?
5. UNIX user account information is stored in what file? UNIX user passwords are not
stored in that file, so
where are they stored?
Basic UNIX administration
1. View the “man” page (manual page) from the UNIX server; for example, man ls.
2. ifconfig -a
3. df
4. ps
5. UNIX user account information is stored in /etc/passwd. Passwords for those accounts are stored in /etc/shadow.
(In
some UNIX variants, the shadow file is moved to another directory.)