Filter interviews by
I applied via Naukri.com and was interviewed in Jan 2021. There were 3 interview rounds.
I applied via Naukri.com and was interviewed in Feb 2024. There was 1 interview round.
SD-WAN technology is a software-defined approach to managing wide area networks, allowing for centralized control and automation.
SD-WAN uses software to dynamically route traffic across the network based on real-time conditions.
It can prioritize critical applications and optimize performance by utilizing multiple connection types.
SD-WAN simplifies network management and reduces costs by replacing expensive MPLS connect...
I was interviewed before Apr 2021.
Sairam sanapathi kanchaduvalasa village makkuva mandal vizayanagaram distick andharapardeesh state iam graduation BSC chemistery iam poor but ima job intersted
I applied via Naukri.com and was interviewed in Oct 2020. There were 3 interview rounds.
F5 load balances traffic by distributing it across multiple servers to optimize performance and ensure high availability.
F5 uses a variety of load balancing algorithms such as round robin, least connections, and weighted round robin.
It distributes incoming traffic across multiple servers based on the selected algorithm.
F5 continuously monitors server health and availability to make intelligent load balancing decisions.
...
An iRule can be written to redirect a URI to a different location.
Use the HTTP::redirect command to specify the new URI
Use the HTTP_REQUEST event to trigger the iRule
Example: when HTTP_REQUEST {HTTP::redirect "http://newlocation.com"}
Virtual servers are software-based while nodes are physical devices.
Virtual servers are created by partitioning a physical server into multiple virtual machines.
Nodes are individual physical devices that are connected to a network.
Virtual servers can be easily created, cloned, and deleted while nodes require physical installation and configuration.
Virtual servers can be easily moved between physical servers while nodes...
Traffic inspection of checkpoint firewall involves analyzing network traffic for security purposes.
Checkpoint firewall inspects traffic at the application layer to identify and block malicious traffic
It uses various security mechanisms such as stateful inspection, deep packet inspection, and intrusion prevention system
Traffic can be inspected based on source/destination IP, port, protocol, and content
Logs are generated...
Technical Recruiter
4
salaries
| ₹1.7 L/yr - ₹5.9 L/yr |
Executive Accountant
4
salaries
| ₹5.2 L/yr - ₹5.8 L/yr |
Network Administrator
3
salaries
| ₹2.5 L/yr - ₹3.6 L/yr |
Senior System Administrator
3
salaries
| ₹5.1 L/yr - ₹10.3 L/yr |
Senior IT Recruiter
3
salaries
| ₹4.5 L/yr - ₹6.5 L/yr |
TCS
Infosys
Wipro
HCLTech