i
Kyndryl
Proud winner of ABECA 2024 - AmbitionBox Employee Choice Awards
Filter interviews by
I applied via Naukri.com and was interviewed in Nov 2024. There were 3 interview rounds.
A Web Application Firewall (WAF) is a security solution that monitors and filters HTTP traffic between a web application and the Internet.
Monitoring and filtering HTTP traffic to protect against common web application attacks such as SQL injection, cross-site scripting (XSS), and cross-site request forgery (CSRF)
Configuring and maintaining rules to block malicious traffic while allowing legitimate traffic to pass throu...
I have extensive experience in network security and have successfully implemented various security measures in my previous roles.
I have a strong background in network security protocols and technologies
I have experience in implementing firewalls, intrusion detection systems, and VPNs
I have successfully managed security incidents and conducted security audits
I have a track record of staying up-to-date with the latest se
Top trending discussions
I applied via Naukri.com and was interviewed in Nov 2020. There were 3 interview rounds.
I applied via Company Website and was interviewed in Jul 2024. There were 3 interview rounds.
I applied via Referral and was interviewed before May 2021. There were 3 interview rounds.
SDWAN is a software-defined approach to managing and optimizing WAN connections.
SDWAN uses software to control and manage network traffic across multiple WAN connections.
It can dynamically route traffic based on network conditions and application requirements.
SDWAN can improve network performance, reduce costs, and simplify network management.
Examples of SDWAN vendors include Cisco, VMware, and Silver Peak.
OSPF is a link-state protocol while EIGRP is a hybrid protocol.
OSPF uses Dijkstra's algorithm to calculate the shortest path while EIGRP uses a metric based on bandwidth, delay, reliability, load, and MTU.
OSPF supports VLSM and route summarization while EIGRP supports only route summarization.
OSPF is an open standard protocol while EIGRP is a Cisco proprietary protocol.
OSPF has a higher convergence time than EIGRP.
OSPF...
The cost of default route varies depending on the network infrastructure and service provider.
The cost of default route is usually included in the overall cost of the internet service provided by the ISP.
The cost may also depend on the type of connection, such as fiber optic or cable.
In some cases, the cost may be higher for businesses that require more bandwidth and faster speeds.
The cost may also vary depending on th...
OSPF neighbourship occurs when two OSPF routers establish a relationship to exchange routing information.
OSPF routers send hello packets to discover neighbours
If the hello packets are compatible, the routers become neighbours
The routers exchange database descriptors to synchronize their link-state databases
If the databases are the same, the routers become fully adjacent
Neighbourship can be affected by network topology
AS path prepend is a technique used in BGP to influence the path selection of traffic.
AS path prepend involves adding the same AS number multiple times to the AS path attribute of a BGP route advertisement.
This makes the path appear longer and less desirable, causing traffic to prefer other paths.
AS path prepend can be used to influence inbound or outbound traffic.
Inbound traffic can be influenced by adding the local A...
Overlay is a network virtualization technique that adds a layer of abstraction over the physical network, while underlay refers to the physical network infrastructure.
Overlay is used to create virtual networks on top of the physical network infrastructure.
Underlay refers to the physical network infrastructure that provides connectivity between devices.
Overlay networks are used to provide network virtualization, multi-t...
VRF stands for Virtual Routing and Forwarding. It is a technology that allows multiple instances of a routing table to coexist on the same router.
VRF provides logical separation of routing tables, allowing multiple routing domains to exist on a single physical router.
Each VRF has its own routing table and forwarding table, which allows for overlapping IP addresses to be used without conflict.
VRFs are commonly used in M...
BGP damping is a technique used to reduce the impact of unstable routes on the internet.
BGP damping helps to prevent the propagation of unstable routes by temporarily suppressing them.
It is used to reduce the impact of route flapping, which occurs when a route repeatedly alternates between available and unavailable states.
BGP damping assigns a penalty value to unstable routes, and if the penalty exceeds a certain thres...
I am a highly skilled Network Engineer with 5+ years of experience in designing, implementing, and managing complex network infrastructures.
Experienced in configuring and troubleshooting routers, switches, firewalls, and other network devices
Proficient in network security protocols such as VPNs, ACLs, and IDS/IPS
Strong knowledge of TCP/IP, DNS, DHCP, and other networking protocols
Certified in Cisco CCNA and CCNP
Excelle
I applied via Company Website and was interviewed in Dec 2020. There was 1 interview round.
Access is a port that allows a single VLAN while trunk is a port that allows multiple VLANs.
Access ports are used to connect end devices like computers, printers, etc. to the network.
Trunk ports are used to connect switches to each other and carry traffic for multiple VLANs.
Access ports are assigned to a single VLAN while trunk ports can carry traffic for multiple VLANs.
Access ports do not tag frames while trunk ports ...
LAN is a local area network that connects devices within a limited area, while WAN is a wide area network that connects devices over a large geographical area.
LAN is typically used in homes, offices, or schools, while WAN is used to connect different LANs across cities, countries, or even continents.
LAN has a higher data transfer rate and lower latency compared to WAN.
Examples of LAN technologies include Ethernet, Wi-F...
To convert access into trunk, we need to configure the switch port as a trunk port.
Configure the switch port as a trunk port using the 'switchport mode trunk' command.
Verify the trunk configuration using the 'show interfaces trunk' command.
Ensure that the VLANs allowed on the trunk are configured using the 'switchport trunk allowed vlan' command.
Ensure that the native VLAN is configured using the 'switchport trunk nati
Load balancer distributes incoming network traffic across multiple servers to improve performance and availability.
Load balancer acts as a reverse proxy server
It distributes traffic based on various algorithms such as round-robin, least connections, IP hash, etc.
It monitors server health and redirects traffic to healthy servers
It can be hardware-based or software-based
Examples of load balancers include F5, HAProxy, Ngi
Trunk is used to carry multiple VLANs between switches, while access is used to connect end devices to the network.
Trunk is used to connect switches together and carry multiple VLANs
Access is used to connect end devices like computers, printers, etc. to the network
Trunk ports are configured with VLAN tagging, while access ports are not
Examples of trunk ports are inter-switch links, while examples of access ports are po
Port-based security involves controlling access to network resources based on the physical port of the device.
Port security can be implemented by limiting the number of MAC addresses that can be learned on a port.
It can also involve configuring the port to only allow traffic from specific VLANs.
Port security can be used to prevent unauthorized access to the network by limiting the devices that can connect to it.
It can ...
HSRP (Hot Standby Router Protocol) and VRRP (Virtual Router Redundancy Protocol) are network protocols used for providing high availability in routing.
HSRP and VRRP are used to provide redundancy for routers in a network.
They allow for automatic failover in case of a router failure.
HSRP is a Cisco proprietary protocol, while VRRP is an open standard protocol.
Both protocols use a virtual IP address that clients use as t...
I applied via Newspaper Ad and was interviewed in Jul 2022. There were 2 interview rounds.
Coding test contains 2 questions
The OSI model is a conceptual framework that standardizes the functions of a telecommunication or computing system into seven layers.
The OSI model stands for Open Systems Interconnection model.
It helps in understanding how different networking protocols work together.
Each layer in the OSI model has specific functions and communicates with adjacent layers.
Examples of OSI model layers include physical layer, data link la
I applied via Naukri.com and was interviewed in Jan 2023. There were 3 interview rounds.
STP is a network protocol that prevents loops in Ethernet networks. Ping is a network utility used to test connectivity. OSI model is a framework for understanding how networks operate. IP address is a unique identifier for devices on a network. MAC address is a hardware address for network devices. ARP is a protocol used to map IP addresses to MAC addresses. RRRP is not a standard networking term.
STP stands for Spanni...
based on 2 interviews
Interview experience
System Administrator
1.3k
salaries
| ₹2.9 L/yr - ₹12.1 L/yr |
Project Manager
621
salaries
| ₹7.1 L/yr - ₹28.1 L/yr |
Infrastructure Specialist
589
salaries
| ₹5.3 L/yr - ₹23 L/yr |
Associate Technical Engineer
581
salaries
| ₹3.5 L/yr - ₹6.5 L/yr |
SME
419
salaries
| ₹7.5 L/yr - ₹25.5 L/yr |
Genpact
DXC Technology
Sutherland Global Services
Optum Global Solutions