Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
Page 1 of 5
jayant5805
Sign Out
CERTKNOWLEDGE.COM (BEST FORUM FOR SHARING YOUR KNOWLEDGE) TECHNICAL TUTORIAL SECTION INTERVIEW QUESTIONS CISCO
OFFLINE
Zeus
General Questions
Q. Describe the network environments of the organizations that you have supported in the past.
A. This general question provides you with an opportunity to start the conversation regarding the techno
s that you have experience with. Be descriptive in your answer. Include the number of users, number of remote sites,
types of systems, type of connectivity between sites, network configuration, ISP used, routers/switches used, and the size
of the overall engineering team. Also include who you reported to and the management style of that manager.
Q. What is TCP/IP?
A. This is a great question in that it forces the candidate to display their knowledge of the protocol.
http://www.certknowledge.com/ipb/topic/3306-interview-questions-for-system-engineer-... 15/10/2013
Interview Questions for System Engineer/ Net. Eng. - CISCO - CERTKNOWLEDGE.CO... Page 2 of 5
Q. Have you ever been in a situation where you found yourself without the specific technical knowledge
to perform a task essential to your project? What did you do?
A. This question is one that every engineer should have an answer for. It should be relatively easy to answerbe truthful
without showing a weakness in ability. This is when a good researching talent comes in handy. No one expects an engineer
to have memorized all of the information necessary to perform his job, but you need to have the skills to find the correct
information quickly.
Q. Describe what a password policy is and the reasons for having one. Give an example of a policy and its
rule set.
A. This is one of the most important and overlooked details in a secure network. Youll get pushback from the users, but
they will adjust. An engineer must be well versed in security and the policies required to implement and maintain it.
Q. How (and how often) should you test your disaster recovery plan?
A. Again, disaster recovery plans are a critical part of a network engineers job. A disaster recovery plan should be tested
by doing an actual rebuild and restore of critical systems at least once every six months (or when major data or
infrastructure changes occur).
Q. How often do you change the administrator passwords and accounts on local machines and domains?
A. Here is another area that doesnt seem to get the attention it deserves. These passwords should be changed as part of a
global password policy, and immediately upon any change of personnel who have knowledge of or access to the accounts
and/or passwords.
Q. How often should a server be accessed to have the logs and drive space checked?
A. Although there is no set rule for this, it is a good idea to physically access each server at least once a week to check its
overall health. There are a variety of applications that will alert you to errors and error conditions, but nothing replaces
actually being logged into the server itself to get a good look at its performance.
Q. How many servers were you responsible for monitoring, maintaining, upgrading, and handling
disaster recovery?
A. For effective coverage, an engineer should be able to manage 2025 servers. There are often times when this number is
http://www.certknowledge.com/ipb/topic/3306-interview-questions-for-system-engineer-... 15/10/2013
Interview Questions for System Engineer/ Net. Eng. - CISCO - CERTKNOWLEDGE.CO... Page 3 of 5
much higher. This is when a good knowledge of the third-party tools available is handy. Certain systems, such as SQL,
require more attention more frequently.
Networking
Q. What is a router?
A. A router is a device that connects more than one physical network, or segments of a network, using IP routing software
. As packets reach the router, the router reads them and forwards them to their destination.
Q. What is OSPF?
A. Open Shortest Path First is a routing protocol that supports the concept of a core area to which everything attaches.
Q. What is BGP?
A. Border Gateway Protocol is used for routing between networks on the Internet core, and it supports many advanced
routing features.
http://www.certknowledge.com/ipb/topic/3306-interview-questions-for-system-engineer-... 15/10/2013
Interview Questions for System Engineer/ Net. Eng. - CISCO - CERTKNOWLEDGE.CO... Page 4 of 5
Q. What is VLANing?
A. Virtual LAN is used on large LANs to break up the network into smaller broadcast domains. This creates communities
of interest. These communities can be based around organizational structures.
Q. What is CIDR?
A. Classless Internet domain routing is used in conjunction with classless routing protocols to summarize the Internet
into smaller routing tables.
Q. What is VLSM?
A. Variable Length Subnet Mask is used to allocate the amount of address space required by the end network.
Q. You are the administrator of a 100-station Ethernet network. Your users are complaining of slow
network speeds. What could you replace your hub with to increase your network throughput?
A. A switch would increase performance by making virtual, direct connections between sender and receiver. A bridge and
router would actually decrease performance because these devices introduce latency into the communication.
Q. Which TCP/IP utility is most often used to test whether an IP host is up and functional?
A. The Ping utility is the most often used TCP/IP utility because it allows you to test individual hosts.
Q. Which utility can you use to find the MAC and TCP/IP address of your Windows NT or 2000
workstation?
A. The ipconfig utility is available for both these operating systems. It displays information like the MAC and TCP/IP
address of your workstation as well as other TCP/IP configuration information.
http://www.certknowledge.com/ipb/topic/3306-interview-questions-for-system-engineer-... 15/10/2013
Interview Questions for System Engineer/ Net. Eng. - CISCO - CERTKNOWLEDGE.CO... Page 5 of 5
Q. You are setting up a workstation for remote access to the office. The office has a modem pool
configured, and it is working correctly. The required results are that the workstation and modem bank
must establish a connection and that the server at the office must authenticate the workstation.
Optionally, the workstation and office must be able to communicate by using a single protocol, and the
workstation must be able to access all network devices at the office. The proposed solution is to install a
POTS telephone line, modem cable, and modem connected to the workstation. How would you configure
the protocols to achieve the desired results?
A. This question tests your ability to configure protocols and select the best one to meet the connectivity requirements.
The recommended protocol here would be TCP/IP since it can be used across the different access methods.
Q. Which remote access protocol can run over both serial and parallel connections?
A. Because PPP doesnt contain a physical layer specification as part of the protocol, it can run over any kind of medium.
Q. What Microsoft TCP/IP protocol can be used over the Internet to create a secure, virtual network?
A. The Point-to-Point Tunneling Protocol (PPTP) allows you to create a secure, virtual connection between two points by
tunneling one protocol inside another. Usually, a PPP connection is opened over a TCP/IP link.
Q. Which type of firewall checks for a current communication and the next packet needed?
A. A proxy provides firewall services by keeping track of all communications sessions and prefetching the next packets.
Q. Which type of security uses a file that identifies predefined IP addresses that are allowed to send data
through a router?
A. Access Control List security uses a file (the ACL) that identifies which addresses can send data through a particular
firewall or router.
Credits : John
Thanked by 1 Member:
rtsomaya
Back to CISCO
CERTKNOWLEDGE.COM (BEST FORUM FOR SHARING YOUR KNOWLEDGE) TECHNICAL TUTORIAL SECTION INTERVIEW QUESTIONS CISCO
http://www.certknowledge.com/ipb/topic/3306-interview-questions-for-system-engineer-... 15/10/2013