NOC Interview Questions and Answers Vol 1.0
NOC Interview Questions and Answers Vol 1.0
Ques 1. Name the feature offered by a Cisco Firewall to shield the network against TCP Syn Flood
Attacks?
TCP intercept feature.
Ques 2. Name the feature on a firewall that can be used to block a website or a specific URL?
URL Filtering.
Ques 3. Name a security solution that can be configured to assign User Based Authentication to the
users on a LAN Network?
Proxy firewall.
Ques 4. There is a requirement to setup virtual private network (VPN) for remote users. Following
are the key objectives -
Users in roaming across other customer locations require this service
The VPN gateway should require the use of Internet Protocol Security (IPSec).
All remote users must use IPSec to connect to the VPN gateway.
Which IPSec mode should you use?
Remote Access VPN (Client to Site)
Ques 5. Name the command used to determine connectivity between client and server.
“Ping” Command
Ques 6. What do you understand by default time-frame of Ping Timeout on Windows system?
The default time-frame of Ping Timeout is 4 seconds. The adjustment of the timeout value can be done
with the help of -w option. While executing the Ping Command, the adjustment in the amount of time
can be done in milliseconds. The Ping waits for every reply and if -w option has not been put into use,
then default timeout value is used i.e. 4000 or 4 seconds.
Step 1 –
Open command prompt on Windows OS and issue following command - nslookup ipwithease.com
Step 2 –
Below output is generated on command prompt -
Server: resolver1.abc.com
Address: 206.165.111.12
Name: ipwithease.com
Address: 139.86.47.5
From this, we can see that ipwithease.com is currently pointing to IP address 139.86.47.5. Also, that
DNS server resolver1.abc.com is used for the query.
Ques 9. What will you do in a situation where WAN Link of the Router goes down?
There can be one or more reasons for the failover.
Firstly, it is essential to understand the precise reason whether it is physical or protocol issues.
Physical problem needs to be rectified manually.
If it is a protocol issue then there can be any reason including encapsulation mismatch,
improper access control, non-configuration of clock rate, MTU or duplex mismatch, etc. and
handle it accordingly.
Ques 10. Please explain what so you understand by the term BGP?
The term BGP denotes Border Gateway Protocol and it handles the exchange of routing information
between autonomous systems existing over the Internet. It is also termed as a standardized variant of
exterior gateway protocol. eBGP and iBGP are both flavors of BGP protocol.
Ques 11. How do you plan to resolve a BGP neighbour issue when “hold time expired” notification is
displayed?
A “hold time expired” notification is commonly released when BGP peers flap. In case reachability
fluctuates or breaks to a preset BGP neighbour, it subsequently goes down, but not before the hold
time expires. In order to curb this problem, you are required to fix BGP peering. Some of the probable
causes associated with it include unicast drop, MTU, misconfiguration in BGP process, SP circuit down,
etc.
Ques 12. As NOC analyst, how can one access a layer 2 switch right from a remote location?
In order to successfully reach a layer 2 switch distantly, a management switch virtual interface (SVI) is
needed with an adequate Telnet/SSH access. Meanwhile, the IP address of switch virtual interface
must be accessible during the whole course of time.
Ques 17. Suppose a host computer fails to reach over a local network with the host name but
successfully reach it by an IP address, where do you think the problem persists?
The problem is commonly caused by Domain Name System (DNS) configuration. The probability in one
such situation is that the host name is not incorporated to Domain Name System server, due to which
the network fails to recognize the same. That is the reason why it is only accessing the network via IP
address locations.
Ques 20. As NOC monitoring and analyst, how would you track the up time in Cisco router/switch?
Telnet/ SSH the CLI session and simply use the command “sh version” in order to display the uptime.
Ques 26. How can you determine which PC and what Port number is it connected to a network
switch?
This can be achieved by 1st using ARP on Layer3 Device or other PCs in LAN to view IP address and
corresponding MAC address of the desired PC. Next, verify which port number is learning the desired
PC MAC Address by using “show mac address-table” command on Layer 2 Switch.
Ques 27. Suppose the WAN link of a router goes down, and you are not receiving any notification or
alert regarding the same. What could be the problem behind it?
Simple Network Management Protocol (SNMP) or appropriate Syslog configuration is required to
attain notification of a link failure. To get advanced notification or alert management, there are
network management tools that can be readily configured to track down such notifications.
Ques 28. One of the ports in 8 port EtherChannel goes down. What will happen?
It is a fact that the total bandwidth in an EtherChannel interface is based on the total number of active
member links existing on the interface. An EtherChannel comprising 8 active links of 100 Mbps indicate
an overall bandwidth of 800 Mbps. If one of the physical ports goes down, the available bandwidth on
the interface be calculated as 700 Mbps. It is calculated without flapping the concerned port channel.
Ques 29. How can you troubleshoot the problem of a high CPU utilization existing in a router?
It is a symptom of router malfunctioning.
Firstly, it is essential to identify the exact cause behind increased CPU utilization.
You can apply “show interface stat”, “show processes CPU” commands in order to verify the
process utilizations.
Some of the key reasons could be the congestion resulted due to high traffic flow, VPN
deployments or complex ACL, TCP/ARP issues, etc.
Ques 30. Is attaining CRC errors over MPLS WAN Links a routine thing?
If it is below 1% of the entire traffic with no packet drop then it is a routine thing. If it is over 1% of the
entire traffic interface then it is essential to resolve the link issues. The most genuine reason for CRC
errors is the duplex setting, where the providers function on “auto” mode interface.
Ques 35. What do you understand by the log message- “%OSPF-5-NBRSTATE: ospf-1 [5330] Process
1, Nbr 10.3.3.14 on Vlan44 from FULL to EXSTART, BADSEQNUM OSPF” ?
The log message is generated when an OSPF DBD exchange process employees a bad sequence
number for the effective synchronization of the database with it’s neighbours. The bad sequence leads
packet exploitation or packet loss.
Ques 36. What is required to be done, if my BGP neighbour is in active state or stuck in idle?
In case BGP peer is in an idle state then the result could be because of the physical connectivity failure
or rather neighbour is not simply defined with respective AS. When it is in connect state, BGP ensures
the establishment of a TCP session over the port number 179, in case it fails the establishment of TCP
connection. In that case, it navigates to Active state and subsequently retries the establishment of TCP
connection. With the help of debug ip bgp as well as debug ip tcp transactions commands, it would be
much easier to trace out the precise reason behind TCP connection failure. The lack of “ebgp-multihop”
or “update-source” command can also be a key reason for the active state of neighbour.
Ques 37. In order to make decisions, which of the fields in a packet does a Network Layer Firewall
refer to?
IP as well as transport layer headers in order to fetch information associated with the source and port
numbers, destination IP addresses, etc.
Ques 38. Name the main field within an IP Header modified by NAT Firewall using NAT overload?
It is the source IP address within the IP header.
Ques 39. What is the process of performing Password Recovery within a Switch?
Below is the step by step procedure for password recovery on a switch-
a) Unplug the power cable.
b) Hold down the mode button located on the left side of the front panel, while reconnecting the
power cord to the switch. You can release the mode button a second or two after the LED
above port 1x is no longer illuminated.
c) The system has been interrupted prior to initializing the flash file system.
The following commands will initialize the flash file system, and finish loading the Operating
system software:
flash_init
load_helper
boot
d) Type flash_init.
e) Type load_helper.
f) Type dir flash:.
!— Make sure to type a colon “:” after the dir flash
The switch file system is displayed:
Directory of flash:
2 -rwx 843947 Mar 01 1993 00:02:18 C2900XL-h-mz-112.8-SA
4 drwx 3776 Mar 01 1993 01:23:24 html
66 -rwx 130 Jan 01 1970 00:01:19 env_vars
68 -rwx 1296 Mar 01 1993 06:55:51 config.text
1728000 bytes total (456704 bytes free)
g) Type rename flash:config.text flash:config.old to rename the configuration file. This file
contains the password definition.
h) Type boot to boot the system.
Enter N at the prompt to start the Setup program, Continue with the configuration dialog?
[yes/no]: N
At the switch prompt type en to turn on enable mode.
i) Type rename flash:config.old flash:config.text to rename the configuration file with its original
name.
j) Copy the configuration file into memory:
Switch# copy flash:config.text system:running-config
Source filename [config.text]? (press Return)
Destination filename [running-config]? (press Return)
The configuration file is now reloaded.
k) Change the password:
switch#configure terminal
switch(config)#no enable secret
!– This step is necessary if the switch had an enable secret password
switch(config)#enable password Cisco
switch#(config)#^Z
!–Control/Z
Write the running configuration to the configuration file:
l) switch#write memory
Ques 42. What is the difference between the terms ‘forward lookup’ and ‘reverse lookup’ within
DNS?
The process of converting names into IP addresses is known as forward lookup, whereas, the process
of resolving IP addresses into names is known as reverse lookup.
Ques 47. Mention the criteria meant for best path selection in a router?
Below is the path selection criteria -
Longest prefix match
Minimum AD value (administrative distance)
Lowest metric value
Ques 48. What do you understand by the term ‘anonymous FTP’?
Anonymous FTP is basically a way of granting the access to a user to the files located in public servers.
Ques 49. How would you differentiate ‘standard’ and ‘extended’ ACL (access control list) from one
another?
Standard Access Control Lists are source-based, on the other hand, Extended Access Control Lists are
source- and destination-based.
Source: https://community.fs.com/