Network Admin: Difference between revisions

From Redbrick Wiki
Jump to navigation Jump to search
mNo edit summary
No edit summary
 
(2 intermediate revisions by 2 users not shown)
Line 1: Line 1:
{{outdated}}
[[Category:Jobs]]
==Network Admin==
==Network Admin==


Line 23: Line 26:
*What do you know about IP address and AS number exhaustion?  What current and future methods are you aware of to combat both of these problems?
*What do you know about IP address and AS number exhaustion?  What current and future methods are you aware of to combat both of these problems?


*What 5 networking books do you think every network engineer should read?
*What 5 networking books do you think every network engineer should read ?





Latest revision as of 23:27, 21 April 2026

IMPORTANT: The content of this page is outdated. If you have checked or updated this page and found the content to be suitable, please remove this notice.

Network Admin

Back to Interview Questions

Magnet

  • List the RFC1918 private address space blocks.
  • OSPF is a link state routing protocol. What is meant by the term link state?
  • What is the Spanning Tree protocol used for?
  • What is the function of an Rendezvous Point (RP) in a multicast PIM-Sparse Mode network ?
  • What is control plane policing ?
  • List 7 fields in the IPv4 header and their sizes in bits ?
  • Write an outgoing route-map for a bgp session, advertising all bgp routes, except those containing AS 34245?
  • What do you know about global routing table size increases? What problem is it causing and what are engineer.s doing to try and alleviate the problems it's causing?
  • What do you know about IP address and AS number exhaustion? What current and future methods are you aware of to combat both of these problems?
  • What 5 networking books do you think every network engineer should read ?


HEAnet

  • Can you explain how to work out how many addresses are usable in a standard subnet?
  • If you had to write some code to see if an IP address was in a particular subnet, how would you do it?
  • What is a VLAN? How do they work?
  • Can you explain some differences between, and give examples of when you would use HSRP, VRRP and BGP for resilience?
  • Give an example of when you might use, or have used, tcpdump/ethtool/sniffer ?
  • Updating ACLs safely, how would you go about it?
  • Can you describe the three-way handshake, roughly?
  • What's a link-state protocol?
  • Do you know what an administrative distance is? Any examples?
  • PKI: Can you describe, roughly how Public Key Cyrpto works? If a protocol is encrypted, how can it be proxied?