Filter interviews by
I applied via Naukri.com and was interviewed before May 2022. There were 4 interview rounds.
Network protocols and port numbers are essential for communication between devices on a network.
TCP/IP is the most commonly used protocol suite
HTTP uses port 80, HTTPS uses port 443
SMTP uses port 25, POP3 uses port 110, IMAP uses port 143
FTP uses port 21, SFTP uses port 22
DNS uses port 53
SSH uses port 22
Telnet uses port 23
I applied via Naukri.com and was interviewed in Apr 2022. There were 3 interview rounds.
Dhcp dns ,printer
I applied via Recruitment Consulltant and was interviewed before Dec 2022. There were 2 interview rounds.
I applied via LinkedIn and was interviewed in Feb 2022. There were 2 interview rounds.
Future Focus Infotech interview questions for popular designations
I applied via Naukri.com and was interviewed in Dec 2021. There was 1 interview round.
Get interview-ready with Top Future Focus Infotech Interview Questions
posted on 12 Apr 2022
I applied via Monster and was interviewed in Oct 2021. There were 2 interview rounds.
Data center infrastructure module includes servers, storage, networking, power, cooling, and security.
Servers: physical or virtual machines that run applications and services
Storage: devices that store data, such as hard drives or solid-state drives
Networking: equipment that connects servers and storage devices to each other and to the internet
Power: systems that provide electricity to the data center
Cooling: equipment...
I applied via Recruitment Consultant and was interviewed in Jul 2021. There was 1 interview round.
To troubleshoot internet issue, check network connectivity, DNS settings, firewall, and router configuration.
Check if other devices are able to connect to the internet
Verify DNS settings and try using a different DNS server
Check firewall settings and ensure that the required ports are open
Check router configuration and restart if necessary
I applied via Naukri.com and was interviewed before Aug 2021. There was 1 interview round.
Heat map displays data using color intensity while tree map displays data using nested rectangles.
Heat map is used to show the distribution of data across a two-dimensional space.
Tree map is used to display hierarchical data using nested rectangles.
Heat map uses color intensity to represent the data values while tree map uses the size of the rectangles.
Heat map is useful for identifying patterns and trends in large dat...
posted on 12 Apr 2022
I applied via Approached by Company and was interviewed in Oct 2021. There were 2 interview rounds.
Technical Infra Interview
OSPF special area is a type of OSPF area that has a different behavior than other OSPF areas.
OSPF special area includes stub area, totally stubby area, and not-so-stubby area (NSSA).
In stub area, the area border router (ABR) summarizes external routes as a default route.
In totally stubby area, the ABR summarizes all routes as a default route.
In NSSA, external routes are allowed but are translated into internal routes.
O...
RSTP, STP, and MSTP are all protocols used for preventing network loops, but they differ in their speed and complexity.
STP (Spanning Tree Protocol) is the original protocol used for preventing network loops.
RSTP (Rapid Spanning Tree Protocol) is an updated version of STP that is faster and more efficient.
MSTP (Multiple Spanning Tree Protocol) is a more complex protocol that allows for multiple VLANs to be mapped to a s...
HSRP, VRRP, and GLBP are all protocols used for providing redundancy in a network.
HSRP stands for Hot Standby Router Protocol and is a Cisco proprietary protocol.
VRRP stands for Virtual Router Redundancy Protocol and is an open standard protocol.
GLBP stands for Gateway Load Balancing Protocol and is also a Cisco proprietary protocol.
HSRP and VRRP both provide redundancy by allowing multiple routers to share a virtual I...
Subnetting involves dividing a network into smaller subnetworks for better management and security.
Class A networks have a default subnet mask of 255.0.0.0 and can be subnetted to create smaller networks.
Class C networks have a default subnet mask of 255.255.255.0 and can also be subnetted.
Subnetting allows for better utilization of IP addresses and improves network performance.
Subnetting also enhances network security...
BGP neighbors are configured to establish and maintain BGP sessions between routers.
BGP neighbors are configured using the neighbor command in router configuration mode.
The neighbor IP address and remote AS number must be specified.
BGP neighbors must be directly connected or static routes must be configured.
BGP sessions can be verified using the show ip bgp summary command.
Troubleshooting BGP neighbor issues can involv...
Police creation on firewalls refers to the process of setting up rules and policies to monitor and control network traffic.
Firewalls act as a barrier between a trusted internal network and an untrusted external network
Police creation involves setting up rules to allow or block traffic based on specific criteria such as IP address, port number, and protocol
Firewalls can also be configured to log and alert administrators...
NAT and PAT are both techniques used in networking to translate IP addresses. NAT translates one IP address to another, while PAT translates multiple IP addresses to a single IP address.
NAT stands for Network Address Translation and is used to translate private IP addresses to public IP addresses.
PAT stands for Port Address Translation and is a type of NAT that translates multiple private IP addresses to a single publi...
A channel is a medium through which data is transmitted from one device to another.
Channels can be physical, such as copper wires or fiber optic cables, or wireless, such as radio waves or infrared signals.
Different channels have different bandwidths, which affect the speed and amount of data that can be transmitted.
Examples of channels include Ethernet, Wi-Fi, Bluetooth, and cellular networks.
SLA base routing is a method of routing traffic based on service level agreements.
SLA base routing prioritizes traffic based on the agreed-upon service level agreements.
It ensures that critical traffic is given priority over less important traffic.
SLA base routing can be used to ensure that certain applications or services receive the necessary bandwidth and resources.
It can also be used to ensure that traffic is route...
A route map is a set of rules that determine how traffic is routed between networks.
Route maps are used in network routing protocols to control the flow of traffic.
They can be used to filter routes, set metrics, and modify attributes of routes.
Route maps are made up of match and set statements that define the conditions and actions to be taken.
For example, a route map could be used to prioritize traffic from a certain ...
Top trending discussions
Interview experience
based on 751 reviews
Rating in categories
Software Developer
189
salaries
| ₹2 L/yr - ₹10 L/yr |
Desktop Support Engineer
186
salaries
| ₹1.6 L/yr - ₹4 L/yr |
Software Engineer
176
salaries
| ₹3 L/yr - ₹10 L/yr |
Network Engineer
157
salaries
| ₹1.5 L/yr - ₹6 L/yr |
Senior Software Engineer
139
salaries
| ₹4 L/yr - ₹16 L/yr |
Team Lease
Quess
Tech Mahindra
HCLTech