Cisco
300+ Interview Questions and Answers
Q101. How did you build a sourcing strategy, what were the steps?
To build a sourcing strategy, I followed these steps:
Identified the business needs and goals
Conducted market research to identify potential suppliers
Evaluated supplier capabilities and performance
Negotiated contracts and pricing
Developed a supplier relationship management plan
Monitored supplier performance and made adjustments as needed
Q102. A triangle ABC is given, a line DE is paralel to base side and that cuts the triangle. The ratio of area of triangle to the area of trapezium .given DE/BC=3/5
The question asks about the ratio of the area of a triangle to the area of a trapezium formed by a parallel line cutting the triangle.
The given line DE is parallel to the base side of triangle ABC.
The ratio of DE to BC is 3:5.
We need to find the ratio of the area of triangle ABC to the area of the trapezium formed by DE and the base side of the triangle.
Q103. What is the need for IPv6?
IPv6 is needed due to the exhaustion of IPv4 addresses and the need for more unique IP addresses.
IPv6 provides a significantly larger address space compared to IPv4.
It allows for the allocation of unique IP addresses to every device connected to the internet.
IPv6 supports improved security features and better network performance.
It enables the growth of Internet of Things (IoT) devices and services.
Transitioning to IPv6 ensures the long-term sustainability of the internet.
Q104. What is an arraylist in Java?
An ArrayList is a dynamic array in Java that can grow or shrink in size during runtime.
ArrayList is a class in Java's Collection framework.
It implements the List interface and allows duplicate elements.
Elements can be added or removed using methods like add(), remove(), etc.
It can also be sorted using the sort() method.
Example: ArrayList
names = new ArrayList<>(); names.add("John"); names.add("Mary"); names.remove(0);
Average level Questions
Networking and CCNA: 5
Programming: 5
Database:5
Mathematics: 5
System Design and OS : 5
Number Of MCQs - 25
What does a Static member in C++ mean?
LR (2 questions)
Aptitude like Permutations and Combinations, Basic Arithmetic, Calendar Questions (4 questions)
Networking (6 questions)
Output Based (2 questions)
C/C++ (2 questions)
OS ( 4 questions)...read more
Q108. Generate a spiral for given matrix in clockwise direction
Generate a spiral order traversal of a given matrix in clockwise direction
Initialize variables for top, bottom, left, right boundaries
Iterate through the matrix in a spiral order while adjusting boundaries
Add elements to the result array in the spiral order
Q109. Can you mention the biggest bid you conducted and what was the outcome?
I led a bid for a software implementation project worth $5 million, resulting in a successful contract with a major client.
Led bid for $5 million software implementation project
Negotiated contract terms with major client
Ensured project met client's requirements and deadlines
Q110. How PING works? ICMP protocol.so add ICMP header to ip payload field and stuff.
Q111. What are specific terms in the technology (Authentication mechanism, how they work, how servers communicate)
Authentication mechanisms in technology involve various methods for verifying the identity of users and ensuring secure communication between servers.
Authentication mechanisms include passwords, biometrics, two-factor authentication, and digital certificates.
Servers communicate using protocols such as HTTPS, SSL/TLS, SSH, and OAuth.
Authentication mechanisms work by verifying the credentials provided by the user against stored data or by generating and validating digital signa...read more
Q112. Explain the DS which is well suited to implement UNIX commands like PWD, LS, MKDIR, CD in an imaginary OS. No code required. Just the DS
1. Introduction
2. why Cisco?
Q114. struct s1 { struct { struct {int x;}s2}s3}y; How to access x? ANS: y.s3.s2.x
To access x, use the following syntax: y.s3.s2.x
Accessing x requires navigating through the nested structures
Start with y, then access s3, followed by s2, and finally x
Q115. Which tool use for configuration of routers
The tool commonly used for configuring routers is a command-line interface (CLI).
Command-line interface (CLI) is the primary tool for configuring routers.
CLI allows network engineers to enter commands to configure various settings on the router.
Examples of CLI tools for router configuration include Cisco IOS CLI, Juniper Junos CLI, and Huawei VRP CLI.
Q116. what is your plan for honeymoontrip?
I am not comfortable discussing my personal life in a professional interview.
I prefer to keep my personal life separate from my professional life.
I believe in maintaining a work-life balance.
I am fully committed to my work and will prioritize it over personal matters.
I appreciate the question, but I would rather not discuss my honeymoon plans.
Given two hourglass of 4 minutes and 7 minutes, the task is to measure 9 minutes.
Define storage class in C++. Name some.
Q121. What happens when we type www.google.com from host computer, host- >switch->router(s)->host path. Typical questions related to networking layers
When typing www.google.com from a host computer, the request goes through the host, switch, router(s), and finally reaches the destination host.
The host computer sends a DNS query to resolve the domain name www.google.com to an IP address.
The switch forwards the DNS query to the router, which determines the next hop towards the destination.
The router(s) route the request through various networks until it reaches the destination host, in this case, Google's servers.
The respons...read more
What is Static variable in C ?
Q123. main() { printf(?as?); printf(?hi?); printf(?is ?); } wat will b printed. 10. main() { unsigned short a=-1; unsigned char b=a; printf(?%d %d ?,a,b); } wat is o/p of the program
Answering two programming questions related to printf() function and data types.
In the first program, the output will be 'as hi is'.
In the second program, the output will be '-1 255'.
The first program uses printf() function to print three strings.
The second program demonstrates type conversion from unsigned short to unsigned char.
The value of -1 in unsigned short is converted to 255 in unsigned char.
Q124. Explain ARP. why is udp used? Explain PORT addressing.
Q125. Mention the layers in OSI stack
OSI stack has 7 layers that define how data is transmitted over a network.
OSI stands for Open Systems Interconnection
Each layer has a specific function and communicates with adjacent layers
Layers are: Physical, Data Link, Network, Transport, Session, Presentation, Application
Q126. Write the code to reverse linked list using recursion
Code to reverse linked list using recursion
Create a recursive function to traverse the linked list
Swap the next and previous nodes in each recursive call
Return the new head of the reversed linked list
Q127. Find the next greater element using stack
Using stack to find the next greater element in an array
Create an empty stack to store indices of elements
Iterate through the array from right to left
Pop elements from stack until a greater element is found or stack is empty
Q128. System Design - Design a multi user job scheduler
A multi user job scheduler allows multiple users to schedule and manage their tasks efficiently.
Implement a centralized job scheduling system that can handle multiple users and their tasks simultaneously
Include features such as task prioritization, deadline management, and resource allocation
Use a database to store user information, task details, and scheduling algorithms
Provide a user-friendly interface for users to create, edit, and monitor their scheduled tasks
Q129. What are the Cisco tools you have worked on?
I have worked on Cisco tools such as Cisco Unified Communications Manager (CUCM) and Cisco Webex Teams.
Cisco Unified Communications Manager (CUCM)
Cisco Webex Teams
Q130. There are set of coins of {50,25,10,5,1} paise in a box.Write a program to find the number of ways a 1 rupee can be created by grouping the paise
The program finds the number of ways to create 1 rupee using different coins.
Use a recursive function to iterate through all possible combinations of coins
Start with the largest coin and subtract its value from the target amount
Repeat the process with the remaining coins until the target amount becomes zero
Count the number of successful combinations
Had to submit a video on the given topic
Q132. What are certificates, how they work in the communication. TLS etc...
Certificates are digital documents used to verify the identity of a website or server in secure communication.
Certificates are issued by a Certificate Authority (CA) to verify the identity of the website or server.
TLS (Transport Layer Security) is a protocol that uses certificates to secure communication over the internet.
Certificates contain information such as the public key of the website/server and the digital signature of the CA.
When a user connects to a website, the web...read more
Q133. How www.google.com typed in browser works??(abt dns server,etc)
Q135. Find the maximum element inside singly linkedlist
Find the maximum element in a singly linked list.
Traverse the list and keep track of the maximum element seen so far.
Compare each element with the current maximum and update if necessary.
Return the maximum element at the end of the traversal.
Describe the OSI Reference Model
Q137. What is need of ip address , when MAC address is thr
Q138. C program to count the no. of elements which are repeating more than size/2 times in an array
Q139. What is the point of BST?
BST is a data structure used for efficient searching, insertion and deletion of elements in a sorted manner.
BST stands for Binary Search Tree.
It has a root node and every node has at most two children.
The left subtree of a node contains only nodes with keys lesser than the node's key.
The right subtree of a node contains only nodes with keys greater than the node's key.
BST allows for efficient searching, insertion and deletion of elements in O(log n) time complexity.
Example: S...read more
“Java is not a pure OO language”. Justify this statement.
Q141. #define maxval 5 (programming / computer science engineering technical questions) int main (void) { int i=1; if(i-maxval) { printf(?inside?); } else { printf(?out?); } find o/p???
Q142. main() { int a; printf(?%d?,scanf(%d,&a)); } whats o/p of this pgm. What will be printed ans :0
Q143. Why ARP is used? Different types of ARP
ARP is used to map a network address (such as an IP address) to a physical address (such as a MAC address).
ARP stands for Address Resolution Protocol
It is used to resolve IP addresses to MAC addresses
There are two types of ARP: ARP Request and ARP Reply
ARP Request is used to find the MAC address of a device with a known IP address
ARP Reply is used to respond to an ARP Request with the MAC address of the device
ARP is important for communication between devices on a network
Q144. Tell about scheduling algos(round robin etc),context switching
Q145. How to create multiple network in a shorttime
Use network automation tools like Ansible or Python scripts to quickly create multiple networks.
Utilize network automation tools like Ansible or Python scripts
Create templates for network configurations to speed up the process
Use network virtualization technologies like VLANs or VXLANs to segment networks
Leverage cloud-based network services for rapid deployment
Consider using network automation platforms like Cisco DNA Center or Juniper Contrail
Q146. main() { unsigned short a=-1; unsigned char b=a; printf(?%d %d ?,a,b); } wat is o/p of the program a. 65535 -1 b. 65535 65535 c. -1 -1
Q147. Performance improvements in Angular
Performance improvements in Angular can be achieved through lazy loading, AOT compilation, and optimizing change detection.
Lazy loading: load modules only when needed
AOT compilation: pre-compile templates for faster rendering
Optimizing change detection: use OnPush strategy, avoid unnecessary bindings
Use trackBy function for ngFor loops
Use pure pipes instead of impure pipes
Use ngZone.runOutsideAngular() for heavy computations
Use Web Workers for parallel processing
Minimize HTTP...read more
Q149. What are the linux commands do you know ?
I know various Linux commands for file management, process management, networking, and system administration.
File management: ls, cd, cp, mv, rm, mkdir, touch
Process management: ps, top, kill, nice, renice
Networking: ping, traceroute, netstat, ifconfig, ssh
System administration: sudo, apt-get, systemctl, journalctl, crontab
Osi model with example at each layer transfer
Q151. What are differences between RIP and OSPF Protocol
RIP and OSPF are routing protocols used in computer networks.
RIP is a distance-vector protocol while OSPF is a link-state protocol.
RIP uses hop count as the metric while OSPF uses cost.
OSPF supports VLSM and CIDR while RIP does not.
OSPF is more scalable and efficient for larger networks than RIP.
RIP broadcasts its routing table updates while OSPF uses multicast.
OSPF has a faster convergence time than RIP.
RIP is simpler to configure and troubleshoot than OSPF.
Q152. What are the major procurement and customer related aspects
Major procurement and customer related aspects include supplier management, cost control, quality assurance, and customer satisfaction.
Supplier management involves selecting reliable suppliers, negotiating contracts, and maintaining relationships.
Cost control focuses on reducing expenses through strategic sourcing, competitive bidding, and contract management.
Quality assurance ensures that products and services meet specified standards and requirements.
Customer satisfaction i...read more
Q153. When the looping state ments are used? What are branching statements explain breafly?
Looping statements are used to execute a block of code repeatedly. Branching statements alter the flow of control in a program.
Looping statements are used when we want to execute a block of code repeatedly until a certain condition is met.
Examples of looping statements include for, while, and do-while loops.
Branching statements are used to alter the normal flow of control in a program.
Examples of branching statements include if-else statements, switch statements, and the brea...read more
Q154. Differences between Public IP and Private IP
Public IP is a unique address assigned to a device on the internet, while Private IP is used within a local network.
Public IP is globally unique and can be accessed from anywhere on the internet.
Private IP is used within a local network and is not accessible from the internet.
Public IP is assigned by the Internet Service Provider (ISP) to identify a device on the internet.
Private IP is assigned by a local network administrator to identify devices within the network.
Public IP ...read more
Explain all the main Object Oriented programming Concepts
Difference between ArrayList and LinkedList
Q157. How do you select the appropriate learning algorithm for a problem?
Selecting the appropriate learning algorithm involves considering the problem's characteristics and requirements.
Understand the problem's nature, such as classification, regression, clustering, etc.
Consider the size of the dataset and the computational resources available.
Evaluate the complexity of the relationships within the data.
Experiment with different algorithms and compare their performance using metrics like accuracy, precision, recall, etc.
Choose algorithms based on ...read more
Synchronization in Operating System in detail
Q159. What are all the components needed in a home networking system
Components needed in a home networking system include modem, router, switch, access point, and network cables.
Modem: connects to the internet service provider and converts the signal for use by the network.
Router: directs network traffic between devices and manages the IP addresses.
Switch: connects multiple devices within the network and allows them to communicate with each other.
Access Point: provides wireless connectivity for devices to connect to the network.
Network cables...read more
Q160. Unsorted array and a position ‘P’. Return the element that is likely to come to the given location upon sorting the array. Do it 0(n)
Design a basic hash map.
Q162. What is difference between mutex semaphore?
Mutex is a locking mechanism to ensure exclusive access to a shared resource, while semaphore is a signaling mechanism to control access to a shared resource.
Mutex allows only one thread to access the shared resource at a time, while semaphore can allow multiple threads to access the shared resource simultaneously.
Mutex is binary, meaning it has only two states - locked and unlocked, while semaphore can have multiple states depending on the number of threads allowed to access...read more
Q163. Any knowledge of Networks/DS?
Yes
Knowledge of network protocols and architectures
Understanding of data structures and algorithms
Experience with network troubleshooting and analysis
Familiarity with network security and encryption
Proficiency in network programming and socket programming
Q164. #define clrscr() 100 main() { clrscr(); printf(?%d?,clrscr()); }
The code snippet defines a macro called clrscr() and then calls it in the main function.
The macro clrscr() is defined as 100, so when it is called, it will be replaced with 100.
The printf statement will print the value returned by clrscr(), which is 100.
The output of the code will be '100'.
Q165. How would you build a pipeline for a Machine learning project?
To build a pipeline for a Machine learning project, you need to collect data, preprocess it, train the model, evaluate its performance, and deploy it.
Collect relevant data from various sources
Preprocess the data by cleaning, transforming, and normalizing it
Split the data into training and testing sets
Train the machine learning model using the training data
Evaluate the model's performance using the testing data
Fine-tune the model if necessary
Deploy the model into production en...read more
Q166. #define a 3+3 #define b 11-3 main() { printf(?%d?,a*b); } wat is o/p?????
This is a programming question involving preprocessor directives and printf function.
The preprocessor directives #define a 3+3 and #define b 11-3 will be replaced by their respective values during compilation.
The main function will print the result of a*b, which is equivalent to 6*8.
Therefore, the output will be 48.
The printf function will print the integer value of 48.
Q167. What is a microservice?
A microservice is a small, independent, and loosely coupled service that performs a specific business function.
Microservices are designed to be small and focused on a single task or business function.
They communicate with each other through APIs.
Each microservice can be developed, deployed, and scaled independently.
Examples include user authentication service, payment processing service, and notification service.
Q168. how to reverse the link list? find all possible sub sequences in a given array
Reverse a linked list and find all possible subsequences in a given array.
To reverse a linked list, iterate through the list and change the next pointers of each node to the previous node.
To find all possible subsequences in an array, use recursion and generate all possible combinations of elements.
For example, given the array [1, 2, 3], the possible subsequences are [], [1], [2], [3], [1, 2], [1, 3], [2, 3], [1, 2, 3].
Q169. HTTP header format ?
HTTP headers are key-value pairs sent between the client and server to provide additional information about the request or response.
HTTP headers consist of a key-value pair separated by a colon, with each pair separated by a new line
Headers are used to provide information such as content type, content length, caching directives, authentication credentials, etc.
Example: 'Content-Type: application/json'
Q170. Which LAN switching is used in catalyst 5000
Catalyst 5000 uses shared memory LAN switching.
Catalyst 5000 uses a shared memory architecture for LAN switching.
This allows for high-speed switching between ports.
The shared memory architecture also allows for advanced features like VLANs and QoS.
Examples of Catalyst 5000 models include the 5500 and 5002.
These switches were popular in the 1990s and early 2000s.
Measure 4L using 3L and 5L cans .
Q172. How will you make sure that Jira issues are not moved ahead
Regularly review and prioritize Jira issues, set clear deadlines, communicate with team members, and track progress.
Regularly review and prioritize Jira issues to ensure they are not moved ahead without proper consideration.
Set clear deadlines for each Jira issue to prevent unnecessary delays.
Communicate effectively with team members to ensure everyone is on the same page regarding the status of Jira issues.
Track progress regularly to identify any issues or bottlenecks that m...read more
Q173. 3. Suggest a Data Structure that will help in scheduling football matches and makes sure each team has played with every other team.
Use a round-robin tournament scheduling algorithm with a matrix data structure.
Create a matrix where rows represent teams and columns represent opponents.
Fill in the matrix such that each team plays every other team exactly once.
Use the round-robin tournament scheduling algorithm to generate the match schedule.
Ensure that each team plays with every other team by checking the matrix for any missing matches.
Location preferences: banglore, chennai, Pune
Q175. What happens when a user opens a browser and type in url and go?
When a user opens a browser and types in a URL and hits enter, the browser sends a request to the server hosting the website specified in the URL.
Browser resolves the domain name to an IP address using DNS
Browser sends a request to the server at that IP address
Server processes the request and sends back the webpage content
Browser renders the webpage for the user to view
Q176. Write a function to write a word to particular sector
A function to write a word to a particular sector.
Create a function that takes a word and a sector as parameters
Use the sector to determine the starting position in the array
Write the word to the array starting from the specified sector
Return the updated array
Q177. Derive a mathematical equation to calculate the angle between two handa of clock
Q178. Bridges are used in which layer?
Bridges are used in the network layer of the OSI model.
Bridges are used to connect two or more network segments or LANs.
They operate at the data link layer (Layer 2) of the OSI model.
Bridges use MAC addresses to forward data packets between segments.
They can filter and forward network traffic based on MAC addresses.
Examples of bridges include Ethernet bridges and wireless bridges.
Q179. What are he layers of the OSI model?
The OSI model has 7 layers that define how data is transmitted over a network.
Layer 1: Physical - deals with the physical connection of devices
Layer 2: Data Link - responsible for error-free transfer of data between devices
Layer 3: Network - handles routing of data between different networks
Layer 4: Transport - ensures reliable delivery of data between applications
Layer 5: Session - establishes and manages connections between applications
Layer 6: Presentation - translates dat...read more
Q180. main() { printf(?as?); printf(?bhi?); printf(?isn?); } what will b printed
Q181. Write the of a c program for printing numbers into words such as 123 (one hundred and twenty three)
A C program to convert numbers into words, using an array of strings.
Create an array of strings to store the words for each digit
Use modulus and division to extract each digit from the number
Use conditional statements to determine the appropriate word for each digit
Combine the words for each digit to form the final output
Q182. what is git and few commands related to it
Git is a version control system used for tracking changes in code. It allows collaboration and easy management of codebase.
git init - initializes a new git repository
git add - adds changes to the staging area
git commit - commits changes to the repository
git push - pushes changes to a remote repository
git pull - pulls changes from a remote repository
git branch - lists all branches in the repository
git merge - merges changes from one branch to another
Q183. ++Spanning tree and Troubleshooting of switching network
Explanation of Spanning Tree Protocol and troubleshooting techniques for switching networks.
Spanning Tree Protocol (STP) is used to prevent loops in a network by blocking redundant paths.
Troubleshooting STP involves checking for blocked ports, incorrect root bridge selection, and misconfigured priority values.
Other common issues in switching networks include VLAN mismatches, port security violations, and broadcast storms.
Tools such as packet captures, show commands, and netwo...read more
Q184. what is call apply bind
call, apply, and bind are methods in JavaScript used to manipulate the context of a function.
call - calls a function with a given 'this' value and arguments provided individually.
apply - calls a function with a given 'this' value and arguments provided as an array.
bind - creates a new function that, when called, has its 'this' keyword set to the provided value.
Q185. When we malloc sm size where does it reside
Q186. What is the use of agile in change management?
Agile methodology helps change managers to adapt to changing requirements and deliver value faster.
Agile principles can be applied to change management to increase flexibility and responsiveness.
It allows for iterative and incremental changes, reducing the risk of failure.
Agile promotes collaboration and communication between stakeholders, leading to better outcomes.
It emphasizes continuous improvement and learning, enabling change managers to adapt to new challenges.
Examples...read more
Q187. Representation of stack and queue using linked list and then perform insertion and deletion
Q188. Models in software engg?. Explain extreme programming
Q189. main() { int ret; ret=fork(); ret=fork(); ret=fork(); ret=fork(); if(!ret) printf(
The code snippet demonstrates the use of the fork() function to create multiple child processes.
The fork() function is used to create a new process by duplicating the existing process.
Each time fork() is called, it creates a new child process that starts executing from the same point as the parent process.
In the given code, fork() is called four times, resulting in a total of 16 processes (including the original parent process).
The if(!ret) condition checks if the current pro...read more
It was all on my master's thesis
Q191. Sorting an array and merging
Sorting an array of strings and merging them into a single string
Use a sorting algorithm like quicksort or mergesort to sort the array of strings
After sorting, merge the sorted strings into a single string using a loop or built-in functions like join()
Q192. Calculate the number of bits set to 1 in a binary number
Q193. do you know any competitors of cisco
Yes, some of the competitors of Cisco are Juniper Networks, Huawei, and Arista Networks.
Juniper Networks is a networking equipment company that provides networking solutions to enterprises and service providers.
Huawei is a Chinese multinational technology company that offers networking and telecommunications equipment and services.
Arista Networks is a computer networking company that specializes in data center switches and cloud networking solutions.
Q194. What is formula of inventory turnover ratio
Inventory turnover ratio formula is Cost of Goods Sold divided by Average Inventory.
Inventory turnover ratio measures how quickly a company sells its inventory.
It indicates the efficiency of a company's inventory management.
A higher ratio is better as it means the company is selling its inventory quickly.
Formula: Inventory turnover ratio = Cost of Goods Sold / Average Inventory
Example: If a company has a COGS of $500,000 and an average inventory of $100,000, the inventory tur...read more
Two wire burning puzzle .
Q196. meta classes in python
Meta classes are classes that define the behavior of other classes.
Meta classes are used to customize the behavior of classes.
They can be used to add or modify attributes and methods of classes.
They can also be used to enforce certain rules or restrictions on classes.
In Python, the default meta class is 'type'.
Example: class MyMeta(type): pass
Q197. What is IFRS and how to implement it
IFRS stands for International Financial Reporting Standards, a set of accounting standards developed by the International Accounting Standards Board (IASB).
IFRS is used by companies across the globe to ensure consistency and transparency in financial reporting.
Implementation of IFRS involves understanding the standards, making necessary adjustments to financial statements, and training staff on the new requirements.
Companies may need to invest in new accounting software or hi...read more
Total water in earth ?
Q199. What is Python?how if state ments are used?
Python is a high-level, interpreted programming language known for its simplicity and readability.
Python is used for web development, data analysis, artificial intelligence, and more.
It uses if statements for conditional execution of code.
Example: if x > 5: print('x is greater than 5')
Python also supports elif and else statements for more complex conditions.
Top HR Questions asked in null
Interview Process at null
Top Interview Questions from Similar Companies
Reviews
Interviews
Salaries
Users/Month