Top 50 πŸ”₯ Network Administrator Interview Questions and Answers

SkillsBuild Training
24 Mar 202125:25

Summary

TLDRThis video script by Lauren offers an informative guide to the top 50 interview questions for aspiring network administrators. It covers essential IT concepts such as firewalls, VPNs, IP addresses, DNS, and network topologies. The script also delves into the OSI model, network devices like routers and switches, and security topics like DoS attacks and encryption. Additionally, it touches on practical aspects of networking, including troubleshooting, VLANs, and the use of tools like ipconfig and SNMP. The content is designed to help IT professionals prepare for interviews and enhance their understanding of network administration.

Takeaways

  • πŸ”’ A firewall is a security system that prevents unauthorized connections between networks, using either software or hardware implementations.
  • 🌐 The difference between HTTP and HTTPS is that HTTP is the standard protocol for transmitting website data over the internet (using TCP port 80), while HTTPS is a secure version that adds encryption and identity verification (using TCP port 443).
  • πŸ›‘οΈ A VPN (Virtual Private Network) provides a secure connection over public networks like the internet, often used by remote workers to access their company's network securely.
  • πŸ“ IP addresses are categorized into public and private addresses; public IPs are routable on the internet, while private IPs are used for internal networks and are not internet-routable.
  • πŸ”„ DNS (Domain Name System) translates domain names into IP addresses, acting as the internet's phone book to locate and access internet resources.
  • πŸš€ The default route in networking is a configuration that establishes packet forwarding rules when no specific next hop address is available.
  • πŸ”„ DHCP (Dynamic Host Configuration Protocol) automates the assignment of IP addresses to network devices, eliminating the need for manual IP address allocation.
  • πŸ’₯ A DoS (Denial of Service) attack aims to make network services or the internet unavailable to users, often by overwhelming a web server with traffic.
  • 🌐 Network topology refers to the physical and logical layout of a network, including how devices and cables are connected.
  • πŸ› οΈ A router is a networking device that manages data flow between connected devices and segments, forwarding data packets based on their destination.
  • πŸ“ˆ The OSI reference model has seven layers, each with specific functions, that define how applications communicate within a network.

Q & A

  • What is the primary function of a firewall?

    -A firewall's primary function is to prevent connections between two or more sources by blocking any incoming or outgoing traffic, enhancing network security.

  • What are the two forms of firewalls and how do they differ?

    -Firewalls come in two forms: software firewalls, which are programs that provide network security features, and hardware firewalls, which are physical devices that act as a barrier between a trusted network and an untrusted network.

  • Explain the difference between HTTP and HTTPS protocols.

    -HTTP (Hypertext Transfer Protocol) is used for transmitting website data and allows for the use of hyperlinks, operating over TCP port 80. HTTPS (HTTP Secure) is a secure version of HTTP that provides identity verification and encryption, using TCP port 443.

  • What is a VPN and why is it commonly used?

    -A VPN (Virtual Private Network) is a service that allows users to create a secure connection over public networks like the internet. It is commonly used by remote workers to access their company's network securely from different locations.

  • What are the two types of IP addresses and what are their purposes?

    -There are two types of IP addresses: public and private. Public IP addresses are used to access the internet and are routed on the internet, while private IP addresses are used for internal networks and are not routed on the internet, ensuring that traffic cannot be sent to them from the outside.

  • What is DNS and how does it function?

    -DNS (Domain Name System) is like the phone book of the internet. It translates domain names, like www.google.com, to IP addresses that browsers can use to load internet resources through the IP protocol.

  • What is the role of DHCP in a network?

    -DHCP (Dynamic Host Configuration Protocol) is responsible for automatically assigning IP addresses to network devices, eliminating the need for manual IP address allocation and reducing the potential errors associated with manual configuration.

  • What is a DoS attack and how is it executed?

    -A DoS (Denial of Service) attack is an attempt to prevent users from accessing the internet or network services. It is often executed by hackers who overload a web server, making it unable to process legitimate traffic and rendering any website on that server inaccessible.

  • Explain the concept of network topology.

    -Network topology refers to the physical and logical layout of a computer network. It defines how computers, devices, and cables are connected to each other, providing a visual representation of the network's structure.

  • What is a router and how does it manage data flow?

    -A router is a network device that manages the flow of data to multiple connected devices. It connects two or more network segments and transfers information from the source to the destination. Routers use data packets and routing tables to determine the best path for forwarding data.

  • What are the seven layers of the OSI reference model and how do they facilitate communication?

    -The OSI (Open System Interconnection) model has seven layers: Physical, Data Link, Network, Transport, Session, Presentation, and Application. Each layer provides specific functions that facilitate communication between applications within a network, ensuring that data is transmitted and received correctly.

Outlines

00:00

πŸ”’ Network Security and Protocols

This paragraph introduces the video's focus on top 50 network administrator interview questions, with the first few addressing network security and protocols. It explains what a firewall is and its role in blocking incoming and outgoing traffic, the difference between HTTP and HTTPS protocols, and the use of VPNs for secure remote access. Additionally, it covers the basics of IP addresses, DNS, default routes, DHCP, DoS attacks, and network topology, providing foundational knowledge for IT professionals.

05:00

🌐 Network Models and Technologies

The second paragraph delves into network models and technologies, starting with the OSI reference model and its seven layers, which facilitate communication between network applications. It then discusses the WAN technology suitable for a company's global connectivity needs, the role of proxy servers in network security, the localhost concept, MAC addresses, data encapsulation, and network management through SNMP. The paragraph also touches on the different types of networks based on size, such as LANs, MANs, and WANs, and defines round trip time (RTT) as a key network performance metric.

10:02

πŸ”§ Network Devices and Configuration

This section focuses on network devices and their configuration, explaining the function of a router in managing data flow and the use of IP packets and routing tables. It introduces the concept of data encapsulation in computer networks, the use of IPconfig and ifconfig commands for network interface configuration, and the SNMP for device management. The paragraph also discusses the three types of networks based on size, the importance of the OSI model for protocol layering, and the distinction between MAC addresses and IP addresses in networking.

15:03

🌟 VLANs, Subnets, and Network Management

The fourth paragraph emphasizes VLANs and subnets in network management, detailing how VLANs work at the data link layer to separate network traffic and how subnets are composed of IP addresses and subnet masks. It addresses common HTTP status codes, the smallest IPv4 subnet mask for a network of up to 30 devices, packet filtering as a firewall technique, and the advantages of reverse proxy servers. The paragraph also clarifies the roles of routers and gateways in network traffic regulation and the function of DNS records in mapping domain names to IP addresses.

20:05

πŸ“ˆ Network Performance and Career Development

The final paragraph discusses network performance, with a focus on the number of network IDs in a class C network and the host IDs per network ID. It explores practical scenarios like file sharing between two computers without a hub or router, secure CLI sessions with Cisco switches, and the use of TCP/IP protocol stack for datagram replies. The paragraph concludes with questions about open source project contributions, handling technical mistakes, staying updated with technical news, resolving disagreements in a team, and factors affecting network throughput.

25:06

πŸš€ Career Development Resources

This closing paragraph provides a brief call to action for viewers to check out more information and resources to help develop their IT careers, suggesting further exploration of topics covered in the video.

Mindmap

Keywords

πŸ’‘Firewall

A firewall is a network security device that monitors incoming and outgoing network traffic and decides whether to allow or block specific traffic based on a set of rules. In the context of the video, it is described as preventing connections between two or more sources and blocking any incoming or outgoing traffic, existing in both software and hardware forms.

πŸ’‘HTTP and HTTPS Protocols

HTTP (Hypertext Transfer Protocol) and HTTPS (HTTP Secure) are protocols used for transmitting data over the internet. HTTP is the foundation of data communication for the web, operating on TCP port 80, while HTTPS is a secure version of HTTP that uses encryption and operates on TCP port 443, ensuring secure data transactions.

πŸ’‘VPN (Virtual Private Network)

A VPN is a service that creates a secure and encrypted connection over the internet, allowing users to access the web securely and privately. It is often used by remote workers to connect to their company's network, ensuring that their data is protected from potential eavesdropping or tracking on public networks.

πŸ’‘IP Addresses

IP addresses are numerical labels assigned to devices connected to a computer network that use the Internet Protocol for communication. They are divided into two types: public and private. Public IP addresses are routable on the internet, while private IP addresses are used for internal networks and are not directly accessible from the internet.

πŸ’‘DNS (Domain Name System)

DNS is the system that translates more readily memorized domain names to the IP addresses needed for locating and identifying computer services and devices on the internet. It serves as the 'phone book' of the internet, converting human-friendly domain names into machine-readable IP addresses.

πŸ’‘Default Route

A default route in networking is a routing table entry that tells the network device to forward packets to a specific router or network when the destination IP address is not found in the routing table. It is a fallback mechanism for packets that do not have a specific route defined.

πŸ’‘DHCP (Dynamic Host Configuration Protocol)

DHCP is a network management protocol used on IP networks where a server dynamically assigns an IP address and other network configuration parameters to each device on the network, so they can communicate with other IP networks. It simplifies the management of IP addresses and reduces the potential for errors in manual allocation.

πŸ’‘DoS (Denial of Service) Attack

A DoS attack is an attempt to make a machine or network resource unavailable to its intended users by temporarily or indefinitely disrupting services of a host connected to the Internet. This is often done by flooding the targeted machine or resource with superfluous requests in an attempt to overload systems and prevent some or all legitimate requests from being fulfilled.

πŸ’‘Network Topology

Network topology refers to the arrangement of different elements (links, nodes, etc.) in a computer network. It defines the physical and logical layout of the network, showing how devices are connected to each other and how data flows through the network.

πŸ’‘Router

A router is a networking device that forwards data packets between computer networks. It determines the best path for data to travel, sending data packets from their source to their destination through a network. Routers operate at the network layer (Layer 3) of the OSI model and use routing tables to make decisions about where to forward packets.

πŸ’‘OSI Model

The OSI model, or Open Systems Interconnection model, is a conceptual framework that characterizes and standardizes the communication functions of a telecommunication or computing system without regard to its underlying internal structure and technology. It is typically illustrated as a seven-layer model, with each layer representing a specific function in the networking process.

Highlights

Firewalls can be either software or hardware and are used to block incoming or outgoing traffic.

HTTP and HTTPS protocols differ in that HTTPS is a secure version of HTTP with identity verification and encryption.

A VPN allows secure connections over public networks, commonly used by remote workers to access their company's network.

IP addresses are divided into public and private groups; public IP addresses route on the internet while private addresses are for local networks.

DNS translates domain names to IP addresses, acting as the internet's phone book.

A default route in IP configuration establishes forwarding rules for packets when no specific next hop address is available.

DHCP automates the assignment of IP addresses to network devices, eliminating manual allocation errors.

DOS attacks aim to prevent users from accessing the internet or network services, often by overloading web servers.

Network topology defines the physical layout of a computer network and how devices are connected.

Routers manage data flow between network segments and are essential for transferring information from source to destination.

The OSI reference model has seven layers and defines how applications communicate within a network.

WAN technology is recommended for a company expanding globally to keep all branches connected 24/7.

A proxy server protects the network by preventing unauthorized access to internal IP addresses.

127.0.0.1, or localhost, is the loopback address used to establish a connection with one's own computer for testing purposes.

MAC addresses are unique, permanent identifiers for network hardware, unlike IP addresses which can change.

Data encapsulation in networking involves adding headers to packets for transmission between computers.

IPConfig and ifconfig commands are used to view and configure network interface settings on Windows and Unix-based systems, respectively.

SNMP is a protocol for managing and exchanging information between network devices like switches, routers, and printers.

Networks can be categorized by size into LANs, MANs, and WANs, each covering different geographic areas and numbers of devices.

Round trip time (RTT) measures the time for a signal to reach its destination and return with an acknowledgement.

Encryption and decryption are processes used to secure data transmission by converting data to unreadable forms and back to original forms.

Transcripts

play00:00

hi everyone in this video i'm going to

play00:03

show you

play00:03

the top 50 network administrator

play00:06

interview questions and answers

play00:08

my name is lauren and this channel is

play00:10

all about showing you how to become

play00:13

a highly paid itpro fast

play00:16

let's get started

play00:18

[Music]

play00:22

question number one what is a firewall

play00:26

a firewall prevents connection between

play00:28

two or more sources

play00:30

it basically blocks any incoming or

play00:33

outgoing traffic

play00:35

firewalls come in two forms software or

play00:38

hardware firewalls

play00:40

question number two can you explain the

play00:43

difference between

play00:44

http and https protocols

play00:49

http stands for hypertext transfer

play00:52

protocol

play00:53

and is used by the majority of websites

play00:56

as a means of transmitting website

play00:58

data and it allows for the use of

play01:00

hyperlinks

play01:01

this protocol uses tcp port 80.

play01:06

https is a secure version of the http

play01:10

protocol that allows for identity

play01:12

verification

play01:13

and low level encryption using tc port

play01:16

443 question number three

play01:20

what is a vpn a vpn

play01:23

is a virtual private network it allows

play01:25

users to create a secure connection over

play01:28

public networks such as the internet

play01:31

vpns are commonly used by mobile workers

play01:34

in order to access their company's

play01:36

network from remote locations

play01:38

question number four what are two types

play01:41

of ip addresses

play01:42

and what are they used for all ipv4 ip

play01:46

addresses can be divided into two

play01:49

major groups public and private ip

play01:52

addresses a

play01:54

public ip address is an ip address that

play01:56

is used to access the internet

play01:59

public ip addresses are routed on the

play02:01

internet

play02:02

private internal ip addresses are not

play02:05

routed on the internet and traffic

play02:07

cannot be sent to them from the internet

play02:10

they are only supposed to work within

play02:11

local networks

play02:13

question number five what is dns

play02:17

dns stands for domain name system

play02:20

it is basically the phone book of the

play02:22

internet

play02:23

dns translates domain names for example

play02:28

www.google.com or www.youtube.com

play02:32

to ip addresses so browsers can load

play02:35

those

play02:35

internet resources through the internet

play02:37

protocol

play02:38

question number six what is a default

play02:41

route

play02:42

a default route is a configuration of

play02:45

the internet protocol

play02:47

ip that establishes a forwarding rule

play02:50

for packets when no specific address of

play02:53

a next hop host

play02:54

is available from the routing table or

play02:56

other routing mechanism

play02:58

question number seven what is dhcp

play03:02

and what is it used for dhcp

play03:05

stands for dynamic host configuration

play03:07

protocol

play03:08

and it automatically assigns ip

play03:10

addresses to network devices

play03:13

it completely removes the process of

play03:15

manual allocation of ip addresses

play03:18

and reduces the errors caused due to

play03:20

this

play03:21

question number eight what is dos

play03:24

dos or denial of service attack is an

play03:27

attempt to prevent users from being able

play03:30

to access the internet

play03:31

or any other network services such

play03:34

attacks

play03:35

may come in different forms and are

play03:37

commonly performed by hackers

play03:39

one common method of doing this is to

play03:41

overload a web server so that it can no

play03:43

longer process legitimate traffic

play03:46

any website on this web server then

play03:48

becomes inaccessible

play03:50

question number nine what is network

play03:53

topology

play03:54

network topology is a physical layout of

play03:57

the computer network

play03:58

and it defines how the computers devices

play04:01

cables etc

play04:02

are connected to each other question

play04:04

number 10

play04:06

what is a router a router is a device

play04:09

that manages the flow of data to

play04:11

multiple connected devices

play04:13

it is a network device that connects two

play04:15

or more network segments

play04:17

it is used to transfer information from

play04:20

the source to the destination

play04:22

in simple words the cable coming from

play04:24

your isp

play04:25

goes into a modem which converts input

play04:27

signals into digital data

play04:29

usable by a computer a router connects

play04:32

your modem with other devices to allow

play04:34

communication between those devices

play04:36

and the internet routers send

play04:39

information in the form of data packets

play04:42

when a router receives a packet it

play04:44

checks its routing table to determine if

play04:46

the destination address is for a system

play04:49

on one of its attached networks or if

play04:51

the message must be forwarded to another

play04:53

router

play04:54

when packets are forwarded from one

play04:56

router to another router

play04:58

the receiving router reads the network

play05:00

address in the packets

play05:01

and identifies the destination network

play05:04

and repeats the process

play05:05

mentioned above question number 11 what

play05:08

is the osi reference model and how many

play05:11

layers does it have

play05:13

the open system interconnection model is

play05:15

a conceptual reference model that

play05:17

defines how applications communicate

play05:20

with each other within a network

play05:21

it also helps you to understand the

play05:23

relationship between networks

play05:25

and defines the process of communication

play05:27

in a network

play05:28

it has seven layers question number 12

play05:32

let's say a company is expanding its

play05:34

business to other countries

play05:36

it wants all of its branches to remain

play05:38

connected to its corporate headquarters

play05:40

24

play05:41

7. which network technology do you think

play05:43

they should use

play05:44

they should use a wan question number 13

play05:48

what is a proxy server and how do they

play05:50

protect the computer network

play05:53

all devices on a network have an ip

play05:55

address

play05:56

knowing the exact ip address of a

play05:58

network device can leave that device

play06:00

exposed to an attack proxy servers

play06:03

prevent unauthorized external users from

play06:06

accessing those internal ip addresses it

play06:09

makes the computer network

play06:10

virtually invisible to external users

play06:13

question number 14

play06:15

what is meant by 127.0.0.1

play06:20

localhost simply put localhost is the

play06:24

default name

play06:25

used to establish a connection with your

play06:27

own computer using the loopback address

play06:29

network

play06:30

think of loopback as looping back to

play06:32

your own machine

play06:34

the loopback address network has a

play06:36

default ip address of 127.0.0.1

play06:41

localhost is used to test applications

play06:44

on a local computer

play06:45

when you move to a production or remote

play06:48

server you will change the references

play06:50

from localhost to the domain name

play06:52

you are using the ip address 127.0.0.1

play06:58

is reserved for loopback or localhost

play07:00

connections

play07:01

these networks are usually reserved for

play07:03

the biggest customers

play07:04

or some of the original members of the

play07:07

internet

play07:08

to identify a connection issue the

play07:10

initial troubleshooting step

play07:12

is to ping the server and check if it is

play07:14

responding

play07:17

127.0.0.1 and

play07:19

localhost are the same things in most of

play07:21

the computer network

play07:23

question number 15 what is a mac address

play07:26

a mac address is a unique device address

play07:29

given to

play07:30

every network connected hardware unlike

play07:33

ip addresses

play07:34

mac addresses are permanent every

play07:37

network connected device has

play07:39

one and only one mac address mac stands

play07:42

for

play07:43

media access control it is a unique

play07:45

48-bit serial number

play07:47

burned into the network circuitry of

play07:50

every ethernet and wi-fi device

play07:52

question number 16 what is data

play07:55

encapsulation

play07:56

in a computer network to enable data

play07:58

transmission from one computer to

play08:00

another

play08:01

the network devices send messages in the

play08:03

form of packets

play08:05

these packets are then added with the ip

play08:08

header by the relevant osi

play08:10

reference model layer the data link

play08:12

layer encapsulates each packet

play08:15

in a frame that contains the hardware

play08:17

address of the source

play08:18

and the destination computer if a

play08:20

destination computer is on a remote

play08:23

network

play08:23

then the frames are routed through a

play08:25

gateway or router to the destination

play08:27

computer

play08:29

question number 17 what is ipconfig

play08:32

and ifconfig ipconfig stands for

play08:36

internet protocol configuration

play08:38

and is a command used on microsoft

play08:40

windows to view and configure the

play08:42

network interface

play08:43

the command ipconfig is useful for

play08:46

displaying

play08:47

all tcp ip network information currently

play08:50

available on a network

play08:52

it also helps to modify the dhcp

play08:54

protocol

play08:55

and dns settings ifconfig

play08:58

also known as interface configuration is

play09:01

a command that is used on linux

play09:03

mac and unix operating systems

play09:06

it is used to view and configure the tcp

play09:10

ip network interface parameters from the

play09:12

command line

play09:13

question number 18 what is snmp

play09:17

snmp stands for simple network

play09:20

management protocol

play09:22

it is a protocol used for collecting

play09:24

organizing and exchanging

play09:26

information between network devices snmp

play09:29

is widely used in network management for

play09:32

configuring network devices like

play09:34

switches

play09:35

hubs routers printers and servers

play09:38

question number 19 explain three types

play09:41

of networks

play09:42

based on their sizes the size of a

play09:45

network is defined by the geographic

play09:47

area it covers and the number of

play09:50

computers or

play09:50

network devices within it three types of

play09:53

networks based on their size

play09:55

are local area network lan

play09:58

a network with a minimum of two

play10:00

computers to a maximum of

play10:02

thousands of computers within an office

play10:04

or a building

play10:05

is known as a lan generally it works for

play10:08

a single site where people can share

play10:10

resources like printers data storage

play10:12

and more metropolitan area network

play10:16

man it is larger than a land and used to

play10:19

connect

play10:20

various lands across small regions a

play10:22

city

play10:23

campus of colleges or universities and

play10:25

the like

play10:26

which in turn forms a larger network

play10:29

wide area network

play10:31

when multiple lands and mans connected

play10:34

together

play10:35

form a wan it covers a wider area like a

play10:38

whole country or

play10:39

the world question number 20 define

play10:43

round trip time the time taken for a

play10:46

signal to reach the destination

play10:47

and travel back to the sender with the

play10:49

acknowledgement is termed as

play10:51

round trip time rtt it is also called

play10:55

round trip delay rtd question number 21

play11:00

what is encryption and decryption

play11:03

encryption is the process of converting

play11:06

transmitted data into a form that cannot

play11:08

be read by any device

play11:09

other than the intended recipient

play11:12

decryption

play11:13

is the process of converting back the

play11:15

encrypted data to its original form

play11:18

an algorithm called a cipher is used in

play11:21

the encryption

play11:22

and decryption process question number

play11:24

22

play11:25

mention two important actions performed

play11:28

by a cisco switch

play11:29

it uses the source mac addresses of

play11:32

frames

play11:32

to build and maintain a mac address

play11:35

table

play11:36

it also utilizes the mac address table

play11:38

to forward frames via the destination

play11:40

mac address

play11:41

question number 23 what is a link

play11:45

a link refers to the connectivity

play11:47

between two devices

play11:49

it includes the type of cables and

play11:51

protocols used for one device to be able

play11:53

to communicate with the other

play11:55

question number 24 briefly describe

play11:58

nat nat stands for network

play12:01

address translation this is a protocol

play12:04

that provides a way for

play12:05

multiple computers on a common network

play12:08

to share a single connection to the

play12:09

internet

play12:10

question number 25 what is rip

play12:14

rip short for routing information

play12:16

protocol

play12:17

is used by routers to send data from one

play12:20

network to another

play12:21

it efficiently manages routing data by

play12:24

broadcasting its routing table to

play12:26

all other routers within the network it

play12:28

determines the network distance

play12:30

in units of hops question number 26

play12:34

you have one 48 port switch with three

play12:37

vlans how many collision domains and how

play12:40

many broadcast domains

play12:42

three broadcast domains and 48 collision

play12:45

domains

play12:46

question number 27 draw a diagram of a

play12:50

network you've worked on and please

play12:52

explain it to me this is one of the most

play12:54

common questions

play12:55

asked in network administrator

play12:57

interviews this question will test your

play13:00

problem solving skills

play13:01

confidence and work experience check out

play13:05

lucidchart's networking diagramming tips

play13:07

and draw

play13:08

simple and complex networks for practice

play13:11

a link to lucidchart's website will be

play13:13

listed in the description area

play13:15

under this video question number 28

play13:18

what's the most important thing about

play13:20

the osi model

play13:22

the most important factor about the osi

play13:25

model

play13:25

is that we can divide up the protocols

play13:28

into layers

play13:29

another key factor is that the layers of

play13:31

the osi model

play13:33

provide encapsulation and abstraction

play13:36

question number 29 can you name the

play13:38

layers of the osi model

play13:40

physical data link network transport

play13:44

session presentation and application

play13:48

question number 30 why can't mac

play13:51

addresses be used instead of ipv4

play13:54

or ipv6 for networking unlike

play13:57

ip addresses mac addresses do not

play14:00

specify

play14:01

unique destinations for communication

play14:04

an ip scheme can be used for a group of

play14:06

computers to logically distinguish them

play14:09

as a group via routing tables these

play14:11

groups can be divided into multiple

play14:14

levels so that we don't have to keep

play14:15

track

play14:16

of every single subnet for instance

play14:21

17.x.x.x is within the apple network

play14:24

using an ip scheme helps apple to keep

play14:27

track of where each of its

play14:28

thousands of subnets is located and how

play14:31

to get to them

play14:32

that's not possible with mac addresses

play14:35

question number 31

play14:37

explain the difference between a vlan

play14:39

and a subnet

play14:41

do you need a vlan to set up a subnet

play14:44

vlans work at the data link layer

play14:47

they refer to the 802.1q standard

play14:51

using vlans you can give ports a unique

play14:53

mac address table

play14:55

separating them from each other vlans

play14:57

can transport one

play14:58

or more subnets a vlan is used for

play15:01

switch partitioning

play15:03

for example let's assume that you have

play15:05

an eight port switch

play15:07

you can use vlans and assign four ports

play15:10

to one

play15:10

vlan vlan one and four ports to another

play15:14

vlan

play15:14

vlan 2. vlan 1 is totally separated from

play15:19

vlan 2 traffic

play15:20

and vice versa on a logical basis you

play15:23

can get two switches using this

play15:25

technique

play15:26

usually if a switch hasn't seen a mac

play15:28

address

play15:29

it will flood the traffic to all other

play15:31

ports

play15:32

vlans prevent this a subnet is a range

play15:36

of ip addresses determined by part of an

play15:38

address

play15:39

often called network address and a

play15:41

subnet mask

play15:43

netmask in simple words a subnet is a

play15:46

small network

play15:47

composed by a group of ip addresses

play15:50

subnets communicate with each other

play15:52

using routers

play15:53

question number 32 mention some common

play15:56

http

play15:58

status codes 1xx informational responses

play16:02

communicates transfer protocol level

play16:04

information

play16:05

2xx success indicates that the client's

play16:09

request was accepted successfully

play16:12

3xx redirection indicates that the

play16:15

client must take some additional action

play16:17

in order to complete their request

play16:20

4xx client-side error

play16:23

this category of error status codes

play16:25

points the finger at clients

play16:27

5xx server-side error the server takes

play16:31

responsibility for these error status

play16:33

codes

play16:34

question number 33 what is the smallest

play16:37

ipv4 subnet mask

play16:39

that can be applied to a network

play16:40

containing up to 30 devices

play16:43

if you have a standard slash 24 vlan for

play16:47

users

play16:48

a 30 for point-to-point links and a

play16:51

network of up to 30 devices

play16:53

the smallest ipv4 subnet mask

play16:56

would be a 27 or a subnet mask

play17:00

of 255.255.2

play17:06

question number 34 what is a packet

play17:09

filter

play17:10

and how does it work a packet filter is

play17:13

used as a firewall technique

play17:15

to control network access by monitoring

play17:18

outgoing

play17:18

and incoming packets packets are checked

play17:21

based on their source

play17:22

and destination ip addresses protocols

play17:26

and ports packet filtering is used for

play17:29

modest

play17:29

security requirements it is used for

play17:32

providing isolation of one subnet

play17:34

from another question number 35

play17:38

what are the advantages of using a

play17:40

reverse proxy server

play17:42

a reverse proxy server will hide the

play17:44

topology and characteristics of your

play17:47

servers

play17:48

it also helps with load balancing

play17:50

because reverse proxy servers enforce

play17:52

algorithms like round robin weighted

play17:54

round robin

play17:55

and weighted least connections some

play17:58

other advantages

play17:59

include ssl offloading and termination

play18:03

question number 36 can you explain the

play18:06

difference between

play18:07

a router and a gateway gateways are used

play18:10

to regulate

play18:11

traffic between two dissimilar networks

play18:14

while routers regulate traffic between

play18:16

similar networks

play18:18

let's say you have a windows 2000

play18:21

network

play18:22

which uses tcp ip as its primary

play18:25

protocol

play18:26

you can connect your network with the

play18:28

internet using a router

play18:30

because the internet also uses tcp ip as

play18:33

its primary protocol

play18:35

on the other hand you'd use a gateway to

play18:38

connect a pc network with a 3270

play18:41

mainframe environment

play18:42

or to connect a windows nt network with

play18:45

a netware network

play18:47

question number 37 what is a default

play18:50

gateway

play18:51

a default gateway serves as an access

play18:54

point

play18:54

for outbound connections to other

play18:56

networks

play18:57

it allows one computer to communicate

play18:59

with another computer on a different

play19:01

network

play19:02

question number 38 can you tell me how

play19:05

dns records work

play19:08

dns records tell the dns server which ip

play19:11

address

play19:12

each domain is associated with it also

play19:15

tells how to handle requests

play19:16

sent to each domain dns records are

play19:19

basically

play19:20

mapping files dns records use specific

play19:24

syntax for its configurations and

play19:26

functions

play19:27

some important dns records are soa

play19:31

start of authority records a address

play19:35

mapping records

play19:36

aaa ip version 6 address records

play19:41

cname canonical name records mx

play19:45

mail exchanger records ns

play19:48

name server records ptr

play19:51

reverse lookup pointer records question

play19:54

number 39

play19:55

what is the number of network ids in a

play19:58

class c

play19:59

network the number of network id bits in

play20:02

a class c network is 24.

play20:04

the number of possible network ids is 2

play20:08

raised to 21 or 2 million

play20:11

97 152

play20:14

the number of host ids per network id is

play20:17

2

play20:18

raised to 8 -2 or 254

play20:22

question number 40 a user in your

play20:25

company wants to connect two computers

play20:27

for file sharing

play20:28

is it possible to do this without using

play20:31

a hub or

play20:31

router yes you can use a crossover cable

play20:35

in this situation

play20:37

the data transmit pin of one cable is

play20:39

connected to the data receive pin

play20:41

of the other cable and vice versa

play20:44

question number 41

play20:46

which connection provides a secure cli

play20:49

session

play20:50

with encryption to a cisco switch an

play20:53

ssh connection question number 42

play20:57

let's say a user opens three browsers on

play21:00

his pc to access

play21:02

www.cisco.com to search for ccna

play21:05

information

play21:07

the cisco web server sends a datagram as

play21:09

a reply to the request from one of the

play21:11

web browsers

play21:13

can you tell which information is used

play21:15

by the tcp

play21:16

ip protocol stack on the user machine to

play21:20

identify which of the three web browsers

play21:22

should receive the reply

play21:24

yes you can use the destination port

play21:26

number

play21:27

question number 43 where are cisco ios

play21:31

debug output messages sent by default

play21:34

they are sent to the console line

play21:36

question number 44

play21:38

let's say a network administrator issues

play21:41

a copy running dash config startup dash

play21:44

config command

play21:45

after making configuration changes on a

play21:48

cisco switch

play21:49

what would be the impact of these

play21:51

commands the new configuration will be

play21:53

loaded if the switch is restarted

play21:56

question number 45 do you contribute to

play21:59

any open source projects

play22:01

contributing to open source projects

play22:03

will help you expand your network and

play22:06

pass

play22:06

a lot of interviews always say yes

play22:09

if it's true when asked this question

play22:12

because the employer would feel that you

play22:14

are enthusiastic about network

play22:16

administration

play22:17

and also willing to share your knowledge

play22:19

contributing to open source projects

play22:22

could be very impactful for your career

play22:24

here are two examples

play22:26

from reddit users to prove that

play22:49

those aren't directly related to network

play22:51

administration but

play22:52

they are meant to prove a point question

play22:54

number 46

play22:56

tell me about the biggest mistake you've

play22:58

made

play22:59

the interviewer wants to see if you are

play23:01

willing to embrace the fact that we're

play23:03

all fallible

play23:04

be very open and say that you've made

play23:07

mistakes but

play23:08

they have helped you learn a lot and

play23:09

progress in life

play23:11

try to mention a technical mistake in

play23:13

your career instead of a behavioral

play23:15

mistake

play23:16

for example you can say that my biggest

play23:18

mistake was to unplug a server that was

play23:20

running dhcp

play23:22

because of this mistake hundreds of

play23:24

people were not able to access the

play23:26

network for

play23:27

almost 50 minutes question number 47

play23:31

what technical news sources do you check

play23:33

daily

play23:34

the interviewer wants to gauge your

play23:36

passion for networking

play23:38

just mention your favorite sources a

play23:40

good example could be the cisco

play23:42

networking blog

play23:43

question number 48 tell me about an

play23:46

instance where your team

play23:47

client or boss disagreed with you how

play23:50

did you resolve this situation

play23:53

this is a very common question asked to

play23:56

check your attitude towards disagreement

play23:58

every company wants a person who is open

play24:00

to disagreements and debate

play24:02

this question could be approached in a

play24:04

variety of ways

play24:06

you can talk about a specific instance

play24:08

from your career or life

play24:09

or make up a situation if you have no

play24:12

experience at all

play24:13

to prove that you are a good listener

play24:15

open communicator

play24:16

and know how to analyze the situation

play24:19

question number 49

play24:21

a network administrator is measuring the

play24:23

transfer of bits across the company

play24:26

backbone for a

play24:27

very important application the

play24:29

administrator notices that the network

play24:31

throughput is lower than the bandwidth

play24:33

expected

play24:34

can you tell which factors could

play24:36

influence the differences in throughput

play24:38

some factors responsible could be the

play24:40

amount of traffic that is currently

play24:42

crossing the network

play24:43

the type of traffic that is crossing the

play24:45

network and the latency that is created

play24:48

by the number of network devices that

play24:49

the data is crossing

play24:51

question number 50 how many hosts are

play24:54

addressable on a network that has a mask

play24:57

of 255.255

play25:03

6. thanks for watching check out the

play25:06

video on the right

play25:07

for more information to help you develop

play25:09

your i.t career

play25:24

you

Rate This
β˜…
β˜…
β˜…
β˜…
β˜…

5.0 / 5 (0 votes)

Related Tags
NetworkAdminInterviewQuestionsFirewallsVPNsIP_AddressesDNSNetworkingBasisITProTipsCyberSecurityTechnicalInterviewsCareerDevelopment