40
edits
No edit summary |
No edit summary |
||
Line 1: | Line 1: | ||
==Network Admin== | ==Network Admin== | ||
=Magnet= | |||
Back to [[Interview Questions]] | Back to [[Interview Questions]] | ||
Line 22: | Line 24: | ||
*What 5 networking books do you think every network engineer should read? | *What 5 networking books do you think every network engineer should read? | ||
=HEAnet= | |||
* Can you explain how to work out how many addresses are usable in a standard subnet? | |||
* If you had to write some code to see if an IP address was in a particular subnet, how would you do it? | |||
* What is a VLAN? How do they work? | |||
* Can you explain some differences between, and give examples of when you would use HSRP, VRRP and BGP for resilience? | |||
* Give an example of when you might use, or have used, tcpdump/ethtool/sniffer ? | |||
* Updating ACLs safely, how would you go about it? | |||
* Can you describe the three-way handshake, roughly? | |||
* What's a link-state protocol? | |||
* Do you know what an administrative distance is? Any examples? | |||
* PKI: Can you describe, roughly how Public Key Cyrpto works? If a protocol is encrypted, how can it be proxied? |
edits