215
edits
No edit summary |
|||
| (4 intermediate revisions by 2 users not shown) | |||
| Line 1: | Line 1: | ||
[[Category:Jobs]] | |||
==Network Admin== | ==Network Admin== | ||
Back to [[Interview Questions]] | Back to [[Interview Questions]] | ||
'''Magnet''' | |||
*List the RFC1918 private address space blocks. | *List the RFC1918 private address space blocks. | ||
| Line 21: | Line 24: | ||
*What do you know about IP address and AS number exhaustion? What current and future methods are you aware of to combat both of these problems? | *What do you know about IP address and AS number exhaustion? What current and future methods are you aware of to combat both of these problems? | ||
*What 5 networking books do you think every network engineer should read? | *What 5 networking books do you think every network engineer should read ? | ||
'''HEAnet''' | |||
* Can you explain how to work out how many addresses are usable in a standard subnet? | |||
* If you had to write some code to see if an IP address was in a particular subnet, how would you do it? | |||
* What is a VLAN? How do they work? | |||
* Can you explain some differences between, and give examples of when you would use HSRP, VRRP and BGP for resilience? | |||
* Give an example of when you might use, or have used, tcpdump/ethtool/sniffer ? | |||
* Updating ACLs safely, how would you go about it? | |||
* Can you describe the three-way handshake, roughly? | |||
* What's a link-state protocol? | |||
* Do you know what an administrative distance is? Any examples? | |||
* PKI: Can you describe, roughly how Public Key Cyrpto works? If a protocol is encrypted, how can it be proxied? | |||