Creative Technology
Services
Managed IT Services
Service Tiers
Service Enhancements
Managed Endpoint Support
Managed Infrastructure Support
Managed Network Services
Network Management & Monitoring
Total Network Security Services
Managed Wired & Wireless Networks
Dedicated Connectivity Services
Managed Infrastructure Services
Hybrid Cloud Infrastructure
Data Security & Storage
Software as a Service
Unified Communication
Cyber Security Services
Cyber Awareness and Training
Identity and Access Management
Intrusion Detection and Prevention
Threat Detection and Response
Professional Services
Infrastructure Audit & Gap Analysis
Disaster Recovery & Business Continuity
Digital Transformation
Advisory & Architecture
Managed IT Services
Service Desk
Onsite Support
Infrastructure Monitoring
Client Relationship Management
Managed IT Services
Managed Network Services
Network Management & Monitoring
Total Network Security Services
Managed Wired & Wireless Networks
Dedicated Connectivity Services
Managed Network Services
Managed Infrastructure Services
Hybrid Cloud Infrastructure
Data Security & Storage
Software as a Service
Unified Communication
Managed Infrastructure Services
Cyber Security Services
Cyber Awareness and Training
Identity and Access Management
Intrusion Detection and Prevention
Threat Detection and Response
Cyber Security Services
Professional Services
Infrastructure Audit & Gap Analysis
Disaster Recovery & Business Continuity
Digital Transformation
Advisory & Architecture
Professional Services
Why Lyon
Why Lyon
Team
Careers
Case Studies
News
Connect
Contact Us
Menu
Services
Managed IT Services
Service Tiers
Service Enhancements
Managed Endpoint Support
Managed Infrastructure Support
Managed Network Services
Network Management & Monitoring
Total Network Security Services
Managed Wired & Wireless Networks
Dedicated Connectivity Services
Managed Infrastructure Services
Hybrid Cloud Infrastructure
Data Security & Storage
Software as a Service
Unified Communication
Cyber Security Services
Cyber Awareness and Training
Identity and Access Management
Intrusion Detection and Prevention
Threat Detection and Response
Professional Services
Infrastructure Audit & Gap Analysis
Disaster Recovery & Business Continuity
Digital Transformation
Advisory & Architecture
Why Lyon
Why Lyon
Team
Career
Case Studies
News
Connect
Contact Us
#Experience
Interview
Interview
Your questions below
Home
Interview
questions
Service Desk Engineer
-
Technical Assessment
Service Desk Analyst
-
Technical Assessment
Solutions Engineer Mark 1
-
Technical Assessment
Infrastructure Engineer
-
Technical Assessment
Solutions Engineer Mark 2
-
Technical Assessment
Solutions Engineer Mark 3
-
Technical Assessment
Network Engineer
-
Technical Assessment
Full Name
Email
Mobile Number
Questions
1- Explain how VLAN trunking works using 802.1Q, and describe how you'd configure a trunk between two switches. How would you handle VLAN tagging in a multi-VLAN environment?
2- Describe how you would configure and troubleshoot Rapid Spanning Tree Protocol (RSTP) in a network to prevent loops and optimize convergence times. What steps would you take to resolve STP topology changes that cause intermittent connectivity issues?
3- What are the benefits of enabling port security on access layer switches, and how would you configure it to allow a maximum of two MAC addresses per port? How would you handle a port violation event?
4- Explain how Link Aggregation Control Protocol (LACP) works. How would you configure link aggregation between two switches to increase bandwidth and redundancy for a critical business application?
5- How do you differentiate between Layer 2 and Layer 3 switching, and how would you configure inter-VLAN routing on a Layer 3 switch? Provide a configuration example with two VLANs.
6- What are the most common issues you would encounter with switch port configurations (e.g., duplex mismatches, speed mismatches) and how would you diagnose and resolve these issues using tools like show interface and show log?
7- Explain the process of configuring static routes on a router, including setting administrative distance for redundancy. How would you verify that a static route is properly working using show ip route and ping tests?
8- Describe the difference between static and dynamic NAT (Network Address Translation) and how you would configure each. In what scenario would static NAT be more appropriate than dynamic NAT in a small to medium network?
9- How would you handle a situation where users are unable to connect to a specific external service due to an improper NAT configuration? What troubleshooting steps would you take to resolve the issue?
10- Explain how to configure routing failover using a secondary internet connection in a small office environment. How would you ensure that traffic automatically switches to the backup connection when the primary link fails?
11- What are the key differences between a Layer 3 switch and a traditional router? When would you recommend using a Layer 3 switch over a router in a small to medium-sized business environment?
12- Describe the purpose of Access Control Lists (ACLs) in routing. How would you configure an ACL to allow only certain internal subnets to access the internet while blocking access to other subnets?
13- Explain how stateful packet inspection works in modern firewalls and how it differs from stateless filtering. How would you configure stateful rules on a firewall to allow outbound traffic but deny unsolicited inbound traffic?
14- Describe how to configure and verify a firewall to support split tunnelling for remote VPN users. What security implications would you consider when enabling this feature?
15- Walk me through the process of setting up a firewall DMZ for hosting a public web server, while restricting internal network access. How would you configure the necessary rules and NAT policies?
16- Explain the difference between zone-based firewalls and traditional access control lists (ACLs) in firewalls. How would you configure zone-based policies to segment internal network traffic for enhanced security?
17- How would you configure and tune an Intrusion Prevention System (IPS) on a firewall to avoid false positives while maintaining security for a small to medium-sized business? Provide an example of tuning based on traffic patterns.
18- Describe how you would implement VPN load balancing for a business with around 80 remote workers. What firewall and network configurations would be necessary to ensure reliable and secure VPN access?
19- Explain how deep packet inspection (DPI) differs from basic firewall filtering. In what situations would you recommend enabling DPI, and how would you monitor and troubleshoot potential performance issues caused by DPI on a firewall?
20- How would you segment a small to medium-sized network of around 80 users for better performance and security? Explain how subnetting can help optimize traffic flow and reduce broadcast domains.
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
Write to us,
we will get back to you soon
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.