Technical Interview Que
Technical Interview Que
Ans:
Ans:
Ans:A subnet mask is a 32-bit number created by setting host bits to all 0s and setting network bits to all
1s. In this way, the subnet mask separates the IP address into the network and host addresses.
4.What is DNS ?
Ans:The Domain Name System (DNS) is the phonebook of the Internet. Humans access information
online through domain names, like nytimes.com or espn.com. Web browsers interact through Internet
Protocol (IP) addresses. DNS translates domain names to IP addresses so browsers can load Internet
resources.
5.Can you give 2 name to a single DNS ?
Ans: Yes, a single DNS name can have multiple IP addresses associated with it. This is known as DNS
round-robin or DNS load balancing.
Ans: *protocol:In networking, a protocol is a set of rules for formatting and processing data.
*Port:A port number is a way to identify a specific process to which an internet or other network
message is to be forwarded when it arrives at a server.
Numbers from 0 to 1023 are allocated for notable enterprises and are known as restricted port
numbers. Some of these restricted ports are used by Apple QuickTime, Structured Query Language
services, and Gopher services.
The range of available port numbers is 1024–49151 for those looking to register a specific one. These
port numbers are often registered by software companies. Anyone can access ports ranging from 49152
to 65536, which can be dynamic or private.
Temporary port numbers can be assigned from a pool of assigned port numbers for the duration of the
request and its completion.
Q7.What is STP ?
Ans:The Spanning Tree Protocol (STP) is a network protocol that builds a loop-free logical topology for
Ethernet networks. The basic function of STP is to prevent bridge loops and the broadcast radiation that
results from them.
Ans:A routing algorithm is a procedure that lays down the route or path to transfer data packets from
source to the destination. They help in directing Internet traffic efficiently.
Ans:The Internet Assigned Numbers Authority (IANA) has assigned several address ranges to be used by
private networks.
An IP address within these ranges is therefore considered non-routable, as it is not unique. Any private
network that needs to use IP addresses internally can use any address within these ranges without any
coordination with IANA or an Internet registry. Addresses within this private address space are only
unique within a given private network.
Ans:Shell in Linux is a text-based interface wherein users can enter command names, execute programs,
and manipulate files such as file handles, file permissions, and directories. Users can access the shell
through the terminal window or console, a window displaying a command prompt where users can
enter commands.
Ans:All Linux files belong to an owner and a group. When permissions and users are represented by
letters, that is called symbolic mode. For users, u stands for user owner, g for group owner, and o for
others. For permissions, r stands for read, w for write, and x for execute.
Ans
14. What is different flavour of linux and which have you used it ?
Ans:
Above are different flavours of Linux and I used
*Ubuntu:
Ubuntu is a Linux distribution that has three editions - Desktop, Server, and Core for IoT. Ubuntu
provides a user-friendly user interface and comes with free software such as LibreOffice, Firefox,
Thunderbird, Transmission, and games like Sudoku and chess. In addition to the user-friendliness, the
operating system is known to be more secure than Windows. It is not immune to viruses but it has a
significantly lower level of exposure risk to malware or viruses. Plus, it is highly customizable, so you can
change your Ubuntu environment so it is more suitable to your needs.
Ans:
Ans:The security system in Linux OS is known as Linux Firewall, which monitors and governs the network
traffic (outbound/inbound connections). It can be used to block access to different IP addresses, Specific
subnets, ports (virtual points where network connections begin and end), and services.
Ans: iptables is a command line interface used to set up and maintain tables for the Netfilter firewall for
IPv4, included in the Linux kernel. The firewall matches packets with rules defined in these tables and
then takes the specified action on a possible match.
Syntax:
iptables --table TABLE -A/-C/-D... CHAIN
Ans: awk – this command is a useful and powerful command used for pattern matching as well as for
text processing. This command will display only the third column from the long listing of files and
directories. sed – this is a powerful command for editing a 'stream' of text.
19. If you have created a file then how do you know which user created than file ?
Ans: The most simple method to find file owner in Linux is using “ls -l” command. Open the terminal
then type ls -l filename in the prompt. The 3rd column is the file owner. The ls command should be
available on any Linux system.
Type cmd in the Search box, and then right-click the Command Prompt window and select Run as
administrator. ...
A)tasklist | more.
21. How can I see what are the process running in Linux ?
Ans,: Type the ps aux or ps -e to see all running process in Linux. Alternatively, you can issue the top
command or htop command to view running process in Linux.
22. If I have given a command ps then what can I see expect process running?
Ans :Using the “ls” command. With this command, you can use the -lh option and get the file size in
Linux OS. when you use this option, you will get your file size in a human-readable format. In other
words, you can see the file size in GBs, MBs, KBs, bytes, etc.
Ans:Linux is developed using a highly process-oriented and engineered process. The whole source code
behind Linux is maintained by subsystem maintainers, in which each and every change is reviewed
thoroughly. Thus, it is secured by design also.
Ans:
26. What is the boot process of Linux operating system ?
Ans: Booting a Linux installation involves multiple stages and software components, including firmware
initialization, execution of a boot loader, loading and startup of a Linux kernel image, and execution of
various startup scripts and daemons.
Ans:All modern Linux operating systems use the /etc/shadow file to store user passwords in an
encrypted hashed format. Only root users or commands with suid bit can access the /etc/shadow file. All
other user information, such as user names, home directory, and default shell, is stored in the
/etc/passwd file.
28. Have you ever install a linux operating system on your own ? If yes then what is swap area ?
Ans:yes;
Swap space is used as an overflow area for physical memory, so when the system runs out of RAM,
inactive pages are moved from RAM to the swap space. This allows the operating system to continue
running, although more slowly.
Ans :Crontab, which is short for cron table, is a file containing the schedule of various cron entries that
should be run at specified times. Another way of describing crontab is as a utility that enables tasks to
run automatically at regular intervals in the background by the cron daemon
Ans: 744 , which is a typical default permission, allows read, write, and execute permissions for the
owner, and read permissions for the group and “world” users.
Ans: CPU utilization is the amount of work a CPU does to perform the tasks given to it. It's an important
metric to track because high CPU usage can negatively impact the performance of a system.
32. Have you ever come across any load balancer?
Ans: yes,load balancer is a piece of hardware (or virtual hardware) that acts like a reverse proxy to
distribute network and/or application traffic across different servers
For example, an ecommerce application has a product directory, shopping cart, and checkout functions.
The application load balancer sends requests for browsing products to servers that contain images and
videos but do not need to maintain open connections.
Ans:Apache is configured by placing directives in plain text configuration files. The main configuration
file is usually called httpd. conf . The location of this file is set at compile-time, but may be overridden
with the -f command line flag.
The Apache HTTP Server configuration file is /etc/httpd/conf/httpd. conf . The httpd. conf file is well-
commented and mostly self-explanatory
Ans: A web hosting service is a type of Internet hosting service that hosts websites for clients, i.e. it
offers the facilities required for them to create and maintain a site and makes it accessible on the World
Wide Web.
*Application Hosting is most commonly offered as Software as a Service (SaaS) subscription which allows
businesses to run their applications on servers or in a cloud that is hosted by a service provider such as
AWS (Amazon Web Services) and GCP (Google Cloud Platform). Businesses do not have to invest in
building and maintaining the underlying infrastructure which enables them to lower their costs by
paying only for what they use, enjoy seamless upgrades in functionality, and easily integrate with their
existing data and systems.
35. What does do you see after giving a cammand ifconfig except ip address?
Ans: The ifconfig function displays the current configuration for a network interface when no optional
parameters are supplied.
Ans:LVM is used for the following purposes: Creating single logical volumes of multiple physical volumes
or entire hard disks (somewhat similar to RAID 0, but more similar to JBOD), allowing for dynamic
volume resizing.
Ans:Traditionally, the /etc/passwd file is used to keep track of every registered user that has access to a
system. The /etc/passwd file is a colon-separated file that contains the following information: User
name. Encrypted password. User ID number (UID)
39. What are environment variables in Linux and command for that ?
Ans:The environment variables are dynamic values that are stored within a system and used by
applications launched in shells or sub-shells. These variables have a name and their respected value.
The env command allows you to display your current environment or run a specified command in a
changed environment.
Ans:
Ans:A continuous integration and continuous deployment (CI/CD) pipeline is a series of steps that must
be performed in order to deliver a new version of software. CI/CD pipelines are a practice focused on
improving software delivery throughout the software development life cycle via automation.
Ans:While Docker is a container runtime, Kubernetes is a platform for running and managing containers
from many container runtimes.
43. What is docker conflicts ?
Ans:Docker uses the default 172.17. 0.0/16 subnet for container networking. If your host system is in
this subnet block, you will experience an IP conflict when the docker service or a container is started.
Ans: AppDynamics is a continuous monitoring tool that supports infrastructure, network, and
application monitoring of both cloud and on-premises computing environments.
Ans: The puppet tool is used to add animated movements to a static image.
# Puppet is an efficient system management tool for centralizing and automating the configuration
management process.
It can also be utilized as open-source configuration management for server configuration, management,
deployment, and orchestration.
Ans:Git is a version control system that allows developers to track changes in their code. GitHub is a
web-based hosting service for git repositories. In simple terms, you can use git without Github, but you
cannot use GitHub without Git.
Ans:DevOps helps automate the testing tools in the software development lifecycle which helps
companies enhance the quality of software. This is very beneficial for identifying bugs, errors, and
software crashes at a very early stage. You can fix all these identified issues and reduce the chances of
errors.
Ans:A conflict arises when two separate branches have made edits to the same line in a file, or when a
file has been deleted in one branch but edited in the other. Conflicts will most likely happen when
working in a team environment.
Ans: An Amazon EC2 instance is a virtual server in Amazon's Elastic Compute Cloud (EC2) for running
applications on the Amazon Web Services (AWS) infrastructure.
Ans: #Infrastructure as a service (IaaS) is a type of cloud computing service that offers essential
compute, storage, and networking resources on demand, on a pay-as-you-go basis.
# A good example of PaaS is AWS Elastic Beanstalk. Amazon Web Services (AWS) offers over 200 cloud
computing services such as EC2, RDS, and S3.
#SaaS uses the Internet to deliver subscription software services, which are managed by a third-party
vendor. Well-known SaaS examples include Dropbox, Google Workspace, and Salesforce. Infrastructure-
as-a-service (IaaS) offers access to resources such as servers, storage, memory, and other services.
52. How will you connect to the EC2 instance ?
Ans: 1. Open your terminal and change directory with command cd, where you downloaded your pem
file. In this demonstration, pem file is stored in the downloads folder.
-i: Flag that specifies an alternate identification file to use for public key authentication.
3. After pressing enter, a question will prompt to add the host to your known_hosts file. Type yes. This
will help to recognize the host each time you’re trying to connect to your instance.
Ans:The pki command provides a command-line interface allowing clients to access various services on
the Certificate System server
Ans:Cryptography is the process of hiding or coding information so that only the person a message was
intended for can read it.
Ans: A digital certificate is a file or electronic password that proves the authenticity of a device, server,
or user through the use of cryptography and the public key infrastructure (PKI).
56. What is csr ?
Ans:Corporate social responsibility is a business model by which companies make a concerted effort to
operate in ways that enhance rather than degrade society and the environment.
Ans:Before generating a certificate, create a private key and use that to create a certificate signing
request (CSR) on the appliance. Then, instead of sending the CSR out to a CA, use the NetScaler CA Tools
to generate a certificate.
Ans: DES (Data Encryption Standard) and AES (Advanced Encryption Standard) both are classified as
symmetric block ciphers. In order to alleviate the disadvantages of DES, AES was introduced. Because
DES has a smaller key size, it is less secure; hence triple DES was introduced, although it is slower.
Ans:
Ans:SSL is technology your applications or browsers may have used to create a secure, encrypted
communication channel over any network. However, SSL is an older technology that contains some
security flaws. Transport Layer Security (TLS) is the upgraded version of SSL that fixes existing SSL
vulnerabilities.
60. What is VPN and advantage of VPN ?
Ans: In basic terms, a VPN provides an encrypted server and hides your IP address from corporations,
government agencies and would-be hackers. A VPN protects your identity even if you are using public or
shared Wi-Fi, and your data will be kept private from any prying internet eyes.
Ans:https://youtu.be/QQpsFHf-UK8?feature=shared
Ans:
Ans:
https://youtu.be/GKvpEJhnlcA?feature=shared
3. Tell me something that is not mentioned in your resume?
Ans:
Ans : Sir/Madame It’s just about practicality and architecture. You won’t get anywhere with bookish
skills. Those students may excel at bookish concepts in any subject, but I am the one with in-depth
knowledge of what I have personally learned and accomplished. During my summer training and project
work, I concentrated more on learning skills than on raising my exam grades, and I like to learn by doing.
5. As I can see your course is related to security, but if you gone in different domain so are you
comfortable with that ?
Cyber security is a highly specialized field. It requires an overall understanding of the most efficient
process to secure your network and defend against hacking, malware, and so on. With these skills, one
can open up their own business, set up a team, and offer consulting services.
Ans: in it we learn Networking and Security, DITISS is one of the best course out there in the market
which has good value when it comes for the companies who recruit candidates in that field. I had
pursued DITISS so that I can work in field of it and get job easily,and it is very interesting subject.
Ans: “I would rate myself as a 7 on a scale of 1 to 10. I have a solid foundation of knowledge and
experience in my field, and I am confident in my ability to contribute to a team or organization.
However, I am always looking to improve and grow, so I am always open to constructive feedback and
suggestions.”
8. Are u flexible?
Ans:I am incredibly flexible, and ready to work at any time you need me here.
Ans: If you are a fresher, You can say yes, if you have no problems. But this is strictly based on your
circumstances, give honest answers, the hiring management will consider. No bond and im ready to
relocate.
Ans:
Ans:
Interview questions:
Link:
https://www.geeksforgeeks.org/9-common-interview-questions-for-freshers/