Filter interviews by
I applied via Naukri.com and was interviewed in Nov 2022. There was 1 interview round.
ARP is used to map IP addresses to MAC addresses on a local network.
ARP stands for Address Resolution Protocol.
It is used to find the MAC address of a device based on its IP address.
ARP is essential for communication between devices on the same network.
ARP cache stores the mapping of IP addresses to MAC addresses for faster communication.
Example: When a computer wants to communicate with another device on the network, ...
HSRP, VRRP, and GLBP are all protocols used for providing redundancy in network environments.
HSRP (Hot Standby Router Protocol) is Cisco's proprietary protocol for providing high availability by allowing two or more routers to work together in a group.
VRRP (Virtual Router Redundancy Protocol) is an open standard protocol similar to HSRP, used for providing a virtual IP address that can be shared among multiple routers.
...
Root bridge election in a network is determined by the bridge ID and the lowest path cost to the root bridge.
Root bridge is the bridge with the lowest bridge ID in the network.
Bridge ID consists of a priority value and a MAC address.
If two bridges have the same priority, the bridge with the lowest MAC address will become the root bridge.
Each bridge calculates the path cost to the root bridge based on the cumulative cos...
I will troubleshoot network issues by following a systematic approach to identify and resolve the root cause.
Start by gathering information about the issue reported
Check physical connections and cables
Verify network configurations and settings
Use network monitoring tools to identify any anomalies
Isolate the issue by testing connectivity between devices
Check for any network congestion or bandwidth issues
Consult network ...
STP (Spanning Tree Protocol) is a network protocol that ensures a loop-free topology in Ethernet networks.
STP prevents loops in Ethernet networks by blocking redundant paths.
It elects a root bridge to serve as the central point for the network.
STP uses Bridge Protocol Data Units (BPDUs) to exchange information between switches.
Common STP states include Blocking, Listening, Learning, Forwarding, and Disabled.
STP converg...
DHCP process involves four steps: Discover, Offer, Request, Acknowledge (DORA).
Discover: Client broadcasts a DHCP Discover message to find available DHCP servers.
Offer: DHCP server responds with a DHCP Offer message containing IP address lease information.
Request: Client sends a DHCP Request message to request the offered IP address.
Acknowledge: DHCP server sends a DHCP Ack message confirming the IP address lease to th
The OSI model is a conceptual framework that standardizes the functions of a telecommunication or computing system into seven different layers. TCP/IP is a protocol suite that is used for communication over the internet.
OSI model has 7 layers: Physical, Data Link, Network, Transport, Session, Presentation, Application
TCP/IP is a protocol suite that includes TCP (Transmission Control Protocol) and IP (Internet Protocol)
...
Subnetting is the process of dividing a network into smaller subnetworks to improve performance and security.
Subnetting helps in optimizing network performance by reducing network congestion.
It allows for better organization and management of IP addresses.
Subnetting enhances network security by isolating different parts of the network.
Example: Dividing a large network into smaller subnets based on departments or locati
VSF and VSX are both technologies used in networking for virtualization and redundancy, but they have key differences in terms of implementation and capabilities.
VSF (Virtual Switching Framework) is used in HPE Aruba switches to create a single logical switch from multiple physical switches, providing redundancy and scalability.
VSX (Virtual Switching Extension) is used in Cisco Nexus switches to create a virtual chassi...
ACL stands for Access Control List and is used to control network traffic by allowing or denying packets based on defined rules.
ACLs can be used to filter traffic based on source or destination IP address, protocol, port number, etc.
They can be applied on routers, switches, and firewalls to control access to network resources.
ACLs can improve network security by restricting unauthorized access to sensitive data.
Example...
To upgrade firmware, you need to download the latest firmware version from the manufacturer's website and follow the specific instructions provided.
Download the latest firmware version from the manufacturer's website
Backup current configuration before upgrading
Follow specific instructions provided by the manufacturer
Test the new firmware in a controlled environment before deploying it in production
To configure SSID, access the wireless router's settings and enter the desired network name, security type, and password.
Access the wireless router's settings through a web browser
Locate the wireless settings section
Enter the desired SSID (network name)
Select the appropriate security type (WPA2, WEP, etc.)
Set a strong password for the network
Save the changes and restart the router if necessary
To configure 802.1x protocol, you need to set up authentication servers, configure network devices, and define access policies.
Set up authentication servers such as RADIUS or TACACS+
Configure network devices (switches, routers, wireless access points) to support 802.1x
Define access policies for different user roles and devices
Enable 802.1x on network ports and specify authentication methods (EAP-TLS, PEAP, etc.)
Top trending discussions
I applied via Naukri.com and was interviewed in Sep 2022. There were 2 interview rounds.
L1 and system troubleshooting methods involve identifying and resolving issues in network and system infrastructure.
L1 troubleshooting involves basic checks and identifying common issues
System troubleshooting involves identifying issues with hardware, software, and network components
Methods include using diagnostic tools, analyzing logs, and following established procedures
Examples of issues include network connectivit
I applied via Naukri.com and was interviewed in Feb 2021. There were 3 interview rounds.
Routing and switching are fundamental concepts in computer networking that involve directing and forwarding data packets.
Routing is the process of determining the best path for data packets to travel from one network to another.
Switching is the process of forwarding data packets within a network based on their destination MAC addresses.
Routing protocols like OSPF and BGP are used to exchange routing information between...
LAN/WAN refers to local area network and wide area network respectively. VLAN is a virtual LAN that allows for logical segmentation of a network.
LAN is a network that covers a small geographical area, typically within a single building or campus.
WAN is a network that spans a large geographical area, connecting multiple LANs or remote locations.
VLAN is a virtual LAN that enables the creation of multiple logical networks...
A firewall is a network security device that monitors and controls incoming and outgoing network traffic based on predetermined security rules.
Firewall acts as a barrier between a trusted internal network and an untrusted external network.
It examines network packets and filters them based on rules to allow or block traffic.
Firewalls can be hardware-based or software-based.
Examples of firewalls include Cisco ASA, Palo A
I applied via Naukri.com and was interviewed before Jul 2021. There were 2 interview rounds.
I applied via Naukri.com and was interviewed before Aug 2021. There were 3 interview rounds.
You have to pass this test. You can check previous papers for more information.
I applied via Campus Placement and was interviewed in Sep 2024. There were 3 interview rounds.
It is online test. In this test there is question of apti and also coding and from 5g question.
There are two questions asked and time is enough to solve 60 minutes
A palindrome number is a number that remains the same when its digits are reversed.
Convert the number to a string
Reverse the string
Check if the reversed string is equal to the original string
Create a function to add two numbers
Define a function that takes two parameters as input
Inside the function, add the two numbers together and return the result
Example: function addNumbers(num1, num2) { return num1 + num2; }
Binary search code implementation in Python
Define a function that takes a sorted array and a target value as input
Initialize two pointers, low and high, to the start and end of the array respectively
While low is less than or equal to high, calculate mid as (low + high) // 2 and compare array[mid] with target
If array[mid] is equal to target, return mid
If array[mid] is less than target, update low to mid + 1
If array[mid]...
A program to check if a given name is a palindrome or not.
Convert the name to lowercase to handle case-insensitivity
Remove any spaces or special characters from the name
Reverse the name and compare it with the original name to check for palindrome
malloc and calloc are functions in C programming used for dynamic memory allocation.
malloc function is used to allocate a single block of memory of a specified size.
calloc function is used to allocate multiple blocks of memory of a specified size, initialized to zero.
Example: int *ptr = (int*)malloc(5 * sizeof(int));
Example: int *ptr = (int*)calloc(5, sizeof(int));
I applied via Referral
I am open to any location that offers growth opportunities and a challenging work environment.
Open to relocation for the right opportunity
Prefer locations with strong networking infrastructure
Interested in locations with tech hubs or opportunities for professional development
My current CCTC is $80,000 per year.
Current CCTC is $80,000 per year
CCTC may include salary, bonuses, benefits, etc.
Negotiable based on experience and qualifications
Border Gateway Protocol
BGP stands for Border Gateway Protocol
It is a standardized exterior gateway protocol used to exchange routing information between different autonomous systems on the internet
BGP helps in determining the best path for data to travel between networks
It is commonly used by Internet Service Providers (ISPs) and large organizations to connect to multiple networks
BGP operates on TCP port 179
Routers are networking devices that forward data packets between computer networks.
Routers operate at the network layer of the OSI model
They use routing tables to determine the best path for data packets
Routers can connect different types of networks, such as LANs and WANs
Expected CTC (Cost to Company) for the position
ECTC stands for Expected Cost to Company
It includes salary, bonuses, benefits, and any other compensation offered by the employer
Candidates should provide their expected salary range based on their experience and skills
I applied via Job Portal and was interviewed in Nov 2024. There were 2 interview rounds.
I would like simple test
based on 2 reviews
Rating in categories
Network Engineer
17
salaries
| ₹2.2 L/yr - ₹6.1 L/yr |
Network Engineer L1
13
salaries
| ₹2 L/yr - ₹6 L/yr |
Senior Network Engineer
7
salaries
| ₹5.2 L/yr - ₹7.7 L/yr |
NOC Analyst
5
salaries
| ₹5.2 L/yr - ₹6.8 L/yr |
HR Manager
4
salaries
| ₹5 L/yr - ₹7.5 L/yr |
Cisco
Juniper Networks
Aruba Networks
Extreme Networks