i
IBM
Proud winner of ABECA 2024 - AmbitionBox Employee Choice Awards
Filter interviews by
Clear (1)
I applied via Approached by Company and was interviewed in Apr 2022. There were 4 interview rounds.
The interview was very good as they asked me my experiences(good & bad) from the day I am professional. How to handle the situations when a senior person makes a mistake. What are the ways of learning that you prefer.
I have worked with a variety of tools as a Network Engineer.
Cisco Packet Tracer
Wireshark
SolarWinds Network Performance Monitor
Nmap
GNS3
Ping
Traceroute
I have worked on a variety of technologies as a Network Engineer.
Cisco networking equipment
Routing and switching protocols (e.g. OSPF, BGP)
Firewalls and security appliances (e.g. Cisco ASA, Palo Alto)
Network monitoring and management tools (e.g. SolarWinds, Wireshark)
Virtualization technologies (e.g. VMware, Hyper-V)
Load balancers (e.g. F5, Citrix NetScaler)
Wireless networking (e.g. Cisco Meraki, Aruba)
Network troubles
I applied via Recruitment Consulltant and was interviewed before Jun 2022. There were 2 interview rounds.
What people are saying about IBM
I applied via LinkedIn and was interviewed before May 2023. There was 1 interview round.
IBM interview questions for designations
I applied via Naukri.com and was interviewed in Aug 2021. There were 3 interview rounds.
There are several types of networks, including LAN, WAN, MAN, WLAN, and PAN.
Local Area Network (LAN) is a network that covers a small area, such as an office or a building.
Wide Area Network (WAN) is a network that covers a large geographical area, such as multiple cities or countries.
Metropolitan Area Network (MAN) is a network that covers a larger area than a LAN but smaller than a WAN, typically within a city.
Wireles...
The range of private IP addresses is defined by three blocks: 10.0.0.0 to 10.255.255.255, 172.16.0.0 to 172.31.255.255, and 192.168.0.0 to 192.168.255.255.
Private IP addresses are used within private networks and are not routable on the internet.
The three blocks of private IP addresses are reserved for use in local area networks (LANs) and are not unique globally.
Private IP addresses allow organizations to have multipl...
A /29 subnet has 6 usable host addresses.
A /29 subnet has a subnet mask of 255.255.255.248.
The subnet mask leaves 3 bits for host addresses.
2^3 = 8, but 2 addresses are reserved for network and broadcast.
Therefore, a /29 subnet has 6 usable host addresses.
MPLS (Multiprotocol Label Switching) is a protocol used in telecommunications networks to efficiently route data packets.
MPLS is a layer 2.5 protocol that operates between traditional layer 2 (Data Link Layer) and layer 3 (Network Layer) protocols.
It uses labels to identify and forward data packets, improving network performance and scalability.
MPLS can be used to create virtual private networks (VPNs) and prioritize t...
BGP (Border Gateway Protocol) is a routing protocol used in internet networks. It provides scalability, redundancy, and policy control.
BGP is used to exchange routing information between different autonomous systems (AS)
It allows for efficient routing decisions based on policies and network conditions
BGP states represent the different stages of establishing and maintaining BGP peering sessions
Examples of BGP states inc...
OSPF LSA types include Router LSA, Network LSA, Summary LSA, ASBR Summary LSA, AS External LSA, and NSSA External LSA.
Router LSA describes the state of the router and its interfaces within an area.
Network LSA describes the state of the network segment and its attached routers.
Summary LSA summarizes routes from one area to another.
ASBR Summary LSA summarizes routes to an Autonomous System Boundary Router (ASBR).
AS Exter...
VTP stands for VLAN Trunking Protocol. It is a Cisco proprietary protocol used to manage VLAN configurations across a network.
VTP allows for centralized management of VLANs in a network.
It enables the creation, deletion, and renaming of VLANs on a switch and automatically propagates these changes to other switches in the network.
VTP operates in three modes: server, client, and transparent.
Server mode allows VLAN config...
HSRP stands for Hot Standby Router Protocol. It is a Cisco proprietary protocol used to provide redundancy for IP networks.
HSRP is used to create a virtual IP address that can be shared by multiple routers in a network.
It allows for automatic failover in case the primary router fails.
HSRP routers elect an active router and standby routers, with the active router handling traffic while the standby routers are ready to t...
Get interview-ready with Top IBM Interview Questions
DNS is a system that translates domain names into IP addresses. DHCP is a protocol for assigning IP addresses. IP address is a unique identifier for devices. RJ-45 is a type of connector used for Ethernet cables.
DNS translates domain names (e.g., www.example.com) into IP addresses (e.g., 192.168.1.1).
DHCP is a protocol that automatically assigns IP addresses to devices on a network.
An IP address is a numerical label as...
The show interface command displays the status and statistics of a network interface.
Displays the interface type, member, module, and number
Shows the current status of the interface (up or down)
Displays the number of packets transmitted and received
Shows the number of errors and discards
Displays the speed and duplex settings of the interface
I was interviewed before Feb 2016.
Yes, I can remove all the pcs from the lab and keep them in another lab right now.
Ensure all the necessary equipment and tools are available for the move
Coordinate with the lab staff to ensure a smooth transition
Label and document each PC for easy identification and setup in the new lab
Ensure proper packaging and handling to prevent any damage during the move
Fibonacci series is a sequence of numbers where each number is the sum of the two preceding ones.
The first two numbers of the series are always 0 and 1
The next number is the sum of the previous two numbers
The series goes on infinitely: 0, 1, 1, 2, 3, 5, 8, 13, 21, 34, 55, 89, 144, ...
Pseudo code: 1. Initialize variables a=0, b=1, c=0 2. Print a and b 3. Repeat steps 4-6 until desired number of terms 4. c=a+b 5. Pr
Algorithm for matrix multiplication
Create a result matrix with dimensions of the two input matrices
Iterate through each row and column of the result matrix
For each element in the result matrix, multiply corresponding row in first matrix with corresponding column in second matrix
Add the products obtained in the previous step to get the final value for the element
I worked on a project that involved sentiment analysis of customer reviews using Naive Bayes algorithm.
The project involved collecting customer reviews from various sources.
Preprocessing the data by removing stop words, stemming, and tokenizing.
Used Naive Bayes algorithm for sentiment analysis.
The algorithm was chosen because of its simplicity and effectiveness in text classification tasks.
The accuracy of the model was
Developed a web-based project management system for a construction company.
Used PHP and MySQL for backend development
Implemented user authentication and authorization
Designed a responsive UI using Bootstrap
Integrated Google Maps API for location tracking
Enabled file uploads and downloads for project documents
EXTC and IT are not mutually exclusive fields. My knowledge in EXTC complements my skills in IT.
My knowledge in EXTC gives me a strong foundation in electronics and communication, which are essential in the IT industry.
I have also gained programming skills through my coursework and projects in EXTC.
IT is a rapidly growing field with a lot of opportunities, and I believe my skills and knowledge make me a strong candidat...
Yes, I am open to relocation for the right opportunity.
I am willing to relocate for a position that aligns with my career goals
I am excited about the prospect of exploring a new city and culture
I am flexible and adaptable to new environments
I am familiar with several programming languages.
Java
Python
C++
JavaScript
SQL
A leader inspires and motivates while a manager plans and organizes.
Leaders focus on the big picture while managers focus on details
Leaders lead by example while managers delegate tasks
Leaders inspire and motivate while managers enforce rules and policies
Leaders are visionaries while managers are implementers
Examples of leaders: Steve Jobs, Martin Luther King Jr. Examples of managers: Tim Cook, COO of Apple
Yes, I am open to relocation for the right opportunity.
I am willing to relocate for the right job opportunity
I am open to exploring new places and cultures
I understand that relocation may come with challenges, but I am prepared to face them
I am excited about the prospect of starting fresh in a new location
I'm sorry, I don't have that information.
N/A
The TCS aptitude test was challenging but fair.
The test covered a wide range of topics including math, logic, and English.
The questions were designed to test problem-solving skills and critical thinking.
Time management was crucial as there were many questions to answer in a limited time.
Overall, the test was a good indicator of one's aptitude for software engineering.
based on 4 interviews
1 Interview rounds
based on 68 reviews
Rating in categories
Application Developer
11.8k
salaries
| ₹0 L/yr - ₹0 L/yr |
Software Engineer
5.5k
salaries
| ₹0 L/yr - ₹0 L/yr |
Advisory System Analyst
5.2k
salaries
| ₹0 L/yr - ₹0 L/yr |
Senior Software Engineer
4.8k
salaries
| ₹0 L/yr - ₹0 L/yr |
Senior Systems Engineer
4.5k
salaries
| ₹0 L/yr - ₹0 L/yr |
Oracle
TCS
Cognizant
Accenture