Filter interviews by
I applied via Recruitment Consulltant and was interviewed before Feb 2023. There was 1 interview round.
OSPF (Open Shortest Path First) is a routing protocol used to find the best path for data packets in IP networks.
OSPF is a link-state routing protocol
It uses Dijkstra's algorithm to calculate the shortest path
OSPF routers exchange link-state advertisements (LSAs) to build a topology database
It supports multiple areas for scalability
OSPF uses cost as a metric to determine the best path
Path vector routing protocols are a type of routing protocol that uses a vector of paths to determine the best route for data packets.
Path vector routing protocols store the entire path to a destination network along with the associated cost.
Examples of path vector routing protocols include BGP (Border Gateway Protocol) and EIGRP (Enhanced Interior Gateway Routing Protocol).
EIGRP (Enhanced Interior Gateway Routing Protocol) is a Cisco proprietary routing protocol that uses a metric based on bandwidth and delay.
EIGRP is a distance vector routing protocol developed by Cisco.
It uses a metric based on bandwidth and delay to determine the best path to a destination.
EIGRP uses a concept called 'hop count' to measure the distance between routers.
The maximum hop count in EIGRP is 224.
Access control list is a set of rules that controls which traffic is allowed or denied on a network device.
ACLs are used to filter traffic based on source and destination IP addresses, ports, and protocols
They can be configured on routers, switches, and firewalls
ACLs can be either standard or extended, with extended ACLs offering more granular control
Example: Denying all traffic from a specific IP address using an ACL
Natting stands for Network Address Translation, a process used to modify network address information in packet headers while in transit.
Natting allows multiple devices on a local network to share a single public IP address
Types of NAT include Static NAT, Dynamic NAT, and Port Address Translation (PAT)
NAT helps conserve public IP addresses and adds a layer of security by hiding internal IP addresses
Example: A home route...
Top trending discussions
I applied via Campus Placement and was interviewed before Feb 2020. There were 4 interview rounds.
I applied via Campus Placement and was interviewed before Jul 2020. There were 4 interview rounds.
The project involved designing and implementing a new network infrastructure for a large corporation.
Conducted a thorough analysis of the existing network infrastructure
Designed a new network architecture that met the company's needs
Implemented the new network infrastructure with minimal disruption to business operations
Tested and optimized the new network to ensure optimal performance
Provided ongoing support and maint
I applied via Campus Placement and was interviewed before Nov 2020. There was 1 interview round.
I applied via Campus Placement and was interviewed in Mar 2020. There was 1 interview round.
To get the second to last element from a SQL table, use the OFFSET-FETCH clause.
Use the ORDER BY clause to sort the table in descending order.
Use the OFFSET-FETCH clause to skip the last row and fetch the second to last row.
Example: SELECT column_name FROM table_name ORDER BY column_name DESC OFFSET 1 ROWS FETCH NEXT 1 ROWS ONLY;
I applied via Campus Placement and was interviewed before Sep 2019. There were 3 interview rounds.
I applied via Campus Placement and was interviewed before Nov 2020. There was 1 interview round.
I applied via Campus Placement and was interviewed before May 2020. There were 3 interview rounds.
I applied via Campus Placement and was interviewed before Mar 2020. There were 3 interview rounds.
I applied via Campus Placement and was interviewed before Mar 2020. There was 1 interview round.
Triggers are database objects that automatically execute in response to certain events or changes in data.
Triggers are used to enforce business rules or data integrity.
They can be used to audit changes to data.
Triggers can be set to execute before or after an event, such as an insert, update, or delete operation.
They can be defined on tables, views, or schemas.
Examples of triggers include sending an email notification ...
based on 1 interview
Interview experience
based on 8 reviews
Rating in categories
Network Engineer
44
salaries
| ₹2.5 L/yr - ₹3.5 L/yr |
Linux Administrator
19
salaries
| ₹2.1 L/yr - ₹3.2 L/yr |
Desktop Support Engineer
11
salaries
| ₹2 L/yr - ₹3 L/yr |
Information Technology Support Engineer
6
salaries
| ₹2.4 L/yr - ₹3 L/yr |
IT Engineer
5
salaries
| ₹2.6 L/yr - ₹3 L/yr |
TCS
Accenture
Wipro
Cognizant