Filter interviews by
I applied via Recruitment Consulltant and was interviewed before Feb 2023. There was 1 interview round.
OSPF (Open Shortest Path First) is a routing protocol used to find the best path for data packets in IP networks.
OSPF is a link-state routing protocol
It uses Dijkstra's algorithm to calculate the shortest path
OSPF routers exchange link-state advertisements (LSAs) to build a topology database
It supports multiple areas for scalability
OSPF uses cost as a metric to determine the best path
Path vector routing protocols are a type of routing protocol that uses a vector of paths to determine the best route for data packets.
Path vector routing protocols store the entire path to a destination network along with the associated cost.
Examples of path vector routing protocols include BGP (Border Gateway Protocol) and EIGRP (Enhanced Interior Gateway Routing Protocol).
EIGRP (Enhanced Interior Gateway Routing Protocol) is a Cisco proprietary routing protocol that uses a metric based on bandwidth and delay.
EIGRP is a distance vector routing protocol developed by Cisco.
It uses a metric based on bandwidth and delay to determine the best path to a destination.
EIGRP uses a concept called 'hop count' to measure the distance between routers.
The maximum hop count in EIGRP is 224.
Access control list is a set of rules that controls which traffic is allowed or denied on a network device.
ACLs are used to filter traffic based on source and destination IP addresses, ports, and protocols
They can be configured on routers, switches, and firewalls
ACLs can be either standard or extended, with extended ACLs offering more granular control
Example: Denying all traffic from a specific IP address using an ACL
Natting stands for Network Address Translation, a process used to modify network address information in packet headers while in transit.
Natting allows multiple devices on a local network to share a single public IP address
Types of NAT include Static NAT, Dynamic NAT, and Port Address Translation (PAT)
NAT helps conserve public IP addresses and adds a layer of security by hiding internal IP addresses
Example: A home route...
Top trending discussions
I applied via Campus Placement and was interviewed before Mar 2020. There was 1 interview round.
Triggers are database objects that automatically execute in response to certain events or changes in data.
Triggers are used to enforce business rules or data integrity.
They can be used to audit changes to data.
Triggers can be set to execute before or after an event, such as an insert, update, or delete operation.
They can be defined on tables, views, or schemas.
Examples of triggers include sending an email notification ...
I applied via Naukri.com and was interviewed in Sep 2020. There were 3 interview rounds.
I applied via Campus Placement and was interviewed in Jul 2021. There was 1 interview round.
I applied via Campus Placement and was interviewed in Jan 2021. There were 3 interview rounds.
Swap two numbers with and without temporary variable
Without temporary variable: Use addition and subtraction
With temporary variable: Use a third variable to store the value of one of the numbers
Example without temporary variable: a=5, b=7; a=a+b; b=a-b; a=a-b;
Example with temporary variable: a=5, b=7; temp=a; a=b; b=temp;
I applied via Naukri.com and was interviewed before Jan 2021. There were 3 interview rounds.
I applied via Naukri.com and was interviewed in Aug 2020. There was 1 interview round.
I applied via Walk-in and was interviewed in Aug 2020. There were 4 interview rounds.
based on 1 interview
Interview experience
based on 8 reviews
Rating in categories
Network Engineer
45
salaries
| ₹2.5 L/yr - ₹3.5 L/yr |
Linux Administrator
19
salaries
| ₹2.1 L/yr - ₹3.2 L/yr |
Desktop Support Engineer
11
salaries
| ₹2 L/yr - ₹3 L/yr |
Information Technology Support Engineer
6
salaries
| ₹2.4 L/yr - ₹3 L/yr |
IT Engineer
5
salaries
| ₹2.6 L/yr - ₹3 L/yr |
TCS
Accenture
Wipro
Cognizant