Juniper Networks
10+ Advantmed Interview Questions and Answers
Q1. how do you swap two particular bits of an integer program?
Swapping two particular bits of an integer program.
Use bitwise operators to get the values of the two bits to be swapped
Use XOR operator to swap the bits
Shift the bits back to their original positions
Example: Swapping 2nd and 5th bits of 8 (1000) gives 32 (100000)
Example code: num ^= (1 << bit1) | (1 << bit2);
Q2. IP packet header and meaning of each field and usage of each field
IP packet header fields and their usage
Version: indicates the IP version being used (IPv4 or IPv6)
Header Length: specifies the length of the IP header
Type of Service: used to prioritize packets
Total Length: specifies the total length of the IP packet
Identification: used to identify fragments of a larger packet
Flags: used to control fragmentation
Fragment Offset: used to reassemble fragmented packets
Time to Live: specifies the maximum number of hops a packet can take
Protocol: s...read more
Q3. TCP packet header and meaning of each field and usage of each field
TCP packet header fields and their usage
TCP packet header consists of 20 bytes
Fields include source and destination ports, sequence and acknowledgement numbers, flags, window size, and checksum
Source and destination ports identify the endpoints of the connection
Sequence and acknowledgement numbers are used for reliable data transfer
Flags indicate the purpose of the packet, such as SYN, ACK, FIN, RST
Window size is used for flow control
Checksum is used for error detection
Q4. why security is important in a system?
Security is important in a system to protect against unauthorized access, data breaches, and cyber attacks.
Prevents unauthorized access to sensitive data
Protects against data breaches and cyber attacks
Ensures confidentiality, integrity, and availability of data
Compliance with regulations and standards
Maintains trust and confidence of customers and stakeholders
Q5. Automation framework you worked on. How that help overall business unit.
The automation framework I worked on improved efficiency and productivity in the business unit.
The automation framework reduced manual effort by automating repetitive tasks.
It improved the accuracy and reliability of the software development process.
The framework enabled faster testing and deployment of software updates.
It facilitated better collaboration and communication among team members.
The automation framework helped in identifying and fixing bugs or issues more efficie...read more
Q6. Telephone directory implementation program
Implement a telephone directory program using an array of strings.
Create an array of strings to store the directory
Implement functions to add, delete, and search for entries
Consider using a hash table for faster search times
Include error handling for invalid input
Q7. level printing of a tree program
Printing a tree in level order
Use a queue to store nodes in level order
Enqueue root node and print its value
Dequeue the node and enqueue its children
Repeat until queue is empty
Q8. Dictionary implementation program
A program to implement a dictionary using an array of strings.
Use an array of strings to store the words and their definitions.
Implement functions to add, delete, and search for words.
Consider using a hash table for faster search times.
Q9. What are issues caused due to asymmetric routing in a network.
Asymmetric routing in a network can lead to issues such as packet loss, out-of-order delivery, and inefficient use of network resources.
Packet loss: When packets take different paths to reach their destination, some packets may get lost or dropped along the way.
Out-of-order delivery: Asymmetric routing can cause packets to arrive at the destination out of order, leading to delays in data transmission.
Inefficient use of network resources: Asymmetric routing can result in subop...read more
Q10. Blackhole issues with firewalls in the middle and slowness issues forward traffic via mpls and return traffic via internet.
Blackhole issues with firewalls can cause slowness in forwarding traffic via MPLS and returning traffic via internet.
Check firewall configurations to ensure proper routing of traffic
Investigate blackhole issues to identify any dropped packets
Consider implementing Quality of Service (QoS) policies to prioritize MPLS traffic
Monitor network performance to detect any bottlenecks causing slowness
Q11. Code to be written on notepad not on IDE
Writing code on notepad instead of an IDE
Ensure proper indentation and formatting
Use comments to explain code
Compile and test code manually
Save frequently to avoid losing work
Q12. Asymmetric routing and issues due to asymmetric routing
Asymmetric routing occurs when data packets take different paths to reach their destination, leading to potential issues such as packet loss or out-of-order delivery.
Asymmetric routing can occur in networks with multiple paths between source and destination.
Issues with asymmetric routing include packet loss, out-of-order delivery, and potential security vulnerabilities.
Examples of solutions to mitigate asymmetric routing issues include implementing symmetric routing policies ...read more
Q13. tcp Vs udp
TCP is a reliable, connection-oriented protocol while UDP is a faster, unreliable, connectionless protocol.
TCP ensures data delivery and error checking while UDP does not.
TCP establishes a connection before data transfer while UDP does not.
TCP is used for applications that require reliable data transfer like email, file transfer, etc. while UDP is used for applications that require speed like online gaming, video streaming, etc.
Q14. Convert the linked list 1,2,3,4,5,6,Null into 1,6,2,5,3,4,Null
Reorder a linked list by alternating between the first and last elements
Create two pointers, one at the beginning and one at the end of the linked list
Iterate through the linked list, moving the first pointer to the next node and the second pointer to the previous node
Adjust the pointers to reorder the linked list by alternating between the first and last elements
Q15. In-dept BGP protocol.
BGP (Border Gateway Protocol) is a routing protocol used to exchange routing information between autonomous systems on the internet.
BGP is an exterior gateway protocol (EGP) that operates on TCP port 179.
It is used to establish and maintain routing information among routers in different autonomous systems (ASes).
BGP uses a path-vector algorithm to determine the best path for routing traffic.
It supports both IPv4 and IPv6 networks.
BGP allows routers to exchange information abo...read more
Q16. Next level account concepts in detail
Next level account concepts involve advanced financial analysis, forecasting, budgeting, and strategic planning.
Advanced financial analysis includes ratio analysis, trend analysis, and variance analysis.
Forecasting involves predicting future financial performance based on historical data and market trends.
Budgeting requires creating detailed financial plans for revenue and expenses.
Strategic planning involves aligning financial goals with overall business objectives.
Examples:...read more
Q17. Check if a binary tree is BST?
Check if a binary tree is a Binary Search Tree (BST) by validating the inorder traversal.
Perform an inorder traversal of the binary tree and store the elements in a list.
Check if the list is sorted in ascending order. If yes, then the binary tree is a BST.
Ensure that there are no duplicate elements in the binary tree.
More about working at Juniper Networks
Top HR Questions asked in Advantmed
Interview Process at Advantmed
Top Interview Questions from Similar Companies
Reviews
Interviews
Salaries
Users/Month