i
Juniper Networks
Filter interviews by
I applied via Campus Placement and was interviewed in Dec 2016. There were 3 interview rounds.
Program to reverse an integer
Convert the integer to a string
Reverse the string
Convert the reversed string back to an integer
I have worked on various projects including a web application for inventory management and a mobile app for task tracking.
Developed a web application using React for inventory management, allowing users to track stock levels and generate reports.
Created a mobile app using Flutter for task tracking, enabling users to create, assign, and track tasks in real-time.
Collaborated with a team of developers to integrate APIs an...
Yes, I am interested in studying further to enhance my skills and knowledge in software engineering.
Interested in pursuing a Master's degree in Computer Science
Enrolling in online courses to learn new technologies and programming languages
Attending workshops and conferences to stay updated with industry trends
Reverse a linked list without using extra memory
Iterate through the linked list and change the next pointers to reverse the list
Use three pointers - prev, current, and next - to keep track of the reversed list
Start with prev and current pointing to null and the head of the linked list respectively
While traversing the list, update the next pointer of the current node to point to the previous node
Move prev and current po...
Data structures are fundamental concepts in software engineering that organize and store data efficiently.
Arrays: Simple and efficient for storing and accessing elements.
Linked Lists: Dynamic and flexible, efficient for insertion and deletion.
Stacks: LIFO structure, useful for managing function calls and undo operations.
Queues: FIFO structure, ideal for managing tasks and scheduling.
Trees: Hierarchical structure, used ...
The difference is that 'int arr[5]' creates an array on the stack, while 'malloc(5*sizeof(int))' allocates memory on the heap.
int arr[5] creates an array of 5 integers on the stack, which is a fixed-size memory allocation.
malloc(5*sizeof(int)) dynamically allocates memory on the heap, allowing for variable-size memory allocation.
The memory allocated with malloc must be explicitly freed with free() to avoid memory leaks
I am a passionate software engineer with a strong background in computer science and experience in developing innovative solutions.
Completed a Bachelor's degree in Computer Science from XYZ University
Proficient in programming languages such as Java, Python, and C++
Worked on various projects including a mobile app for tracking fitness goals
Familiar with Agile development methodologies and version control systems like Gi
In 5 years, I see myself as a senior software engineer leading a team of developers on innovative projects.
Continuing to enhance my technical skills and knowledge through ongoing learning and certifications
Taking on more leadership responsibilities and mentoring junior team members
Contributing to the development of cutting-edge software solutions for the company
Possibly pursuing opportunities for advancement within the...
I tend to overthink details and can be overly critical of my own work.
Overthinking details can lead to delays in completing tasks
Being overly critical can hinder progress and confidence
Yes, I am interested in studying further to enhance my skills and stay updated with the latest technologies.
I believe continuous learning is essential in the fast-paced tech industry
Further studies can help me specialize in a specific area of software engineering
Advanced degrees or certifications can open up new career opportunities
30min, DSA related question
EVPN VXLAN topology explanation
EVPN (Ethernet VPN) is a technology used to extend Layer 2 connectivity across a Layer 3 network
VXLAN (Virtual Extensible LAN) is a tunneling protocol used to overlay virtualized Layer 2 networks over Layer 3 networks
EVPN VXLAN topology combines the benefits of both technologies to provide scalable and flexible network virtualization
It allows for efficient communication between virtual ma...
Difficult online round
Arrays are a collection of strings in programming used to store multiple values under a single variable name.
Arrays are declared using square brackets []
Each element in an array is accessed by its index, starting from 0
Example: var fruits = ['apple', 'banana', 'orange']
Trees in neet code refer to the implementation of tree data structures in coding challenges on the platform NeetCode.
Trees are a common data structure used in coding challenges to represent hierarchical relationships between data.
Common tree operations include traversal (inorder, preorder, postorder), insertion, deletion, and searching.
Examples of tree-related coding challenges on NeetCode include implementing a binary...
Trees in leetcode are a common topic for coding interviews, involving various tree traversal and manipulation techniques.
Understand different tree traversal methods like inorder, preorder, and postorder.
Learn about common tree algorithms like finding the height, diameter, and lowest common ancestor.
Practice solving tree-related problems on leetcode to improve your skills.
I applied via Referral and was interviewed in May 2024. There were 3 interview rounds.
Processes are independent instances of a program, while threads are smaller units within a process sharing resources.
Processes have their own memory space, while threads share the same memory space within a process.
Processes are heavyweight, while threads are lightweight.
Processes communicate with each other through inter-process communication mechanisms, while threads can communicate directly.
Example: A web browser ru...
DNS protocol is used to translate domain names to IP addresses on the internet.
DNS stands for Domain Name System
It translates human-readable domain names (like www.google.com) to IP addresses (like 172.217.3.206)
DNS operates on a client-server model, with DNS servers hosting DNS records for different domains
DNS queries are sent by clients to DNS servers to resolve domain names to IP addresses
This round had a bit of both, technical and coding related questions.. Technical questions were from basic embedded related questions, as well as, networking protocol and layer questions.
Last round was purely coding round with multiple coding questions which includes bitwise operators and linked list questions mainly.
Juniper Networks interview questions for popular designations
Scalable system design involves creating a system that can handle increased load and growth over time.
Use microservices architecture to break down the system into smaller, independent services
Implement load balancing to distribute traffic evenly across servers
Utilize caching mechanisms to reduce the load on the database
Design for horizontal scalability by adding more servers to handle increased load
Consider using cloud
Test proper coding style, logic along with boundary checks
Get interview-ready with Top Juniper Networks Interview Questions
I applied via Job Portal
I applied via Referral and was interviewed in Mar 2024. There was 1 interview round.
Check if a binary tree is a Binary Search Tree (BST) by validating the inorder traversal.
Perform an inorder traversal of the binary tree and store the elements in a list.
Check if the list is sorted in ascending order. If yes, then the binary tree is a BST.
Ensure that there are no duplicate elements in the binary tree.
Reorder a linked list by alternating between the first and last elements
Create two pointers, one at the beginning and one at the end of the linked list
Iterate through the linked list, moving the first pointer to the next node and the second pointer to the previous node
Adjust the pointers to reorder the linked list by alternating between the first and last elements
Normal dsa Basics and aptitude.
Find elements in array that sum up to given number
Use a nested loop to iterate through each pair of elements in the array
Check if the sum of the pair equals the given number
Return the pair of elements if found, otherwise continue iterating
Binary search is a search algorithm that finds the position of a target value within a sorted array.
Divide the array into two halves and compare the target value with the middle element.
If the target value is equal to the middle element, return the index.
If the target value is less than the middle element, recursively search the left half.
If the target value is greater than the middle element, recursively search the ri
I applied via Naukri.com and was interviewed in Sep 2024. There was 1 interview round.
Easy to crack the interview DSA
I applied via LinkedIn and was interviewed in Mar 2024. There was 1 interview round.
Top trending discussions
The duration of Juniper Networks interview process can vary, but typically it takes about less than 2 weeks to complete.
based on 56 interviews
Interview experience
based on 412 reviews
Rating in categories
Bangalore / Bengaluru
5-9 Yrs
Not Disclosed
Software Engineer
284
salaries
| ₹0 L/yr - ₹0 L/yr |
Software Engineer III
248
salaries
| ₹0 L/yr - ₹0 L/yr |
Software Engineer2
170
salaries
| ₹0 L/yr - ₹0 L/yr |
Software Engineer IV
160
salaries
| ₹0 L/yr - ₹0 L/yr |
Financial Analyst
58
salaries
| ₹0 L/yr - ₹0 L/yr |
Cisco
Huawei Technologies
Nokia Networks
Ericsson