i
Amdocs
Filter interviews by
I applied via Job Portal
posted on 20 Jan 2025
I applied via Job Portal and was interviewed in Dec 2024. There were 2 interview rounds.
Time and work, distance speed and time,pipes and cistern, blood relation
I applied via Job Portal
The OSI model is a conceptual framework that defines the functions of a network into seven distinct layers.
The OSI model stands for Open Systems Interconnection model.
It was developed by the International Organization for Standardization (ISO) in 1984.
The model is divided into seven layers: Physical, Data Link, Network, Transport, Session, Presentation, and Application.
Each layer has its own specific functions and prot...
VCN stands for Virtual Cloud Network, which is a customizable and private network in the cloud.
VCN allows you to define your own IP address range, subnets, route tables, and gateways.
It provides isolation and security for your cloud resources.
You can connect multiple VCNs together or to your on-premises network using VPN or dedicated connections.
I was interviewed in Jul 2023.
To rectify a PC generating broadcast, check for misconfigured network settings, update network drivers, disable unnecessary services, and monitor network traffic.
Check for misconfigured network settings such as incorrect IP address or subnet mask
Update network drivers to ensure compatibility and stability
Disable unnecessary services or applications that may be causing excessive network traffic
Monitor network traffic us...
Types of network cables include Ethernet, coaxial, fiber optic, and twisted pair cables.
Ethernet cables are commonly used for wired networks and come in categories like Cat5, Cat6, and Cat7.
Coaxial cables are often used for cable television and internet connections.
Fiber optic cables use light to transmit data and are known for their high speed and reliability.
Twisted pair cables, such as Cat5e and Cat6, are commonly u...
Stacking is a method of connecting multiple network switches to increase performance, redundancy, and manageability.
Stacking allows multiple switches to be managed as a single entity
It provides increased bandwidth and redundancy by combining the capabilities of multiple switches
Stacking simplifies network management tasks by allowing configuration changes to be applied to all switches in the stack at once
I applied via Naukri.com and was interviewed in Feb 2023. There were 2 interview rounds.
An aptitude test is a measure of your ability to learn or perform required tasks and succeed in the environment you're in.
I applied via LinkedIn and was interviewed in Mar 2024. There was 1 interview round.
Firewall is a security system that monitors and controls incoming and outgoing network traffic, while a gateway is a node that connects two different networks.
Firewall is a security system that filters network traffic based on predetermined security rules.
Gateway is a node that acts as an entry and exit point for data between two networks.
Firewall can be a software program or a hardware device, while gateway is typical...
To mitigate DOS and DDOS attacks, implement network security measures such as firewalls, intrusion detection systems, and rate limiting.
Implement firewalls to filter out malicious traffic
Use intrusion detection systems to detect and block suspicious activity
Implement rate limiting to prevent overwhelming the network with excessive requests
posted on 25 Jun 2024
I applied via microsoft website and was interviewed in Dec 2023. There were 2 interview rounds.
Kerberos protocol is a network authentication protocol that allows individuals communicating over a non-secure network to prove their identity to one another in a secure manner.
Developed by MIT in the 1980s
Uses symmetric key cryptography
Involves a Key Distribution Center (KDC)
Prevents eavesdropping and replay attacks
Three-way handshake is a method used in TCP/IP network to establish a connection between a client and a server.
Client sends a SYN (synchronize) packet to the server to initiate a connection
Server responds with a SYN-ACK (synchronize-acknowledgment) packet to acknowledge the request
Client sends an ACK (acknowledgment) packet back to the server to confirm the connection
TLS (Transport Layer Security) is a protocol that ensures privacy and data integrity between communicating applications.
TLS encrypts data to ensure confidentiality during transmission.
It uses cryptographic algorithms to authenticate the parties involved in the communication.
TLS also provides mechanisms for data integrity to prevent tampering.
Handshake process involves negotiation of encryption algorithms and exchange o...
I applied via Referral and was interviewed before Jan 2022. There were 3 interview rounds.
The question requires the candidate to read back a dictated text on the screen.
The candidate should listen carefully to the dictated text.
The candidate should then read back the text accurately.
The candidate should ensure that they have understood the text before reading it back.
Examples: 'Please read back the following sentence: The quick brown fox jumps over the lazy dog.'
Examples: 'Please read back the following par...
OSPF and BGP are routing protocols used in networking to determine the best path for data to travel.
OSPF (Open Shortest Path First) is an interior gateway protocol used to route IP packets within a single network.
BGP (Border Gateway Protocol) is an exterior gateway protocol used to route data between different networks.
Networking refers to the practice of connecting devices together to share resources and communicate w...
based on 1 interview
Interview experience
Software Developer
8.1k
salaries
| ₹5 L/yr - ₹17 L/yr |
Software Engineer
1.9k
salaries
| ₹4 L/yr - ₹16.1 L/yr |
Softwaretest Engineer
1.7k
salaries
| ₹3.8 L/yr - ₹13.9 L/yr |
Functional Test Engineer
1.2k
salaries
| ₹2.8 L/yr - ₹12.1 L/yr |
Associate Software Engineer
950
salaries
| ₹3.2 L/yr - ₹12 L/yr |
TCS
IBM
Infosys
Wipro