Filter interviews by
I applied via Naukri.com and was interviewed in Sep 2023. There were 4 interview rounds.
RF means radio frequency.It means commercial. If the audio is faulty on any customer. So it will go into commercial or planning. If there is any issue with the customer.
ciena has a mux to which we send media on the microwave.
SR has to close in 4 hours.
Team Coordinator, team move the field and SR reslove the withen SLA
Top trending discussions
I applied via Referral and was interviewed in Aug 2024. There were 3 interview rounds.
I am a highly experienced Senior Network Engineer with a strong background in designing, implementing, and managing complex network infrastructures.
Over 10 years of experience in network engineering
Proficient in Cisco, Juniper, and Palo Alto technologies
Skilled in network design, implementation, and troubleshooting
Certified in CCNP and JNCIP
Led successful network upgrade projects at previous companies
posted on 27 Nov 2024
I applied via Referral and was interviewed in May 2024. There were 2 interview rounds.
Network related questions
IPRAN solution stands for Internet Protocol Radio Access Network, which is a network architecture that combines IP/MPLS and mobile technologies.
IPRAN solution is used to provide high-speed internet access to mobile users.
It helps in optimizing network resources and improving network performance.
Examples of IPRAN solution providers include Cisco, Huawei, and Juniper Networks.
Different types of L2VPN include Ethernet VPN (EVPN), Virtual Private LAN Service (VPLS), and Layer 2 Tunneling Protocol (L2TP).
Ethernet VPN (EVPN) - Uses BGP as the control plane protocol for distributing MAC addresses across the network.
Virtual Private LAN Service (VPLS) - Extends a LAN over the network, allowing multiple sites to appear as if they are on the same LAN segment.
Layer 2 Tunneling Protocol (L2TP) - Creat...
I applied via Recruitment Consulltant and was interviewed in Sep 2023. There were 2 interview rounds.
Application override is a feature in network security that allows certain applications to bypass security policies.
Application override allows specific applications to bypass firewall rules or other security measures.
It is typically used for critical applications that may be blocked by default security settings.
Administrators can configure application override rules to allow certain traffic to pass through the network ...
The session table typically stores information about active network connections and their associated details.
Contains information such as source and destination IP addresses
Stores port numbers being used in the connection
Tracks the protocol being used (e.g. TCP, UDP)
May include timestamps for when the connection was established and last active
HA3 belongs to HMAC (Hash-based Message Authentication Code) and is used for secure authentication and integrity verification.
HA3 stands for Hash-based Message Authentication Code 3
It is used in cryptographic hash functions for secure authentication and integrity verification
HA3 is commonly used in network security protocols such as TLS (Transport Layer Security) and IPsec (Internet Protocol Security)
Check the system logs for cluster failure in Paloalto firewall.
Check the system logs for any error messages related to cluster failure
Look for logs indicating cluster synchronization issues
Review logs for any hardware or software failures in the cluster
Heart Beat link is a feature in network security that ensures continuous communication between devices.
Heart Beat link is a mechanism used to maintain a connection between two devices by sending periodic signals.
It helps in detecting if a device is still active and reachable on the network.
If the Heart Beat link fails, it can trigger alerts or actions to address the issue.
Example: In a VPN connection, Heart Beat link c...
There are four types of logs in the monitor tab in Panorama.
Traffic logs
Threat logs
URL logs
Data logs
To configure a firewall from scratch, the first step is to define the security policy.
Define the security policy based on the organization's requirements and compliance standards
Identify the network topology and determine the zones that need to be protected
Select the appropriate firewall hardware or software based on the requirements
Configure the firewall rules to allow or deny traffic based on the security policy
Test ...
Stateful means the system or device keeps track of the state of active connections and can differentiate between different connections.
Stateful devices maintain information about the state of active connections
They can differentiate between different connections based on various parameters
Stateful firewalls keep track of the state of network connections to make decisions on allowing or blocking traffic
posted on 16 Apr 2024
I applied via Referral and was interviewed in Mar 2024. There was 1 interview round.
MPLS (Multiprotocol Label Switching) is a protocol used in high-performance telecommunications networks to direct data packets along predefined paths.
MPLS is used to improve network performance by efficiently routing data packets based on labels instead of IP addresses.
It is commonly used in scenarios where quality of service (QoS) and traffic engineering are important, such as in large enterprise networks or service p...
Three different INTER_AS solutions and their advantages and disadvantages
Option 1: Option A - Advantages: Scalability, Disadvantages: Complexity
Option 2: Option B - Advantages: Simplicity, Disadvantages: Limited scalability
Option 3: Option C - Advantages: Flexibility, Disadvantages: Potential security risks
I applied via Campus Placement and was interviewed in Sep 2023. There were 3 interview rounds.
It contains logical reasoning, quantitative aptitude, and technical questions
I applied via Walk-in and was interviewed in Aug 2022. There were 2 interview rounds.
A network is a group of interconnected devices that communicate with each other to share resources and information.
A network can be wired or wireless
Devices on a network can include computers, printers, routers, and switches
Networks can be local (LAN) or wide area (WAN)
Switches are devices that connect devices on a network and direct traffic between them
A power battery switch is a device used to control the flow of power from a battery to a circuit or device.
It is typically used in situations where multiple batteries are connected to a circuit and need to be switched on or off.
The switch allows for easy control and management of power sources.
Examples include battery backup systems for network equipment, where the switch determines whether power is sourced from the ma...
Optical fiber splicing is the process of joining two fiber optic cables together.
Splicing is done to extend the length of a fiber optic cable or to repair a damaged cable.
There are two types of splicing: fusion splicing and mechanical splicing.
Fusion splicing involves melting the ends of two fibers together using an electric arc.
Mechanical splicing involves aligning the two fibers and holding them together with a splic...
I applied via LinkedIn and was interviewed in Jul 2022. There were 3 interview rounds.
Load balancing involves distributing network traffic across multiple servers to optimize resource utilization and prevent overload.
Parameters for load balancing include server health, server capacity, and current network traffic.
To improve various KPIs like VDR, HOSR, Initial ERAB, CQI, and SSSR, you can adjust load balancing algorithms, optimize server performance, and monitor network traffic.
For example, you can use ...
based on 1 interview
Interview experience
based on 1 review
Rating in categories
RF Engineer
106
salaries
| ₹2 L/yr - ₹5.2 L/yr |
Team Lead
46
salaries
| ₹2.8 L/yr - ₹4.8 L/yr |
Network Engineer
45
salaries
| ₹2.2 L/yr - ₹3.8 L/yr |
Team Coordinator
28
salaries
| ₹2.4 L/yr - ₹4.4 L/yr |
Field Engineer
17
salaries
| ₹2 L/yr - ₹3.5 L/yr |
TCS
Wipro
Infosys
HCLTech