You are on page 1of 103

Computer Freezing:

 Use Alt+Clt+Del to access the task manager and in Details find out which application is
not responding. End the process of that application.
 Press and Hold the POWER button to forcedly turn off the machine to restart it again.
Computer Doesn’t Power Up:
 Check all the cables are connected properly.
 Check the power socket is turned on and make sure there is power in the sockets.
 Replace power cable that you know is working
Non System Disk or disk error to boot
 Remove any external USB, Disc or hard drive and boot the system again.
 If you hear any noise or clucking again, try to power off you might lose the data. It must
be a physical problem.
System Restore
 In Case of BSOD
 When you run computer Windows in Safe Mode, try to restore it back which might
work.
Speed up Computer
 Run fewer programs at the same time
 Remove viruses or malwares
 Free up hard disk space
 Verify windows system files
 Run a disk scan
 Defragment Hard Disk
 Reinstall windows
 Upgrade the hardware, RAM, Processor.
Computer Overheating
 Blocked Vents
 Dusty Fans or Case
 Broken Fan
 Dusty heat Sinks
How to clean up Hard Disk
 Disk Cleanup
 *.tmp to delete temporary files
 Del *.tmp
Computer Restarts Before Windows loading
 Make sure that all the peripherals are connected properly on the motherboard’s slots like,
RAM, Video Cards etc.
 Faulty RAM.
 Failing Hard Drive
 Corrupted Drivers
BIOS: Basic Input Output System
 It’s a first software that computer used to run.
 It checks all the primary hardware that are connected to the Computer that includes,
Memory, Hard drives, CPU etc.
 BIOS chip is located on the Motherboard Bios written on the top of that. It’s a small black
chip.
 It performs POST: Power On Self test.
 After Running Successful POST it look for Boot Loader to start the Operating System.
There are two Types of BIOS
Legacy Bios UEFI Bios
 It’s old original and  Stands for Unified Extensible Firmware
traditional Bios Interface
 It’s all texted and allow to  It’s defined standard by the manufactures.
configure the settings.  It’s support to boot from large TB storages. It also
 It’s limited hardware supports FAT and removable media.
support and doesn’t not  It has pre-boot environment that allow to connect
require drivers for network, computer before even loading to operating
video and storage devices. system remotely, browse the internet, backup,
storage devices without using any other software.
UEFI Bios also has Built in Diagnostics that allow to run and check that how hardware,
memory, cpu is running and their performance.

Encryption
Full disk encryption includes all the data, files and operating system
encrypted, without that password it doesn’t allow the user to access
the computer and the data on the hard drive.
 It integrates with TPM – Trusted Platform Module
 Either Bios has that TPM Chipset or TPM Cryptographic
card can be installed on the Bios Slots.

LoJack for Laptops


 It’s used to trace the computer and can be licensed from vehicle recovery service.
 It’s Built in the BIOS and can not be removed even when you flush everything.
 It provides the location of the computer and allow user to pop up password on the
screen in theft or hack mode and allow to delete the files.
Difference between SMF and MMF?
SMF stands for Single Mode of Fiber which carries single light signal for data transfer.
MMF stands for multimode of fiber which carries multiple signals for data transfer.
Ping Protocol uses ICMP protocol
Ethernet Plug RJ 45
How will you recognize that a hard disk is broken without software or removing it from
machine?
Though Noise tick tick, vibration
BIOS (Basic Input Output System)
Boot Priority
 When Computer Starts, computer does POST (Power on Self Test).
 User can choose and select which drive should boot first when computer starts.
CPU Clock Speed
 User can increase the speed of CPU through BIOS so computer can run faster.
 Increase in speed can cause CPU heat.
 If reduce the CPU speed, it will run computer slower but it will make the temperature
cool.
 CPU overheating issues can be solved in BIOS.
Password
 User can enable password to stop unauthorized access.

Network Topologies
Star Topology:
 It’s a single point failure topology, in
which all computers and devices are
connected to one central device. If any
connected device fails it doesn’t effect the
network but if central device switch or
hub fails it effects the entire network.
Bus Topology:
 In Bus Topology, all computers or devices
are connected to single central Coaxial
Cable with each connection using BNC
Connector.
 Coaxial cable must be terminated at the both
ends, if any terminator got lose or cable
doesn’t terminate at the one end than data
won’t be transfer and will bounce back
which will affect the entire network.
 In order to remain this network operational, all ends must be connected and don’t leave any
open connection even connected to computers or devices.
Ring Topology:
 In Ring Topology all devices or computers
connected to each other in a closed loop or
ring.
 Advantage of this topology is that, it’s easy to
use and easy to troubleshoot. It’s rarely used.
 Disadvantage of this, if a single break in a
connection than the whole data flow of the
network will be affected.

Mesh Topology:
All devices or computers in this topology are
connected to each other.
Mesh topology creates high redundancy level
because of the too many connections. It’s very
expensive because of no. of cables and NIC usage.
One of the wide example is Internet.
Hybrid Topology:
Hybrid topologies are the combination of different
topologies. The most common hybrid topologies are
the Star Bus Topologies and Star Ring Topology.
In Star Bus Topology, two or more-star topologies
connected to each other by using the single link
connection between the devices.

Star Ring Topology uses the ring connection to connect each other.
Point to Point Topology:
Point to point topology connects device to device or computer to computer without using any other
device. These host can be, switch to switch, router to router, computer to computer etc.
Client Server Topology:
Client Server Topology is used to connect all the computer
directly to the centralized dedicated server. It makes easy
administration tasks as it’s single to handle the information and
manage. As Administrator can share the data for all clients from
single device rather than multiple device.
Point to Multipoint Topology:
Point to Multipoint Topology is commonly used in wireless
network connections. In which all clients are devices
connected to the central Access point through wireless
connection.

Peer to Peer Topology:


Peer to Peer topology is used to share the resources over the
network. In which all computers and devices are connected to
each other and can share the resources to each other.
In which one computer can share the printer, another can
share the files and another can share the scanner so on.
Connectors
RJ-48C
 Its looks similar to RJ-45 used with STP
(Shielded Twisted Pair).
UTP Coupler
UTP Coupler is used where we need to use longer cable so we can
connect then in between.
BNC Connector
 It’s is used for Analog and digital video. It’s a coaxial cable connector

BNC Coupler
 It’s BNC Female to Female connector.
 Used to connect two Coaxial Cables or extension
Fiber Coupler:
 Fiber Coupler is used to connects two fiber optics connectors. Both
connectors have to be the same.
 It has to ST to ST or LC to LC connectors but not ST to LC .
F-Type Connectors
 F-Type connectors are normally used for coaxial cable with typically hand
tightened and used by cable providers for the modem. It tightens with screw
type.
MT-RJ Connector (Mechanical Transfer Registered Jack)
 Its fiber optic cable connector, it uses latch push pull connection. Its used
for high packed density.
ST – Connector (Single Tip)
 It’s fiber optic cable connector that’s normally used in single mode
fiber optic cable
LC – Connector (Local Connector)
 It’s also fiber optic cable connector. It’s similar RJ45 jack style
typically used between floor on a building
SC – Connector (Standard Connector)
 It’s push pull connector similar to audio video connector. It’s used in
fiber optic cables and commonly used between floors and buildings

Difference between APC & UPC Connectors


The UPC Connectors are normally connected straight
to each other, in which small space always left which
create signal lost because the light reflects to the light
source.
But in APC connectors both cables tips are angled to
each other where connection is made. So the light
reflects in the angle which create the light back but
doesn’t reflect back to the light source because of the
angle tips.

Ethernet over Powerline


Ethernet over powerline defines, network uses
building electrical power to deliver the network.
 If power requires to the computer on the
top which is not accessible over the wifi
signals or cables than in that case:
 Powerline network adapter to be connected
to the Both electrical switches. One
connected to the router and another
connects to the computer in this case it will
deliver the network to the other computer
by using ethernet over powerline.

Cable Standards
Cable Standards are 10 Base – T (10 refers to Speed, Baseband Transmission,
Twisted Pair Cable)
10 Base – 2
10 Base -2 is a thin Coaxial Cable that is uses maximum speed 10
Mbps and maximum length for this is 200 Meters.
Gigabits Standards

Wiring Standards
Wiring standards are developed by EIA/TIA. Defined rules that how twisted pair cables can be
wired in RJ-45.
Straight Cable
 This type of Cable used as A Standard at the both ends which allow the signals can pass
through End to End.
 This cable is used to Connect Computers to Hubs, Switches or Modems.
Cross Over Cable
 This type of Cable used both standards which means One End is A Standard and another
End is B Standard.
 This Cable is used to connect two Similar Devices together.
Roll Over Cable
 Rollover Cable is wired completely opposite each other.
 This type of cable is used to connect Computer or router Terminal Console port .

Hub, Switch & Router


 Hubs and Switches used to Create Networks.
 Routers are used to Connect Networks.
 The main difference between them is the way that they handle data.
 Hubs and Switch used to exchange data on the (LAN) local area network.
 These devices can only exchange data on the LAN but not outside on the network.
Because these devices can’t read IP addresses and Route the data outside the network.
Hub
 It’s a device which has Ethernet ports that used to connect devices on the internal
network.
 This is not an intelligent device and doesn’t know which data belongs to who so
whenever it receives a data it will broadcast to all the connected devices.
Switch
 Switch is an intelligent device which has multiple Ethernet ports to connect the
devices on the network.
 Switch save physical devices address MAC address in its table.
 So whenever it receives a data packet it will only send that data packet to particular
receiver rather than broadcasting on the whole network.
 Multi-layer Switch can work on layer 2 and layer 3 of OSI Model.
 It can interpret data same as Router on Layer 3.
Router
 Router is a device which route data from one network to another network on the
basis of IP Address.
 When router receives a data packet, it examines its IP Address of Sender and
Receiver to check that, is that packet is for own network or outside on the
network.
 Router works as a Gateway of the network. Like a “Gate”.
Bridges
 Bridges are used to avoid unnecessary traffic on the network.
 If a network is segmented on two Hubs. Then if any computer sends data to another
computer over the network, Hubs will broadcast that data to all computer which will
cause unnecessary traffic on the network.
So Bridge is used in between both hubs to save the mac addresses of the devices and sends that
data to a particular device.

How Data is transferring between two computers with different Operating


Systems?

If two computers are connected


through LAN Cable and one has
Windows and another has Mac
than they won’t be able to communicate without use of OSI Model of 7
layers.

OSI : Open Standard Interconnection


This model introduced in 1984 by ISO
(International Standards Organization).
Each layers has packages of different
protocols.

Application Layer:
Application layer use network application (means those applications which used
internet). Like Google Chrome, Skype, Outlook etc. These all applications use
HTTP & HTTPs Protocols to do web surfing. There are dozens of protocols which
uses Application layer.
 FTP (File Transfer Protocol) used for File Transfer. Uses port 20 & 21
 HTTP & HTTPs used for Web Surfing. Uses port 80.
 SMTP (Simple Mail Transfer Protocol) used for Emails. Uses port 25
 Telnet used for Virtual Terminals. Uses port 23.
 NFS (Network File System) uses port 111.
 FMTP (File Management Transfer Protocol) uses Port 8500.
 DHCP uses port 67 & 68.
 SNMP (Simple Network Management Protocol) uses port 161.
 POP3, IRC , NNTP

 Presentation Layers receives data from Application Layer in form of


Characters.
 Presentation layers Translate those characters into Binary Numbers.
 Those binary numbers again convert into Data Compression reduce the
number of data.
 That data can be Lossy or Lossless.
 It reduce the size of data so receiver can receive the file in less time.
 To maintain the Integrity of data it uses encryption and Decryption
protocols. Like SSL.
 This layer helps to establish a connection between a user and Server.
 This layer does Session Management, Authentication and Authorization.

 When user sends a request to server, Session Layer first authenticate the
user.
 In Authentication user use Login and Password to connect to Server.
 Once Authorization is Checked it establish a Session in user and Server.
 Session Layer also keep track on the data packets transferring between
Server and User.
 A Simple Web Browser performs three layers. Application, Presentation
and Session Layer.
 Transport Layers ensures the reliability of the communication through Segmentation,
Flow Control and Error Control.

 Transport Layers receives data from Session Layer Segments.

 Each segment has Port Number, Sequence Number and Data


unit Number.

 Port Number: helps to find correct application

 Sequence number: helps to re assemble data units so receiver


can receive correct message

 In Flow Control: Transport layer


data control the amount of data
being transferred.

 If a Server Sends data at 100 Mbps


to Mobile device. But mobile
device can send and receive data
at only 10 Mbps. Then it will lose
the data packets.

 So with the help of Transport


Layer Mobile Device can tell
server that maintain Speed of 10Mbps so no data can be lost.
 In Error Control Transport layer add Checksum with data units to ensure
that all packets or data units beings transferred correctly. If any data unit
corrupted it will send again by Automatic Repeat Request.

 Transport Layer
provides Two Type
of Services through
two types of Protocol.
 UDP is faster than
TCP.
 TCP Provides
feedback that all
data has been
transferred but UDP
doesn’t provide
feedback that all
data is transferred
or not.
 UDP Used for
Streaming Songs,
Videos, Audios,
Video Games etc.
 TCP is used for Web Requests, FTP, etc. where full delivery of content
is required.

 Network Layer receives data from Transport layer which called


Packets.
 Network layer work for transmission of the data packet from one
computer to another located on the different networks.
 Routers exists on this layer.
 Network Layer add IP Addresses of Sender and Receiver with segment
which called Packet.
 Routing is form of sending data from one computer to another through
logical addressing.
Which is based on
IPv4 or IPv6 +
Mask.
If Computer B requests www.facebook.com from network to Server.
Then server will send packet with Sender and Receiver IP address.

 Network Layer performs three basic functions: Logical Addressing,


Routing and Path Determination
Network Layer sends receives Segments or Data units and add IP
Addresses of Sender and Receiver and forward them on the network.
Through Path Determination function it finds the best available path on
the network so Receiver can receive data quickly.
 Logical Addressing is already done in Network Layer.
 Physical Addressing is done at Data Link Layer.
 Packets or Data units in Data Link Layer is called Frame.
 A frame is consists of Physical address or Mac Address of Network
Interface Card. Which is Alpha Numeric 12 digits embedded in NIC
by manufacturer.
 Data link layer transmits data frames through a media which means
(through Cables, Fiber Optic Cables or Wireless).
Data Link Layer perform two functions. Access to upper layers and
Error detection.

 If Desktop Computer and Laptop wants to connect with each other


through two different network they will be using network Protocol
IP Address.
 So if Desktop wants to send some data to Laptop, the Data Link
layer will add some data into Packets Head & Tail to form a
Frame.
 When Router receives that frame, it will encapsulate that Frame
and again De Capsulate it so it can pass through the receiver
network.
 When Receiver router get that data, it will encapsulate and again
de capsulate to application layer.
 Application Layer then will make the data Visible so user can read
it.
Data Link Layer also handles Error detection which means
 If number of devices are connected to a common media and
trying to send messages at the same time, which might leads to
a collision and result into a useless message.
 So data link layer keep track, that when is media free to send
the message to avoid the collision.
 It also add some data into a frame in the tail to detect the error.

Data link Layer uses CSMA (Carrier Sense Multiple Access). Which
control data transmission.
 So if user sends a data to another user by using Application Layer.
 It will be transported in Segments at Transport Layer
 Packets at the Network Layer.
 Frame at the Data Link Layer.
 Frame receives by Physical layer in the shape of Binary Numbers.
Physical Layer will transmit that binary data by using the media Signals
by using Cables, Fiber or Radio Signals.
On the other side:
 Those signals will be received by Physical Layer will be transferred to Data
Link layer in shape of Bits. And change into frame.
 That frame will be change into Packet at Network Layer.
 Network Layer will send that packets to Session Layer in shape of
Segments.
 Then those will be received by Application Layer to make data visible to
user.
Gateway
 Gateway acts as a “Gate” between two networks.
 It’s a network node which connects two network together using
network protocols.

Screen Locking: to prevent malicious attack on the computer and


protect data theft.
Remote Access to the IDE Network: it’s possible to connect home
broadband connection to use office or university computer by creating VPN
Network through settings in the Control Panel, Security and Sharing and
adapter settings.
Windows Patching: Windows patching is a term which is used for
operating system or software updates. As Microsoft release number of
updates about operating system and office to update and upgrade.
How HTTP Protocol works
 Stands for Hypertext Transfer Protocol.
 Its application layer protocol which allows web based applications to
communicate and exchange data.
 Http is the messenger of the web.
 Its TCP/IP based protocol.
 It’s used to deliver content like, images, videos, audio, documents etc.
Important things about Http Protocol
 It’s connectionless and when one computer sends a request to server
it establish a connection and disconnect. When response is ready to
send back to that computer it reconnect again and disconnect.
HTTP Message:
Http message is consist of 3 sections which are Title, Headers and Body. All
those message are plain texts.

Cabling
Visual Fault Locater (VFL)
 VFL is used in fiber cables to locate the issues, sharp bend in
the cable, faulty connectors and other faults.
 Through VFL tool inject the laser light through one end and it
will show the light on another end.
 If it leaks out around connector that means, there is a fault in the connector. If it doesn’t pass
the beam it means cable has issues or cable is located somewhere else.
Fiber Optics Splices:
Fiber optic Splices means the joining of the two Optical fibers together. So the laser light can pass
through from one fiber cable to another. There are two types of splices mentioned below:
Optical Time Domain Reflectometer (OTDR)
It trace the backstatter level in between two fiber
cables as well.

ACL (Access Control List)


 Access Control List is a set of Rules that are defined on the network so
what and who can access the network.
 These Rules are set on IP Based so user can Allow and Deny based on
IP Address.

IDS/IPS (Instruction Detection or Prevention System)


 It’s a Hardware tool that can be software used to Alert and Prevent
network from outside attacks.
 These attack can be Viruses, Malware or Hackers etc.
 If it finds any attack on the network, it will alert the network
Administrator.

Infrared
 In Infrared data is transmitted in rays of light.
 It doesn’t work in the sun light.
Bluetooth
 It’s a short range radio signals which provide connectivity between
two devices.
 It operates at 2.4 GHz and can transmit Voice and data.
 Its range is approximately 100 meters and 24 Mbps Speed.
IP Address (Internet Protocol)
 It’s a numeric address, used to identify the device over the network.
 It has two parts: Network Address & Host Address.
Subnet Mask:
 Subnet Mask is used to identify the network in the IP address.
 As an IP Address has two parts Network Address & Host Address.
 By using Subnet Mask we can identify the Network Address Part and Class
of the IP Address.
DHCP Scope
 It’s a group and a range of consecutive IP Addresses for computers that gets
their IP addresses from a DHCP Server.
 In Scope User define a Range of IP address so when a client login, DHCP
Server will automatically assign an IP Address to that user from a defined
range.
DHCP Reservation
 DHCP Reservation is an IP address which is defined in DHCP Scope for the
particular device or Computer. So whenever that computer or device login it
will be assign that address.
 Usually that Reservation is defined for Printers, Server etc.
DHCP Lease
 DHCP Lease is an IP Address which is assigned by DHCP Server to a
computer or client for the duration of the time.
 That duration can be one day, ten days or as per policy defined
 It can be checked in IPCONFIG/ALL.
 DHCP Server automatically renew the IP address.
DHCP Relay
 DHCP Relay is used when the Computer and DHCP Server use different
subnets like Server used (192.168.1.1) & Computer used (192.168.0.1) then
DHCP Server won’t be able to assign an IP address to the Computer
because Router can’t broadcast the request.
 DHCP Relay or IP Helper is used so DHCP Server can assign IP address to
the computer while on the different subnet or using different IP Settings.
Two DHCP Server on the network
 If there are two DHCP server configured on a single network, that must
be ensured that they should not give out same IP address to the lease
computers that will create conflict on the network.
 For that reason address pool must be configured correctly.

Protocols Descriptions
Spanning Tree Protocol
 It’s used to eliminate the unnecessary loops on the network. Because
loops are deadly for the network and because of the loops receiver can
get multiple message at the same time.
Root Bridge
 Root Bridge is a Switch on the network that has all ports in forwarding
States.
SMTP (Simple Mail Transfer Protocol Port 25 )
 SMTP (Simple Mail Transfer Protocol) uses TCP Protocol. If a user
doesn’t receive an email it will send message to user that your email is
not transferred.
POP3 (Post Office Protocol - Port 110 )
 POP3 protocol is used for Email Receiving.
 If Server receive an email, it will forward that email to user and doesn’t
sync emails or folders and also doesn’t keep copy of that email in the
server.
 Once user receives that email, server will delete that email. Unless user
has specified to keep the copies of the email.
IMAP4 (Internet Message Access Protocol)
 Its same as POP3 but with better features and also used for Email
Receiving protocol.
 It keeps copy of the email in the server and can sync user email and
folders with computer and server.
 It’s used in Microsoft Outlook.
NTP (Network Time Protocol)
 This protocol is used for syncing time with Server and Computer.
 It sends periodic request time to time to check that time is synchronize with Server or
not.
IP ADDRESSES
Public IP Address
 A Public IP Address is an IP Address that can be accessed over the
internet publically. It’s like a street address located on the entrance of
the Street.
 Public IP Address Range:
Class A 1.0.0.0 to 9.255.255.255
11.0.0.0 to 126.255.255.255
Class B 128.0.0.0 to 171.255.255.255
173.0.0.0 to 191.255.255.255
Class C 192.0.0.0 to 195.255.255.255
197.0.0.0 to 223.255.255.255
Class D 224.0.0.0 to 247.255.255.255
Class E 248.0.0.0 to 255.255.255.254

Private IP Address
 Private IP address is that address which is reserved for internal use
behind a router or the NAT (Network Address Translation), apart from
public.
 Private Addresses are the address that can be used in Home, Business
etc.
 Private IP Address Range:
Class A 10.0.0.0 to 10.255.255.255 Supports (16 million addresses)
Class B 172.16.0.0 to 172.31.255.255 Supports (65 thousands
addresses)
Class C 192.168.0.0to 192.168.255.255 Supports (21 thousands
addresses)

Reserved IP Addresses
 Reserved IP Addresses are those addresses which can’t be used over
the internet.
 Loopback Address 127.0.0.0 to 127.255.255.255
 APIPA Addresses 169.254.0.0 to 169.254.255.255

RAID ( Redundant Array of Independent Disk )


RAID is one of the important part of the fault tolerance Storage.
 RAID is used for Data Loss Prevention.
 If a disc failure in Server of Computer RAID ensures that No Data loss.
 In RAID, Same data is copied on the multiple disc, so in the event of
failure of single disc doesn’t affect the data.
RAID 0
 RAID 0 doesn’t provide fault tolerance, but data is saved and spread
across the disc attached.
 If a single disc fails, it will loss that particular data that was saved in
that disc.
 RAID 0 provides fast Speeds.

RAID 1
 RAID 1 is a fault tolerant and same data is saved in all the disc
attached.
 In the event of single disc failure, it will not loss the data.

RAID 5
 For RAID 5, it requires minimum 3 or more discs.
 It’s fast and store large amount of data.
 It doesn’t duplicate data across the disc but spread the data in all the
discs.
 In addition to data it also save PARITY (piece of information) in all the
disc.
 PARITY is used to rebuild the data in the event of failure.
 The downside of RAID 5, if 4 disc are used and each can store 1 TB.
 All 4 disc would be 4 TB but the data will only be stored 3 TB and 1 TB
would be PARITY.
 It can only handle one disc failure at the same time. But if two discs are
failed then data will be loss.

RAID 6
 For RAID 6, it requires minimum 4 or more discs.
 It works as RAID 5 but saves double PARITY to store the data in the
discs.
 It can handle the two discs failure at the same time.
 The downside of RAID 6, if 4 disc are used and each can store 1 TB.
 All 4 disc would be 4 TB but the data will only be stored 2 TB and 2 TB
would be PARITY.

RAID 10 (1 + 0)
 RAID 10 is a combination of (RAID 1 & RAID 0).
 It spread the data across the discs attached.
 If 4 discs are used, it will used RAID 1 policy to mirror two same disc
with same data and follow the same method for other two as well.
 The disadvantage of this is that only 50% of storage would be used &
50% would be the same copy of that date.

VLANs (Virtual Local Area Network)


 VLANs are created to reduce and separate the broadcast workload for
each VLAN.
 VLANs are used to one department can’t see the traffic of other
departments.
 VLANs are created on specific ports on the switch and each VLAN has
assigned a designated port.
PING
 Ping is a utility that is used to test the connectivity between devices.
 Ping Messages responses:
Request timed out : Either all ping request are blocked or host is down.
Destination host is unreachable: this message comes from router and that
means route to the destination cannot be found.
 If a user can Ping with domain (ping yahoo.com) and that works but its IP
address doesn’t works then it must be the problem of DNS.
Tracert
 This utility is used to find the way from our computer to the destination
computer and devices in between.
 It’s one of the great utility to find where problem lies so the data packet is
not received at the destination.
Netstat
 This utility is used to display the current network connections to the
particular computer
Nbstat
 This utility is used to resolve NetBios name.
NsLookup
 This utility is used to display the domain name of an IP address. Or IP
address domain name. Like Yahoo.com (it will find its IP address).
PoE (Power Over Ethernet)
Some of the networking devices doesn’t have separate power socket, they take
power and data from same Ethernet Cable. This type of technology is called PoE.

Questions & Tips


 What happens, when you type Amazon.com (Explain OSI Layer
Model)
 Explain BGP/OSPF/MPLS/STP
 My worst professional failure
What are DHCPv4 Packets
DHCPDiscover Message
DHCP client sends a DHCP Discover broadcast on the network for finding a
DHCP server. If there is no respond from a DHCP server, the client assigns itself
an Automatic Private IPv4 address (APIPA).
DHCPOffer Message
DHCP servers on a network that receive a DHCP Discover message respond with
a DHCP Offer message, which offers the client an IPv4 address lease.
DHCPRequest Message
Clients accept the first offer received by broadcasting a DHCP Request message
for the offered IPv4 address.
DHCPAcknowledgment Message
The server accepts the request by sending the client a DHCP Acknowledgment
message.
DHCPNak Message
If the IPv4 address requested by the DHCP client cannot be used (another device
may be using this IPv4 address), the DHCP server responds with a DHCPNak
(Negative Acknowledgment) packet. After this, the client must begin the DHCP
lease process again.
DHCPDecline Message
If the DHCP client determines the offered TCP/IP configuration parameters are
invalid, it sends a DHCPDecline packet to the server. After this, the client must
begin the DHCP lease process again. 
DHCPRelease Message
A DHCP client sends a DHCPRelease packet to the server to release the IPv4
address and cancel any remaining lease.
DHCPInform Message
DHCPInform is a new DHCP message type, defined in RFC 2131. DHCPInform is
used by DHCP clients to obtain DHCP options.
 ARP Lookup
 What is Page File?
 How to check SSD Failure?
 CLI Commands: Working Directory, Change Directory, list, check,
uptime, check partitions?
 How would you handle priority situation?
 Why Amazon?
 How can you translate your skills towards Amazon?
 What Experience do you have that separate you from REST?
 Linux Bootup process, Linux File System,
How do you setup domain name on the Nexus device?

 What is the advantage of subnetting?


It’s used to control and limit the traffic on the network by limiting number
of broadcast. It allows any organization to subnet its network without
needed to have a new network IP through an internet service provider.

 How do you load a new image on the Cisco router?


 What is the difference between measure fibers?
It’s used to check the overall optical loss in the fiber, in which a known light
is injected in one end and measure the level of light at the other end. This
measurement is done through optical light sources and power meters are
required to access the both ends on the fiber.
 Tell me a situation, when you have to take the decision without
consulting your manager?
 What is your dream job and why?
 DDos? Explain the problem
DDoS: Stands for Distributed Denial of Service, it’s a cyber-attack which
make service unavailable.
 Why don’t we use MAC address instead of IP address?
MAC Address: Mac addresses are the Hardware address which can only
work on the Data link layer which can be recognized by Switch, Hub &
Bridge. Mac Address doesn’t change and it’s like a permanent name of the
person.
IP Addresses: IP addresses changes and provided by ISP as per location and
service changes as well which understand by Router to gateway the
internet. IP addresses can be static and dynamic which makes routing easier.

Http Client Errors (4 xx)


 400 Bad Request: Server can’t process the request.
 401 Unauthorized: Refused Permission to access the website.
 402 Payment Required: involves payments
 403 Forbidden: Request is valid but server is refusing to take action

 404 Page not found: requested resource not found

Server Errors (5 xx)


 500 Internal Server Error: it’s a generic error.
 501 Not Implemented: Server doesn’t recognize request method.
 502 Bad Gateway: Gateway or proxy received invalid response.
 503 Service Unavailable: Server can’t handle the request.
 504 Gateway Timeout: Server didn’t receive timely response.
 505 HTTP version not supported: Server doesn’t support request.
 507 Insufficient Storage: Server is unable to store the
representation to process the request.
 508 Loop Detected: Server detects an infinite loop while
processing the request.
 511 Network Authentication Required: Client needs to
authenticate to gain network access.

Security Questions & Answers


Network Security:
Network security consists of policies and practices adopted to prevent and
monitor unauthorized access to network resources.
Security:
In information technology world, to secure the digital information, IT assets
against internal, external attacks and malicious attacks. The defense
includes, detection, prevention and response to threats through policies,
software and hardware tools.

Attacks:
 “Sniffer”: It’s a device program which is used to monitors network
communication and captures data.
 Password attacks:
 Encryption
 Brutal Forced Password Attack: it’s a method of guessing password
through a software that systematically generate password
combinations until a valid one founds.
 Trojan Horse Attack: its used an email attachment, which is most of
the times used for corrupted passwords, credit cards information or
data.
 Spoofing attacks: its used on the outside network devices.
 Session Hijacking attacks: this type of attack used for stealing the
current session of the two network devices which are communicating
or has trust on each other and user hack the whole session so take the
data out of it and hack the whole system through.
 Man in the Middle Attack: it’s a data theft technique in which attacker
intercept a device between two devices to gain the data transmission.
 Dos (Denial of Service attack): its used to disable the system that
provide network access rather than stealing the data. In which hacker
sends multiple ping request to consume all the resources of the server.
 Phishing: it’s a type of attack which used through email, in which user
realize that it’s an email from bank or financial institution and has to
verify the account which leads hackers to steal their data.

Virus: it’s a malicious unauthorized software program, which carries the


payload code that enables the virus to perform additional tasks.

Security:
 Firewall: Firewall can be software and hardware based, that uses rules
to control incoming and outgoing network traffic. It acts as a barrier
between trusted and untrusted network. It control the access.
Firewall has inbound and outbound rules
Its used on Packet Filters, Stateful inspection, Proxys.
 Firewall configured on network layer.
 Its packets filters decisions based on source destination and address
destination.
Security Notes
HTTPS:
 HTTP Secure encrypt the data that was retrieve by HTTP from the
server.
SSL: (Secure Socket Layer)
 This layer used two protocol to secure the data over the internet.
 This layer uses 3 ways handshake after security check and then transfer
data in encryption.
TLS: (Transport Layer Security)
 It’s a latest industry cryptographic protocol. It’s based on the same SSL
specification.
 Its authenticate Server, client and encrypt the data as well.
Google is penalizing the website and flagging them if they are not
secured.

Dos: Denial of Service


 It’s a cyber-attack on the network in which hacker sends continue
fraudulent request.
 DoS attack is only comes from one source.
 Server has the ability to block the one source and easily can pin point
one source of attack.
DDoS: Distributed Denial of Services
 It’s a cyber-attack on a specific server or network for the purpose to
disrupting the network service or operation.
 In DDos fraudulent requests and attack comes from many sources
simultaneously at one time.
 In which One Computer or Ring leader can contact other computer
around the world to attack the server.
 Now server will be facing the attack from many computer which are
using server’s resources like CPU, RAM at the maximum limit so
because server is busy dealing with those attacks it won’t provide
service to the actual computer which are attached to it.
 Those computer would be now Denial of service.

Why would you want to use SSH from a Windows pc?


SSH (TCP port 22) is a secure connection used on many different systems
and dedicated appliances. Routers, Switches, SFTP servers and unsecure
programs being tunneled through this port all can be used to help harden a
connection against eavesdropping.

What’s the difference between Symmetric and Asymmetric encryption?


Symmetric encryption uses the same key to encrypt and decrypt, while
Asymmetric uses different keys for encryption and decryption. Symmetric is
usually much faster, but is difficult to implement most times due to the fact
that
you would have to transfer the key over an unencrypted channel. Therefore
many times an Asymmetric connection will be established first, then send
creates the Symmetric connection. 
What is SSL and why is it not enough when it comes to encryption?
SSL is identity verification, not hard data encryption. It is designed to be
able to prove that the person you are talking to on the other end is who they
say they are. SSL and its big brother TLS are both used almost everyone
online, but the problem is because of this it is a huge target and is mainly
attacked via its implementation (The Heartbleed bug for example) and its
known methodology. As a result, SSL can be stripped in certain
circumstances, so additional protections for data-in-transit and data-at-rest
are very good ideas.

What is the difference between a Black Hat and a White Hat?


The difference between a Black Hat and a White Hat is who is signing the
check..

You need to reset a password-protected BIOS configuration. What do you


do?
Simply popping out the CMOS (complementary metal-oxide-
semiconductor) battery will be enough to have the memory storing these
settings lose its power supply, and as a result it will lose its settings. Other
times, you need to use a jumper or a physical switch on the motherboard.
Still other times you need to actually remove the memory itself from the
device and reprogram it in order to wipe it out. The simplest way by far
however is this: if the BIOS has come from the factory with a default
password enabled, try ‘password’.

What is XSS?
Cross-site scripting, the nightmare of Javascript. Because Javascript can run
pages locally on the client system as opposed to running everything on the
server side, this can cause headaches for a programmer if variables can be
changed directly on the client’s webpage. There are a number of ways to
protect against this, the easiest of which is input validation.

13- How would you login to Active Directory from a Linux or Mac box?
While it may sound odd, it is possible to access Active Directory from a non-
Windows system. Active Directory uses an implementation of the SMB
protocol, which can be accessed from a Linux or Mac system by using the
Samba program. Depending on the version, this can allow for share access,
printing, and even Active Directory membership.

14- What are salted hashes?


Salt at its most fundamental level is random data. When a properly
protected password system receives a new password, it will create a hashed
value for that password, create a new random salt value, and then store that
combined value in its database. This helps defend against dictionary attacks
and known hash attacks. For example, if a user uses the same password on
two different systems, if they used the same hashing algorithm, they could
end up with the same hash value. However, if even one of the systems uses
salt with its hashes, the values will be different.

What are the three ways to authenticate a person?


Something they know (password), something they have (token), and
something they are (biometrics). Two-factor authentication often times uses
a password and token setup, although in some cases this can be a PIN and
thumbprint.

17- How would you judge if a remote server is running IIS or Apache?
Error messages oftentimes giveaway what the server is running, and many
times if the website administrator has not set up custom error pages for
every site, it can give it away as simply as just entering a known bad
address. Other times, just using telnet can be enough to see how it responds.
Never underestimate the amount of information that can be gained by not
getting the right answer but by asking the right questions.

18- What is data protection in transit vs data protection at rest?


When data is protected while it is just sitting there in its database or on its
hard drive- it can be considered at rest. On the other hand, while it is going
from server to client it is in-transit.

19- You see a user logging in as root to perform basic functions. Is this a
problem?
A Linux admin account (root) has many powers that are not permitted for
standard users. That being said, it is not always necessary to log all the way
off and log back in as root in order to do these tasks. For example, if you
have ever used the ‘run as admin’ command in Windows, then you will
know the basic concept behind ‘sudo’ or ‘superuser (root) do’ for whatever it
is you want it to do. It’s a very simple and elegant method for reducing the
amount of time you need to be logged in as a privileged user. The more time
a user spends with enhanced permissions, the more likely it is that
something is going to go wrong – whether accidentally or intentionally.

20- How do you protect your home Wireless Access Point?


There are a lot of different ways to protect a Wireless Access Point: using
WPA2, not broadcasting the SSID, and using MAC address filtering are the
most popular among them.

What is an easy way to configure a network to allow only a single


computer to login on a particular jack?
Sticky ports are one of the network admin’s best friends and worst
headaches. They allow you to set up your network so that each port on a
switch only permits one (or a number that you specify) computer to connect
on that port by locking it to a particular MAC address. If any other computer
plugs into that port, the port shuts down and you receive a call that they
can’t connect anymore. If you were the one that originally ran all the
network connections then this isn’t a big issue, and likewise if it is a
predictable pattern then it also isn’t an issue. However if you’re working in a
hand-me-down network where chaos is the norm then you might end up
spending a while toning out exactly what they are connecting to.
22- You are remoted in to a headless system in a remote area. You have no
physical access to the hardware and you need to perform an OS
installation. What do you do?
There are a couple of different ways to do this, but the most like scenario
you will run into is this: What you would want to do is setup a network-
based installer capable of network-booting via PXE (if you’ve ever seen this
during your system boot and wondering what it was for, tada).
Environments that have very large numbers of systems more often than not
have the capability of pushing out images via the network. This reduces the
amount of hands-on time that is required on each system, and keeps the
installs more consistent.

23- On a Windows network, why is it easier to break into a local account


than an AD account?
Windows local accounts have a great deal of baggage tied to them, running
back a long long way to keep compatibility for user accounts. If you are a
user of passwords longer than 13 characters, you may have seen the message
referring to this fact. However, Active Directory accounts have a great deal
of security tied onto them, not the least of which is that the system actually
doing the authenticating is not the one you are usually sitting at when you
are a regular user. Breaking into a Windows system if you have physical
access is actually not that difficult at all, as there are quite a few dedicated
utilities for just such a purpose, however that is beyond the scope of what
we’ll be getting into here.

24- What is the CIA triangle?


Confidentiality, Integrity, Availability. As close to a ‘code’ for Information
Security as it is possible to get, it is the boiled down essence of InfoSec.
Confidentiality- keeping data secure. Integrity- keeping data intact.
Availability- keeping data accessible.

25- What is the difference between an HIDS and a NIDS?


Both acronyms are Intrusion Detection Systems, however the first is a Host
Intrusion Detection System whereas the second is a Network Intrusion
Detection System. An HIDS runs as a background utility in the same as an
anti-virus program for instance, while a Network Intrusion Detection
System sniffs packets as they go across the network looking for things that
aren’t quite ordinary. Both systems have two basic variants: signature based
and anomaly based. Signature based is very much like an anti-virus system,
looking for known values of known ‘bad things’, while anomaly looks more
for network traffic that doesn’t fit the usual pattern of the network. This
requires a bit more time to get a good baseline, but in the long term can be
better on the uptake for custom attacks.

26- You find out that there is an active problem on your network. You can
fix it, but it is out of your jurisdiction. What do you do?
This question is a biggie. The true answer is that you contact the person in
charge of that department via email – make sure to keep that for your
records – along with CCing your manager as well. There may be a very
important reason why a system is configured in a particular way, and
locking it out could mean big trouble. Bringing up your concerns to the
responsible party is the best way to let them know that you saw a potential
problem, are letting them know about it, and covering yourself at the same
time by having a timestamp on it.

27- You are an employee for a tech department in a non-management


position. A high-level executive demands that you break protocol and
allow him to use his home laptop at work. What do you do?
You would be amazed how often this happens, even more so in the current
BYOD environment. Still, the easiest way out of this one is to contact your
manager again and have them give a yay or nay. This puts the authority and
decision where it needs to be, and gives you assistance if the department
needs to push back. Stress can be a real killer in position where you have to
say ‘no’ to people that don’t like hearing it, so passing the buck can be a
friend.

28- What is the difference between a vulnerability and an exploit?


A lot of people would say that they are the same thing, and in a sense they
would be right. However, one is a potential problem while the other is an
active problem. Think of it like this: You have a shed with a broken lock
where it won’t latch properly. In some areas such as major cities, that would
be a major problem that needs to be resolved immediately, while in others
like rural areas its more of a nuisance that can be fixed when you get around
to it. In both scenarios it would be a vulnerability, while the major cities
shed would be an example of an exploit – there are people in the area,
actively exploiting a known problem.

29- How would you compromise an “Office Workstation” at a hotel?


Considering how infected these typically are, I wouldn’t touch one with a
10ft pole. That being said, a USB keylogger is easy to fit into the back of
these systems without much notice while an autorun program would be able
to run quickly and quietly leaving behind software to do the dirty work. In
essence, it’s open season on exploits in this type of environment.
Level 4: The Keymaster
At this stage, if you have physical access to the box, you own it. You also
however have enough ethics to not break into every single thing you touch,
and here is where personal ethics start to become a tremendous asset
provided you know where to draw the line. You’ve seen a lot of the dirty
side of InfoSec, know that it can be used for good and bad just as much as
anything else, and you very likely have done some things on both sides of
the fence. By the same token though, you know the truth of the saying “It
takes a thief to catch a thief”, and so you have gone through penetration
testing events and may perhaps be a part of a regular team performing
exercises against your network and its sites. Unfortunately, Gozer will not
be stopping by for s’mores. Sorry about that.

31- What is worse in Firewall Detection, a false negative or a false


positive? And why?
Far and away is a false negative. A false positive is annoying, but easily
dealt with – calling a legitimate piece of traffic bad. A false negative however
is a piece of malicious traffic being let through without incident – definitely
bad.

32- What’s better, a red team or a blue team?


Another opinion question, more along the lines of where your interests lie.
In penetration testing scenarios, a red team is trying to break in while a blue
team is defending. Red Teams typically are considered the ‘cooler’ of the
two, while the Blue Team is usually the more difficult. The usual rules apply
like in any defense game: the Blue Team has to be good every time, while the
Red Team only has to be good once. That’s not entirely accurate given the
complexities at work in most scenarios, but it’s close enough to explain the
idea.

33- What’s the difference between a White Box test and a Black Box test?
Information given by the person commissioning the test. A White Box test is
one where the pen testing team is given as much information as possible
regarding the environment, while a Black Box test is…well…a Black Box.
They don’t know what’s inside.

34- What is the difference between Information Protection and


Information Assurance?
Information Protection is just what it sounds like- protecting information
through the use of Encryption, Security software and other methods
designed to keep it safe. Information Assurance on the other hand deals
more with keeping the data reliable – RAID configurations, backups, non-
repudiation techniques, etc.

35- How would you lock down a mobile device?


Another opinion question, and as usual a lot of different potential answers.
The baseline for these though would be three key elements: An anti-malware
application, a remote wipe utility, and full-disk encryption. Almost all
modern mobile devices regardless of manufacturer have anti-malware and
remote wipe available for them, and very few systems now do not come
with full-disk encryption available as an option directly within the OS.

36- What is the difference between closed-source and open-source? Which


is better?
Yet another opinion question. Closed-source is a typical commercially
developed program. You receive an executable file which runs and does its
job without the ability to look far under the hood. Open-source however
provides the source code to be able to inspect everything it does, as well as
be able to make changes yourself and recompile the code. Both have
arguments for and against them, most have to do with audits and
accountability. Closed-source advocates claim that open-source causes
issues because everybody can see exactly how it works and exploit
weaknesses in the program. Open-source counter saying that because
closed-source programs don’t provide ways to fully check them out, its
difficult to find and troubleshoot issues in the programs beyond a certain
level.

37- What is your opinion on hacktivist groups such as Anonymous?


You might have guessed that this level is very much about forming opinions
and drawing conclusions, and you’d be right – this one is an especially
loaded question. Like any major group without a central leader, they seem
to be mostly chaotic, at times seeming like a force for good, while at others
causing havoc for innocents. Choose your words very carefully here, as it
could be a dealbreaker.

38- What is the Three-way handshake? How can it be used to create a DOS
attack?
The three-way handshake is a cornerstone of the TCP suite: SYN, SYN/ACK,
ACK. SYN is the outgoing connection request from client to server. ACK is
the acknowledgement of the server back to the client, saying that yes I hear
you, let’s open a connection. SYN/ACK is the final connection, and allows
the two to speak. The problem is that this can be used as a very basic type of
Denial of Service Attack. The client opens up the SYN connection, the server
responds with the SYN/ACK, but then the client sends another SYN. The
server treats this as a new connection request and keeps the previous
connection open. As this is repeated over and over many times very quickly,
the server quickly becomes saturated with a huge number of connection
requests, eventually overloading its ability to connect to legitimate users.

39- Why would you bring in an outside contractor to perform a


penetration test?
Much like getting a fresh set of eyes on a problem, sometimes you have
people that don’t want to see or don’t want to admit to an issue. Bringing in
extra help as an audit can really help eliminate problems that your team isn’t
able to resolve on their own. Granted they may cost a small fortune, but they
are extremely good at what they do.

40- If you were going to break into a database-based website, how would
you do it?
And here’s other side of the coin: learning to break into your own systems so
that you can pen test them yourself. While the exact methods are different
for each type of database server and programming language, the easiest
attack vector to test for first is an SQL injection technique. For example, if the
input fields are not sterilized, just entering a specific set of symbols into a
form field may be enough to get back data. Alternatively, depending again
on how the site is written, using a specially crafted URL may be enough to
get back data as well. Footprinting the server ahead of time can help in this
task if it isn’t one you built yourself.

43- Why is deleted data not truly gone when you delete it?
When you press delete on a file, it doesn’t actually go anywhere. A bit on the
file is flipped telling the operating system that that file is no longer needed
and it can be overwritten as is required. Until that happens, the file can still
be restored no matter if it’s in a Recycling Bin or not. There are ways around
this, such as using File Shredders and disk wipers, but both of these take
quite a bit of time to finish their jobs to a reasonable degree.

44- What is the Chain of Custody?


When keeping track of data or equipment for use in legal proceedings, it
needs to remain in a pristine state. Therefore, documenting exactly who has
had access to what for how long is vital when dealing with this situation.
Any compromise in the data can lead to legal issues for the parties involved
and can lead to a mistrial or contempt depending on the scenario.

45- How would you permanently remove the threat of data falling into the
wrong hands?
If data is on physical media such as a diskette, cd or even paper, there are
shredders, pulverizers and destroyers that can turn plastic and paper into
confetti. For hard disks however, that becomes a bit more tricky. Most
locations will turn to a two-fold method for ensuring a disk’s destruction by
first using a specially made disc wiping program, taking apart the hard
drive, removing the platters, scratching them up beyond recognition and
then degaussing them with a high-powered magnet. This ensures that the
data cannot be recovered through conventional means.

46- What is Exfiltration?


Infiltration is the method by which you enter or smuggle elements into a
location. Exfiltration is just the opposite: getting sensitive information or
objects out of a location without being discovered. In an environment with
high security, this can be extremely difficult but not impossible. Again we
turn to our friends in the fake delivery uniforms wandering around the
building, and see that yes there are ways to get in and out without a lot of
issues.

47- I run an SMB. I have 4 people in my entire company and a web-based


store. I don’t have the time, patience or manpower to have a computer guy.
Why should I care about exploits and computer jibberish?
This is a classic catch-22 situation: a company doesn’t have enough money to
secure their networks, but by the same token they can’t afford a payout if
they get compromised. At the same time, they really can’t afford to have a
dedicated computer technician, let alone a security consultant. If you are
able to explain (in words that don’t make it sound like you’re just
fearmongering), an SMB will acknowledge what they need to do to keep
their store secure and keep receiving payments since following the money
will tend to help move things along.

48- I’m the CEO of a Fortune 500 company. I make more in an afternoon
than you make in a year. I don’t care about this stupid security stuff, it just
costs time and money and slows everything down. Why should I care
about this junk?
This one is significantly harder – they are used to having people lie, cheat
and steal from them on a regular basis, and when somebody comes in saying
that the company is going to lose all this money unless you pay for this,
they’re probably going to say no. Therefore, having done your homework
and having the support of the local IT team instead of alienating them is
vital. Performing site assessments, creating executive summaries and line-
by-line breakdowns of what goes where can help them to better understand
what is going to be done and keep the project going.

49- I’m the legal council for a large corporation. We have requirements to
document assets and code changes. We have a very limited budget for this
task. How would you resolve this?
This is actually one of the easier ones – you have an informed party, asking
for assistance to something that is important. They have money for the
project (albeit not much), but it is better than nothing. At the very bottom of
the spectrum, this could be accomplished in nothing more than Excel with a
lot of time and data entry, moving all the way up the chain to automated
Network Scanners documenting everything they find to a database and
programs that check-in and out programs with versioning and delta files. It
all depends on how big the project is, and how big the company is.

6. What is the difference between a threat, a vulnerability, and a risk?


Answering this question calls for a deep understanding of cybersecurity and
anyone working in the field should be able to give a strong response. You
should expect a follow-up question asking which of the three to focus more
on. A simple way to put it: a threat is from someone targeting a vulnerability
(or weakness) in the organization that was not mitigated or taken care of
since it was not properly identified as a risk.

7. How do you go about securing a server?


You might want to break this answer down into steps, especially if it refers
to a specific type of server. Your answer will give a glimpse into your
decision-making abilities and thought process. There are multiple ways to
answer this question, just as there are multiple ways to secure a server. You
might reference the concept of trust no one or the principle of least privilege.
Let your expertise guide your response to this question and the others
following it.

8. Why is DNS monitoring important?


Some argue that this is not necessary and that saying otherwise indicates
that there are weaknesses in the domain name services. Others say DNS
monitoring is prudent because DNS queries are a data-exfiltration vector
from networks that allow any host to communicate to the Internet on Port
53.

9. What port does ping work over?


Watch out for this. Ping is a layer-3 protocol like IP; ports are an element of
the layer-4 protocols TCP and UDP.

10. What is the difference between encoding, encrypting, and hashing?

11. What is SSL?


SSL is a standard security technology for creating an encrypted link between
a server and a client (usually a web server and a web browser).

12. What are the differences between HTTPS, SSL, and TLS?
HTTPS is hypertext transfer protocol and secures communications over a
network. TLS is transport layer security and is a successor protocol to SSL.
You have to demonstrate that you know the differences between the three
and how network-related protocols are used to understand the inherent
risks involved.
13. What sorts of anomalies would you look for to identify a compromised
system?
There are multiple ways to answer this, but again, you need to show your
expertise and ingenuity. One possible answer is drawing out a basic network
architecture with its IPS/IDS, firewalls, and other security technologies to
describe the type of traffic and other signs of compromise.

14. If you had to both compress and encrypt data during a transmission,
which would you do first?
Compress and then encrypt, since encrypting first might make it hard to
show compression having much of an effect.

15. How would you strengthen user authentication?


Whatever way you answer, mention two-factor authentication or non-
repudiation and how you would implement it.

16. How would you defend against a cross-site scripting (XSS) attack?
Every cybersecurity professional should know this, even if it is difficult to
answer. Come prepared with a thoughtful, concise plan for defending
against this JavaScript vulnerability.

17. What are the differences between cybersecurity in the cloud and on
premises?
Show that you understand the security risks inherent to both and which
might be more appropriate for the company.

18. What does RDP stand for?


Remote desktop protocol, and its port number is 3389.
22. What tech blogs do you follow?
Show that you stay current by telling the interviewer how you get your
cybersecurity news. These days, there are blogs for everything, but you
might also have news sites, newsletters, and books that you can reference.

23. What do you do in your spare time outside of cybersecurity?


The interviewer is hoping to get a better sense of you as a person to
determine whether you’re trustworthy, reliable, and of good character. He
or she also wants to see if you would be a good culture fit and someone
others would enjoy collaborating with. You don’t need to get too personal
with the details, but you can talk about your hobbies, your family, the last
vacation you took, or how often you like to work out, among other things.
Show some personality here.

24. Where do you see yourself in five years?


Most people expect to advance in their cybersecurity careers in five years,
which could mean a promotion or raise (or a few). Emphasize how you are
looking to further your knowledge and skills—and how that will benefit the
company. Tell the interviewer that you see yourself moving up to a more
senior position and continuing to contribute to the organization in a
significant way. Drive home the point that the investment made in you will
be a good one.

IT Support Specialist
Requirements
3-5 years of experience working in IT support in a corporate environment required
• Computer Science degree/work experience or similar required
• Windows 10 installation & troubleshooting experience required
• Microsoft Office 365/Skype for Business (or Teams) experience required
• Active Directory experience and understanding of Group Policy, DNS, DHCP required
• Strong understanding of basic networking/system troubleshooting required
• Strong understanding and experience with ticketing systems/escalation protocols required
• MDM/VPN/Microsoft In tune experience a plus
• Vendor/Project Management experience a plus
• Familiarity with security applications/processes a plus

• The candidate has a passion for technical support


• The candidate comes off as honest and sincere
• The candidate understands the bigger purpose of technical support
Example: "I decided to go into technical support because I've been fascinated
(mutwaja) by technology all my life, and I also love working with people. I want to
use my technical know-how to directly solve issues customers are having. I want to
be the person that makes life easier and more enjoyable for folks who've run into a
problem."

Why did you apply to our company?


• The candidate understands your company's mission
• The candidate shows how working for the company aligns with career
ambitions
• The candidate knows about specific endeavors your company is undertaking
now

Example: "I applied to your company because your team is making life easier and
more enjoyable for millions of people. The scale of your work is tremendous, and I
feel like my work here can have a real positive impact. I also love the company
culture and how there's a focus on teamwork and collaboration."
What makes you qualified for this job?
With this question, you can hear about the applicant's education, experience and other qualifications
and skills in more detail. 

What to look for in an answer:


• The candidate demonstrates how they stand out from other applicants
• The candidate shows how they can be a valuable asset to the company
• The candidate shows what specifically makes them a good fit for the company

Example: "I feel that I'm qualified because I have a bachelor's degree in computer
science. I have advanced skills with customer support tools like Zendesk. Also, I
have five years of experience as a technical support specialist in the software
industry. I know your company operates on global scale, and I can provide support
in both English and Spanish."
What is your troubleshooting process?
The goal of technical support is to provide help and advice to customers about products. You must
understand how applicants go about solving customer issues because it's crucial to customer retention and
business success. 

What to look for in an answer:


• The candidate goes through the troubleshooting process correctly (from fact
gathering and diagnosis to solutions)
• The candidate has a thorough yet adaptable troubleshooting process
• The candidate emphasizes solving customer needs as quickly and effectively
as possible.

Example: "I first gather info and facts from the customer, then identify and verify
the issue. Next, I try common quick fixes. If that's not successful, I use additional
resources to research the issue. Once a solution is found, I perform appropriate
repairs or replacement if necessary. After the solution is implemented, I test
thoroughly to ensure everything is OK."
Describe a time when you went above and beyond to help a customer.
Many situations require more help than just a quick fix. You should want applicants that can
recognize and solve new or unknown problems. 

What to look for in an answer:


• The candidate is willing to go the extra mile for customers
• The candidate has the ability to look at a problem from many perspectives
• The candidate can work with others to develop a new solution or fix

Example: "At my previous company, I remember one customer had an issue that
kept happening. The common fixes we were using were only temporarily solving the
problem. After doing a bit of research, I was able to design and develop a new
solution. I called the customer personally and implemented the repair."
Is technical knowledge or customer service more important?
Technical support specialists must have the right mix of technical and people skills. 

What to look for in an answer:


• The candidate uses reasoning and logic (there is no correct answer, as it's an
opinion question)
• The candidate views both skills as important, even if they choose one skill
over the other
• The candidate understands how both skills play a role in the job

Example: "First, let me say that customer service skills are very important. You must
be able to empathize with people and address needs. Good communication is
crucial. With that said, I have a technical background, and I understand the amount
of knowledge you need to actually solve issues. Technical skills are more important
because, without in-depth knowledge of the hardware and software, you won't be
able to efficiently do your job."
Where do you see yourself in five years?
With this question, you can understand career goals. 

What to look for in an answer:


• The candidate is proactive and willing to learn
• The candidate is excited about the job at hand
• The candidate sees your company as part of their future

Example: "In this position, I plan to add skills and experience. Honestly, I would like
to move into a management role in technical support within five years. What I really
like about this company is how they actively develop employees. I feel like I can
consistently improve here and move into bigger roles for your organization."
Technical Questions
1) Mention what is Active Directory?
An active directory is a directory structure used on Microsoft Windows based servers and computers to
store data and information about networks and domains.
2) Mention what are the new features in Active Directory (AD) of Windows server 2012?
• dcpromo (Domain Controller Promoter) with improved wizard: It allows you to view all the
steps and review the detailed results during the installation process
• Enhanced Administrative Center: Compared to the earlier version of active directory, the
administrative center is well designed in Windows 2012. The exchange management console is well
designed
• Recycle bin goes GUI: In windows server 12, there are now many ways to enable the active
directory recycle bin through the GUI in the Active Directory Administrative Center, which was not
possible with the earlier version
• Fine grained password policies (FGPP): In windows server 12 implementing FGPP is much
easier compared to an earlier  It allows you to create different password policies in the same domain
• Windows Power Shell History Viewer: You can view the Windows PowerShell commands that
relates to the actions you execute in the Active Directory Administrative Center UI
3) Mention which is the default protocol used in directory services?
The default protocol used in directory services is LDAP ( Lightweight Directory Access Protocol).
4) Explain the term FOREST in AD?
Forest is used to define an assembly of AD domains that share a single schema for the AD.  All DC’s in the
forest share this schema and is replicated in a hierarchical fashion among them.
5) Explain what is SYSVOL?
The SysVOL folder keeps the server’s copy of the domain’s public files.  The contents such as users, group
policy, etc. of the sysvol folders are replicated to all domain controllers in the domain.
 Mention what is the difference between domain admin groups and enterprise admins group in
AD?
                Enterprise Admin Group              Domain Admin Group

• Members of this group have complete •  Members of this group have


control of all domains in the forest complete control of the domain
• By default, this group belongs to the • By default, this group is a member of
administrators group on all domain the administrators group on all domain
controllers in the forest controllers, workstations and member servers
• As such this group has full control of at the time they are linked to the domain
the forest, add users with caution • As such the group has full control in
the domain, add users with caution
7) Mention what system state data contains?
System state data contains
• Contains startup files
• Registry
• Com + Registration Database
• Memory page file
• System files
• AD information
• SYSVOL Folder
• Cluster service information
8) Mention what is Kerberos?
Kerberos is an authentication protocol for network.  It is built to offer strong authentication for
server/client applications by using secret-key cryptography.
9) Explain where does the AD database is held? What other folders are related to AD?
AD database is saved in %systemroot%/ntds. In the same folder, you can also see other files; these are
the main files controlling the AD structures they are
• dit
• log
• res 1.log
• log
• chk
10) Mention what is PDC emulator and how would one know whether PDC emulator is working or
not?
PDC Emulators: There is one PDC emulator per domain, and when there is a failed authentication
attempt, it is forwarded to PDC emulator.  It acts as a “tie-breaker” and it controls the time sync across
the domain.
These are the parameters through which we can know whether PDC emulator is working or not.
• Time is not syncing
• User’s accounts are not locked out
• Windows NT BDCs are not getting updates
• If pre-windows 2000 computers are unable to change their passwords
11) Mention what are lingering objects?
Lingering objects can exists if a domain controller does not replicate for an interval of time that is longer
than the tombstone lifetime (TSL).
12) Mention what is TOMBSTONE lifetime?
Tombstone lifetime in an Active Directory determines how long a deleted object is retained in Active
Directory.  The deleted objects in Active Directory is stored in a special object referred as TOMBSTONE. 
Usually, windows will use a 60- day tombstone lifetime if time is not set in the forest configuration.
13) Explain what is Active Directory Schema?
Schema is an active directory component describes all the attributes and objects that the directory
service uses to store data.
14) Explain what is a child DC?
CDC or child DC is a sub domain controller under root domain controller which share name space
15) Explain what is RID Master?
RID master stands for Relative Identifier for assigning unique IDs to the object created in AD.
16) Mention what are the components of AD?
Components of AD includes
• Logical Structure: Trees, Forest, Domains and OU
• Physical Structures: Domain controller and Sites
17) Explain what is Infrastructure Master?
Infrastructure Master is accountable for updating information about the user and group and global
catalogue.
Question 6. What Is Native Mode?
Answer :
When all the domain controllers in a given domain are running Windows 2000 Server. This mode
allows organizations to take advantage of new Active Directory features such as Universal groups,
nested group membership, and inter-domain group membership.
Question 8. What Is Ldap?
Answer :
LDAP is the directory service protocol that is used to query and update AD. LDAP naming paths are
used to access AD objects and include the following:
• Distinguished names
• Relative Distinguished names
Question 10. Minimum Requirement For Installing Ad?
Answer :
• Windows Server, Advanced Server, Datacenter Server
• Minimum Disk space of 200MB for AD and 50MB for log files
• NTFS partition
• TCP/IP Installed and Configured to use DNS
• Administrative privilege for creating a domain in existing network
2. Question 11. Mention What Are Lingering Objects?
Answer :
Lingering objects can exists if a domain controller does not replicate for an interval of time that is
longer than the tombstone lifetime (TSL).
3. Question 12. What Is Domain Controller?
Answer :
In an Active directory forest, the domain controller is a server that contains a writable copy of the
Active Directory Database participates in Active directory replication and controls access to network
resource.
Question 14. Why We Need Netlogon?
Answer :
Maintains a secure channel between this computer and the domain controller for authenticating
users and services. If this service is stopped, the computer may not authenticate users and services,
and the domain controller cannot register DNS records."
1. Question 15. Explain What Is Active Directory Schema?
Answer :
Schema is an active directory component describes all the attributes and objects that the directory
service uses to store data.
Question 16. What Is Dns Scavenging?
Answer :
Scavenging will help you clean up old unused records in DNS.
1. Question 17. Explain What Is A Child Dc?
Answer :
CDC or child DC is a sub domain controller under root domain controller which share name space
2. Question 18. What Is New In Windows Server 2008 Active Directory Domain Services?
Answer :
AD Domain Services auditing, Fine-Grained Password Policies,Read-Only Domain
Controllers,Restartable Active Directory Domain Services
3. Question 19. Explain What Is Rid Master?
Answer :
RID master stands for Relative Identifier for assigning unique IDs to the object created in AD.
4. Question 20. Explain What Are Rodcs? And What Are The Major Benefits Of Using Rodcs?
Answer :
Read only Domain Controller, organizations can easily deploy a domain controller in locations where
physical security cannot be guaranteed.
5. Question 21. Mention What Are The Components Of Ad?
Answer :
Components of AD includes
Logical Structure: Trees, Forest, Domains and OU.
Physical Structures: Domain controller and Sites.
6. Question 22. What Is The Number Of Permitted Unsuccessful Log Ons On Administrator
Account?
Answer :
Unlimited. Remember, though, that it’s the Administrator account, not any account that’s part of the
Administrators group.
7. Question 23. Explain What Is Infrastructure Master?
Answer :
Infrastructure Master is accountable for updating information about the user and group and global
catalogue.
8. Question 24. What Hidden Shares Exist On Windows Server 2003 Installation?
Answer :
Admin$, Drive$, IPC$, NETLOGON, print$ and SYSVOL.
9. Question 25. Can You Connect Active Directory To Other 3rd-party Directory Services? Name
A Few Options?
Answer :
Yes you can Connect Active Directory to other 3rd -party Directory Services such as dictionaries
used by SAP, Domino etc with the help of MIIS (Microsoft Identity Integration Server).
Question 30. Abbreviate Gpt And Gpc?
Answer :
GPT : Group policy template.
GPC : Group policy container.
1. Question 31. Tell Me What If My Windows 2000 Or Windows Server 2003 Dns Server Is
Behind A Proxy Server Or Firewall?
Answer :
If you are able to query the ISP's DNS servers from behind the proxy server or firewall, Windows
2000 and Windows Server 2003 DNS server is able to query the root hint servers. UDP and TCP Port
53 should be open on the proxy server or firewall.
2. Question 32. Explain What Is The Difference Between Local, Global And Universal Groups?
Answer :
Domain local groups assign access permissions to global domain groups for local domain
resources. Global groups provide access to resources in other trusted domains. Universal groups
grant access to resources in all trusted domains.
3. Question 33. Do You Know What Is The "." Zone In My Forward Lookup Zone?
Answer :
This setting designates the Windows 2000 DNS server to be a root hint server and is usually deleted.
If you do not delete this setting, you may not be able to perform external name resolution to the root
hint servers on the Internet.
Question 44. What Are The Advantages Of Active Directory Sites?
Answer :
Active Directory Sites and Services allow you to specify site information. Active Directory uses this
information to determine how best to use available network resources.
Question 51. What Is Schema Information In Active Directory?
Answer :
Definitional details about objects and attributes that one CAN store in the AD. Replicates to all DCs.
Static in nature.
1. Question 52. What Is Online Defragmentation In Active Directory?
Answer :
Online Defragmentation method that runs as part of the garbage collection process. The only
advantage to this method is that the server does not need to be taken offline for it to run. However,
this method does not shrink the Active Directory database file (Ntds.dit).

Windows 10
RUN THE WINDOWS UPDATE TROUBLESHOOTER
Windows 10 includes a troubleshooter that can automatically detect and try to fix problems with
updates and patches. If the problem isn’t clear and you aren’t sure what to do next, try running
this troubleshooter. It doesn’t always find a solution, but it’s a good place to start.

What is Web Server?


Web Servers are the computers that hosts websites on the internet. Which save web contents
on the request.

Apache Web Server:


Apache Web Server is an open Source software which is free to use. Because of that apache is
the most popular package used over the internet.
IP Address: 127.0.0.1 or locahost/

XAMPP: It’s a software which helps to create dynamic website such as to create dynamic
website by using HTTP or PHP, Mysql.

List of Common Ports


Port: Description
18 Message Send Protocol (MSP)
20 FTP—Data
21 FTP – Control
22 SSH Remote Login Protocol
23 Telnet
25 Simple Mail Transfer Protocol
29 MSG ICP
37 Time
42 Hostname Server
43 WhoIs
49 Login Host Protocol
53 DNS: Domain Name System
69 TFTP: Trivial File Transfer Protocol
70 Gopher Service
80 HTTP
389 LDAP
444 Simple Network Paging Protocol (SNPP)
445 Microsoft – DS
 Send Email by using Port 25 and Receive Emails by using Port 110
 Apache Main Configuration file is: httpd which resides in apache folder/ conf

SAN & NAS


 Both are external centralized management storage.
 Easy to have centralized storage for 50 servers compare to individually
 Better Disk utilization.
 Diskless Servers. (Rather than each server has its own disk to boot up).
 High degree of resiliency.
 Disk failure can be maintained by RAID.
 Centralized Backup
 Snapshots (Short Term backups)
 Provides file level access to storage system.
 It’s possible to boot from SAN but not from NAS.
SAN (Storage Area Network)
SAN Protocols:

NAS (Network Attached Storage)


NAS Protocols:
NFS: Network File system
CIFS: (Common Internet File System)

DAS (Direct Attached Storage)


 In DAS storage is dedicated to one particular Server that could be hard drive
attached or external Raid Array or Drive etc.

1. Question 1. Please Describe The Importance You Place On Customer Service Versus
Technical Skills?
Answer :
Most interviewers like to start with big picture questions and then work their way into more
technical areas. IT is a service organization and customer service is at its core. In particular,
customer service skills are just as important as technical skills, particularly in panic situations
when systems are down or the user has just deleted their board presentation that’s due in 30
minutes. We’ve all had these situations. You should be prepared to talk about a specific situation
where you’ve excelled and received accolades from an end-user. If they put it in writing, mention
that as well.
2. Question 2. What Steps Do You Take When Troubleshooting A Networking Issue?
Answer :
As a support technician, your job is to solve problems. This question provides the interviewer with
insight into your troubleshooting skills. Of course, the most important part of troubleshooting any
problem is to divide the tasks of problem resolution into a systematic process of elimination, like
this:
1. Define the problem.
2. Gather detailed information.
3. Consider probable cause for the failure.
4. Devise a plan to solve the problem.
5. Implement the plan. 6. Observe the results of the implementation.
6. Repeat the process if the plan does not resolve the problem.
7. Document the changes made to solve the problem.
Be prepared before the interview, so you can provide an example of these skills in action.
Computer Technical Support Interview Questions

o Question 3. How Would You Prioritize Support Issues?


Answer :
It is unlikely that as a network administrator or technician you will receive problem calls one at a
time. Typically, when you receive one call, you already have three people waiting for service. For
this reason, you must learn to prioritize. Your answer to this question will provide the interviewer
with insight into how effectively you prioritize. It’s not a trick question, though sometimes it can
feel that way. You probably have a process that you use instinctually. Talk about it. It probably
includes many of the following components:
1. Total network failure (affects everyone)
2. Partial network failure (affects small groups of users)
3. Small network failure (affects a small, single group of users)
4. Total workstation failure (single user can’t work at all)
5. Partial workstation failure (single user can’t do most tasks)
6. Minor issue (single user has problems that crop up now and again)
o Question 4. Users Can Send E-mail Locally, But Cannot Send E-mail To External
Recipients. How Would You Troubleshoot This Situation?
Answer :
The interviewer will run you through a series of questions like this one to see how you would use
your troubleshooting skills in a common, real-life situation. He not only gets to see how your mind
works, but also begins to get an insight into your technical capabilities. In your answer, be
methodical in your approach, identifying the most likely possibility and testing it. Be sure to let the
interviewer know that if your first attempt doesn’t work, you know how to move on to the next
possibility.
Networking Tutorial

o Question 5. A User Complains That When She Prints A Document In Any Application,
The Printer Prints Garbage. What Is The Most Likely Cause Of The Problem?
Answer :
This question starts the behavioral interviewing questions based on real-life situations that assess
your problem-solving skills and your technical skills. They will range from the general (like this
question) to very specific technical questions that determine your knowledge level and skill set.
Don’t worry if you don’t have all the answers. The interviewer is mostly interested in how you would
resolve the situation and what resources you would use to do so.
Networking Interview Questions

o Question 6. A User's Roaming Profile Is Not Accessible. Describe How You Would
Solve This Problem?
Answer :
This question tests your troubleshooting skills. In this situation you may want to talk about which
tests you would perform in order to resolve the issue. These may include:
1. Ensuring that the path to the profile directory is correct on the user’s account
properties.
2. Ensuring that the server where the profile resides is accessible.
3. Ensuring that the user has Full Control permissions to the Profile directory.
o Question 7. A User Has Left The Company And You Need To Create A New User With
The Same Rights And Permissions. Please Describe Some Of The Ways To Create The New
User?
Answer :
This question tests your ability to get the job done in the most efficient way possible. For example,
you can create new accounts from scratch and assign the original rights to the accounts or you
can simply rename the old account for the new user, which saves you a lot of time and effort.
CCNA Interview Questions

o Question 8. What Are The First Things You Check When A User Is Experiencing
Problems Accessing The Network?
Answer :
This question assesses your basic network troubleshooting skills. You can’t miss this one! You
should be able to answer it in your sleep. You can liven up the interview by providing a funny story
about user errors that you’ve encountered.
o Question 9. What Tools Do You Have Available To You For Troubleshooting?
Answer :
At this point, the interviewer is testing your resourcefulness. This is a pretty generic question, so
make sure that your answer is consistent with the overall theme of the interview. The tools
available may include server log files, network analyzers, error messages, README files, telephone
support, or vendor technical support web sites or CD-ROMs. Don’t forget to mention vendor-
specific resources that you may use, like TechNet Online, or any other subscriptions that you may
have in your bag of tricks. The final resource is of course your colleagues who may have run into
this situation in the past.
Active Directory Interview Questions

o Question 10. A User Cannot Access The Local Intranet. What Would You Try First In
Helping To Determine How To Narrow The Problem Down To The Intranet?
Answer :
Don’t make this question harder than it really is. Sometimes the interviewer will try to trip you up to
test your common sense. Go for the obvious, rather than complicating the situation. In this case,
simply trying to access the intranet from another workstation would help isolate the problem to the
machine.
o Question 11. Several Users Can't Log In To The Server. What Would You Do To
Narrow The Problem Down To The Workstations, Network, Or Server?
Answer :
The situation gets a little more interesting. Again, keep it simple, such as checking the server
console for user connections to see if other users are able to log into the server. If they can, the
problem is most likely related to those users’ workstations. If they can’t, the problem is either the
server or network connection.
Hardware and Networking Interview Questions

o Question 12. Which Software Troubleshooting Tool Could You Use To Determine
Which Protocol Is Configured With The Wrong Address?
Answer :
Questions like these assess your knowledge of troubleshooting tools that can help you resolve
problems faster. In this case, a typical tool used to determine incorrectly configured addresses is a
protocol analyzer. It can be used to examine the details of packets as they travel across the wire.
This is a sophisticated tool that requires a deeper understanding of network protocols. Any
interviewer will be impressed if you’ve used such a tool in troubleshooting.
Computer Technical Support Interview Questions

o Question 13. Which Hardware Troubleshooting Tool(s) Could You Use To Find Out
Where A Cable Is Routed?
Answer :
Here’s another question regarding troubleshooting tools. In this case you might want to use a tone
generator and tone locator to find out where cables are routed. These tools are alternately known
as fox and hound devices. These are more advanced tools that represent a higher skill level.
Whenever possible, provide an example of a sticky situation where you’ve had to rely on tools such
as these for troubleshooting.
o Question 14. Which Windows Nt Utility Do You Use To Manage The Major Windows
Nt Log Files?
Answer :
Typically, the interviewer or someone more technical than the IT manager will ask you detailed
operating system–specific questions to assess your knowledge of the various products.
Alternately, you may be asked to take an assessment exam like Brainbench.
o Question 15. A User Calls You, Complaining That He Can't Access The Corporate
Intranet Web Server. You Try The Same Address, And You Receive A Host Not Found Error.
Several Minutes Later, Another User Reports The Same Problem. You Can Still Send E-mail And
Transfer Files To Another Server. What Is The Most Likely Cause Of The Problem?
Answer :
The interviewer will assess your skills as they relate to all aspects of networking, not just servers.
This means you should be prepared to answer questions on web servers as well as local networks.
In this case, because other people are experiencing the problem, the problem is most likely either
network- or server-related. And because you can transfer files to and from another server, it can’t
be the network. Thus, the problem is related to the web server.
Firewall Support Interview Questions

o Question 16. You Are Connecting A Cubicle Farm To Your Network. You Install Nics
In All The Workstations And Run Cables To A Workgroup Hub. You Then Connect The Mdi Port
On The Workgroup Hub To The Main Hub With A Standard Patch Cable. Upon Powering Up The
Cubicle Farm Computers, None Of Them Can See The Servers On The Network. What Could You
Replace To Solve This Problem?
Answer :
Networking devices like hubs, switches, and routers will also be part of the technical interview. It is
expected that you can speak fluently on both software and hardware issues.
o Question 17. A User From The Marketing Department Calls Complaining That She
Can't Log In Or See Any Servers On The Network. Her Computer Operates Fine Otherwise. No
Other Users From The Marketing Department Are Reporting Any Problems. What Is The First
Thing You Could Check?
Answer :
You should also expect to be assessed on your knowledge of the physical layer of the OSI model.
IIS ADMIN Interview Questions

o Question 18. You Are Installing A Windows Xp-based Tcp/ip Network. You
Accidentally Set Workstation B To The Same Ip Address As Workstation A. Which Workstation(s)
Will Receive An Error Message?
Answer :
This type of question assesses your TCP/IP configuration knowledge. It’s a common problem, but
a little tricky based on the configuration mentioned above. The correct answer here is that through
broadcasts, both workstations will detect if there is a duplicate IP address on the network and will
display error messages to that effect.
Networking Interview Questions

o Question 19. Which Tcp/ip Utility Is Most Often Used To Test Whether An Ip Host Is
Up And Functional?
Answer :
TCP/IP is at the core of just about every network today. You must be familiar with the most often
used commands for managing this network environment. This includes Ping, ipconfig, FTP, and
tracert. You should also be ready to apply these commands and utilities to various situations, as
the next question demonstrates. Some sample additional questions include:
1. Which utility can you use to find the MAC and TCP/IP address of your Windows NT or
2000 workstation?
2. Which program can you use to upload and download files to a Unix server?
3. Which utility can you use to verify a packet’s path?
o Question 20. You Are The Network Administrator. A User Calls You Complaining That
The Performance Of The Intranet Web Server Is Sluggish. When You Try To Ping The Server, It
Takes Several Seconds For The Server To Respond. You Suspect The Problem Is Related To A
Router That Is Seriously Overloaded. Which Workstation Utility Could You Use To Find Out Which
Router Is Causing This Problem?
Answer :
The answer here is the tracer out utility, which will tell you which router is having the performance
problem and how long it would take to travel between each host. You should be knowledgeable on
the application of the most common IP commands for the various operating systems you support.
Other questions along this line that you may run into include:
1. Which ipconfig switch will display the most complete listing of IP configuration
information for that station?
2. Which Windows TCP/IP utility could you use to find out whether a server is responding
on TCP port 21?
Desktop Support Interview Questions

o Question 21. Depending On The Windows Client Operating System Version, Which
Commands Can You Use To Find Out What Is Installed On A System?
Answer :
You may run into operating system–specific questions like this one as you are being interviewed
by prospective peers. You should be familiar with the most common commands. Don’t worry about
memorizing command syntax. That’s what the /? is for.
o Question 22. Which Power Condition Occurs When The Voltage Level Drops Below
120 Volts And Stays Below For An Extended Period Of Time?
Answer :
Questions about power conditions don’t rank very high, though they are important. Network
support technicians will be faced with many different scenarios. Be familiar with these types of
conditions just in case.
o Question 23. A Customer Running Windows Xp (home Edition) With An Antivirus
Application Installed Reports That He Has Downloaded A Program From The Internet And
Installed It In His Computer. After Installing The Program, He Started Receiving Emails From
People He Never Knew. The Customer Removed The Program From His Computer But He Is Still
Getting Those Emails. How Would You Help This Customer?
Answer :
Download the most recent virus signature files and scan this computer for viruses.
Technical Support Interview Questions

o Question 24. You Are Configuring Power Management On Your Windows Xp


Computer. With Acpi, Power Management Should Be Under The Exclusive Control Of:
Answer :
The Operating System
CCNA Interview Questions

o Question 25. Which File Must Be Located In The Root Folder Of The Active Partition
For Dual Booting Of Windows Xp And Windows Me To Boot?
Answer :
Boot.ini
o Question 26. A Customer Calls And Says He Is Unable To Get Online. He Uses A
Cable Connection To Connect To The Internet On A Windows Xp Computer. You Ping 127.0.0.1
On His Computer And Get The Results That All The Packets Are Lost. What Should You Do Next?
Answer :
Rebuild the TCP/IP Stack in the users computer
Unix Production Support Interview Questions

o Question 27. Very Frequently, Users In Your Office Put Floppy Disks In The Drives
And Forget To Take Them Out. This Results In Boot-up Problems And Results In Support
Requests. How Would You Stop This Computer From Looking In The A: Drive For Boot Files First?
Answer :
Change the Boot Order in BIOS.
Active Directory Interview Questions

o Question 28. After Restarting Your Windows Xp (professional) Computer, Your


Monitor Shows A Blank, Blue Screen. You Remember That A New Video Driver Was Just
Installed. What Would Be The Best Way To Fix This Problem?
Answer :
Restart the Computer, Keep tapping on the F8 Key to go to the Windows Advanced Options Menu
and select the option “Last Known Good Configuration” and hit the key.
o Question 29. You Need To Dual-boot A Computer With Windows Xp And Windows
Me. You Need All The Partitions To Be Accessible From Both The Operating Systems. Which File
System Would You Use In This Scenario?
Answer :
FAT32
Windows Server Support Interview Questions

o Question 30. What Is The Command To Convert A Fat32 File System To Ntfs? Would
There Be Any Loss Of Data?
Answer :
The command is: CONVERT : /fs:NTFS. There will be no effect on the data. (Data will be safe).But
remember this: if you want to convert NTFS partition back to FAT32, you will have to re-format that
partition and select the FAT32 file system.
o Question 31. What Are The Features Of The Disk Defragmenter Tool In Windows Xp
And Windows 2000? Does The Windows Xp Version Have Any More Features Than The Windows
2000 Version?
Answer :
The features of the Disk Defragmenter Tool are the same in both Windows XP and Windows 2000.
They are:
1. Enhanced Analysis Functionality
2. A Compression option
3. Increased Defragmentation Option and an Automatic Defrag-Scheduling Option.
o Question 32. You Are A Desktop Support Technician At Eqs. One Of The Customers
Has Just Installed A Brand New Printer For Himself. This Customer Calls You After Some Time
And Says That Every Time He Tries To Print Something, All He Gets Is Some Garbled Text.
However, The Printer Prints The Test Page Fine. What Do You Think Is The Problem Here?
Answer :
The customer has installed an Incorrect Device Driver for the Printer. I would uninstall the driver,
from the WIndows Device Manager and install the correct Device Driver for the Printer from the
Disk that came with the Printer. (If the Disk is not available, I can still download the correct device
driver from the manufacturer’s website)
o Question 33. If, Upon Booting Up A Computer, You See The Error Message "keyboard
Error" What Do You Think Could Be The Problem?
Answer :
It could be that
1. The keyboard is not attached to the PC or
2. The keyboard has failed
Hardware and Networking Interview Questions

o Question 34. If You Turn On A Pc And The Boot-up Process Halts And You Get The
Error Message "non-system Disk Or Disk Error Replace And Press Any Key When Ready" What Do
You Think Could Be The Problem?
Answer :
A non-bootable Floppy Disk is in the Floppy-disk drive and it should be removed.
o Question 35. If, Upon Booting Up A Pc, You See A Message Which Says "invalid Drive
Configuration" What Do You Think Is Causing This?
Answer :
This problem could be due to any of the following situations:
1. The Hard-Disk cable within the System Unit is not attached to the Controller
2. The Hard Disk Drive has failed
3. The Hard Disk Drive has not been partitioned.
o Question 36. If You Turn On A Pc And The Boot Process Halts And You Get The Error
Message " C:system32config File Missing Or Corrupt" What Is This Due To?
Answer :
The Registry Hives are corrupted. They need to be repaired.
Firewall Support Interview Questions

o Question 37. A Customer Complains That He Keeps Getting The Error Message
"hal.dll Missing Or Corrupt". Which File Needs To Be Repaired/rebuilt To Rectify The Issue?
Answer :
BOOT.INI
o Question 38. You Have Norton 360. When The Firewall Is Turned On, You Are Unable
To Browse The Internet. But If You Turn Off The Firewall, You Are Able To Browse. What Is The
First Thing You Would Do To Fix This Problem?
Answer :
Reconfigure Norton Firewall to allow Internet Explorer to access the internet.
o Question 39. Which Utility Is Used To Do A Software Clean Boot?
Answer :
Msconfig
o Question 40. What Does A "?" Sign In Device Manager Signify?
Answer :
The device is not installed. ( You can refer to this article for more details). For more information on
Device Manager check this article from Microsoft.
IIS ADMIN Interview Questions

o Question 41. What Is The Command To Start Windows System Restore From The
Command Line?
Answer :
rstrui.exe
o Question 42. What Does The Term Uac Stand For?
Answer :
UAC stands for User Access Control. For more information read this article.
Desktop Support Interview Questions

o Question 43. You Are A Desktop Support Technician. A User Calls And Complains
That Till Yesterday He Was Able To View His Cd Drive In His Computer. But Today When He
Turned On His Computer, He Is Not Able To View The Cd-rom Drive In "my Computer". What Can
Be Done To Fix This Problem?
Answer :
Open the Windows Registry Editor and Delete the Upper and Lower Filter Keys.
o Question 44. A User Calls And Says That Whenever He Starts His Computer, It Boots
Up Only In Safe Mode. There Is No Other Error Message. What Would You Do To Fix This
Problem?
Answer :
Go to Msconfig and select Normal Mode and Restart the Computer.
o Question 45. A User Complains That Whenever He Connects Any Usb 2.0 Device To
His Computer, He Gets The Error Message "usb Device Not Recognized" What Could Be The
Possible Reason For This?
Answer :
The USB Port could be faulty.
o Question 46. A User Complains That He Is No Longer Able To Hear Any Sound From
His Computer - After He Downloaded Some Updates From The Microsoft Website. What Could Be
The Possible Reason For This?
Answer :
The Windows Audio Service is Disabled. Enable it.
o Question 47. Mark Uses Windows Xp Professional And Is Connected To The Internet
Directly Through A Dsl Line. He Wants To Know How He Would Enable The Filtering Of Packets
And Get Rid Of The Harmful Incoming Data. What Would You Tell Him?
Answer :
Enable the Firewall
o Question 48. A Customer Reports That His Windows Xp Professional Portable
Computer Is Not Able To Connect To Any Network Resource And Is Also Not Able To
Authenticate On The Network's Active Directory Domain. The Computer Was Fine Yesterday. No
Other Person In The Organization Is Facing This Problem. What Is The First Thing You Would Do
To Fix This Problem?
Answer :
Ask the user to Right-Click on the Network Connection icon and select “Repair” from the Menu.
o Question 49. A Customer Has Recently Upgraded From Windows 98 To Windows Xp
Professional. After The Upgrade, It Takes Longer For Windows, Menus, Sub-menus And Other
Use Interface Features To Open. She Wants Them To Open Faster. How Can You Help This
Customer?
Answer :
Use System in Control Panel and select the option “Adjust for Best Performance” in the
Performance Options dialogue box.
o Question 50. You Suspect That Your Computer Is Failing Because Of A Corrupt
Master Boot Record. Which Utility Is The Best To Fix This Problem?
Answer :
Recovery Console (By Using the fixmbr command)
o Question 51. You Performed A Parallel Installation Of Windows Xp (home Edition) To
Resolve Certain Problems On A Customer's Computer. After Installation, The Customer Says She
Can See The Previous Profile Folders In Documents & Settings But When She Tries To Open
Then, She Gets An "access Denied" Error. What Can You Do To Remove The "access Denied"
Problem?
Answer :
Boot into Safe Mode, Right-Click on the Old Profile Folder, Go to Security – Advanced and give
Ownership to the new user.
o Question 52. A Customer Calls In And Says That Her Copy Of Windows Xp Went
Corrupt And The Previous Technician Installed It Again Without Losing Any Data. Now When The
Computer Boots Up, It Shows A Menu For A Few Seconds And Then It Boots Normally.she Wants
To Get Rid Of This Menu. You Asked Her About The Menu Options And The Customer Tells You
That Both The Options In The Menu Read The Same Thing Windows Xp Home. How Will You Fix
This Problem So That The Menu Does Not Appear Again?
Answer :
Edit the Boot.ini file and set the Timeout as 0 (Zero) or Edit the Boot.ini file and Remove the Second
Option and set the Timeout as 0 (Zero)
o Question 53. What Are Hard-disk Partitions?
Answer :
Partitions are used to Divide a Hard-disk drive into smaller segments as required by the user and
for better management of the space in it.
o Question 54. Difference Between Ram And Rom?
Answer :
RAM (Random Access Memory): is used to temporarily store information that the computer is
currently working on.
ROM (Read Only Memory): This is a Permanent type of memory storage used by computers for
important data which never changes. (Example: BIOS)
o Question 55. What Would You Check If There Is No Sound From Your Computer?
(audio Not Working)
Answer :
1. Check for cable connections
2. Check for power to the speakers
3. Check for volume control
4. Check for device drivers
o Question 56. If A Customer Complains That His Computer Is Working Really Slow,
What Are The Things You Would Check?
Answer :
1. Check if it is taking longer than usual to start up
2. Check if it is slow with one / any particular application or slow overall.
3. Check for Spyware/Malware/Virus in the computer
4. Check the available Hard-Disk Drive Space in the computer.
o Question 57. What Is The Blue Screen Of Death (bsod)?
Answer :
A Blue Screen of Death (or just a Blue Screen Error) is an indication of a Critical System Problem
wherein the Computer freezes all together and does not respond to anything.
To rectify this problem, try Restarting the computer or Booting into Safe Mode. For more
information, read this.
o Question 58. Why Are Device Drivers Required?
Answer :
A Device Driver (or just Driver) is a piece of software which is required to run every Hardware
Component present in the computer.
o Question 59. Name One Of The Latest Computer Processors (cpu) ?
Answer :
Intel Pentium Quad Core, Intel I3, I5, I7 processors.
o Question 60. What Is Ping?
Answer :
Ping is a command that checks the connectivity with an IP address. For more read this article.
o Question 61. What Is A Data Cable?
Answer :
A Data Cable is a Thin Plastic band-like cable used to connect the Data-Devices like Hard-disk
drives, Floppy Disk Drives, CD/DVD-ROM drives with the motherboard. Data Cables are primarily
used for Data Transfer.
o Question 62. What Does The Term Usb Stand For?
Answer :
USB stands for Universal Serial Bus. It allows devices to be connected or disconnected from a
computer without shutting down or restarting the computer. The current version of USB is 2.0
o Question 63. What Is The Difference Between Crt (cathode Ray Tube) And Lcd (flat
Screen Monitors)?
Answer :
CRT Monitors: The Monitor has a picture tube and uses a light-gun to highlight pixels on the
screen.
LCD Monitors: These monitors do not have a picture tube and contain a layer of liquid crystals on
an Electronic Board.
o Question 64. What Is An Ip Address?
Answer :
An IP address is a unique numerical identifier of every device on a network. A typical IP address
can look like this: 216.27.61.141. To detect a computer’s IP Address, go to Start – Run – Type in
CMD in the Run Dialogue Box and click OK or hit <Enter> In the Command Prompt Screen that
comes up, type in IPCONFIG and hit <Enter>
o Question 65. What Is Dhcp?
Answer :
DHCP stands for Dynamic Host Configuration Protocol. It is used to generate & provide IP
addresses to the computers on a network.
o Question 66. What Is Dns?
Answer :
DNS stands for Domain Name Services – it is used to convert URLs into IP addresses and vice-
versa.
o Question 67. What Are Rj45 And Rj11 Connectors?
Answer :
RJ45 connectors are used for LAN/Ethernet connections and RJ11 connectors are used for
Telephone Cable connections.
o Question 68. What Is A Parallel Windows Installation?
Answer :
When the first installation of Windows fails to boot for some reason, another copy of Windows is
installed in the same drive but in a different directory (so that the customer can access to and
backup his old data). This is called Parallel Installation of Windows.
o Question 69. Name Some Of The Versions Of Windows Xp?
Answer :
Windows XP Home Edition, Professional, Media Center Edition, Tablet PC Edition, Mobile
o Question 70. What Are The Components Needed To Setup A Basic Home Network?
Answer :
LAN Cards, LAN Cables, Router/Hub
o Question 71. Difference Between A Work Group And A Domain?
Answer :
In a Workgroup, all the computers function as Peers. But in a Domain, One computer is the Server
and the others are Clients.
o Question 72. What Is The Difference Between Fat32 And Ntfs File Systems?
Answer :
1. NTFS allows compression and file encryption. FAT32 does not.
2. NTFS is more secure than FAT32
o Question 73. What Does Boot.ini Do?
Answer :
Boot.ini lists all the Operating Systems present in the computer and provide information about
which partitions they are located on.
o Question 74. How Would You Access The Recovery Console In Windows?
Answer :
By booting with the Windows XP CD and following the onscreen instructions. The Recovery
Console can also be installed in your computer.
o Question 75. What Feature Of Outlook Express Allows Multiple Customers To Send
And Receive Emails, Each Using A Separate Account?
Answer :
Identities
o Question 76. What Is A Link?
Answer :
A link refers to the connectivity between two devices. It includes the type of cables and protocols
used in order for one device to be able to communicate with the other.
o Question 77. What Are The Layers Of The Osi Reference Model?
Answer :
There are 7 OSI layers: Physical Layer, Data Link Layer, Network Layer, Transport Layer, Session
Layer, Presentation Layer and Application Layer.
o Question 78. What Is Backbone Network?
Answer :
A backbone network is a centralized infrastructure that is designed to distribute different routes
and data to various networks. It also handles management of bandwidth and various channels.
o Question 79. Which Feature In Ms Outlook Express Allows Different Individuals Send
And Receive Emails In Ms Outlook Express Using Separate Accounts?
Answer :
The Identities feature allows multiple customers to send and receive emails using separate
accounts.
o Question 80. A Customer Running Windows Xp Home With An Antivirus Application
Installed In His Computer. He Downloaded A Program From The Internet And Installed It On His
Computer. After That, He Began To Receive E-mail Messages From Unknown People. The
Customer Removed The Program But He Is Still Receiving The E-mail Messages. You Need Help
The Customer, What Should You Instruct The Customer?
Answer :
Download the most recent virus signature files and scan his computer for viruses.
o Question 81. You Are Installing A New Windows Xp Configuration And You Like To
Specify Which Hal To Install. What Should You Do?
Answer :
Boot from the Windows XP CD to initiate Setup. At the point in text-mode set up where a message
at the bottom of the screen reads “Press F6 if you need to install a third party SCSI or RAID driver,”
press F5.
o Question 82. When You Are Configuring Power Management On Your Windows
Xp,who/what Will Control The Acpi Functions?
Answer :
ACPI will be fully controlled by The operating system.
o Question 83. Customer Gives A Call And States That He Is Unable To Get Online. He
Uses A Cable Connection To Get Online On Windows Xp Operating System. You Run The Ping
127.0.0.1 On His Computer And Get The Result As All The Packets Are Lost. What Is The Next
Step You Would Perform?
Answer :
Reset the TCP/IP stack
o Question 84. Frequently, Users In Your Office Leave Floppy Disks In Drives. This
Causes Problems When Users Attempt To Boot With Floppies Still In Drive And Results In A
Support Request. You Want To Change The Computer From Seeking The A: Drive As The First
Drive To Boot From. Which Of The Following Is The Best Way To Do This?
Answer :
Change the boot order in CMOS
o Question 85. The Range Of Ip Address That Ics (internet Connection Sharing) Use By
Default Is 192.168.0.1 Through 192.168.0.254. What Is The Ip Address Of The Machine On
Which You Enabled The Ics Option?
Answer :
192.168.0.1
o Question 86. After Rebooting Your Windows Xp Professional Computer, Your Monitor
Shows A Blank Blue Screen. You Remember That A Video Driver Was Just Installed. Which Is The
Best Way To Recover From This?
Answer :
Reboot and press F8. From the advanced option menu select the “Last Known Good Configuration”
option.
o Question 87. If You Need To Dual Boot A Computer With Windows Xp ( Professional)
And Windows (me) And Allow All Partitions To Be Accessible From Both Operating Systems,
Which File System Should Be Used When Creating The Partitions?
Answer :
FAT32
o Question 88. What Is The Difference Between The Disk Defragmenter Tool In Win Xp
& Win 2000?
Answer :
None.
o Question 89. Imagine You Are A Desktop Support Technician. One Of Your
Customers Has Just Installed A New Printer By Himself. The Customer Later Called And Said
That Whenever He Tried To Print, The Printer Only Prints Some Garbled Text. Surprisingly, Prints
The Test Page Prints Normally. What Do You Think Is The Problem?
Answer :
The customer installed the wrong printer driver.
o Question 90. If You Turn On Your Computer And You Get The Message: "non-system
Disk Or Disk Error, Replace And Press Any Key When Ready", What Do You Think The Problem Is
Likely Due To?
Answer :
A non-bootable floppy disk is in the floppy-disk drive and should be removed.
o Question 91. You Start Up Your Computer And Get A Message Which Says "keyboard
Error", What Might Be The Cause Of This Error?
Answer :
Either the keyboard is not connected to the PC or it is not working.
o Question 92. If You Turn On A Pc And The Boot-up Process Halts, Giving You The
Message: C:/system32/config File Missing Or Corrupt, How Would You Fix It?
Answer :
We can either repair the Windows registry hives or just repair the Windows installation using the
Windows installation disc.
o Question 93. If You Get An Error Message " Hall.dll Missing Or Corrupt" Which File(s)
Do You Think Is Causing The Problem?
Answer :
The error is being caused by corrupt a NTLDR or BOOT.INI file.
o Question 94. If You Are Unable To Access And Browse The Internet When You Have
The Norton 360 Firewall Turned On, But Able To Do So When It Is Turned Off, What Do You Think
You Should Do To Fix This Issue?
Answer :
This issue can be resolved by configuring the Norton 360 firewall to allow access to Internet
Explorer. (By creating an exception in Norton 360 for Internet Explorer.)
o Question 95. If You Are Unable To Install Windows Vista Home Premium On A
Computer With A 1 Ghz Processor, 512 Mb Ram, 500 Gb Hdd What Do You Think Can Fix This
Issue?
Answer :
This issue can be solved by adding more RAM. We should have at least 1GB of RAM. (Remember,
the more memory you add, the more it helps your computer function effectively.
o Question 96. Which Windows Utility Helps To Clean Boot Your Pc?
Answer :
The Windows MSCONFIG utility can be used to Clean Boot a PC.
o Question 97. If You See A "?" Next To Any Component In The Windows Device
Manager, What Does It Mean?
Answer :
The ‘?’ in Device Manager means that the device is not properly installed. It could also mean that
the driver for a device is not installed.
o Question 98. What Is The Name Of The Executable File For Windows System
Restore?
Answer :
The name of the executable file for Windows System Restore is called “Rstrui.exe”. However, if you
have to type it in the “Run” box, it is advisable to use the full path for the file, which is
“C:windowssystem32restorerstrui.exe”.
o Question 99. What Do You Think The Acronym Uac Stands For?
Answer :
The acronym UAC stands for “User Account Control” (a Windows Vista feature.)
o Question 100. How Do You Boot In The Recovery Console?
Answer :
We can boot up to the Recovery Console by using the windows XP CD to start up the computer and
select then select the option “press R to repair the Windows XP Installation”.
o Question 101. You Shared Some Files On Your Computer. Your Friend Tried To
Access The Files You Shared But Ws Unable To Do So. He Kept Getting The Error "the Network
Path Was Not Found". What Do You Think Is The Problem?
Answer :
This could mean that both the computers are not on the same network. You can put them on the
same network by running the network setup wizard on both the computers.
o Question 102. If You Are Not Able To View Your Cd-rom Drive In "my Computer",
What Would You Do To Fix It?
Answer :
This issue can be fixed by editing the Windows Registry and deleting the upper and lower filter
keys. (Caution: Always remember to backup the registry before attempting to edit it.)
o Question 103. What Would You Do If Your Computer Keeps Booting Into Safe Mode
All The Time? There Are No Error Messages?
Answer :
In this situation, we can check if the “/SAFEBOOT” option is not checked in MSConfig. We also
need to make sure that the “Normal Startup” option is selected. Another thing we can do is to start
up the computer to the Last Known Good Configuration (LKGC), from the Windows Advanced Boot
Menu options.
o Question 104. What Would You Do If You Keep Getting The Error Message "usb
Device Not Recognized" When You Connect Any Usb Device To Your Computer?
Answer :
You get this error if either the USB drivers are not installed or the USB port(s) are not working
properly.
o Question 105. If There Is No Audio From Your Computer After You Have Downloaded
Some Updates For Your Windows Xp Operating System From The Microsoft Website, What Do
You Think Could Be The Problem?
Answer :
Check if the Windows Audio Service is disabled and if it is, enable it to fix the issue.
o Question 106. How Will You Enable Packet Filtering When Your Computer Is
Connected To The Internet Using A Dsl Connection?
Answer :
You can enable packet filtering in a Windows XP computer from the Advanced TCP/IP properties.
Alternatively, you can also configure the Windows Firewall.
o Question 107. After Upgrading To Windows Xp Professional From Windows 98, The
Computer Has Really Slowed Down. The Windows, Menus And Other Options Take A Long Time
To Open. What Can You Do To Make Them Open Up Faster?
Answer :
Select the “Adjust for best performance” option in the advanced system properties.
o Question 108. Which Command Would You Use In The Recovery Console To Retrieve
A Compressed File From The Hard-disk Drive?
Answer :
The command to be used here is: Expand
o Question 109. Which Command(s) Would You Use To Get A List Of All Microsoft
Signed Drivers On Your Computer?
Answer :
Type winmsd or msinfo32 in the command prompt, expand Software Environment and then select
“Signed drivers“.
o Question 110. When Would You Normally Perform A Clean Install Of Windows Xp?
Provide Any Two Circumstances?
Answer :
A “Clean” installation of Windows XP can be done either when the current installation has to be
completely removed and replaced or when there is no Operating System (OS) installed in the
computer.
o Question 111. Frequently, Users In Your Office Leave Floppy Disks In Drives. This
Causes Problems When Users Attempt To Boot With Floppies Still In Drive And Results In A
Support Request. You Want To Change The Computer From Seeking The A: Drive As The First
Drive To Boot From?
Answer :
Change the boot order in CMOS.
o Question 112. What Extra Features Does The Disk Defragmenter Tool Have In Win Xp
That The Win 2000 Version Lacks?
Answer :
A compression-option.
o Question 113. Which Of The Email Clients Support A Web Based Email Account?
Answer :
Windows Live Mail
o Question 114. What Does A "?" Signify In The Device Manager?
Answer :
Device not installed.
o Question 115. How Do You Get To The Recovery Console With Windows Xp?
Answer :
Boot to the Windows XP CD> Press R for repair through Recovery Console
o Question 116. What Does Scandisk Do?
Answer :
Scans and Repairs errors on your computer drives
o Question 117. Which Key In Windows Xp Would You Use To Boot The Computer To
Access The Windows Advanced Options Menu?
Answer :
F8
o Question 118. If You Upgrade To Windows Xp Professional From Windows Xp Home
And The Computer Does Not Function Properly. How Would You Remove Windows Xp
Professional From The Computer?
Answer :
Uninstall it from the Add/Remove Programs
o Question 119. You Need To Prevent Some Program From Starting Up At Boot. How
Will You Accomplish The Task On A Windows Xp Pc?
Answer :
Msconfig -> Startup -> Uncheck unwanted programs.
o Question 120. How Will You Do A System Restore In Windows Xp From Command
Prompt?
Answer :
Run> CMD> C:windowssystem32restorerstrui.exe
o Question 121. What Should Be The First Step In Case We Get The Error "primary Hdd
Not Found"?
Answer :
Check whether HDD is detected in BIOS
o Question 122. To Install Usb Devices That Are Plug And Play Compliant Using Win
Xp?
Answer :
Just plug the device in and it will be detected automatically even without restarting the computer.
o Question 123. The Motherboard On Your Windows Xp System Is Bad And You Have It
Replaced. After Installing The New Motherboard, Your System Continuously Reboots After Post
When Loading Windows. How Do You Correct This?
Answer :
Repair the installation by booting from the CD ROM and pressing R for repair.
o Question 124. Which Are The Two Devices You Need To Connect To The Internet?
Answer :
Modem and network card.
o Question 125. How Can We Check Version Of Internet Explorer ?
Answer :
Help>about internet Explorer
o Question 126. What Is The Default Browser That Comes With Windows Xp To Browse
The Internet ?
Answer :
None of the above
o Question 127. What Does Isp Stand For ?
Answer :
Internet Service Provider
o Question 128. What Do You Understand By Html ?
Answer :
Hypertext markup language
o Question 129. What Do You Understand By Ftp ?
Answer :
File transfer protocol.
o Question 130. Net Meeting Is A ____________________ Program From Microsoft?
Answer :
Chatting and conferencing
o Question 131. When You Try To Boot The Computer, You Get The Error Message:
Non- System Disk Or Disk Error. What Is The Most Likely Cause Of This Error Message ?
Answer :
You left a non-bootable disk in the floppy drive.
o Question 132. Donna Boots Up His Computer And, After A Brief Pause, It Produces
Two Short Beeps. However The Boots Up Fine. What Is Wrong With His System ?
Answer :
Nothing is wrong . In some computers two short beeps indicate a successful POST.
o Question 133. What Is The Maximum Segment Length Of A 100base-fx Network?
Answer :
The maximum allowable length for a network segment using 100Base-FX is 412 meters. The
maximum length for the entire network is 5 kilometers.
o Question 134. What Is Mesh Topology?
Answer :
Mesh topology is a setup wherein each device is connected directly to every other device on the
network. Consequently, it requires that each device have at least two network connections.
o Question 135. What Is Ipv6?
Answer :
IPv6 , or Internet Protocol version 6, was developed to replace IPv4. At present, IPv4 is being used
to control internet traffic, but is expected to get saturated in the near future. IPv6 was designed to
overcome this limitation.
o Question 136. What Is One Basic Requirement For Establishing Vlans?
Answer :
A VLAN requires dedicated equipment on each end of the connection that allows messages
entering the Internet to be encrypted, as well as for authenticating users.
o Question 137. When It Comes To Networking, What Are Rights?
Answer :
Rights refer to the authorized permission to perform specific actions on the network. Each user on
the network can be assigned individual rights, depending on what must be allowed for that user.
o Question 138. What Protocols Fall Under The Tcp/ip Internet Layer?
Answer :
There are 4 protocols that are being managed by this layer. These are ICMP, IGMP, IP and ARP.
o Question 139. What Is The Role Of Ieee In Computer Networking?
Answer :
IEEE, or the Institute of Electrical and Electronics Engineers, is an organization composed of
engineers that issues and manages standards for electrical and electronic devices. This includes
networking devices, network interfaces, cablings and connectors.
o Question 140. What Is Sneakernet?
Answer :
Sneakernet is believed to be the earliest form of networking wherein data is physically transported
using removable media, such as disk, tapes.
o Question 141. Explain Profile In Terms Of Networking Concept?
Answer :
Profiles are the configuration settings made for each user. A profile may be created that puts a
user in a group, for example.
o Question 142. How Does Dynamic Host Configuration Protocol Aid In Network
Administration?
Answer :
Instead of having to visit each client computer to configure a static IP address, the network
administrator can apply dynamic host configuration protocol to create a pool of IP addresses
known as scopes that can be dynamically assigned to clients.
o Question 143. What Can Be Done To Fix Signal Attenuation Problems?
Answer :
A common way of dealing with such a problem is to use repeaters and hub, because it will help
regenerate the signal and therefore prevent signal loss. Checking if cables are properly terminated
is also a must.
o Question 144. When Troubleshooting Computer Network Problems, What Common
Hardware-related Problems Can Occur?
Answer :
A large percentage of a network is made up of hardware. Problems in these areas can range from
malfunctioning hard drives, broken NICs and even hardware startups. Incorrectly hardware
configuration is also one of those culprits to look into.
o Question 145. What Is One Advantage Of Mesh Topology?
Answer :
In the event that one link fails, there will always be another available. Mesh topology is actually one
of the most fault-tolerant network topology.
o Question 146. What Are The Different Technologies Involved In Establishing Wan
Links?
Answer :
Analog connections – using conventional telephone lines; Digital connections – using digital-grade
telephone lines; switched connections – using multiple sets of links between sender and receiver
to move data.
o Question 147. What Do Mean By Tunnel Mode?
Answer :
This is a mode of data exchange wherein two communicating computers do not use IPSec
themselves. Instead, the gateway that is connecting their LANs to the transit network creates a
virtual tunnel that uses the IPSec protocol to secure all communication that passes through it.
o Question 148. Explain The Importance Of Authentication?
Answer :
Authentication is the process of verifying a user’s credentials before he can log into the network. It
is normally performed using a username and password. This provides a secure means of limiting
the access from unwanted intruders on the network.
o Question 149. How Are Ip Addresses Arranged And Displayed?
Answer :
IP addresses are displayed as a series of four decimal numbers that are separated by period or
dots. Another term for this arrangement is the dotted decimal format. An example is
192.168.101.2
o Question 150. What Is The Importance Of Encryption On A Network?
Answer :
Encryption is the process of translating information into a code that is unreadable by the user. It is
then translated back or decrypted back to its normal readable format using a secret key or
password. Encryption help ensure that information that is intercepted halfway would remain
unreadable because the user has to have the correct password or key for it.
o Question 151. What Is Multicast Routing?
Answer :
Multicast routing is a targeted form of broadcasting that sends message to a selected group of
user, instead of sending it to all users on a subnet.
o Question 152. What Is Smtp?
Answer :
SMTP is short for Simple Mail Transfer Protocol. This protocol deals with all Internal mail, and
provides the necessary mail delivery services on the TCP/IP protocol stack.
o Question 153. What Is The Difference Between Csma/cd And Csma/ca?
Answer :
CSMA/CD, or Collision Detect, retransmits data frames whenever a collision occurred. CSMA/CA,
or Collision Avoidance, will first broadcast intent to send prior to data transmission.
o Question 154. What Are Some Drawbacks Of Implementing A Ring Topology?
Answer :
In case one workstation on the network suffers a malfunction, it can bring down the entire
network. Another drawback is that when there are adjustments and reconfigurations needed to be
performed on a particular part of the network, the entire network has to be temporarily brought
down as well.
o Question 155. In A Network That Contains Two Servers And Twenty Workstations,
Where Is The Best Place To Install An Anti-virus Program?
Answer :
An anti-virus program must be installed on all servers and workstations to ensure protection.
That’s because individual users can access any workstation and introduce a computer virus when
plugging in their removable hard drives or flash drives.
o Question 156. When You Move The Nic Cards From One Pc To Another Pc, Does The
Mac Address Gets Transferred As Well?
Answer :
Yes, that’s because MAC addresses are hard-wired into the NIC circuitry, not the PC. This also
means that a PC can have a different MAC address when the NIC card was replace by another one.
o Question 157. What Is The Difference Between A Straight-through And Crossover
Cable?
Answer :
A straight-through cable is used to connect computers to a switch, hub or router. A crossover
cable is used to connect two similar devices together, such as a PC to PC or Hub to hub.
o Question 158. What Is Ipconfig?
Answer :
Ipconfig is a utility program that is commonly used to identify the addresses information of a
computer on a network. It can show the physical address as well as the IP address.
o Question 159. You Need To Connect Two Computers For File Sharing. Is It Possible
To Do This Without Using A Hub Or Router?
Answer :
Yes, you can connect two computers together using only one cable. A crossover type cable can be
use in this scenario. In this setup, the data transmit pin of one cable is connected to the data
receive pin of the other cable, and vice versa.
o Question 160. What Protocols Fall Under The Application Layer Of The Tcp/ip Stack?
Answer :
The following are the protocols under TCP/IP Application layer: FTP, TFTP, Telnet and SMTP.
o Question 161. What Is The Standard Color Sequence Of A Straight-through Cable?
Answer :
orange/white, orange, green/white, blue, blue/white, green, brown/white, brown.
o Question 162. What Are The Different Network Protocols That Are Supported By
Windows Rras Services?
Answer :
There are three main network protocols supported: NetBEUI, TCP/IP, and IPX.
o Question 163. What Is The Difference Between A Hub And A Switch?
Answer :
A hub acts as a multiport repeater. However, as more and more devices connect to it, it would not
be able to efficiently manage the volume of traffic that passes through it. A switch provides a
better alternative that can improve the performance especially when high traffic volume is
expected across all ports.
o Question 164. What Advantages Does Fiber Optics Have Over Other Media?
Answer :
One major advantage of fiber optics is that is it less susceptible to electrical interference. It also
supports higher bandwidth, meaning more data can be transmitted and received. Signal degrading
is also very minimal over long distances.
o Question 165. What Is Peer To Peer?
Answer :
Peer to peer are networks that does not reply on a server. All PCs on this network act as individual
workstations.
o Question 166. What Is Icmp?
Answer :
ICMP is Internet Control Message Protocol. It provides messaging and communication for
protocols within the TCP/IP stack. This is also the protocol that manages error messages that are
used by network tools such as PING.
o Question 167. What Happens When You Use Cables Longer Than The Prescribed
Length?
Answer :
Cables that are too long would result in signal loss. This means that data transmission and
reception would be affected, because the signal degrades over length.
o Question 168. What Is The Number Of Network Ids In A Class C Network?
Answer :
For a Class C network, the number of usable Network ID bits is 21. The number of possible
network IDs is 2 raised to 21 or 2,097,152. The number of host IDs per network ID is 2 raised to 8
minus 2, or 254.
o Question 169. What Is The Proper Termination Rate For Utp Cables?
Answer :
The proper termination for unshielded twisted pair network cable is 100 ohms.
o Question 170. One Way Of Securing A Network Is Through The Use Of Passwords.
What Can Be Considered As Good Passwords?
Answer :
Good passwords are made up of not just letters, but by combining letters and numbers. A
password that combines uppercase and lowercase letters is favorable than one that uses all upper
case or all lower case letters. Passwords must be not words that can easily be guessed by
hackers, such as dates, names, favorites, etc. Longer passwords are also better than short ones.
o Question 171. What Is The Use Of A Default Gateway?
Answer :
Default gateways provide means for the local networks to connect to the external network. The
default gateway for connecting to the external network is usually the address of the external router
port.
o Question 172. What Protocol Can Be Applied When You Want To Transfer Files
Between Different Platforms, Such Between Unix Systems And Windows Servers?
Answer :
Use FTP (File Transfer Protocol) for file transfers between such different servers. This is possible
because FTP is platform independent.
o Question 173. How Can You Manage A Network Using A Router?
Answer :
Routers have built in console that lets you configure different settings, like security and data
logging. You can assign restrictions to computers, such as what resources it is allowed access, or
what particular time of the day they can browse the internet. You can even put restrictions on what
websites are not viewable across the entire network.
o Question 174. Can Wireless Mouse Carry A Virus?
Answer :
A big NO. Wireless mouse is nothing but a junk of hardware.It cannot be hacked or anything.If you
suspect that pointer on the screen is not working properly or moving on its own its probably due to
virus on your harddisk whose source is not WIRELESS MOUSE.
Here are some examples:

1. What is your favourite routing protocol?


2. Which internal routing protocol would you us if you needed to route between
Cisco and non-Cisco equipment?
3. Explain what an Ether-Channel is?
4. What is a root bridge and why do you need to have one?
5. Do you know what it means to bridge the VPNs & where do we use it?
6. Describe what a stateful firewall is?

1) What is a Link?

A link refers to the connectivity between two devices. It includes the type of
cables and protocols used in order for one device to be able to communicate
with the other.

2) What are the layers of the OSI reference model?

There are 7 OSI layers: Physical Layer, Data Link Layer, Network Layer,
Transport Layer, Session Layer, Presentation Layer and Application Layer.

3) What is backbone network?

A backbone network is a centralized infrastructure that is designed to


distribute different routes and data to various networks. It also handles
management of bandwidth and various channels.
4) What is a LAN?

LAN is short for Local Area Network. It refers to the connection between
computers and other network devices that are located within a small physical
location.

5) What is a node?

A node refers to a point or joint where a connection takes place. It can be


computer or device that is part of a network. Two or more nodes are needed in
order to form a network connection.

6) What are routers?

Routers can connect two or more network segments. These are intelligent
network devices that store information in its routing table such as paths, hops
and bottlenecks. With this info, they are able to determine the best path for
data transfer. Routers operate at the OSI Network Layer.

7) What is point to point link?

It refers to a direct connection between two computers on a network. A point


to point connection does not need any other network devices other than
connecting a cable to the NIC cards of both computers.

8) What is anonymous FTP?

Anonymous FTP is a way of granting user access to files in public servers.


Users that are allowed access to data in these servers do not need to identify
themselves, but instead log in as an anonymous guest.

9) What is subnet mask?

A subnet mask is combined with an IP address in order to identify two parts:


the extended network address and the host address. Like an IP address, a
subnet mask is made up of 32 bits.
10) What is the maximum length allowed for a UTP cable?

A single segment of UTP cable has an allowable length of 90 to 100 meters.


This limitation can be overcome by using repeaters and switches.

11) What is data encapsulation?

Data encapsulation is the process of breaking down information into smaller


manageable chunks before it is transmitted across the network. It is also in this
process that the source and destination addresses are attached into the
headers, along with parity checks.

12) Describe Network Topology

Network Topology refers to the layout of a computer network. It shows how


devices and cables are physically laid out, as well as how they connect to one
another.

13) What is VPN?

VPN means Virtual Private Network, a technology that allows a secure tunnel to
be created across a network such as the Internet. For example, VPNs allow you
to establish a secure dial-up connection to a remote server.

14) Briefly describe NAT.

NAT is Network Address Translation. This is a protocol that provides a way for
multiple computers on a common network to share single connection to the
Internet.

15) What is the job of the Network Layer under the OSI reference
model?

The Network layer is responsible for data routing, packet switching and control
of network congestion. Routers operate under this layer.

16) How does a network topology affect your decision in setting up a


network?

Network topology dictates what media you must use to interconnect devices. It
also serves as basis on what materials, connector and terminations that is
applicable for the setup.

17) What is RIP?

RIP, short for Routing Information Protocol is used by routers to send data from
one network to another. It efficiently manages routing data by broadcasting its
routing table to all other routers within the network. It determines the network
distance in units of hops.

18) What are different ways of securing a computer network?

There are several ways to do this. Install reliable and updated anti-virus
program on all computers. Make sure firewalls are setup and configured
properly. User authentication will also help a lot. All of these combined would
make a highly secured network.

19) What is NIC?

NIC is short for Network Interface Card. This is a peripheral card that is
attached to a PC in order to connect to a network. Every NIC has its own MAC
address that identifies the PC on the network.

20) What is WAN?

WAN stands for Wide Area Network. It is an interconnection of computers and


devices that are geographically dispersed. It connects networks that are
located in different regions and countries.

21) What is the importance of the OSI Physical Layer?

The physical layer does the conversion from data bits to electrical signal, and
vice versa. This is where network devices and cable types are considered and
setup.

22) How many layers are there under TCP/IP?

There are four layers: the Network Layer, Internet Layer, Transport Layer and
Application Layer.

23) What are proxy servers and how do they protect computer
networks?

Proxy servers primarily prevent external users who identifying the IP addresses
of an internal network. Without knowledge of the correct IP address, even the
physical location of the network cannot be identified. Proxy servers can make a
network virtually invisible to external users.

24) What is the function of the OSI Session Layer?

This layer provides the protocols and means for two devices on the network to
communicate with each other by holding a session. This includes setting up the
session, managing information exchange during the session, and tear-down
process upon termination of the session.
25) What is the importance of implementing a Fault Tolerance
System? Are there limitations?

A fault tolerance system ensures continuous data availability. This is done by


eliminating a single point of failure. However, this type of system would not be
able to protect data in some cases, such as in accidental deletions.

26) What does 10Base-T mean?

The 10 refers to the data transfer rate, in this case is 10Mbps. The word Base
refers to base band, as oppose to broad band. T means twisted pair, which is
the cable used for that network.

27) What is a private IP address?

Private IP addresses are assigned for use on intranets. These addresses are
used for internal networks and are not routable on external public networks.
These ensures that no conflicts are present among internal networks while at
the same time the same range of private IP addresses are reusable for multiple
intranets since they do not "see" each other.

28) What is NOS?

NOS, or Network Operating System, is specialized software whose main task is


to provide network connectivity to a computer in order for it to be able to
communicate with other computers and connected devices.

29) What is DoS?

DoS, or Denial-of-Service attack, is an attempt to prevent users from being


able to access the internet or any other network services. Such attacks may
come in different forms and are done by a group of perpetuators. One common
method of doing this is to overload the system server so it cannot anymore
process legitimate traffic and will be forced to reset.

30) What is OSI and what role does it play in computer networks?

OSI (Open Systems Interconnect) serves as a reference model for data


communication. It is made up of 7 layers, with each layer defining a particular
aspect on how network devices connect and communicate with one another.
One layer may deal with the physical media used, while another layer dictates
how data is actually transmitted across the network.

31) What is the purpose of cables being shielded and having twisted
pairs?
The main purpose of this is to prevent crosstalk. Crosstalks are
electromagnetic interferences or noise that can affect data being transmitted
across cables.

32) What is the advantage of address sharing?

By using address translation instead of routing, address sharing provides an


inherent security benefit. That's because host PCs on the Internet can only see
the public IP address of the external interface on the computer that provides
address translation and not the private IP addresses on the internal network.

33) What are MAC addresses?

MAC, or Media Access Control, uniquely identifies a device on the network. It is


also known as physical address or Ethernet address. A MAC address is made
up of 6-byte parts.

34) What is the equivalent layer or layers of the TCP/IP Application


layer in terms of OSI reference model?

The TCP/IP Application layer actually has three counterparts on the OSI model:
the Session layer, Presentation Layer and Application Layer.

35) How can you identify the IP class of a given IP address?

By looking at the first octet of any given IP address, you can identify whether
it's Class A, B or C. If the first octet begins with a 0 bit, that address is Class A.
If it begins with bits 10 then that address is a Class B address. If it begins with
110, then it's a Class C network.

36) What is the main purpose of OSPF?

OSPF, or Open Shortest Path First, is a link-state routing protocol that uses
routing tables to determine the best possible path for data exchange.

37) What are firewalls?

Firewalls serve to protect an internal network from external attacks. These


external threats can be hackers who want to steal data or computer viruses
that can wipe out data in an instant. It also prevents other users from external
networks from gaining access to the private network.

38) Describe star topology

Star topology consists of a central hub that connects to nodes. This is one of
the easiest to setup and maintain.
39) What are gateways?

Gateways provide connectivity between two or more network segments. It is


usually a computer that runs the gateway software and provides translation
services. This translation is a key in allowing different systems to communicate
on the network.

40) What is the disadvantage of a star topology?

One major disadvantage of star topology is that once the central hub or switch
get damaged, the entire network becomes unusable.

41) What is SLIP?

SLIP, or Serial Line Interface Protocol, is actually an old protocol developed


during the early UNIX days. This is one of the protocols that are used for
remote access.

42) Give some examples of private network addresses.

10.0.0.0 with a subnet mask of 255.0.0.0172.16.0.0 with subnet mask of


255.240.0.0192.168.0.0 with subnet mask of 255.255.0.0

43) What is tracert?

Tracert is a Windows utility program that can used to trace the route taken by
data from the router to the destination network. It also shows the number of
hops taken during the entire transmission route.

44) What are the functions of a network administrator?

A network administrator has many responsibilities that can be summarize into


3 key functions: installation of a network, configuration of network settings,
and maintenance/troubleshooting of networks.

45) Describe at one disadvantage of a peer to peer network.

When you are accessing the resources that are shared by one of the
workstations on the network, that workstation takes a performance hit.

46) What is Hybrid Network?

A hybrid network is a network setup that makes use of both client-server and
peer-to-peer architecture.

47) What is DHCP?


DHCP is short for Dynamic Host Configuration Protocol. Its main task is to
automatically assign an IP address to devices across the network. It first
checks for the next available address not yet taken by any device, then
assigns this to a network device.

48) What is the main job of the ARP?

The main task of ARP or Address Resolution Protocol is to map a known IP


address to a MAC layer address.

49) What is TCP/IP?

TCP/IP is short for Transmission Control Protocol / Internet Protocol. This is a


set of protocol layers that is designed to make data exchange possible on
different types of computer networks, also known as heterogeneous network.

50) How can you manage a network using a router?

Routers have built in console that lets you configure different settings, like
security and data logging. You can assign restrictions to computers, such as
what resources it is allowed access, or what particular time of the day they can
browse the internet. You can even put restrictions on what websites are not
viewable across the entire network.

51) What protocol can be applied when you want to transfer files
between different platforms, such between UNIX systems and
Windows servers?

Use FTP (File Transfer Protocol) for file transfers between such different
servers. This is possible because FTP is platform independent.

52) What is the use of a default gateway?

Default gateways provide means for the local networks to connect to the
external network. The default gateway for connecting to the external network
is usually the address of the external router port.

53) One way of securing a network is through the use of passwords.


What can be considered as good passwords?

Good passwords are made up of not just letters, but by combining letters and
numbers. A password that combines uppercase and lowercase letters is
favorable than one that uses all upper case or all lower case letters. Passwords
must be not words that can easily be guessed by hackers, such as dates,
names, favorites, etc. Longer passwords are also better than short ones.

54) What is the proper termination rate for UTP cables?


The proper termination for unshielded twisted pair network cable is 100 ohms.

55) What is netstat?

Netstat is a command line utility program. It provides useful information about


the current TCP/IP settings of a connection.

56) What is the number of network IDs in a Class C network?

For a Class C network, the number of usable Network ID bits is 21. The number
of possible network IDs is 2 raised to 21 or 2,097,152. The number of host IDs
per network ID is 2 raised to 8 minus 2, or 254.

57) What happens when you use cables longer than the prescribed
length?

Cables that are too long would result in signal loss. This means that data
transmission and reception would be affected, because the signal degrades
over length.

58) What common software problems can lead to network defects?

Software related problems can be any or a combination of the following:

 client server problems


 application conflicts
 error in configuration
 protocol mismatch
 security issues
 user policy and rights issues

59) What is ICMP?

ICMP is Internet Control Message Protocol. It provides messaging and


communication for protocols within the TCP/IP stack. This is also the protocol
that manages error messages that are used by network tools such as PING.

60) What is Ping?

Ping is a utility program that allows you to check connectivity between network
devices on the network. You can ping a device by using its IP address or device
name, such as a computer name.

61) What is peer to peer?

Peer to peer are networks that does not reply on a server. All PCs on this
network act as individual workstations.
62) What is DNS?

DNS is Domain Name System. The main function of this network service is to
provide host names to TCP/IP address resolution.

63) What advantages does fiber optics have over other media?

One major advantage of fiber optics is that is it less susceptible to electrical


interference. It also supports higher bandwidth, meaning more data can be
transmitted and received. Signal degrading is also very minimal over long
distances.

64) What is the difference between a hub and a switch?

A hub acts as a multiport repeater. However, as more and more devices


connect to it, it would not be able to efficiently manage the volume of traffic
that passes through it. A switch provides a better alternative that can improve
the performance especially when high traffic volume is expected across all
ports.

65) What are the different network protocols that are supported by
Windows RRAS services?

There are three main network protocols supported: NetBEUI, TCP/IP, and IPX.

66) What are the maximum networks and hosts in a class A, B and C
network?

For Class A, there are 126 possible networks and 16,777,214 hostsFor Class B,
there are 16,384 possible networks and 65,534 hostsFor Class C, there are
2,097,152 possible networks and 254 hosts

67) What is the standard color sequence of a straight-through cable?

orange/white, orange, green/white, blue, blue/white, green, brown/white,


brown.

68) What protocols fall under the Application layer of the TCP/IP
stack?

The following are the protocols under TCP/IP Application layer: FTP, TFTP,
Telnet and SMTP.

69) You need to connect two computers for file sharing. Is it possible
to do this without using a hub or router?
Yes, you can connect two computers together using only one cable. A
crossover type cable can be use in this scenario. In this setup, the data
transmit pin of one cable is connected to the data receive pin of the other
cable, and vice versa.

70) What is ipconfig?

Ipconfig is a utility program that is commonly used to identify the addresses


information of a computer on a network. It can show the physical address as
well as the IP address.

71) What is the difference between a straight-through and crossover


cable?

A straight-through cable is used to connect computers to a switch, hub or


router. A crossover cable is used to connect two similar devices together, such
as a PC to PC or Hub to hub.

72) What is client/server?

Client/server is a type of network wherein one or more computers act as


servers. Servers provide a centralized repository of resources such as printers
and files. Clients refers to workstation that access the server.

73) Describe networking.

Networking refers to the inter connection between computers and peripherals


for data communication. Networking can be done using wired cabling or
through wireless link.

74) When you move the NIC cards from one PC to another PC, does
the MAC address gets transferred as well?

Yes, that's because MAC addresses are hard-wired into the NIC circuitry, not
the PC. This also means that a PC can have a different MAC address when the
NIC card was replace by another one.

75) Explain clustering support

Clustering support refers to the ability of a network operating system to


connect multiple servers in a fault-tolerant group. The main purpose of this is
the in the event that one server fails, all processing will continue on with the
next server in the cluster.

76) In a network that contains two servers and twenty workstations,


where is the best place to install an Anti-virus program?
An anti-virus program must be installed on all servers and workstations to
ensure protection. That's because individual users can access any workstation
and introduce a computer virus when plugging in their removable hard drives
or flash drives.

77) Describe Ethernet.

Ethernet is one of the popular networking technologies used these days. It was
developed during the early 1970s and is based on specifications as stated in
the IEEE. Ethernet is used in local area networks.

78) What are some drawbacks of implementing a ring topology?

In case one workstation on the network suffers a malfunction, it can bring


down the entire network. Another drawback is that when there are
adjustments and reconfigurations needed to be performed on a particular part
of the network, the entire network has to be temporarily brought down as well.

79) What is the difference between CSMA/CD and CSMA/CA?

CSMA/CD, or Collision Detect, retransmits data frames whenever a collision


occurred. CSMA/CA, or Collision Avoidance, will first broadcast intent to send
prior to data transmission.

80) What is SMTP?

SMTP is short for Simple Mail Transfer Protocol. This protocol deals with all
Internal mail, and provides the necessary mail delivery services on the TCP/IP
protocol stack.

81) What is multicast routing?

Multicast routing is a targeted form of broadcasting that sends message to a


selected group of user, instead of sending it to all users on a subnet.

82) What is the importance of Encryption on a network?

Encryption is the process of translating information into a code that is


unreadable by the user. It is then translated back or decrypted back to its
normal readable format using a secret key or password. Encryption help
ensure that information that is intercepted halfway would remain unreadable
because the user has to have the correct password or key for it.

83) How are IP addresses arranged and displayed?


IP addresses are displayed as a series of four decimal numbers that are
separated by period or dots. Another term for this arrangement is the dotted
decimal format. An example is 192.168.101.2

84) Explain the importance of authentication.

Authentication is the process of verifying a user's credentials before he can log


into the network. It is normally performed using a username and password.
This provides a secure means of limiting the access from unwanted intruders
on the network.

85) What do mean by tunnel mode?

This is a mode of data exchange wherein two communicating computers do


not use IPSec themselves. Instead, the gateway that is connecting their LANs
to the transit network creates a virtual tunnel that uses the IPSec protocol to
secure all communication that passes through it.

86) What are the different technologies involved in establishing WAN


links?

Analog connections - using conventional telephone lines; Digital connections -


using digital-grade telephone lines; switched connections - using multiple sets
of links between sender and receiver to move data.

87) What is one advantage of mesh topology?

In the event that one link fails, there will always be another available. Mesh
topology is actually one of the most fault-tolerant network topology.

88) When troubleshooting computer network problems, what common


hardware-related problems can occur?

A large percentage of a network is made up of hardware. Problems in these


areas can range from malfunctioning hard drives, broken NICs and even
hardware startups. Incorrectly hardware configuration is also one of those
culprits to look into.

89) What can be done to fix signal attenuation problems?

A common way of dealing with such a problem is to use repeaters and hub,
because it will help regenerate the signal and therefore prevent signal loss.
Checking if cables are properly terminated is also a must.

90) How does dynamic host configuration protocol aid in network


administration?
Instead of having to visit each client computer to configure a static IP address,
the network administrator can apply dynamic host configuration protocol to
create a pool of IP addresses known as scopes that can be dynamically
assigned to clients.

91) Explain profile in terms of networking concept?

Profiles are the configuration settings made for each user. A profile may be
created that puts a user in a group, for example.

92) What is sneakernet?

Sneakernet is believed to be the earliest form of networking wherein data is


physically transported using removable media, such as disk, tapes.

93) What is the role of IEEE in computer networking?

IEEE, or the Institute of Electrical and Electronics Engineers, is an organization


composed of engineers that issues and manages standards for electrical and
electronic devices. This includes networking devices, network interfaces,
cablings and connectors.

94) What protocols fall under the TCP/IP Internet Layer?

There are 4 protocols that are being managed by this layer. These are ICMP,
IGMP, IP and ARP.

95) When it comes to networking, what are rights?

Rights refer to the authorized permission to perform specific actions on the


network. Each user on the network can be assigned individual rights,
depending on what must be allowed for that user.

96) What is one basic requirement for establishing VLANs?

A VLAN is required because at switch level there is only one broadcast domain,
it means whenever new user is connected to switch this information is spread
throughout the network. VLAN on switch helps to create separate broadcast
domain at switch level. It is used for security purpose.

97) What is IPv6?

IPv6 , or Internet Protocol version 6, was developed to replace IPv4. At present,


IPv4 is being used to control internet traffic, butis expected to get saturated in
the near future. IPv6 was designed to overcome this limitation.

98) What is RSA algorithm?


RSA is short for Rivest-Shamir-Adleman algorithm. It is the most commonly
used public key encryption algorithm in use today.

100) what is the maximum segment length of a 100Base-FX network?

The maximum allowable length for a network segment using 100Base-FX is


412 meters. The maximum length for the entire network is 5 kilometers.

You might also like