i
Juniper Networks
Filter interviews by
I applied via Approached by Company and was interviewed before Feb 2021. There were 5 interview rounds.
4 questions in one and a half hour
Writing code on notepad instead of an IDE
Ensure proper indentation and formatting
Use comments to explain code
Compile and test code manually
Save frequently to avoid losing work
I was interviewed in Aug 2021.
IP packet header fields and their usage
Version: indicates the IP version being used (IPv4 or IPv6)
Header Length: specifies the length of the IP header
Type of Service: used to prioritize packets
Total Length: specifies the total length of the IP packet
Identification: used to identify fragments of a larger packet
Flags: used to control fragmentation
Fragment Offset: used to reassemble fragmented packets
Time to Live: specifi...
TCP packet header fields and their usage
TCP packet header consists of 20 bytes
Fields include source and destination ports, sequence and acknowledgement numbers, flags, window size, and checksum
Source and destination ports identify the endpoints of the connection
Sequence and acknowledgement numbers are used for reliable data transfer
Flags indicate the purpose of the packet, such as SYN, ACK, FIN, RST
Window size is used ...
A program to implement a dictionary using an array of strings.
Use an array of strings to store the words and their definitions.
Implement functions to add, delete, and search for words.
Consider using a hash table for faster search times.
Implement a telephone directory program using an array of strings.
Create an array of strings to store the directory
Implement functions to add, delete, and search for entries
Consider using a hash table for faster search times
Include error handling for invalid input
TCP is a reliable, connection-oriented protocol while UDP is a faster, unreliable, connectionless protocol.
TCP ensures data delivery and error checking while UDP does not.
TCP establishes a connection before data transfer while UDP does not.
TCP is used for applications that require reliable data transfer like email, file transfer, etc. while UDP is used for applications that require speed like online gaming, video strea
Security is important in a system to protect against unauthorized access, data breaches, and cyber attacks.
Prevents unauthorized access to sensitive data
Protects against data breaches and cyber attacks
Ensures confidentiality, integrity, and availability of data
Compliance with regulations and standards
Maintains trust and confidence of customers and stakeholders
Printing a tree in level order
Use a queue to store nodes in level order
Enqueue root node and print its value
Dequeue the node and enqueue its children
Repeat until queue is empty
Swapping two particular bits of an integer program.
Use bitwise operators to get the values of the two bits to be swapped
Use XOR operator to swap the bits
Shift the bits back to their original positions
Example: Swapping 2nd and 5th bits of 8 (1000) gives 32 (100000)
Example code: num ^= (1 << bit1) | (1 << bit2);
I applied via Naukri.com and was interviewed in Oct 2021. There was 1 interview round.
Juniper Networks interview questions for popular designations
I applied via Naukri.com and was interviewed before Feb 2022. There were 2 interview rounds.
Get interview-ready with Top Juniper Networks Interview Questions
I applied via Recruitment Consultant and was interviewed in Jul 2021. There were 3 interview rounds.
I applied via Referral and was interviewed in May 2021. There was 1 interview round.
I applied via Referral and was interviewed in Feb 2021. There was 1 interview round.
Programming in C on linked list
Understand the concept of linked list and its implementation in C
Allocate memory dynamically using malloc()
Use pointers to traverse and manipulate the linked list
Handle edge cases such as empty list and deleting nodes
Avoid memory leaks by freeing allocated memory
Memory layout in C refers to how variables are stored in memory.
Variables are allocated memory based on their data type
Memory is divided into stack and heap
Pointers store memory addresses
Structs store data in contiguous memory locations
I applied via Naukri.com and was interviewed in Mar 2021. There were 3 interview rounds.
Top trending discussions
The duration of Juniper Networks interview process can vary, but typically it takes about less than 2 weeks to complete.
based on 56 interviews
Interview experience
based on 410 reviews
Rating in categories
Software Engineer
285
salaries
| ₹12.4 L/yr - ₹42.7 L/yr |
Software Engineer III
245
salaries
| ₹16 L/yr - ₹33 L/yr |
Software Engineer2
169
salaries
| ₹10 L/yr - ₹23 L/yr |
Software Engineer IV
161
salaries
| ₹20 L/yr - ₹56 L/yr |
Financial Analyst
58
salaries
| ₹3.5 L/yr - ₹13.4 L/yr |
Cisco
Huawei Technologies
Nokia Networks
Ericsson