Important Network Administrator Interview Preparation Guide
Download PDF

Network Administrator frequently Asked Questions in various Network Administrator job Interviews by interviewer. The set of questions here ensures that you offer a perfect answer posed to you. So get preparation for your new job hunting

105 Network Administrator Questions and Answers:

Table of Contents:

Important  Network Administrator Job Interview Questions and Answers
Important Network Administrator Job Interview Questions and Answers

1 :: Tell me do you find it difficult to work for long hours in front of a computer?

The work of a network administrator is just that - long hours in front of computers. There is not much traveling involved. Minimal physical activity may be required when troubleshooting hardware. Sometimes it is necessary to come down to the specific station to investigate the problem. But mostly, the administrator communicates via phone or internet and offers support from behind his own desk.

2 :: What characterizes a professional network administrator?

Network administrators are typically enthusiastic about everything computer related and have a perfect understanding of what might go wrong. They are friendly people, though not necessarily charismatic leaders or great speakers. They give quick, cordial, and, most importantly, extremely efficient service.

3 :: What experience you have with security support and maintenance?

Network administrators deal primarily with whole systems of corporate computers. They are hired to plan out in advance the company's computer security. They implement it and perform regular maintenance. Security involves firewall installation, cryptography, adding or deleting users, backup and recovery, etc.

4 :: What is network architecture?

Network administrators deal with systems. These systems have what is called "architecture." Some administrators, but not all, specialize in the structure of computer systems.

5 :: How to perform system maintenance?

Network administrators run checks to detect and prevent bugs, breakdowns, viruses, hackers, etc. They are always up-to-date with the latest enhancements in the market and install upgrades whenever necessary.

6 :: Define data encapsulation?

Data encapsulation is the process of breaking down information into smaller manageable chunks before it is transmitted across the network. It is also in this process that the source and destination addresses are attached into the headers, along with parity checks.

7 :: Define network topology?

Network Topology refers to the layout of a computer network. It shows how devices and cables are physically laid out, as well as how they connect to one another.

8 :: Describe VPN?

VPN means Virtual Private Network, a technology that allows a secure tunnel to be created across a network such as the Internet. For example, VPNs allow you to establish a secure dial-up connection to a remote server.

9 :: Define NAT?

NAT is Network Address Translation. This is a protocol that provides a way for multiple computers on a common network to share single connection to the Internet.

10 :: Do you know about the job of the network layer under the OSI reference model?

The Network layer is responsible for data routing, packet switching and control of network congestion. Routers operate under this layer.

11 :: How network topology affect your decision in setting up a network?

Network topology dictates what media you must use to interconnect devices. It also serves as basis on what materials, connector and terminations that is applicable for the setup.

12 :: Define RIP?

RIP, short for Routing Information Protocol is used by routers to send data from one network to another. It efficiently manages routing data by broadcasting its routing table to all other routers within the network. It determines the network distance in units of hops.

13 :: How to securing a computer network?

There are several ways to do this. Install reliable and updated anti-virus program on all computers. Make sure firewalls are setup and configured properly. User authentication will also help a lot. All of these combined would make a highly secured network.

14 :: Define NIC?

NIC is short for Network Interface Card. This is a peripheral card that is attached to a PC in order to connect to a network. Every NIC has its own MAC address that identifies the PC on the network.

15 :: Define WAN?

WAN stands for Wide Area Network. It is an interconnection of computers and devices that are geographically dispersed. It connects networks that are located in different regions and countries.

16 :: Give the importance of the OSI physical layer?

The physical layer does the conversion from data bits to electrical signal, and vice versa. This is where network devices and cable types are considered and setup.

17 :: How many layers are under TCP/IP?

There are four layers: the Network Layer, Internet Layer, Transport Layer and Application Layer.

18 :: Define proxy servers and how do they protect computer networks?

Proxy servers primarily prevent external users who identifying the IP addresses of an internal network. Without knowledge of the correct IP address, even the physical location of the network cannot be identified. Proxy servers can make a network virtually invisible to external users.

19 :: Give the function of the OSI session layer?

This layer provides the protocols and means for two devices on the network to communicate with each other by holding a session. This includes setting up the session, managing information exchange during the session, and tear-down process upon termination of the session.

20 :: Give the importance of implementing a Fault Tolerance System? Are there limitations?

A fault tolerance system ensures continuous data availability. This is done by eliminating a single point of failure. However, this type of system would not be able to protect data in some cases, such as in accidental deletions.

21 :: Define 10Base-T?

The 10 refers to the data transfer rate, in this case is 10Mbps. The word Base refers to base band, as oppose to broad band. T means twisted pair, which is the cable used for that network.

22 :: Explain private IP address?

Private IP addresses are assigned for use on intranets. These addresses are used for internal networks and are not routable on external public networks. These ensures that no conflicts are present among internal networks while at the same time the same range of private IP addresses are reusable for multiple intranets since they do not "see" each other.

23 :: Define NOS?

NOS, or Network Operating System, is specialized software whose main task is to provide network connectivity to a computer in order for it to be able to communicate with other computers and connected devices.

24 :: Define DoS?

DoS, or Denial-of-Service attack, is an attempt to prevent users from being able to access the internet or any other network services. Such attacks may come in different forms and are done by a group of perpetuators. One common method of doing this is to overload the system server so it cannot anymore process legitimate traffic and will be forced to reset.

25 :: What is OSI and it's role in computer networking?

OSI (Open Systems Interconnect) serves as a reference model for data communication. It is made up of 7 layers, with each layer defining a particular aspect on how network devices connect and communicate with one another. One layer may deal with the physical media used, while another layer dictates how data is actually transmitted across the network.
Network Administrator Interview Questions and Answers
105 Network Administrator Interview Questions and Answers