Network Engineer Interview - Questions & Answers
Question: Tell us something about Cisco PPDIOO Life-cycle approach?
ANS: PPDIOO stands for Prepare, Plan, Design, Implement, Operate, and
Optimize. The PPDIOO life-cycle approach is somewhat similar to the IT
Information Library (ITIL) framework in that both provide a network service’s
life-cycle framework to help ensure that when the project is implemented the
entire company will have everything it needs to operate and maintain the new
network. The Cisco PPDIOO model encompasses all steps, from network vision to
optimization. Figure 1-1 below is an illustration of the different phases of
the PPDIOO life-cycle approach.
Question: What are typical virus sources and how do you prevent virus
attacks?
ANS: Source of Computer virus:
Downloadable
Programs, Cracked Software, Email Attachments, Internet and Booting from CD
Preventing Virus attack: Install
quality antivirus, Install real-time anti-spyware protection, Keep anti-malware applications
current, Perform daily scans, Disable auto run, Disable image previews in
Outlook, Don't click on email links or attachments, Surf smart, Use a
hardware-based firewall and Deploy DNS protection
Question. What are some of the things you need to take into consideration
when planning an upgrade from one network operating system to another?
ANS. This is the mother of all planning activities because it will affect so many resources. The key here is testing and backups and that’s what the interviewer wants to hear. Other considerations include:
ANS. This is the mother of all planning activities because it will affect so many resources. The key here is testing and backups and that’s what the interviewer wants to hear. Other considerations include:
·
Network documentation
·
Ensuring that your hardware meets the minimum hardware
requirements for the new operating system
·
Creating a test network for testing the compatibility of
applications, hardware, and drivers with the new operating system
·
Gathering all updated drivers and patches/service packs required
for upgrade compatibility
·
Identifying workflow issues before converting
·
Separating workstation conversions from server conversions
·
Ensuring you have backups of data and the servers so that you
can revert back
Network addressing scheme
Q. How would you ensure that your servers are secure?
ANS. Security always begins at the physical level—it makes little difference that you’ve provided all the security the operating system and software can provide if someone can walk away with the box or the portable hard drive. The next step is to ensure you have the latest service packs for the operating system and applications running on the server.
ANS. Security always begins at the physical level—it makes little difference that you’ve provided all the security the operating system and software can provide if someone can walk away with the box or the portable hard drive. The next step is to ensure you have the latest service packs for the operating system and applications running on the server.
Question. A user contacts you and reports that their Windows 2000
workstation is having trouble connecting to the Web. You run the ipconfig command on the
computer and you find that the computer is not
referencing the correct primary DNS server. What must you do to remedy this?
ANS. Using this
question, the interviewer can assess your routing troubleshooting skills, an
essential part of network administration. In this case, you would want to check
the primary DNS setting in the IP configuration of the computer. If ipconfig
shows a setting for the default DNS server other than what you want, this means
the computer’s IP configuration is incorrect. Therefore, the Windows 2000
client computer needs to be reconfigured.
Question. What is
Service Level Agreement?
ANS: A service level agreement (SLA) is a contract between a
service provider (either internal or external) and the end user that defines
the level of service expected from the service provider. SLAs are output-based in that their purpose
is specifically to define what the customer will receive.
Question. Which
three commands can be used to check LAN connectivity problems on a router?
ANS:
1. show interfaces
2. show ip route
3. ping
Qustion What is SMTP & SNM?
ANS: SMTP: SMTP stands for Simple Mail Transfer Protocol.
It deals with the methods, to send and receive email from one client to another
over the internet. It has a wide breadth that covers the mail servers and the
applications that are used to send/receive emails. When you compose a mail and
send it, the SMTP client communicates with the mail server and verifies the
information about the email and the destination. Then the SMTP server sends
your mail to the destination, and their SMTP client handles the receiving
process in the same manner.
SNMP: SNMP stands for Simple Network Management
Protocol. As the name suggests, it manages various devices attached to a TCP /
IP network. There are three tiers in this protocol. The SNMP Manager, SNMP
Agent and the Managed Device. SNMP Manager is essentially a controller while
SNMP Agent acts as an interface between the devices and the network. The
Managed Device is the device that is controlled by the above two.
SNMP and SMTP are two standards that work together in harmony
to achieve two different tasks. They work in such a way that one can control
SMTP servers and MTAs through SNMP Managers. Further, SNMP Managers are capable
of sending alerts through SMTP mail servers.
Question. How does
Frame Relay Work?
ANS: Frame relay is a packet-switching telecommunication
service designed for cost-efficient data transmission for intermittent traffic
between local area networks (LANs) and between endpoints in wide area networks
(WANs).
Question. What is ATM technology?
ANS: ATM is a connection-oriented, unreliable (does not
acknowledge the receipt of cells sent), virtual circuit packet switching
technology. The cost of maintaining separate, specialized networks for
computer, voice, and video is high. To reduce networking costs, ATM enables
integration of all of these services on a single network and the combination of
existing networks into a single infrastructure. In particular, Windows
operating systems provide rich connectivity using Asynchronous Transfer Mode
(ATM) while maintaining support for legacy systems.
Question. How does the DSL work?
ANS: When you connect to the Internet, you might connect
through a regular modem, through a local-area network connection in your
office, through a cable modem or through a digital subscriber line (DSL)
connection. DSL is a very high-speed connection that uses the same wires as a
regular telephone line.
Question. Do you know about MPLS?
ANS: (MPLS is that it’s a technique, not a service) - Multiprotocol
Label Switching (MPLS) is a type of data-carrying technique for high-performance
telecommunications networks that directs data from one network node to the next
based on short path labels rather than long network addresses, avoiding complex
lookups in a routing table. MPLS operates at a layer that is generally
considered to lie between traditional definitions of OSI Layer 2 (data link
layer) and Layer 3 (network layer), and thus is often referred to as a layer
2.5 protocol.
Question. How does
MPLS work?
ANS: In MPLS, packets are directed through the network based
on an assigned label. The label is associated with a predetermined path through
the network, which allows a higher level of control than in packet-switched
networks. MPLS routing allow differing Qos characteristics and priorities to be
assigned to particular data flows, and operators can predetermine fallback
paths in the event that traffic must be rerouted.
Question. What is VRF?
ANS: Virtual routing and
forwarding (VRF) is a technology included in IP (Internet Protocol) network
routers that allows multiple instances of a routing table to exist in a router
and work simultaneously. This increases functionality by allowing network paths
to be segmented without using multiple devices. Because traffic is
automatically segregated, VRF also increases network security and can eliminate
the need for encryption and authentication. Internet service providers (ISPs)
often take advantage of VRF to create separate virtual private networks (VPNs)
for customers; thus the technology is also referred to as VPN routing and
forwarding.
Question. What is
MPLS VPN?
ANS: Multiprotocol Label
Switching (MPLS) is a standards-based technology used to speed up the delivery
of network packets over multiple protocols – such as the Internet Protocol
(IP), Asynchronous Transport Mode (ATM) and frame relay network protocols.
A virtual private network
(VPN) uses shared public telecom infrastructure, such as the Internet, to
provide secure access to remote offices and users in a cheaper way than an
owned or leased line. VPNs are secure because they use tunneling protocols and
procedures such as Layer Two Tunneling Protocol (L2TP)
Question. What is
difference between Route Distinguisher and Route Target.
ANS: The Route-Distinguisher (RD) & Route-Target (RT) are two
different concepts that are both used in an MPLS VPN. The RD is used to keep
all prefixes in the BGP table unique, and the RT is used to transfer routes
between VRF’s/VPNS.
Question. What is
VPLS
ANS: Virtual Private LAN Service (VPLS) is a way to provide
Ethernet-based multipoint to multipoint communication over IP or MPLS networks.
It allows geographically dispersed sites to share an Ethernet broadcast domain
by connecting sites through pseudo-wires. The term 'sites' includes
multiplicities of both servers and clients. The technologies that can be used
as pseudo-wire can be Ethernet over MPLS, L2TPv3 or even GRE. There are two
IETF standards track RFCs (RFC 4761 and RFC 4762) describing VPLS
establishment.
Post a Comment