Escolar Documentos
Profissional Documentos
Cultura Documentos
Ping and tracert are the commands used to send information to some remote comput
ers to receive some information. Information is sent and received by packets. Pi
ng I particularly used to check if the system is in network or not. It also give
s packet lost information. In windows ping command is written as ping ip_address
Tracert is called as trace route. It is used to track or trace the path the pac
ket takes from the computer where the command is given until the destination. In
windows ping command is written as tracert ip_address
ping is acknowledgement to our system for connecting to internet
ex:ping 192.168.63.233
tracert is used for how the data packets or you typed addresses are reached dest
ination to you .
ex:tracert www.google.com
note:perform on dos.
Q.9- Explain how NAT works?
Answers:
Network Address Translation translates and IP address used in a network to anoth
er IP address known within another network. A NAT table is maintained for global
to local and local to mapping of IP?s. NAT can be statically defined or dynamic
ally translate from a pool of addresses. The NAT router is responsible for trans
lating traffic coming and leaving the network. NAT prevents malicious activity i
nitiated by outside hosts from reaching local hosts by being dependent on a mach
ine on the local network to initiate any connection to hosts on the other side o
f the router.
Packet format:Flag field: 1 byte: - Indicates frames beginning or end
Address field: 1 byte: - Used for broadcast address (destination address)
Control field: 1 byte: - Used as a control byte
Protocol field: - 1 or 2 bytes: - Setting of protocol in information field (of d
atagram)
Information: - 0 or more bytes: - Datagram (whether it contains data or control
information)
Padding: - 0 or more bytes: - optional padding
FCS: - 2 or more bytes: - error check sum
Basically NAT works as a translater it translate the system ip to public ip and
it uses in router it enhanced the security it privent the unauthirised users to
access
Q.10- What is the use of IGMP protocol?
Answers:
Internet Group Management Protocol: - It allows internet hosts to participate in
multicasting. The IGMP messages are used to learn which hosts is part of which
multicast groups. The mechanism also allow a host to inform its local router, th
at it wants to receive messages.
Q.11- Describe Application layer.
Q.12- What Is a MAC Address?
Q.13- Define Spanning-Tree Protocol (STP)
Answers:
Spanning-Tree Protocol (STP) as defined in the IEEE 802.1D is a link management
protocol that provides path redundancy while preventing undesirable loops in the
network. For an Ethernet network to function properly, only one active path can
exist between two stations. Loops occur in networks for a variety of reasons. T
he most common reason you find loops in networks is the result of a deliberate a
ttempt to provide redundancy - in case one link or switch fails, another link or
switch can
n client program and destination service. The client negotiates with the gateway
to communicate with the service of destination. Here, gateway can be called as
a proxy. Hence, two connections are made. One between client and proxy; other, b
etween proxy and destination service. Connections take place behind the firewall
Q.23- What is the difference Between an Intranet and the Internet?
Answers:
There's one major distinction between an intranet and the Internet: The Internet
is an open, public space, while an intranet is designed to be a private space.
An intranet may be accessible from the Internet, but as a rule it's protected by
a password and accessible only to employees or other authorized users.
From within a company, an intranet server may respond much more quickly than a t
ypical Web site. This is because the public Internet is at the mercy of traffic
spikes, server breakdowns and other problems that may slow the network. Within a
company, however, users have much more bandwidth and network hardware may be mo
re reliable. This makes it easier to serve high-bandwidth content, such as audio
and video, over an intranet.
W.24- Define the term Protocol.
Answers:
Protocol is a standard way of communicating across a network. A protocol is the
"language" of the network. It is a method by which two dissimilar systems can co
mmunicate. TCP is a protocol which runs over a network.
protocol is set of rule and regulation for how to trasmite data over the network
.the meaning of protocol is who have more knolege about language that can comnic
ate between two person.just doing like same protocol..
Q.25- What is a network? What are the different kinds of network? Explain them.
Q.26- Explain the functionality of PING.
Q.27- Explain the core naming mechanism, Domain Name System (DNS).
Q.28- Define Telnet?
Q.29- Define SMTP?
Q.30- Define broadcast domain?
Answers:
It is a logical area in a computer network where any computer connected to the n
etwork can directly transmit to any other computer in the domain without having
to go through a routing device.
Q.31- What is a Router?
Q.32- What is firewall?
Q.33- What are the types of firewalls?
Answers:
Packet Filtering Firewall:
This type of Firewall detects packets and block unnecessary packets and makes ne
twork traffic release.
Screening Router Firewalls:
It's a software base firewall available in Router provides only light filtering.
Computer-based Firewall:
It's a firewall stored in server with an existing Operating System like Windows
and UNIX.
Hardware base Firewall:
Its device like box allows strong security from public network. Mostly used by b
ig networks.
Proxy Server:
Proxy server allows all clients to access Internet with different access limits.
Proxy server has its own firewall which filters the all packet from web server.
Q.34- What is Data encryption?
Answers:
Data encryption ensures data safety and very important for confidential or criti
cal data. It protect data from being read, altered or forged while transmission.
Data Encryption provides data security. Once the user has encrypted that data no
body can access that data only the user who has encrypted it can only access it.
Q.35- What is the Public Key Encryption?
Answers:
Public key encryption use public and private key for encryption and decryption.
In this mechanism, public key is used to encrypt messages and only the correspon
ding private key can be used to decrypt them. To encrypt a message, a sender has
to know recipient?s public key.
Q.36- What is Digital Signatures?
Answers:
Digital signature is an attachment to an electronic message used for security pu
rpose. It is used to verify the authenticity of the sender.
Q.37- What is Ethernet technology?
Q.38- what vpn connection?
Networking
* What is an IP address?
* What is a subnet mask?
* What is ARP?
* What is ARP Cache Poisoning?
* What is the ANDing process?
* What is a default gateway? What happens if I don't have one?
* Can a workstation computer be configured to browse the Internet and yet NO
T have a default gateway?
* What is a subnet?
* What is APIPA?
* What is an RFC? Name a few if possible (not necessarily the numbers, just
the ideas
behind them)
* What is RFC 1918?
* What is CIDR?
* You have the following Network ID: 192.115.103.64/27. What is the IP range
for your
network?
* You have the following Network ID: 131.112.0.0. You need at least 500 host
s per network. How many networks can you create? What subnet mask will you use
?
* You need to view at network traffic. What will you use? Name a few tools
* How do I know the path that a packet takes to the destination?
* What does the ping 192.168.0.1 -l 1000 -n 100 command do?
* What is DHCP? What are the benefits and drawbacks of using it?
* Describe the steps taken by the client and DHCP server in order to obtain
an IP address.
* What is the DHCPNACK and when do I get one? Name 2 scenarios.
* What ports are used by DHCP and the DHCP clients?
* Describe the process of installing a DHCP server in an AD infrastructure.
* What is DHCPINFORM?
* Describe the integration between DHCP and DNS.
* What options in DHCP do you regularly use for an MS network?
* What are User Classes and Vendor Classes in DHCP?
* How do I configure a client machine to use a specific User Class?
* What is the BOOTP protocol used for, where might you find it in Windows ne
twork infrastructure?
* DNS zones
describe the differences between the 4 types.
* DNS record types describe the most important ones.
* Describe the process of working with an external domain name
* Describe the importance of DNS to AD.
* Describe a few methods of finding an MX record for a remote domain on the
Internet.
* What does "Disable Recursion" in DNS mean?
* What could cause the Forwarders and Root Hints to be grayed out?
* What is a "Single Label domain name" and what sort of issues can it cause?
* What is the "in-addr.arpa" zone used for?
* What are the requirements from DNS to support AD?
* How do you manually create SRV records in DNS?
* Name 3 benefits of using AD-integrated zones.
* What are the benefits of using Windows 2003 DNS when using AD-integrated z
ones?
* You installed a new AD domain and the new (and first) DC has not registere
d its SRV
records in DNS. Name a few possible causes.
* What are the benefits and scenarios of using Stub zones?
* What are the benefits and scenarios of using Conditional Forwarding?
* What are the differences between Windows Clustering, Network Load Balancin
g and Round Robin, and scenarios for each use?
* How do I work with the Host name cache on a client computer?
* How do I clear the DNS cache on the DNS server?
* What is the 224.0.1.24 address used for?
* What is WINS and when do we use it?
* Can you have a Microsoft-based network without any WINS server on it? What
are
the
"considerations" regarding not using WINS?
* Describe the differences between WINS push and pull replications.
* What is the difference between tombstoning a WINS record and simply deleti
ng it?
* Name the NetBIOS names you might expect from a Windows 2003 DC that is
registered in WINS.
* Describe the role of the routing table on a host and on a router.
* What are routing protocols? Why do we need them? Name a few.
* What are router interfaces? What types can they be?
* In Windows 2003 routing, what are the interface filters?
* What is NAT?
* What is the real difference between NAT and PAT?
* How do you configure NAT on Windows 2003?
* How do you allow inbound traffic for specific hosts on Windows 2003 NAT?
* What is VPN? What types of VPN does Windows 2000 and beyond work with
natively?
* What is IAS? In what scenarios do we use it?
* What's the difference between Mixed mode and Native mode in AD when dealin
g
*
*
*
*
*
*
*
*
*
*
with
RRAS?
What is the "RAS and IAS" group in AD?
What are Conditions and Profile in RRAS Policies?
What types or authentication can a Windows 2003 based RRAS work with?
How does SSL work?
How does IPSec work?
How do I deploy IPSec for a large number of computers?
What types of authentication can IPSec use?
What is PFS (Perfect Forward Secrecy) in IPSec?
How do I monitor IPSec?
Looking at IPSec-encrypted traffic with a sniffer. What packet types do I
see?
* What can you do with NETSH?
* How do I look at the open ports on my machine?
Active Directory
ich one
should you NOT seize? Why?
* How do you configure a "stand-by operation master" for any of the roles?
* How do you backup AD?
* How do you restore AD?
* How do you change the DS Restore admin password?
* Why can't you restore a DC that was backed up 4 months ago?
* What are GPOs?
* What is the order in which GPOs are applied?
* Name a few benefits of using GPMC.
* What are the GPC and the GPT? Where can I find them?
* What are GPO links? What special things can I do to them?
* What can I do to prevent inheritance from above?
* How can I override blocking of inheritance?
* How can you determine what GPO was and was not applied for a user? Name a
few
ways
to do that.
* A user claims he did not receive a GPO, yet his user and computer accounts
are in the
right OU, and everyone else there gets the GPO. What will you
look for?
* Name a few differences in Vista GPOs
* Name some GPO settings in the computer and user parts.
* What are administrative templates?
* What's the difference between software publishing and assigning?
* Can I deploy non-MSI software with GPO?
* You want to standardize the desktop environments (wallpaper, My Documents,
Start menu, printers etc.) on the computers in one department. How would you
do that?
PC Hardware
* What is FSB?
* What are Vcore and Vi/o?
* On what type of socket can you install a Pentium 4 CPU?
* What is SMP?
* Which Intel and AMD processors support SMP?
* How do LGA sockets differ from PGA and SEC?
* What is the difference between Pentium 4 and Pentium Core 2 Duo? Explain t
he new technology.
* How does IRQ priority works?
* What technology enables you to upgrade your computer's BIOS by simply usin
g a
software?
* What happens if you dissemble the battery located on the Mother-Board?
* How do L1, L2, and L3 work?
* How should we install RAM on a Dual-Channel Motherboard?
* What is the advantage of serial over parallel bus?
* Is USB using serial or parallel bus? What about Firewire?
* How much power is supplied to each USB port?
* When should you change your bus-powered USB hub to a self-powered USB hub?
* What is a UPS?
* What is the difference between standby and online UPS?
* What is LBA (in Hard-Disks)?
* How many Hard Disks can you install on an E-IDE controller?
* Can you configure two hard disks to use the Master setting on the same PC?
* What is the difference between Narrow-SCSI and Wide-SCSI?
* What is SAS?
* What are the three main reasons for using RAID?
* Is RAID 0 considered to be a redundant Solution? Why?
* How many disks can be used for RAID 1?
* How RAID 5 works?
* What is the smallest number of disks required for RAID5?
* What other types of RAID do you know?
What
What
When
What
is a NIC?
is a MAC Address?
would you use a crosslink cable?
are the main advantages and disadvantages of Fiber-Optic-based networ
*
*
*
*
*
*
ks?
* Describe some of the settings that are added by TCP and by UDP to the pack
header.
* What are TCP Ports? Name a few.
* What is a TCP Session?
* What three elements make up a socket?
* What will happen if you leave the default gateway information empty while
manually
configuring TCP/IP?
* What will happen if you execute the following command: "arp d *"?
* What is ICMP?
* When would you use the ping command with the "-t" switch?
* What command-line tool would help you discover for which port numbers your
computer is listening?
* What is APIPA? How would you recognize it?
* What is a Cyclic Redundancy Check?
* What would you type in at a command prompt to view the IP settings for the
computer that you are sitting at?
* What command would you type in at a command prompt to view the IP address
of
the remote computer?
* What is the W Value for class B?
* What is the Net ID of an IP Address of 18.9.25.3 with Subnet Mask of 255.0
.0.0?
* What is CIDR?
* What is 255.255.255.255 used for?
* What is the maximum number of hosts for a Class B Network?
* What is the (default) class type of 195.152.12.1?
* What is the subnet mask for 10.0.10.1/17?
* What is the result when changing from a subnet mask of 255.255.224.0 to a
subnet mask of 255.255.240.0?
* How can you access a shared folder from a remote computer? Name at least 3
methods.
et's
]
Technical Interview Questions
Active Directory
* How can you forcibly remove AD from a server, and what do you do later?
Ca
n I get
user passwords from the AD database?
* What tool would I use to try to grab security related packets from the wir
e?
* Name some OU design considerations.
* What is tombstone lifetime attribute?
* What do you do to install a new Windows 2003 DC in a Windows 2000 AD?
* What do you do to install a new Windows 2003 R2 DC in a Windows 2003 AD?
* How would you find all users that have not logged on since last month?
* What are the DS* commands?
* What's the difference between LDIFDE and CSVDE? Usage considerations?
* What are the FSMO roles? Who has them by default? What happens when each o
ne
fails?
* What FSMO placement considerations do you know of?
* I want to look at the RID allocation table for a DC. What do I do?
* What's the difference between transferring a FSMO role and seizing one? Wh
ich one
should you NOT seize? Why?
* How do you configure a "stand-by operation master" for any of the roles?
* How do you backup AD?
* How do you restore AD?
* How do you change the DS Restore admin password?
* Why can't you restore a DC that was backed up 4 months ago?
* What are GPOs?
* What is the order in which GPOs are applied?
* Name a few benefits of using GPMC.
* What are the GPC and the GPT? Where can I find them?
* What are GPO links? What special things can I do to them?
* What can I do to prevent inheritance from above?
* How can I override blocking of inheritance?
* How can you determine what GPO was and was not applied for a user? Name a
few
ways to do that.
* A user claims he did not receive a GPO, yet his user and computer accounts
are in the
right OU, and everyone else there gets the GPO. What will you lo
ok for?
* Name a few differences in Vista GPOs
* Name some GPO settings in the computer and user parts.
* What are administrative templates?
* What's the difference between software publishing and assigning?
* Can I deploy non-MSI software with GPO?
* You want to standardize the desktop environments (wallpaper, My Documents,
Start menu, printers etc.) on the computers in one department. How would you
do that?