Filter interviews by
I applied via Naukri.com and was interviewed in Dec 2020. There was 1 interview round.
The OSI model is a conceptual framework used to describe the communication functions of a network.
The model has 7 layers, each with a specific function.
The layers are: Physical, Data Link, Network, Transport, Session, Presentation, and Application.
Each layer communicates with the layer above and below it.
The model helps ensure interoperability between different network devices and software.
Example: When you visit a web...
SSL offloading is a process of removing SSL encryption from incoming traffic and decrypting it before sending it to the backend servers.
SSL offloading is performed by a load balancer like F5 to reduce the processing load on backend servers.
It improves server performance and reduces latency by offloading SSL processing to a dedicated hardware or software.
F5 SSL offloading can be configured to support multiple SSL certif...
SNAT stands for Secure Network Address Translation and is a feature in F5 that allows for the translation of IP addresses.
SNAT is used to translate the source IP address of outgoing traffic to a different IP address.
This can be useful in scenarios where multiple devices are sharing a single public IP address.
SNAT can also be used to improve security by hiding the actual IP address of a device from the public internet.
F...
STP, HSRP, and FRRP are network protocols used for redundancy and failover. HSRP and VRRP are similar but HSRP is preferred.
STP (Spanning Tree Protocol) prevents loops in a network by disabling redundant links
HSRP (Hot Standby Router Protocol) and VRRP (Virtual Router Redundancy Protocol) provide redundancy by allowing multiple routers to share a virtual IP address
FRRP (Fast Router Redundancy Protocol) is a Cisco propr...
The xlate table in ASA is used to keep track of translations between internal and external IP addresses. It is important for IPsec tunnel troubleshooting.
The xlate table is used to map internal IP addresses to external IP addresses
It is important for troubleshooting IPsec tunnels because it allows you to see if traffic is being translated correctly
You can view the xlate table using the 'show xlate' command in the ASA C...
Top trending discussions
VLANs can be configured using switch management interfaces or command line interfaces.
Identify the VLANs needed and assign them a VLAN ID
Configure the switch ports to be members of the appropriate VLAN
Configure the VLAN interfaces on the switch
Configure VLAN trunking protocol (VTP) if necessary
Verify the VLAN configuration using show commands
ACL can be configured by defining rules to permit or deny traffic based on source/destination IP, port, and protocol.
Identify the traffic that needs to be controlled
Define the rules for permitting or denying traffic
Apply the ACL to the appropriate interface or VLAN
Regularly review and update the ACL to ensure it meets the changing needs of the network
posted on 26 Sep 2019
I was interviewed in Sep 2019.
A network is a group of interconnected devices that can communicate and share resources.
Networks can be wired or wireless
Devices on a network can include computers, printers, servers, and routers
Networks can be local (LAN) or wide area (WAN)
Networks can be used for sharing files, printers, and internet access
Networks can be secured with firewalls, passwords, and encryption
Networking is the practice of connecting devices and systems to share resources and communicate with each other.
Networking involves the use of hardware and software to create and manage connections between devices and systems.
It enables the sharing of resources such as files, printers, and internet access.
Networking protocols such as TCP/IP and DNS are used to facilitate communication between devices.
Examples of networ...
A protocol is a set of rules that governs the communication between devices on a network.
Protocols define the format, timing, sequencing, and error checking of messages exchanged between devices.
Examples of protocols include TCP/IP, HTTP, FTP, SMTP, and DNS.
Protocols can be implemented in hardware, software, or a combination of both.
Different protocols are used for different purposes, such as data transfer, email, web
I applied via Naukri.com and was interviewed in Dec 2021. There was 1 interview round.
VLANs can be configured using switch management interfaces or command line interfaces.
Identify the VLANs needed and assign them a VLAN ID
Configure the switch ports to be members of the appropriate VLAN
Configure the VLAN interfaces on the switch
Configure VLAN trunking protocol (VTP) if necessary
Verify the VLAN configuration using show commands
ACL can be configured by defining rules to permit or deny traffic based on source/destination IP, port, and protocol.
Identify the traffic that needs to be controlled
Define the rules for permitting or denying traffic
Apply the ACL to the appropriate interface or VLAN
Regularly review and update the ACL to ensure it meets the changing needs of the network
posted on 26 Sep 2019
I was interviewed in Sep 2019.
A network is a group of interconnected devices that can communicate and share resources.
Networks can be wired or wireless
Devices on a network can include computers, printers, servers, and routers
Networks can be local (LAN) or wide area (WAN)
Networks can be used for sharing files, printers, and internet access
Networks can be secured with firewalls, passwords, and encryption
Networking is the practice of connecting devices and systems to share resources and communicate with each other.
Networking involves the use of hardware and software to create and manage connections between devices and systems.
It enables the sharing of resources such as files, printers, and internet access.
Networking protocols such as TCP/IP and DNS are used to facilitate communication between devices.
Examples of networ...
A protocol is a set of rules that governs the communication between devices on a network.
Protocols define the format, timing, sequencing, and error checking of messages exchanged between devices.
Examples of protocols include TCP/IP, HTTP, FTP, SMTP, and DNS.
Protocols can be implemented in hardware, software, or a combination of both.
Different protocols are used for different purposes, such as data transfer, email, web
Senior Software Engineer
1.1k
salaries
| ₹6.8 L/yr - ₹23.8 L/yr |
Software Engineer
848
salaries
| ₹3 L/yr - ₹13 L/yr |
Technical Lead
591
salaries
| ₹10 L/yr - ₹37.9 L/yr |
Associate
287
salaries
| ₹2.7 L/yr - ₹6.1 L/yr |
Senior Technical Lead
268
salaries
| ₹14.1 L/yr - ₹41 L/yr |
TCS
Infosys
Wipro
HCLTech