Network Engineer Candidate Technical Assessment

Approved & Edited by ProProfs Editorial Team
The editorial team at ProProfs Quizzes consists of a select group of subject experts, trivia writers, and quiz masters who have authored over 10,000 quizzes taken by more than 100 million users. This team includes our in-house seasoned quiz moderators and subject matter experts. Our editorial experts, spread across the world, are rigorously trained using our comprehensive guidelines to ensure that you receive the highest quality quizzes.
Learn about Our Editorial Process
| By Mkelkenberg
M
Mkelkenberg
Community Contributor
Quizzes Created: 1 | Total Attempts: 727
Questions: 26 | Attempts: 727

SettingsSettingsSettings
Network Engineer Candidate Technical Assessment - Quiz

Thank you for applying for the position of Network Engineer at Carter BloodCare. Please answer the following questions to the best of your ability. Please enter all answers in lower case.


Questions and Answers
  • 1. 

    What is the name of the system database used by SQL Server Agent to schedule jobs?

    Explanation
    The system database used by SQL Server Agent to schedule jobs is called the msdb database. This database stores information about jobs, job history, and other metadata related to SQL Server Agent. It is used by the Agent service to manage and schedule jobs, store job execution history, and perform other administrative tasks related to job scheduling and management.

    Rate this question:

  • 2. 

    What is Vmotion?

  • 3. 

    Name 3 online sites you use as troubleshooting resources

  • 4. 

    What is contained in the ICA file?

  • 5. 

    You upgrade to Exchange 2007 last year and have now begun to roll out Office 2007.  Users who have been upgraded have started to complain that they are unable to see all other employees in the Global Address Book. They see the majority of users, but a few cannot be found. If you delete the OAB on the user's computer or edit the registry to force Outlook to use Public Folders, they can then see everyone.  What could be causing this issue and what would you do to resolve the issue?

  • 6. 

    Describe one of the most challenging projects you have worked on and briefly explain your contributions toward it's completion. 

  • 7. 

    When was the last time you called VMWare Support and what was the issue?

  • 8. 

    Describe an instance where your actions caused a significant outage of services, what steps you took to resolve the issue and what you learned from the episode.

  • 9. 

    On a Windows 2003 server, what command would you run to show the current default gateway and all current TCP/IP network configuration values?

    Explanation
    The command "ipconfig /all" is used to display the current default gateway and all current TCP/IP network configuration values on a Windows 2003 server. This command provides comprehensive information about the network settings, including IP address, subnet mask, DNS servers, DHCP lease information, and more. It is a useful command for troubleshooting network connectivity issues and obtaining detailed network configuration details.

    Rate this question:

  • 10. 

    What command would you run to see the routing table on a Windows 2003 server?

    Explanation
    To view the routing table on a Windows 2003 server, the command "route print" should be executed. This command displays the current routing table, showing the network destinations, subnet masks, gateway addresses, interface indexes, and metric values. It provides information about how network traffic is directed and allows administrators to troubleshoot network connectivity and routing issues.

    Rate this question:

  • 11. 

    Which of the following are critical to a good Active Directory backup?

    • A.

      USERS$

    • B.

      SYSVOL

    • C.

      System Disk

    • D.

      NTFS

    • E.

      ADFS

    Correct Answer(s)
    B. SYSVOL
    C. System Disk
    Explanation
    A good Active Directory backup requires the backup of the SYSVOL and System Disk. The SYSVOL folder contains public files such as Group Policy and logon scripts, which are critical for the proper functioning of Active Directory. The System Disk contains the operating system files and other system-related files necessary for the Active Directory infrastructure. Therefore, backing up both the SYSVOL and System Disk ensures that essential components of Active Directory are protected and can be restored in case of data loss or system failure.

    Rate this question:

  • 12. 

    The image below represents which RAID level?

    • A.

      RAID 0

    • B.

      RAID 1

    • C.

      RAID 4

    • D.

      RAID 5

    • E.

      RAID 10

    Correct Answer
    D. RAID 5
    Explanation
    The image represents RAID 5 because it shows data striping across multiple disks with parity information distributed across all disks. RAID 5 provides fault tolerance by allowing one disk to fail without losing any data. Data is distributed across all disks in the array, which improves performance by allowing multiple disks to read and write data simultaneously.

    Rate this question:

  • 13. 

    Full-duplex or half-duplex is provided for at which layer of the OSI model?

    Correct Answer
    session, session layer
    Explanation
    Full-duplex or half-duplex is provided for at the session layer of the OSI model. The session layer is responsible for establishing, managing, and terminating sessions between applications. It allows two devices to communicate simultaneously in both directions (full-duplex) or in only one direction at a time (half-duplex). By providing these capabilities, the session layer ensures efficient and reliable communication between applications by coordinating the flow of data and managing the session's control information.

    Rate this question:

  • 14. 

    Which layer of the OSI model encrypts the data to be sent across the network?

    Correct Answer
    presentation, presentation layer
    Explanation
    The presentation layer of the OSI model is responsible for the encryption and decryption of data to be sent across the network. This layer ensures that the data is properly formatted and encrypted before transmission, and also handles the decryption of received data. By encrypting the data at the presentation layer, it ensures that the information is secure and can only be accessed by authorized recipients.

    Rate this question:

  • 15. 

    DHCP is implemented in which layer of the OSI model?

    Correct Answer
    application, application layer
    Explanation
    DHCP (Dynamic Host Configuration Protocol) is implemented in the application layer of the OSI model. This protocol allows for the automatic configuration of network devices, such as assigning IP addresses, subnet masks, default gateways, and other network parameters. The application layer is responsible for providing network services to end-user applications, and DHCP operates at this layer to facilitate the dynamic allocation of network addresses.

    Rate this question:

  • 16. 

    Please enter the SQL statement to choose all of the records from a table named "owners" where the value of the column "lastname" begins with an "s".

    Correct Answer
    select * from owners where lastname='s'
    Explanation
    The given SQL statement selects all the records from the "owners" table where the value of the "lastname" column is exactly equal to 's'. This means that it will only retrieve records where the lastname starts with 's' and has no additional characters after it.

    Rate this question:

  • 17. 

    Which of the following disk configurations offers the optimum performance for a Windows Server 2003 DC, while offering high availability?

    • A.

      Database and SYSVOL using RAID 1, log files usuing RAID 1

    • B.

      Database and SYSVOL using RAID 0, log files usuing RAID 1

    • C.

      Database and SYSVOL using RAID 5, log files usuing RAID 1

    • D.

      Database and SYSVOL using RAID 5, log files usuing RAID 5

    Correct Answer
    C. Database and SYSVOL using RAID 5, log files usuing RAID 1
    Explanation
    RAID 5 offers both performance and high availability as it uses striping with parity. This means that data is distributed across multiple disks, allowing for faster read and write operations. In case of a disk failure, the parity information can be used to reconstruct the data, ensuring high availability. RAID 1 for log files provides redundancy by mirroring the data on two separate disks, further enhancing reliability. Therefore, using RAID 5 for the database and SYSVOL, and RAID 1 for log files, offers the optimum performance and high availability for a Windows Server 2003 DC.

    Rate this question:

  • 18. 

    What does the abbreviation TNS stand for and how is it used?

    Correct Answer
    transparent network substrate oracle, oracle
    Explanation
    The abbreviation TNS stands for Transparent Network Substrate. It is used in the context of Oracle databases. TNS is a technology that allows clients to connect to Oracle databases over a network. It provides a transparent and efficient way for communication between the client and the database server. TNS handles tasks such as connection establishment, authentication, and data transfer. Overall, TNS plays a crucial role in ensuring smooth and secure communication between clients and Oracle databases.

    Rate this question:

  • 19. 

    What is the most efficient way of compiling a list of all GPO's that are present within each domain on your network?

    Correct Answer
    gpmc script
    Explanation
    The most efficient way of compiling a list of all GPO's that are present within each domain on your network is by using the gpmc script. This script is specifically designed for Group Policy Management and allows for automated and streamlined retrieval of GPO information from multiple domains. By utilizing this script, administrators can save time and effort in manually gathering this information, ensuring accuracy and consistency in the process.

    Rate this question:

  • 20. 

    You need to create 8 subnets on your LAN and have been assigned the address space 172.16.128.0/23.  How many hosts will you have?

    • A.

      2032

    • B.

      240

    • C.

      496

    • D.

      48

    Correct Answer
    C. 496
    Explanation
    The given address space 172.16.128.0/23 has a subnet mask of 255.255.254.0. This means that the network portion of the address is 172.16.128.0 and the host portion can range from 172.16.128.1 to 172.16.129.254. Since there are 8 subnets, each subnet will have a range of 256 addresses (254 usable). Therefore, the total number of hosts will be 8 subnets multiplied by 254 usable addresses per subnet, which equals 2032. The correct answer is 496, which is incorrect based on the given information.

    Rate this question:

  • 21. 

    A client workstation is unable to obtain an address from the DHCP server. You discover the DHCP scope was not activated so you activated it. What actions are required for the client to obtain an IP address from the DHCP server?

    • A.

      Run ipconfig /all from a command prompt

    • B.

      Use Netsh to assign an address to the adaptor

    • C.

      Log off and log back in

    • D.

      Take no action

    Correct Answer
    D. Take no action
    Explanation
    After activating the DHCP scope, the client workstation will automatically send a DHCP Discover message to the DHCP server in order to obtain an IP address. The DHCP server will respond with a DHCP Offer message, providing the client with an available IP address. The client will then send a DHCP Request message to confirm the assignment of the offered IP address. Finally, the DHCP server will send a DHCP Acknowledge message to the client, completing the process and allowing the client to obtain an IP address. Therefore, no additional action is required from the client side.

    Rate this question:

  • 22. 

    What does the abbreviation ICA stand for ?

    Correct Answer
    independent computing architecture
    Explanation
    ICA stands for independent computing architecture. This term refers to a technology that allows users to access applications and data from a remote server, without the need for installing them on their local devices. With ICA, users can work on their tasks and projects using any device with an internet connection, as the processing power and storage are provided by the remote server. This architecture provides flexibility, scalability, and centralized management, making it a popular choice for virtual desktop infrastructure (VDI) solutions.

    Rate this question:

  • 23. 

    A device must have both Citrix Connection License and a Windows Server CAL to connect to the Citrix server.

    • A.

      True

    • B.

      False

    Correct Answer
    A. True
    Explanation
    In order to connect to a Citrix server, a device must have both a Citrix Connection License and a Windows Server CAL. This means that the device needs to have the necessary licenses for both the Citrix software and the Windows Server operating system. Without both licenses, the device will not be able to establish a connection to the Citrix server. Therefore, the statement is true.

    Rate this question:

  • 24. 

    In a cisco router config, where would you use a wildcard mask?

    Correct Answer
    access list, ospf
    Explanation
    In a Cisco router configuration, a wildcard mask is used in both access lists and OSPF (Open Shortest Path First) configurations.

    In access lists, a wildcard mask is used to specify which IP addresses or subnets should be allowed or denied access based on certain criteria. It is used in conjunction with the network address to define the range of addresses that should be matched.

    In OSPF configurations, a wildcard mask is used to define which IP addresses or subnets should be included or excluded from OSPF routing updates. It is used to specify the range of addresses that should be advertised or suppressed in the OSPF routing table.

    Rate this question:

  • 25. 

    The email administrator has informed you they are seeing a spam attack from the mail server 11.10.2.10 and requests you block smtp from this site. You already have an access-list on your PIX named outside_access_in.  What would you add to your access list to block email from this site?

    Correct Answer
    access-list outside_access_in deny tcp host 11.10.2.10 any eq smtp
    Explanation
    The given answer is correct because it adds a rule to the access-list named outside_access_in to deny any TCP traffic from the host 11.10.2.10 to any destination with a destination port of SMTP (port 25). This will effectively block email traffic from the specified site.

    Rate this question:

  • 26. 

    What is defined in a tnsnames.ora file?

    Correct Answer
    database connections
    Explanation
    A tnsnames.ora file is used to define the database connections in Oracle. It contains the necessary information such as the database name, host address, port number, and service name to establish a connection with a specific database. This file is commonly used in Oracle networking to configure and manage multiple database connections for various applications and users. By defining the database connections in the tnsnames.ora file, users can easily connect to the desired databases without having to remember or manually enter the connection details each time.

    Rate this question:

Back to Top Back to top
Advertisement
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.