-
Token Ring
You need to connect a Token Ring segment to an Ethernet segment. Would you use a router, a brouter or a bridge? Explain your answer.
-
Excessive Broadcasting
What is meant by Excessive Broadcasting?
-
VPN Preliminary Requirement
How can we create VPN to connect to branch office of the same office. What would be the preliminary requirement?
-
IIOP
What is IIOP used for?
-
SPAN or RSPAN
What is SPAN or RSPAN?
-
Router Re-Configuration
How to re-configure my router to my modem and desktop?
-
OSPF
How many Devices does OSPF supports ?What is the range of OSPF area & how does it works. also when there is some changes in one area hows does other ares gets the updates.
-
Stub Zone
Why do we need stub zones in windows network?
-
Terminal Server
What is the use of Terminal Server?
-
Memory Dumps
What is Memory dumps? Where it is created and What is the analysis proces in Windows Server.
-
Router Communication
How does a router communicate with switch?
-
Token Ring
What is token ring? Where it is used and why?
-
Technical Support Job questions
1.When their is virus in your comp-(it shutdown the comp in 1min)what is the action that needs to be taken?
2.Can you connect two monitors to one comp?
3.What is the MAC address?
4.Where do you use apply DGMA?
5.How do u define network?
6.What do u do when u get an error message "page cannot be displayed"?
7.What... -
SSL Configuration
how to enable SSL for webserver? Explain the steps and precautions you will need to check
-
One way SSL and Two Way SSL
Explain difference between one way SSL and two way SSL?. What are the things you need to check before you setup SSL for your company
-
Router get damaged
When our router get damage from branch end then how to take back up from our end?
-
Voip/wan/it networking performance
Describe the Maintenance and Administration Routines you Utilized to ensure effective corporate VOIP/WAN/IT Network performance?
-
What is the difference between disaster recovery at the data link layer and the transport layer?
What is the difference between disaster recovery in the network data transmission, when this process is performed by the link layer and the transport layer? The two approaches can be used together, or benefits that?
Network Support Interview Questions
Ans