Monday, November 16, 2009

OS ans Sysadmin Questions

  1. I can’t seem to access the Internet, don’t have any access to the corporate network and on ipconfig my address is 169.254.*.*. What happened? The 169.254.*.* netmask is assigned to Windows machines running 98/2000/XP if the DHCP server is not available. The name for the technology is APIPA (Automatic Private Internet Protocol Addressing).
  2. We’ve installed a new Windows-based DHCP server, however, the users do not seem to be getting DHCP leases off of it. The server must be authorized first with the Active Directory.
  3. How can you force the client to give up the dhcp lease if you have access to the client PC? ipconfig /release
  4. What authentication options do Windows 2000 Servers have for remote clients? PAP, SPAP, CHAP, MS-CHAP and EAP.
  5. What are the networking protocol options for the Windows clients if for some reason you do not want to use TCP/IP? NWLink (Novell), NetBEUI, AppleTalk (Apple).
  6. What is data link layer in the OSI reference model responsible for? Data link layer is located above the physical layer, but below the network layer. Taking raw data bits and packaging them into frames. The network layer will be responsible for addressing the frames, while the physical layer is reponsible for retrieving and sending raw data bits.
  7. What is binding order? The order by which the network protocols are used for client-server communications. The most frequently used protocols should be at the top.
  8. How do cryptography-based keys ensure the validity of data transferred across the network? Each IP packet is assigned a checksum, so if the checksums do not match on both receiving and transmitting ends, the data was modified or corrupted.
  9. Should we deploy IPSEC-based security or certificate-based security? They are really two different technologies. IPSec secures the TCP/IP communication and protects the integrity of the packets. Certificate-based security ensures the validity of authenticated clients and servers.
  10. What is LMHOSTS file? It’s a file stored on a host machine that is used to resolve NetBIOS to specific IP addresses.
  11. What’s the difference between forward lookup and reverse lookup in DNS? Forward lookup is name-to-address, the reverse lookup is address-to-name.
  12. How can you recover a file encrypted using EFS? Use the domain recovery agent.

Network admin

  1. Describe the OSI model.
  2. What is the difference between a repeater, bridge, router? Relate this to the OSI model.
  3. Describe an Ethernet switch and where it fits into the OSI model.
  4. What is a VLAN? What is an ELAN? What is the difference?
  5. Relate FDDI/ATM/SONET to the OSI model.
  6. Explain how to configure a host network interface (e.g. IP address, netmask, broadcast address)?
  7. Describe Ethernet packet contents: min/max size, header.
  8. Describe TCP/IP and its protocols.
  9. Describe ATM and what are its current advantages and disadvantages.
  10. Describe SONET.
  11. What are the maximum distances for CAT5 cabling?
  12. Describe UDP and TCP and the differences between the two.
  13. What is your current IP address? Hoiw do you find that out on different OSs?
  14. Describe what a broadcast storm is.
  15. Describe what a runt, a giant, and a late collision are and what causes each of them.
  16. How do you distinguish a DNS problem from a network problem?
  17. Describe the Bandwidth Delay problem.
  18. Describe the principle of multi-layer switching.
  19. Describe the purpose and basic functionality of things like HSRP, VRRP etc.
  20. You need to retrieve a file from the file server for your word processing application, which layer of the OSI model is responsible for this function?
    1. Presentation layer
    2. Application layer
    3. Session layer
    4. Transport layer
    5. Datalink layer
  21. You are working in a word processing program, which is run from the file server. Your data comes back to you in an unintelligible manner. Which layer of the OSI model would you investigate?
    1. Application layer
    2. Presentation layer
    3. Session layer
    4. Network layer
    5. Datalink layer
  22. The IEEE subdivided the datalink layer to provide for environments that need connectionless or connection-oriented services. What are the two layers called?
    1. Physical
    2. MAC
    3. LLC
    4. Session
    5. IP
  23. You are working with graphic translations. Which layer of the OSI model is responsible for code formatting and conversion and graphic standards.
    1. Network layer
    2. Session layer
    3. Transport layer
    4. Presentation layer
  24. Which is the best definition of encapsulation?
    1. Each layer of the OSI model uses encryption to put the PDU from the upper layer into its data field. It adds header and trailer information that is available to its counterpart on the system that will receive it.
    2. Data always needs to be tunneled to its destination so encapsulation must be used.
    3. Each layer of the OSI model uses compression to put the PDU from the upper layer into its data field. It adds header and trailer information that is available to its counterpart on the system that will receive it.
    4. Each layer of the OSI model uses encapsulation to put the PDU from the upper layer into its data field. It adds header and trailer information that is available to its counterpart on the system that will receive it.
  25. Routers can be configured using several sources. Select which of the following sources can be used.
    1. Console Port
    2. Virtual Terminals
    3. TFTP Server
    4. Floppy disk
    5. Removable media
  26. Which memory component on a Cisco router contains the dynamic system configuration?
    1. ROM
    2. NVRAM
    3. Flash
    4. RAM/DRAM
  27. Which combination of keys will allow you to view the previous commands that you typed at the router?
    1. ESC-P
    2. Ctrl-P
    3. Shift-P
    4. Alt-P
  28. Which commands will display the active configuration parameters?
    1. show running-config
    2. write term
    3. show version
    4. display term
  29. You are configuring a router, which prompt tells you that you are in the privileged EXEC mode?
    1. @
    2. >
    3. !
    4. :
    5. #
  30. What does the command “IP name-server 255.255.255.255″ accomplish?
    1. It disables domain name lookup.
    2. It sets the domain name lookup to be a local broadcast.
    3. This is an illegal command.
    4. The command is now defunct and has been replaced by “IP server-name ip any”
  31. The following selections show the command prompt and the configuration of the IP network mask. Which two are correct?
    1. Router(config-if)#netmask-format { bitcount | decimal | hexadecimal }
    2. Router#term IP netmask-format { bitcount | decimal | hexadecimal }
    3. Router(config-if)#IP netmask-format { bitcount | decimal | hexadecimal }
    4. Router#ip netmask-format { bitcount | decimal | hexadecimal }
  32. Which layer is responsible for flow control with sliding windows and reliability with sequence numbers and acknowledgments?
    1. Transport
    2. Application
    3. Internet
    4. Network Interface
  33. Which processes does TCP, but not UDP, use?
    1. Windowing
    2. Acknowledgements
    3. Source Port
    4. Destination Port
  34. Select which protocols use distance vector routing?
    1. OSPF
    2. RIP
    3. IGRP
    4. PPP

No comments:

Post a Comment