We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 3
1.
Introduce himself/herself and give explanation about his/her former job experience 2. What are the responsibilities of Database & network Administrator? 3. Differentiate between anti-virus and firewalls and how they works?
4. What is network security best practices?
a. Answer: i. Use strong passwords: Choose unique and complex passwords for all accounts. ii. Keep software updated: Install security patches and updates regularly to fix vulnerabilities. iii. Use a firewall: Implement a firewall to block unauthorized access to your network. iv. Be cautious of suspicious emails and links: Avoid clicking on suspicious links or opening attachments from unknown senders. v. Back up your data: Regularly backup important data to protect against data loss. vi. Use multi-factor authentication: Require more than one form of identification to access accounts. vii. Educate users: Train users on network security best practices and common threats. 5. What is a network cable? a. Answer: A network cable is a physical medium used to connect devices on a network. Common types include: i. Coaxial Cable: Used in older networks, providing a single path for both data and power transmission. It is less flexible and prone to interference. ii. Twisted Pair Cable: Most common type of network cable, consisting of two insulated wires twisted together to reduce interference. It is available in different categories (Cat5, Cat6, Cat7) with varying performance characteristics. iii. Fiber Optic Cable: Uses light pulses to transmit data, providing higher bandwidth and lower interference compared to copper cables. It is more expensive but offers superior performance for long distances. 6. What is the role of a network administrator? a. Answer: A network administrator is responsible for managing, maintaining, and troubleshooting network infrastructure. They ensure network connectivity, security, performance, and compliance with organizational policies. Key responsibilities include: i. Installing and configuring network devices ii. Monitoring network performance and troubleshooting issues iii. Implementing network security policies and protocols iv. Managing user accounts and access permissions v. Planning and implementing network upgrades 7. What is the difference between a router and a switch? a. Answer: The main difference lies in their functions: i. Routers connect different networks, using IP addresses to route data packets between them. They operate at the network layer of the TCP/IP model. ii. Switches connect devices on the same network, using MAC addresses to forward data packets to the intended recipient. They operate at the data link layer of the TCP/IP model. 8. What is a firewall? a. Answer: A firewall is a security device that controls network traffic based on predefined rules. It acts as a barrier between a network and the external world, protecting against unauthorized access and malicious attacks. 9. What is a network topology? a. Answer: Network topology refers to the physical or logical arrangement of devices in a network. It defines how devices are interconnected and how data flows between them. Common types include bus, star, ring, mesh, and tree topologies. 10. What are the different types of network topologies? a. Answer: i. Bus Topology: Devices are connected to a single cable called a bus. Data travels along the bus to all devices, but only the intended recipient processes the data. ii. Star Topology: All devices are connected to a central hub or switch. Data travels from the source device to the hub/switch and then to the destination device. This is the most common topology in modern LANs. iii. Ring Topology: Devices are connected in a closed loop. Data travels in one direction around the ring, passing through each device until it reaches the destination. iv. Mesh Topology: Devices are connected to multiple other devices. This provides redundancy and fault tolerance but can be complex to manage. v. Tree Topology: A hierarchical structure resembling a tree, with multiple levels. It is often used in WANs to connect different networks. 11. What is network addressing? a. Answer: Network addressing refers to the system used to assign unique identifiers to devices on a network. This allows devices to communicate with each other and route data packets efficiently. Common addressing schemes include MAC addresses and IP addresses. 12. Stabilizer and UPS -uninterrupted power sources/supply difference 13. How do you prevent data loss? Take back up regularly Install anti-virus