Network Administration Flashcards

1
Q

What is a Firewall?

A

It prevents connection between two sources basically blocking incoming or outgoing traffics. It comes in two forms. Software and Hardware.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Can you explain the difference between HTTP and HTTPS protocols?

A

HTTP (HyperTextTransferProtocol) is used by majority of websites as a means of transmitting website data, and it allows for the use of hyperlinks. HTTPS is the secure version of that.

  1. HTTP uses port 80
  2. HTTPS uses port 443
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is VPN?

A

It is Virtual Private Network that allows users to create a secure connection over public networks such as the internet. For example, nowadays most company uses as more people are working from home.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are two types of IP addresses and what are they used for?

A

Public and Private IP address.
Public IP addresses are routed on the internet
Private IP address are routed only within local networks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is DNS?

A

A domain name system. It translates domain names like google.com to IP address so browsers can load those internet resources through the internet protocol.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is a default route?

A

Is a configuration of the IP that establishes a forwarding rule for packets when no specific address of a next-hop host is available from the routing table or other routing mechanism.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is DHCP and what is its used for?

A

DHCP is Dynamic Host Configuration Protocol and it is used for automatically assigning IP addresses to network devices. It reduces the errors caused due to manual allocation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is DoS?

A

Denial of Service attack is an attempt to prevent users from being able to access the Internet or any other network services.

One commons method of doing this is to overload a web server so that it can no longer process legitimate traffic.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is Network Topology?

A

It is a physical layout of the computer network and it defines how the computers, devices, cables, etc are connected to each other.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is a router?

A

It is a device that manages the flow of data to multiple connected devices. it is a network device that connects two or more network segments. it is used to transfer information from the source to the destination.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is OSI reference model and how many layers does it have?

A

OSI (Open System Interconnection) helps to understand the relationship between networks and defines the process of communication in a network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Let’s say a company is expanding its business to other countries. It wants all of its branches to remain connected to its corporate headquarters 24/7. Which network technology do you think they should use?

A

They should use a WAN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is a Poxy Server and how do they protect the computer network?

A

Devices have IP addresses and knowing the exact IP address can leave those devices exposed to an attack. Proxy servers prevents unauthorized external users from accessing those internal IP addresses. It makes the computer network virtually invisible to external users.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is meant by 127.0.0.1 and localhost?

A

127.0.0.1 is a default IP address for loopback address. Localhost is used to test applications on a local computer. Both are basically the same.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is a MAC address?

A

Is a unique address given to every network connected to hardware. IP are temporary whereas MAC addresses are permanent.

It is a 48-bit serial number

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is a data encapsulation?

A

also known as data hiding, is the mechanism whereby the implementation details of a class are kept hidden from the user.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What is Ipconfig and Ifconfig ?

A

Ipconfig (IP configuration) is a command used on Microsoft windows to view and configure the network interface. It displays all TCP/IP network information currently available on a network

Ifconfig(interface configuration) is a command that is used on Linux, Mac, and UNIX operating system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What is SNMP?

A

Simple Network Management Protocol. It is a protocol used for collection, organizing, and exchanging information between network devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Explain three types of networks based on their sizes?

A

LAN
MAN
WAN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Define round trip time?

A

The time taken for a signal to reach the destination and travel back to the sender with the acknowledgment. It is also called RTD(round trip delay)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What is encryption and decription?

A

Encryption is the process of converting transmitted data into a form that connot be read by any device other than the inteneded device

Decription is the process of converting back the encrypted data to its original form.

22
Q

Mentions two important actions performed by a cisco switch?

A

It uses the source MAC addresses of frames to build and maintain a MAC address table.

23
Q

What is a link?

A

Refers to the connectivity between two devices.

24
Q

Briefly define NAT?

A

NAT stands for Network Address Translation. This is a protocol that provides a way for multiple computers on a common network to share a single connection to the internet.

25
Q

What is RIP?

A

Routing information protocol is used by routers to send data from one network to another. It determines the network distance in units of hops.

26
Q

You have one 48 port switch with 3 VLANS. How many collisions domains and how many broadcast domains?

A

Three broadcast domains and 48 collision domains.

27
Q

Draw a diagram of a network you’ve worked on and please explain it to me?

A
28
Q

What’s the most important thing about the OSI model?

A

The most important factor about the OSI model is that we can divide up the protocols into layers. The other key factor is the OSI model provide encapsulation and abstraction.

29
Q

Can you name the layers of the OSI model?

A
Physical 
Data Link
Network 
Transport 
Session 
Presentation
Application
30
Q

Why can’t MAC addresses be used instead of IPv4 or IPv6 for networking?

A

Unlike IP addresses, MAC address do not specify unique destinations for communication. An IP scheme can be used for a group of computers to logically distinguish them as a group via routing tables.

31
Q

Explain the d/n b/n a VLAN and subnet? Do you need VLAN to setup a subnet?

A

VLANs work at the Data Link layer. They refer to the 802.1q standard. Using VLANs you can give ports a unique MAC address table, separating them from each other.

A sunet is a range of IP addresses determined by part of an address, often called network address and a subnet mask (netmask)

32
Q

Mentions some common HTTP status codes?

A

1xx- Informational responses - communicates transfer protocol-level information
2xx-Success- indicates that the client’s request was accepted successfully

33
Q

What is the smallest IPv4 subnet mask that can be applied to a network containing up to 30 devices?

A

If you have a standard 24 VLAN for users, a /30 for point to point links and a network of up to 30 devices, the smallest Ipv4 subnet mask would be a /27

34
Q

What is a packet filter and how does it work?

A

A packet filter is used as firewall technique to control network access by monitoring outgoing and incoming packets. packets are checked based on their source and destination IP address, protocols, and ports.

35
Q

What is the advantage of using a reverse proxy server?

A

A reverse proxy server will hide the topology and characteristics of your servers. It also helps with load balancing.

36
Q

Can you explain the difference between a router and a gateway?

A

Gateways are used to regulate traffic between two dissimilar networks, while routers regulate traffic between similar networks.

37
Q

What is a default gateway?

A

A default gateway severs as an access point for outbound connections to other networks. It allows one computer to communicate with another computer on a different network.

38
Q

can you tell me how DNS records work?

A

DNS records tell the DNS server which IP address each domain is associated with. It also tells how to handle requests sent to each domain. They are basically mapping files.

39
Q

What is the number of network IDs in a class C network?

A

The number of Network ID bits in a class C network is 24. The number of possible network IDs is 2 raised to 21 or 2,097,152

40
Q

A user in your company wants to connect two computer for file sharing, is it possible to do this without using a hub or router?

A

Yes, you can use a crossover cable in this situation.

41
Q

Which connection provides a secure CLI session with encryption to a Cisco switch?

A

AN SSH connection

42
Q

Let’s say a use opens three browsers on his PC to access www.cisco.com to search for CCNA information. The cisco web server sends a datagram as a reply to the request from one of the web browsers. can you tell which information is used by the TCP/IP protocol stack on the user machine to identify which of the three web browsers should receive the reply?

A

Yes, you can use the destination port number

43
Q

Where are CISCO IOS debug output messages sent by default?

A

They are sent to the console line

44
Q

Let’s say a network administrator issues a copy running-config startup-config command after making configuration changes on a Cisco switch. what would be the impact of these commands?

A

It saves it and loads the configuration after it starts

45
Q

Do you contribute to any open source projects?

A

YES. Will help you expand your network and pass a lot of interviews

46
Q

Tell me about the biggest mistake you’ve made?

A

The time when I tried to configure a coding unit from a server and shuts down the whole system. I interapted the configuration process.
she brought me because of my IT experience or desire

47
Q

What technical news sources do you check daily?

A

CISCO networking blog

48
Q

Tell me about an instance where you team client, or boass disagreed with you. How di you resovle this situation?

A
49
Q

A network administrator is measuring the transfer of bits across the company backbones for a very important application. The adminsitrator notices that the network throughput is lower thatn the bandwidth expected. Can you tell which factors could influence the differences in throughput?

A

Could be the amount of traffice that is currently crossing the network, the type of traffic that is crossing the network, and the latency that is created by the number of network devices that the data is crossing

50
Q

How many hosts are addressable on a network that has a mask of 255.255.255.248?

A

6