Skip Navigation

Vacancy Questions Preview

Vacancy Questions Preview

Grade: All Grades
* 1.REQUIRED--A copy of your most recent performance appraisal or a written justification as to why you do not have one. Have you received an appraisal or rating on your job performance?
  1. Yes
    If yes, you must submit a copy of your most recently received performance appraisal per the instructions under "How to Apply" of this announcement.
  2. No

        BRANCHED: * 1.If no, please explain why. Your statement will not be accepted if it does not give a reason. "I have not received a performance appraisal" is acceptable as a reason.

       Maximum length of 250 characters.


* 2.Which of the following defines your eligibility for this announcement?
  1. I am a current BPD employee on a career or career-conditional (permanent) appointment in the competitive service.
  2. I am a current BPD employee serving on a Veteran's Recruitment Appointment.
  3. I am currently a Treasury Career Transition Assistance program eligible. ( I will provide the information required as described in the "Required Documents" section of this announcement.
  4. I do not fit any of the categories above and am therefore not eligible to apply to this announcement.


You must have one year of specialized experience at a level of difficulty and responsibility equivalent to the GS-11 grade level in the Federal service. Specialized experience for this position includes direct hands-on experience in configuring and maintaining routers, switches, and firewalls on a private network for use of a commercial enterprise or government, educational, or other organization.

* 3.Do you meet this specialized experience?
  1. Yes
  2. No


* 4.If you answered yes, where in your resume do you meet this specialized experience (position, employer, dates of employment)?
Maximum length of 250 characters.


* 5.Do you have "hands on" experience with hardware DNS servers deployed for the use of a commercial enterprise or government, educational organization?
  1. Yes
  2. No


* 6.Do you have “hands on” experience with network packet capture devices?
  1. Yes
  2. No


* 7.How many hosts per subnet are possible when using a subnet mask of 255.255.254.0?
  1. 511 hosts
  2. 512 hosts
  3. 510 hosts
  4. 254 hosts


* 8.What's the default subnet mask for a Class C IP addresses?
  1. 255.0.0.0
  2. 255.255.0.0
  3. 255.255.255.0
  4. 255.255.255.255


* 9.What represents the decimal equivalence of 11000000 10101000 10101100 11110001?
  1. 192.168.184.201
  2. 192.168.172.241
  3. 192.170.172.237
  4. 192.170.184.221


* 10.Which of the following is a valid extended IP access list?
  1. Access-list 101 permit ip host 175.2.10.0 any eq 80.
  2. Access-list 101 permit ip host 175.2.10.0 any eq www.
  3. Access-list 101 permit tcp host 175.2.10.0 any eq 80.
  4. Access-list 101 permit icmp host 175.2.10.0 any eq www.


* 11.During a TCP communication session, if the packets arrive to the destination out of order, what will happen to the original message?
  1. The packets will not be delivered.
  2. The packets will be retransmitted from the source.
  3. The packets will be delivered and reassembled at the destination.
  4. The packets will be delivered and not reassembled at the destination.


* 12.A ScreenOS firewall has one interface in the user zone and one interface in the servers zone. Both interfaces are addressed and active. The configured policy allows user traffic from the user zone to the FTP server in the servers zone, but the traffic does not cross the firewall from the client to the server. Which of the following is the most likely problem?
  1. The ScreenOS firewall has no physical connection to the FTP server.
  2. The ALG option on the ScreenOS firewall has not been enabled for FTP traffic.
  3. The ScreenOS firewall does not have a route defined to the FTP server's subnet.
  4. The ScreenOS firewall does not have a route defined to the FTP client's subnet.


* 13.Secure services in your network require reverse name resolution to make it more difficult to launch successful attacks against the services. To set this up, you configure a reverse lookup zone and proceed to add records. Which record types do you need to create?
  1. A records
  2. SOA records
  3. PTR records
  4. MX records
  5. None of the above


* 14.What is/are the purpose(s) of the Spanning Tree Algorithm?
  1. To keep routing updates from being transmitted onto the same port on which they were received.
  2. To prevent a "loop free" logical tree topology.
  3. To discover a "loop free" topology and provide, as possible, a path between every pair of LAN's.
  4. To provide a path between every LAN segment.
  5. To help ensure that messages will arrive over all possible paths.


* 15.What is the correct order of states for a typical port participating in Spanning Tree:
  1. initialization>blocking>listening>learning>forwarding
  2. initialization>learning>listening>blocking>forwarding
  3. initialization>forwarding>listening>blocking>learning
  4. initialization>listening>learning>blocking>forwarding
  5. blocking>initialization>listening>learning>forwarding


* 16.You are considering your options for a new firewall deployment. At what layer(s) of the OSI model does a stateful packet filtering firewall operate? (Select ALL that apply)
  1. Presentation
  2. Data Link
  3. Network
  4. Application
  5. Transport


* 17.Which two layers of the OSI model have the same functions as the TCP/IP model Network Access Layer?
  1. Network
  2. Transport
  3. Physical
  4. Data Link
  5. Session


* 18.Which layer encapsulates the segment into packets?
  1. physical
  2. data link
  3. network
  4. transport


* 19.What three protocols operate at the Application layer of the OSI model? (Choose three.)
  1. ARP
  2. DNS
  3. PPP
  4. SMTP
  5. POP
  6. ICMP


* 20.How does HTTP handle state?
  1. Within icmp signaling.
  2. TCP keepalives.
  3. UDP datagrams.
  4. None of the above.


* 21.Please indicate all of the operating systems from the following list that you have had “hands on” experience in configuring, maintaining, securing, troubleshooting, and operating in an enterprise production environment:
  1. Windows server
  2. Windows workstation
  3. Linux server
  4. Unix server
  5. BSD server
  6. Solaris
  7. None of the above


* 22.Please select the scripting languages from the following list that you have experience in and are confident writing scripts for a production environment:
  1. BASH
  2. Perl
  3. VBScript
  4. PHP
  5. Expect
  6. Python
  7. None of the above


* 23.Please select the answer that best describes you.
  1. I am able to communicate moderately technical ideas with individuals or groups and collaborate with senior personnel.
  2. I am able to clearly communicate and defend highly complex and controversial ideas and advise other IT experts within the agency or outside the agency.
  3. I am able to present recommendations and justifications to implement systems that meet current and future business requirements and enhance the existing architecture.
  4. I am able to communicate complex technical ideas and information with individuals or groups that encompass all levels of personnel and present recommendations regarding policy, programs, and innovations.
  5. None of the above.


* 24.Can you assess customer needs and provide customer service? (Select the answer that best describes you)
  1. I am able to develop and maintain relationships with a diverse clientele and provide expert technical information and guidance.
  2. I am able to assess customer needs or concerns to provide expert technical information and customized solutions to complex or sensitive IT problems.
  3. I am able to communicate with customers who have diverse technical needs and offer advice for IT problems.
  4. I am able to develop and maintain relationships with customers, provide expert technical information about IT products and services, determine customer satisfaction, and formulate ideas for improvements.
  5. None of the above.


* 25.Can you solve problems? (Select the answer that best describes you)
  1. I am able to research technical information from a variety of sources to provide precedent-setting solutions to unique problems.
  2. I am able to research technical information to identify solutions to moderately complex problems.
  3. I am able to anticipate highly technical problems, interpret data, and make decisions that influence important agency/organization IT policies and programs.
  4. I am able to evaluate highly technical materials from a variety of sources to interpret data and provide solutions that apply new developments, influence policy, increase functionality, or improve operations.
  5. None of the above.


* 26.A rope ladder hangs over the side of a ship. The rungs are one foot apart and the ladder is 12 feet long. The tide is rising at four inches an hour. How long will it take before the first four rungs of the ladder are underwater?
  1. 12 hours
  2. never
  3. 4 hours
  4. 48 hours






This is a Federal job application system. Providing false information, creating fake IDs, or failing to answer all questions truthfully and completely may be grounds for not hiring, for disbarment from Federal employment, or for dismissal after the applicant begins work. Falsifying a Federal job application, attempting to violate the privacy of others, or attempting to compromise the operation of this system may be punishable by fine or imprisonment (US Code, Title 18, section 1001).