Filter interviews by
I applied via Referral and was interviewed before Apr 2021. There was 1 interview round.
Subnetting is dividing a network into smaller subnetworks. There are two types of routing: static and dynamic. Static routing is manually configured by the network administrator. The subnet mask of /27 is 255.255.255.224. STP is a protocol used to prevent loops in a network. Etherchannel is a technique used to combine multiple physical links into a single logical link. VLAN is a logical grouping of devices in a network...
Top trending discussions
I applied via Naukri.com and was interviewed in Jan 2024. There was 1 interview round.
Packet flow in Palo Alto Firewall involves multiple stages including ingress, policy lookup, security policy enforcement, NAT, and egress.
Packet enters the firewall through an ingress interface
Firewall performs policy lookup to determine if the packet should be allowed or denied
If allowed, the packet goes through security policy enforcement which includes threat prevention, URL filtering, etc.
NAT (Network Address Trans...
OSPF (Open Shortest Path First) is a routing protocol used to determine the best path for data packets in a network.
OSPF is a link-state routing protocol
It uses Dijkstra's algorithm to calculate the shortest path
OSPF routers exchange link-state advertisements (LSAs)
It supports VLSM (Variable Length Subnet Masking)
OSPF areas are used to divide large networks into smaller segments
DR and BDR in OSPF are elected based on priority values, with the highest priority becoming the DR and the second highest becoming the BDR.
DR and BDR are elected within the OSPF network to ensure efficient communication and redundancy.
The election process is based on priority values assigned to each router, with the highest priority becoming the DR and the second highest becoming the BDR.
If two routers have the same pr...
Firewall is a network security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules.
Firewall acts as a barrier between a trusted internal network and untrusted external network.
It can be implemented in hardware, software, or a combination of both.
Firewalls can filter traffic based on IP addresses, ports, protocols, and application types.
They can prevent unauthori...
Switching involves forwarding data packets within a network, while routing involves determining the best path for data packets to travel between networks.
Switching operates at Layer 2 of the OSI model, using MAC addresses to forward data within a local network.
Routing operates at Layer 3 of the OSI model, using IP addresses to determine the best path for data to travel between networks.
Switches use MAC address tables t...
I applied via Naukri.com and was interviewed in Apr 2024. There were 2 interview rounds.
I applied via Recruitment Consulltant and was interviewed in Apr 2022. There were 2 interview rounds.
Must have knowege of the work
posted on 17 Dec 2022
I applied via Referral and was interviewed before Dec 2021. There was 1 interview round.
OSPF is a link-state routing protocol that uses Dijkstra's algorithm to calculate the shortest path to a destination network.
OSPF routers exchange link-state advertisements (LSAs) to build a complete topology of the network.
Each router calculates the shortest path to every network using Dijkstra's algorithm.
OSPF uses cost as its metric, which is based on the bandwidth of the link.
OSPF supports multiple areas, which red...
BGP is a routing protocol used to exchange routing information between different autonomous systems.
BGP uses TCP as its transport protocol.
It operates on a hop-by-hop basis, meaning that it only exchanges routing information with its directly connected neighbors.
BGP uses path attributes to determine the best path for a given destination.
BGP can be used for both IPv4 and IPv6 routing.
BGP is commonly used by Internet Ser...
Copper twisted pair can be checked using a cable tester to ensure proper connectivity and identify any faults.
Use a cable tester to check for continuity and proper wiring
Check for any faults such as shorts, opens, or miswires
Verify that the cable meets the required specifications for the network
Perform a loopback test to ensure that data can be transmitted and received properly
Identifying leased line modem fault
Check if the modem is powered on and all cables are properly connected
Check the modem's status lights for any abnormalities
Perform loopback tests to check for connectivity issues
Check the modem's configuration settings
Replace the modem if all other troubleshooting steps fail
To find the reliability of a link on Cisco routers, use the show interface command.
Log in to the Cisco router using the console or Telnet/SSH.
Enter the command 'show interface' to display the status of all interfaces on the router.
Look for the 'input errors' and 'output errors' fields to determine the reliability of the link.
If there are a high number of errors, the link may be unreliable and require troubleshooting.
Ot...
based on 4 reviews
Rating in categories
Network Engineer
36
salaries
| ₹1.9 L/yr - ₹6.2 L/yr |
Avaya Support Engineer
25
salaries
| ₹2 L/yr - ₹6 L/yr |
Technical Support Engineer
17
salaries
| ₹1.8 L/yr - ₹6 L/yr |
AV Engineer
15
salaries
| ₹1.5 L/yr - ₹3.8 L/yr |
Service Engineer
13
salaries
| ₹2.1 L/yr - ₹6.2 L/yr |
Tata Communications
Tech Mahindra
HCLTech
Wipro