I Square tek Solutions Private Limited
10+ DCB Bank Interview Questions and Answers
Q1. What do you mean by NOC and TAC?
NOC stands for Network Operations Center, which is responsible for monitoring and managing network infrastructure. TAC stands for Technical Assistance Center, which provides technical support to customers.
NOC is responsible for monitoring network performance, troubleshooting network issues, and ensuring network availability.
TAC provides technical support to customers, helps troubleshoot and resolve technical issues, and escalates complex problems to higher levels of support.
E...read more
Q2. What do you know about Hpe Aruba?
Hpe Aruba is a networking company that provides solutions for wireless LAN, edge computing, and security.
Hpe Aruba offers wireless LAN solutions for businesses and organizations.
They specialize in edge computing to improve network performance and efficiency.
Aruba provides security solutions to protect networks from cyber threats.
They offer products such as access points, switches, and network management software.
Aruba's ClearPass solution helps organizations secure their netw...read more
Q3. What is STP and its types?
STP stands for Spanning Tree Protocol, used to prevent loops in network topology.
STP is a network protocol that ensures a loop-free topology in Ethernet networks.
It works by designating one switch as the root bridge and blocking redundant paths to prevent loops.
There are different types of STP such as IEEE 802.1D (STP), IEEE 802.1w (RSTP), and IEEE 802.1s (MSTP).
Q4. What is NAT and it's uses?
NAT stands for Network Address Translation and is used to translate private IP addresses to public IP addresses for communication over the internet.
NAT allows multiple devices on a local network to share a single public IP address
It provides an additional layer of security by hiding the internal IP addresses of devices
NAT can be implemented using techniques like Static NAT, Dynamic NAT, and Port Address Translation (PAT)
Example: A home network with multiple devices using a si...read more
Q5. ACL and how does it work?
ACL stands for Access Control List, a set of rules that filters network traffic based on defined criteria.
ACLs are used to control traffic flow in and out of a network.
They can be configured on routers and switches to permit or deny traffic based on source/destination IP address, port number, protocol, etc.
There are two types of ACLs: standard ACLs and extended ACLs.
Standard ACLs filter traffic based on the source IP address only, while extended ACLs can filter based on multi...read more
Q6. Difference between Subnetting and supernetting?
Subnetting divides a network into smaller subnetworks, while supernetting combines multiple subnetworks into a larger network.
Subnetting is used to divide a large network into smaller subnetworks for better organization and management.
Supernetting is used to combine multiple smaller subnetworks into a larger network for more efficient routing.
Subnetting involves creating subnets with unique network addresses within the original network.
Supernetting involves aggregating multip...read more
Q7. Explain any routing protocol like EIGRP?
EIGRP is an advanced distance-vector routing protocol used in computer networks.
EIGRP is a Cisco proprietary routing protocol.
It uses a composite metric based on bandwidth, delay, load, and reliability.
EIGRP supports VLSM (Variable Length Subnet Masking) and CIDR (Classless Inter-Domain Routing).
It uses Diffusing Update Algorithm (DUAL) to calculate the best path.
EIGRP sends partial updates only when there is a change in the network topology.
Q8. Explain Mac Add and it's format?
MAC address is a unique identifier assigned to network interfaces for communications on the physical network segment.
MAC address stands for Media Access Control address.
It is a 12-digit hexadecimal number typically written in the format XX:XX:XX:XX:XX:XX.
The first half of the MAC address identifies the manufacturer of the network interface, while the second half is a unique identifier for the device.
MAC addresses are used in Ethernet networks to uniquely identify devices on t...read more
Q9. Explain Ip Address and its classes?
IP Address is a unique numerical label assigned to each device connected to a computer network.
IP Address is divided into classes: A, B, C, D, and E.
Class A addresses are used for large networks, with the first bit always set to 0.
Class B addresses are used for medium-sized networks, with the first two bits always set to 10.
Class C addresses are used for small networks, with the first three bits always set to 110.
Class D addresses are reserved for multicast groups.
Class E add...read more
Q10. What is ARP protocol ?
ARP protocol is used to map IP addresses to MAC addresses in a local network.
ARP stands for Address Resolution Protocol
It is used to resolve IP addresses to MAC addresses in a local network
ARP requests are broadcasted to all devices on the network
Example: When a device wants to communicate with another device on the same network, it uses ARP to find the MAC address of the destination IP address
Q11. What is Subnetting?
Subnetting is the process of dividing a network into smaller sub-networks to improve performance and security.
Subnetting helps in efficient utilization of IP addresses by dividing a large network into smaller ones.
It allows for better network management and organization.
Subnetting helps in reducing network congestion and improving overall network performance.
Example: Dividing a network with IP range 192.168.1.0/24 into smaller subnets like 192.168.1.0/26 and 192.168.1.64/26.
Q12. What is Tcp, Udp??
TCP (Transmission Control Protocol) and UDP (User Datagram Protocol) are two different protocols used in networking.
TCP is a connection-oriented protocol that guarantees delivery of data packets in the correct order.
UDP is a connectionless protocol that does not guarantee delivery of data packets or order.
TCP is used for applications that require reliable and error-checked delivery of data, such as web browsing and email.
UDP is used for applications that require fast transmis...read more
Q13. Explain Dora process?
DORA process stands for Discovery, Offer, Request, and Acknowledge in network engineering.
Discovery: Devices on the network discover each other's presence.
Offer: Devices offer their services to other devices on the network.
Request: Devices request services from other devices on the network.
Acknowledge: Devices acknowledge the receipt of services or requests.
Example: When a computer joins a network, it goes through the DORA process to obtain an IP address from a DHCP server.
Q14. Switching intervlan and router on a stick and trunking and stp
Switching intervlan, router on a stick, trunking, and STP are networking concepts used to manage traffic between VLANs and prevent loops in a network.
Switching intervlan involves allowing communication between different VLANs on a switch.
Router on a stick is a setup where a single router interface is used to route traffic between VLANs.
Trunking is the process of carrying multiple VLAN traffic over a single link between switches.
STP (Spanning Tree Protocol) is used to prevent ...read more
Q15. What is osi model?
The OSI model is a conceptual framework that standardizes the functions of a telecommunication or computing system into seven different layers.
The OSI model stands for Open Systems Interconnection model.
It helps in understanding how different networking protocols work together.
The seven layers are: Physical, Data Link, Network, Transport, Session, Presentation, and Application.
Each layer has its own specific functions and communicates with the adjacent layers.
For example, HTT...read more
Q16. What are the best practices for optimizing a Linux server?
Best practices for optimizing a Linux server
Regularly update the server's software and kernel to ensure security and performance improvements
Use monitoring tools like Nagios or Zabbix to track server performance and identify bottlenecks
Optimize server configuration settings such as TCP/IP stack parameters and file system options
Implement caching mechanisms like Varnish or Redis to improve response times for web applications
Q17. What are the steps for troubleshooting a slow Linux server?
Troubleshooting a slow Linux server involves identifying potential causes and implementing solutions to improve performance.
Check system resource usage with tools like top, htop, or sar
Investigate network issues with tools like netstat or tcpdump
Review system logs for errors or warnings
Optimize server configuration settings such as kernel parameters or network settings
Consider hardware upgrades if necessary
Q18. What is the Best CTC you can come for ?
I am looking for a competitive salary package based on my experience and skills.
Research industry standards for Customer Success Manager salaries
Consider your level of experience and skills when determining your desired salary
Negotiate based on the value you can bring to the company
Be open to discussing other benefits or perks in addition to salary
Interview Process at DCB Bank
Top Interview Questions from Similar Companies
Reviews
Interviews
Salaries
Users/Month