Add office photos
Employer?
Claim Account for FREE

Kyndal India

3.8
based on 260 Reviews
Filter interviews by

10+ BACentric Interview Questions and Answers

Updated 5 Feb 2024

Q1. What is the difference between nexus and catalyst series

Ans.

Nexus series is designed for data center networking while Catalyst series is designed for enterprise networking.

  • Nexus series is optimized for high-performance data center environments.

  • Catalyst series is more commonly used in enterprise networks.

  • Nexus switches have features like Virtual Device Contexts (VDCs) and FabricPath.

  • Catalyst switches have features like Power over Ethernet (PoE) and StackWise.

  • Nexus switches are typically more expensive than Catalyst switches.

Add your answer

Q2. How many links we can bundle in port channel

Ans.

The number of links that can be bundled in a port channel depends on the specific network equipment and configuration.

  • The maximum number of links that can be bundled in a port channel varies depending on the network device and software.

  • Commonly, network devices support bundling anywhere from 2 to 8 links in a port channel.

  • Some high-end switches or routers may support even more links in a port channel, such as 16 or 32.

  • It is important to consult the specific documentation of t...read more

Add your answer

Q3. What are the tools you have used for monitoring

Ans.

I have used tools like SolarWinds, Nagios, and Wireshark for monitoring network performance and security.

  • SolarWinds

  • Nagios

  • Wireshark

Add your answer

Q4. Can you explain about change management

Ans.

Change management is the process of planning, implementing, and monitoring changes in a structured way to minimize negative impacts and ensure successful outcomes.

  • Change management involves identifying the need for change, assessing the impact, planning the change, implementing it, and monitoring its effects.

  • It is important to communicate with stakeholders throughout the process to ensure buy-in and minimize resistance.

  • Change management often involves creating a detailed chan...read more

Add your answer
Discover BACentric interview dos and don'ts from real experiences

Q5. How ISE authenticate end device

Ans.

ISE authenticates end devices through various methods such as 802.1X, MAC Authentication Bypass (MAB), and Web Authentication.

  • ISE uses 802.1X for authenticating end devices based on their credentials.

  • MAC Authentication Bypass (MAB) allows devices to be authenticated based on their MAC address.

  • Web Authentication is used for guest or non-802.1X devices to authenticate through a web portal.

  • ISE can also integrate with other identity stores such as Active Directory for authenticat...read more

Add your answer

Q6. How to bypass ise authentication

Ans.

Bypassing ISE authentication involves exploiting vulnerabilities or using unauthorized methods to gain access.

  • Exploiting vulnerabilities in the ISE system

  • Using unauthorized credentials or access methods

  • Spoofing MAC addresses or IP addresses

  • Intercepting and modifying network traffic

  • Using brute force attacks to guess passwords

Add your answer
Are these interview questions helpful?

Q7. What is VPC ?

Ans.

VPC stands for Virtual Private Cloud, a virtual network dedicated to a user's account within a cloud environment.

  • VPC allows users to create isolated sections of the cloud where they can launch resources like virtual machines, databases, and storage.

  • Users can define their own IP address range, subnets, route tables, and network gateways within a VPC.

  • VPC provides security by allowing users to control inbound and outbound traffic to resources within the virtual network.

  • Examples ...read more

Add your answer

Q8. What is hsrp glbp

Ans.

HSRP (Hot Standby Router Protocol) and GLBP (Gateway Load Balancing Protocol) are protocols used in networking for providing redundancy and load balancing.

  • HSRP is a Cisco proprietary protocol used for providing high availability by allowing two or more routers to work together in a group, with one router acting as the active router and the others as standby routers.

  • GLBP is also a Cisco proprietary protocol that allows multiple routers to share the load of routing traffic, pro...read more

View 1 answer
Share interview questions and help millions of jobseekers 🌟

Q9. Process to create vpc in nexus

Ans.

Creating a VPC in Nexus involves configuring VLANs, VRFs, and interfaces.

  • Configure VLANs for the VPC

  • Configure VRFs for the VPC

  • Configure interfaces for the VPC

  • Verify the VPC configuration

Add your answer

Q10. What is stacking

Ans.

Stacking is a networking technique where multiple switches are interconnected to increase bandwidth and redundancy.

  • Stacking involves connecting multiple switches together to operate as a single unit

  • It allows for easier management and configuration of multiple switches

  • Stacking can improve network performance by increasing bandwidth and providing redundancy

  • Examples of stacking protocols include Cisco StackWise, Juniper Virtual Chassis, and HP Intelligent Resilient Framework (IR...read more

Add your answer

Q11. What is flex connect

Ans.

FlexConnect is a feature in Cisco wireless LAN controllers that allows access points to locally switch traffic instead of tunneling it back to the controller.

  • FlexConnect allows access points to function even if they lose connection to the controller.

  • It is useful for branch offices or remote locations where a direct connection to the controller may not be feasible.

  • FlexConnect can improve network performance by reducing latency and bandwidth usage.

  • Examples of use cases include ...read more

Add your answer

Q12. Type of ise authentication

Ans.

ISE authentication refers to the Identity Services Engine authentication method used for network access control.

  • ISE authentication is a method used for network access control

  • It provides secure access to network resources based on user identity

  • Examples include 802.1X authentication, MAC Authentication Bypass (MAB), and web authentication

Add your answer

Q13. What is server. What is console

Ans.

A server is a computer program or device that provides functionality to other programs or devices. A console is a physical device used to access a server or computer system.

  • A server is a program or device that provides services to other programs or devices

  • A server can be a physical or virtual machine

  • A console is a physical device used to access a server or computer system

  • A console can be a keyboard and monitor connected to a server or a remote access tool

Add your answer
Contribute & help others!
Write a review
Share interview
Contribute salary
Add office photos
Interview Tips & Stories
Ace your next interview with expert advice and inspiring stories

Top Interview Questions from Similar Companies

4.0
 • 559 Interview Questions
4.4
 • 426 Interview Questions
3.8
 • 386 Interview Questions
3.5
 • 370 Interview Questions
4.2
 • 345 Interview Questions
4.0
 • 202 Interview Questions
View all
Top Kyndal India Interview Questions And Answers
Share an Interview
Stay ahead in your career. Get AmbitionBox app
qr-code
Helping over 1 Crore job seekers every month in choosing their right fit company
70 Lakh+

Reviews

5 Lakh+

Interviews

4 Crore+

Salaries

1 Cr+

Users/Month

Contribute to help millions
Get AmbitionBox app

Made with ❤️ in India. Trademarks belong to their respective owners. All rights reserved © 2024 Info Edge (India) Ltd.

Follow us
  • Youtube
  • Instagram
  • LinkedIn
  • Facebook
  • Twitter