i
Kyndryl
Proud winner of ABECA 2024 - AmbitionBox Employee Choice Awards
Filter interviews by
I applied via Naukri.com and was interviewed in Nov 2024. There were 3 interview rounds.
A Web Application Firewall (WAF) is a security solution that monitors and filters HTTP traffic between a web application and the Internet.
Monitoring and filtering HTTP traffic to protect against common web application attacks such as SQL injection, cross-site scripting (XSS), and cross-site request forgery (CSRF)
Configuring and maintaining rules to block malicious traffic while allowing legitimate traffic to pass throu...
I have extensive experience in network security and have successfully implemented various security measures in my previous roles.
I have a strong background in network security protocols and technologies
I have experience in implementing firewalls, intrusion detection systems, and VPNs
I have successfully managed security incidents and conducted security audits
I have a track record of staying up-to-date with the latest se
What people are saying about Kyndryl
I applied via Approached by Company and was interviewed before Mar 2021. There were 2 interview rounds.
LSA Types are used in OSPF to describe the type of information contained in the LSA.
Type 1: Router LSA - contains information about the router and its directly connected networks
Type 2: Network LSA - describes the networks connected to a multi-access network
Type 3: Summary LSA - contains information about networks outside of the area
Type 4: ASBR Summary LSA - describes the ASBR router to the rest of the OSPF domain
Type...
BGP attributes are used to determine the best path for routing traffic between autonomous systems.
BGP attributes include: AS Path, Next Hop, Local Preference, Weight, Multi-Exit Discriminator (MED), Origin, and Community
AS Path is a list of autonomous systems that the route has passed through
Next Hop is the IP address of the next router in the path
Local Preference is used to indicate the preferred path for outbound tra...
I applied via Company Website and was interviewed in Dec 2020. There was 1 interview round.
Access is a port that allows a single VLAN while trunk is a port that allows multiple VLANs.
Access ports are used to connect end devices like computers, printers, etc. to the network.
Trunk ports are used to connect switches to each other and carry traffic for multiple VLANs.
Access ports are assigned to a single VLAN while trunk ports can carry traffic for multiple VLANs.
Access ports do not tag frames while trunk ports ...
LAN is a local area network that connects devices within a limited area, while WAN is a wide area network that connects devices over a large geographical area.
LAN is typically used in homes, offices, or schools, while WAN is used to connect different LANs across cities, countries, or even continents.
LAN has a higher data transfer rate and lower latency compared to WAN.
Examples of LAN technologies include Ethernet, Wi-F...
To convert access into trunk, we need to configure the switch port as a trunk port.
Configure the switch port as a trunk port using the 'switchport mode trunk' command.
Verify the trunk configuration using the 'show interfaces trunk' command.
Ensure that the VLANs allowed on the trunk are configured using the 'switchport trunk allowed vlan' command.
Ensure that the native VLAN is configured using the 'switchport trunk nati
Load balancer distributes incoming network traffic across multiple servers to improve performance and availability.
Load balancer acts as a reverse proxy server
It distributes traffic based on various algorithms such as round-robin, least connections, IP hash, etc.
It monitors server health and redirects traffic to healthy servers
It can be hardware-based or software-based
Examples of load balancers include F5, HAProxy, Ngi
Trunk is used to carry multiple VLANs between switches, while access is used to connect end devices to the network.
Trunk is used to connect switches together and carry multiple VLANs
Access is used to connect end devices like computers, printers, etc. to the network
Trunk ports are configured with VLAN tagging, while access ports are not
Examples of trunk ports are inter-switch links, while examples of access ports are po
Port-based security involves controlling access to network resources based on the physical port of the device.
Port security can be implemented by limiting the number of MAC addresses that can be learned on a port.
It can also involve configuring the port to only allow traffic from specific VLANs.
Port security can be used to prevent unauthorized access to the network by limiting the devices that can connect to it.
It can ...
I applied via Naukri.com and was interviewed in Nov 2020. There were 3 interview rounds.
I applied via Newspaper Ad and was interviewed in Jul 2022. There were 2 interview rounds.
Coding test contains 2 questions
I applied via Walk-in and was interviewed before Oct 2023. There were 3 interview rounds.
OSPF (Open Shortest Path First) is a routing protocol used to determine the best path for data packets in a network.
OSPF is a link-state routing protocol that uses Dijkstra's algorithm to calculate the shortest path to each network.
OSPF routers exchange Link State Advertisements (LSAs) to build a topology database.
There are several types of LSAs, including Router LSAs, Network LSAs, Summary LSAs, and AS External LSAs.
O...
BGP (Border Gateway Protocol) is a routing protocol used to exchange routing information between different autonomous systems.
BGP has four main states: Idle, Connect, OpenSent, and Established.
BGP attributes include AS_PATH, NEXT_HOP, LOCAL_PREF, and ORIGIN.
AS_PATH attribute shows the path the route has taken through different autonomous systems.
NEXT_HOP attribute specifies the next hop IP address to reach a particular...
BGP (Border Gateway Protocol) is a routing protocol used to exchange routing information between different networks on the internet.
BGP is used by internet service providers to make routing decisions.
It operates on TCP port 179.
BGP uses path attributes to determine the best route to a destination.
BGP can be configured in different ways such as eBGP (external BGP) and iBGP (internal BGP).
I appeared for an interview in Oct 2023.
VRRP stands for Virtual Router Redundancy Protocol, used to provide high availability for routers by creating a virtual IP address.
VRRP allows multiple routers to work together in a group, with one router acting as the master and others as backups.
If the master router fails, one of the backup routers takes over the virtual IP address to ensure continuous network connectivity.
VRRP uses a priority value to determine whic...
VLANs are created to segment network traffic, improve network performance, enhance security, and simplify network management.
Segment network traffic to improve performance and reduce congestion
Enhance security by isolating sensitive data or devices
Simplify network management by grouping devices logically
Allow for easier troubleshooting and maintenance
Enable better control over broadcast domains
Example: Creating separat
Configuring FAILOVER via static Route involves setting up multiple routes with different priorities.
Create multiple static routes with different next-hop IP addresses
Assign different administrative distances to each static route
Configure IP SLA to track the primary route and switch to the secondary route if the primary route fails
The OSI model is a conceptual framework that standardizes the functions of a telecommunication or computing system into seven layers.
The OSI model stands for Open Systems Interconnection model.
It helps in understanding how different networking protocols work together.
Each layer in the OSI model has specific functions and communicates with adjacent layers.
Examples of OSI model layers include physical layer, data link la
I applied via Company Website and was interviewed in Jul 2024. There were 3 interview rounds.
based on 1 interview
Interview experience
System Administrator
1.3k
salaries
| ₹2.9 L/yr - ₹12 L/yr |
Associate Technical Engineer
654
salaries
| ₹4 L/yr - ₹6.6 L/yr |
Project Manager
620
salaries
| ₹7.1 L/yr - ₹28.5 L/yr |
Infrastructure Specialist
603
salaries
| ₹4.2 L/yr - ₹23 L/yr |
SME
419
salaries
| ₹7.5 L/yr - ₹25.5 L/yr |
Genpact
DXC Technology
Sutherland Global Services
Optum Global Solutions