Network Engineer Candidate Technical Assessment

Reviewed by Editorial Team
The ProProfs editorial team is comprised of experienced subject matter experts. They've collectively created over 10,000 quizzes and lessons, serving over 100 million users. Our team includes in-house content moderators and subject matter experts, as well as a global network of rigorously trained contributors. All adhere to our comprehensive editorial guidelines, ensuring the delivery of high-quality content.
Learn about Our Editorial Process
| By Mkelkenberg
M
Mkelkenberg
Community Contributor
Quizzes Created: 1 | Total Attempts: 739
| Attempts: 739 | Questions: 19
Please wait...
Question 1 / 19
0 %
0/100
Score 0/100
1. On a Windows 2003 server, what command would you run to show the current default gateway and all current TCP/IP network configuration values?

Explanation

The command "ipconfig /all" is used to display the current default gateway and all current TCP/IP network configuration values on a Windows 2003 server. This command provides comprehensive information about the network settings, including IP address, subnet mask, DNS servers, DHCP lease information, and more. It is a useful command for troubleshooting network connectivity issues and obtaining detailed network configuration details.

Submit
Please wait...
About This Quiz
Network Engineer Candidate Technical Assessment - Quiz

Thank you for applying for the position of Network Engineer at Carter BloodCare. Please answer the following questions to the best of your ability. Please enter all... see moreanswers in lower case. see less

2. What command would you run to see the routing table on a Windows 2003 server?

Explanation

To view the routing table on a Windows 2003 server, the command "route print" should be executed. This command displays the current routing table, showing the network destinations, subnet masks, gateway addresses, interface indexes, and metric values. It provides information about how network traffic is directed and allows administrators to troubleshoot network connectivity and routing issues.

Submit
3. A device must have both Citrix Connection License and a Windows Server CAL to connect to the Citrix server.

Explanation

In order to connect to a Citrix server, a device must have both a Citrix Connection License and a Windows Server CAL. This means that the device needs to have the necessary licenses for both the Citrix software and the Windows Server operating system. Without both licenses, the device will not be able to establish a connection to the Citrix server. Therefore, the statement is true.

Submit
4. Which layer of the OSI model encrypts the data to be sent across the network?

Explanation

The presentation layer of the OSI model is responsible for the encryption and decryption of data to be sent across the network. This layer ensures that the data is properly formatted and encrypted before transmission, and also handles the decryption of received data. By encrypting the data at the presentation layer, it ensures that the information is secure and can only be accessed by authorized recipients.

Submit
5. DHCP is implemented in which layer of the OSI model?

Explanation

DHCP (Dynamic Host Configuration Protocol) is implemented in the application layer of the OSI model. This protocol allows for the automatic configuration of network devices, such as assigning IP addresses, subnet masks, default gateways, and other network parameters. The application layer is responsible for providing network services to end-user applications, and DHCP operates at this layer to facilitate the dynamic allocation of network addresses.

Submit
6. What does the abbreviation ICA stand for ?

Explanation

ICA stands for independent computing architecture. This term refers to a technology that allows users to access applications and data from a remote server, without the need for installing them on their local devices. With ICA, users can work on their tasks and projects using any device with an internet connection, as the processing power and storage are provided by the remote server. This architecture provides flexibility, scalability, and centralized management, making it a popular choice for virtual desktop infrastructure (VDI) solutions.

Submit
7. The image below represents which RAID level?

Explanation

The image represents RAID 5 because it shows data striping across multiple disks with parity information distributed across all disks. RAID 5 provides fault tolerance by allowing one disk to fail without losing any data. Data is distributed across all disks in the array, which improves performance by allowing multiple disks to read and write data simultaneously.

Submit
8. Full-duplex or half-duplex is provided for at which layer of the OSI model?

Explanation

Full-duplex or half-duplex is provided for at the session layer of the OSI model. The session layer is responsible for establishing, managing, and terminating sessions between applications. It allows two devices to communicate simultaneously in both directions (full-duplex) or in only one direction at a time (half-duplex). By providing these capabilities, the session layer ensures efficient and reliable communication between applications by coordinating the flow of data and managing the session's control information.

Submit
9. In a cisco router config, where would you use a wildcard mask?

Explanation

In a Cisco router configuration, a wildcard mask is used in both access lists and OSPF (Open Shortest Path First) configurations.

In access lists, a wildcard mask is used to specify which IP addresses or subnets should be allowed or denied access based on certain criteria. It is used in conjunction with the network address to define the range of addresses that should be matched.

In OSPF configurations, a wildcard mask is used to define which IP addresses or subnets should be included or excluded from OSPF routing updates. It is used to specify the range of addresses that should be advertised or suppressed in the OSPF routing table.

Submit
10. Which of the following disk configurations offers the optimum performance for a Windows Server 2003 DC, while offering high availability?

Explanation

RAID 5 offers both performance and high availability as it uses striping with parity. This means that data is distributed across multiple disks, allowing for faster read and write operations. In case of a disk failure, the parity information can be used to reconstruct the data, ensuring high availability. RAID 1 for log files provides redundancy by mirroring the data on two separate disks, further enhancing reliability. Therefore, using RAID 5 for the database and SYSVOL, and RAID 1 for log files, offers the optimum performance and high availability for a Windows Server 2003 DC.

Submit
11. You need to create 8 subnets on your LAN and have been assigned the address space 172.16.128.0/23.  How many hosts will you have?

Explanation

The given address space 172.16.128.0/23 has a subnet mask of 255.255.254.0. This means that the network portion of the address is 172.16.128.0 and the host portion can range from 172.16.128.1 to 172.16.129.254. Since there are 8 subnets, each subnet will have a range of 256 addresses (254 usable). Therefore, the total number of hosts will be 8 subnets multiplied by 254 usable addresses per subnet, which equals 2032. The correct answer is 496, which is incorrect based on the given information.

Submit
12. What is the name of the system database used by SQL Server Agent to schedule jobs?

Explanation

The system database used by SQL Server Agent to schedule jobs is called the msdb database. This database stores information about jobs, job history, and other metadata related to SQL Server Agent. It is used by the Agent service to manage and schedule jobs, store job execution history, and perform other administrative tasks related to job scheduling and management.

Submit
13. A client workstation is unable to obtain an address from the DHCP server. You discover the DHCP scope was not activated so you activated it. What actions are required for the client to obtain an IP address from the DHCP server?

Explanation

After activating the DHCP scope, the client workstation will automatically send a DHCP Discover message to the DHCP server in order to obtain an IP address. The DHCP server will respond with a DHCP Offer message, providing the client with an available IP address. The client will then send a DHCP Request message to confirm the assignment of the offered IP address. Finally, the DHCP server will send a DHCP Acknowledge message to the client, completing the process and allowing the client to obtain an IP address. Therefore, no additional action is required from the client side.

Submit
14. Please enter the SQL statement to choose all of the records from a table named "owners" where the value of the column "lastname" begins with an "s".

Explanation

The given SQL statement selects all the records from the "owners" table where the value of the "lastname" column is exactly equal to 's'. This means that it will only retrieve records where the lastname starts with 's' and has no additional characters after it.

Submit
15. Which of the following are critical to a good Active Directory backup?

Explanation

A good Active Directory backup requires the backup of the SYSVOL and System Disk. The SYSVOL folder contains public files such as Group Policy and logon scripts, which are critical for the proper functioning of Active Directory. The System Disk contains the operating system files and other system-related files necessary for the Active Directory infrastructure. Therefore, backing up both the SYSVOL and System Disk ensures that essential components of Active Directory are protected and can be restored in case of data loss or system failure.

Submit
16. What is defined in a tnsnames.ora file?

Explanation

A tnsnames.ora file is used to define the database connections in Oracle. It contains the necessary information such as the database name, host address, port number, and service name to establish a connection with a specific database. This file is commonly used in Oracle networking to configure and manage multiple database connections for various applications and users. By defining the database connections in the tnsnames.ora file, users can easily connect to the desired databases without having to remember or manually enter the connection details each time.

Submit
17. What is the most efficient way of compiling a list of all GPO's that are present within each domain on your network?

Explanation

The most efficient way of compiling a list of all GPO's that are present within each domain on your network is by using the gpmc script. This script is specifically designed for Group Policy Management and allows for automated and streamlined retrieval of GPO information from multiple domains. By utilizing this script, administrators can save time and effort in manually gathering this information, ensuring accuracy and consistency in the process.

Submit
18. The email administrator has informed you they are seeing a spam attack from the mail server 11.10.2.10 and requests you block smtp from this site. You already have an access-list on your PIX named outside_access_in.  What would you add to your access list to block email from this site?

Explanation

The given answer is correct because it adds a rule to the access-list named outside_access_in to deny any TCP traffic from the host 11.10.2.10 to any destination with a destination port of SMTP (port 25). This will effectively block email traffic from the specified site.

Submit
19. What does the abbreviation TNS stand for and how is it used?

Explanation

The abbreviation TNS stands for Transparent Network Substrate. It is used in the context of Oracle databases. TNS is a technology that allows clients to connect to Oracle databases over a network. It provides a transparent and efficient way for communication between the client and the database server. TNS handles tasks such as connection establishment, authentication, and data transfer. Overall, TNS plays a crucial role in ensuring smooth and secure communication between clients and Oracle databases.

Submit
View My Results

Quiz Review Timeline (Updated): Mar 21, 2023 +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 21, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Aug 30, 2009
    Quiz Created by
    Mkelkenberg
Cancel
  • All
    All (19)
  • Unanswered
    Unanswered ()
  • Answered
    Answered ()
On a Windows 2003 server, what command would you run to show the...
What command would you run to see the routing table on a Windows 2003...
A device must have both Citrix Connection License and a Windows...
Which layer of the OSI model encrypts the data to be sent across the...
DHCP is implemented in which layer of the OSI model?
What does the abbreviation ICA stand for ?
The image below represents which RAID level?
Full-duplex or half-duplex is provided for at which layer of the OSI...
In a cisco router config, where would you use a wildcard mask?
Which of the following disk configurations offers the optimum...
You need to create 8 subnets on your LAN and have been assigned the...
What is the name of the system database used by SQL Server Agent to...
A client workstation is unable to obtain an address from the DHCP...
Please enter the SQL statement to choose all of the records from...
Which of the following are critical to a good Active Directory backup?
What is defined in a tnsnames.ora file?
What is the most efficient way of compiling a list of all GPO's that...
The email administrator has informed you they are seeing a spam attack...
What does the abbreviation TNS stand for and how is it used?
Alert!

Advertisement