i
Movate
Filter interviews by
I applied via Company Website and was interviewed before Mar 2023. There was 1 interview round.
I applied via Approached by Company and was interviewed in Nov 2023. There was 1 interview round.
Routing is the process of selecting the best path for network traffic to reach its destination.
Routing helps in directing network traffic efficiently
It determines the best path for data packets to travel from source to destination
Routing protocols like OSPF, BGP, and EIGRP are used to exchange routing information
Routing tables are used to store information about network paths
Dynamic routing adjusts to network changes a
IPS stands for Intrusion Prevention System. It is a network security technology that monitors network traffic to detect and prevent malicious activities.
IPS is a network security technology that monitors network traffic in real-time.
It can detect and prevent malicious activities such as hacking attempts, malware infections, and denial-of-service attacks.
IPS works by analyzing network packets, comparing them to a databa...
Firewall works at the network layer.
Firewall operates at the network layer of the OSI model.
It filters and controls incoming and outgoing network traffic based on predetermined security rules.
Examples of firewalls include hardware firewalls, software firewalls, and cloud-based firewalls.
Firewall generations refer to the evolution of firewall technology and their roles in network security.
First generation firewalls - packet filtering based on IP addresses and ports
Second generation firewalls - stateful inspection and improved security features
Third generation firewalls - application layer filtering and deep packet inspection
Fourth generation firewalls - next-generation firewalls with advanced threat pr...
IP Spoofing is a technique where an attacker impersonates another device by falsifying IP address in order to gain unauthorized access.
IP Spoofing involves manipulating the source IP address in a packet to deceive the recipient.
It is commonly used in DDoS attacks to hide the true source of the attack traffic.
Prevention methods include implementing ingress and egress filtering on network devices.
Examples of tools used f
posted on 4 Mar 2024
I appeared for an interview before Mar 2024, where I was asked the following questions.
I applied via Naukri.com and was interviewed in Mar 2022. There were 4 interview rounds.
Use pre-staged image and fast transfer methods to achieve IOS upgrade within 10 minutes.
Pre-stage the image on the device before the upgrade window
Use fast transfer methods like TFTP or FTP to transfer the image quickly
Ensure all necessary configurations are saved and backed up before the upgrade
Have a rollback plan in case of any issues during the upgrade
Remove duplicate objects from an array of multiple objects.
Create a new array to store unique objects
Loop through the original array and check if the object already exists in the new array
If not, add it to the new array
Return the new array
Maintain state by using a global variable or a state management system.
Use a global variable to store the state and access it whenever needed.
Use a state management system like Redux or MobX to manage the state.
Avoid using local variables or closures to store state as they will be lost when the code is repeated.
Consider using object-oriented programming principles to encapsulate state within objects.
Use functional prog...
Design patterns are reusable solutions to common software problems. Android system uses various design patterns.
MVC (Model-View-Controller) pattern is used in Android to separate UI logic from business logic.
Singleton pattern is used to ensure only one instance of a class is created.
Observer pattern is used to notify changes in data to multiple components.
Builder pattern is used to simplify complex object creation.
Adap...
posted on 5 Feb 2021
I applied via Recruitment Consulltant and was interviewed before Jul 2021. There were 3 interview rounds.
I applied via Campus Placement and was interviewed in Dec 2020. There were 5 interview rounds.
Program to print a pattern and implement bubble sort on an array of strings.
For pattern printing, use nested loops to print the desired pattern.
For bubble sort, compare adjacent elements and swap if necessary.
Use a loop to iterate through the array until no more swaps are needed.
based on 1 interview
Interview experience
based on 4 reviews
Rating in categories
Senior Engineer
1.5k
salaries
| ₹2.9 L/yr - ₹12 L/yr |
Technical Support Engineer
1.4k
salaries
| ₹1 L/yr - ₹7.6 L/yr |
Network Engineer
1.1k
salaries
| ₹1.8 L/yr - ₹9.6 L/yr |
Engineer
1.1k
salaries
| ₹1.8 L/yr - ₹9 L/yr |
Specialist
321
salaries
| ₹4.5 L/yr - ₹15.4 L/yr |
DXC Technology
Virtusa Consulting Services
CGI Group
Optum Global Solutions