Network Interview Questions

  1. What is MTU?
  2. How does TCP handshake work?
  3. How does SSL handshake work?
  4. What are the different phases in VPN establishment?
  5. How does DH (deffie helman) work?
  6. What is TCP window sizing?
  7. What is the difference between passive FTP and active FTP?
  8. What is the difference between socket and session?
  9. How does network management station work?

The Answers:

1. How does TCP handshake work? Transmission Control Protocol/Internet Protocol. There are 3 steps.
1. Local device sends sequence number and maximum segment size.
2. Destination device responds by sending its sequence number and maximum segment size back to local device.
3. Local device acknowledges receipt of the sequence number and segment size information.

2. How does SSL handshake work? Secure Sockets Layer. There are 4 steps.
1. Browser checks the certificate to make sure that the site you are connecting to is the real site and not someone intercepting.
2. Determine encryption types that the browser and web site server can both use to understand each other.
3. Browser and Server send each other unique codes to use when scrambling (or encrypting) the information that will be sent.
4. The browser and Server start talking using the encryption, the web browser shows the encrypting icon, and web pages are processed secured.

3. What is the difference between passive FTP and active FTP?
FTP is an unusual protocol in that it uses two ports, one for commands and the other for data. (This is one of the reasons it is superior to HTTP for transferring large files.) Active FTP was invented first. The client initiates a connection on the server’s command port. The server then initiates a connection with the client from its data port. In Passive FTP, the client initiates both connections with the server, which remains “passive”.
Active FTP may cause problems if your client is behind a firewall. From the firewall’s point of view, the FTP server that is trying to initiate a connection with your client looks like an intruder and is usually blocked. This is why many users have difficulty using FTP to download files from behind a firewall.
Passive FTP solves this problem, but creates other problems, notably where FTP server security is concerned. The server must listen on a large number of ports. This requires the firewall to let a lot of unqualified traffic through. Most firewall administrators do not like this.
As a rule, you do not need to be concerned about passive and active FTP unless you administer an FTP server or a firewall. If you experience difficulty using your FTP client from behind a firewall, this is likely the reason. Perhaps you should discuss the matter with your firewall administrator.

4. What is the difference between socket and session?
1. An SSL session is a mechanism through which connections can be established by re-using previously negotiated handshakes.
2. A socket is one endpoint of a two-way communication link between two programs running on the network. A socket is bound to a port number so that the TCP layer can identify the application that data is destined to be sent.

5. How does network management station work? Network management stations execute management applications which monitor and control network elements. Network elements are devices such as hosts, gateways, terminal servers, and the like, which have management agents responsible for performing the network management functions requested by the network management stations. The Simple Network Management Protocol (SNMP is used to communicate management information between the network management stations and the agents in the network elements. There are a few network management features that may be used to provide network monitoring for this advisory.
1. Device Availability Monitoring
2. SNMP MIB object monitoring
3. Cisco Service Assurance Agent (Cisco SAA)
4. RMON Alarm and Events
5. Event-MIB
6. CiscoWorks RME Network Show Commands and CLI scripting

6. What are the different phases in VPN establishment? Successful VPN establishment consists of two levels of SA’s known as phases. Phase 1 authentication establishes session keys. Using the Xauth feature, the client waits for a “username/password” challenge after the IKE Phase 1 SA has been established. When the end user responds to the challenge, the response is forwarded to the IPsec peers for an additional level of authentication completing Phase 2.
1. Phase 1 of a 2 phase VPN tunnel establishment process. Phase 1 negotiates the security parameter agreement.
2. Phase 2 of 2 phase VPN tunnel establishment process. Phase 2 uses the agreed parameters from Phase 1 to bring the tunnel up.

7. How does DH (deffie helman) work? Diffie-Hellman key agreement was invented in 1976 during a collaboration between Whitfield Diffie and Martin Hellman and was the first practical method for establishing a shared secret over an unprotected communications channel. Based on Ralph Merkle’s public key cryptosystem. Public key cryptography is a form of cryptography which generally allows users to communicate securely without having prior access to a shared secret key, by using a pair of cryptographic keys, designated as public key and private key, which are related mathematically.

8. What is TCP window sizing? The window size is the maximum number of bytes of data that can be transmitted in one segment. Increasing the window size for a TCP-based file transfer would increase throughput until the slowest link in the path saturates. It would be preferable to have a window size appropriate to the size of the link. There would be less buffering, the ACKs would return more quickly and more of the bandwidth would be used. Ideally you are looking for a Window Size >= Bandwidth * RTT.

9. What is MTU? Maximum Transmission Unit. The greatest amount of data or “packet” size that can be transferred in one physical frame on a network. This packet also contains the header and trailer information, which are like addresses for each packet that are required by the routers on the network.

Share this post:

Related Posts

58 Comments

  1. I am sanjeevi kumar can you have send Linux system administrator fresher interview questions

  2. vijay kumar says:

    Sir,

    I am vijay kumar can you have send Linux system administrator fresher interview questions

  3. mahadev says:

    Plz. send me fresher interview networking question and ccna

  4. Adil says:

    Please send me Interview questions on Computer Hardware Questions

    Regards

    Adil

  5. You are questions good Ilike Plz send the new questions and answers

  6. pls send me networking jobs and question…………….

  7. vinod says:

    pls send me too hardwar&networking interveiw question on my e-mail address pls

  8. ANIL says:

    PLZ GIVE ME LINUX AND CISCO ADMIN QUES..

  9. Plz. send me fresher interview networking question and ccna

    Thank Regard
    Gaurav K. Sharma

  10. sandeep says:

    What is MTU?
    How does TCP handshake work?
    How does SSL handshake work?
    What are the different phases in VPN establishment?
    How does DH (deffie helman) work?
    What is TCP window sizing?
    What is the difference between passive FTP and active FTP?
    What is the difference between socket and session?
    How does network management station work?
    The Answers:

    1. How does TCP handshake work? Transmission Control Protocol/Internet Protocol. There are 3 steps.
    1. Local device sends sequence number and maximum segment size.
    2. Destination device responds by sending its sequence number and maximum segment size back to local device.
    3. Local device acknowledges receipt of the sequence number and segment size information.

    2. How does SSL handshake work? Secure Sockets Layer. There are 4 steps.
    1. Browser checks the certificate to make sure that the site you are connecting to is the real site and not someone intercepting.
    2. Determine encryption types that the browser and web site server can both use to understand each other.
    3. Browser and Server send each other unique codes to use when scrambling (or encrypting) the information that will be sent.
    4. The browser and Server start talking using the encryption, the web browser shows the encrypting icon, and web pages are processed secured.

    3. What is the difference between passive FTP and active FTP?
    FTP is an unusual protocol in that it uses two ports, one for commands and the other for data. (This is one of the reasons it is superior to HTTP for transferring large files.) Active FTP was invented first. The client initiates a connection on the server’s command port. The server then initiates a connection with the client from its data port. In Passive FTP, the client initiates both connections with the server, which remains “passive”.
    Active FTP may cause problems if your client is behind a firewall. From the firewall’s point of view, the FTP server that is trying to initiate a connection with your client looks like an intruder and is usually blocked. This is why many users have difficulty using FTP to download files from behind a firewall.
    Passive FTP solves this problem, but creates other problems, notably where FTP server security is concerned. The server must listen on a large number of ports. This requires the firewall to let a lot of unqualified traffic through. Most firewall administrators do not like this.
    As a rule, you do not need to be concerned about passive and active FTP unless you administer an FTP server or a firewall. If you experience difficulty using your FTP client from behind a firewall, this is likely the reason. Perhaps you should discuss the matter with your firewall administrator.

    4. What is the difference between socket and session?
    1. An SSL session is a mechanism through which connections can be established by re-using previously negotiated handshakes.
    2. A socket is one endpoint of a two-way communication link between two programs running on the network. A socket is bound to a port number so that the TCP layer can identify the application that data is destined to be sent.

    5. How does network management station work? Network management stations execute management applications which monitor and control network elements. Network elements are devices such as hosts, gateways, terminal servers, and the like, which have management agents responsible for performing the network management functions requested by the network management stations. The Simple Network Management Protocol (SNMP is used to communicate management information between the network management stations and the agents in the network elements. There are a few network management features that may be used to provide network monitoring for this advisory.
    1. Device Availability Monitoring
    2. SNMP MIB object monitoring
    3. Cisco Service Assurance Agent (Cisco SAA)
    4. RMON Alarm and Events
    5. Event-MIB
    6. CiscoWorks RME Network Show Commands and CLI scripting

    6. What are the different phases in VPN establishment? Successful VPN establishment consists of two levels of SA’s known as phases. Phase 1 authentication establishes session keys. Using the Xauth feature, the client waits for a “username/password” challenge after the IKE Phase 1 SA has been established. When the end user responds to the challenge, the response is forwarded to the IPsec peers for an additional level of authentication completing Phase 2.
    1. Phase 1 of a 2 phase VPN tunnel establishment process. Phase 1 negotiates the security parameter agreement.
    2. Phase 2 of 2 phase VPN tunnel establishment process. Phase 2 uses the agreed parameters from Phase 1 to bring the tunnel up.

    7. How does DH (deffie helman) work? Diffie-Hellman key agreement was invented in 1976 during a collaboration between Whitfield Diffie and Martin Hellman and was the first practical method for establishing a shared secret over an unprotected communications channel. Based on Ralph Merkle’s public key cryptosystem. Public key cryptography is a form of cryptography which generally allows users to communicate securely without having prior access to a shared secret key, by using a pair of cryptographic keys, designated as public key and private key, which are related mathematically.

    8. What is TCP window sizing? The window size is the maximum number of bytes of data that can be transmitted in one segment. Increasing the window size for a TCP-based file transfer would increase throughput until the slowest link in the path saturates. It would be preferable to have a window size appropriate to the size of the link. There would be less buffering, the ACKs would return more quickly and more of the bandwidth would be used. Ideally you are looking for a Window Size >= Bandwidth * RTT.

    9. What is MTU? Maximum Transmission Unit. The greatest amount of data or “packet” size that can be transferred in one physical frame on a network. This packet also contains the header and trailer information, which are like addresses for each packet that are required by the routers on the network.

  11. Sachin says:

    Dear Sir,
    Could you please send me the questions and answers for desktop support, network support and system admin qurey .

  12. manohr says:

    pls send me too hardwar&networking interveiw question on my e-mail address pls

  13. satya says:

    very good material

  14. shadab says:

    i want to know about freshers hardware interview latest questions with answer in detail immediately.

  15. ananta says:

    Dear sir,
    It is very good Q&answer…..but i need system administrator Quation & answer.

  16. P.MATHESVARAN says:

    THANK U VERY MUCH

  17. Sandeep Patil says:

    I m sandeep, plz send me questions and answer for desktop support, network support and system admin qurey as per weekly Thanx

  18. Abhishek Chauhan says:

    Respected Sir/Mam
    this is Mr. Abhishek Chauhan from Aligarh and i would like to say that next month i have to go for Wipro for an interview for the Post Network Administrator . so i need question and answer that are asked ion interview
    so plz end me as soon as possible

  19. iqbalkhan says:

    its veryyyyyyyyyy goodddddd’&send me some iterview question

  20. suhail says:

    I want interview questionsand answer on desktop and active directory

  21. Miss42 says:

    The plot is basically an excuse to string along sight gags, puns, jokes based on Asian stereotypes, and general farce. ,

  22. sudha says:

    can u forward any one DESKTOP Eng questions to my mailid… iam a fresher

  23. vasif says:

    pls send me hardwar&networking interveiw question on my e-mail address pls

  24. sheik says:

    Please send all questions to my mail id

  25. venkat says:

    pls send me a ccna interview questions

  26. shrikant says:

    please send me question/answer related to hardware & networking

  27. send more question/answer related to networking & system analysis & design says:

    plz also give answers of quest also

  28. ashok says:

    hi it is good question have post. but i need network system admini question

  29. ajay kumar says:

    send more question/answer related to networking

  30. please send me Technical Helpdesk- L1 Support (hcl comnet)relited ouestion

  31. please send me these question .

  32. these question is very important for fresher and new candidant.i am impresh these question because these question is a hier question to get a successfull job in the multinatinal company

  33. jayram says:

    please send me network administrator interview questions

  34. keep it up. put down load option.

  35. hi am naveen hyderabad please send me interview quastions

  36. D.S sharma says:

    i need interview questions for desktop engineer, please send me.

  37. Anand says:

    Please send me a simple hardware interview questions

  38. I need the desktop development interview questions to the earliest. It would be nice if you send it to me at my specified e-mail address..

    Thanks,
    Ankesh Bharti
    (Software Engineer)

  39. deepa says:

    please help me to get interview questions on cryptography

  40. Rup says:

    please send me the pl/sql interview quetions for freshers.

  41. i need interview questions about server 2003 please send me

  42. please send me system administrator for interview question and desktop engineer .

  43. Harpreet says:

    please send me desktop interview questions

  44. raghu says:

    i want desktop interview question

  45. nirmal says:

    It is nice to see your Questions .But i want techinical questions eg. ntdlr missing what to do?.

  46. vikas says:

    plese send me networking interview question for fresher which is applicable in india

  47. nancy says:

    Please send me the Linux interview questions

  48. uma shankar says:

    I need the data structure related interview questions

  49. uma shankar says:

    What is MTU?

  50. manoj kumar says:

    I need the desktop interview question.

  51. vinodh ramani says:

    Please send me the Linux interview questions

  52. ravi.v says:

    It will helpful to us. Keep it up sir/mam

  53. ravi says:

    i need the desktop interview questions

Leave a Comment