40 IT Tech Support Interview Question And Answers, Sys Admin + Light Networking

cobuman
3 May 202015:47

Summary

TLDRThis video serves as a comprehensive guide for IT job interviews, particularly for system and network administration roles. It covers essential interview questions and answers, tailored to help candidates showcase their skills effectively. From explaining the basics of Windows Server and TCP/IP to discussing advanced topics like Active Directory and VPNs, the video provides simplified explanations for better understanding. It also includes practical advice on how to stand out in interviews, emphasizing the importance of personal experience and relevance to the job position.

Takeaways

  • πŸ˜€ The video is aimed at helping individuals preparing for tech support interviews, covering both system and network administration topics.
  • πŸ”’ The role of Windows Server is to act as a centralized system providing functions and rules for networked devices.
  • πŸ“‚ Windows Domain facilitates access to user accounts, computers, printers, and security features through a domain controller.
  • πŸ”₯ A firewall's purpose is to filter network traffic, allowing or blocking data based on predetermined security rules.
  • 🌐 TCP/IP is a foundational protocol suite for data transmission, with TCP ensuring data packet order and reliability.
  • πŸ”’ HTTPS provides secure communication over the internet with encryption and identity verification, using TCP port 443.
  • πŸ” DNS translates domain names into IP addresses, essential for internet navigation, and operates on port 53.
  • πŸ”„ Active Directory is a Windows service for user and computer authentication, policy enforcement, and software distribution.
  • πŸ—‘οΈ Garbage collection in Active Directory is a process that cleans up expired objects to free up space.
  • πŸ”„ RAID (Redundant Array of Independent Disks) provides data redundancy and can improve performance through striping.
  • πŸ’Ύ System Volume Folder in a domain controller holds copies of critical system files for replication purposes.
  • πŸ”‘ Group Policy is used to control configurations and permissions for users and computers within an organization.
  • πŸ“§ Different types of email servers use specific ports; POP3 and IMAP for incoming mail, SMTP for outgoing.
  • 🌳 The difference between a forest and a domain in Active Directory is that a forest is a collection of multiple domains.
  • 🌐 Virtual machines allow multiple operating systems to run on a single computer, providing flexibility for development and testing.
  • πŸ”’ 'Tattooing the registry' refers to permanent changes made by Group Policy that do not revert when the policy is removed.
  • πŸ›‘οΈ A proxy server filters and can monitor network traffic, blocking access to certain sites and hiding user activity.
  • πŸš€ UDP (User Datagram Protocol) offers faster connection speeds than TCP by broadcasting data without waiting for confirmation.
  • πŸ”„ The loopback IP address (127.0.0.1) is used for testing network interface card functionality during troubleshooting.
  • πŸ“‘ DHCP automates IP address distribution on a network, with addresses being dynamically assigned and released.
  • πŸ”’ SSH (Secure Shell) establishes secure connections between devices, useful for remote access and administration.
  • 🌐 The OSI model consists of seven layers: Physical, Data Link, Network, Transport, Session, Presentation, and Application.
  • πŸ› οΈ Network Layer in OSI is responsible for routing, error handling, and packet sequencing in data transmission.
  • 🌐 Different types of network cables like Cat5, Cat5e, and Cat6 offer varying speeds and are rated for 100 meters maximum distance.
  • πŸ” A subnet mask defines network and host addresses, essential for the TCP/IP protocol to understand network structure.
  • 🏒 The difference between a workgroup and a domain is that a workgroup has local rules and permissions, while a domain is governed by a central domain controller.
  • πŸ” DNS issues can occur if a host is reachable by IP but not by name, indicating a potential DNS resolution problem.
  • πŸ”¬ The trace route command provides a detailed path of data transmission through various network devices to a final destination.
  • πŸ”„ IP config is used to view and modify local network settings such as DHCP configuration, DNS, and subnet mask.
  • πŸ”’ VPN (Virtual Private Network) allows secure connections over public networks, commonly used for remote access to company networks.
  • πŸ”„ A network switch operates at the physical layer, connecting and managing data flow between multiple devices on a network.
  • πŸ€” The final question prompts candidates to consider their unique selling points and how they can benefit the company, emphasizing the importance of self-promotion in interviews.

Q & A

  • What is the purpose of the video script provided?

    -The video script is designed to prepare individuals for tech support interviews, particularly those related to system and network administration. It serves as a guide for those new to IT, considering a helpdesk role, and as a refresher for those with upcoming interviews.

  • Why is the 'Tell us about yourself' question important in an interview?

    -This question is crucial as it is the first opportunity for a candidate to present themselves as the best fit for the job. It should be tailored to the specific position, focusing on relevant experiences and skills.

  • What role does Windows Server play in a network?

    -Windows Server acts as a centralized computer that provides specific functions and rules for computers, users, and components connected to a network.

  • Can you explain the concept of a Windows domain?

    -A Windows domain offers access to user accounts, computers, printers, and security features as part of a database controlled by a domain controller.

  • What is the primary function of a firewall?

    -A firewall serves as a filter between computer resources, blocking incoming or outgoing traffic to protect the network from unauthorized access.

  • What does TCP/IP protocol handle?

    -TCP/IP handles the establishment of connections between computers before data transmission and manages the order of data packets being sent back and forth.

  • What is the difference between HTTP and HTTPS?

    -HTTP is the Hypertext Transfer Protocol used for transmitting website data, primarily using TCP port 80. HTTPS is a secure version of HTTP that allows identity verification and encryption, using TCP port 443.

  • What does DNS stand for and what is its primary function?

    -DNS stands for Domain Name System, and its main function is to translate domain names into numeric IP addresses, such as translating 'cosmicnovo.com' to its IP address 130.211.16.109.

  • What is Active Directory and its purpose in Windows Server OS?

    -Active Directory is a service used for user and computer authentication within a domain and enforcing security policies with Group Policy Objects (GPOs), which can also be used for software installations across the domain.

  • What is a lingering object in Active Directory?

    -A lingering object is created when an object is removed from Active Directory while the domain controller is offline. It signifies that the object must be replicated by the main controller before it expires.

  • What does RAID stand for and what are its benefits?

    -RAID stands for Redundant Array of Independent Disks. It provides data redundancy across multiple hard disks and can improve read and write performance using striping configurations.

  • What commands can be used in CMD to test network connectivity?

    -The commands used to test network connectivity include 'ping', 'traceroute', and 'ipconfig'.

  • What is the purpose of the Group Policy in a Windows operating system?

    -The Group Policy assists in managing user data, computer information, applications, and settings by defining business roles, group members, and locations through user group policy.

  • How is Active Directory backed up and what tools are used?

    -Active Directory can be backed up using the 'ntdsutil' backup tool that comes with Windows Server 2003 or a command prompt for Windows Server 2008, using the command 'wbadmin start systemstatebackup -backuptarget: e:'.

  • What is garbage collection in Active Directory and how often is it performed?

    -Garbage collection is a process designed to free space inside of Active Directory by removing expired objects. It is performed by default every 12 hours.

  • What is the System Volume Folder and its role in replication across a domain?

    -The System Volume Folder is a directory that houses a copy of the main files found on a local drive within a domain controller. Its purpose is to facilitate replication across the domain, such as for user login scripts and Windows group policy.

  • What are the different types of email servers and their respective ports?

    -There are two types of email servers: the incoming mail server which uses POP3 on port 110, IMAP on port 143, and HTTP on port 80; and the outgoing mail server which uses SMTP on port 25.

  • What is the difference between a forest and a domain in Active Directory?

    -A domain is a logical group of computers, users, and devices within Active Directory, while a tree is a collection of domains. If there are multiple trees, they form a forest.

  • What is a common DNS issue and how can it be identified?

    -A common DNS issue occurs when a host cannot be reached by its name over the network but can be reached using an IP address, indicating a problem with DNS resolution.

  • How can you analyze the connection between a local host and a server?

    -The 'tracert' command (trace route) can be used to analyze the connection between a local host and a server, providing detailed path information through switches, servers, and computers to the final destination.

  • What is the IP config command used for and what additional actions can it perform?

    -The IP config command is used to determine DHCP IP settings, DHCP configuration, DNS default gateway, and subnet mask. It can also be used to change local DHCP settings, for example, using 'ipconfig /release' or 'ipconfig /renew'.

  • What is a VPN and how does it benefit mobile workers?

    -A VPN, or Virtual Private Network, allows users to create a secure connection over public networks such as the internet. It is commonly used by mobile workers to access company networks from remote locations securely.

  • What is the role of a network switch in a network?

    -A network switch is used to create or control a network at the physical layer, connecting multiple devices and enabling them to share data by receiving, processing, and forwarding data packets.

  • Why is the 'Why should we hire you?' question important at the end of an interview?

    -This question is important as it provides the candidate with a final chance to convince the employer of their suitability for the position, emphasizing their experience and how it can benefit the company.

Outlines

00:00

πŸ˜€ Introduction to Tech Support Interview

This paragraph introduces the video as a comprehensive guide for tech support interviews, focusing on system and network administration. It emphasizes the video's utility for IT beginners considering a helpdesk role and for those preparing for interviews. The speaker assures viewers that this will be an informative resource, covering common interview questions with simplified answers for clarity.

05:00

πŸ”’ System and Network Concepts Explained

The paragraph delves into foundational IT concepts, such as the role of Windows Server, the function of a Windows domain, and the purpose of a firewall. It also explains the TCP/IP protocol, the difference between HTTP and HTTPS, and the DNS system. The speaker encourages viewers to engage with the content by liking or subscribing, highlighting the importance of understanding these concepts for IT roles.

10:06

πŸ“š Advanced IT Concepts and Active Directory

This section covers advanced topics like Active Directory, its role in user and computer authentication, and the use of Group Policy Objects (GPOs). It also discusses lingering objects in Active Directory and RAID technology for data redundancy and performance. The paragraph provides insights into network connectivity testing commands and the process of backing up Active Directory, emphasizing the importance of these skills in IT roles.

15:08

🌐 Networking Fundamentals and Interview Tips

The paragraph discusses fundamental networking concepts, including the OSI model, subnet masks, and the difference between workgroups and domains. It also addresses practical issues like DNS problems and network connectivity analysis. The speaker provides interview tips, such as using the IP config command and understanding the role of a network switch, concluding with advice on how to effectively answer the 'Why should we hire you?' question.

πŸ‘‹ Conclusion and Encouragement for Job Seekers

In the concluding paragraph, the speaker offers bonus advice for interview preparation, suggesting that candidates research the company and understand the job description. They direct viewers to their YouTube channel for additional IT guides and express well-wishes for the viewers' job prospects, ending the video on a positive and supportive note.

Mindmap

Keywords

πŸ’‘System Administration

System Administration refers to the management of an organization's computer systems, including the coordination of servers, storage, and network infrastructure. It plays a central role in the video's theme of IT interviews, as it is a critical skill for many IT positions. The script mentions it as a key area of discussion, alongside Network Administration.

πŸ’‘Windows Server

Windows Server is a central component in the video script, defined as a centralized computer that provides specific functions and rules for networked computers and users. It is used to illustrate the role of a server operating system in a network environment, which is vital for system administrators.

πŸ’‘Windows Domain

A Windows Domain is a database that provides access to user accounts, computers, printers, and security features, controlled by a domain controller. The concept is essential for understanding network organization and access control, as highlighted in the script during the discussion of network administration.

πŸ’‘Firewall

A Firewall is a security system that filters traffic between two or more computer resources, blocking unwanted incoming or outgoing traffic. It is a fundamental concept in network security, as mentioned in the script, and can be implemented in both software and hardware forms.

πŸ’‘TCP/IP

TCP/IP stands for Transmission Control Protocol/Internet Protocol and is the foundational protocol for the internet. It is used for establishing connections between computers and controlling the order of data packets. The script explains it as the 'highway' for data packets, emphasizing its importance in network communication.

πŸ’‘DNS

DNS, or Domain Name System, is a critical service for resolving domain names into IP addresses, as the script explains. It is essential for internet navigation and is used to illustrate the process of translating human-readable domain names into machine-readable IP addresses.

πŸ’‘Active Directory

Active Directory is a service of Windows Server OS used for user and computer authentication within a domain. It also allows the enforcement of security policies and software installations across a domain, as mentioned in the script, making it a key concept for managing network resources.

πŸ’‘RAID

RAID, or Redundant Array of Independent Disks, is a method used to provide data redundancy and improve performance across multiple hard disks. The script discusses different RAID configurations, such as RAID 0, which is used for striping data across disks to improve performance.

πŸ’‘CMD Commands

CMD commands such as 'ping', 'traceroute', and 'ipconfig' are used to test network connectivity. These commands are fundamental tools for network administrators, as the script explains, to diagnose and resolve network issues.

πŸ’‘Group Policy

Group Policy is used to control user and computer configurations, permissions, and settings within an organization. The script describes it as a template for specific groups of members, which is crucial for managing large groups of users with different security permissions.

πŸ’‘Virtual Machine

A Virtual Machine is an emulation of an operating system that allows multiple instances to run on a single computer. The script mentions virtual machines as a way to increase the flexibility and efficiency of IT environments, which is a key concept for understanding modern IT infrastructure.

Highlights

Introduction to the video on tech support interview questions focusing on system and network administration.

Importance of tailoring the 'tell us about yourself' answer to the job position.

Explanation of Windows Server's role as a centralized computer for network functions.

Description of a Windows domain and its control over network resources.

Firewall's function as a filter to block network traffic.

TCP/IP protocol's role in establishing connections and managing data packet order.

Differentiation between HTTP and HTTPS protocols and their respective ports.

DNS's function in translating domain names to IP addresses and its port usage.

Types of DNS queries: iterative and recursive.

Active Directory's role in user authentication and security policy enforcement.

Location and function of the Active Directory database file.

The concept of lingering objects in Active Directory.

RAID's purpose for data redundancy and performance improvement.

CMD commands for testing network connectivity.

Explanation of Intialily Mirror and its role in user data management.

Backup methods for Active Directory using built-in tools.

Garbage collection process in Active Directory.

System Volume Folder's role in replication across domain controllers.

Group Policy's use in controlling configurations and permissions for user groups.

Types of email servers and their respective ports.

Difference between a forest and a domain in Active Directory.

Virtual Machine's function as an emulation of an operating system.

The concept of 'tattooing the registry' by Group Policy.

Proxy server's role in filtering and monitoring network traffic.

UDP's function and differences from TCP in connection management.

Loopback IP address's use in testing network interface cards.

DHCP's role in dynamic IP address distribution on a network.

FTP's function and the ports it uses for file transfer.

SSH's purpose in establishing secure connections between devices.

Maximum length of UTP cable for network connections.

OSI model's seven layers and their functions.

Network layer's responsibilities in routing and error handling.

Types of network cables and their speed capabilities.

Subnet mask's function in distinguishing network and host addresses.

Difference between a workgroup and a domain in terms of network rules and permissions.

DNS issue example involving host name resolution failure.

Trace Route command's use in analyzing network paths.

IP Config command's function in displaying and modifying network settings.

VPN's role in creating secure connections over public networks.

Network switch's function in managing data flow at the physical layer.

Final question on why the employer should hire the candidate, emphasizing experience and benefits to the company.

Transcripts

play00:00

welcome to 40 tech support interview

play00:02

questions and answers that mostly talk

play00:04

about system administration but also

play00:07

touch on Network administration however

play00:09

this is very good for anybody who is

play00:11

getting into IT for example if you're

play00:14

thinking about doing helpdesk as your

play00:15

entry level position this is also

play00:17

obviously a good refresher for those who

play00:20

have interviews coming up I wish you

play00:23

best of luck my friends let's get into

play00:26

it and I promise you this will be the

play00:28

best video you watch in regards to this

play00:31

there's a lot of crossover in technology

play00:33

between computer networks and systems

play00:34

hence the need to combine the two in a

play00:36

video format that has been revised and

play00:38

updated in this video we will cover some

play00:41

of the most common questions that may

play00:42

come up during an interview some answers

play00:45

are simplified to provide easier

play00:47

understanding and education question

play00:50

number one can you tell us about

play00:52

yourself this question is very important

play00:55

as your first opportunity to sell

play00:56

yourself as the best candidate for this

play00:58

job you have to make sure that this

play01:00

answer is tailored to the position at

play01:02

hand meaning only talk about yourself in

play01:04

the relevance to this position question

play01:07

number two explain the role of Windows

play01:09

Server Windows OS server acts as a

play01:12

centralized computer to provide specific

play01:14

functions and predetermined rules for

play01:16

computers users and components connected

play01:19

to a network question number three what

play01:22

is Windows domain Windows domain

play01:25

provides access to user accounts

play01:27

computers printers and security features

play01:29

as part of database controlled by a

play01:31

domain controller question number four

play01:34

what is a firewall firewall is a filter

play01:38

between two or multiple computer

play01:40

resources it blocks any incoming or

play01:42

outgoing traffic firewalls can be in

play01:45

software or Hardware forms question

play01:49

number five what is TCP / IP TCP is a

play01:54

transmission control protocol that deals

play01:56

with establishing a connection between

play01:58

computers before any data is being sent

play02:00

in other words it acts as the highway

play02:02

for data packets being sent back and

play02:05

forth used by various protocols for

play02:07

example HTTP or FTP TCP also controls

play02:12

and sorts out the data packets perceive

play02:14

order friends instead of showing you an

play02:18

advertisement at this point please take

play02:19

a moment to like this video or click the

play02:21

subscribe button this tells me that you

play02:23

appreciate my effort in creating this

play02:25

video thank you very much I appreciate

play02:27

it

play02:28

question number six can you explain the

play02:31

difference between HTTP and HTTPS HTTP

play02:36

stands for hypertext Transfer Protocol

play02:38

and is used by majority of websites as

play02:40

means of transmitting website data and

play02:42

it allows for use of hyperlinks this

play02:45

protocol mostly uses TCP port 80 HTTPS

play02:49

is a secure version of HTTP that allows

play02:52

for identity verification and low-level

play02:54

encryption using TCP port 443 question

play02:59

number seven what is DNS and which port

play03:01

does it use DNS stands for domain name

play03:04

system and it's mostly used to interpret

play03:06

domain names into numeric IP addresses

play03:09

for example the main name cosmic number

play03:11

com its IP address is 1 3 0.21 1.16

play03:17

0.109 dns uses port 53 tcp or UDP

play03:23

question number 8 how many queries does

play03:26

a DNS perform and which ones DNS can

play03:30

perform two types of queries iterative

play03:32

and recursive question number nine what

play03:37

is Active Directory

play03:38

a service of Windows server OS Active

play03:41

Directory used for user and computer

play03:43

authentication within a domain you can

play03:46

also enforce security policies with use

play03:48

of GPO switch which can also be used to

play03:51

push software installs across domain

play03:53

question number 10 Active Directory the

play03:57

database is located where database is

play04:00

under the file name and TD s dot di T

play04:04

and is located in the system root and TD

play04:07

s folder of the server if interested

play04:12

there is a written version located on my

play04:14

website at cosmic novo comm question

play04:18

number 11 what is a lingering object if

play04:22

an object is leader from actor directory

play04:24

while domain controller is

play04:25

off-line it can create a lingering

play04:27

object when object is deleted from

play04:30

Active Directory 8 tube stone is created

play04:33

which means that it has to be replicated

play04:34

by the main controller before it expires

play04:38

question number 12 what is rained stands

play04:42

for redundant array of independent disks

play04:45

and is used provide data of redundancy

play04:47

across multiple hard disks it can also

play04:50

be utilized to improve read and write

play04:52

performance across the server by using

play04:54

striping configuration for example rate

play04:57

one two or more disks with identical

play05:00

data stored raid zero two or more disks

play05:02

data distributed evenly to improve

play05:04

performance question number 13 which

play05:08

commands would you use in CMD to test

play05:11

network connectivity the test network

play05:14

connectivity ping trace route or IP

play05:16

config commands can be used question

play05:20

number 14

play05:20

what does intially mirror do as part of

play05:24

Windows operating system until a mirror

play05:26

provides assistance in managing user

play05:28

data computer information applications

play05:30

and settings this is configured with

play05:33

user group policy that defines business

play05:35

roles group members and locations for

play05:38

example if a user moves to a different

play05:40

computer the application settings add

play05:42

stored files will follow question number

play05:45

15 how do you backup Active Directory

play05:49

active directory can be backed up using

play05:51

anti backup tool that comes with 2003

play05:53

server with 2008 server a command prompt

play05:56

is used to perform backup you would type

play05:58

in waa admin space start space system

play06:02

state backup - a backup target : e : you

play06:07

can also perform a full server backup to

play06:10

a server manager question number 16 do

play06:14

you know what garbage collection is

play06:16

garbage collection is a process designed

play06:19

to free space inside of active directory

play06:22

this is performed by default every 12

play06:24

hours question number 17 do you know

play06:28

what this volume folder is system volume

play06:31

folder is a directory that houses a copy

play06:34

of the main files found on a local drive

play06:36

within domain controller this data is

play06:39

shared

play06:39

purpose of replication across domain for

play06:42

example user login script and windows

play06:44

group policy question number 18 explain

play06:48

what group policy is a group policy is

play06:51

used to control users that stop computer

play06:53

configurations and permissions by

play06:55

creating a template for specific groups

play06:57

of members this makes it easy to control

play06:59

and process large groups of users for

play07:01

example tech support may have different

play07:03

security permissions compared to a

play07:05

regular computer users question number

play07:08

19

play07:09

can you name different types of email

play07:11

servers and ports used you can have two

play07:15

types of email servers incoming mail

play07:17

server which are pop3 port 110 IMAP 143

play07:21

and HTTP port 80 you can have outgoing

play07:25

mail server which is SMTP port 25

play07:29

question number 20 what is the

play07:32

difference between forest and a domain a

play07:35

domain is a logic based group of

play07:38

computers users and devices within

play07:40

Active Directory

play07:41

a tree is a collection of the mains in

play07:44

case there are multiple trees formed a

play07:46

forest is created you're doing great as

play07:51

you can see these questions can be easy

play07:52

or hard and can be explained in multiple

play07:55

ways I am interested to read alternative

play07:57

answers so feel free to pause the video

play07:59

and share your answer in comments below

play08:02

alright we have 20 more to go

play08:05

so let's do it question number 21

play08:10

do you know what virtual machine is

play08:13

virtual machine is an emulation version

play08:16

of operating system for example you can

play08:19

have multiple copies of Windows running

play08:21

on a single computer question number 22

play08:25

do you know what tatooing the registry

play08:28

means the group policy will make the

play08:32

changes to use as registry but once the

play08:35

group policy is no longer in effect

play08:36

registry values would not revert back

play08:39

leaving them tattooed in question number

play08:44

23 what is a proxy or proxy server

play08:48

proxy deals with filtering network

play08:51

traffic in a sense of preventing

play08:53

access to certain websites and they can

play08:55

even monitor user web activity you can

play08:58

block certain website from being

play08:59

accessed but it can also act as a

play09:01

measure of hiding the true origin at the

play09:03

point of access question number 24

play09:08

can you explain what UDP is UDP stands

play09:12

for user Datagram protocol unlike TCP

play09:16

UDP is constantly broadcasting a

play09:18

connection signal which can allow for

play09:20

faster connection speeds with TCP you

play09:23

have to wait for connection confirmation

play09:25

which takes time UDP sends out data

play09:28

without considering without

play09:30

consideration of what is receiving it

play09:32

sort of like radio signal question

play09:35

number 25 what is loopback IP address

play09:39

the loopback IP address is 127 dot 0 dot

play09:43

0 dot 1 as part of troubleshooting

play09:46

network connection issues it is used to

play09:48

test network interface cards for

play09:50

functionality so if you ping the IP

play09:52

address and it completes it successfully

play09:55

it means that your hardware is ok

play09:59

question number 26 what is DHCP DHCP

play10:05

stands for a dynamic host configuration

play10:07

protocol the main function of DHCP is to

play10:10

handle distribution of IP addresses on a

play10:12

network typically IP address assigned by

play10:16

DHCP servers are dynamic meaning that

play10:19

they are released and released

play10:21

dynamically with the exception of static

play10:24

IP addresses to explain in further if

play10:27

you connect a PC to a network it will

play10:29

get a leased IP address and if you

play10:31

disconnect or remove that PC it will be

play10:33

assigned assigned a new IP address at

play10:36

the new location question number 27 what

play10:42

is FTP and port used FTP is a file

play10:46

transfer protocol used to transfer large

play10:48

files between computers with a built-in

play10:50

ability to pause transfer of data ports

play10:52

used by FTP are 20 and 21 question

play10:56

number 28

play10:58

what is SSH and port used also known as

play11:02

secure shell is used to establish the

play11:04

secure connection between devices which

play11:06

can be

play11:07

anything from computers to switches for

play11:09

example you can use SSH at a cafe and

play11:12

connect to any device anywhere by

play11:14

establishing a configured secure shell

play11:16

tunnel between two devices thus making

play11:19

the connections secure question number

play11:23

29 what is maximum length of UTP cable

play11:26

allowed the maximum length of UTP is 90

play11:30

to 100 meters for a single segment

play11:32

connection if you have a switch or a

play11:35

repeater it can compensate for this

play11:36

limitation question number 30 what are

play11:40

the layers of OSI model and how many

play11:43

there are seven layers of OSI model

play11:46

physical layer data link layer Network

play11:48

layer transport layer session layer

play11:50

presentation and application question

play11:54

number 31 what is the job of the network

play11:58

layer Network layer deals with routing

play12:01

stitching and transmitting of data from

play12:03

one point to another but this layer is

play12:06

also responsible for error handling and

play12:08

packet sequencing question number 32

play12:12

which types of network cables are used

play12:14

in networking cat5 runs at 100 megabits

play12:19

per second maximum cat 5e can run up to

play12:22

1 gigabit a second cat 6 can run up to

play12:26

10 gigabits a second speeds are rated at

play12:29

100 meters maximum distance question

play12:33

number 33

play12:35

what is a subnet mask a subnet mask

play12:39

holds the information about the network

play12:40

and hosts addresses under a subnet in

play12:44

order for TCP IP protocol to figure out

play12:47

this information it looks at the 32 bit

play12:49

subnet mask number typical example as

play12:52

255 dot 255 dot 255 dot 0 question

play12:58

number 34 can you tell me the difference

play13:02

between a workgroup and a domain with a

play13:05

workgroup you can have a collection of

play13:07

systems that are connected to the same

play13:08

network but have their own set of rules

play13:11

and permissions set at the local level

play13:14

with a domain you have a group of

play13:16

systems that are bound by the rules of a

play13:18

domain controller

play13:20

question number 35 can you give an

play13:23

example of a DNS issue if a host cannot

play13:27

be reached by its name over the network

play13:28

but can be reached using an IP address

play13:30

indicates a problem with DNS question

play13:35

number 36 how would you analyze

play13:37

connection between a local host and a

play13:39

server a trace RT command is used to

play13:43

complex test trace route can provide

play13:46

detailed path information taken through

play13:47

switches servers computers in reaching

play13:50

final destination question number 37

play13:54

what is IP config command used for IP

play13:59

config command is used to determine DCP

play14:02

IP settings DHCP configuration DNS

play14:06

default gateway and subnet mask it can

play14:09

also be used to change the local DHCP

play14:11

settings for example IP config /n

play14:14

forward slash or renew question number

play14:18

38 what is VPN a virtual private network

play14:22

allows users to create a secure

play14:24

connection over public networks such as

play14:26

internet this is commonly used by mobile

play14:28

workers in order to access companies

play14:30

networks from a remote location question

play14:34

number 39 what is a network switch a

play14:39

network switch is used to create or

play14:41

control a network at physical layer in

play14:44

which multiple devices are connected and

play14:46

share data this is accomplished by

play14:49

receiving processing and forwarding of

play14:51

data in form of data packets question

play14:56

number 40 why should we hire you just as

play14:59

important as the very first question on

play15:01

the list this is your last chance to

play15:03

tell this employer why you are the best

play15:05

choice for this position you should talk

play15:07

about your experience and how you could

play15:10

use that to benefit the company as bonus

play15:14

advice before going friend review make

play15:16

sure you do your research about the

play15:18

company you have interview with a good

play15:20

place to start is taking a good look at

play15:22

the job description if you need to study

play15:25

other aspects of ite please check out my

play15:27

channel for additional guides my channel

play15:30

is at youtube-dot-com forward-slash see

play15:33

bu ma and I hope this guide gives you

play15:36

the confidence that you may need in

play15:38

order to get this awesome job I wish you

play15:41

good luck and you have a wonderful day

play15:44

bye-bye

Rate This
β˜…
β˜…
β˜…
β˜…
β˜…

5.0 / 5 (0 votes)

Related Tags
Tech InterviewSystem AdminNetwork AdminIT EntryHelpdeskInterview TipsWindows ServerTCP/IPActive DirectoryDNS QueriesRaid Levels