0% found this document useful (0 votes)
27 views

Technical Interview Que

The document discusses technical networking questions and answers related to topics like IPv4 vs IPv6, private vs public IP addresses, subnet masks, DNS, port numbers, routing algorithms, Linux commands, permissions, processes, and more. It provides detailed explanations for each question.

Uploaded by

Deepika Kumari
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
27 views

Technical Interview Que

The document discusses technical networking questions and answers related to topics like IPv4 vs IPv6, private vs public IP addresses, subnet masks, DNS, port numbers, routing algorithms, Linux commands, permissions, processes, and more. It provides detailed explanations for each question.

Uploaded by

Deepika Kumari
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 20

*Technical questions*

1. Difference between ipv4 and ipv6 ?

Ans:

2. What is private ip and public ip address ?

Ans:

3.What is subnet mask ?

Ans:A subnet mask is a 32-bit number created by setting host bits to all 0s and setting network bits to all
1s. In this way, the subnet mask separates the IP address into the network and host addresses.

4.What is DNS ?

Ans:The Domain Name System (DNS) is the phonebook of the Internet. Humans access information
online through domain names, like nytimes.com or espn.com. Web browsers interact through Internet
Protocol (IP) addresses. DNS translates domain names to IP addresses so browsers can load Internet
resources.
5.Can you give 2 name to a single DNS ?

Ans: Yes, a single DNS name can have multiple IP addresses associated with it. This is known as DNS
round-robin or DNS load balancing.

6.What is protocol, port number and their uses ?

Ans: *protocol:In networking, a protocol is a set of rules for formatting and processing data.

*Port:A port number is a way to identify a specific process to which an internet or other network
message is to be forwarded when it arrives at a server.

* Port no. Used for:

Numbers from 0 to 1023 are allocated for notable enterprises and are known as restricted port
numbers. Some of these restricted ports are used by Apple QuickTime, Structured Query Language
services, and Gopher services.

The range of available port numbers is 1024–49151 for those looking to register a specific one. These
port numbers are often registered by software companies. Anyone can access ports ranging from 49152
to 65536, which can be dynamic or private.

Temporary port numbers can be assigned from a pool of assigned port numbers for the duration of the
request and its completion.

Q7.What is STP ?

Ans:The Spanning Tree Protocol (STP) is a network protocol that builds a loop-free logical topology for
Ethernet networks. The basic function of STP is to prevent bridge loops and the broadcast radiation that
results from them.

Q8. Tell me something about routing algorithm?

Ans:A routing algorithm is a procedure that lays down the route or path to transfer data packets from
source to the destination. They help in directing Internet traffic efficiently.

Q9.What is difference between link state and distance vector routing ?


Ans:

10. What is private address of Class A, B, C ?

Ans:The Internet Assigned Numbers Authority (IANA) has assigned several address ranges to be used by
private networks.

Address ranges to be use by private networks are:

Class A: 10.0.0.0 to 10.255.255.255

Class B: 172.16.0.0 to 172.31.255.255

Class C: 192.168.0.0 to 192.168.255.255

An IP address within these ranges is therefore considered non-routable, as it is not unique. Any private
network that needs to use IP addresses internally can use any address within these ranges without any
coordination with IANA or an Internet registry. Addresses within this private address space are only
unique within a given private network.

All addresses outside these ranges are considered public.

11. What is shell in linux ?

Ans:Shell in Linux is a text-based interface wherein users can enter command names, execute programs,
and manipulate files such as file handles, file permissions, and directories. Users can access the shell
through the terminal window or console, a window displaying a command prompt where users can
enter commands.

12. What is permission in linux ?

Ans:All Linux files belong to an owner and a group. When permissions and users are represented by
letters, that is called symbolic mode. For users, u stands for user owner, g for group owner, and o for
others. For permissions, r stands for read, w for write, and x for execute.

13. Tell me basic commands of linux ?

Ans

14. What is different flavour of linux and which have you used it ?

Ans:
Above are different flavours of Linux and I used

*Ubuntu:

Ubuntu is a Linux distribution that has three editions - Desktop, Server, and Core for IoT. Ubuntu
provides a user-friendly user interface and comes with free software such as LibreOffice, Firefox,
Thunderbird, Transmission, and games like Sudoku and chess. In addition to the user-friendliness, the
operating system is known to be more secure than Windows. It is not immune to viruses but it has a
significantly lower level of exposure risk to malware or viruses. Plus, it is highly customizable, so you can
change your Ubuntu environment so it is more suitable to your needs.

15. Difference between Unix and linux ?

Ans:

16. What is firewall in Linux?

Ans:The security system in Linux OS is known as Linux Firewall, which monitors and governs the network
traffic (outbound/inbound connections). It can be used to block access to different IP addresses, Specific
subnets, ports (virtual points where network connections begin and end), and services.

17. What is iptables and command for it ?

Ans: iptables is a command line interface used to set up and maintain tables for the Netfilter firewall for
IPv4, included in the Linux kernel. The firewall matches packets with rules defined in these tables and
then takes the specified action on a possible match.

Syntax:
iptables --table TABLE -A/-C/-D... CHAIN

18. What is AWK and SED in shell scripting?

Ans: awk – this command is a useful and powerful command used for pattern matching as well as for
text processing. This command will display only the third column from the long listing of files and
directories. sed – this is a powerful command for editing a 'stream' of text.

19. If you have created a file then how do you know which user created than file ?

Ans: The most simple method to find file owner in Linux is using “ls -l” command. Open the terminal
then type ls -l filename in the prompt. The 3rd column is the file owner. The ls command should be
available on any Linux system.

20. What is the command to stop a process in Linux ?

Ans :CMD Kill Process,:

Type cmd in the Search box, and then right-click the Command Prompt window and select Run as
administrator. ...

A)tasklist | more.

B) taskkill /F /PID pid_number. ...

C) taskkill /IM “process name” /F. ...

D) taskkill /IM Process Name /IM Process Name /F. ...

E) taskkill /PID PID /PID PID /F. ...


F) Get-Process.

21. How can I see what are the process running in Linux ?

Ans,: Type the ps aux or ps -e to see all running process in Linux. Alternatively, you can issue the top
command or htop command to view running process in Linux.

22. If I have given a command ps then what can I see expect process running?

Ans : The ps command gives a snapshot of the current processes

23. How you can check a size of a file in linux ?

Ans :Using the “ls” command. With this command, you can use the -lh option and get the file size in
Linux OS. when you use this option, you will get your file size in a human-readable format. In other
words, you can see the file size in GBs, MBs, KBs, bytes, etc.

24. Why Linux is more secure ?

Ans:Linux is developed using a highly process-oriented and engineered process. The whole source code
behind Linux is maintained by subsystem maintainers, in which each and every change is reviewed
thoroughly. Thus, it is secured by design also.

25. What is the difference between windows and Linux ?

Ans:
26. What is the boot process of Linux operating system ?

Ans: Booting a Linux installation involves multiple stages and software components, including firmware
initialization, execution of a boot loader, loading and startup of a Linux kernel image, and execution of
various startup scripts and daemons.

27. Where user password is store in linux operating system ?

Ans:All modern Linux operating systems use the /etc/shadow file to store user passwords in an
encrypted hashed format. Only root users or commands with suid bit can access the /etc/shadow file. All
other user information, such as user names, home directory, and default shell, is stored in the
/etc/passwd file.

28. Have you ever install a linux operating system on your own ? If yes then what is swap area ?

Ans:yes;

Swap space is used as an overflow area for physical memory, so when the system runs out of RAM,
inactive pages are moved from RAM to the swap space. This allows the operating system to continue
running, although more slowly.

29. What is crontab in Linux operating system ?

Ans :Crontab, which is short for cron table, is a file containing the schedule of various cron entries that
should be run at specified times. Another way of describing crontab is as a utility that enables tasks to
run automatically at regular intervals in the background by the cron daemon

30. If I am giving a permission 744 then what does exactly it means ?

Ans: 744 , which is a typical default permission, allows read, write, and execute permissions for the
owner, and read permissions for the group and “world” users.

31. If CPU utilization is more than what is the reason behind it ?

Ans: CPU utilization is the amount of work a CPU does to perform the tasks given to it. It's an important
metric to track because high CPU usage can negatively impact the performance of a system.
32. Have you ever come across any load balancer?

Ans: yes,load balancer is a piece of hardware (or virtual hardware) that acts like a reverse proxy to
distribute network and/or application traffic across different servers

For example, an ecommerce application has a product directory, shopping cart, and checkout functions.
The application load balancer sends requests for browsing products to servers that contain images and
videos but do not need to maintain open connections.

33. Tell me the configuration file of Apache ?

Ans:Apache is configured by placing directives in plain text configuration files. The main configuration
file is usually called httpd. conf . The location of this file is set at compile-time, but may be overridden
with the -f command line flag.

The Apache HTTP Server configuration file is /etc/httpd/conf/httpd. conf . The httpd. conf file is well-
commented and mostly self-explanatory

34. What is web hosting and application hosting ?

Ans: A web hosting service is a type of Internet hosting service that hosts websites for clients, i.e. it
offers the facilities required for them to create and maintain a site and makes it accessible on the World
Wide Web.

*Application Hosting is most commonly offered as Software as a Service (SaaS) subscription which allows
businesses to run their applications on servers or in a cloud that is hosted by a service provider such as
AWS (Amazon Web Services) and GCP (Google Cloud Platform). Businesses do not have to invest in
building and maintaining the underlying infrastructure which enables them to lower their costs by
paying only for what they use, enjoy seamless upgrades in functionality, and easily integrate with their
existing data and systems.

35. What does do you see after giving a cammand ifconfig except ip address?

Ans: The ifconfig function displays the current configuration for a network interface when no optional
parameters are supplied.

36. What is df command in Linux ?


Ans:The df command displays information about file system disk space usage on the mounted file
system

37. What is LVM in linux ?

Ans:LVM is used for the following purposes: Creating single logical volumes of multiple physical volumes
or entire hard disks (somewhat similar to RAID 0, but more similar to JBOD), allowing for dynamic
volume resizing.

38 . What is under /etc/passwd ?

Ans:Traditionally, the /etc/passwd file is used to keep track of every registered user that has access to a
system. The /etc/passwd file is a colon-separated file that contains the following information: User
name. Encrypted password. User ID number (UID)

39. What are environment variables in Linux and command for that ?

Ans:The environment variables are dynamic values that are stored within a system and used by
applications launched in shells or sub-shells. These variables have a name and their respected value.

The env command allows you to display your current environment or run a specified command in a
changed environment.

40. If I give a command ls -art then what does it mean ?

Ans:

41. What is CI/CD pipeline?

Ans:A continuous integration and continuous deployment (CI/CD) pipeline is a series of steps that must
be performed in order to deliver a new version of software. CI/CD pipelines are a practice focused on
improving software delivery throughout the software development life cycle via automation.

42. What is docker and kubernetes ?

Ans:While Docker is a container runtime, Kubernetes is a platform for running and managing containers
from many container runtimes.
43. What is docker conflicts ?

Ans:Docker uses the default 172.17. 0.0/16 subnet for container networking. If your host system is in
this subnet block, you will experience an IP conflict when the docker service or a container is started.

44. Which tool you have for continuous monitoring ?

Ans: AppDynamics is a continuous monitoring tool that supports infrastructure, network, and
application monitoring of both cloud and on-premises computing environments.

45. What is puppet and advantage of puppet tool ?

Ans: The puppet tool is used to add animated movements to a static image.

# Puppet is an efficient system management tool for centralizing and automating the configuration
management process.

It can be used as a software deployment tool.

It can also be utilized as open-source configuration management for server configuration, management,
deployment, and orchestration.

46. What is git and GitHub ?

Ans:Git is a version control system that allows developers to track changes in their code. GitHub is a
web-based hosting service for git repositories. In simple terms, you can use git without Github, but you
cannot use GitHub without Git.

47. What is the advantage of devops ?

Ans:DevOps helps automate the testing tools in the software development lifecycle which helps
companies enhance the quality of software. This is very beneficial for identifying bugs, errors, and
software crashes at a very early stage. You can fix all these identified issues and reduce the chances of
errors.

48. Tell the architecture of kubernetes ?


Ans: Kubernetes is an architecture that offers a loosely coupled mechanism for service discovery across
a cluster. A Kubernetes cluster has one or more control planes, and one or more compute nodes.

49. What is git conflicts ?

Ans:A conflict arises when two separate branches have made edits to the same line in a file, or when a
file has been deleted in one branch but edited in the other. Conflicts will most likely happen when
working in a team environment.

50. What is EC2 instance in AWS ?

Ans: An Amazon EC2 instance is a virtual server in Amazon's Elastic Compute Cloud (EC2) for running
applications on the Amazon Web Services (AWS) infrastructure.

51. What is IASS, PAAS, SAAS and their example ?

Ans: #Infrastructure as a service (IaaS) is a type of cloud computing service that offers essential
compute, storage, and networking resources on demand, on a pay-as-you-go basis.

# A good example of PaaS is AWS Elastic Beanstalk. Amazon Web Services (AWS) offers over 200 cloud
computing services such as EC2, RDS, and S3.

#SaaS uses the Internet to deliver subscription software services, which are managed by a third-party
vendor. Well-known SaaS examples include Dropbox, Google Workspace, and Salesforce. Infrastructure-
as-a-service (IaaS) offers access to resources such as servers, storage, memory, and other services.
52. How will you connect to the EC2 instance ?

Ans: 1. Open your terminal and change directory with command cd, where you downloaded your pem
file. In this demonstration, pem file is stored in the downloads folder.

connect to ec2 instance ssh using linux step 1

2. Type the SSH command with this structure:

ssh -i file.pem username@ip-address

This is the explanation of the previous command:

ssh: Command to use SSH protocol

-i: Flag that specifies an alternate identification file to use for public key authentication.

username: Username that uses your instance

ip-address: IP address given to your instance

3. After pressing enter, a question will prompt to add the host to your known_hosts file. Type yes. This
will help to recognize the host each time you’re trying to connect to your instance.

connect to ec2 instance ssh using linux step 3

4. And that’s it! Now you’re logged in on your AWS instance

Q 53. What is PKI ?

Ans:The pki command provides a command-line interface allowing clients to access various services on
the Certificate System server

54. What is cryptography?

Ans:Cryptography is the process of hiding or coding information so that only the person a message was
intended for can read it.

55. What is digital certificate?

Ans: A digital certificate is a file or electronic password that proves the authenticity of a device, server,
or user through the use of cryptography and the public key infrastructure (PKI).
56. What is csr ?

Ans:Corporate social responsibility is a business model by which companies make a concerted effort to
operate in ways that enhance rather than degrade society and the environment.

57. Tell me the flow for creating the certificate?

Ans:Before generating a certificate, create a private key and use that to create a certificate signing
request (CSR) on the appliance. Then, instead of sending the CSR out to a CA, use the NetScaler CA Tools
to generate a certificate.

58. What is AES and DES ?

Ans: DES (Data Encryption Standard) and AES (Advanced Encryption Standard) both are classified as
symmetric block ciphers. In order to alleviate the disadvantages of DES, AES was introduced. Because
DES has a smaller key size, it is less secure; hence triple DES was introduced, although it is slower.

Ans:

59. What is SSL and TLS ?

Ans:SSL is technology your applications or browsers may have used to create a secure, encrypted
communication channel over any network. However, SSL is an older technology that contains some
security flaws. Transport Layer Security (TLS) is the upgraded version of SSL that fixes existing SSL
vulnerabilities.
60. What is VPN and advantage of VPN ?

Ans: In basic terms, a VPN provides an encrypted server and hides your IP address from corporations,
government agencies and would-be hackers. A VPN protects your identity even if you are using public or
shared Wi-Fi, and your data will be kept private from any prying internet eyes.

*HR interview questions*

1. Tell me something about yourself?

Ans:https://youtu.be/QQpsFHf-UK8?feature=shared
Ans:

2. Tell me about your family background?

Ans:

https://youtu.be/GKvpEJhnlcA?feature=shared
3. Tell me something that is not mentioned in your resume?

Ans:

4. Why our marks in CDAC is below average ?

Ans : Sir/Madame It’s just about practicality and architecture. You won’t get anywhere with bookish
skills. Those students may excel at bookish concepts in any subject, but I am the one with in-depth
knowledge of what I have personally learned and accomplished. During my summer training and project
work, I concentrated more on learning skills than on raising my exam grades, and I like to learn by doing.
5. As I can see your course is related to security, but if you gone in different domain so are you
comfortable with that ?

Ans: yes I comfortable but

Cyber security is a highly specialized field. It requires an overall understanding of the most efficient
process to secure your network and defend against hacking, malware, and so on. With these skills, one
can open up their own business, set up a team, and offer consulting services.

6. Why you have chosen these course ?

Ans: in it we learn Networking and Security, DITISS is one of the best course out there in the market
which has good value when it comes for the companies who recruit candidates in that field. I had
pursued DITISS so that I can work in field of it and get job easily,and it is very interesting subject.

7. How do you rate yourself in linux ?

Ans: “I would rate myself as a 7 on a scale of 1 to 10. I have a solid foundation of knowledge and
experience in my field, and I am confident in my ability to contribute to a team or organization.
However, I am always looking to improve and grow, so I am always open to constructive feedback and
suggestions.”

8. Are u flexible?

Ans:I am incredibly flexible, and ready to work at any time you need me here.

My greatest strength is my flexibility.

9. What do you know about our company?


Ans:

10. Are you comfortable with the bond ?

Ans: If you are a fresher, You can say yes, if you have no problems. But this is strictly based on your
circumstances, give honest answers, the hiring management will consider. No bond and im ready to
relocate.

11. What are our salary expectation?

Ans:

12. What are your thoughts on recession ?


Ans: a period when the economy of a country is not successful and conditions for business are bad: The
country is sliding into the depths of (a) recession.

13. Do you have any questions for us ?

Ans:

Interview questions:

Link:

https://www.geeksforgeeks.org/9-common-interview-questions-for-freshers/

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy