Movate
10+ Steel Dimensions Interview Questions and Answers
Q1. How a personal computer communicate with a web application. Process (Scenario base)
A personal computer communicates with a web application through a series of steps involving network protocols.
The computer sends a request to the web application's server using the HTTP protocol.
The server processes the request and sends back a response containing the requested information.
The communication is facilitated by the TCP/IP protocol stack.
Data is transmitted over the internet using IP addresses and domain names.
Encryption protocols like HTTPS may be used to secure...read more
Q2. Do you know TCP Header Flags?
Yes, TCP Header Flags are used to control the flow of data between devices.
TCP Header Flags are 6 bits long and are used to control the flow of data between devices.
There are 6 TCP Header Flags: URG, ACK, PSH, RST, SYN, and FIN.
URG is used to indicate that the data is urgent and should be prioritized.
ACK is used to acknowledge receipt of data.
PSH is used to push data to the receiving device.
RST is used to reset the connection.
SYN is used to synchronize sequence numbers.
FIN is...read more
Q3. Types of Arp ? Packet flow in same network between two switch ? About firewall ?? Dhcp and DORA process ?? About DNS ??
Types of ARP include ARP request, ARP reply, ARP probe, and ARP announcement.
ARP request is used to find the MAC address of a device on the network.
ARP reply is the response to an ARP request, providing the MAC address of the target device.
ARP probe is used to check if an IP address is already in use on the network.
ARP announcement is used to inform other devices on the network about a change in MAC address.
Q4. Flexibility about shift timings and job location
I am flexible with shift timings and job location to ensure smooth operations and adaptability.
I am open to working different shifts, including nights and weekends, to ensure 24/7 coverage for network security
I am willing to relocate if necessary to take on new opportunities and challenges in different locations
I understand the importance of being adaptable in the fast-paced field of network security
Q5. What is TLS Handshake?
TLS Handshake is a process of establishing a secure connection between a client and a server.
TLS Handshake involves a series of steps to establish a secure connection
It includes negotiation of encryption algorithm, exchange of keys, and verification of digital certificates
TLS Handshake ensures confidentiality, integrity, and authenticity of data transmitted over the network
Examples of applications using TLS Handshake are HTTPS, SMTPS, FTPS, etc.
Q6. Difference Between PUSH and URG Flag
PUSH flag is used to indicate the start of a new TCP session while URG flag is used to indicate urgent data.
PUSH flag is set when a sender wants to push data to the receiver without waiting for a full buffer
URG flag is set when a sender wants to indicate that some data is urgent and should be processed immediately
PUSH flag is used to initiate a new session while URG flag is used to indicate the presence of urgent data within an existing session
Q7. How will you handle customer
I will handle customers by providing timely and effective communication, understanding their needs, and offering solutions to their problems.
Listen actively to understand customer concerns
Communicate clearly and effectively to address customer needs
Offer solutions and follow up to ensure customer satisfaction
Q8. How SSL handshake works
SSL handshake is a process where a client and server establish a secure connection by exchanging encryption keys and verifying identities.
Client sends a hello message to server with supported encryption algorithms
Server responds with its own hello message, including its certificate
Client verifies server's certificate and generates a pre-master secret
Both client and server use the pre-master secret to generate a unique session key for encryption
Encrypted communication begins u...read more
Q9. Ospf and eigrp different
OSPF and EIGRP are both routing protocols used in computer networks, but they differ in several ways.
OSPF is a link-state protocol, while EIGRP is a distance-vector protocol.
OSPF uses a hierarchical network design, while EIGRP uses a flat network design.
OSPF supports multiple paths to a destination, while EIGRP only supports a single path.
OSPF uses a metric based on bandwidth, while EIGRP uses a composite metric based on bandwidth, delay, reliability, load, and MTU.
OSPF is an...read more
Q10. Explain DHCP and DORA process
DHCP is a network protocol that dynamically assigns IP addresses to devices on a network. DORA process involves Discover, Offer, Request, and Acknowledge stages.
DHCP Discover: Client broadcasts a request for IP address
DHCP Offer: Server responds with an available IP address
DHCP Request: Client requests the offered IP address
DHCP Acknowledge: Server confirms the IP address assignment
Q11. Arp and it's types
ARP (Address Resolution Protocol) is a protocol used for mapping an IP address to a MAC address.
ARP is used to resolve IP addresses to MAC addresses on a local network.
There are two main types of ARP: ARP Request and ARP Reply.
ARP Request is sent by a device to find the MAC address of another device with a known IP address.
ARP Reply is sent in response to an ARP Request, providing the MAC address of the requested IP address.
Q12. Describe IPSEC VPN
IPSEC VPN is a secure network connection that uses encryption and authentication to protect data transmitted over the internet.
IPSEC VPN stands for Internet Protocol Security Virtual Private Network.
It provides secure communication between two or more networks over the internet.
IPSEC VPN uses encryption algorithms to ensure confidentiality of data.
It also uses authentication protocols to verify the identity of the communicating parties.
IPSEC VPN can be used to establish secur...read more
Top Network Security Engineer Interview Questions from Similar Companies
Reviews
Interviews
Salaries
Users/Month