Escolar Documentos
Profissional Documentos
Cultura Documentos
?Q. What’s the difference between the WWW and the Internet
A. This question will throw a lot of people off, but it is absolutely valid.
The Internet is a collection of computers and networks that can all talk to
.each other, while WWW is an application that runs on the Internet
Q. Have you ever been in a situation where you found yourself without the
specific technical knowledge to perform a task essential to your project?
?What did you do
A. This question is one that every engineer should have an answer for. It
should be relatively easy to answer—be truthful without showing a
weakness in ability. This is when a good researching talent comes in
handy. No one expects an engineer to have memorized all of the
information necessary to perform his job, but you need to have the skills
.to find the correct information quickly
Q. Describe what a password policy is and the reasons for having one.
.Give an example of a policy and its rule set
A. This is one of the most important and overlooked details in a secure
network. You’ll get pushback from the users, but they will adjust. An
engineer must be well versed in security and the policies required to
.implement and maintain it
?Q. How (and how often) should you test your disaster recovery plan
A. Again, disaster recovery plans are a critical part of a network engineer’s
job. A disaster recovery plan should be tested by doing an actual rebuild
and restore of critical systems at least once every six months (or when
.major data or infrastructure changes occur)
Q. How often do you change the administrator passwords and accounts on
?local machines and domains
A. Here is another area that doesn’t seem to get the attention it deserves.
These passwords should be changed as part of a global password policy,
and immediately upon any change of personnel who have knowledge of or
.access to the accounts and/or passwords
Q. How often should a server be accessed to have the logs and drive
?space checked
A. Although there is no set rule for this, it is a good idea to physically
access each server at least once a week to check its overall health. There
are a variety of applications that will alert you to errors and error
conditions, but nothing replaces actually being logged into the server itself
.to get a good look at its performance
?Q. How do you balance customer service skills and technical skills
A. IT is a service organization. As such, customer service skills are just as
important as technical skills, particularly in panic situations when systems
are down or the user has just deleted their board presentation that’s due
in 30 minutes. At these times, staying calm and being empathetic to the
user are just as important as being able to quickly bring up the system or
.recover the file
Networking
?Q. What mask would you use to supernet two class C addresses
.A. The subnet would be 255.255.254.0
Q. Which utility can you use to find the MAC and TCP/IP address of your
?Windows NT or 2000 workstation
A. The ipconfig utility is available for both these operating systems. It
displays information like the MAC and TCP/IP address of your workstation
.as well as other TCP/IP configuration information
?Q. Which WAN technology uses digital signaling from sender to receiver
A. The T-series of WAN connection (such as T1, T3, and so on) uses digital
.signaling from sending hardware to receiving hardware
Q. You are setting up a workstation for remote access to the office. The
office has a modem pool configured, and it is working correctly. The
required results are that the workstation and modem bank must establish
a connection and that the server at the office must authenticate the
workstation. Optionally, the workstation and office must be able to
communicate by using a single protocol, and the workstation must be able
to access all network devices at the office. The proposed solution is to
install a POTS telephone line, modem cable, and modem connected to the
workstation. How would you configure the protocols to achieve the desired
?results
A. This question tests your ability to configure protocols and select the
best one to meet the connectivity requirements. The recommended
protocol here would be TCP/IP since it can be used across the different
.access methods
Q. Which remote access protocol can run over both serial and parallel
?connections
A. Because PPP doesn’t contain a physical layer specification as part of the
.protocol, it can run over any kind of medium
Q. What Microsoft TCP/IP protocol can be used over the Internet to create
?a secure, virtual network
A. The Point-to-Point Tunneling Protocol (PPTP) allows you to create a
secure, virtual connection between two points by tunneling one protocol
.inside another. Usually, a PPP connection is opened over a TCP/IP link
Q. Which type of firewall checks for a current communication and the next
?packet needed
A. A proxy provides firewall services by keeping track of all
.communications sessions and “prefetching” the next packets