Tech Flashcards

1
Q

Bus (computer system) speed

A

Bandwidth measures in megahertz or gigahertz, cpu, memory, periphal devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is a subnet mask

A

Number that specifies which up address represents the host and network portions of the address. Normally in binary

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

DHCP

A

Dynamic host configuration protocol. Assigns up addresses automatically, dns and subnet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Scope and superscope

A

Scope is range of up addresses assigned to a particular network. Superscopw is multiple scopes that simplify ip address management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Nslookup

A

DNS lookup, record for host name

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Address record

A

Domain with ip address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Forward dns lookup

A

Website to ip

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Can you give an example when you had many high priority tasks

A

I had to manage multiple support tickets. At times I had to handle major updates while at the same time deal with network issues. I prioritize by the impact it had on business

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Reservation

A

dhcp addresses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Fix boot

A

Writes new partition boot sector

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Safe mode

A

Diagnostic start up mode, boots with minimum drivers. Accessed with f8

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Backup outlook emails by

A

File, open/export. .pst fie

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Sid

A

Security identifier, assigned to a user, group or object

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Multiple high priority tasks

A

I had to manage multiple support tickets. At times I had to handle major updates while at the same time deal with network issues. I prioritize by the impact it had on business

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Learn tool quickly

A

I had to manage multiple support tickets. At times I had to handle major updates while at the same time deal with network issues. I prioritize by the impact it had on business

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Active directory partitions

A

Schema, configuration, domain

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

DHCP

A

Dynamic host configuration protocol. Assigns up addresses automatically, dns and subnet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Describe difficult technical issue

A

I once had network printers disconnecting from multiple computers. I checked network logs, and noticed ip conflicts. To fix the issue, I had to use static ip

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Class b ip

A

128-191

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Reservation

A

Assigns ip address from dhcp to a particular device

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What steps would you take to ensure high availability and fault tolerance for critical servers

A

Have redundant measures such as clustering or server mirroring

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Pst/ost

A

Personal storage table, offline storage table. Pst store email email messages, ost files are offline copies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Ou Active Directory

A

Organizational unit is a container for storing user accounts, computer accounts, printers and groups

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Dism

A

Deployment image servicing. Services and manage windows images

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Ntlsr

A

Mr loader file is corrected or missing prevent pc from booting. To fix, check boot order,or use system re overt tools

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

How explain technical issues to non technical people

A

Focus on simple language, break it down into small pieces

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Group policy

A

Administrators manage a network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

Class b ip

A

128-191

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

What is tree and forest in Active Directory

A

domain with root and child domain. Forest is collection of trees in a network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

What is tree and forest in Active Directory

A

Tree is one or more domains connected, root and child domain. Forest is collection of trees in a network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

Describe when you had a technical issue you never encountered before

A

I was upgrading a network. The switches we installed caused connectivity problems I never seen. My job was to fix quickly, minimizing down time. I used ping and tracer out to find the problem area. There were a miscondifuration in the switches. I reconfigured them. Network was restored with minimal down time

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

SMTP port number

A

25

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

FireWire

A

IEEE 1394. High speed serial connections between cameras, hard drives, audio video equipment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

IMAP/ smpt

A

Internet message access protocol. Simple mail transfer protocol. Email communication, management and syncing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

Fix system that keeps restarting

A

Check hardware issues, power supply, update drivers, malware check, system restore

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

Sfc

A

System file checker, checks for integrity of fikes. Command is sfc/scannow

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

Class D ip

A

224.239

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

Fixmbr

A

Windows command to repair master boot record of disk, which holds booting information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

Calculate subnet

A

Determine number of bits. Convert binary to decimal

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

Gateway vs router

A

Gateway are different architecture l, router is same network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

Reverse dns lookup

A

ip address to host name

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

Differential backup

A

Backs up files that changed since last backup

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

Default gateway

A

ip address of router thar acts as a access point, to communicate with other devices on the same network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

What are some benefits of ou Active Directory

A

Precise secure control, group policy, administrative tasks,

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

Forward dns lookup

A

website to ip

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q

Ping

A

Determine if can reach destination

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
47
Q

How to create ou in existing container

A

Right click, create new ou

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
48
Q

Fix system that keeps restarting

A

Check hardware issues, power supply, update drivers, malware check, system restore

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
49
Q

Class c ip

A

192-223

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
50
Q

Can a hard disk be dynamic

A

Yes with disk management. Could cause compatibility issues

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
51
Q

Trace route

A

Path of host to destination, TTL

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
52
Q

SCSI

A

Small computer interface, how pc communicate with hardware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
53
Q

B router

A

Bridge router. Communication between networks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
54
Q

Pop port number

A

110

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
55
Q

Active Directory partitions

A

Schema, configuration, domain

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
56
Q

How would you create a new user in Active Directory with permissions

A

Navigate to ou, right click, create new user. Then assign security groups

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
57
Q

Describe when you had a technical issue you never encountered before

A

I was upgrading a network. The switches we installed caused connectivity problems I never seen. My job was to fix quickly, minimizing down time. I used ping and tracer out to find the problem area. There were a miscondifuration in the switches. I reconfigured them. Network was restored with minimal down time

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
58
Q

Sfc

A

System file checker, checks for integrity of fikes. Command is sfc/scannow

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
59
Q

Incremental backup

A

Backs up only file that changed since last bacup

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
60
Q

Ntlsr

A

NT loader file is corrected or missing prevent pc from booting. To fix, check boot order,or use system re overt tools

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
61
Q

Add system to domain

A

System settings, , then network id

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
62
Q

Domain

A

Group of computers, users, and network resources within a network environment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
63
Q

Permissions, policies, rights

A

Permission: actions allow or denied to user. Policies: rules that define security measures and configurations. Rights: privileges granted to a user

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
64
Q

What is tree and forest in Active Directory

A

Tree is one or more domains connected, root and child domain. Forest is collection of trees in a network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
65
Q

How may classes are there for ip address

A

5

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
66
Q

ras server / vpn server

A

Ras is remote access to a network. Vpn sever is secure connection over public network to access private network securley

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
67
Q

How to handle a user who reports email is not sulyncing to phone

A

Verify credentials, internet connectivity. Check server status.clear cache, update app

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
68
Q

How to create ou in existing container

A

Add -Path “OU=ParentOu, DC=domain, DC=com

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
69
Q

Reverse dns lookup

A

ip to host name

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
70
Q

Class a ip

A

0-126

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
71
Q

What is dns

A

Domain name server. Turn domain names into ip addresses. DNS tells where to find a site

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
72
Q

Default containers in ad

A

Default containers in ad

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
73
Q

Trace route

A

Shows path from host computer through individual routes, getting the time it takes. TTL

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
74
Q

What steps would you take to ensure high availability and fault tolerance for critical servers

A

Have redundant measures such as clustering or server mirroring

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
75
Q

How would you create a new user in Active Directory with permissions

A

Navigate to ou, right click, create new user. Then assign security groups

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
76
Q

How many logical drives on physical disk

A

24

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
77
Q

Class d ip

A

224.239

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
78
Q

Gateway vs router

A

Gateway are different architecture l, router is same network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
79
Q

My record

A

Mail exchange record. Server that is responsible for receiving email for a domain

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
80
Q

Default gateway

A

ip address of router thar acts as a access point, to communicate with other devices on the same network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
81
Q

ras server / vpn server

A

Ras is remote access to a network. Vpn sever is secure connection over public network to access private network securley

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
82
Q

How to create ad ou using power shell

A

New-ADOrganzationalUnit - Name “example engineer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
83
Q

User can’t connect to specific website

A

Verify website is accessible on other devices. Clear. Ache, cookies. Disable extensions. Flush dns

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
84
Q

Tell me about a time you had to handle a difficult customer

A

(Star method, situation, task, action, result). I had a situation where a teachers computer was freezing during online classes. My job was to resolve quickly so class could resume without interruptions. I remotely accessed and ran diagnostics and found the issue was deluxe to memory. I recommend closing some programs and offered to upgrade the ram. Imputed performance changed drastically

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
85
Q

Tell me about a time you had to handle a difficult customer

A

(Star method, situation, task, action, result). I had a situation where a teachers computer was freezing during online classes. My job was to resolve quickly so class could resume without interruptions. I remotely accessed and ran diagnostics and found the issue was deluxe to memory. I recommend closing some programs and offered to upgrade the ram. Imputed performance changed drastically

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
86
Q

Fix boot

A

Writes new partition boot sector

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
87
Q

Ipconfig

A

Command line that shows ip address, subnet mask, default gateway, dns server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
88
Q

Example when you had to multitask

A

Had multiple support requests, printer malfunction, and a pwd reset. My job as to handle all requests ensuring the most critical are fixed first. I started with the network issue then reset the password for the user, then fixed the printer issue. Network was fixed in 30 mins, password rest caused no delays,which helped maintain productivity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
89
Q

Describe a chanllenging technical issue

A

I once had network printers disconnecting from multiple computers. I checked network logs, and noticed ip conflicts. To fix the issue, I had to use static ip

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
90
Q

Other ad containers

A

Domain (root), built in (admin acct), users, computers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
91
Q

Fixmbr

A

Windows command to repair master boot record of disk, which holds booting information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
92
Q

Sid

A

Security identifier, assigned to a user, group or object

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
93
Q

Sid

A

Security identifier, assigned to a user, group or object

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
94
Q

Packet

A

Group of info with a header that has data and location

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
95
Q

How to calculate subnet mask

A

Determine number of bits. Convert binary to decimal

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
96
Q

Differential backup

A

Backs up files that changed since last backup

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
97
Q

What is a subnet mask

A

Number that specifies which up address represents the host and network portions of the address. Normally in binary

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
98
Q

Permissions, policies, rights

A

Permission: actions allow or denied to user. Policies: rules that define security measures and configurations. Rights: privileges granted to a user

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
99
Q

Ipconfig

A

Command line that shows ip address, subnet mask, default gateway, dns server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
100
Q

IAS server

A

Internet authentication service, windows component that provides authorization, for remote access by validation credentials

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
101
Q

Diagnose a computer that refuse to boot up

A

Check power supply. Listen for beep codes. Check ram ans harddrive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
102
Q

Dism

A

Deployment image servicing. Services and manage windows images

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
103
Q

IAS server

A

Internet authentication service, windows component that provides authorization, for remote access by validation credentials

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
104
Q

Example when you had to multitask

A

Had multiple support requests, printer malfunction, and a pwd reset. My job as to handle all requests ensuring the most critical are fixed first. I started with the network issue then reset the password for the user, then fixed the printer issue. Network was fixed in 30 mins, password rest caused no delays,which helped maintain productivity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
105
Q

User can’t connect to specific website

A

Verify website is accessible on other devices. Clear. Ache, cookies. Disable extensions. Flush dns

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
106
Q

difference between domain controller and additional domain controller

A

Dc is a server in Active Directory that authenticates users, maintains directory database. Adc is a backup domain controller which is read only copy of ad database

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
107
Q

Dns

A

Domain name server. Turn domain names into ip addresses. DNS tells where to find a site

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
108
Q

Group policy

A

Windows feature, where administrators can manage settings across a network of computers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
109
Q

Class e ip

A

240-255

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
110
Q

Nslookup

A

DNS lookup, record for host name

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
111
Q

What is ou in Active Directory

A

Organizational unit is a container for storing user accounts, computer accounts, printers and groups

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
112
Q

Tell me about a time you had to handle a difficult customer

A

(Star method, situation, task, action, result). I had a situation where a teachers computer was freezing during online classes. My job was to resolve quickly so class could resume without interruptions. I remotely accessed and ran diagnostics and found the issue was deluxe to memory. I recommend closing some programs and offered to upgrade the ram. Imputed performance changed drastically

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
113
Q

Pop port number

A

110

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
114
Q

Port 3389

A

Remote Desktop

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
115
Q

Ftp

A

File transfer protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
116
Q

How to handle multiple issues at the same time

A

Prioritize

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
117
Q

Tell me about yourself

A

How it relates to the job

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
118
Q

Tell me about yourself

A

How it relates to the job

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
119
Q

Greatest strength

A

Customer service, customer support, can deal with stressful peoples

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
120
Q

Greatest weakness

A

Criticism. I take it personally instead of a learning experience, I feel like I could have done things better

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
121
Q

How to deal with upset customer

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
122
Q

A user is unable to to send receive email

A

Internet ? Restart pc. Inbox full? Corrupted profile?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
123
Q

User unable complete training video via adls. Video won’t load

A

Sound settings? Clear cookies and cache. Web browser corrupted

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
124
Q

Can’t log into computer

A

Pc not on, account is locked, password reset,no dns,

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
125
Q

Can only access certain sites

A

Allow site in browser. Certificate. Website blocked

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
126
Q

Can’t open encrypted email

A

Winrar/ 7 zip.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
127
Q

Can only log in to a temp profile

A

Back up data, snippet of desktop. Save bookmarks on shared drive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
128
Q

How to list directories and delete through cmd

A

Cmd, type dir,

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
129
Q

List of different email servers

A

Pop3, smtp, imap

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
130
Q

DHCP

A

Assigns ip addresses to devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
131
Q

How to Password reset in active directory

A

Server manager, Active Directory, domain controller, users, right click

132
Q

How to map a network drive

A

C explorer, this pc, properties, copy path

133
Q

Monitor is not working. What should you do?

A

Check cables, could be driver or monitor

134
Q

What is safe mode?

A

Press f8 or shit and restart upon restart. It is a diagnostic tool to troubleshoot driver and hardware issues, remove viruses

135
Q

What is ip address and how to find it

A

Number tied to a computer to identify location on a network. DHCP automatically assigns. You can find by cmd, Ipconfig/all

136
Q

Default gateway

A

Access point to reach other networks, like from home to outside. Maybe Switch or router, prozy

137
Q

What is Active Directory

A

Windows server feature that contains user accounts, objects, host, group policies, and domain

138
Q

What is a domain

A

Group of computers and users on a network normally within Active Directory

139
Q

Printer not printing correctly?

A

Install or update printer driver.

140
Q

Name some lan cables

A

Cat 5, cat 5e, cat 6, cat 6a

141
Q

Cat 5 speed

A

100mbps

142
Q

Cat5e speed

A

1,000 mbps

143
Q

Cat 6 speed

A

10,000 mbps

144
Q

Cat 6a speed

A

10,000 mbps

145
Q

Blue screen of death

A

Blue screen crashing computer, caused by bad hardware or software l. Run diagnostics to fix

146
Q

DHCP

A

Dynamic host configuration protocol. Automatically assigns ip addresses on a network

147
Q

DNS

A

Domain name system. Reroutes host names to ip address. Website to ip. Like an address book

148
Q

Vpn

A

Virtual private network. Connects from remote location to network resources

149
Q

Ping

A

Test to see if device can reach other resources. It sends packets

150
Q

Group policy

A

Active Directory. Predetermined settings

151
Q

.pst file

A

Outlook extension archive

152
Q

How to change folder permissions

A

Group policy. Folder properties, security tab

153
Q

Switch vs hub

A

Hub connect multiple computers to a single network. Switch can connect multiple segments of the same network. Hub share bandwidth.

154
Q

How to recover data from virus infected computer

A

Send it to a different pc, slave drive

155
Q

Why should we hire you

A

Experience, qualifications

156
Q

Tell me about yourself

A

I would describe my self as an attentive, experienced, fast working desktop support engineer that had skills and attributes to match the job description. I have many years experience when it comes to solving IT and technical problems

157
Q

Why to work in desktop support

A

My skills will definitely be utilized, and I go above and beyond to help people. I enjoy the challenges. I like learning new technology

158
Q

Skills and qualities for desktop support

A

Listening,critical thinking, communication

159
Q

How to handle multiple high priority problems

A

Get help from other available technicians, seek which problem is easier to fix, keep customers updated on progress

160
Q

Strengths and weaknesses

A

Strength: my diverse technical knowledge that covers a wide range of topics. I’m great at Listening and communicating. Multitask

Weakness: not good at public speaking but it will not affect my ability to complete job.

161
Q

Monitor not working. What to check first

A

Cables,

162
Q

Domain

A

Network with users, group

163
Q

Group policy

A

Give certain permissions

164
Q

Hub

A

Repeater

165
Q

Why do you want to work here

A

I love troubleshooting and solving technical problems. Started at an early age as a child, taking things apart to figure out how they work. It helps me to refine my skills

166
Q

Example ticket you solved

A

I was assigned a ticket where only one user couldn’t use his apps or access the internet. His other workers could. I asked what symbols did he see in the Wi-Fi tray. He didn’t know so I instructed him to ping google. It was successful, so I concluded the network was fine. Eventually went through his firewall setting and saw the the port was being blocked accidentally

167
Q

Active directory

A

Microsoft service used to manage, organize, and run networks

168
Q

System is running slow

A

Memory. Remove temp files, unused files and apps. Defrag disks. Upgrade to ssd and ram

169
Q

Angry customer

A

I ensue customer I understand their problem and that the problem is my priority and will be solved

170
Q

Difficulty configuring printer

A

Make sure printer is on and connected, use printer wizard and select it install or update printer drivers. Try file sharing and discovery if not discovered

171
Q

How to make sure system is not infected with virus

A

Antivirus software, check for virus related problems as slow speed, pop ups, pups, unexplained programs

172
Q

Ptr

A

Pointer record. Ip to domain name or reverse dns

173
Q

Logical drive

A

Virtual drive on physical drive but is independent as it own storage

174
Q

Purpose of logical drive

A

Optimize storage performance

175
Q

How to get MAC address for a nic (network interface card)

A

getmac / v command or Ipconfig/all

176
Q

How does vpn work

A

It’s a private network over a public network with encryption. Hides original ip and location

177
Q

Behind the scenes when you type google.com, what happens

A

Browser checks for dns info to find matching ip address, establish tcp connection

178
Q

How does a router work

A

Routing table that send packets to a destination

179
Q

Block access to website (facebook)

A

Use company router (find its ip) open router page. Go to content filter option.

180
Q

How to backup outlook emails

A

Use pst files, export

181
Q

Scsi

A

Small computer system interface. Connect devices

182
Q

Differential backup

A

Only back up files changed since last backup

183
Q

Incremental backup

A

Backs up everything that changed

184
Q

Dns

A

Host name to ip

185
Q

Forward dns lookup

A

Converts domain to ip

186
Q

Reverse dns lookup

A

Ip to domain

187
Q

Fat 32 vs ntfs

A

Fat 32 (file allocation table) older system,store data in 32 chunks.

Ntfs (new technology file system), supports large file size, recovery, permissions

188
Q

imap

A

Internet message access protocol: manages email server

189
Q

Cross cable

A

Connect two devices of same type

190
Q

Boot.ini

A

Initization file on older windows which contains boot options and bios

191
Q

Cookies

A

Small files that store data and track users in a website to save preferences,

192
Q

Serial vs parallel ports

A

Serial: transmit one data bit.
Parallel port : 8 bits a time

193
Q

Phishing attack

A

Cyber attack pretending to be websites or others asking for info

194
Q

Router

A

Forward data packets between networks

195
Q

Router

A

Forward data packets between networks

196
Q

Gateway

A

Different networks

197
Q

Gateway

A

Different networks

198
Q

Switches

A

Connects multiple devices and directs traffic

199
Q

Switches

A

Connect within lan

200
Q

Hub

A

Ethernet

201
Q

Hub

A

Connects multiple devices to network

202
Q

Access point

A

Allow devices to connect to wired network

203
Q

Dhcp reservation

A

Same ip

204
Q

Firewall

A

Monitor incoming and outgoing traffic

205
Q

Subnet

A

Divides network into smaller sections

206
Q

Differential backup

A

Back up everything

207
Q

Incremental backup

A

Backup only changes

208
Q

Tree (Active Directory)

A

One or more domains. Parent/child

209
Q

Active Directory

A

Manages computers and users on a network , authentication, security

210
Q

Nslookup

A

Finds ip address

211
Q

Scope

A

Range of ip address

212
Q

Port 3389

A

Remote desktop

213
Q

Tell me about you

A

Attentive, fast working, 3+ years experience

214
Q

Why should we hire you

A

3+ years of experience, enjoy helping clients,ex customer service

215
Q

Network types

A

Star, bus, ring, security

216
Q

Challenging tech issue

A

Printer disconnect/ ip conflicts

217
Q

Why do you want to work here

A

I’m excited about contributing my technical expertise while also being apart of a team that shares my didicarion and innovation

218
Q

Walk me through your resume

A

Talk about resume

219
Q

Greatest achievement

A

Cloud migration. Collages with departments slecting cloud services

220
Q

Time you automated manual process

A

Developed script using python, extracted data automatically from databases

221
Q

It documenting software

A

It glue

222
Q

It documenting software

A

It glue , jira, zendesk

223
Q

Common hardware issues

A

Power issues, hardware failure

224
Q

Issue with slow internet. How to fix

A

Check cables , router, ip issues

225
Q

Ensure accuracy of inventory

A

Audits, management software

226
Q

Help desk ticketing systems

A

Zendesk. Jira,

227
Q

Add new user in Active Directory / reset password

A

Go to organizational unit, right click new user, also right click reset password

228
Q

Experience trouble shooting iPads/ smartphones

A

Configured emails, fixed network issues,

229
Q

Tell me you worked as a team to resolve an tech issue

A

Several users has slow internet. After splitting task ofchecking local devices, checking routers firewall, it was discovered that the router was the issue.

230
Q

Time when you fixed a desktop

A

Pc fans and lights would come but there was no display. I tested other monitors, swapped cables, psu. Turned out to be mobo

231
Q

Tell me about a time you solved a tech issue

A

Pc wouldnt boot. It was bsod:safe mode and disk check didn’t work but system restore did

232
Q

Time you resolved an issue remotely

A

User couldn’t connect to vpn. I told to check credentials. I then requested to remote into their system. I found that the vpn software was out of date

233
Q

. Can you explain the difference between a hub, switch, and router?

A

A hub is the simplest of the three. It operates at the physical layer (Layer 1) of the OSI model and serves as a central connection point for multiple devices within a network. When it receives data from one device, it broadcasts the data to all connected devices indiscriminately, which can lead to network congestion and reduced performance.

A switch, on the other hand, operates at the data link layer (Layer 2) of the OSI model. Unlike a hub, a switch intelligently forwards data only to the intended recipient based on their MAC address. This reduces network congestion and improves overall efficiency.

234
Q

What is the OSI model?

A

Physical Layer: This is the lowest layer, responsible for transmitting raw bits over physical media like cables or wireless signals. It deals with electrical, mechanical, and functional aspects of the network hardware. 2. Data Link Layer: This layer ensures reliable data transfer between two directly connected nodes by establishing error-free communication through flow control, error detection, and error correction mechanisms.

  1. Network Layer: The network layer is responsible for routing data packets across different networks. It determines the best path for data transmission based on factors such as network congestion and available bandwidth.
  2. Transport Layer: This layer manages end-to-end data delivery, ensuring reliability and proper sequencing of data packets. It also handles flow control and error recovery between sender and receiver.
  3. Session Layer: The session layer establishes, maintains, and terminates connections between applications on different devices. It coordinates communication sessions and synchronizes data exchange.
  4. Presentation Layer: This layer translates data formats between application and network layers, handling encryption, compression, and character encoding to ensure compatibility between systems.
  5. Application Layer: The topmost layer, it provides the interface between users and network services. It includes protocols and services that enable direct user interaction, such as email, web browsing, and file transfers.”
235
Q

How do you troubleshoot network connectivity issues?

A

I use diagnostic tools like ping, traceroute, and ipconfig to test network connectivity and gather more data about the problem. These tools help me pinpoint whether the issue lies within the local network, external networks, or specific devices.

Based on my findings, I then proceed to implement appropriate solutions, which could range from replacing faulty hardware, adjusting configurations, or escalating the issue to higher-level support teams for further investigation. Throughout the process, I document each step taken and communicate updates to relevant stakeholders to keep them informed and maintain transparency.”

236
Q

What are some common reasons for slow network performance?

A

Slow network performance can be attributed to various factors, often stemming from issues with hardware, software, or the network infrastructure itself. One common reason is network congestion, which occurs when too many users or devices are trying to access the network simultaneously, leading to bottlenecks and reduced bandwidth availability.

Another factor could be outdated or malfunctioning hardware, such as switches, routers, or even end-user devices like computers and smartphones. These components may struggle to handle modern data loads, causing slow performance. Additionally, misconfigured settings on networking equipment or improper network design can lead to suboptimal routing of traffic, further contributing to sluggishness.

It’s also important to consider external factors, such as interference from other wireless networks or physical obstructions that impede signal strength. In some cases, malicious activities like Distributed Denial of Service (DDoS) attacks or malware infections can cause a significant slowdown in network performance. As a network technician, it’s essential to diagnose the root cause of these issues and implement appropriate solutions to maintain optimal network performance.”

236
Q

What is DHCP and what role does it play in a network?

A

Dynamic Host Configuration Protocol (DHCP) is a network protocol that automates the assignment of IP addresses to devices within a network. It plays a vital role in managing and maintaining IP address allocation, ensuring that each device connected to the network receives a unique IP address.

236
Q

Explain the difference between IPv4 and IPv6.

A

IPv4 and IPv6 are both Internet Protocol (IP) versions, but they differ in several key aspects. IPv4 is the older version, which uses 32-bit addresses, resulting in a total of approximately 4.3 billion unique IP addresses. Due to the rapid growth of the internet, this address space has become insufficient, leading to the development of IPv6.

IPv6 utilizes 128-bit addresses, significantly expanding the number of available IP addresses to around 340 undecillion. This vast address space not only accommodates the current demand for IP addresses but also future-proofs the system as more devices connect to the internet. Additionally, IPv6 offers improved security features, such as built-in IPSec support, and enhanced efficiency through simplified header structures and better support for multicast traffic. These improvements make IPv6 a more robust and scalable solution compared to its predecessor, IPv4.”

236
Q

What is subnetting and why is it important?

A

Subnetting is the process of dividing a larger IP network into smaller, more manageable subnetworks or subnets. This is achieved by borrowing bits from the host portion of an IP address and using them to create additional network segments. Subnetting helps improve network performance, security, and manageability.

The importance of subnetting lies in its ability to optimize network efficiency and reduce congestion

237
Q

Describe your experience with configuring firewalls and setting up security policies.

A

As a network technician, I have extensive experience configuring firewalls and setting up security policies to protect the integrity of an organization’s network. My primary responsibility has been to ensure that only authorized traffic is allowed through the firewall while blocking any potential threats.

I’ve worked with various firewall solutions such as Cisco ASA, Fortinet, and pfSense, which has given me a solid understanding of their configuration processes and best practices. When setting up security policies, I start by analyzing the organization’s requirements and identifying the necessary access levels for different user groups. This involves working closely with other IT team members and stakeholders to gather information on applications, services, and data flows within the network.

238
Q

What tools do you use to monitor network performance and identify potential issues?

A

As a network technician, I rely on various tools to monitor network performance and identify potential issues. For real-time monitoring and analysis of network traffic, I use Wireshark, which allows me to capture packets and analyze them for any anomalies or bottlenecks in the system. This helps me quickly pinpoint areas that may require further investigation or optimization.

For overall network health and performance monitoring, I utilize SolarWinds Network Performance Monitor (NPM). NPM provides comprehensive insights into device availability, bandwidth usage, and latency, enabling me to proactively address any emerging issues before they escalate. Additionally, it offers customizable alerts and reporting features, ensuring that I stay informed about the network’s status and can take appropriate action when needed. These tools, combined with my expertise in networking principles, allow me to effectively maintain optimal network performance and minimize downtime.”

239
Q

What is VPN and how does it work?

A

A Virtual Private Network (VPN) is a technology that creates a secure and encrypted connection over the internet between a user’s device and a private network. It allows users to access resources on the private network securely, even when they are physically located outside of it.

VPNs work by establishing a virtual tunnel through which data packets are transmitted. The VPN client encrypts the data before sending it over the public internet, ensuring that only authorized recipients can decrypt and read the information. This process relies on authentication protocols and encryption algorithms to maintain confidentiality, integrity, and authenticity of the data being transmitted. Additionally, VPNs often use IP address masking techniques to provide anonymity for the user, making it difficult for third parties to track their online activities. In summary, VPNs offer a secure way for remote users to connect to private networks while maintaining privacy and data security.”

240
Q

Can you explain the concept of Quality of Service (QoS) and its importance in a network?

A

Quality of Service (QoS) is a set of techniques and mechanisms used to manage network resources, prioritize traffic, and ensure that specific data flows receive the required level of service in terms of bandwidth, latency, jitter, and packet loss. QoS plays a vital role in optimizing network performance, especially when dealing with time-sensitive or mission-critical applications.

The importance of QoS lies in its ability to differentiate between various types of traffic and allocate appropriate resources accordingly. For instance, real-time applications like video conferencing and VoIP require low latency and minimal packet loss for optimal performance, while file transfers can tolerate higher delays. Implementing QoS helps maintain a consistent user experience by prioritizing critical traffic and preventing congestion during peak usage times. This ultimately leads to improved productivity and overall satisfaction for end-users relying on the network’s services.”

241
Q

. What types of cables have you worked with, and which ones do you prefer for different situations?

A

As a network technician, I have worked with various types of cables, including twisted pair (Cat5e, Cat6, and Cat6a), coaxial, and fiber optic cables. Each type has its advantages and is suitable for different situations.

For short-distance connections within an office or residential environment, I prefer using twisted pair cables like Cat6 due to their cost-effectiveness and ease of installation. They provide sufficient bandwidth for most applications in these settings. However, when dealing with longer distances or higher data transfer requirements, such as connecting multiple buildings on a campus or supporting high-speed internet services, I opt for fiber optic cables. These cables offer greater bandwidth capacity and are immune to electromagnetic interference, ensuring reliable data transmission over long distances.

It’s essential to consider the specific needs and constraints of each networking project when selecting the appropriate cable type, balancing factors such as performance, distance, and budget to achieve the best results.”

242
Q

What is DNS and how does it function within a network?

A

The Domain Name System (DNS) is a critical component of modern networks, responsible for translating human-readable domain names into IP addresses that computers can understand. This process allows users to access websites and other resources on the internet using easily memorable domain names instead of having to remember numerical IP addresses.

243
Q

Describe your experience with wireless networking technologies, such as Wi-Fi and Bluetooth.

A

Throughout my career as a network technician, I have gained extensive experience with wireless networking technologies, including Wi-Fi and Bluetooth. My work has involved designing, implementing, and maintaining Wi-Fi networks for various organizations, ranging from small businesses to large enterprises. This includes selecting appropriate hardware, configuring access points, setting up security protocols like WPA2 or WPA3, and optimizing network performance through channel selection and signal strength adjustments.

As for Bluetooth, I have worked on projects that required the integration of Bluetooth devices into existing IT infrastructures. This typically involves configuring and troubleshooting connections between devices such as smartphones, tablets, printers, and audio equipment. Additionally, I’ve ensured secure data transfer by implementing proper encryption methods and addressing potential interference issues with other wireless technologies in the environment.”

243
Q

What is Network Address Translation (NAT)

A

Example: “Network Address Translation (NAT) is a technique used to map multiple private IP addresses within a local network to a single public IP address. This mapping process allows devices on the internal network to communicate with external networks, such as the internet, while conserving public IP addresses.

NAT is primarily used for two reasons: IP address conservation and security.

244
Q

How do you secure a network against unauthorized access?

A

ecuring a network against unauthorized access involves implementing multiple layers of protection. First, I ensure that all devices connected to the network have strong and unique passwords, following best practices for password complexity and length. Additionally, I configure firewalls with strict rules to control incoming and outgoing traffic, blocking any suspicious or unnecessary connections.

Another essential step is setting up Virtual Private Networks (VPNs) for remote users, which encrypts their data and ensures secure communication between them and the company’s network. Furthermore, I regularly update software and firmware on routers, switches, and other network devices to patch vulnerabilities and maintain optimal security levels. Finally, I monitor network activity closely, using intrusion detection systems (IDS) and Security Information and Event Management (SIEM) tools to identify and respond to potential threats in real-time. This comprehensive approach helps create a robust defense against unauthorized access and keeps the network secure.”

244
Q

What is the purpose of VLANs

A

VLANs, or Virtual Local Area Networks, serve the purpose of logically segmenting a network into distinct broadcast domains without being restricted by physical locations. This segmentation allows for better organization and control over network traffic.

The primary way VLANs improve network efficiency is by reducing unnecessary broadcast traffic.

245
Q

Can you explain the difference between TCP and UDP protocols?

A

TCP is a connection-oriented protocol, which means it establishes a reliable connection between devices before transmitting data. It ensures that all data packets reach their destination by implementing error-checking mechanisms and retransmitting lost or corrupted packets. This makes TCP suitable for applications where data integrity is critical, such as file transfers, email services, and web browsing.

On the other hand, UDP is a connectionless protocol that doesn’t guarantee delivery of data packets. Instead, it sends datagrams without establishing a connection or verifying if the recipient is ready to receive them. While this may result in packet loss or out-of-order arrival, it offers lower latency and reduced overhead compared to TCP. This makes UDP ideal for real-time applications like video streaming, online gaming, and VoIP, where speed takes precedence over reliability.”

246
Q

What steps would you take to set up a new office network from scratch?

A

hen setting up a new office network from scratch, the first step I would take is to gather requirements and understand the organization’s needs. This includes determining the number of users, devices, and applications that will be connected to the network, as well as any specific security or performance requirements.

Once I have a clear understanding of the requirements, I would design the network topology by selecting appropriate hardware components such as switches, routers, firewalls, and access points. I would also plan for redundancy and failover mechanisms to ensure high availability and reliability. Next, I would configure the IP addressing scheme, VLANs, and routing protocols based on the organization’s needs and industry best practices.

After implementing the physical infrastructure and configuring the network devices, I would set up network services like DHCP, DNS, and VPNs to support seamless connectivity and secure remote access. Finally, I would establish monitoring and maintenance procedures to proactively identify potential issues and perform regular updates to keep the network running smoothly and securely.”

246
Q

Have you ever encountered a network security breach? If so, how did you respond?

A

es, I have encountered a network security breach in my previous role as a Network Technician. When we detected the breach, our team immediately followed the company’s incident response plan to mitigate any potential damage and protect sensitive data.

We first isolated the affected systems from the rest of the network to prevent further spread of the breach. Then, we conducted an initial assessment to determine the extent of the intrusion and identify the vulnerability that allowed it to occur. Once we had gathered enough information, we worked closely with our cybersecurity team to implement necessary countermeasures, such as patching the vulnerability and updating firewall rules.

247
Q

What is your experience with network management software and hardware?

A

I have gained extensive experience with various network management software and hardware. My expertise includes working with industry-standard software such as SolarWinds Network Performance Monitor, PRTG Network Monitor, and Cisco Prime Infrastructure for monitoring, managing, and troubleshooting networks.

I am also proficient in configuring and maintaining networking hardware like routers, switches, and firewalls from leading vendors such as Cisco, Juniper, and HP. This hands-on experience has allowed me to develop a deep understanding of the intricacies involved in setting up and optimizing network infrastructure while ensuring security and reliability.

247
Q

routing protocols like OSPF and BGP?

A

outing protocols like OSPF (Open Shortest Path First) and BGP (Border Gateway Protocol) play a critical role in ensuring efficient and reliable communication within and between networks. They are responsible for determining the best path for data packets to travel from their source to their destination, optimizing network performance and minimizing latency.

OSPF is an interior gateway protocol used primarily within large enterprise networks. It dynamically calculates the shortest path for data transmission based on factors such as link cost and bandwidth availability. This allows for quick adaptation to changes in network topology, ensuring optimal routing even when network conditions fluctuate.

On the other hand, BGP is an exterior gateway protocol designed for exchanging routing information between different autonomous systems, such as Internet Service Providers. BGP helps maintain the stability of the global internet by enabling routers to select the most appropriate route for data transfer while avoiding loops and congestion points. In summary, both OSPF and BGP contribute significantly to maintaining efficient, stable, and scalable networks.”

247
Q

Describe a challenging network issue you’ve faced and how you resolved it.

A

once encountered a particularly challenging network issue where users in one department were experiencing intermittent connectivity problems. The issue was affecting their productivity, and it was difficult to pinpoint the root cause due to its sporadic nature.

To resolve this, I first gathered information from the affected users about when and how they experienced the problem. Then, I systematically analyzed each component of the network infrastructure, including switches, routers, and cabling. After identifying that the issue seemed to be localized within a specific area, I focused on the switch serving that section. Upon closer inspection, I discovered that several ports on the switch were malfunctioning intermittently, causing the connectivity issues.

I replaced the faulty switch with a new one and closely monitored the network for any further disruptions. The connectivity issues ceased, and the users were able to work without interruptions. This experience taught me the importance of methodical troubleshooting and effective communication with end-users to gather valuable information when resolving complex network issues.”

248
Q

What is the role of SNMP in network management?

A

Simple Network Management Protocol (SNMP) plays a vital role in network management by enabling administrators to monitor and manage various aspects of network devices. SNMP is an application-layer protocol that facilitates communication between network devices and the management systems responsible for overseeing them.

248
Q

Can you explain the concept of load balancing and its importance in a network?

A

Load balancing is a technique used to distribute network traffic evenly across multiple servers or resources, ensuring that no single server becomes overwhelmed with too much traffic. This process helps maintain optimal performance and availability of the network by preventing bottlenecks and reducing latency.

249
Q

Describe your experience with configuring and managing network devices, such as switches and routers.

A

As a network technician, I have gained extensive experience configuring and managing various network devices, including switches and routers. In my previous role at XYZ Company, I was responsible for setting up and maintaining the company’s LAN infrastructure, which involved working with Cisco switches and routers.

I would begin by designing the network topology based on the organization’s requirements, followed by configuring VLANs, inter-VLAN routing, and access control lists to segment and secure the network. Additionally, I implemented redundancy protocols like HSRP and STP to ensure high availability and prevent network loops. To optimize performance, I regularly monitored network traffic using SNMP tools and fine-tuned configurations as needed.

250
Q

Have you ever had to implement a network upgrade? If so, how did you plan and execute it?

A

Yes, I have implemented a network upgrade in my previous role. Our organization needed to replace outdated hardware and improve overall network performance. To plan the upgrade, I first conducted an assessment of the existing infrastructure, identifying bottlenecks and areas that required improvement. I then researched suitable hardware replacements and consulted with vendors to ensure compatibility with our current systems.

Once I had a clear understanding of the necessary upgrades, I developed a detailed project plan outlining each step, including procurement, installation, configuration, testing, and user training. I also established a timeline for completion and communicated this plan to relevant stakeholders.

During the execution phase, I coordinated with other IT team members to minimize downtime and disruptions to users. We scheduled the upgrade during off-peak hours and ensured proper backups were in place before starting. After completing the upgrade, we thoroughly tested the new components to confirm their functionality and provided training sessions for end-users on any changes they might encounter. The result was a successful network upgrade with minimal impact on daily operations and improved network performance.”

250
Q

How do you ensure that a network remains scalable and adaptable to future growth and changes in technology?

A

To ensure a network remains scalable and adaptable to future growth and changes in technology, I start by designing the network with flexibility in mind. This involves selecting hardware and software components that can easily be upgraded or expanded as needed. For instance, choosing modular switches and routers allows for easy addition of ports and features without replacing the entire device.

250
Q

. Outline the steps you take to troubleshoot a network connectivity issue.

A

First, I’d start by identifying the scope of the issue—whether it’s affecting a single user, a group, or the entire network. This helps in narrowing down potential causes. Then, I’d verify the physical connections to ensure all cables are plugged in correctly and check for any obvious signs of damage or wear.

Next, I’d move on to the network devices, starting with the local device—checking the IP configuration with tools like ipconfig or ifconfig to ensure it’s obtaining an IP address properly. If it’s not, I’d look at the DHCP server to see if it’s functioning correctly.

After that, I’d check the local network by pinging the default gateway to see if the issue lies within the local network or beyond. If the gateway is reachable, I’d then try to ping external websites to determine if the problem is with the internet connection.

If the issue persists, I’d examine the router and firewall settings to ensure they aren’t blocking traffic. Finally, I’d review the network logs for any anomalies or errors that could point to the root cause. Throughout the process, I’d document each step taken and the findings to keep everyone informed and to ensure a systematic approach to troubleshooting.”

250
Q

Which protocols are essential for ensuring network security

A

for ensuring network security, I prioritize protocols like HTTPS, SSL/TLS, and IPsec. HTTPS is critical because it encrypts data between the web server and the client, protecting sensitive information from being intercepted. SSL/TLS further enhances this by establishing a secure, encrypted link for data transmission, ensuring data integrity and privacy.

251
Q

full mesh topology and a partial mesh topology?

A

full mesh ensures that each device on the network can connect to every other device on the network, but a partial mesh doesn’t.

251
Q

What’s the purpose of a switch on a local area network?

A

A network switch is the central device that connects all the computers together on the network. It allows us to control which connections are allowed or not allowed. F

252
Q

What are the advantages and disadvantages of a wireless network?

A

Wireless technology makes creating and using networks much easier. It also makes it possible to connect mobile devices, and a LAN can be scaled up or down quickly. The main problem of wireless networks is security.”

252
Q

How do you handle network performance monitoring and optimization?

A

I start by implementing robust monitoring tools like SolarWinds or Nagios to continuously track network performance metrics such as bandwidth usage, latency, and packet loss. I set up alerts for any anomalies or thresholds being breached, which allows me to respond proactively rather than reactively.

In terms of optimization, I analyze the data collected to identify bottlenecks or underperforming segments. Once issues are pinpointed, I prioritize them based on their impact and address them systematically. For example, I might reconfigure routing for optimal data flow, upgrade hardware components, or implement Quality of Service (QoS) policies to prioritize critical applications. In a previous role, this approach helped reduce average network latency by 20% and significantly improved overall user experience.”

253
Q

differentiate between TCP and UDP in terms of network communication?

A

TCP is like sending a certified letter via postal mail where you get a receipt that it was delivered. It ensures that all packets reach their destination in the correct order, which makes it ideal for applications where reliability is crucial, like web browsing or email.

UDP, on the other hand, is more like sending a postcard. There’s no guarantee that it will arrive, but it’s faster and has less overhead. This makes it great for applications like live streaming or online gaming where speed is more important than reliability. A good example from my experience is setting up VoIP systems; UDP is used to transmit the voice data because it can handle the slight data loss without significantly affecting the call quality.”

253
Q

Walk me through your process for performing a network audit.

A

First, I start by defining the scope of the audit to understand what systems, devices, and segments of the network need to be reviewed. Then I gather all necessary documentation, including network diagrams, IP address allocations, and existing configurations. This helps in identifying the key areas that require a detailed examination.

Next, I utilize network monitoring tools to collect data on current traffic patterns, performance metrics, and potential bottlenecks or vulnerabilities. This stage involves checking device configurations, firmware versions, and security protocols to ensure they are up to date and compliant with industry standards. I also perform vulnerability scans to identify any security gaps. After analyzing the collected data, I compile a comprehensive report detailing my findings, including any performance issues, security vulnerabilities, and recommendations for improvements. Lastly, I discuss the report with the stakeholders, providing actionable steps and prioritizing tasks to optimize the network’s performance and security.”

254
Q
A
255
Q
A
256
Q
A
257
Q
A
258
Q
A
258
Q
A
259
Q
A
260
Q
A
261
Q
A
262
Q
A
263
Q
A
264
Q
A
265
Q
A
266
Q
A
267
Q
A
267
Q
A
267
Q
A
268
Q
A
268
Q
A
269
Q
A
269
Q
A
269
Q
A
269
Q
A
270
Q
A
270
Q
A
271
Q
A
271
Q
A
271
Q
A
272
Q
A
272
Q
A
273
Q
A
273
Q
A
274
Q
A
275
Q

bus topology

A

A bus topology uses one or two main physical coaxial cables that branch off to each computer on a network. The main advantage of a bus network is lower costs, but replacing the cables or adding new computers to the network can be time-consuming.”

275
Q

What tools do you prefer for network troubleshooting, and why?

A

I find Wireshark indispensable for deep packet analysis. It allows me to capture and interactively browse the traffic running on a computer network, which is crucial for diagnosing complex issues. For quicker diagnostics, I rely on tools like Ping and Traceroute to verify connectivity and identify latency or packet loss. I also use NetFlow for monitoring traffic patterns over time to spot any unusual activity or bottlenecks.

276
Q

Have you ever dealt with a DDoS attack? If so, what was your response?

A

t my previous job, we were hit with a DDoS attack that took down our web services during a high-traffic period. I immediately coordinated with my team to identify the attack vectors and worked closely with our ISP to filter out malicious traffic. We implemented rate limiting and IP blacklisting to mitigate the effects while we continued to investigate the source.

We then set up a real-time monitoring system to better detect future anomalies and established a more robust incident response plan, including regular drills and updates to our firewall rules. This experience not only minimized downtime but also strengthened our overall network security posture for future incidents.”

276
Q

When would you use a managed switch versus an unmanaged switch?

A

use a managed switch when I need to have more control over the network, such as configuring VLANs, monitoring traffic, or setting up link aggregation for redundancy and increased throughput. Managed switches are essential in environments where network performance, security, and flexibility are critical, like in a data center or a corporate office with multiple departments needing segmented network traffic.

On the other hand, I’d opt for an unmanaged switch in simpler setups where plug-and-play convenience is a priority and advanced features aren’t necessary. For instance, in a small office or home network where the primary need is to connect a few devices without the complexity of configuration, an unmanaged switch would be more than sufficient.”

277
Q

wireless standards

A

I’ve worked extensively with 802.11n, 802.11ac, and 802.11ax standards. 802.11n, while older, is still reliable for many basic networking needs and offers decent speed and range, making it useful in environments where high-speed performance isn’t critical. 802.11ac, which I’ve deployed in several office environments, provides significantly faster speeds and better bandwidth management due to its use of multiple antennas and wider channels. This makes it ideal for high-density areas with numerous devices.

Most recently, I’ve been implementing 802.11ax (Wi-Fi 6) in a few larger corporate settings. The primary benefits here are increased efficiency and capacity, especially in environments with many connected devices. The improved data rates and reduced latency are game-changers for applications that demand high performance, like video conferencing and large file transfers. Each of these standards has its place, and understanding their benefits helps tailor the network to the specific

277
Q

How do you document network configurations?

A

standardized template to ensure consistency and clarity. This template includes details such as device names, IP addresses, VLANs, subnet masks, and any special configurations. I make use of network diagramming tools like Visio or Lucidchart to visually map out the network architecture, which helps both for clarity and for troubleshooting later on.

277
Q

What strategies do you use to ensure high availability in network services?

A

I prioritize a multi-layered approach to ensure high availability. First, I implement redundancy at every critical point in the network, such as using multiple ISPs and redundant hardware like routers and switches. This way, if one component fails, another can immediately take over without any noticeable downtime.

278
Q

Tell me about a time you had to quickly recover from a network outage.

A

We had a major network outage at my last job during a critical period—right when our finance team was closing the books for the quarter. The pressure was high, and everyone was understandably on edge. I quickly assessed the situation and found that a misconfigured switch was causing the issue.

I immediately communicated with the rest of the IT team to isolate the problem area and keep everyone updated on our progress. We rerouted traffic to minimize the impact while I reconfigured the switch. Within 30 minutes, we had the network back up and running. Afterward, I worked on a root cause analysis and implemented preventive measures to avoid a similar issue in the future. The finance team was able to meet their deadline, and the experience reinforced the importance of quick thinking and clear communication in crisis situations.”

278
Q

Why is redundancy important in network design?

A

Redundancy is crucial because it ensures network reliability and minimizes downtime. In my previous role, we had a client who experienced a significant outage because their single point of failure was a core switch that went down. To address this, we implemented redundant paths and devices, like additional switches and multiple ISPs, to create a failover system. This way, if one component failed, the network could automatically switch to a backup route, maintaining service continuity.

278
Q

When would you deploy a firewall, and what configuration steps are critical?

A

Deploying a firewall is crucial when setting up any new network or enhancing security for an existing one, especially when sensitive data is involved. The first step is to understand the specific needs of the network and the potential threats it faces. After selecting an appropriate firewall, whether hardware or software-based, the initial configuration involves defining the security policies that align with the organization’s requirements.

Critical steps include setting up access control lists to allow or deny traffic based on IP addresses, ports, and protocols. Implementing intrusion detection and prevention systems (IDPS) to monitor and block suspicious activities is also essential. Additionally, configuring logging and monitoring to ensure that all traffic is recorded and analyzed for anomalies helps in proactive threat management. Regularly updating the firewall firmware and ruleset to protect against new vulnerabilities is equally vital. Ensuring these steps are meticulously followed can significantly bolster the network’s security posture.”

279
Q

give an example of how you ensured secure remote access for users?

A

Absolutely, ensuring secure remote access is critical. In a previous role, I was tasked with setting up a secure remote access solution for a company transitioning to a hybrid work model. I implemented a VPN with multi-factor authentication to ensure that only authorized users could access the network.

Additionally, I conducted regular training sessions with employees to emphasize the importance of strong passwords and recognizing phishing attempts. I also monitored network traffic for any unusual activity, ensuring we could respond swiftly to potential security threats. This comprehensive approach not only secured our remote access but also boosted overall network security awareness among the staff.”

280
Q

network segmentation.

A

Network segmentation is a technique used to enhance security and improve performance by dividing a network into smaller, manageable sub-networks. I configured the switches and routers to enforce the segmentation, setting up access control lists to ensure that only authorized personnel could access specific segments. The most rewarding part was training the internal team on how to manage and monitor the segmented network, ensuring they understood the importance of maintaining the new structure. This implementation significantly reduced the potential attack surface and improved the overall security posture of the company.”

280
Q

How do you stay current with emerging networking technologies?

A

I make it a priority to stay up-to-date with the latest in networking technologies by regularly attending industry conferences and webinars. I’m an active member of a few professional organizations like the IEEE and I often participate in their online forums and discussion groups. I also subscribe to several tech journals and blogs, such as Network World and Ars Technica, to keep tabs on new developments and trends.

280
Q

Discuss a situation where you had to collaborate with other IT staff to resolve a complex issue.

A

We had a situation where the entire company’s network was experiencing intermittent outages, and it was causing major disruptions. It was clear this wasn’t a one-person job, so I immediately coordinated with the systems administrator and the cybersecurity team to tackle the problem from multiple angles.

We held a quick huddle to delegate tasks—while I focused on monitoring and analyzing the network traffic for any anomalies, the systems admin checked the server health and configurations, and the cybersecurity team looked for any potential security breaches. By combining our expertise, we identified the issue: a misconfigured router that was

280
Q

How do you manage firmware updates across network devices?

A

irst, I ensure that I have a comprehensive inventory of all network devices and their current firmware versions. This helps in identifying which devices need updates. I then schedule updates during off-peak hours to minimize disruption. Before proceeding, I always review the release notes for the new firmware to understand its impact and any new features or fixes it offers.

I usually start with a test run on a subset of devices to ensure compatibility and stability. Once verified, I deploy the updates in phases across the network, monitoring each phase for issues. Automation tools like Ansible or scripts can be very helpful in managing and rolling out updates efficiently. Post-update, I run diagnostics to ensure everything is functioning correctly and document the process for future reference. This structured approach helps maintain network stability while keeping firmware up to date.”

281
Q

Can you describe a situation where you had to troubleshoot a network issue? How did you identify the problem, and what steps did you take to resolve it?

A

“I identified network congestion due to a faulty switch, which was causing slow speeds. I replaced the switch, resolved the issue, and documented the solution for future reference.”

281
Q

How do you prioritize customer support tickets when dealing with several network issues at once?

A

“I prioritize based on impact—critical issues affecting many users or key services go first. I keep customers informed on the progress and escalate when necessary.”

282
Q

What experience do you have with Microsoft Operating Systems and their administration?

A

“I’ve managed Active Directory, handled user accounts, and performed patch management on both Windows Server and desktop OS, ensuring systems were up-to-date and secure.”

283
Q

Have you worked with VoIP or wireless networks before?

A

“Yes, I’ve resolved VoIP call drop issues by configuring QoS to prioritize traffic and troubleshooting wireless connectivity problems by optimizing AP placement and settings.”

283
Q

Tell me about a time when you had to communicate a technical issue to a non-technical customer.

A

I explained a server downtime to a customer by comparing it to a traffic jam and kept them updated with clear, simple language until the issue was resolved.”

284
Q

How do you handle situations where you don’t immediately know the solution to a problem?

Answer:

A

“I research the issue using available resources, consult with team members if needed, and escalate when necessary. I also learn from the experience for future reference.”

285
Q

Can you explain the importance of system maintenance and monitoring in a network environment?

A

“Regular maintenance and monitoring prevent outages, improve network performance, and allow us to proactively resolve issues before they affect users.”

286
Q

How do you handle working independently while also working within a team?

A

“I manage tasks independently but collaborate with my team when needed, sharing updates and seeking help to ensure quick problem resolution.”

287
Q

What motivates you to stay organized and detail-oriented, especially when managing multiple technical issues?

A

“Using ticket systems and clear documentation helps me stay organized, ensures I don’t miss any steps, and improves efficiency in resolving issues.”