You are on page 1of 13

Job Interview Presentation

Your Name:
Mary Joy Williams
The interview will focus on networking
fundamentals and consist of 10 questions.

Networking Devices Protocols


United States Cyber Command uses state-of-the art technology. However, the
fundamentals are as important as any innovative technology. Given that, what are
the three basic local area network (LAN) topologies called?

Bus

Ring

Star
The national mission teams operate on all types of networks. To
defend a network, you must first understand the network design on which
you are operating. Provide a brief description of each of the following
network topologies:
Topology​ Description​

bus​ E​ ach device in the network is connected by one cable to each


other

star​ E​ ach network component is physically connected to a central


node

ring​ ​device connections create a circular data path

mesh​ Network setup where each computer and network device is


interconnected with one another.

hybrid​ ​Uses two or more differing network topologies


Our employees must have a theoretical and applicable understanding
of how networking works. Name each layer of the OSI model. Provide the
layer number and name from top to bottom.

Layer​ OSI Layer Name​

7 ​Application Layer

6 ​Presentation Layer

5 Session Layer

4 ​Transport Layer

3 ​Network Layer

​2 ​Data Link Layer

1 Physical Layer
Briefly describe each function of the OSI model layer.
Provide the layer name and the function in your response.

Layer​ Function​

​Application Layer ​ uman-Computer interaction layer, where application can access


H
the network services

​Presentation Layer E​ nsure data is in a usable format and where data encryption
occurs

Session Layer ​ aintain connections and is responsible for controlling ports and
M
sessions

​Transport Layer ​Transmits data using transmission protocol

​Network Layer ​Decide which path data will take

​Data Link Layer ​Define the format of data in the network

Physical Layer ​Transmits raw bit stream over the physical medium
United States Cyber Command requires an internet service provider (ISP) to
connect to the internet. What is the point at which the operational control of
ownership changes from the ISP to United States Cyber Command?

Demarcation Point
Our teams operate and encounter all types of devices.
Provide a brief description of each of the following common network
devices:

Networking Device​ Description​

hub​ ​Device that allows multiple computers to


communicate with each other over a network.

router​ ​ llows information to pass between two or more packet switched


A
computer networks

NIC​ ​ circuit board or card that is installed in a computer so that it can


A
be connected to a network

switch​ ​ evice that receives incoming data packets and


D
redirects them to their destination on a local area
network
The national mission teams require implementation of
common protocols. Provide the port that each of the following
protocols use:

Protocol​ Port​

HTTP​ ​80

SMTP​ 587​

SNMP​ ​161

DNS​ ​53

HTTPS​ ​443

DHCP​ ​67

TELNET​ ​3389
Provide the IP range for each network class:

Class A: 1.0.0.0 to 127.0.0.0

Class B: 128.0.0.0 to 191.255.0.0

Class C: 192.0.0.0 to 223.255.255.0


Provide the default subnet mask to the class of network:

Class​ Format​ Default Subnet Mask​

A​ network.host.host.host​ 255.0.0.0​

B​ network.network.host.host​ ​255.255.0.0

C​ network.network.network.host​ ​255.255.255.0
Describe the purpose of an autonomous system.

• An autonomous system regulates organizations such as internet service

providers to maintain system work flow. A collection of connected internet

Protocol routing are under the control of one or more network operator

which presents a common and clear routing policy to the internet.


Thank You!

You might also like