Filter interviews by
Switching is a networking technique that forwards data packets between devices on a computer network.
Switching is used to connect devices within a local area network (LAN) or between multiple LANs.
It operates at the data link layer (Layer 2) of the OSI model.
Switches use MAC addresses to determine where to forward data packets.
Switching increases network performance by reducing congestion and improving bandwidth u...
Spanning Tree Protocol is a network protocol that ensures a loop-free topology for Ethernet networks.
Prevents loops in Ethernet networks by blocking redundant paths
Designated switches are elected to forward traffic on each segment
Uses Bridge Protocol Data Units (BPDUs) to exchange information between switches
VLAN stands for Virtual Local Area Network. It is used to logically segment a network to improve performance, security, and management.
VLANs are used to separate broadcast domains in a network.
They can be used to group devices based on department, function, or security requirements.
VLANs can help reduce network congestion and improve overall network performance.
They are commonly used in enterprise networks to isol...
Mac binding is a security feature that associates a specific MAC address with a specific IP address on a network.
Mac binding is used to ensure that only devices with specific MAC addresses can access the network.
It helps prevent unauthorized devices from connecting to the network.
Mac binding is commonly used in home networks and small businesses to enhance network security.
Packet flow from one network to another involves routing, switching, and encapsulation.
Packet leaves source device and enters local network.
Local network router determines best path to destination network.
Packet is forwarded to destination network through routers and switches.
Destination network router delivers packet to destination device.
Encapsulation and decapsulation processes occur at each network device.
Exam...
Subnetting is the process of dividing a network into smaller sub-networks to improve performance and security.
Subnetting helps in optimizing network traffic by breaking a large network into smaller segments.
It allows for better organization and management of IP addresses.
Subnetting also enhances network security by isolating different parts of the network.
Example: Dividing a network with IP range 192.168.1.0/24 in...
Routing is the process of selecting the best path for network traffic to reach its destination.
Routing involves determining the optimal path for data packets to travel from the source to the destination.
Routers use routing tables to make decisions on how to forward packets based on destination IP addresses.
Routing protocols like OSPF and BGP are used to exchange routing information between routers.
Dynamic routing ...
DHCP is a network protocol that automatically assigns IP addresses to devices on a network. DORA process involves Discover, Offer, Request, Acknowledge.
DHCP stands for Dynamic Host Configuration Protocol
DORA process includes Discover, Offer, Request, Acknowledge
Discover: Client broadcasts a request for IP address
Offer: DHCP server offers an IP address to the client
Request: Client requests the offered IP address
Ack...
OSPF (Open Shortest Path First) is a routing protocol used to find the best path for data packets in IP networks.
OSPF is a link-state routing protocol
It uses Dijkstra's algorithm to calculate the shortest path
OSPF areas are logical groupings of routers and networks sharing the same area ID
Each OSPF router belongs to at least one area
Areas are used to reduce the size of the link-state database and improve network s...
I applied via LinkedIn and was interviewed in Aug 2024. There were 2 interview rounds.
Routing is the process of selecting the best path for network traffic to reach its destination.
Routing involves determining the optimal path for data packets to travel from the source to the destination.
Routers use routing tables to make decisions on how to forward packets based on destination IP addresses.
Routing protocols like OSPF and BGP are used to exchange routing information between routers.
Dynamic routing allow...
Switching is a networking technique that forwards data packets between devices on a computer network.
Switching is used to connect devices within a local area network (LAN) or between multiple LANs.
It operates at the data link layer (Layer 2) of the OSI model.
Switches use MAC addresses to determine where to forward data packets.
Switching increases network performance by reducing congestion and improving bandwidth utiliz...
Spanning Tree Protocol is a network protocol that ensures a loop-free topology for Ethernet networks.
Prevents loops in Ethernet networks by blocking redundant paths
Designated switches are elected to forward traffic on each segment
Uses Bridge Protocol Data Units (BPDUs) to exchange information between switches
VLAN stands for Virtual Local Area Network. It is used to logically segment a network to improve performance, security, and management.
VLANs are used to separate broadcast domains in a network.
They can be used to group devices based on department, function, or security requirements.
VLANs can help reduce network congestion and improve overall network performance.
They are commonly used in enterprise networks to isolate t...
DHCP is a network protocol that automatically assigns IP addresses to devices on a network. DORA process involves Discover, Offer, Request, Acknowledge.
DHCP stands for Dynamic Host Configuration Protocol
DORA process includes Discover, Offer, Request, Acknowledge
Discover: Client broadcasts a request for IP address
Offer: DHCP server offers an IP address to the client
Request: Client requests the offered IP address
Acknowle...
Mac binding is a security feature that associates a specific MAC address with a specific IP address on a network.
Mac binding is used to ensure that only devices with specific MAC addresses can access the network.
It helps prevent unauthorized devices from connecting to the network.
Mac binding is commonly used in home networks and small businesses to enhance network security.
Subnetting is the process of dividing a network into smaller sub-networks to improve performance and security.
Subnetting helps in optimizing network traffic by breaking a large network into smaller segments.
It allows for better organization and management of IP addresses.
Subnetting also enhances network security by isolating different parts of the network.
Example: Dividing a network with IP range 192.168.1.0/24 into sm...
OSPF (Open Shortest Path First) is a routing protocol used to find the best path for data packets in IP networks.
OSPF is a link-state routing protocol
It uses Dijkstra's algorithm to calculate the shortest path
OSPF areas are logical groupings of routers and networks sharing the same area ID
Each OSPF router belongs to at least one area
Areas are used to reduce the size of the link-state database and improve network scalab...
Packet flow from one network to another involves routing, switching, and encapsulation.
Packet leaves source device and enters local network.
Local network router determines best path to destination network.
Packet is forwarded to destination network through routers and switches.
Destination network router delivers packet to destination device.
Encapsulation and decapsulation processes occur at each network device.
Example: ...
Top trending discussions
posted on 17 Jul 2024
I applied via Campus Placement and was interviewed before Jul 2023. There were 2 interview rounds.
It has general aptitude questions with moderate difficulty
It was mixed coding plus SQL question after the exam I had explain my solution.
posted on 13 Mar 2024
I applied via Walk-in and was interviewed in Feb 2024. There were 2 interview rounds.
It consists of basic aptitude questions and some coding output questions followed by basic SQL questions. Overall the difficulty level was medium.
posted on 4 Jun 2025
I appeared for an interview before Jun 2024, where I was asked the following questions.
posted on 28 Feb 2025
Basics of C language
posted on 13 Jan 2024
I applied via Naukri.com and was interviewed in Dec 2023. There were 2 interview rounds.
First there will be a topic given to you to write an article of length 300-400 words in 15 mins. This article writing is to check your knowledge of English language.
Then there is a 45 mins round test in which 40 questions will be asked.
20 Technical and 20 Programming.
The programming questions will be from C++, and you are required to choose the correct output of the given C++ program.
The technical aptitude questions were medium to hard.
posted on 7 Feb 2024
I applied via Campus Placement and was interviewed in Jan 2024. There were 3 interview rounds.
There was total of 40 questions
First 20: Aptitude based topics like time and work, profit and loss, speed and distance
Second 20: Programming MCQs based on C, C++ and python. Task is to guess the correct output and errors.
There were 4 coding questions based on array, 2 SQL queries and one article.
Coding questions were easy for batch 2 but difficult for batch 1. Star patterns are present in batch 1.
SQL queries were easy.
One article (200-300)words. Topics was Google maps.
posted on 7 Jun 2024
I applied via Job Portal and was interviewed in Jan 2023. There were 3 interview rounds.
based on 1 interview experience
Difficulty level
Duration
based on 4 reviews
Rating in categories
Network Engineer
28
salaries
| ₹2.5 L/yr - ₹5.4 L/yr |
Network Support Engineer
8
salaries
| ₹1.8 L/yr - ₹4.2 L/yr |
System Engineer
6
salaries
| ₹3.6 L/yr - ₹5.5 L/yr |
Desktop Support Engineer
6
salaries
| ₹1.8 L/yr - ₹3.6 L/yr |
Project Manager
4
salaries
| ₹3.8 L/yr - ₹5 L/yr |
Primus Global Technologies
TriGeo Technologies
GrapplTech
Plada Infotech Services