In this post you will learn Network administrator interview questions and answers. These questions from basic to advanced level interview questions.
1. What is Network?
A network is a set of devices connected by physical media links. It is used to share resources such as data, printers,CD-ROM and exchanging files. The main purpose of the networking is to share information.
2.What is firewall and how it is used?
A firewall is simply a program or hardware device that filters the information coming through the Internet connection into your private network or computer system. If an incoming packet of information is flagged by the filters, it is not allowed through. Firewall prevents a connection between two or multiple sources; it basically blocks any incoming or outgoing traffic.
3. What type of authentication do you use for network access?
Knowledge of different types of authentication, an understanding of different security protocols
"Two-factor authentication is substantially more secure than single factor authentication. For sensitive information, I would definitely recommend an upgrade if you don't already use two-factor authentication. Biometrics are often the easiest for users, provided you already have the hardware. If not, a token is a great way to add security without spending a lot on hardware."
4. Difference Between workgroup and Domain?
With a Workgroup you have a collection of systems that are connected to the same network but have their own set of rules and permission set at local level. With a Domain you have a group of systems that are bound by the rules of centralized authentication server. In a Domain each system has to connect through the Domain server using provided credentials.
5. What is 255.255.255.255 used for?
A broadcast Address is always relative to a given network, there is no broadcast ; when you have a network, you can compute its Broadcast Address by replacing all the host bits with 1s; simply put, the broadcast address is the highest numbered address you can have on the network, while the network address is the lowest one (with all host bits set to 0s); this is why you can't use either of them as actual host addresses: they are reserved for this use.
If your network is 192.168.1.0/24, then your network address will be 192.168.1.0 and your broadcast address will be 192.168.1.255.
If your network is 192.168.0.0/16, then your network address will be 192.168.0.0 and your broadcast address will be 192.168.255.255.
And so on...
255.255.255.255 is a special broadcast address, which means "this network": it lets you send a broadcast packet to the network you're connected to, without actually caring about its address; in this, is similar to 127.0.0.1, which is a virtual address meaning "local host".
6 Can you name different types of network cables?
Cat-5 runs at 100Mb/s maximum, Cat-5e can run up to 1Gb/s, and Cat-6 can run up to 1OGb/s connection speed. All cables are limited to 100 meters distance in order to run at optimum speed
7 What is TCP/IP?
Transmission Control Protocol/Internet Protocol (TCP/IP) is a networking protocol that allows two computers to Communicate.TCP is used in conjunction with IP in order to maintain a connection between the sender and the target and to ensure packet order.
The Internet Protocol (IP) is the address system of the Internet and has the core function of delivering packets of information from a source device to a target device. IP is the primary way in which network connections are made, and it establishes the basis of the Internet. IP does not handle packet ordering or error checking. Such functionality requires another protocol, typically TCP
8. What is UDP? Use of UDP?
UDP is a communication protocol used across the Internet for especially time-sensitive transmissions such as video playback or DNS lookups. It speeds up communications by not requiring what’s known as a “handshake”, allowing data to be transferred before the receiving party agrees to the communication. This allows the protocol to operate very quickly, and also creates an opening for exploitation.
9. What is Proxy Server? Use of Proxy Server?
A proxy server is basically another computer which serves as a hub through which internet requests are processed. By connecting through one of these servers, your computer sends your requests to the server which then processes your request and returns what you were wanting. In this way it serves as an intermediary between your home machine and the rest of the computers on the internet.
If you want to surf the web anonymously then proxies can provide you with a means to hide your home IP address from the rest of the world. By connecting to the internet through proxies, the home IP address of your machine will not be shown but rather the IP of the proxy server will be shown. This can provide you with more privacy then if you were simply connecting directly to the internet
10. What is the maximum length of UTP cable allowed?
The maximum length of UTP is 90 to 100 meters for a single segment connection. If you have a switch or a repeater it can compensate for this limitation.
11. How can you tell a connection is passed between local host and server?
The tracert command is a Command Prompt command that's used to show several details about the path that a packet takes from the computer or device you're on to whatever destination you specify. It is used for troubleshooting dead connections as well.
12. What is VPN Network? What is the use of it?
In very simple terms, a VPN connects your PC, smartphone, or tablet to another computer (called a server) somewhere on the internet, and allows you to browse the internet using that computer’s internet connection. So if that server is in a different country, it will appear as if you are coming from that country, and you can potentially access things that you couldn’t normally.
Bypass geographic restrictions on websites or streaming audio and video.
Watch streaming media like Netflix
Protect yourself from snooping on untrustworthy Wi-Fi hotspots.
Gain at least some anonymity online by hiding your true location.
Protect yourself from being logged while torrenting.
13. What is DHCP?
DHCP (Dynamic Host Configuration Protocol) is a network management protocol used to dynamically assign an Internet Protocol (IP) address to any device, or node, on a network so they can communicate using IP. DHCP automates and centrally manages these configurations rather than requiring network administrators to manually assign IP addresses to all network devices. DHCP can be implemented on small local networks, as well as large enterprise networks.
DHCP will assign new IP addresses in each location when devices are moved from place to place, which means network administrators do not have to manually configure each device with a valid IP address or reconfigure the device with a new IP address if it moves to a new location on the network.
14. What is FTP?
FTP stands for File transfer protocol.FTP is a standard internet protocol provided by TCP/IP used for transmitting the files from one host to another.It is mainly used for transferring the web page files from their creator to the computer that acts as a server for other computers on the internet.It is also used for downloading the files to computer from other servers.
15. What is Subnet?
A subnet is a logical partition of an IP network into multiple, smaller network segments