i
Black Box Corporation
Filter interviews by
I applied via campus placement at Dr DY Patil Institute of Management and Research, Pune and was interviewed before Jul 2023. There was 1 interview round.
The OSI model is a conceptual framework that standardizes the functions of a telecommunication or computing system into seven different layers.
The OSI model stands for Open Systems Interconnection model.
It helps in understanding how data is transferred between devices in a network.
Each layer has specific functions and interacts with adjacent layers.
Examples of layers include Physical, Data Link, Network, Transport, Ses
I applied via Naukri.com and was interviewed before Nov 2023. There was 1 interview round.
The OSI model consists of 7 layers that define the functions of a network. Each layer has specific responsibilities in handling data packets.
Physical Layer: Deals with physical connections and transmission of raw data bits.
Data Link Layer: Manages data frames and error detection/correction.
Network Layer: Handles routing and logical addressing.
Transport Layer: Ensures reliable data transfer between devices.
Session Layer...
OSPF is a routing protocol that uses link-state algorithm to determine the best path for routing packets.
OSPF routers exchange link-state advertisements (LSAs) to build a topological database of the network.
Each router calculates the shortest path tree to all destinations using Dijkstra's algorithm.
OSPF uses cost metrics to determine the best path, with lower costs indicating faster links.
LSAs are flooded throughout th...
RIP, EIGRP, STP, RSTP, MSTP, LAG are networking protocols and technologies used in network engineering.
RIP (Routing Information Protocol) is a distance-vector routing protocol.
EIGRP (Enhanced Interior Gateway Routing Protocol) is a Cisco proprietary routing protocol.
STP (Spanning Tree Protocol) prevents loops in Ethernet networks.
RSTP (Rapid Spanning Tree Protocol) is an updated version of STP for faster convergence.
MS...
Top trending discussions
I applied via Naukri.com and was interviewed in Dec 2021. There was 1 interview round.
VLANs can be configured using switch management interfaces or command line interfaces.
Identify the VLANs needed and assign them a VLAN ID
Configure the switch ports to be members of the appropriate VLAN
Configure the VLAN interfaces on the switch
Configure VLAN trunking protocol (VTP) if necessary
Verify the VLAN configuration using show commands
ACL can be configured by defining rules to permit or deny traffic based on source/destination IP, port, and protocol.
Identify the traffic that needs to be controlled
Define the rules for permitting or denying traffic
Apply the ACL to the appropriate interface or VLAN
Regularly review and update the ACL to ensure it meets the changing needs of the network
I applied via Naukri.com and was interviewed in Dec 2020. There was 1 interview round.
The OSI model is a conceptual framework used to describe the communication functions of a network.
The model has 7 layers, each with a specific function.
The layers are: Physical, Data Link, Network, Transport, Session, Presentation, and Application.
Each layer communicates with the layer above and below it.
The model helps ensure interoperability between different network devices and software.
Example: When you visit a web...
SSL offloading is a process of removing SSL encryption from incoming traffic and decrypting it before sending it to the backend servers.
SSL offloading is performed by a load balancer like F5 to reduce the processing load on backend servers.
It improves server performance and reduces latency by offloading SSL processing to a dedicated hardware or software.
F5 SSL offloading can be configured to support multiple SSL certif...
SNAT stands for Secure Network Address Translation and is a feature in F5 that allows for the translation of IP addresses.
SNAT is used to translate the source IP address of outgoing traffic to a different IP address.
This can be useful in scenarios where multiple devices are sharing a single public IP address.
SNAT can also be used to improve security by hiding the actual IP address of a device from the public internet.
F...
STP, HSRP, and FRRP are network protocols used for redundancy and failover. HSRP and VRRP are similar but HSRP is preferred.
STP (Spanning Tree Protocol) prevents loops in a network by disabling redundant links
HSRP (Hot Standby Router Protocol) and VRRP (Virtual Router Redundancy Protocol) provide redundancy by allowing multiple routers to share a virtual IP address
FRRP (Fast Router Redundancy Protocol) is a Cisco propr...
The xlate table in ASA is used to keep track of translations between internal and external IP addresses. It is important for IPsec tunnel troubleshooting.
The xlate table is used to map internal IP addresses to external IP addresses
It is important for troubleshooting IPsec tunnels because it allows you to see if traffic is being translated correctly
You can view the xlate table using the 'show xlate' command in the ASA C...
based on 6 reviews
Rating in categories
Senior Associate
51
salaries
| ₹6 L/yr - ₹14 L/yr |
Network Engineer
39
salaries
| ₹3.2 L/yr - ₹8.5 L/yr |
Senior Consultant
20
salaries
| ₹11 L/yr - ₹33 L/yr |
Project Manager
17
salaries
| ₹12 L/yr - ₹34 L/yr |
Senior Engineer
16
salaries
| ₹4.5 L/yr - ₹8.7 L/yr |
Blue Dart Express
GATI-KWE
DTDC Express
Safexpress