Assignment
Computer Networking Questions
1. How do Cloud providers increase the reliability of their storage options?
2. In AWS, what additional security features are available in VPC?
3. Given x.y.z.q/r Determine the number of hosts, the network address, the first and last host addresses
4. Regulatory compliance requires that operating systems be supported.
a. How does this impact free linux distributions?
b. How are RHEL and CentOS different?
5. In linux, what is the default, super user account name?
6. What is the CLI linux command to shutdown or restart the OS?
7. What is a linux script?
a. What are the specific steps to create and run a script?
b. Write a simple script to:
i. Save the results of ls -la to a file
ii. Ping google.com
iii. Rename a directory
8. Linux permissions
a. How are Linux permissions formatted?
b. Be able to change the permissions for a file to a specified setting
9. How do you launch a script from the CLI?
10. How can you determine what network interfaces are available on a linux machine?
11. How can you turn an Ethernet interface on/off, set the IP
12. Nano editor
a. Create, edit and save a file
13. What is the default linux shell?
14. How can you display the online help file for a linux command?
15. How can you run a command that requires elevated privileges in linux?
16. What is Webmin?
a. What can you do with it?
b. How do you access it?
17. What is the difference between redirection and a pipe?
18. Puttygen
a. What does it do?
b. How do you use it?
19. In VMware, what is the difference in the network settings between bridged and NAT? Other than examining the VMware settings, how could you determine which was being used?
20. What is jitter, as it relates to IP packets? How is jitter calculated?
21. In a AWS Type 2 VPC, what was the purpose of using NAT between the servers?
a. Should all of the servers reach the Internet? Explain
22. If a computer you were trying to "ping" didn't respond, how would you troubleshoot that. Assume the destination node is in the cloud. Assume your firewall wasn't blocking ICMP
23. You are logged into a linux machine, with the username user1, you are a standard user. You can't open a file for editing. What would you do? Explain your troubleshooting process
24. How is the ls command different from ls -la ?
25. Contrast ILEC and CLECs.
a. How are the different.
b. Why would someone choose to buy services from one over the other.
c. Who is responsible for the local loop?
26. Contrast the use of a Channel Bank as compared to a T1-PRI interface?
27. Why would a company use a SIP trunk? When would it make sense to use a SIP trunk?
28. What is Caller-ID spoofing?
29. What is the meaningful advantage of using PoE with VoIP phones compared with using the AC power adapter?
30. How does a phone get its config from a TFTP server.
a. How does that work?
b. How does the phone learn about a TFTP server?
31. Explain common VoIP terms:
a. Adaptive jitter buffer
b. Latency
c. Jitter
d. Silence suppression
e. SIP
f. CO
g. ILEC
h. CLEC
i. LATA
j. Local loop
k. PSTN
l. T1
m. POTS
n. CODEC
o. DTMF
p. Line appearance
q. FXO
r. FXS
32. Explain the major PBX features
a. ACD
b. IVR
c. Least Cost Routing
33. What are the potential issues with using a Hosted PBX.