Network Administrator Interview Questions And Answers

Network Administrator Interview Questions list for experienced

  1. What is HTTP and what port does it use?
  2. What is HTTPS and what port does it use?
  3. What is FTP and what port does it use?
  4. What is SSH and what port does it use?
  5. What is TCP?
  6. What is UDP?
  7. What are IP Classes?
  8. What is DNS?
  9. What is IPX?
  10. What is Bonjour?
  11. What is Appletalk?
  12. What is a Firewall?
  13. What is a Proxy Server?
  14. What are Services?
  15. What is a subnet mask?
  16. What are 127.0.0.1 and localhost?
  17. What is the difference between a Workgroup and a Domain?
  18. How does Tracert work and what protocol does it use?
  19. What is Two-Factor Authentication?
  20. What is an IDS?
  21. What are the main differences between Windows Home, Windows Pro and Windows Server?
  22. What is the difference between ifconfig and ipconfig?
  23. What are the differences between PowerShell, Command Prompt and Bash?
  24. What is root?
  25. What is telnet?
  26. What are sticky ports?
  27. Why would you add local users when on a domain machine?
  28. What is ARP?
  29. What is EFS?
  30. What is Boot to LAN?
  31. What are Terminal Services?
  32. What are Shadow Copies?
  33. Why would you use external media such as Tapes or Hard Disks for Backups?
  34. What is the difference between RDP and KVM?
  35. What is the difference between a print server and a network attached printer?
  36. What is /etc/passwd?
  37. What is port forwarding?
  38. Why would you virtualize systems?
  39. Why would you create logon scripts?
  40. What is the difference between Single Mode and Multimode Fiber?
  41. What does it mean when you receive an NTFS Error: 5?
  42. What are 755 and 644 Unix/Linux Permissions?
  43. Why is it easier to maintain permissions via groups instead of individually?
  44. What is the difference between a Forest, a Tree, and a Domain?
  45. What are the differences between Local, Global and Universal Groups?
  46. What are Strong Password Requirements?
  47. What is SNMP?

Network Administrator interview questions and answers on advance and basic Network Administrator with example so this page for both freshers and experienced condidate. Fill the form below we will send the all interview questions on Network Administrator also add your Questions if any you have to ask and for apply in Network Administrator Tutorials and Training course just send a mail on info@pcds.co.in in detail about your self.

Top Network Administrator interview questions and answers for freshers and experienced

What is Network Administrator ?

Answer :

Questions : 1 :: What is HTTP and what port does it use?

HTTP or HyperText Transfer Protocol, is the main protocol responsible for shiny content on the Web. Most webpages still use this protocol to transmit their basic website content and allows for...View answers

Questions : 2 :: What is HTTPS and what port does it use?

HTTPS or Secure HTTP (Not to be confused with SHTTP, which is an unrelated protocol), is HTTP’s big brother. Designed to be able to be used for identity verification, HTTPS uses SSL...View answers

Questions : 3 :: What is FTP and what port does it use?


FTP or File Transfer Protocol, is one of the big legacy protocols that probably should be retired. FTP is primarily designed for large file transfers, with the capability of resuming...View answers

Questions : 4 :: What is SSH and what port does it use?

SSH or Secure Shell is most well known by Linux users, but has a great deal that it can be used for. SSH is designed to create a secure tunnel between devices, whether that be systems, switches,...View answers

Questions : 5 :: What is TCP?

Even if you don’t recognize anything else on this list, you like have heard of TCP/IP before. Contrary to popular believe, TCP/IP is not actually a protocol, but rather TCP is a member of...View answers

Questions : 6 :: What is UDP?


The twin to TCP is UDP- User Datagram Protocol. Where TCP has a lot of additional under-the-hood features to make sure that everybody stays on the same page, UDP can broadcast ‘into the...View answers

Questions : 7 :: What are IP Classes?

For the IP address that most people are familiar with (IPv4), there are 4 sets (octets) of numbers, each with values of up to 255. You likely have run into this when troubleshooting a router or a...View answers

Questions : 8 :: What is DNS?

DNS is the Internet’s phone book. The Domain Name System is what makes it possible to only have to remember something like “cnn.com” instead of (at this particular moment)...View answers

Questions : 9 :: What is IPX?


If you did any multiplayer PC gaming in the 90s and early 2000s, you likely knew of the IPX protocol as ‘the one that actually works’. IPX or Internetwork Packet Exchange was an...View answers

Questions : 10 :: What is Bonjour?

Bonjour is one of the programs that come bundled with nearly every piece of Apple software (most notably iTunes) that handles a lot of its automatic discovery techniques. Best described as a...View answers

Questions : 11 :: What is Appletalk?

 Appletalk is a protocol developed by Apple to handle networking with little to no configuration (you may be sensing a pattern here). It reached its peak in the late 80s and early 90s, but...View answers

Questions : 12 :: What is a Firewall?

A Firewall put simply keeps stuff from here talking to stuff over there. Firewalls exist in many different possible configurations with both hardware and software options as well as network and...View answers

Questions : 13 :: What is a Proxy Server?

Similar to how a DNS server caches the addresses of accessed websites, a proxy server caches the contents of those websites and handles the heavy lifting of access and retrieval for users. Proxy...View answers

Questions : 14 :: What are Services?

Services are programs that run in the background based on a particular system status such as startup. Services exist across nearly all modern operating systems, although vary in their naming...View answers

Questions : 15 :: What is a subnet mask?

A subnet mask tells the network how big it is. When an address is inside the mask, it will be handled internally as a part of the local network. When it is outside, it will be handled differently...View answers

Questions : 16 :: What are 127.0.0.1 and localhost?

Being able to ping out to a server and see if its responding is a great way to troubleshoot connectivity issues. But what if you’re not able to ping ANY server? Does that mean that your...View answers

Questions : 17 :: What is the difference between a Workgroup and a Domain?

A workgroup is a collection of systems each with their own rules and local user logins tied to that particular system. A Domain is a collection of systems with a centralized authentication server...View answers

Questions : 18 :: How does Tracert work and what protocol does it use?

Tracert or traceroute depending on the operating system allows you to see exactly what routers you touch as you move along the chain of connections to your final destination. If you end up with a...View answers

Questions : 19 :: What is Two-Factor Authentication?

The three basic ways to authenticate someone are: something they know (password), something they have (token), and something they are (biometrics). Two-factor authentication is a combination of...View answers

Questions : 20 :: What is an IDS?

An IDS is an Intrusion Detection System with two basic variations: Host Intrusion Detection Systems and Network Intrusion Detection Systems. An HIDS runs as a background utility in the same as an...View answers

Questions : 21 :: What are the main differences between Windows Home, Windows Pro and Windows Server?

If you were to ask a Microsoft Sales Rep this question, they would no doubt have hundreds of tweaks and performance boosts from system to system. In reality however there are two main differences...View answers

Questions : 22 :: What is the difference between ifconfig and ipconfig?

ipconfig is one of the primary network connection troubleshooting and information tools available for Windows Operating Systems. It allows the user to see what the current information is, force a...View answers

Questions : 23 :: What are the differences between PowerShell, Command Prompt and Bash?

At a very basic level, there really isn’t one. As you progress up the chain however, you start to realize that there actually are a lot of differences in the power available to users (and...View answers

Questions : 24 :: What is root?

root is THE admin, but in a Linux environment it is important to remember that unlike in a Windows environment, you spend very little time in a “privileged” mode. Many Windows...View answers

Questions : 25 :: What is telnet?

 telnet is a very small and versatile utility that allows for connections on nearly any port. Telnet would allow the admin to connect into remote devices and administer them via a command...View answers

Questions : 26 :: What are sticky ports?

Sticky ports are one of the network admin’s best friends and worst headaches. They allow you to set up your network so that each port on a switch only permits one (or a number that you...View answers

Questions : 27 :: Why would you add local users when on a domain machine?

Giving a user as few privileges as possible tends to cause some aggravation by the user, but by the same token it also removes a lot of easily preventable infection vectors. Still, sometimes...View answers

Questions : 28 :: What is ARP?

ARP, or Address Resolution Protocol can be likened to DNS for MAC Addresses. Standard DNS allows for the mapping of human-friendly URLs to IP addresses, while ARP allows for the mapping of IP...View answers

Questions : 29 :: What is EFS?

The Encrypted File System, Microsoft’s built-in file encryption utility has been around for quite some time. Files that have been encrypted in such a way can appear in Windows Explorer with...View answers

Questions : 30 :: What is Boot to LAN?

Boot to LAN is most often used when you are doing a fresh install on a system. What you would do is setup a network-based installer capable of network-booting via PXE. Boot to LAN enables this by...View answers

Questions : 31 :: What are Terminal Services?

The ability to remote into servers without having to actually be there is one of the most convenient methods of troubleshooting or running normal functions on a server- Terminal Services allow...View answers

Questions : 32 :: What are Shadow Copies?

Shadow copies are a versioning system in place on Windows operating systems. This allows for users to go back to a previously available version of a file without the need for restoring the file...View answers

Questions : 33 :: Why would you use external media such as Tapes or Hard Disks for Backups?

External Media has been used for backups for a very long time, but has started to fall out of favor in the past few years due to its speed limitations. As capacities continue to climb higher and...View answers

Questions : 34 :: What is the difference between RDP and KVM?

RDP or Remote Desktop Protocol is the primary method by which Windows Systems can be remotely accessed for troubleshooting and is a software-driven method. KVM or Keyboard Video and Mouse on the...View answers

Questions : 35 :: What is the difference between a print server and a network attached printer?

A print server can refer to two different options- an actual server that shares out many different printers from a central administration point, or a small dedicated box that allows a legacy...View answers

Questions : 36 :: What is /etc/passwd?

/etc/passwd is the primary file in Unix/Linux operating system that stores information about user accounts and can be read by all users. /etc/shadow many times is used by the operating system...View answers

Questions : 37 :: What is port forwarding?

When trying to communicate with systems on the inside of a secured network, it can be very difficult to do so from the outside- and with good reason. Therefore, the use of a port forwarding table...View answers

Questions : 38 :: Why would you virtualize systems?

Virtual Machines have only recently come into mainstream use, however they have been around under many different names for a long time. With the massive growth of hardware outstripping software...View answers

Questions : 39 :: Why would you create logon scripts?

Logon scripts are, surprisingly enough, scripts that run at logon time. These are used most times to allow for the continued access to share and device mapping as well as forcing updates and...View answers

Questions : 40 :: What is the difference between Single Mode and Multimode Fiber?

The simple answer is that Multimode is cheaper but can’t transmit as far. Single Mode has a smaller core (the part that handles light) than Multimode, but is better at keeping the light...View answers

Questions : 41 :: What does it mean when you receive an NTFS Error: 5?

Error 5 is very common when dealing with files and directories that have very specific permissions. When trying to copy elements from areas that have restricted permissions, or when trying to...View answers

Questions : 42 :: What are 755 and 644 Unix/Linux Permissions?

Unix/Linux permissions operate on much simpler methodology than Windows does, but as a result when you’re trying to figure out how they work it can feel like you’ve been hit by a...View answers

Questions : 43 :: Why is it easier to maintain permissions via groups instead of individually?

As you can see from the demonstration up above, if you try to work out permissions for every single person in your organization individually you can give yourself a migraine pretty quickly....View answers

Questions : 44 :: What is the difference between a Forest, a Tree, and a Domain?

When you’re working in Active Directory, you see a tree-type structure going down through various organizational units (OU’s). The easiest way to explain this is to run through a...View answers

Questions : 45 :: What are the differences between Local, Global and Universal Groups?

“A domain local group is a security or distribution group that can contain universal groups, global groups, other domain local groups from its own domain, and accounts from any...View answers

Questions : 46 :: What are Strong Password Requirements?

“Use a minimum password length of 12 to 14 characters if permitted. Include lowercase and uppercase alphabetic characters, numbers and symbols if permitted. Generate passwords randomly...View answers

Questions : 47 :: What is SNMP?

SNMP is the “Simple Network Management Protocol”. Most systems and devices on a network are able to tell when they are having issues and present them to the user through either...View answers
More Question

Ask your interview questions on Network Administrator

Write Your comment or Questions if you want the answers on Network Administrator from Network Administrator Experts
Name* :
Email Id* :
Mob no* :
Question
Or
Comment* :
 





Disclimer: PCDS.CO.IN not responsible for any content, information, data or any feature of website. If you are using this website then its your own responsibility to understand the content of the website

--------- Tutorials ---