i
Infinite Computer Solutions
Filter interviews by
I applied via Naukri.com and was interviewed in Dec 2023. There was 1 interview round.
STP stands for Spanning Tree Protocol.
STP is a network protocol used to prevent loops in Ethernet networks.
It works by creating a loop-free logical topology by blocking redundant paths.
STP elects a root bridge and calculates the shortest path to it for each network segment.
It uses Bridge Protocol Data Units (BPDU) to exchange information between switches.
STP is defined by the IEEE 802.1D standard.
The main function of the Root bridge switch is to control the flow of data traffic in a spanning tree network.
The Root bridge switch is elected as the central point of the spanning tree network.
It determines the shortest path for data traffic to reach all other switches in the network.
The Root bridge switch sends Bridge Protocol Data Units (BPDUs) to other switches to exchange information and maintain the spanning tree...
The IP address works at Layer 3 of the OSI model. Assigning an IP address on a Layer 2 switch is not possible.
IP addresses are used for network layer communication (Layer 3)
Layer 2 switches operate at the data link layer (Layer 2)
Layer 2 switches use MAC addresses for communication within a local network
IP addresses are assigned to devices connected to Layer 2 switches, not to the switch itself
DNS uses port number 53. It works by translating domain names into IP addresses and vice versa.
DNS stands for Domain Name System.
Port number 53 is used for both TCP and UDP protocols.
DNS works by resolving domain names to their corresponding IP addresses.
It uses a hierarchical distributed database system.
DNS queries and responses are sent over port 53.
DNS operates through a client-server model.
Example: When you type a ...
DHCP DORA process is the sequence of steps followed by a client to obtain an IP address from a DHCP server.
DORA stands for Discover, Offer, Request, and Acknowledge.
Discover: Client broadcasts a DHCP Discover message to find available DHCP servers.
Offer: DHCP servers respond with DHCP Offer messages containing IP address lease information.
Request: Client selects one DHCP Offer and sends a DHCP Request message to reques...
2G, 3G, and 5G are different generations of mobile network technology.
2G refers to second-generation mobile network technology, which primarily provided voice and basic data services.
3G refers to third-generation mobile network technology, which introduced faster data speeds and enabled mobile internet access.
5G refers to fifth-generation mobile network technology, which offers significantly faster data speeds, lower l...
The HTTPS port number is 443.
HTTPS uses port 443 for secure communication.
It is the default port for secure HTTP connections.
HTTPS encrypts data using SSL/TLS protocols.
Examples: https://www.example.com:443 or https://192.168.0.1:443
The HTTP port number is 80.
The default port number for HTTP is 80.
It is used for communication between web servers and clients.
Other common port numbers for HTTP include 8080 and 8888.
SSH port number is 22. SSH service is used for secure remote access and secure file transfer.
SSH port number is 22 by default
SSH stands for Secure Shell
SSH service provides secure remote access to servers
It encrypts the data transmitted over the network
SSH service is used for secure file transfer (SFTP) and remote command execution
It provides authentication and encryption for secure communication
The OSI model is a conceptual framework that standardizes the functions of a communication system into seven layers.
Layer 1 (Physical): Deals with the physical transmission of data over the network.
Layer 2 (Data Link): Provides error-free transmission of data frames between nodes on the same network.
Layer 3 (Network): Handles routing and logical addressing to enable data transfer between different networks.
Layer 4 (Tra...
The TCP/IP model is a network protocol suite that defines how data is transmitted over the internet.
The TCP/IP model consists of four layers: Network Interface, Internet, Transport, and Application.
It is used in the current scenario because it provides a standardized framework for communication between devices on a network.
The TCP/IP model allows for reliable and efficient data transmission, ensuring that data packets ...
DTP (Dynamic Trunking Protocol) is a Cisco proprietary protocol used to negotiate trunking between switches.
DTP is used to automatically negotiate trunking on a link between Cisco switches.
It allows switches to dynamically form trunk links without manual configuration.
DTP operates in three modes: dynamic auto, dynamic desirable, and trunk.
Dynamic auto mode waits for the other end to initiate trunking.
Dynamic desirable ...
I have worked on various router devices and vendors.
Cisco routers (e.g. Cisco 2900 series)
Juniper routers (e.g. Juniper MX series)
Huawei routers (e.g. Huawei NE series)
MikroTik routers (e.g. MikroTik RB series)
Top trending discussions
posted on 7 Jun 2017
I was interviewed in Apr 2017.
posted on 21 Aug 2024
STP loop prevention is achieved by blocking redundant paths in a network to prevent loops.
STP (Spanning Tree Protocol) identifies redundant paths in a network
STP selects a root bridge to be the central point of the network
STP blocks certain ports to prevent loops while still allowing for redundancy
If a link fails, STP will unblock a previously blocked port to maintain connectivity
I applied via Naukri.com and was interviewed in Aug 2021. There were 5 interview rounds.
DNS stands for Domain Name System. It is a system that translates domain names into IP addresses.
DNS is like a phonebook for the internet
It helps to locate websites by translating domain names into IP addresses
DNS servers store information about domain names and their corresponding IP addresses
DNS queries are sent by web browsers to DNS servers to resolve domain names
DNS can also be used for other purposes such as emai
Forwarding, delegation, and stub zones are all methods of DNS resolution.
Forwarding involves sending DNS queries to another DNS server for resolution.
Delegation involves assigning responsibility for a subdomain to another DNS server.
Stub zones are a copy of a zone's NS records used to reduce DNS query traffic.
All three methods can improve DNS performance and reliability.
Forwarding and delegation can be configured at th...
The DORA process is used for IP address assignment in a network. It consists of four steps: Discover, Offer, Request, and Acknowledge.
Discover: The client sends a broadcast message to find available DHCP servers.
Offer: DHCP servers respond with an IP address lease offer.
Request: The client selects an IP address and sends a request to the DHCP server.
Acknowledge: The DHCP server acknowledges the request and assigns the
I applied via Newspaper Ad and was interviewed in Jul 2022. There were 2 interview rounds.
Coding test contains 2 questions
posted on 30 Oct 2021
I applied via Campus Placement
Simple basic question of dsa were asked
The OSI model has 7 layers that define how data is transmitted over a network.
Layer 1: Physical layer - deals with the physical aspects of transmitting data
Layer 2: Data link layer - responsible for error-free transfer of data between nodes
Layer 3: Network layer - handles routing of data between different networks
Layer 4: Transport layer - ensures reliable delivery of data between applications
Layer 5: Session layer - e...
I applied via Naukri.com and was interviewed in Jun 2021. There were 4 interview rounds.
L3 switch is a switch with routing capabilities while a router is a dedicated device for routing.
L3 switch operates at layer 2 and layer 3 of the OSI model while a router operates only at layer 3.
L3 switch can perform routing functions like a router but also has the ability to switch frames between ports like a switch.
Routers are typically used to connect different networks while L3 switches are used to segment a netwo...
VLAN leakage is when traffic from one VLAN is mistakenly sent to another VLAN.
VLAN tagging should be properly configured to prevent leakage
Access control lists (ACLs) can be used to restrict traffic between VLANs
VLAN pruning can be used to limit the number of VLANs that are propagated throughout the network
Examples of VLAN leakage include a misconfigured switch port or a compromised network device
TCP 3 way handshake is a process of establishing a connection between two devices over a network.
The client sends a SYN packet to the server
The server responds with a SYN-ACK packet
The client sends an ACK packet to the server to confirm the connection
This process is used to ensure reliable communication between devices
posted on 9 Nov 2022
I applied via LinkedIn and was interviewed in Oct 2022. There were 2 interview rounds.
Questions on router routing table, IPsec VPN types, application slowness troubleshooting, and F5 LTM.
Router installs routes in routing table using routing protocols such as OSPF, BGP, etc.
IPsec VPN types include site-to-site, remote access, and extranet VPNs.
Application slowness troubleshooting involves checking network latency, server performance, and application code.
F5 LTM questions may include load balancing algori
To troubleshoot IPsec vpns, check configuration, logs, and network connectivity.
Check if the configuration is correct and matches on both ends
Check the logs for any error messages or warnings
Verify network connectivity between the two endpoints
Check for any firewall or NAT issues
Ensure that the correct encryption and authentication algorithms are being used
Check for any MTU issues
Verify that the VPN tunnel is up and ru
SSL persistence is a feature in F5 that allows a client to maintain a secure connection with the same server during a session.
SSL persistence ensures that a client's SSL session is maintained with the same server throughout the session.
This feature is useful in scenarios where multiple servers are used to handle client requests.
SSL persistence can be configured based on SSL session ID, SSL session ticket, or SSL sessio...
I applied via Naukri.com and was interviewed in Jun 2021. There were 5 interview rounds.
Questions related to TCP/IP layers, subnet mask, VLAN, ARP, port number, IP and MAC addresses.
Transport layer is needed for reliable communication and error correction.
Subnet mask is used to identify the network and host portions of an IP address.
VLAN is needed for network segmentation and security.
Switches and routers send packets or frames based on destination IP address.
Types of ARP include ARP request and ARP reply...
Some of the top questions asked at the Infinite Computer Solutions Network Support Engineer interview -
based on 1 interview
Interview experience
Software Engineer
1.4k
salaries
| ₹3 L/yr - ₹12.5 L/yr |
Senior Software Engineer
1.3k
salaries
| ₹6.5 L/yr - ₹22 L/yr |
Technical Lead
813
salaries
| ₹10 L/yr - ₹34.3 L/yr |
Associate Software Engineer
726
salaries
| ₹2.5 L/yr - ₹8 L/yr |
Softwaretest Engineer
613
salaries
| ₹3 L/yr - ₹11 L/yr |
TCS
Wipro
HCLTech
Tech Mahindra