|
|
| Line 26: |
Line 26: |
|
| |
|
| * What is IRQ balancing, how would you do it? What does 64-bit computing really mean? | | * What is IRQ balancing, how would you do it? What does 64-bit computing really mean? |
|
| |
|
| |
| ===Network administration:===
| |
|
| |
| * Can you explain how to work out how many addresses are usable in a standard subnet?
| |
|
| |
| * If you had to write some code to see if an IP address was in a particular subnet, how would you do it?
| |
|
| |
| * What is a VLAN? How do they work?
| |
|
| |
| * Can you explain some differences between, and give examples of when you would use HSRP, VRRP and BGP for resilience?
| |
|
| |
| * Give an example of when you might use, or have used, tcpdump/ethtool/sniffer ?
| |
|
| |
| * Updating ACLs safely, how would you go about it?
| |
|
| |
| * Can you describe the three-way handshake, roughly?
| |
|
| |
| * What's a link-state protocol?
| |
|
| |
| * Do you know what an administrative distance is? Any examples?
| |
|
| |
| * PKI: Can you describe, roughly how Public Key Cyrpto works? If a protocol is encrypted, how can it be proxied?
| |