Network Administrator
100+ Network Administrator Interview Questions and Answers

Asked in Accel Limited

Q. What are the basic commands for VLAN and voice VLAN access?
VLAN is used to segment network traffic, while voice VLAN is used to prioritize voice traffic.
VLAN is used to separate network traffic into different virtual networks.
Voice VLAN is a feature that allows voice traffic to be prioritized on the network.
Commands like 'switchport mode access' and 'switchport voice vlan' are used to configure VLAN and voice VLAN access.

Asked in Temenos

Q. What is the difference between HTTP and HTTPS?
HTTP is unsecured protocol while HTTPS is secured protocol using SSL/TLS encryption.
HTTP stands for Hypertext Transfer Protocol, while HTTPS stands for Hypertext Transfer Protocol Secure.
HTTP operates on port 80, while HTTPS operates on port 443.
HTTP does not encrypt data, while HTTPS encrypts data using SSL/TLS.
HTTPS provides authentication and data integrity along with encryption.
Websites using HTTPS have a padlock icon in the address bar to indicate a secure connection.

Asked in Wipro Infrastructure Engineering

Q. What is the difference between a service ticket and a change ticket?
Service tickets are used to request support for an existing service, while change tickets are used to request changes to a service.
Service tickets are reactive, while change tickets are proactive.
Service tickets are used to restore a service to its normal state, while change tickets are used to improve or modify a service.
Service tickets are typically handled by the service desk, while change tickets are typically handled by change management.
Examples of service tickets inclu...read more

Asked in TCS iON

Q. What is the purpose of DHCP (Dynamic Host Configuration Protocol)?
DHCP automates IP address assignment, simplifying network management and reducing configuration errors.
DHCP assigns IP addresses dynamically to devices on a network, ensuring no conflicts.
It reduces manual configuration, allowing devices to connect to the network seamlessly.
DHCP can provide additional network configuration, such as subnet mask and default gateway.
For example, when a laptop connects to Wi-Fi, DHCP assigns it an IP address automatically.

Asked in Accel Limited

Q. What is dhcp, network topology?
DHCP is a network protocol that automatically assigns IP addresses to devices. Network topology refers to the layout of a network.
DHCP stands for Dynamic Host Configuration Protocol
DHCP automatically assigns IP addresses to devices on a network
Network topology refers to the physical or logical layout of a network
Common network topologies include star, bus, ring, and mesh

Asked in Infosys

Q. What is the difference between a virtual server and nodes?
Virtual servers are software-based while nodes are physical devices.
Virtual servers are created by partitioning a physical server into multiple virtual machines.
Nodes are individual physical devices that are connected to a network.
Virtual servers can be easily created, cloned, and deleted while nodes require physical installation and configuration.
Virtual servers can be easily moved between physical servers while nodes cannot.
Examples of virtual server software include VMware...read more
Network Administrator Jobs




Asked in DXC Technology

Q. What is the difference between LAN and WAN?
LAN is a local network while WAN is a wide area network.
LAN is limited to a small geographical area such as a home, office, or building
WAN covers a larger geographical area such as a city, country, or even the world
LAN typically has higher data transfer rates and lower latency compared to WAN
Examples of LAN include home networks, office networks, and school networks
Examples of WAN include the internet, cellular networks, and satellite networks

Asked in DXC Technology

Q. What are the differences between routers and switches?
Routers connect different networks, while switches connect devices within the same network.
Routers operate at Layer 3 (Network Layer) of the OSI model, while switches operate at Layer 2 (Data Link Layer).
Routers can connect multiple networks (e.g., LAN to WAN), while switches connect devices within a single network (e.g., computers in an office).
Routers use IP addresses to route data, while switches use MAC addresses to forward data frames.
Example: A router connects your home...read more
Share interview questions and help millions of jobseekers 🌟

Asked in Infosys

Q. How do you write an iRule for URI redirection?
An iRule can be written to redirect a URI to a different location.
Use the HTTP::redirect command to specify the new URI
Use the HTTP_REQUEST event to trigger the iRule
Example: when HTTP_REQUEST {HTTP::redirect "http://newlocation.com"}

Asked in Future Focus Infotech

Q. What are the differences between HSRP, VRRP, and GLBP?
HSRP, VRRP, and GLBP are all protocols used for providing redundancy in a network.
HSRP stands for Hot Standby Router Protocol and is a Cisco proprietary protocol.
VRRP stands for Virtual Router Redundancy Protocol and is an open standard protocol.
GLBP stands for Gateway Load Balancing Protocol and is also a Cisco proprietary protocol.
HSRP and VRRP both provide redundancy by allowing multiple routers to share a virtual IP address.
GLBP provides redundancy as well as load balanci...read more

Asked in Future Focus Infotech

Q. What are the differences between RSTP, STP, and MSTP?
RSTP, STP, and MSTP are all protocols used for preventing network loops, but they differ in their speed and complexity.
STP (Spanning Tree Protocol) is the original protocol used for preventing network loops.
RSTP (Rapid Spanning Tree Protocol) is an updated version of STP that is faster and more efficient.
MSTP (Multiple Spanning Tree Protocol) is a more complex protocol that allows for multiple VLANs to be mapped to a single spanning tree instance.
RSTP is faster than STP becau...read more

Asked in Alchemy Techsol India

Q. How does failover occur in a Cisco ASA Firewall?
Cisco ASA Firewall uses failover to ensure high availability and uninterrupted network services.
Failover is the process of switching to a backup device in case of a failure in the primary device.
Cisco ASA Firewall supports two types of failover: Active/Standby and Active/Active.
In Active/Standby failover, one firewall is active and the other is in standby mode, ready to take over in case of a failure.
In Active/Active failover, both firewalls are active and share the traffic l...read more

Asked in Darwish Cybertech

Q. What is VLAN in switching? What is site-site VPN? Explain routing>
VLAN in switching separates broadcast domains, site-to-site VPN connects two remote networks securely, routing directs traffic between networks.
VLAN stands for Virtual Local Area Network and is used to separate broadcast domains within a network switch.
Site-to-site VPN allows secure communication between two remote networks over the internet.
Routing is the process of directing network traffic between different networks based on IP addresses.
Examples: VLANs can be used to sepa...read more

Asked in Spectra Technovision India

Q. Are you familiar with Spectra Technovision India?
Spectra Technovision India is a technology company based in India.
Spectra Technovision India provides IT solutions and services to various industries.
The company specializes in software development, web development, and mobile app development.
Spectra Technovision India also offers digital marketing services and IT consulting.
Some of their clients include HDFC Bank, ICICI Bank, and Tata Motors.

Asked in TCS iON

Q. How do you troubleshoot OS problems?
To resolve OS problems, identify the issue, apply troubleshooting steps, and implement fixes or updates as needed.
Identify the problem: Check error messages or symptoms (e.g., slow performance, crashes).
Run built-in diagnostics: Use tools like Windows Troubleshooter or Disk Utility on macOS.
Update the OS: Ensure the operating system is up to date to fix known bugs.
Check for malware: Run antivirus scans to eliminate potential threats.
Restore system settings: Use System Restore...read more

Asked in Zycus Infotech

Q. what id dhcp and tell about mac
DHCP stands for Dynamic Host Configuration Protocol. It is a network protocol that automatically assigns IP addresses to devices on a network.
DHCP is used to manage and distribute IP addresses in a network
It allows devices to obtain IP addresses dynamically instead of manually configuring them
DHCP also provides other network configuration information like subnet mask, default gateway, and DNS server addresses
MAC (Media Access Control) address is a unique identifier assigned t...read more

Asked in Wipro

Q. How does load sharing work in BGP?
Load sharing in BGP involves distributing traffic across multiple paths to optimize network performance.
BGP allows for multiple paths to a destination to be advertised and stored in the routing table
Load sharing can be achieved through equal cost multi-path (ECMP) or unequal cost multi-path (UCMP)
ECMP distributes traffic evenly across multiple paths with the same cost
UCMP distributes traffic across paths with different costs based on a configured ratio
Load sharing can improve...read more

Asked in O2f info Solutions

Q. What is Osi model, switching, routing, hsrp, STP?
The OSI model is a conceptual framework that standardizes the functions of a telecommunication or computing system into seven layers.
OSI model stands for Open Systems Interconnection model
It consists of 7 layers: Physical, Data Link, Network, Transport, Session, Presentation, Application
Switching is a method used to forward data packets between devices on a network
Routing is the process of selecting the best path for data packets to travel from one network to another
HSRP (Hot...read more

Asked in Orient Technologies

Q. What is NAT?
NAT stands for Network Address Translation. It is a technique used to map public IP addresses to private IP addresses.
NAT is used to conserve public IP addresses by allowing multiple devices to share a single public IP address.
It provides an additional layer of security by hiding the private IP addresses of devices on a network.
There are three types of NAT: Static NAT, Dynamic NAT, and Port Address Translation (PAT).
Static NAT maps a single private IP address to a single publ...read more

Asked in IT Solutions

Q. What is static routing?
Static routing is a type of network routing where the administrator manually configures the routes in the routing table.
Routes are manually configured by the network administrator
Routes do not change unless manually modified
It is less flexible than dynamic routing
It is useful for small networks with few changes in topology
Example: A small office network with a single router connecting to the internet

Asked in Capgemini

Q. What is osi , what it's 7 layers
OSI stands for Open Systems Interconnection. It is a conceptual model that describes how data is transmitted over a network.
OSI model has 7 layers, each with a specific function
The layers are: Physical, Data Link, Network, Transport, Session, Presentation, and Application
Each layer communicates with the layer above and below it
The model helps ensure interoperability between different network devices and software
Example: HTTP (Application layer) uses TCP (Transport layer) to s...read more

Asked in Incedo

Q. What is SSL offloading in F5?
SSL offloading is a process of removing SSL encryption from incoming traffic and decrypting it before sending it to the backend servers.
SSL offloading is performed by a load balancer like F5 to reduce the processing load on backend servers.
It improves server performance and reduces latency by offloading SSL processing to a dedicated hardware or software.
F5 SSL offloading can be configured to support multiple SSL certificates and protocols like TLS 1.3.
It can also perform SSL ...read more

Asked in Infosys

Q. What is the difference between OSI and TCP/IP models?
OSI is a theoretical model while TCP is a practical protocol.
OSI has 7 layers while TCP has 4 layers.
OSI is a reference model while TCP is a communication protocol.
OSI is not implemented in practice while TCP is widely used.
OSI is used for teaching and understanding while TCP is used for actual communication.
Examples of OSI layers are physical, data link, network, transport, session, presentation, and application.
Examples of TCP layers are network interface, internet, transpo...read more

Asked in Microland

Q. What do you know about Broadband and Leased Line
Broadband and Leased Line are types of internet connections with different characteristics.
Broadband is a high-speed internet connection that is always on and typically shared among multiple users.
Leased Line is a dedicated connection between two points, providing consistent bandwidth and reliability.
Broadband is suitable for residential use and small businesses, while Leased Line is preferred by large corporations for mission-critical applications.
Broadband is usually cheape...read more
Asked in Teamone Technologies

Q. How many flags are there in the TCP/IP protocol?
There are 6 flags in the TCP/IP protocol.
The 6 flags in TCP/IP are: URG, ACK, PSH, RST, SYN, and FIN.
These flags are used to control the flow of data and manage the connection between devices.
For example, the SYN flag is used to establish a connection, while the FIN flag is used to terminate a connection.

Asked in TCS

Q. What is routing?
Routing is the process of selecting the best path for network traffic to reach its destination.
Routing involves analyzing network topology and determining the most efficient path for data to travel.
Routers use routing tables to determine the best path for data to take.
Routing protocols such as OSPF and BGP are used to exchange routing information between routers.
Routing can be either static or dynamic, depending on whether the routing table is manually configured or automatic...read more

Asked in Icon Hospital

Q. Can you resolve all hospital network issues?
Yes
As a Network Administrator, I can help resolve various technical issues in a hospital setting.
Examples include troubleshooting network connectivity problems, resolving server issues, managing user accounts and permissions, ensuring data security, and implementing network upgrades.
I can also assist in setting up and maintaining medical equipment that relies on network connectivity, such as patient monitoring systems or electronic health record systems.

Asked in Infosys

Q. Traffic inspection of checkpoint firewall
Traffic inspection of checkpoint firewall involves analyzing network traffic for security purposes.
Checkpoint firewall inspects traffic at the application layer to identify and block malicious traffic
It uses various security mechanisms such as stateful inspection, deep packet inspection, and intrusion prevention system
Traffic can be inspected based on source/destination IP, port, protocol, and content
Logs are generated for all traffic events and can be analyzed for security i...read more
Asked in Toshal Infotech

Q. What is the color code for standard network crimping?
The colour code for normal network crimping is used to identify the correct order of wires in a network cable.
The colour code for normal network crimping follows the T568B standard.
The order of wires in a network cable is: white-orange, orange, white-green, blue, white-blue, green, white-brown, brown.
This colour code is used for Ethernet cables, such as Cat5e or Cat6, to ensure proper connectivity.

Asked in Wipro

Q. How do you generate a random number in C/C++?
Use the rand() function in C/C++ to generate random numbers.
Include the
header file for the rand() function Use srand() to seed the random number generator
Generate random numbers using rand() function
Interview Questions of Similar Designations
Interview Experiences of Popular Companies





Top Interview Questions for Network Administrator Related Skills



Reviews
Interviews
Salaries
Users

