Networking Interview Questions
Questions Answers Views Company eMail

To configure "Local Mail in Local Mode", who provides /var/mail ?

1 1612

To configure "Local Mail in RemoteMode", who provides /var/mail ?

1 1860

3 types of mail access supported by IMAP4 are:

1 2001

Mail messages remain on the server while being manipulated by client. This is the _______ type mail access supported by IMAP4.

1 1714

Remote user downloads mail messages to a client where messages are cached. This is the ______ type mail access supported by IMAP4.

1 1596

Which two packages contain sendmail ?

1 1947

Which script will find unsafe permissions (sendmail related) ?

1 2089

Which program will check if sendmail can determine the system's fully-qualified host name ?

1 1925

Which subdirectory of /usr/lib/mail contains the configuration files for sendmail ?

1 1919

Which directory contains files that describe different mailers ?

1 1709

Which macro defines optional features that are included in the sendmail.cf file ?

1 1852

Which is the main sendmail configuaryion file ?

1 1871

Which machines use the /etc/main.cf file ?

1 2051

A machine that is not a mail host, relay host, or gateway would use which file ?

1 1886

You want to make your own configuration file for sendmail. After editing the appropriate files, which program would you run to compile your new configuration file ?

1 1812


Un-Answered Questions { Networking }

Explain the process of signaling for call between two phones registered on a CME where all three devices are connected on the same switch.

189


Describe a recent short term stressful situation and how you managed it?

1852


How does tcp ip socket work?

597


Explain dhcp briefly?

192


one server is down it doen't display anything what you do?

1390






diff between /etc/inetd and smf?

1441


VLAN tagging/un-tagging process –where and when it happens?

1604


Give one disadvantage of a peer to peer network?

609


What can an ip address tell me?

587


Explain leaky bucket algorithm and compare it with token bucket algorithm.

2066


what is upsizing and downizing?

2164


Explain the difference between discretionary access control and mandatory access control?

551


What do you understand by mac address?

107


Explain how names are translated (resolved) into ip address?

608


List out the main responsibilities of the network layer.

1385