Filter interviews by
I applied via Naukri.com and was interviewed in Apr 2024. There were 2 interview rounds.
I appeared for an interview before Jan 2024.
A VLAN is a virtual LAN that allows for the segmentation of network traffic to improve performance, security, and manageability.
VLANs divide a physical network into multiple logical networks, each with its own broadcast domain.
Devices within the same VLAN can communicate with each other as if they were connected to the same physical network.
VLANs can be configured to isolate sensitive data or specific types of traffic ...
HSRP stands for Hot Standby Router Protocol, used for providing high availability in a network by allowing two or more routers to work together in a group.
HSRP is a Cisco proprietary protocol used for redundancy in a network.
It allows multiple routers to work together in a group, with one router being the active router and the others as standby routers.
If the active router fails, one of the standby routers takes over a...
I applied via Referral and was interviewed before Dec 2021. There was 1 interview round.
OSPF is a link-state routing protocol that uses Dijkstra's algorithm to calculate the shortest path to a destination network.
OSPF routers exchange link-state advertisements (LSAs) to build a complete topology of the network.
Each router calculates the shortest path to every network using Dijkstra's algorithm.
OSPF uses cost as its metric, which is based on the bandwidth of the link.
OSPF supports multiple areas, which red...
BGP is a routing protocol used to exchange routing information between different autonomous systems.
BGP uses TCP as its transport protocol.
It operates on a hop-by-hop basis, meaning that it only exchanges routing information with its directly connected neighbors.
BGP uses path attributes to determine the best path for a given destination.
BGP can be used for both IPv4 and IPv6 routing.
BGP is commonly used by Internet Ser...
Copper twisted pair can be checked using a cable tester to ensure proper connectivity and identify any faults.
Use a cable tester to check for continuity and proper wiring
Check for any faults such as shorts, opens, or miswires
Verify that the cable meets the required specifications for the network
Perform a loopback test to ensure that data can be transmitted and received properly
Identifying leased line modem fault
Check if the modem is powered on and all cables are properly connected
Check the modem's status lights for any abnormalities
Perform loopback tests to check for connectivity issues
Check the modem's configuration settings
Replace the modem if all other troubleshooting steps fail
To find the reliability of a link on Cisco routers, use the show interface command.
Log in to the Cisco router using the console or Telnet/SSH.
Enter the command 'show interface' to display the status of all interfaces on the router.
Look for the 'input errors' and 'output errors' fields to determine the reliability of the link.
If there are a high number of errors, the link may be unreliable and require troubleshooting.
Ot...
Karvy Innotech interview questions for designations
Top trending discussions
Must have knowege of the work
posted on 30 Jun 2022
It is all about basic common questions like Mathematics,Reasoning,English etc
A network is more useful to users because it allows for easy communication, access to resources, and sharing of information.
Networks enable users to communicate with each other easily and quickly.
Users can access resources such as files, printers, and applications that are shared on the network.
Information can be easily shared and disseminated among users on the network.
Networks provide a platform for collaboration and...
Yes, there is a breach in the network.
Unusual network traffic patterns
Unauthorized access to sensitive data
Unexpected system behavior or performance issues
Logs indicating suspicious activities
Security alerts or notifications
VPNs are used to create secure and private connections over public networks.
VPNs encrypt data to ensure confidentiality and protect against unauthorized access.
VPNs allow remote access to private networks, enabling users to securely connect to their work network from anywhere.
VPNs can bypass geographical restrictions and censorship, providing access to restricted content.
VPNs can be used to enhance online privacy by ma...
DNS stands for Domain Name System. It is a decentralized system that translates domain names into IP addresses.
DNS is responsible for resolving domain names to their corresponding IP addresses.
It allows users to access websites and other resources using easy-to-remember domain names instead of numerical IP addresses.
DNS operates through a hierarchical structure of servers, including authoritative DNS servers, recursive...
The OSI model is a conceptual framework that standardizes the functions of a communication system into seven layers.
The OSI model stands for Open Systems Interconnection model.
It was developed by the International Organization for Standardization (ISO) in 1984.
The model is divided into seven layers: Physical, Data Link, Network, Transport, Session, Presentation, and Application.
Each layer has specific functions and int...
IPS stands for Intrusion Prevention System and IDS stands for Intrusion Detection System.
IPS is a security device that actively monitors network traffic to prevent malicious activities.
IDS is a security device that passively monitors network traffic to detect potential security breaches.
IPS can block or prevent malicious traffic from entering the network.
IDS can only detect and alert about potential security threats.
Bo...
I chose networking as a career because of my passion for technology and problem-solving.
Passion for technology and problem-solving
Interest in understanding how computer networks function
Opportunity to work with cutting-edge technologies
Ability to troubleshoot and resolve network issues
Desire to contribute to the development of secure and efficient networks
I would expect a competitive salary based on my experience, skills, and the market standards.
I would like to discuss the salary range for this position based on the responsibilities and expectations.
Considering my qualifications and the industry standards, I anticipate a fair compensation package.
I am open to negotiation and would appreciate a salary that reflects my expertise and contributions.
I believe a mutually ben...
posted on 3 Dec 2024
I applied via Naukri.com and was interviewed in Nov 2024. There was 1 interview round.
I applied via Naukri.com and was interviewed in Jan 2024. There was 1 interview round.
Packet flow in Palo Alto Firewall involves multiple stages including ingress, policy lookup, security policy enforcement, NAT, and egress.
Packet enters the firewall through an ingress interface
Firewall performs policy lookup to determine if the packet should be allowed or denied
If allowed, the packet goes through security policy enforcement which includes threat prevention, URL filtering, etc.
NAT (Network Address Trans...
OSPF (Open Shortest Path First) is a routing protocol used to determine the best path for data packets in a network.
OSPF is a link-state routing protocol
It uses Dijkstra's algorithm to calculate the shortest path
OSPF routers exchange link-state advertisements (LSAs)
It supports VLSM (Variable Length Subnet Masking)
OSPF areas are used to divide large networks into smaller segments
DR and BDR in OSPF are elected based on priority values, with the highest priority becoming the DR and the second highest becoming the BDR.
DR and BDR are elected within the OSPF network to ensure efficient communication and redundancy.
The election process is based on priority values assigned to each router, with the highest priority becoming the DR and the second highest becoming the BDR.
If two routers have the same pr...
Firewall is a network security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules.
Firewall acts as a barrier between a trusted internal network and untrusted external network.
It can be implemented in hardware, software, or a combination of both.
Firewalls can filter traffic based on IP addresses, ports, protocols, and application types.
They can prevent unauthori...
Switching involves forwarding data packets within a network, while routing involves determining the best path for data packets to travel between networks.
Switching operates at Layer 2 of the OSI model, using MAC addresses to forward data within a local network.
Routing operates at Layer 3 of the OSI model, using IP addresses to determine the best path for data to travel between networks.
Switches use MAC address tables t...
VTP is a Cisco proprietary protocol used to manage VLAN configurations across a network.
VTP allows for centralized management of VLANs by automatically propagating VLAN information to all switches in the network.
It reduces the need to manually configure VLANs on each switch, making network administration more efficient.
VTP operates in client, server, and transparent modes, with the server being the switch that can crea...
To troubleshoot a switch in ROMMON mode after a reboot, follow these steps.
Check the configuration register value to ensure it is correct
Verify the boot image and configuration file are present and accessible
Attempt to boot the switch manually using the boot command
If necessary, reload the switch with a valid IOS image from a TFTP server
based on 3 interviews
Interview experience
based on 12 reviews
Rating in categories
Desktop Support Engineer
146
salaries
| ₹1.8 L/yr - ₹3.6 L/yr |
System Administrator
75
salaries
| ₹1.8 L/yr - ₹5.6 L/yr |
Associate
70
salaries
| ₹1.6 L/yr - ₹4 L/yr |
Technical Support Engineer
57
salaries
| ₹1.7 L/yr - ₹4.5 L/yr |
Senior Associate
44
salaries
| ₹1.8 L/yr - ₹6 L/yr |
3i Infotech
Microland
Newgen Software Technologies
NSE.IT