0% found this document useful (0 votes)
5 views

Interview

Uploaded by

temesgen aynalem
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
5 views

Interview

Uploaded by

temesgen aynalem
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 3

1.

Introduce himself/herself and give explanation about his/her former job experience
2. What are the responsibilities of Database & network Administrator?
3. Differentiate between anti-virus and firewalls and how they works?

4. What is network security best practices?


a. Answer:
i. Use strong passwords: Choose unique and complex
passwords for all accounts.
ii. Keep software updated: Install security patches and
updates regularly to fix vulnerabilities.
iii. Use a firewall: Implement a firewall to block unauthorized
access to your network.
iv. Be cautious of suspicious emails and links: Avoid
clicking on suspicious links or opening attachments from
unknown senders.
v. Back up your data: Regularly backup important data to
protect against data loss.
vi. Use multi-factor authentication: Require more than one
form of identification to access accounts.
vii. Educate users: Train users on network security best
practices and common threats.
5. What is a network cable?
a. Answer: A network cable is a physical medium used to connect
devices on a network. Common types include:
i. Coaxial Cable: Used in older networks, providing a single
path for both data and power transmission. It is less flexible
and prone to interference.
ii. Twisted Pair Cable: Most common type of network cable,
consisting of two insulated wires twisted together to reduce
interference. It is available in different categories (Cat5, Cat6,
Cat7) with varying performance characteristics.
iii. Fiber Optic Cable: Uses light pulses to transmit data,
providing higher bandwidth and lower interference compared
to copper cables. It is more expensive but offers superior
performance for long distances.
6. What is the role of a network administrator?
a. Answer: A network administrator is responsible for managing,
maintaining, and troubleshooting network infrastructure. They
ensure network connectivity, security, performance, and
compliance with organizational policies. Key responsibilities include:
i. Installing and configuring network devices
ii. Monitoring network performance and troubleshooting issues
iii. Implementing network security policies and protocols
iv. Managing user accounts and access permissions
v. Planning and implementing network upgrades
7. What is the difference between a router and a switch?
a. Answer: The main difference lies in their functions:
i. Routers connect different networks, using IP addresses to
route data packets between them. They operate at the
network layer of the TCP/IP model.
ii. Switches connect devices on the same network, using MAC
addresses to forward data packets to the intended recipient.
They operate at the data link layer of the TCP/IP model.
8. What is a firewall?
a. Answer: A firewall is a security device that controls network traffic
based on predefined rules. It acts as a barrier between a network
and the external world, protecting against unauthorized access and
malicious attacks.
9. What is a network topology?
a. Answer: Network topology refers to the physical or logical
arrangement of devices in a network. It defines how devices are
interconnected and how data flows between them. Common types
include bus, star, ring, mesh, and tree topologies.
10. What are the different types of network topologies?
a. Answer:
i. Bus Topology: Devices are connected to a single cable
called a bus. Data travels along the bus to all devices, but
only the intended recipient processes the data.
ii. Star Topology: All devices are connected to a central hub or
switch. Data travels from the source device to the hub/switch
and then to the destination device. This is the most common
topology in modern LANs.
iii. Ring Topology: Devices are connected in a closed loop.
Data travels in one direction around the ring, passing through
each device until it reaches the destination.
iv. Mesh Topology: Devices are connected to multiple other
devices. This provides redundancy and fault tolerance but can
be complex to manage.
v. Tree Topology: A hierarchical structure resembling a tree,
with multiple levels. It is often used in WANs to connect
different networks.
11. What is network addressing?
a. Answer: Network addressing refers to the system used to assign
unique identifiers to devices on a network. This allows devices to
communicate with each other and route data packets efficiently.
Common addressing schemes include MAC addresses and IP
addresses.
12. Stabilizer and UPS -uninterrupted power sources/supply difference
13. How do you prevent data loss?
Take back up regularly
Install anti-virus

You might also like