Network Interview Questions
- What is MTU?
- How does TCP handshake work?
- How does SSL handshake work?
- What are the different phases in VPN establishment?
- How does DH (deffie helman) work?
- What is TCP window sizing?
- What is the difference between passive FTP and active FTP?
- What is the difference between socket and session?
- How does network management station work?
The Answers:
1. How does TCP handshake work? Transmission Control Protocol/Internet Protocol. There are 3 steps.
1. Local device sends sequence number and maximum segment size.
2. Destination device responds by sending its sequence number and maximum segment size back to local device.
3. Local device acknowledges receipt of the sequence number and segment size information.
2. How does SSL handshake work? Secure Sockets Layer. There are 4 steps.
1. Browser checks the certificate to make sure that the site you are connecting to is the real site and not someone intercepting.
2. Determine encryption types that the browser and web site server can both use to understand each other.
3. Browser and Server send each other unique codes to use when scrambling (or encrypting) the information that will be sent.
4. The browser and Server start talking using the encryption, the web browser shows the encrypting icon, and web pages are processed secured.
3. What is the difference between passive FTP and active FTP?
FTP is an unusual protocol in that it uses two ports, one for commands and the other for data. (This is one of the reasons it is superior to HTTP for transferring large files.) Active FTP was invented first. The client initiates a connection on the server’s command port. The server then initiates a connection with the client from its data port. In Passive FTP, the client initiates both connections with the server, which remains “passive”.
Active FTP may cause problems if your client is behind a firewall. From the firewall’s point of view, the FTP server that is trying to initiate a connection with your client looks like an intruder and is usually blocked. This is why many users have difficulty using FTP to download files from behind a firewall.
Passive FTP solves this problem, but creates other problems, notably where FTP server security is concerned. The server must listen on a large number of ports. This requires the firewall to let a lot of unqualified traffic through. Most firewall administrators do not like this.
As a rule, you do not need to be concerned about passive and active FTP unless you administer an FTP server or a firewall. If you experience difficulty using your FTP client from behind a firewall, this is likely the reason. Perhaps you should discuss the matter with your firewall administrator.
4. What is the difference between socket and session?
1. An SSL session is a mechanism through which connections can be established by re-using previously negotiated handshakes.
2. A socket is one endpoint of a two-way communication link between two programs running on the network. A socket is bound to a port number so that the TCP layer can identify the application that data is destined to be sent.
5. How does network management station work? Network management stations execute management applications which monitor and control network elements. Network elements are devices such as hosts, gateways, terminal servers, and the like, which have management agents responsible for performing the network management functions requested by the network management stations. The Simple Network Management Protocol (SNMP is used to communicate management information between the network management stations and the agents in the network elements. There are a few network management features that may be used to provide network monitoring for this advisory.
1. Device Availability Monitoring
2. SNMP MIB object monitoring
3. Cisco Service Assurance Agent (Cisco SAA)
4. RMON Alarm and Events
5. Event-MIB
6. CiscoWorks RME Network Show Commands and CLI scripting
6. What are the different phases in VPN establishment? Successful VPN establishment consists of two levels of SA’s known as phases. Phase 1 authentication establishes session keys. Using the Xauth feature, the client waits for a “username/password” challenge after the IKE Phase 1 SA has been established. When the end user responds to the challenge, the response is forwarded to the IPsec peers for an additional level of authentication completing Phase 2.
1. Phase 1 of a 2 phase VPN tunnel establishment process. Phase 1 negotiates the security parameter agreement.
2. Phase 2 of 2 phase VPN tunnel establishment process. Phase 2 uses the agreed parameters from Phase 1 to bring the tunnel up.
7. How does DH (deffie helman) work? Diffie-Hellman key agreement was invented in 1976 during a collaboration between Whitfield Diffie and Martin Hellman and was the first practical method for establishing a shared secret over an unprotected communications channel. Based on Ralph Merkle’s public key cryptosystem. Public key cryptography is a form of cryptography which generally allows users to communicate securely without having prior access to a shared secret key, by using a pair of cryptographic keys, designated as public key and private key, which are related mathematically.
8. What is TCP window sizing? The window size is the maximum number of bytes of data that can be transmitted in one segment. Increasing the window size for a TCP-based file transfer would increase throughput until the slowest link in the path saturates. It would be preferable to have a window size appropriate to the size of the link. There would be less buffering, the ACKs would return more quickly and more of the bandwidth would be used. Ideally you are looking for a Window Size >= Bandwidth * RTT.
9. What is MTU? Maximum Transmission Unit. The greatest amount of data or “packet” size that can be transferred in one physical frame on a network. This packet also contains the header and trailer information, which are like addresses for each packet that are required by the routers on the network.
can someone please help me with the technical and hr questions for tech support in HP… If anyone have any idea please share.
[email protected]
Hi…
I am going for interview for tech support plz send me placement paper for the same…
plz send me the technical questions asked for fresher asked in technical round of interview
I am sanjeevi kumar can you have send Linux system administrator fresher interview questions
Sir,
I am vijay kumar can you have send Linux system administrator fresher interview questions
Plz. send me fresher interview networking question and ccna
Please send me Interview questions on Computer Hardware Questions
Regards
Adil
You are questions good Ilike Plz send the new questions and answers
pls send me networking jobs and question…………….
please send me the some imp tricks and tips based on the PC,Laptop,network to my email ID [email protected]
pls send me too hardwar&networking interveiw question on my e-mail address pls
PLZ GIVE ME LINUX AND CISCO ADMIN QUES..
Plz. send me Fresher interview related networking and Hardware question on my email id.
my email id – [email protected]
Thanks Regard
Gaurav
Plz. send me fresher interview networking question and ccna
Thank Regard
Gaurav K. Sharma
What is MTU?
How does TCP handshake work?
How does SSL handshake work?
What are the different phases in VPN establishment?
How does DH (deffie helman) work?
What is TCP window sizing?
What is the difference between passive FTP and active FTP?
What is the difference between socket and session?
How does network management station work?
The Answers:
1. How does TCP handshake work? Transmission Control Protocol/Internet Protocol. There are 3 steps.
1. Local device sends sequence number and maximum segment size.
2. Destination device responds by sending its sequence number and maximum segment size back to local device.
3. Local device acknowledges receipt of the sequence number and segment size information.
2. How does SSL handshake work? Secure Sockets Layer. There are 4 steps.
1. Browser checks the certificate to make sure that the site you are connecting to is the real site and not someone intercepting.
2. Determine encryption types that the browser and web site server can both use to understand each other.
3. Browser and Server send each other unique codes to use when scrambling (or encrypting) the information that will be sent.
4. The browser and Server start talking using the encryption, the web browser shows the encrypting icon, and web pages are processed secured.
3. What is the difference between passive FTP and active FTP?
FTP is an unusual protocol in that it uses two ports, one for commands and the other for data. (This is one of the reasons it is superior to HTTP for transferring large files.) Active FTP was invented first. The client initiates a connection on the server’s command port. The server then initiates a connection with the client from its data port. In Passive FTP, the client initiates both connections with the server, which remains “passive”.
Active FTP may cause problems if your client is behind a firewall. From the firewall’s point of view, the FTP server that is trying to initiate a connection with your client looks like an intruder and is usually blocked. This is why many users have difficulty using FTP to download files from behind a firewall.
Passive FTP solves this problem, but creates other problems, notably where FTP server security is concerned. The server must listen on a large number of ports. This requires the firewall to let a lot of unqualified traffic through. Most firewall administrators do not like this.
As a rule, you do not need to be concerned about passive and active FTP unless you administer an FTP server or a firewall. If you experience difficulty using your FTP client from behind a firewall, this is likely the reason. Perhaps you should discuss the matter with your firewall administrator.
4. What is the difference between socket and session?
1. An SSL session is a mechanism through which connections can be established by re-using previously negotiated handshakes.
2. A socket is one endpoint of a two-way communication link between two programs running on the network. A socket is bound to a port number so that the TCP layer can identify the application that data is destined to be sent.
5. How does network management station work? Network management stations execute management applications which monitor and control network elements. Network elements are devices such as hosts, gateways, terminal servers, and the like, which have management agents responsible for performing the network management functions requested by the network management stations. The Simple Network Management Protocol (SNMP is used to communicate management information between the network management stations and the agents in the network elements. There are a few network management features that may be used to provide network monitoring for this advisory.
1. Device Availability Monitoring
2. SNMP MIB object monitoring
3. Cisco Service Assurance Agent (Cisco SAA)
4. RMON Alarm and Events
5. Event-MIB
6. CiscoWorks RME Network Show Commands and CLI scripting
6. What are the different phases in VPN establishment? Successful VPN establishment consists of two levels of SA’s known as phases. Phase 1 authentication establishes session keys. Using the Xauth feature, the client waits for a “username/password” challenge after the IKE Phase 1 SA has been established. When the end user responds to the challenge, the response is forwarded to the IPsec peers for an additional level of authentication completing Phase 2.
1. Phase 1 of a 2 phase VPN tunnel establishment process. Phase 1 negotiates the security parameter agreement.
2. Phase 2 of 2 phase VPN tunnel establishment process. Phase 2 uses the agreed parameters from Phase 1 to bring the tunnel up.
7. How does DH (deffie helman) work? Diffie-Hellman key agreement was invented in 1976 during a collaboration between Whitfield Diffie and Martin Hellman and was the first practical method for establishing a shared secret over an unprotected communications channel. Based on Ralph Merkle’s public key cryptosystem. Public key cryptography is a form of cryptography which generally allows users to communicate securely without having prior access to a shared secret key, by using a pair of cryptographic keys, designated as public key and private key, which are related mathematically.
8. What is TCP window sizing? The window size is the maximum number of bytes of data that can be transmitted in one segment. Increasing the window size for a TCP-based file transfer would increase throughput until the slowest link in the path saturates. It would be preferable to have a window size appropriate to the size of the link. There would be less buffering, the ACKs would return more quickly and more of the bandwidth would be used. Ideally you are looking for a Window Size >= Bandwidth * RTT.
9. What is MTU? Maximum Transmission Unit. The greatest amount of data or “packet” size that can be transferred in one physical frame on a network. This packet also contains the header and trailer information, which are like addresses for each packet that are required by the routers on the network.
Dear Sir,
Could you please send me the questions and answers for desktop support, network support and system admin qurey .
pls send me too hardwar&networking interveiw question on my e-mail address pls
very good material
i want to know about freshers hardware interview latest questions with answer in detail immediately.
Dear sir,
It is very good Q&answer…..but i need system administrator Quation & answer.
THANK U VERY MUCH
I m sandeep, plz send me questions and answer for desktop support, network support and system admin qurey as per weekly Thanx
Respected Sir/Mam
this is Mr. Abhishek Chauhan from Aligarh and i would like to say that next month i have to go for Wipro for an interview for the Post Network Administrator . so i need question and answer that are asked ion interview
so plz end me as soon as possible
its veryyyyyyyyyy goodddddd’&send me some iterview question
I want interview questionsand answer on desktop and active directory
The plot is basically an excuse to string along sight gags, puns, jokes based on Asian stereotypes, and general farce. ,
can u forward any one DESKTOP Eng questions to my mailid… iam a fresher
pls send me hardwar&networking interveiw question on my e-mail address pls
Please send all questions to my mail id
pls send me a ccna interview questions
please send me question/answer related to hardware & networking
plz also give answers of quest also
hi it is good question have post. but i need network system admini question
send more question/answer related to networking
please send me Technical Helpdesk- L1 Support (hcl comnet)relited ouestion
please send me these question .
these question is very important for fresher and new candidant.i am impresh these question because these question is a hier question to get a successfull job in the multinatinal company
please send me network administrator interview questions
keep it up
keep it up. put down load option.
goood
chelkapally naveen hyd
hi am naveen hyderabad please send me interview quastions
i need interview questions for desktop engineer, please send me.
Please send me a simple hardware interview questions
I need the desktop development interview questions to the earliest. It would be nice if you send it to me at my specified e-mail address..
Thanks,
Ankesh Bharti
(Software Engineer)
please help me to get interview questions on cryptography
please send me the pl/sql interview quetions for freshers.
i need interview questions about server 2003 please send me
please send me system administrator for interview question and desktop engineer .
please send me desktop interview questions
i want desktop interview question
It is nice to see your Questions .But i want techinical questions eg. ntdlr missing what to do?.
plese send me networking interview question for fresher which is applicable in india
Please send me the Linux interview questions
I need the data structure related interview questions
What is MTU?
I need the desktop interview question.
Please send me the Linux interview questions
It will helpful to us. Keep it up sir/mam
i need the desktop interview questions