Networking Administration Interview Questions
Questions Answers Views Company eMail

It is advisable not to use telnet because of security problems. Which program should you use instead ?

1 2091

Which freeware program will let you have fine-grain control over which machines can or can not telnet/rlogin into your machine ?

1 1752

You have an account in your machine with user id of 0, but it is not root. Will this user have superuser previleges ?

1 2100

What is called a set of physically connected computers in relatively small physical area.

1 1702

In network topology what is called as one large coaxial cable joins all the computers.

1 1681

Which topology, uses centralized hub from which a number of signals carrying cables goes out to individual devices on the branch.

1 1877

Which topology is like the star topology except output node connects to the input of the next node.

1 1753

What is a device that amplifies and regenerates the data signal bit by bit.

1 1957

repeator, bridge, switch, router, gateway, or hub are examples of

1 1902

ATM uses howmany bytes long cells.

1 2000

Which option of the snoop command tells it to be verbose ?

1 1981

Which option of the snoop command tells it to display from a host ?

1 2127

Which command tells the state of the Ethernet interfaces ?

1 1884

Your Ultra 1 has a 100Mbps Fast Ethernet Card. What is the name of the interface ?

1 2313

Which command displays information about network interface hme0 ?

1 2068


Post New Networking Administration Questions

Un-Answered Questions { Networking Administration }

What is the major disadvantage of a star topology?

551


When you connect two redundant links of switch to hub to form a loop , and when the switch receives its own BPDU what it will do.

3628


List the functions of a network administrator?

612


Explain the maximum length allowed for a utp cable?

599


Explain the importance of implementing a fault tolerance system? Are there limitations?

545






Port modes [trunk and access] have any influence on VLAN tagging and un-tagging?

1390


Give some private network addresses examples?

528


What can be considered as good passwords?

566


What is meant my data qutoe error In ms office

2274


Do you know what is the purpose of cables being shielded and having twisted pairs?

902


respected sir., i need knowledge, i want to do R.H.E.C but problem is this i am science graduate and a new to software line, i want to develop my carrier in I.t sector. please guide. thanks

1652


How network topology affect your decision in setting up a network?

731


Which protocol can be applied when you want to transfer files between different platforms, such between unix systems and windows servers?

643


Explain the importance of encryption on a network?

539


Explain 802.1Q header?.

1647