300+ TOP FTP Script Interview Questions [REAL TIME]

  1. 1. What Is Ftp?

    FTP stands for File Transfer Protocol. An FTP server allows clients to connect to it either anonymously or with a username and password combination. After successful authentication, files can be transferred back and forth between the server and client. The files are neither encrypted nor compressed.

  2. 2. How To Deny Specific Users Access To The Ftp Server ?

    To deny specific users access to the FTP server, add their usernames to the /etc/vsftpd/ ftpusers file. By default, system users such as root and nobody are included in this list.


  3. Networking Interview Questions

  4. 3. Can We Create Logs For Ftp Authenticated Sessions?

    Yes, If the xferlog_enable directive in vsftpd.conf is set to YES, file transfers using the FTP protocol are logged to /var/log/xferlog. Information such as a time stamp, IP address of the client, the file being transferred, and the username of the person who authenticated the connection is included in the log entry.

  5. 4. What Is Meaning Of Max_clients Parameter?

    Maximum number of clients that can connect at one time. If set to 0, the number of clients is unlimited.


  6. Networking Tutorial

  7. 5. Is There Any Way To Monitor Clients Connected To Vsftpd?

    Yes. We actually have two slightly different methods to monitor vsftpd clients. First, make sure you have enabled the config option, “setproctitle_enable=YES” like in our example above and restart your vsftpd server. Then run the command “watch ps -Cvsftpd -o user, pid, stime, cmd” to watch the processes including ip, username and actions like idle or data retrieval.


  8. Linux Interview Questions

  9. 6. I Want To Copy Multiple Files With Out Prompting For Any Info, How Can I Do That One?

    ftp -i ftpserver.

  10. 7. Local Users Cannot Log In. How To Resolve This Issue?

    Check “local_enable=YES” in your /etc/vsftpd/vsftpd. conf to allow local users to log in.


  11. Linux Tutorial
    Siebel EAI Interview Questions

  12. 8. For Redhat Linux Or Fedora Which Package Is Required For Ftp Service?

    Red Hat Enterprise Linux 5 or FEDORA includes the vsftpd FTP service.

    vsftpd-2.0.5-12.el5 (For Redhat).

  13. 9. Important Configuration File For Vsftp Server?

    The FTP server uses the /etc/vsftpd/vsftpd.conf configuration file. Using this file, you can set options for displaying a custom banner message after users log in, setting the default file permissions for uploaded files, and setting the port on which to listen for incoming connections.


  14. HTTP Interview Questions

  15. 10. On Which Port Vsftp Server Works?

    FTP uses two ports, 20 and 21. By default, the FTP server listens for requests on port 21. After a connection is established, the client sends commands to the server on port 21. However, port 20 is used when the server sends data back to the client.


  16. HTTP Tutorial

  17. 11. How To Restart Vsftp Server?

    service vsftpd restart.


  18. Amazon Web Services (AWS) Interview Questions

  19. 12. How To Allow Anonymous Ftp?

    Anonymous FTP is enabled by default by setting the anonymous_enable directive in /etc/vsftpd/vsftpd.conf to YES.


  20. Networking Interview Questions

  21. 13. What Is Passive Mode?

    Passive mode, like active mode, is initiated by the FTP client application. When requesting data from the server, the FTP client indicates it wants to access the data in passive mode and the server provides the IP address and a random, unprivileged port (greater than 1024) on the server. The client then connects to that port on the server to download the requested information.

  22. 14. Explain Directive “session_support”?

    When enabled, vsftpd attempts to maintain login sessions for each user through Pluggable Authentication Modules (PAM).

  23. 15. What Is Brute Force Attack?

    In cryptography, a brute force attack is a strategy used to break the encryption of data. It involves traversing the search space of possible keys until the correct key is found.

    The selection of an appropriate key length depends on the practical feasibility of performing a brute force attack. By obfuscating the data to be encoded, brute force attacks are made less effective as it is more difficult to determine when one has succeeded in breaking the code.


  24. Unix Inter-Process Communication (IPC) Interview Questions

  25. 16. Explain Ftp Spoofing Attack?

    In the context of network security, a spoofing attack is a situation in which one person or program successfully masquerades as another by falsifying data and thereby gaining an illegitimate advantage.

  26. 17. Explain Ftp Bounce Attack?

    FTP bounce attack is an exploit of the FTP protocol whereby an attacker is able to use the PORT command to request access to ports indirectly through the use of the victim machine as a middle man for the request.

    This technique can be used to port scan hosts discreetly, and to access specific ports that the attacker cannot access through a direct connection.

    nmap is a port scanner that can utilize an FTP bounce attack to scan other servers.


  27. DevOps Interview Questions

  28. 18. What Is Nat Traversal?

    The representation of the IP addresses and port numbers in the PORT command and PASV reply poses a challenge to FTP in traversing Network address translators (NAT). The NAT device must alter these values, so that they contain the IP address of the NAT ed client, and a port chosen by the NAT device for the data connection. The new address and port will probably differ in length in their decimal representation from the original address and port. Such translation is not usually performed in most NAT devices, but special application layer gateways exist for this purpose.


  29. Linux Interview Questions

  30. 19. Explain Remote Ftp Or Ftpmail?

    Where FTP access is restricted, a remote FTP or FTPmail service can be used to circumvent the problem. An email containing the FTP commands to be performed is sent to a remote FTP server, which is a mail server that parses the incoming email, executes the FTP commands, and sends back an email with any downloaded files as an attachment. Obviously this is less flexible than an FTP client, as it is not possible to view directories interactively or to modify commands, and there can also be problems with large file attachments in the response not getting through mail servers. As most internet users these days have ready access to FTP, this procedure is no longer in everyday use.

  31. 20. Explain Anonymous Ftp?

    A host that provides an FTP service may additionally provide anonymous FTP access. Users typically log into the service with an anonymous account when prompted for user name. Although users are commonly asked to send their email address in lieu of a password, no verification is actually performed on the supplied data, examples of anonymous FTP servers can be found here.


  32. Samba Server Interview Questions

  33. 21. Explain Security Concerns Of Ftp?

    The original FTP specification has many security concerns. In May 1999, the following flaws were addressed:

    • Bounce Attacks.
    • Spoof Attacks.
    • Brute Force Attacks.
    • Sniffing.
    • Username Protection.
    • Port Stealing.
  34. 22. Explain Ftp History?

    Short for File Transfer Protocol, FTP was first proposed on April 16, 1971 by Abhay Bhushan for and developed for implementation on hosts at MIT. FTP was later defined by RFC 959 that was published in 1985.

  35. 23. What Port Is Ftp?

    FTP uses network ports 20 and 21. Below are other ports that may be used by other types of FTP.

    • BFTP uses port 152.
    • FTP over TSL/SSL uses ports 989 and 990.
    • NI FTP uses port 47.
    • RSFTP uses port 26.
    • SFTP uses port 115.
    • TFTP uses port 69.

  36. Advanced Linux Interview Questions

  37. 24. What Are The Steps Involved In Uploading The Files Using Ftp Client Software?

    1. FTP is used to upload the files on the server from the client side where it is installed on the computer of clients.
    2. FTP client is checked for the installation of the software and according to that the appropriate directory is uploaded on the hosting server.
    3. The hosting server uploads the files that is being created by the user and set the permissions for it so that public can access it.
    4. Web hosting uses different directories like HTML that is used as var/www/html that is determined using the FTP client.
    5. Initial local directory is being set up using FTP client and it is where the website gets stored.
    6. The transfer mode is being determined for the files that need to be transferred either in ASCII or BINARY mode.

  38. Siebel EAI Interview Questions

  39. 25. What Ftp Programs Can I Use To Send And Receive Files?

    FileZillaBelow is a short listing of some of the software programs you can use to connect to an FTP server from your computer.

    FileZilla
    – A fantastic free and our recommended FTP and SFTP program with everything most users need.

    WinSCP
    – Another fantastic and free FTP, SFTP, SCP utility that also supports scripting.

    SmartFTP
    – A great FTP with everything most users need.

    CuteFTP
    – Another popular and widely used FTP program.

    Internet Explorer
    – Users who have Microsoft Internet Explorer on their computer can also use Internet Explorer to connect to FTP servers.

    Also, many computers, including all Microsoft Windows computers, Linux computers, and Mac OS X computers, come with a command line FTP command.