Sample Entry Level Network Engineer job application exam

FreshPrince

Diamond Member
Dec 6, 2001
8,361
1
0
I posted this before, but I added 3 questions to the end to spice things up :)

Please circle the correct answer for each question.

1. Which one of the following is the default port for the SSL service?
a. 80
b. 69
c. 443
d. 21

2. What is the maximum number of hosts that can connect to the following network?
IP Address: 10.10.10.32
Subnet Mask: 255.255.255.240
a. 14
b. 16
c. 64
d. 128

3. What layer of the OSI model handles routing?
a. Physical
b. Network
c. Data Link Layer
d. Session

4. If your server has five hard drives that are 80 GB each configured as RAID 5, how much disk space will be available by default?
a. 400
b. 200
c. 160
d. 320

5. What devices operate on the IEEE 802.11 standard?
a. Ethernet
b. Wireless
c. Token Ring
d. AppleTalk


6. What is the Cisco command to deny incoming HTTP packets from anyone to IP address 207.51.42.15?
a. access-list 105 deny udp 207.51.42.15 any eq 80
b. access-list 105 deny tcp 207.51.42.15 any eq 80
c. access-list 101 deny udp any 207.51.42.15 eq 80
d. access-list 101 deny tcp any 207.51.42.15 eq 80

7. What is a bastion host?
a. A host designed to defend against attacks aimed at the inside network
b. A host designed to allow all incoming connections
c. A host designed to deny all incoming connections
d. A host designed to allow unauthorized connections

8. What is the purpose of creating VLANs?
a. To segment two networks
b. To bridge two networks
c. To create a collision domain
d. To create an encrypted virtual network.

9. What is the first port number used in the dynamic high port range?
a. 256
b. 512
c. 1024
d. 2048

10. Which of the following protocols can be used to create VPNs? (answer all that apply)
a. L2TP
b. PPTP
c. PPP
d. IPSEC

11. How to: initiate Active Directory replication? (answer all that apply)
a. by using the Sites and Services Manager Snap-in
b. by using Repadmin.exe
c. Visual Basic Script Using IADsTools
d. by using Active Directory Replication Monitor

12. How to: Check the Mount Status of Data Stores in Exchange Server 2000 and 2003?
a. Start, program files, Microsoft exchange, system manager, storage group
b. Start, program files, Microsoft exchange, system manager, servers, mailserver, storage group
c. Start, program files, Microsoft exchange, system manager, servers, storage group
d. Start, program files, Microsoft exchange, servers, mailserver, storage group

13. Your 3rd party vendor IIS application stops working after the Server 2003 upgrade. How can the problem be corrected?
a. Uninstall the application in ?add remove programs?, reboot, and reinstall
b. Restore the application folder in ?c:\program files? from tape
c. Uninstall IIS 5 and install II 6 from the Server 2003 CD
d. Run the application in IIS 5 isolation mode

14. A user claims that a web site they visit frequently all of a sudden stops working. What might be the cause? (answer all that apply)
a. WINS configuration was changed on their network card
b. DNS configuration was changed on their network card
c. The owner of the website changed the A record in the domain zone file
d. The owner of the website changed the MX record in the domain zone file
15. What is the SQL statement to display Lastname, FirstName, Address, and City from the Persons table?
Answer: _____________________________________________________________
"Persons" table
LastName FirstName Address City
Hansen Ola Timoteivn 10 Sandnes
Svendson Tove Borgvn 23 Sandnes
Pettersen Kari Storgt 20 Stavanger

16. Your user set a bios boot up password, but forgets it. How would you fix this problem?
a. Reinstall the operating system from Windows XP CD
b. Crack the password by using a brute force program on the hash file
c. Remove and reinstall the motherboard battery
d. Send the PC back to the manufacturer

17. You hacked into an ecommerce website. Which is the fastest way for you to modify the home page to display customer information and credit card numbers?
a. Drop and execute a remote desktop server application and connect to the server from home using a remote desktop client.
b. Use a SQL-injection string to enumerate, pipe, and over write index.asp
c. Use cross-site scripting and DNS hijacking to redirect, steal, and post the data
d. This can?t be done, will need more enumeration

18. The data center is suffering a fire outbreak. Which do you save first?
a. The quad processor SQL database server
b. The backup tapes
c. The $25K load balancer
d. Human life

19. What is the technology that connects 2 VOIP systems? Answer: ________________

I've instructed HR to pass on any applicant who does not get anything better than 80%

what do you guys think? Too easy? too hard?
 

Reel

Diamond Member
Jul 14, 2001
4,484
0
76
I don't like 17. I'd turn it around to be that they need to secure their ecommerce site against which of the following attacks or which is the largest threat. I think it might imply a level of dishonest behavior (unless of course you were expecting them to be performing this action).
 

FreshPrince

Diamond Member
Dec 6, 2001
8,361
1
0
Originally posted by: Reel
I don't like 17. I'd turn it around to be that they need to secure their ecommerce site against which of the following attacks or which is the largest threat. I think it might imply a level of dishonest behavior (unless of course you were expecting them to be performing this action).

or just trying to get a good feel of where they are in terms of network security skills. but you might be right, I'll reword that.
 

BriGy86

Diamond Member
Sep 10, 2004
4,537
1
91
im gonna give this a try
(<-going to school for computer networking)

ill PM my answers
 

Phoenix86

Lifer
May 21, 2003
14,644
10
81
#2 needs more info, what version of IP? :)

edit: Procedure questions (#12) should be eliminated. There are multiple procedure for any given process. At the very least there are CLI and GUI commands, why would you want to limit your applicants to one method or the other?
 

spidey07

No Lifer
Aug 4, 2000
65,469
5
76
Originally posted by: Phoenix86
#2 needs more info, what version of IP? :)

edit: Procedure questions (#12) should be eliminated. There are multiple procedure for any given process. At the very least there are CLI and GUI commands, why would you want to limit your applicants to one method or the other?

It's obvious from the addressing that it is v4.

decent questions none the less.

and generally good network guys will avoid anything having to do with servers like the plague so the questions are for two different kinds of careers IMHO.
 

spidey07

No Lifer
Aug 4, 2000
65,469
5
76
Originally posted by: Phoenix86
Originally posted by: spidey07
It's obvious from the addressing that it is v4.

Why?
<--A bit ignorant on IPv6

because that is an IPv4 address. Not a IPv6 address.

v6 is 128 bits and looks like this.

3256:ffed::beef:0:0
 

BriGy86

Diamond Member
Sep 10, 2004
4,537
1
91
Originally posted by: spidey07
Originally posted by: Phoenix86
Originally posted by: spidey07
It's obvious from the addressing that it is v4.

Why?
<--A bit ignorant on IPv6

because that is an IPv4 address. Not a IPv6 address.

v6 is 128 bits and looks like this.

3256:ffed::beef:0:0

what dictates the network number and the host number?
 

BriGy86

Diamond Member
Sep 10, 2004
4,537
1
91
the ip and subnet will be this long each?
IP- xxxx:xxxx:xxxx:xxxx:xxxx:xxxx:xxxx:xxxx
subnet- xxxx:xxxx:xxxx:xxxx:xxxx:xxxx:xxxx:xxxx

do they really need to go that far?
 

cw42

Diamond Member
Jan 15, 2004
4,227
0
76
im a third year IT major, and i barely know any of this stuff. is this bad? :)
 

spidey07

No Lifer
Aug 4, 2000
65,469
5
76
Originally posted by: BriGy86
the ip and subnet will be this long each?
IP- xxxx:xxxx:xxxx:xxxx:xxxx:xxxx:xxxx:xxxx
subnet- xxxx:xxxx:xxxx:xxxx:xxxx:xxxx:xxxx:xxxx

do they really need to go that far?

yes. That's the entire reason VLSM was invented way back when.

but we don't normally deal with subnet masks in "higher level" networking. Its all about prefixes and prefix length.

12.32.0.0/11
12.100.128.0/17

v6 will be the same way and specified with the "/mask length in bits" notation.
 

BriGy86

Diamond Member
Sep 10, 2004
4,537
1
91
Originally posted by: spidey07
Originally posted by: BriGy86
the ip and subnet will be this long each?
IP- xxxx:xxxx:xxxx:xxxx:xxxx:xxxx:xxxx:xxxx
subnet- xxxx:xxxx:xxxx:xxxx:xxxx:xxxx:xxxx:xxxx

do they really need to go that far?

yes. That's the entire reason VLSM was invented way back when.

but we don't normally deal with subnet masks in "higher level" networking. Its all about prefixes and prefix length.

12.32.0.0/11
12.100.128.0/17

v6 will be the same way and specified with the "/mask length in bits" notation.

so like xxxx:xxxx:xxxx:xxxx:xxxx:xxxx:xxxx:xxxx/xx?

im just confused on the parts that have "::" in the middle of the number,
 

FreshPrince

Diamond Member
Dec 6, 2001
8,361
1
0
Originally posted by: Phoenix86
#2 needs more info, what version of IP? :)

edit: Procedure questions (#12) should be eliminated. There are multiple procedure for any given process. At the very least there are CLI and GUI commands, why would you want to limit your applicants to one method or the other?

I'm not, I'm just trying to see if they know what they're talking about. Anyone who have touched exchange for a few hours know the answer to #12. I'm just trying to weed out all the BS'ers that say they know exchange when in fact they haven't touched.