Add office photos
Engaged Employer

Movate

3.3
based on 2k Reviews
Filter interviews by

10+ Steel Dimensions Interview Questions and Answers

Updated 17 Apr 2024
Popular Designations

Q1. How a personal computer communicate with a web application. Process (Scenario base)

Ans.

A personal computer communicates with a web application through a series of steps involving network protocols.

  • The computer sends a request to the web application's server using the HTTP protocol.

  • The server processes the request and sends back a response containing the requested information.

  • The communication is facilitated by the TCP/IP protocol stack.

  • Data is transmitted over the internet using IP addresses and domain names.

  • Encryption protocols like HTTPS may be used to secure...read more

Add your answer

Q2. Do you know TCP Header Flags?

Ans.

Yes, TCP Header Flags are used to control the flow of data between devices.

  • TCP Header Flags are 6 bits long and are used to control the flow of data between devices.

  • There are 6 TCP Header Flags: URG, ACK, PSH, RST, SYN, and FIN.

  • URG is used to indicate that the data is urgent and should be prioritized.

  • ACK is used to acknowledge receipt of data.

  • PSH is used to push data to the receiving device.

  • RST is used to reset the connection.

  • SYN is used to synchronize sequence numbers.

  • FIN is...read more

Add your answer

Q3. Types of Arp ? Packet flow in same network between two switch ? About firewall ?? Dhcp and DORA process ?? About DNS ??

Ans.

Types of ARP include ARP request, ARP reply, ARP probe, and ARP announcement.

  • ARP request is used to find the MAC address of a device on the network.

  • ARP reply is the response to an ARP request, providing the MAC address of the target device.

  • ARP probe is used to check if an IP address is already in use on the network.

  • ARP announcement is used to inform other devices on the network about a change in MAC address.

Add your answer

Q4. Flexibility about shift timings and job location

Ans.

I am flexible with shift timings and job location to ensure smooth operations and adaptability.

  • I am open to working different shifts, including nights and weekends, to ensure 24/7 coverage for network security

  • I am willing to relocate if necessary to take on new opportunities and challenges in different locations

  • I understand the importance of being adaptable in the fast-paced field of network security

Add your answer
Discover Steel Dimensions interview dos and don'ts from real experiences

Q5. What is TLS Handshake?

Ans.

TLS Handshake is a process of establishing a secure connection between a client and a server.

  • TLS Handshake involves a series of steps to establish a secure connection

  • It includes negotiation of encryption algorithm, exchange of keys, and verification of digital certificates

  • TLS Handshake ensures confidentiality, integrity, and authenticity of data transmitted over the network

  • Examples of applications using TLS Handshake are HTTPS, SMTPS, FTPS, etc.

Add your answer

Q6. Difference Between PUSH and URG Flag

Ans.

PUSH flag is used to indicate the start of a new TCP session while URG flag is used to indicate urgent data.

  • PUSH flag is set when a sender wants to push data to the receiver without waiting for a full buffer

  • URG flag is set when a sender wants to indicate that some data is urgent and should be processed immediately

  • PUSH flag is used to initiate a new session while URG flag is used to indicate the presence of urgent data within an existing session

Add your answer
Are these interview questions helpful?

Q7. How will you handle customer

Ans.

I will handle customers by providing timely and effective communication, understanding their needs, and offering solutions to their problems.

  • Listen actively to understand customer concerns

  • Communicate clearly and effectively to address customer needs

  • Offer solutions and follow up to ensure customer satisfaction

Add your answer

Q8. How SSL handshake works

Ans.

SSL handshake is a process where a client and server establish a secure connection by exchanging encryption keys and verifying identities.

  • Client sends a hello message to server with supported encryption algorithms

  • Server responds with its own hello message, including its certificate

  • Client verifies server's certificate and generates a pre-master secret

  • Both client and server use the pre-master secret to generate a unique session key for encryption

  • Encrypted communication begins u...read more

Add your answer
Share interview questions and help millions of jobseekers 🌟

Q9. Ospf and eigrp different

Ans.

OSPF and EIGRP are both routing protocols used in computer networks, but they differ in several ways.

  • OSPF is a link-state protocol, while EIGRP is a distance-vector protocol.

  • OSPF uses a hierarchical network design, while EIGRP uses a flat network design.

  • OSPF supports multiple paths to a destination, while EIGRP only supports a single path.

  • OSPF uses a metric based on bandwidth, while EIGRP uses a composite metric based on bandwidth, delay, reliability, load, and MTU.

  • OSPF is an...read more

Add your answer

Q10. Explain DHCP and DORA process

Ans.

DHCP is a network protocol that dynamically assigns IP addresses to devices on a network. DORA process involves Discover, Offer, Request, and Acknowledge stages.

  • DHCP Discover: Client broadcasts a request for IP address

  • DHCP Offer: Server responds with an available IP address

  • DHCP Request: Client requests the offered IP address

  • DHCP Acknowledge: Server confirms the IP address assignment

View 2 more answers

Q11. Arp and it's types

Ans.

ARP (Address Resolution Protocol) is a protocol used for mapping an IP address to a MAC address.

  • ARP is used to resolve IP addresses to MAC addresses on a local network.

  • There are two main types of ARP: ARP Request and ARP Reply.

  • ARP Request is sent by a device to find the MAC address of another device with a known IP address.

  • ARP Reply is sent in response to an ARP Request, providing the MAC address of the requested IP address.

Add your answer

Q12. Describe IPSEC VPN

Ans.

IPSEC VPN is a secure network connection that uses encryption and authentication to protect data transmitted over the internet.

  • IPSEC VPN stands for Internet Protocol Security Virtual Private Network.

  • It provides secure communication between two or more networks over the internet.

  • IPSEC VPN uses encryption algorithms to ensure confidentiality of data.

  • It also uses authentication protocols to verify the identity of the communicating parties.

  • IPSEC VPN can be used to establish secur...read more

Add your answer
Contribute & help others!
Write a review
Share interview
Contribute salary
Add office photos
Interview Tips & Stories
Ace your next interview with expert advice and inspiring stories

Top Network Security Engineer Interview Questions from Similar Companies

4.0
 • 14 Interview Questions
View all
Share an Interview
Stay ahead in your career. Get AmbitionBox app
qr-code
Helping over 1 Crore job seekers every month in choosing their right fit company
70 Lakh+

Reviews

5 Lakh+

Interviews

4 Crore+

Salaries

1 Cr+

Users/Month

Contribute to help millions
Get AmbitionBox app

Made with ❤️ in India. Trademarks belong to their respective owners. All rights reserved © 2024 Info Edge (India) Ltd.

Follow us
  • Youtube
  • Instagram
  • LinkedIn
  • Facebook
  • Twitter