Você está na página 1de 11

Tips for Crack a Server Administrator / Network Enginear Interview

Q.1 Explain the concept of DHCP.


Q.2- Explain IP datagram, Fragmentation and MTU.
Answers:
IP datagram can be used to describe a portion of IP data. Each IP datagram has s
et of fields arranged in an order. The order is specific which helps to decode a
nd read the stream easily. IP datagram has fields like Version, header length, T
ype of service, Total length, checksum, flag, protocol, Time to live, Identifica
tion, source and destination ip address, padding, options and payload.
MTU:- Maximum Transmission Unit is the size of the largest packet that a communi
cation protocol can pass. The size can be fixed by some standard or decided at t
he time of connection
Fragmentation is a process of breaking the IP packets into smaller pieces. Fragm
entation is needed when the datagram is larger than the MTU. Each fragment becom
es a datagram in itself and transmitted independently from source. When received
by destination they are reassembled.
Q.3- What is "Gateway Of Last Resort"?
Answers:
A Gateway of Last Resort or Default gateway is a route used by the router when n
o other known route exists to transmit the IP packet. Known routes are present i
n the routing table. Hence, any route not known by the routing table is forwarde
d to the default route. Each router which receives this packet will treat the pa
cket the same way, if the route is known, packet will be forwarded to the known
route.
Q.4 What is VPN?
Answers:
A VPN is a service that offers secure, reliable connectivity over a shared publi
c network infrastructure such as the Internet. VPNs maintain the same security a
nd management policies as a private network. They are the most cost effective me
thod of establishing a virtual point-to-point connection between remote users an
d an enterprise customer's network.
VPN(VIrtual Private Network)is a service which is usd for making connectivity of
remote user with its corporate network. VPN is point to point connection and is
used through internet.It makes pipelining between user & network, means user ca
n access their secure data through internet with full safety.?VPNs rely on tunne
ling to create a private network that reaches across the Internet. Essentially,
tunneling is the process of placing an entire packet within another packet and s
ending it over a network. The protocol of the outer packet is understood by the
network and both points, called tunnel interfaces, where the packet enters and e
xits the network.
Q.5- Explain Circuit Level Gateway?
Answers:
A circuit level gateway is used to find if a session in TCP handshaking is legit
imate or not. It can be considered as a layer between application layer and tran
sport layer. They protect the information of the private network they protect. C
ircuit level gateways do not filter packets.
Q.6- Explain the 7 Layers of OSI.
Q.7- What are the differences between a domain and a workgroup?
Q.8- What are Ping and Tracert?
Answers:

Ping and tracert are the commands used to send information to some remote comput
ers to receive some information. Information is sent and received by packets. Pi
ng I particularly used to check if the system is in network or not. It also give
s packet lost information. In windows ping command is written as ping ip_address
Tracert is called as trace route. It is used to track or trace the path the pac
ket takes from the computer where the command is given until the destination. In
windows ping command is written as tracert ip_address
ping is acknowledgement to our system for connecting to internet
ex:ping 192.168.63.233
tracert is used for how the data packets or you typed addresses are reached dest
ination to you .
ex:tracert www.google.com
note:perform on dos.
Q.9- Explain how NAT works?
Answers:
Network Address Translation translates and IP address used in a network to anoth
er IP address known within another network. A NAT table is maintained for global
to local and local to mapping of IP?s. NAT can be statically defined or dynamic
ally translate from a pool of addresses. The NAT router is responsible for trans
lating traffic coming and leaving the network. NAT prevents malicious activity i
nitiated by outside hosts from reaching local hosts by being dependent on a mach
ine on the local network to initiate any connection to hosts on the other side o
f the router.
Packet format:Flag field: 1 byte: - Indicates frames beginning or end
Address field: 1 byte: - Used for broadcast address (destination address)
Control field: 1 byte: - Used as a control byte
Protocol field: - 1 or 2 bytes: - Setting of protocol in information field (of d
atagram)
Information: - 0 or more bytes: - Datagram (whether it contains data or control
information)
Padding: - 0 or more bytes: - optional padding
FCS: - 2 or more bytes: - error check sum
Basically NAT works as a translater it translate the system ip to public ip and
it uses in router it enhanced the security it privent the unauthirised users to
access
Q.10- What is the use of IGMP protocol?
Answers:
Internet Group Management Protocol: - It allows internet hosts to participate in
multicasting. The IGMP messages are used to learn which hosts is part of which
multicast groups. The mechanism also allow a host to inform its local router, th
at it wants to receive messages.
Q.11- Describe Application layer.
Q.12- What Is a MAC Address?
Q.13- Define Spanning-Tree Protocol (STP)
Answers:
Spanning-Tree Protocol (STP) as defined in the IEEE 802.1D is a link management
protocol that provides path redundancy while preventing undesirable loops in the
network. For an Ethernet network to function properly, only one active path can
exist between two stations. Loops occur in networks for a variety of reasons. T
he most common reason you find loops in networks is the result of a deliberate a
ttempt to provide redundancy - in case one link or switch fails, another link or
switch can

Q.14- what is difference between windows xp and windows 7


Answers:
Window 7 having the built in protection againsts spyware and maliculous software
s with Window defender but Win xp dont have the same.
Q.15- What is CSMA and CD concept?
Answers:
In CSDA (carrier sense multiple access), presence of any digital signal in a net
work is checked before transmission. Data transmission occurs only when no signa
l is sensed.
CD, Collision detection is responsible for monitoring carrier in order to avoid
signal jam.
Q.16.- what vpn connection?
Q.17- Define File Transfer Protocol.
Q.18- What is multicasting?
Answers:
Multicasting allows a single message to be sent to a group of recipients. Emaili
ng, teleconferencing, are examples of multicasting. It uses the network infrastr
ucture and standards to send messages.

Q.19- Explain RSVP. How does it work?


Answers:
Resource Reservation protocol is used to reserve resources across a network. It
is used for requesting a specific Quality of Service (QoS) from the network. Thi
s is done by carrying the request (that needs a reservation of the resource) of
the host throughout the network. It visits each node in the network. RSVP used t
wo local modules for reservation of resources. Admission control module confirms
if there are sufficient available resources while policy module checks for the
permission of making a reservation. RSVP offers scalability. On a successful com
pletion of both checks RSVP uses the packet classifier and packet scheduler for
the desired Qos requested.
Q.20- Explain how NAT works?
Q.21- What is IP Spoofing and how can it be prevented?
Answers:
IP spoofing is a mechanism used by attackers to gain unauthorized access to a sy
stem. Here, the intruder sends messages to a computer with an IP address indicat
ing that the message is coming from a trusted host. This is done by forging the
header so it contains a different address and make it appear that the packet was
sent by a different machine.
Prevention:Packet filtering: - to allow packets with recognized formats to enter the networ
k
Using special routers and firewalls.
Encrypting the session
Q.22- What is an application gateway?
Answers:
An application gateway is an application program that runs on a firewall between
two networks. An application gateway is used for establishing connection betwee

n client program and destination service. The client negotiates with the gateway
to communicate with the service of destination. Here, gateway can be called as
a proxy. Hence, two connections are made. One between client and proxy; other, b
etween proxy and destination service. Connections take place behind the firewall
Q.23- What is the difference Between an Intranet and the Internet?
Answers:
There's one major distinction between an intranet and the Internet: The Internet
is an open, public space, while an intranet is designed to be a private space.
An intranet may be accessible from the Internet, but as a rule it's protected by
a password and accessible only to employees or other authorized users.
From within a company, an intranet server may respond much more quickly than a t
ypical Web site. This is because the public Internet is at the mercy of traffic
spikes, server breakdowns and other problems that may slow the network. Within a
company, however, users have much more bandwidth and network hardware may be mo
re reliable. This makes it easier to serve high-bandwidth content, such as audio
and video, over an intranet.
W.24- Define the term Protocol.
Answers:
Protocol is a standard way of communicating across a network. A protocol is the
"language" of the network. It is a method by which two dissimilar systems can co
mmunicate. TCP is a protocol which runs over a network.
protocol is set of rule and regulation for how to trasmite data over the network
.the meaning of protocol is who have more knolege about language that can comnic
ate between two person.just doing like same protocol..
Q.25- What is a network? What are the different kinds of network? Explain them.
Q.26- Explain the functionality of PING.
Q.27- Explain the core naming mechanism, Domain Name System (DNS).
Q.28- Define Telnet?
Q.29- Define SMTP?
Q.30- Define broadcast domain?
Answers:
It is a logical area in a computer network where any computer connected to the n
etwork can directly transmit to any other computer in the domain without having
to go through a routing device.
Q.31- What is a Router?
Q.32- What is firewall?
Q.33- What are the types of firewalls?
Answers:
Packet Filtering Firewall:
This type of Firewall detects packets and block unnecessary packets and makes ne
twork traffic release.
Screening Router Firewalls:
It's a software base firewall available in Router provides only light filtering.
Computer-based Firewall:
It's a firewall stored in server with an existing Operating System like Windows

and UNIX.
Hardware base Firewall:
Its device like box allows strong security from public network. Mostly used by b
ig networks.
Proxy Server:
Proxy server allows all clients to access Internet with different access limits.
Proxy server has its own firewall which filters the all packet from web server.
Q.34- What is Data encryption?
Answers:
Data encryption ensures data safety and very important for confidential or criti
cal data. It protect data from being read, altered or forged while transmission.
Data Encryption provides data security. Once the user has encrypted that data no
body can access that data only the user who has encrypted it can only access it.
Q.35- What is the Public Key Encryption?
Answers:
Public key encryption use public and private key for encryption and decryption.
In this mechanism, public key is used to encrypt messages and only the correspon
ding private key can be used to decrypt them. To encrypt a message, a sender has
to know recipient?s public key.
Q.36- What is Digital Signatures?
Answers:
Digital signature is an attachment to an electronic message used for security pu
rpose. It is used to verify the authenticity of the sender.
Q.37- What is Ethernet technology?
Q.38- what vpn connection?

Technical Interview Questions

Networking

* What is an IP address?
* What is a subnet mask?
* What is ARP?
* What is ARP Cache Poisoning?
* What is the ANDing process?
* What is a default gateway? What happens if I don't have one?
* Can a workstation computer be configured to browse the Internet and yet NO
T have a default gateway?
* What is a subnet?
* What is APIPA?
* What is an RFC? Name a few if possible (not necessarily the numbers, just
the ideas
behind them)
* What is RFC 1918?
* What is CIDR?
* You have the following Network ID: 192.115.103.64/27. What is the IP range
for your
network?
* You have the following Network ID: 131.112.0.0. You need at least 500 host
s per network. How many networks can you create? What subnet mask will you use
?

* You need to view at network traffic. What will you use? Name a few tools
* How do I know the path that a packet takes to the destination?
* What does the ping 192.168.0.1 -l 1000 -n 100 command do?
* What is DHCP? What are the benefits and drawbacks of using it?
* Describe the steps taken by the client and DHCP server in order to obtain
an IP address.
* What is the DHCPNACK and when do I get one? Name 2 scenarios.
* What ports are used by DHCP and the DHCP clients?
* Describe the process of installing a DHCP server in an AD infrastructure.
* What is DHCPINFORM?
* Describe the integration between DHCP and DNS.
* What options in DHCP do you regularly use for an MS network?
* What are User Classes and Vendor Classes in DHCP?
* How do I configure a client machine to use a specific User Class?
* What is the BOOTP protocol used for, where might you find it in Windows ne
twork infrastructure?
* DNS zones
describe the differences between the 4 types.
* DNS record types describe the most important ones.
* Describe the process of working with an external domain name
* Describe the importance of DNS to AD.
* Describe a few methods of finding an MX record for a remote domain on the
Internet.
* What does "Disable Recursion" in DNS mean?
* What could cause the Forwarders and Root Hints to be grayed out?
* What is a "Single Label domain name" and what sort of issues can it cause?
* What is the "in-addr.arpa" zone used for?
* What are the requirements from DNS to support AD?
* How do you manually create SRV records in DNS?
* Name 3 benefits of using AD-integrated zones.
* What are the benefits of using Windows 2003 DNS when using AD-integrated z
ones?
* You installed a new AD domain and the new (and first) DC has not registere
d its SRV
records in DNS. Name a few possible causes.
* What are the benefits and scenarios of using Stub zones?
* What are the benefits and scenarios of using Conditional Forwarding?
* What are the differences between Windows Clustering, Network Load Balancin
g and Round Robin, and scenarios for each use?
* How do I work with the Host name cache on a client computer?
* How do I clear the DNS cache on the DNS server?
* What is the 224.0.1.24 address used for?
* What is WINS and when do we use it?
* Can you have a Microsoft-based network without any WINS server on it? What
are
the
"considerations" regarding not using WINS?
* Describe the differences between WINS push and pull replications.
* What is the difference between tombstoning a WINS record and simply deleti
ng it?
* Name the NetBIOS names you might expect from a Windows 2003 DC that is
registered in WINS.
* Describe the role of the routing table on a host and on a router.
* What are routing protocols? Why do we need them? Name a few.
* What are router interfaces? What types can they be?
* In Windows 2003 routing, what are the interface filters?
* What is NAT?
* What is the real difference between NAT and PAT?
* How do you configure NAT on Windows 2003?
* How do you allow inbound traffic for specific hosts on Windows 2003 NAT?
* What is VPN? What types of VPN does Windows 2000 and beyond work with
natively?
* What is IAS? In what scenarios do we use it?
* What's the difference between Mixed mode and Native mode in AD when dealin

g
*
*
*
*
*
*
*
*
*
*

with
RRAS?
What is the "RAS and IAS" group in AD?
What are Conditions and Profile in RRAS Policies?
What types or authentication can a Windows 2003 based RRAS work with?
How does SSL work?
How does IPSec work?
How do I deploy IPSec for a large number of computers?
What types of authentication can IPSec use?
What is PFS (Perfect Forward Secrecy) in IPSec?
How do I monitor IPSec?
Looking at IPSec-encrypted traffic with a sniffer. What packet types do I

see?
* What can you do with NETSH?
* How do I look at the open ports on my machine?

Technical Interview Questions

Active Directory

* What is Active Directory?


* What is LDAP?
* Can you connect Active Directory to other 3rd-party Directory Services? Na
me a few
options.
* Where is the AD database held? What other folders are related to AD?
* What is the SYSVOL folder?
* Name the AD NCs and replication issues for each NC
* What are application partitions? When do I use them
* How do you create a new application partition
* How do you view replication properties for AD partitions and DCs?
* What is the Global Catalog?
* How do you view all the GCs in the forest?
* Why not make all DCs in a large forest as GCs?
* Trying to look at the Schema, how can I do that?
* What are the Support Tools? Why do I need them?
* What is LDP? What is REPLMON? What is ADSIEDIT? What is NETDOM? What
is REPADMIN?
* What are sites? What are they used for?
* What's the difference between a site link's schedule and interval?
* What is the KCC?
* What is the ISTG? Who has that role by default?
* What are the requirements for installing AD on a new server?
* What can you do to promote a server to DC if you're in a remote location w
ith slow
WAN
link?
* How can you forcibly remove AD from a server, and what do you do later?
Ca
n I get
user passwords from the AD database?
* What tool would I use to try to grab security related packets from the wir
e?
* Name some OU design considerations.
* What is tombstone lifetime attribute?
* What do you do to install a new Windows 2003 DC in a Windows 2000 AD?
* What do you do to install a new Windows 2003 R2 DC in a Windows 2003 AD?
* How would you find all users that have not logged on since last month?
* What are the DS* commands?
* What's the difference between LDIFDE and CSVDE? Usage considerations?
* What are the FSMO roles? Who has them by default? What happens when each o
ne
fails?
* What FSMO placement considerations do you know of?
* I want to look at the RID allocation table for a DC. What do I do?
* What's the difference between transferring a FSMO role and seizing one? Wh

ich one
should you NOT seize? Why?
* How do you configure a "stand-by operation master" for any of the roles?
* How do you backup AD?
* How do you restore AD?
* How do you change the DS Restore admin password?
* Why can't you restore a DC that was backed up 4 months ago?
* What are GPOs?
* What is the order in which GPOs are applied?
* Name a few benefits of using GPMC.
* What are the GPC and the GPT? Where can I find them?
* What are GPO links? What special things can I do to them?
* What can I do to prevent inheritance from above?
* How can I override blocking of inheritance?
* How can you determine what GPO was and was not applied for a user? Name a
few
ways
to do that.
* A user claims he did not receive a GPO, yet his user and computer accounts
are in the
right OU, and everyone else there gets the GPO. What will you
look for?
* Name a few differences in Vista GPOs
* Name some GPO settings in the computer and user parts.
* What are administrative templates?
* What's the difference between software publishing and assigning?
* Can I deploy non-MSI software with GPO?
* You want to standardize the desktop environments (wallpaper, My Documents,
Start menu, printers etc.) on the computers in one department. How would you
do that?
PC Hardware
* What is FSB?
* What are Vcore and Vi/o?
* On what type of socket can you install a Pentium 4 CPU?
* What is SMP?
* Which Intel and AMD processors support SMP?
* How do LGA sockets differ from PGA and SEC?
* What is the difference between Pentium 4 and Pentium Core 2 Duo? Explain t
he new technology.
* How does IRQ priority works?
* What technology enables you to upgrade your computer's BIOS by simply usin
g a
software?
* What happens if you dissemble the battery located on the Mother-Board?
* How do L1, L2, and L3 work?
* How should we install RAM on a Dual-Channel Motherboard?
* What is the advantage of serial over parallel bus?
* Is USB using serial or parallel bus? What about Firewire?
* How much power is supplied to each USB port?
* When should you change your bus-powered USB hub to a self-powered USB hub?
* What is a UPS?
* What is the difference between standby and online UPS?
* What is LBA (in Hard-Disks)?
* How many Hard Disks can you install on an E-IDE controller?
* Can you configure two hard disks to use the Master setting on the same PC?
* What is the difference between Narrow-SCSI and Wide-SCSI?
* What is SAS?
* What are the three main reasons for using RAID?
* Is RAID 0 considered to be a redundant Solution? Why?
* How many disks can be used for RAID 1?
* How RAID 5 works?
* What is the smallest number of disks required for RAID5?
* What other types of RAID do you know?

* What are the six steps for laser printing?


* What is the difference between PCI-EX x1 and PCI-EX x16?
Microsoft-based Operating Systems
*
*
*
*
*

What is the difference between a workgroup and a domain?


What are the major advantages of working in a domain model?
What types of operating system installation methods do you know?
What is an answer file?
How would you create an answer file for Windows XP? How would you create
one
for Windows Vista?
* How do you perform an unattended installation on Windows XP?
* What is Sysprep?
* How do you use Sysprep?
* What is the major difference between Newsid and Sysprep?
* What is the function of the pagefile.sys file?
* What is the function of the hiberfil.sys file?
* What is the Registry?
* How can you edit the Registry? Name at least 3 ways of doing that.
* What should you do if you receive a message stating: "The following file i
s missing or
corrupt: 'WINDOWS'SYSTEM32'CONFIG'SYSTEM"?
* How would you repair an unsuccessful driver update?
* When should you use each of the fallowing tools: System Restore, LKGC and
Recovery Console?
* How do you set different print priority for different users?
* How can you reset user's passwords if you don't know his current password?
* What's the difference between changing a user's password and resetting it?
* You want to grant a user the right to perform backups
should you add him t
o the administrators group?
* What is MMC?
* What is gpedit.msc?
* How would you use the MMC to manage other servers on your network?
* You set a local policy for your Stand-alone XP Professional
would the loca
l policy
effects the administrators group?
* What new in the Windows Vista Local Policy?
* What is the difference between User Privileges and User Permissions?
* What is Safe Mode?
* Which logs can be found in Event Viewer?
* What is msconfig? On which OS can it be found?
* Can you upgrade XP Home Edition to Server 2003?
* Which permission will you grant a user for a folder he need to be able to
create and
delete files in, if you do not want him to be able to change pe
rmissions for the
older?
* What is the difference between clearing the "allow" permission and checkin
g the "deny"?
Networking
*
*
*
*

What
What
When
What

is a NIC?
is a MAC Address?
would you use a crosslink cable?
are the main advantages and disadvantages of Fiber-Optic-based networ

*
*
*
*
*
*

What is the difference between a Hub and a Switch?


On which OSI layer can a router be found?
What is CSMA/CD?
What is multicast?
What is Broadcast?
What is the difference between TCP and UDP?

ks?

* Describe some of the settings that are added by TCP and by UDP to the pack
header.
* What are TCP Ports? Name a few.
* What is a TCP Session?
* What three elements make up a socket?
* What will happen if you leave the default gateway information empty while
manually
configuring TCP/IP?
* What will happen if you execute the following command: "arp d *"?
* What is ICMP?
* When would you use the ping command with the "-t" switch?
* What command-line tool would help you discover for which port numbers your
computer is listening?
* What is APIPA? How would you recognize it?
* What is a Cyclic Redundancy Check?
* What would you type in at a command prompt to view the IP settings for the
computer that you are sitting at?
* What command would you type in at a command prompt to view the IP address
of
the remote computer?
* What is the W Value for class B?
* What is the Net ID of an IP Address of 18.9.25.3 with Subnet Mask of 255.0
.0.0?
* What is CIDR?
* What is 255.255.255.255 used for?
* What is the maximum number of hosts for a Class B Network?
* What is the (default) class type of 195.152.12.1?
* What is the subnet mask for 10.0.10.1/17?
* What is the result when changing from a subnet mask of 255.255.224.0 to a
subnet mask of 255.255.240.0?
* How can you access a shared folder from a remote computer? Name at least 3
methods.
et's

]
Technical Interview Questions

Active Directory

* What is Active Directory?


* What is LDAP?
* Can you connect Active Directory to other 3rd-party Directory Services? Na
me a few
options.
* Where is the AD database held? What other folders are related to AD?
* What is the SYSVOL folder?
* Name the AD NCs and replication issues for each NC
* What are application partitions? When do I use them
* How do you create a new application partition
* How do you view replication properties for AD partitions and DCs?
* What is the Global Catalog?
* How do you view all the GCs in the forest?
* Why not make all DCs in a large forest as GCs?
* Trying to look at the Schema, how can I do that?
* What are the Support Tools? Why do I need them?
* What is LDP? What is REPLMON? What is ADSIEDIT? What is NETDOM? What
is REPADMIN?
* What are sites? What are they used for?
* What's the difference between a site link's schedule and interval?
* What is the KCC?
* What is the ISTG? Who has that role by default?
* What are the requirements for installing AD on a new server?
* What can you do to promote a server to DC if you're in a remote location w
ith slow
WAN
link?

* How can you forcibly remove AD from a server, and what do you do later?
Ca
n I get
user passwords from the AD database?
* What tool would I use to try to grab security related packets from the wir
e?
* Name some OU design considerations.
* What is tombstone lifetime attribute?
* What do you do to install a new Windows 2003 DC in a Windows 2000 AD?
* What do you do to install a new Windows 2003 R2 DC in a Windows 2003 AD?
* How would you find all users that have not logged on since last month?
* What are the DS* commands?
* What's the difference between LDIFDE and CSVDE? Usage considerations?
* What are the FSMO roles? Who has them by default? What happens when each o
ne
fails?
* What FSMO placement considerations do you know of?
* I want to look at the RID allocation table for a DC. What do I do?
* What's the difference between transferring a FSMO role and seizing one? Wh
ich one
should you NOT seize? Why?
* How do you configure a "stand-by operation master" for any of the roles?
* How do you backup AD?
* How do you restore AD?
* How do you change the DS Restore admin password?
* Why can't you restore a DC that was backed up 4 months ago?
* What are GPOs?
* What is the order in which GPOs are applied?
* Name a few benefits of using GPMC.
* What are the GPC and the GPT? Where can I find them?
* What are GPO links? What special things can I do to them?
* What can I do to prevent inheritance from above?
* How can I override blocking of inheritance?
* How can you determine what GPO was and was not applied for a user? Name a
few
ways to do that.
* A user claims he did not receive a GPO, yet his user and computer accounts
are in the
right OU, and everyone else there gets the GPO. What will you lo
ok for?
* Name a few differences in Vista GPOs
* Name some GPO settings in the computer and user parts.
* What are administrative templates?
* What's the difference between software publishing and assigning?
* Can I deploy non-MSI software with GPO?
* You want to standardize the desktop environments (wallpaper, My Documents,
Start menu, printers etc.) on the computers in one department. How would you
do that?

Você também pode gostar