Add office photos
Employer?
Claim Account for FREE

Etisalat

3.2
based on 223 Reviews
Video summary
Filter interviews by

20+ Techylla Interview Questions and Answers

Updated 19 Dec 2024

Q1. What is NSSA area in OSPF and why it is used for ?

Ans.

NSSA area is a type of OSPF area that allows external routes to be injected into the OSPF domain.

  • NSSA stands for Not-So-Stubby-Area.

  • It is used when an area needs to import external routes but still wants to maintain some level of stubbiness.

  • NSSA area has an ABR (Area Border Router) that translates Type 7 LSAs (Link State Advertisements) into Type 5 LSAs.

  • Type 7 LSAs are generated by ASBR (Autonomous System Boundary Router) in the NSSA area.

  • NSSA area can be used in scenarios wh...read more

Add your answer

Q2. 1- How ping / Traceroute work?

Ans.

Ping and Traceroute are network diagnostic tools used to test connectivity and identify network issues.

  • Ping sends a small packet of data to a destination IP address and waits for a response. It measures the time it takes for the packet to travel to the destination and back.

  • Traceroute sends packets with increasing TTL values to the destination, and each router along the path sends back an ICMP message indicating its presence. This helps to identify the path taken by the packet...read more

Add your answer

Q3. Can we implement MPLS without RT and RD?

Ans.

No, RT and RD are required for MPLS VPN implementation.

  • RT (Route Target) and RD (Route Distinguisher) are used to uniquely identify VPN routes.

  • Without RT and RD, MPLS VPN cannot differentiate between different VPN routes.

  • RT and RD are used to import and export VPN routes between different VPNs.

  • RT and RD are also used for route filtering and traffic engineering.

  • Therefore, RT and RD are essential for MPLS VPN implementation.

Add your answer

Q4. How OSPF build its database?

Ans.

OSPF builds its database by exchanging LSAs with neighboring routers.

  • OSPF routers exchange Hello packets to establish adjacency.

  • Once adjacency is established, routers exchange Link State Advertisements (LSAs).

  • LSAs contain information about the router's interfaces, neighbors, and network topology.

  • Each router builds its own database based on the LSAs it receives.

  • The database is used to calculate the shortest path to each network.

  • The SPF algorithm is used to calculate the shorte...read more

Add your answer
Discover Techylla interview dos and don'ts from real experiences

Q5. When a defect is pending of fix, and the same defect is been raised multiple times in a single sprint, what is the step advised to bring improvements?

Add your answer

Q6. What is FTTX? What is the diffrent type od fiber

Ans.

FTTX stands for Fiber to the X, which refers to various types of fiber optic network architectures. Different types of fiber include single-mode and multi-mode fibers.

  • FTTX refers to the deployment of fiber optic cables to various locations, such as homes (FTTH), businesses (FTTB), or curbside cabinets (FTTC).

  • Single-mode fiber is designed for long-distance communication and has a smaller core size, while multi-mode fiber is used for shorter distances and has a larger core size...read more

Add your answer
Are these interview questions helpful?

Q7. Wht is planning designing and implementing best solutions

Ans.

Planning, designing, and implementing best solutions involves identifying the problem, researching options, and executing the chosen solution.

  • Identify the problem or need

  • Research and evaluate potential solutions

  • Select the best solution based on cost, feasibility, and effectiveness

  • Implement the chosen solution

  • Monitor and evaluate the solution's effectiveness over time

Add your answer

Q8. Master mind for the ofc work

Ans.

The mastermind for the office work is someone who is highly skilled, organized, and able to effectively manage and coordinate various tasks and projects.

  • Strong technical skills in networking and IT infrastructure

  • Excellent problem-solving abilities

  • Effective communication and teamwork skills

  • Ability to prioritize and multitask

  • Experience with project management tools and software

  • Examples: Cisco Certified Network Professional (CCNP), experience with network monitoring tools like S...read more

Add your answer
Share interview questions and help millions of jobseekers 🌟

Q9. what are the modules in ciena 6500

Ans.

The modules in Ciena 6500 are line modules, switch modules, and control modules.

  • Line modules handle the physical interfaces and connections.

  • Switch modules manage the switching and routing functions.

  • Control modules oversee the overall system operation and management.

Add your answer

Q10. what is ROADM and its functions

Ans.

ROADM stands for Reconfigurable Optical Add-Drop Multiplexer. It is a device used in optical fiber networks to add, drop, or reroute specific wavelengths of light.

  • ROADM allows for flexible and dynamic allocation of bandwidth in optical networks.

  • It can add or drop specific wavelengths of light without affecting the rest of the network traffic.

  • ROADM can be remotely controlled to reconfigure the network as needed.

  • Examples of ROADM vendors include Ciena, Infinera, and Huawei.

Add your answer

Q11. What is the difference between UX and UI design?

Add your answer

Q12. What is OFC? and what is mux

Ans.

OFC stands for Optical Fiber Cable, which is a type of cable made up of thin strands of glass or plastic fibers for transmitting data. Mux is short for multiplexer, a device that combines multiple signals into one.

  • OFC is used for high-speed data transmission over long distances

  • OFC consists of a core, cladding, and buffer coating

  • Mux is used to increase the capacity of a network by combining multiple signals into one

  • Mux can be used in telecommunications, networking, and broadca...read more

Add your answer

Q13. Iam wraking in dubai

Ans.

I'm sorry, I don't understand the question.

  • Please provide a clear and understandable question.

  • I cannot provide an answer without a proper question.

  • Please rephrase your question.

Add your answer

Q14. What is a NLD link

Ans.

NLD link stands for National Long Distance link, which is a high-capacity fiber optic connection between different cities or regions.

  • NLD link is used to connect different parts of a country for data transmission.

  • It is typically used by telecom companies to provide long distance communication services.

  • NLD links are crucial for maintaining a reliable and high-speed network infrastructure.

  • Examples of NLD links include connections between major cities like Mumbai and Delhi in Ind...read more

Add your answer

Q15. What are the SDLC methods?

Add your answer

Q16. What is bgp protocol

Ans.

BGP (Border Gateway Protocol) is a routing protocol used to exchange routing information between different networks on the internet.

  • BGP is used to connect different autonomous systems (AS) on the internet.

  • It is a path-vector protocol that selects the best path for data to travel based on various attributes such as AS path length, network delay, etc.

  • BGP is used by internet service providers (ISPs) to connect their networks to other ISPs and to exchange routing information with...read more

Add your answer

Q17. explain the dwdm architect

Ans.

DWDM architect stands for Dense Wavelength Division Multiplexing architect, which is a technology used in fiber optic communications.

  • DWDM architect is a technology that allows multiple data streams to be transmitted simultaneously over a single fiber optic cable by using different wavelengths of light.

  • It increases the capacity of the fiber optic network by allowing more data to be transmitted over longer distances.

  • DWDM architect is commonly used in telecommunications networks...read more

Add your answer

Q18. how to secure your app

Ans.

Securing an app involves implementing various measures to protect user data and prevent unauthorized access.

  • Use secure authentication methods like biometrics or strong passwords

  • Implement encryption to protect sensitive data

  • Regularly update the app to fix security vulnerabilities

  • Implement secure communication protocols (HTTPS) for data transmission

  • Use code obfuscation to make reverse engineering difficult

  • Implement proper session management and access controls

  • Perform security t...read more

Add your answer

Q19. What is UX design?

Add your answer

Q20. Configurations of routers,

Add your answer

More about working at Etisalat

HQ - Abu Dhabi, Abu Dhabi, United Arab Emirates (UAE)
Contribute & help others!
Write a review
Share interview
Contribute salary
Add office photos

Interview Process at Techylla

based on 10 interviews
Interview experience
3.9
Good
View more
Interview Tips & Stories
Ace your next interview with expert advice and inspiring stories

Top Interview Questions from Similar Companies

4.1
 • 365 Interview Questions
3.4
 • 257 Interview Questions
4.2
 • 238 Interview Questions
3.4
 • 174 Interview Questions
4.2
 • 156 Interview Questions
4.1
 • 146 Interview Questions
View all
Top Etisalat Interview Questions And Answers
Share an Interview
Stay ahead in your career. Get AmbitionBox app
qr-code
Helping over 1 Crore job seekers every month in choosing their right fit company
70 Lakh+

Reviews

5 Lakh+

Interviews

4 Crore+

Salaries

1 Cr+

Users/Month

Contribute to help millions

Made with ❤️ in India. Trademarks belong to their respective owners. All rights reserved © 2024 Info Edge (India) Ltd.

Follow us
  • Youtube
  • Instagram
  • LinkedIn
  • Facebook
  • Twitter