שחזורי ראיונות עבודה -> ראיון בחברת Gilat ל System
  • ראיון בחברת Gilat ל System
  • ע"י: Avi
    3.Host-A has the IPv4 address and subnet mask 192.168.1.50 255.255.255.0. Which of the following IPv4 addresses would be on the same network as Host-A? (Choose all that apply) 192.168.0.1 192.168.0.100 192.168.1.1 192.168.1.100 192.168.2.1 192.168.1.350 4.Which DHCP setting determines the length of time a device can use an IP address? a) Lease Time b) Subnet Mask c) Default Gateway d) DNS Server e) Router Address 5.How many usable host addresses are available in a /28 subnet? 14 16 30 62 6.Which of the following is the primary purpose of the Spanning Tree Protocol (STP) in a network? To provide encryption for data transmitted over Layer 2 switches To prevent loops in a redundant switched network To increase the bandwidth of network links by aggregating ports To dynamically assign IP addresses to network devices 7. In an OSPF network, which of the following is used to determine the best path to a destination? Hop count Bandwidth and latency Cost, based on link bandwidth MAC address of the next-hop router 8.When upgrading your Active Directory environment from Windows Server 2012 R2 to Windows Server 2019, which should be upgraded first? Forest Functional Level (FFL) Domain Functional Level (DFL) Both must be upgraded at the same time Neither; the Domain Controllers should be upgraded first 9.Which protocol is recommended for secure remote administration of network devices? Telnet SSH FTP HTTP 10.How do you configure a switch interface as an access port? (Cisco Switch) Switchport mode trunk Switchport mode access Set port access Port access mode No experience with Cisco Switch 11.How would you proceed if the local R&D team requires more LAN ports, thereby affecting their work capacity? Short Term - Permit and assist RND to deploy any available adapters/switches to quickly expand their port count and not affect business continuity. Long Term - Coordinate with corporate IT to implement required equipment. Collaborate with the R&D team and local IT to review their needs, then coordinate with corporate IT to implement an approved, compliant solution. Suggest temporary workarounds such as using network splitters or USB-to-Ethernet adapters until a permanent solution is planned, providing business continuity. Recommend shifting all R&D traffic to Wi-Fi, to bypass the need for additional LAN ports entirely. 12.Which commands displays network interface configuration on a Linux system? ipconfig ifconfig netstat iwconfig ip a 13.What are the differences between the two types of accounts: root and administrator (on Linux) 14.Your CFO receives an email from billing@pay-ment1.com claiming to be from “Payment Inc.” The message warns that invoice #9876 is overdue and urges immediate action by clicking a link to avoid late fees. Provide 3 key methods you would use to verify whether this email is genuinely from Payment Inc. or a phishing attempt. Also, from the choices below, select all signs indicating it might be a phishing attack: The domain pay-ment1.com is slightly different from the official payment.com The email demands immediate action The link points to an unknown domain pay-ment1.com/billing It includes the exact invoice number from your records Branding and spelling appear inconsistent with previous vendor emails 15.What sign may indicate lateral movement following a brute force attack? Service accounts accessing only usual systems Service accounts accessing systems beyond their normal scope Regular, scheduled access events Minimal network traffic 16.In case you identify a user's credentials are compromised, what is your action plan ? (Arrange in order) Raise a flag of acknowledgment to manager Reset user's password Analyze what systems/information the attacker accessed Contact the user to inform about the activity Lock user's account Sign out user of all sessions 17.Your organization recently added a new domain controller, and users are reporting delayed logins and email delivery issues. Describe 4 methods or tools you would use to verify the health of both Active Directory (including replication status) and Exchange. Also, from the following actions, select all that directly help confirm AD or Exchange health: Run Dcdiag on each domain controller Verify the MX records with an external DNS lookup tool Check Event Viewer logs for DS and MSExchange errors Use the Microsoft 365 admin center to reset user passwords Monitor mail queues via Exchange Toolbox or Get-Queue command 18.Which of the following is a critical component of Active Directory? Domain Controllers DNS Group Policy All of the above 19.You need to configure Conditional Access in Microsoft 365 to meet the following security requirements: - Allow users to access their organization mailbox only from mobile devices using the Outlook app. - Permit access only if users connect from specific IP addresses. - Enforce Multi-Factor Authentication (MFA) every 3 days; Which of the following is the correct approach? Use Microsoft Defender for Cloud Apps to restrict access based on device type and enforce MFA. Configure an Exchange ActiveSync policy to allow only Outlook mobile and enforce MFA every 3 days. Enable per-user MFA and configure a Named Location for trusted IPs in Entra ID. Create a Conditional Access policy that targets the Outlook mobile app, allows access only from specific IP ranges, and sets the sign-in frequency session control to 3 days. 20.On-site backups, off-site backups, cloud backups. In what situation would each be ideal? What are the pros and cons of each? 21.What is the main difference between deploying a package and deploying an application in SCCM? Packages support dependencies and detection methods, while applications do not. Deploying a package allows for more advanced deployment types than deploying an application. Applications use detection methods to verify installation status, while packages do not. Packages can only be used for software installations, while applications can only be used for updates. 22.Your company recently moved from having each user install their own printer drivers to using a dedicated Windows Print Server. After the change, some employees complain about slow printing or incorrect printer drivers. Describe the core functions the print server provides in this environment—focusing on driver management, job spooling, and centralized administration. Then, from the following list, select which tasks are typically handled by a print server: Assigning IP addresses to printers Print job spooling Centralized driver updates DHCP address leasing Setting printer permissions and access control Monitoring and reporting printer usage 23.What is the difference between network share permissions and NTFS permissions on a Windows file server? 24.What are the steps to increase the RAM and CPU of a Linux virtual machine (VM) that currently has a snapshot ? 25.Which feature is critical for ensuring high availability in virtualized environments? VM Snapshots Live Migration Disk Imaging Shared Storage 26.If your system's execution policy is set to Restricted, how can you run an unsigned PowerShell script? It is not possible; you must first change the execution policy permanently. Use the command | powershell.exe -ExecutionPolicy Bypass -File script.ps1 to temporarily bypass the policy. Run PowerShell as administrator. Rename the script to a .bat file and execute it.