Filter interviews by
I applied via Company Website and was interviewed in Mar 2022. There were 3 interview rounds.
It is great discussion between manager and me, they were generally asked about network and it's components
They generally asking about VLAN, SWITCHES AND ROUTER, SDWAN , HOW NETWORK WORKS
I applied via LinkedIn and was interviewed in May 2024. There was 1 interview round.
A switch is a networking device that operates at Layer 2 of the OSI model, handling data at the data link layer.
Switches forward data based on MAC addresses
Operate at Layer 2 of the OSI model
Used to create LANs and connect devices within a network
Helps reduce network congestion by only sending data to the intended recipient
In the OSI model, each layer has specific functions and responsibilities in the communication process.
The OSI model consists of 7 layers, each with its own specific functions and responsibilities.
Each layer communicates with the adjacent layers to ensure data is properly transmitted.
For example, in the OSI model, Layer 1 (Physical layer) deals with the physical connection between devices, while Layer 2 (Data Link layer
Routers operate at Layer 3 of the OSI model and make decisions based on IP addresses, while switches operate at Layer 2 and make decisions based on MAC addresses.
Routers operate at Layer 3 of the OSI model, while switches operate at Layer 2.
Routers make decisions based on IP addresses, while switches make decisions based on MAC addresses.
Routers connect different networks together, while switches connect devices within...
DNS stands for Domain Name System, which translates domain names to IP addresses.
DNS is like a phone book for the internet, translating human-readable domain names (like google.com) into IP addresses (like 172.217.3.206).
It helps users access websites by translating domain names into IP addresses that computers can understand.
DNS also helps with email delivery by translating domain names into IP addresses for mail serv...
A packet flows over the internet by being encapsulated in various network layers and routed through different devices.
Packet is created at the application layer with data and destination IP address
Packet is then encapsulated in a frame at the data link layer with source and destination MAC addresses
Frame is transmitted over physical medium to the next hop based on routing table
At each hop, the frame is decapsulated and...
I applied via Approached by Company and was interviewed in Nov 2023. There was 1 interview round.
Routing is the process of selecting the best path for network traffic to reach its destination.
Routing helps in directing network traffic efficiently
It determines the best path for data packets to travel from source to destination
Routing protocols like OSPF, BGP, and EIGRP are used to exchange routing information
Routing tables are used to store information about network paths
Dynamic routing adjusts to network changes a
IPS stands for Intrusion Prevention System. It is a network security technology that monitors network traffic to detect and prevent malicious activities.
IPS is a network security technology that monitors network traffic in real-time.
It can detect and prevent malicious activities such as hacking attempts, malware infections, and denial-of-service attacks.
IPS works by analyzing network packets, comparing them to a databa...
Firewall works at the network layer.
Firewall operates at the network layer of the OSI model.
It filters and controls incoming and outgoing network traffic based on predetermined security rules.
Examples of firewalls include hardware firewalls, software firewalls, and cloud-based firewalls.
Firewall generations refer to the evolution of firewall technology and their roles in network security.
First generation firewalls - packet filtering based on IP addresses and ports
Second generation firewalls - stateful inspection and improved security features
Third generation firewalls - application layer filtering and deep packet inspection
Fourth generation firewalls - next-generation firewalls with advanced threat pr...
IP Spoofing is a technique where an attacker impersonates another device by falsifying IP address in order to gain unauthorized access.
IP Spoofing involves manipulating the source IP address in a packet to deceive the recipient.
It is commonly used in DDoS attacks to hide the true source of the attack traffic.
Prevention methods include implementing ingress and egress filtering on network devices.
Examples of tools used f
I applied via Naukri.com and was interviewed in Jan 2024. There were 2 interview rounds.
C fibonacci series program asked, Area of interest, about any additional certification
I applied via Naukri.com and was interviewed in Mar 2022. There were 4 interview rounds.
Use pre-staged image and fast transfer methods to achieve IOS upgrade within 10 minutes.
Pre-stage the image on the device before the upgrade window
Use fast transfer methods like TFTP or FTP to transfer the image quickly
Ensure all necessary configurations are saved and backed up before the upgrade
Have a rollback plan in case of any issues during the upgrade
I applied via Referral and was interviewed in Mar 2022. There was 1 interview round.
BGP and OSPF are both routing protocols, but BGP is used for inter-domain routing while OSPF is used for intra-domain routing.
BGP is important in respect of OSPF because it allows for communication between different autonomous systems (AS)
BGP is used to exchange routing information between different AS, while OSPF is used within a single AS
BGP is used to determine the best path for traffic to take between different AS,...
BGP is used for routing between different autonomous systems, while IBGP is used for routing within the same autonomous system.
BGP (Border Gateway Protocol) is an exterior gateway protocol used for routing between different autonomous systems.
IBGP (Internal Border Gateway Protocol) is used for routing within the same autonomous system.
BGP is used to exchange routing information between different autonomous systems (ASe...
No, SVIs cannot be created in L2 switches.
SVI stands for Switched Virtual Interface.
It is a virtual interface that represents a VLAN on a Layer 3 switch.
L2 switches operate at Layer 2 of the OSI model and do not support routing or Layer 3 functionality.
SVIs are used for routing between VLANs, which is a Layer 3 function.
L2 switches can only create VLANs and assign ports to them for Layer 2 switching.
To enable Layer 3 f...
The best link of OMP route depends on the specific needs and requirements of the network.
Internet may be a better option for cost-effectiveness and flexibility, but MPLS may offer better reliability and security.
Consider factors such as bandwidth, latency, traffic volume, and application requirements.
Evaluate the pros and cons of each option before making a decision.
For example, if the network requires low latency and ...
TLOC in Viptela SDWAN stands for Transport Locator and is used to identify the physical or virtual location of a device in the network.
TLOC is a unique identifier assigned to each device in the SDWAN network.
It helps in determining the optimal path for traffic routing.
TLOCs can be based on various parameters such as interface, IP address, or VPN.
They are used to define the connectivity between different sites in the ne...
I applied via Naukri.com and was interviewed in Feb 2021. There was 1 interview round.
I applied via Naukri.com and was interviewed in Feb 2024. There was 1 interview round.
BGP (Border Gateway Protocol) and OSPF (Open Shortest Path First) are routing protocols used in computer networks.
BGP is an exterior gateway protocol used to exchange routing information between different autonomous systems.
OSPF is an interior gateway protocol used to determine the best path for data packets within an autonomous system.
BGP operates at the network layer and is commonly used in large-scale networks, such...
VLAN and VTP are both networking concepts, but they serve different purposes.
VLAN (Virtual Local Area Network) is used to logically divide a single physical network into multiple virtual networks.
VTP (VLAN Trunking Protocol) is a Cisco proprietary protocol used to manage VLAN configurations across a network of switches.
VLANs provide segmentation, security, and broadcast control, while VTP simplifies VLAN management by ...
based on 2 reviews
Rating in categories
Software Engineer
3.7k
salaries
| ₹1.9 L/yr - ₹9.5 L/yr |
Technical Lead
3.5k
salaries
| ₹6.9 L/yr - ₹25 L/yr |
Senior Software Engineer
2.9k
salaries
| ₹4 L/yr - ₹14.5 L/yr |
Lead Engineer
2.7k
salaries
| ₹4.3 L/yr - ₹13 L/yr |
Senior Analyst
2.2k
salaries
| ₹1.6 L/yr - ₹10 L/yr |
HCLTech
TCS
Tata Group
Wipro