Interview Questions-Networking



·         What is an IP address?
·         What is a subnet mask?
·         What is ARP?
·         What is ARP Cache Poisoning?
·         What is the ANDing process?
·         What is a default gateway? What happens if I don't have one?
·         Can a workstation computer be configured to browse the Internet and yet NOT have a default gateway?
·         What is a subnet?
·         What is APIPA?
·         What is an RFC? Name a few if possible (not necessarily the numbers, just the ideas behind them)
·         What is RFC 1918?
·         What is CIDR?
·         You have the following Network ID: 192.115.103.64/27. What is the IP range for your network?
·         You have the following Network ID: 131.112.0.0. You need at least 500 hosts per network. How many networks can you create? What subnet mask will you use?
·         You need to view at network traffic. What will you use? Name a few tools
·         How do I know the path that a packet takes to the destination?
·         What does the ping 192.168.0.1 -l 1000 -n 100 command do?
·         What is DHCP? What are the benefits and drawbacks of using it?
·         Describe the steps taken by the client and DHCP server in order to obtain an IP address.
·         What is the DHCPNACK and when do I get one? Name 2 scenarios.
·         What ports are used by DHCP and the DHCP clients?
·         Describe the process of installing a DHCP server in an AD infrastructure.
·         What is DHCPINFORM?
·         Describe the integration between DHCP and DNS.
·         What options in DHCP do you regularly use for an MS network?
·         What are User Classes and Vendor Classes in DHCP?
·         How do I configure a client machine to use a specific User Class?
·         What is the BOOTP protocol used for, where might you find it in Windows network infrastructure?
·         DNS zones – describe the differences between the 4 types.
·         DNS record types – describe the most important ones.
·         Describe the process of working with an external domain name
·         Describe the importance of DNS to AD.
·         Describe a few methods of finding an MX record for a remote domain on the Internet.
·         What does "Disable Recursion" in DNS mean?
·         What could cause the Forwarders and Root Hints to be grayed out?
·         What is a "Single Label domain name" and what sort of issues can it cause?
·         What is the "in-addr.arpa" zone used for?
·         What are the requirements from DNS to support AD?
·         How do you manually create SRV records in DNS?
·         Name 3 benefits of using AD-integrated zones.
·         What are the benefits of using Windows 2003 DNS when using AD-integrated         
        zones?
·         You installed a new AD domain and the new (and first) DC has not registered its
SRV records in DNS. Name a few possible causes.
·         What are the benefits and scenarios of using Stub zones?
·         What are the benefits and scenarios of using Conditional Forwarding?
What are the differences between Windows Clustering, Network Load Balancing  and Round Robin, and scenarios for each use?
·         How do I work with the Host name cache on a client computer?
·         How do I clear the DNS cache on the DNS server?
·         What is the 224.0.1.24 address used for?
·         What is WINS and when do we use it?
Can you have a Microsoft-based network without any WINS server on it? What are the "considerations" regarding not using WINS?
·         Describe the differences between WINS push and pull replications.
What is the difference between tombstoning a WINS record and simply deleting  it?
Name the NetBIOS names you might expect from a Windows 2003 DC that is   registered in WINS.
·         Describe the role of the routing table on a host and on a router.
·         What are routing protocols? Why do we need them? Name a few.
·         What are router interfaces? What types can they be?
·         In Windows 2003 routing, what are the interface filters?
·         What is NAT?
·         What is the real difference between NAT and PAT?
·         How do you configure NAT on Windows 2003?
·         How do you allow inbound traffic for specific hosts on Windows 2003 NAT?
·         What is VPN? What types of VPN does Windows 2000 and beyond work with natively?
·         What is IAS? In what scenarios do we use it?
·         What's the difference between Mixed mode and Native mode in AD when dealing with RRAS?
·         What is the "RAS and IAS" group in AD?
·         What are Conditions and Profile in RRAS Policies?
·         What types or authentication can a Windows 2003 based RRAS work with?
·         How does SSL work?
·         How does IPSec work?
·         How do I deploy IPSec for a large number of computers?
·         What types of authentication can IPSec use?
·         What is PFS (Perfect Forward Secrecy) in IPSec?
·         How do I monitor IPSec?
·         Looking at IPSec-encrypted traffic with a sniffer. What packet types do I see?
·         What can you do with NETSH?
·         How do I look at the open ports on my machine?
Related Posts:
  • Digital Signatures The authenticity of many legal, financial, and other documents is determined by the presence or absence of an authorized handwritten signature. And photocopies do not count. For computerized message systems to replace the… Read More
  • $_ENV and $_SERVER ? PHP sets several variables for you containing information about the server, the environment, and your visitor's request. These are stored in the superglobal arrays $_ENV and $_SERVER, but their availability depends on whe… Read More
  • What Is IP Filtering? IP filtering is simply a mechanism that decides which types of IP packets will be processed normally and which will be dropped or rejected. By dropped we mean that the packet is deleted and completely ignored, as if it h… Read More
  • Network Security Configuration Installed your Linux system, you should keep some basic security measures to protect your system Firewalls, intrusion protection, encryption, data integrity, and authentication are ways of protecting against such attack… Read More
  • E-Mail Security When an e-mail message is sent between two distant sites, it will generally transit dozens of machines on the way. Any of these can read and record the message for future use. In practice, privacy is nonexistent, despite w… Read More
  • Session Hijacking-Protection Session hijacking isn't new to computer security. The term is most commonly used to describe the process of a TCP connection taken over by a sequence prediction attack. In such an attack, the attacker gains control of … Read More
  • Network Topologies - Basic In the seemingly never-ending competition to maximize theamount of data that can be pushed through a piece of wire, numerous network topologies have been tried and tested. Initially,companies offered wholesale solutions… Read More
  • Useful Linux web sites  Linux Features   It allows many users to access a computer system at the same time. It supports the creation, modification, and destruction of programs, processes, and files. It provides a directory hierarchy t… Read More
  • Interview Questions-Networking Normal 0 false false false EN-US X-NONE X-NONE MicrosoftInternetExplorer4 … Read More
  • Securing FTP-How  Securing FTP You can make your FTP uploads and downloads more secure in one of two ways: through Secure File Transfer Protocol SFTP or Transport Layer Security TLS. SFTPSFTP is a more secure way of uploading and downlo… Read More
  • RSVP Resource Reservation protocol is used to reserve resources across a network. It is used for requesting a specific Quality of Service (QoS) from the network. RSVP is a signalling protocol for the internet. RSVP st… Read More
  • TCP/IP Network Addresses-hosting This kind of address is still in wide use and is what people commonly refer to as an IP address. Part of an IP address is used for the network address, and the other part is used to identify a particular interface on … Read More
  • What is TCP/IP Best seo practices How to promoting webpages Top seo tips top 10 e-commerce tips Additional seo tips Advanced seo tips Mobile seo tips What is TCP/IP The Transmission Control Protocol and the Internet … Read More
  • Network Security For the first few decades of their existence, computer networks were primarily used by university researchers for sending e-mail and by corporate employees for sharing printers. Under these conditions, security did no… Read More