Add office photos
Engaged Employer

Movate

3.3
based on 1.9k Reviews
Filter interviews by

100+ Interview Questions and Answers

Updated 29 Nov 2024
Popular Designations

Q1. TCP/IP layers, why is transport needed for communication? What is Subnet mask and how does it help in data communication. Why is Vlan needed? Based on what information does a switch and router send a packet or ...

read more
Ans.

Questions related to TCP/IP layers, subnet mask, VLAN, ARP, port number, IP and MAC addresses.

  • Transport layer is needed for reliable communication and error correction.

  • Subnet mask is used to identify the network and host portions of an IP address.

  • VLAN is needed for network segmentation and security.

  • Switches and routers send packets or frames based on destination IP address.

  • Types of ARP include ARP request and ARP reply.

  • Port number is used to identify the application or servic...read more

View 1 answer

Q2. What is the difference between WAN and LAN

Ans.

WAN is a network that covers a large geographical area while LAN is a network that covers a small area.

  • WAN stands for Wide Area Network while LAN stands for Local Area Network

  • WAN covers a large geographical area such as a city, country or even the world while LAN covers a small area such as a building or a campus

  • WAN is usually slower and more expensive than LAN

  • Examples of WAN include the internet while examples of LAN include home or office networks

View 9 more answers

Q3. How will you manage a ticket

Ans.

A ticket can be managed by following a systematic approach.

  • Acknowledge the ticket and assign it to the appropriate team member

  • Set a priority level based on the severity of the issue

  • Communicate with the customer and provide regular updates

  • Resolve the issue and close the ticket

  • Document the entire process for future reference

View 1 answer

Q4. Ip phone boot up process

Ans.

The IP phone boot up process involves several steps to initialize the device and connect to the network.

  • The phone powers on and performs a self-test

  • It obtains an IP address from the DHCP server

  • It downloads the firmware and configuration files from the TFTP server

  • It registers with the call manager or PBX

  • It is ready to make and receive calls

View 2 more answers
Discover null interview dos and don'ts from real experiences
Q5. Computer Network Question

Why is transport needed for communication?

View 2 more answers

Q6. What is difference between private and public ip in detail?

Ans.

Private IP is used within a network while public IP is used to communicate over the internet.

  • Private IP is assigned to devices within a local network and is not visible to the internet.

  • Public IP is assigned by the internet service provider and is used to communicate over the internet.

  • Private IP addresses are in the range of 10.0.0.0 to 192.168.0.0.

  • Public IP addresses are unique and can be traced back to a specific device or location.

  • Private IP addresses are used for internal ...read more

View 1 answer
Are these interview questions helpful?
Q7. Computer Network Question

What is a subnet mask?

View 2 more answers

Q8. What is difference between modem and router and switch

Ans.

Modem connects to the internet, router connects devices to the network, switch connects devices to each other.

  • Modem converts digital signals to analog for transmission over phone lines or cable lines.

  • Router directs traffic between devices on a network and connects to the internet through a modem.

  • Switch connects devices to each other within a network.

  • Example: Modem - cable modem, Router - Linksys router, Switch - Netgear switch

View 1 answer
Share interview questions and help millions of jobseekers 🌟

Q9. what are the Osi layers

Ans.

The OSI (Open Systems Interconnection) model is a conceptual framework that standardizes the functions of a communication system into seven layers.

  • The seven layers of the OSI model are: Physical, Data Link, Network, Transport, Session, Presentation, and Application.

  • Each layer has a specific function and interacts with the layers above and below it.

  • The Physical layer deals with the physical transmission of data, such as cables and network interfaces.

  • The Data Link layer provide...read more

View 2 more answers

Q10. What is TCP/IP and Osi Layer.

Ans.

TCP/IP is a set of protocols used for communication over the internet. OSI layer is a model for network communication.

  • TCP/IP is a suite of communication protocols used for transmitting data over the internet.

  • It consists of two main protocols: Transmission Control Protocol (TCP) and Internet Protocol (IP).

  • TCP ensures reliable transmission of data while IP is responsible for routing packets to their destination.

  • OSI layer is a conceptual model for network communication that defi...read more

View 6 more answers

Q11. Explain about SIP call flow

Ans.

SIP call flow is the process of establishing, maintaining, and terminating a session initiated by Session Initiation Protocol (SIP).

  • SIP INVITE message is sent from the caller to the callee

  • Callee responds with a SIP 100 Trying message

  • Callee sends a SIP 180 Ringing message to indicate the phone is ringing

  • Callee sends a SIP 200 OK message to indicate the call is accepted

  • Media negotiation takes place between the caller and callee

  • Call termination is initiated by either party with ...read more

View 1 answer
Q12. Computer Network Question

Why is VLan needed?

View 2 more answers
Q13. Computer Network Question

What is a port no.?

View 3 more answers

Q14. DORA process with same network and different network

Ans.

The DORA process is used for IP address assignment in a network. It consists of four steps: Discover, Offer, Request, and Acknowledge.

  • Discover: The client sends a broadcast message to find available DHCP servers.

  • Offer: DHCP servers respond with an IP address lease offer.

  • Request: The client selects an IP address and sends a request to the DHCP server.

  • Acknowledge: The DHCP server acknowledges the request and assigns the IP address to the client.

Add your answer

Q15. What is TCP/IP protocol

Ans.

TCP/IP is a set of communication protocols used for connecting network devices and transmitting data over the internet.

  • TCP/IP stands for Transmission Control Protocol/Internet Protocol

  • It is a suite of communication protocols used for connecting network devices

  • TCP is responsible for ensuring reliable transmission of data

  • IP is responsible for routing data packets between network devices

  • Examples of TCP/IP applications include web browsing, email, and file sharing

View 1 answer

Q16. What is DND in networking

Ans.

DND stands for 'Do Not Disturb' in networking.

  • DND is a feature that can be enabled on a device or network to prevent incoming calls or messages.

  • It is commonly used in VoIP systems to prevent incoming calls during important meetings or presentations.

  • DND can also be used to block incoming traffic on a network, such as during maintenance or security updates.

View 1 answer

Q17. What is DHCP in network

Ans.

DHCP stands for Dynamic Host Configuration Protocol. It is a network protocol that automatically assigns IP addresses to devices.

  • DHCP is used to simplify network administration by automatically assigning IP addresses to devices.

  • It eliminates the need for manual IP address configuration.

  • DHCP servers can also assign other network configuration information such as subnet mask, default gateway, and DNS server addresses.

  • DHCP leases are temporary and must be renewed periodically.

  • DH...read more

View 1 answer

Q18. What happens in DHCP Explain Dora process in detail What is vlan

Ans.

DHCP is a network protocol that allows devices to obtain IP addresses and other network configuration settings automatically.

  • DHCP stands for Dynamic Host Configuration Protocol.

  • It is used to assign IP addresses dynamically to devices on a network.

  • The DORA process in DHCP stands for Discover, Offer, Request, and Acknowledge.

  • During the DORA process, a client sends a DHCP Discover message to find available DHCP servers.

  • The DHCP server responds with a DHCP Offer message, providin...read more

View 1 answer

Q19. What is a Network

Ans.

A network is a group of interconnected devices that can communicate and share resources.

  • A network can be wired or wireless

  • Devices on a network can share files, printers, and internet access

  • Networks can be local (LAN) or wide area (WAN)

  • Examples of networks include the internet, home networks, and corporate networks

View 8 more answers

Q20. IP and TCP headers in details? What is the purpose of each field in the header

Ans.

IP and TCP headers explained with purpose of each field

  • IP header contains source and destination IP addresses, version, header length, type of service, total length, identification, flags, fragment offset, time to live, protocol, header checksum

  • TCP header contains source and destination port numbers, sequence number, acknowledgement number, data offset, reserved, flags, window size, checksum, urgent pointer

  • Purpose of each field in IP and TCP headers is to provide necessary in...read more

Add your answer

Q21. what will happen when you access google.com? explain the flow at the packet level

Ans.

Accessing google.com involves DNS resolution, TCP handshake, HTTP request, and response at the packet level.

  • 1. DNS resolution to translate domain name to IP address

  • 2. TCP handshake to establish connection

  • 3. HTTP request sent to the server

  • 4. Server processes the request and sends back HTTP response

  • 5. Data packets are exchanged between client and server

Add your answer

Q22. what to do if there is no documentation available for one of the unknown issue?

Ans.

Research online forums, reach out to colleagues, test different solutions, document findings.

  • Search online forums and communities for similar issues and solutions.

  • Reach out to colleagues or other experts in the field for advice.

  • Test different solutions and document the results to track progress.

  • Keep detailed notes of the troubleshooting process for future reference.

  • Consider reaching out to the vendor or manufacturer for support.

  • Experiment with different troubleshooting techni...read more

Add your answer

Q23. Diff b/w l3 switch and router

Ans.

L3 switch is a switch with routing capabilities while a router is a dedicated device for routing.

  • L3 switch operates at layer 2 and layer 3 of the OSI model while a router operates only at layer 3.

  • L3 switch can perform routing functions like a router but also has the ability to switch frames between ports like a switch.

  • Routers are typically used to connect different networks while L3 switches are used to segment a network into smaller subnets.

  • Examples of L3 switches include Ci...read more

Add your answer

Q24. Which happens first tcp handshake or ssl handshake

Ans.

SSL handshake happens before TCP handshake.

  • SSL handshake establishes a secure connection between client and server.

  • TCP handshake establishes a connection between client and server.

  • SSL handshake occurs after TCP handshake to secure the connection.

  • SSL handshake involves exchanging certificates and negotiating encryption algorithms.

  • TCP handshake involves SYN, SYN-ACK, and ACK packets to establish a connection.

Add your answer

Q25. Explain about each layer

Ans.

The OSI model has 7 layers that define how data is transmitted over a network.

  • Layer 1 (Physical): Deals with the physical connection between devices and transmission of raw data.

  • Layer 2 (Data Link): Provides error-free transfer of data frames between nodes on the same network.

  • Layer 3 (Network): Handles the routing of data packets between different networks.

  • Layer 4 (Transport): Ensures reliable data transfer between end systems and provides flow control.

  • Layer 5 (Session): Esta...read more

Add your answer

Q26. How does a client get ip address

Ans.

A client can get an IP address through DHCP (Dynamic Host Configuration Protocol) or by manually configuring it.

  • DHCP (Dynamic Host Configuration Protocol) assigns IP addresses automatically to clients on a network

  • Clients can also manually configure their IP address, subnet mask, gateway, and DNS server

  • IP addresses can be obtained through IPv4 or IPv6 protocols

Add your answer

Q27. Diff between native vlan and default vlan and DHCP process

Ans.

Native VLAN is used for untagged traffic, default VLAN is used when no VLAN is specified, DHCP process involves client requesting IP address from server.

  • Native VLAN is used for untagged traffic on a trunk port

  • Default VLAN is used when no VLAN is specified, typically VLAN 1

  • DHCP process involves client sending a DHCP discover message, server offering an IP address, client requesting the offered IP address, and server acknowledging the request

Add your answer

Q28. what is DHCP and how many types of DHCP are there

Ans.

DHCP stands for Dynamic Host Configuration Protocol. It is a network management protocol used to assign IP addresses to devices on a network.

  • DHCP automatically assigns IP addresses to devices on a network

  • There are two types of DHCP: DHCP server and DHCP client

  • DHCP server assigns IP addresses to devices, while DHCP client requests and receives IP addresses

Add your answer

Q29. Flow of the OSI LAYERS DHCP & DHCP Relay with pcaps DNS indepth TCP indepth with pcaps Http and https SSL/TLS Handshake with pcaps GRE indepth IPSEC indepth - ikev1 &ikev2 Proxy and differences SAML flow both S...

read more
Ans.

The question covers various topics related to networking protocols and technologies.

  • OSI layers: Understand the flow and purpose of each layer in the OSI model.

  • DHCP & DHCP Relay: Know how DHCP works and the role of DHCP relay agents.

  • DNS: Understand the DNS resolution process and various record types.

  • TCP: Learn about TCP connection establishment, data transfer, and termination.

  • HTTP & HTTPS: Understand the basics of HTTP and the differences with HTTPS.

  • SSL/TLS Handshake: Know the...read more

Add your answer
Q30. Computer Network Question

Difference between MAC Address and IP Address

View 2 more answers

Q31. What happens when we type www.google.com

Ans.

When we type www.google.com, the browser sends a request to the DNS server to resolve the domain name into an IP address.

  • The browser sends a DNS query to the DNS server.

  • The DNS server looks up the IP address associated with the domain name.

  • The DNS server responds with the IP address.

  • The browser establishes a TCP connection with the IP address.

  • The browser sends an HTTP request to the IP address.

  • The server at the IP address responds with the Google homepage.

  • The browser renders ...read more

Add your answer

Q32. How two computers communicate each other

Ans.

Two computers communicate by sending and receiving data packets over a network using protocols such as TCP/IP.

  • Computers communicate through a network by establishing a connection.

  • Data is divided into packets and sent over the network.

  • Protocols like TCP/IP ensure reliable delivery of packets.

  • Each computer has a unique IP address to identify it on the network.

  • Examples of communication methods include email, web browsing, and file sharing.

Add your answer

Q33. Define Osi model, tcp header, ip header ,arp ,Types of arp, port no.'s of protocol, ospf messages, VTP, STP, port security, Ipsec, SSL, Nat T?

Add your answer

Q34. What are the OSI layers and explain about each one

Ans.

OSI layers are a conceptual model for communication systems. There are 7 layers, each with a specific function.

  • Layer 1 - Physical layer: deals with the physical aspects of data transmission

  • Layer 2 - Data link layer: responsible for error-free transfer of data between nodes

  • Layer 3 - Network layer: handles routing and forwarding of data packets

  • Layer 4 - Transport layer: ensures reliable data transfer between end systems

  • Layer 5 - Session layer: establishes, manages and terminate...read more

View 1 answer

Q35. OSI Layers. Different between Mac and IP ARP and types SSL handshake TCP handshake

Ans.

Understanding of OSI Layers, MAC vs IP, ARP types, SSL handshake, and TCP handshake.

  • OSI Layers: 7 layers that define networking functions

  • MAC vs IP: MAC address is hardware address, IP address is logical address

  • ARP types: ARP, RARP, Inverse ARP

  • SSL handshake: Process of establishing secure connection

  • TCP handshake: 3-way process to establish connection

Add your answer

Q36. What is arp and how it works

Ans.

ARP stands for Address Resolution Protocol. It is used to map IP addresses to MAC addresses on a local network.

  • ARP is used to find the MAC address of a device based on its IP address.

  • It works by broadcasting an ARP request packet on the local network asking for the MAC address associated with a specific IP address.

  • The device with the matching IP address responds with its MAC address, allowing communication to occur.

  • ARP cache is used to store the mappings of IP addresses to MA...read more

Add your answer

Q37. What is DHS, DHCP?

Ans.

DHS stands for Department of Homeland Security and DHCP stands for Dynamic Host Configuration Protocol.

  • DHS is a government agency responsible for ensuring the security of the United States.

  • DHCP is a network protocol that dynamically assigns IP addresses to devices on a network.

  • DHS plays a crucial role in protecting the country from various threats, including terrorism and cybersecurity.

  • DHCP simplifies network administration by automatically assigning IP addresses to devices, ...read more

View 1 answer

Q38. How ARP works?

Ans.

ARP (Address Resolution Protocol) is used to map a network address (such as an IP address) to a physical address (such as a MAC address).

  • ARP is used in Ethernet networks to find the MAC address of a device based on its IP address.

  • When a device needs to send data to another device on the network, it sends an ARP request asking for the MAC address of the destination device.

  • The destination device responds with its MAC address, allowing the sending device to send the data directl...read more

Add your answer

Q39. Java- explain system.out.println statement- why java is platform independent- collections in java

Ans.

Explaining Java's system.out.println statement, platform independence, and collections.

  • System.out.println() is used to print output to the console in Java.

  • Java is platform independent because it uses bytecode that can run on any platform with a JVM.

  • Collections in Java are used to store and manipulate groups of objects, such as ArrayLists and HashMaps.

Add your answer

Q40. What type fiber connected BBU to RRH?

Ans.

BBU is connected to RRH using single-mode fiber optic cable.

  • Single-mode fiber optic cable is used for long distance communication.

  • It has a smaller core diameter than multimode fiber optic cable.

  • It allows for higher bandwidth and longer transmission distances.

  • It is commonly used in telecommunications and data centers.

  • Examples of single-mode fiber optic cable include OS1 and OS2.

Add your answer
Q41. Computer Network Question

Types of ARP

Add your answer

Q42. How a personal computer communicate with a web application. Process (Scenario base)

Ans.

A personal computer communicates with a web application through a series of steps involving network protocols.

  • The computer sends a request to the web application's server using the HTTP protocol.

  • The server processes the request and sends back a response containing the requested information.

  • The communication is facilitated by the TCP/IP protocol stack.

  • Data is transmitted over the internet using IP addresses and domain names.

  • Encryption protocols like HTTPS may be used to secure...read more

Add your answer

Q43. TCP 3 way handshake

Ans.

TCP 3 way handshake is a process of establishing a connection between two devices over a network.

  • The client sends a SYN packet to the server

  • The server responds with a SYN-ACK packet

  • The client sends an ACK packet to the server to confirm the connection

  • This process is used to ensure reliable communication between devices

Add your answer

Q44. Explain Dhcp messages in detail.

Ans.

DHCP messages are used for assigning IP addresses to devices on a network.

  • DHCPDISCOVER message is sent by a client to discover available DHCP servers

  • DHCPOFFER message is sent by a server to offer an IP address to a client

  • DHCPREQUEST message is sent by a client to request an offered IP address

  • DHCPACK message is sent by a server to acknowledge the IP address assignment to a client

  • DHCPNAK message is sent by a server to indicate that the requested IP address is not available

  • DHCPR...read more

Add your answer

Q45. Packet flow between same network

Ans.

Packet flow between same network involves communication between devices within the same IP subnet.

  • Devices communicate directly without needing to go through a router.

  • Packet headers contain source and destination IP addresses for proper routing.

  • Switches forward packets based on MAC addresses within the same network.

  • Firewalls may inspect and filter packets within the same network.

  • Examples: File sharing between devices on the same LAN, printing to a network printer within the sa...read more

Add your answer

Q46. Packet flow between different network

Ans.

Packet flow between different networks involves routing, switching, and encapsulation.

  • Packet travels from source device to destination device through routers and switches

  • Routers determine the best path for the packet based on routing tables

  • Switches forward the packet within the same network based on MAC addresses

  • Encapsulation involves adding headers and trailers to the packet at each network layer

  • Example: Packet from a computer in one network to a server in another network

Add your answer

Q47. What I slid TCP/ip, DNS, DHCP….

Ans.

TCP/IP, DNS, and DHCP are fundamental protocols used in computer networking.

  • TCP/IP is a suite of communication protocols used to connect devices on the internet.

  • DNS translates domain names into IP addresses.

  • DHCP assigns IP addresses to devices on a network.

  • TCP/IP is used for communication between devices, while DNS and DHCP are used for addressing and management.

  • Examples of TCP/IP applications include web browsing, email, and file sharing.

Add your answer

Q48. What is VLAN ?

Ans.

VLAN stands for Virtual Local Area Network, a network of devices that behave as if they are connected to the same physical network, even though they may be located on different segments.

  • VLANs are used to segment network traffic and improve network performance and security.

  • They allow for logical grouping of devices based on factors such as department, function, or security requirements.

  • VLANs can span multiple switches and routers, enabling flexibility in network design.

  • Example...read more

Add your answer

Q49. How does data flows?

Ans.

Data flows through networks in packets, following a specific path determined by routing protocols and switches.

  • Data is broken down into packets before being transmitted over a network.

  • Each packet contains information such as source and destination addresses.

  • Routing protocols determine the best path for packets to reach their destination.

  • Switches forward packets based on MAC addresses.

  • Data flows through different network devices like routers, switches, and firewalls.

Add your answer

Q50. IPSEC messages? And troubleshooting scenarios

Ans.

IPSEC messages are used for secure communication. Troubleshooting scenarios include connectivity issues and misconfigured settings.

  • IPSEC messages are used to establish and maintain secure communication between two devices

  • Common troubleshooting scenarios include connectivity issues, such as failed VPN connections

  • Misconfigured settings can also cause IPSEC issues, such as incorrect encryption or authentication settings

  • Tools such as packet captures and debug logs can be used to ...read more

Add your answer

Q51. Tell me about tcp, ssl header in detail?

Ans.

TCP and SSL headers are used in network communication to provide reliable and secure data transmission.

  • TCP header contains source and destination port numbers, sequence and acknowledgment numbers, and control flags.

  • SSL header contains information about the SSL version, cipher suite, and other parameters for secure communication.

  • TCP header is 20 bytes long, while SSL header size varies depending on the SSL version and cipher suite.

  • TCP header flags include SYN, ACK, FIN, RST, a...read more

Add your answer

Q52. How does a OLD telephone system work old line

Ans.

An old telephone system works by transmitting analog signals through copper wires to connect callers.

  • Old telephone systems use copper wires to transmit analog signals between callers

  • The signals are converted into sound waves at the microphone, transmitted through the wires, and converted back into sound at the receiver

  • Calls are connected through a series of switches and exchanges

  • Rotary dial phones use pulses to signal the number being dialed

  • Party lines were common, where mult...read more

Add your answer

Q53. What is blue screen of death ?

Ans.

The blue screen of death is an error screen displayed on Windows operating systems when a fatal system error occurs.

  • It is also known as a stop error or a system crash.

  • It is typically caused by hardware or driver issues.

  • When a blue screen of death occurs, the system is forced to restart.

  • The error message displayed on the blue screen provides information about the cause of the crash.

  • Examples of blue screen of death errors include DRIVER_IRQL_NOT_LESS_OR_EQUAL, PAGE_FAULT_IN_NON...read more

View 1 answer

Q54. Do you know TCP Header Flags?

Ans.

Yes, TCP Header Flags are used to control the flow of data between devices.

  • TCP Header Flags are 6 bits long and are used to control the flow of data between devices.

  • There are 6 TCP Header Flags: URG, ACK, PSH, RST, SYN, and FIN.

  • URG is used to indicate that the data is urgent and should be prioritized.

  • ACK is used to acknowledge receipt of data.

  • PSH is used to push data to the receiving device.

  • RST is used to reset the connection.

  • SYN is used to synchronize sequence numbers.

  • FIN is...read more

Add your answer

Q55. Explain Dns queries in detail.

Ans.

DNS queries are requests sent by a client to a DNS server to resolve a domain name to an IP address.

  • DNS queries are sent over UDP or TCP port 53.

  • The query can be recursive or iterative.

  • Recursive query asks the DNS server to provide the final answer, while iterative query asks the server to provide the best answer it can.

  • DNS queries can be cached by the client or the server to improve performance.

  • DNS queries can also include additional information such as the type of record be...read more

Add your answer

Q56. What is the customer base of petrol pumps in your city?

Ans.

The customer base of petrol pumps in my city consists of a diverse range of individuals and businesses who rely on fuel for transportation and other purposes.

  • Individual car owners who need to refuel their vehicles regularly

  • Commercial truck drivers who require fuel for their transportation businesses

  • Motorcyclists and scooter riders who depend on petrol for their daily commute

  • Delivery services and ride-sharing companies that need fuel for their operations

Add your answer

Q57. Types of Arp ? Packet flow in same network between two switch ? About firewall ?? Dhcp and DORA process ?? About DNS ??

Ans.

Types of ARP include ARP request, ARP reply, ARP probe, and ARP announcement.

  • ARP request is used to find the MAC address of a device on the network.

  • ARP reply is the response to an ARP request, providing the MAC address of the target device.

  • ARP probe is used to check if an IP address is already in use on the network.

  • ARP announcement is used to inform other devices on the network about a change in MAC address.

Add your answer

Q58. What hike percent do you expect?

Ans.

I expect a hike percentage that is in line with industry standards and my experience.

  • I would like to discuss the salary range for this position and understand the company's compensation philosophy.

  • Based on my research and experience, I would expect a hike percentage of around 10-15%.

  • However, I am open to negotiation and would consider other factors such as benefits and growth opportunities.

  • Ultimately, my priority is to join a company where I can contribute my skills and grow ...read more

Add your answer

Q59. Tcp 3 way handshake SSL handshake.

Ans.

TCP 3-way handshake is a process of establishing a connection between two devices. SSL handshake is a process of establishing a secure connection between a client and a server.

  • TCP 3-way handshake involves SYN, SYN-ACK, and ACK packets exchanged between the client and server to establish a connection.

  • SSL handshake involves exchanging certificates, negotiating encryption algorithms, and generating session keys.

  • TCP 3-way handshake is used in TCP/IP protocol, while SSL handshake ...read more

Add your answer

Q60. Name place which area what learning the studies skill of communications

Ans.

One place where I learned communication skills is at my university's debate club.

  • University debate club taught me how to articulate my thoughts clearly and persuasively.

  • I also learned how to actively listen and respond to others' arguments.

  • Participating in group discussions and presentations improved my teamwork and public speaking skills.

  • I also took a communication course which taught me about nonverbal communication and effective writing.

Add your answer

Q61. What power dbm in BBU to RRH?

Ans.

The power dbm in BBU to RRH is determined by the distance between them and the required signal strength.

  • The power dbm is dependent on the distance between the BBU and RRH.

  • The required signal strength also plays a role in determining the power dbm.

  • Factors such as obstacles and interference can affect the power dbm.

  • The power dbm can be adjusted through the use of attenuators or amplifiers.

Add your answer

Q62. Explain GPON architect

Ans.

GPON architect is a passive optical network technology that uses fiber-optics to deliver high-speed internet access.

  • GPON stands for Gigabit Passive Optical Network.

  • It uses a point-to-multipoint architecture to provide fiber to the home or business.

  • GPON technology allows for high-speed internet access, VoIP, IPTV, and other services over a single fiber connection.

  • It uses a combination of OLT (Optical Line Terminal) at the service provider's end and ONT (Optical Network Termina...read more

Add your answer

Q63. - What is DNS

Ans.

DNS stands for Domain Name System. It is a system that translates domain names into IP addresses.

  • DNS is like a phonebook for the internet

  • It helps to locate websites by translating domain names into IP addresses

  • DNS servers store information about domain names and their corresponding IP addresses

  • DNS queries are sent by web browsers to DNS servers to resolve domain names

  • DNS can also be used for other purposes such as email routing and network diagnostics

View 1 answer

Q64. What is the difference between IPv4 and IPv6 address

Ans.

IPv4 addresses are 32-bit numerical labels used to identify devices on a network, while IPv6 addresses are 128-bit numerical labels.

  • IPv4 addresses are written in decimal format separated by periods (e.g. 192.168.1.1), while IPv6 addresses are written in hexadecimal format separated by colons (e.g. 2001:0db8:85a3:0000:0000:8a2e:0370:7334).

  • IPv4 addresses have a limited address space, allowing for approximately 4.3 billion unique addresses, while IPv6 addresses have a significan...read more

Add your answer

Q65. How to install a router

Ans.

To install a router, connect it to a power source, connect it to a modem, configure the settings, and connect devices to the network.

  • Connect the router to a power source using the provided power adapter.

  • Connect the router to a modem using an Ethernet cable.

  • Access the router's settings through a web browser by entering the default IP address (e.g. 192.168.1.1).

  • Follow the on-screen instructions to set up the network name (SSID) and password.

  • Connect devices to the network by ent...read more

Add your answer

Q66. What is firewall,vpn,TCP/ip

Ans.

Firewall is a network security system that monitors and controls incoming and outgoing network traffic. VPN is a secure connection over a public network. TCP/IP is a set of protocols governing the internet.

  • Firewall is a network security system that monitors and controls incoming and outgoing network traffic

  • VPN is a secure connection over a public network, allowing users to securely access a private network

  • TCP/IP is a set of protocols governing the internet, including how data...read more

Add your answer

Q67. OSI layers and it's purpose

Ans.

OSI layers are a conceptual framework that standardizes the functions of a telecommunication or computing system into seven abstraction layers.

  • Physical layer - transmits raw data bits over a physical medium

  • Data link layer - provides error detection and correction

  • Network layer - routes data packets to their destination

  • Transport layer - ensures reliable data transfer

  • Session layer - establishes, maintains, and terminates connections

  • Presentation layer - translates data into a for...read more

Add your answer

Q68. What is a GSM architecture?

Ans.

GSM architecture refers to the network structure of a GSM system.

  • Consists of three main components: Mobile Station, Base Station Subsystem, and Network and Switching Subsystem

  • Mobile Station includes the physical device and SIM card

  • Base Station Subsystem includes Base Transceiver Station and Base Station Controller

  • Network and Switching Subsystem includes Mobile Switching Center, Home Location Register, and Visitor Location Register

  • Allows for communication between mobile device...read more

Add your answer

Q69. What is BSOD and how to resolve it?

Ans.

BSOD stands for Blue Screen of Death. It is an error screen displayed on Windows operating systems when a system error occurs.

  • BSOD is caused by hardware or software issues

  • To resolve BSOD, try restarting the computer or running a system diagnostic

  • Update drivers and software to prevent future BSODs

  • Examples of BSOD errors include IRQL_NOT_LESS_OR_EQUAL and SYSTEM_SERVICE_EXCEPTION

Add your answer

Q70. What is a router and how does it work

Ans.

A router is a networking device that forwards data packets between computer networks. It operates at the network layer of the OSI model.

  • Routes data packets between different networks

  • Uses IP addresses to determine where to send data packets

  • Can be wired or wireless

  • Provides security features like firewall and NAT

  • Examples: Cisco, Netgear, TP-Link

Add your answer

Q71. Tell us a proverb that relates you most

Ans.

Actions speak louder than words.

  • This proverb reflects my belief in the importance of demonstrating one's abilities through actions rather than just talking about them.

  • I believe in the power of hard work and dedication to achieve success.

  • I prioritize showing results and delivering on promises over making empty promises.

  • An example of this in my work is consistently meeting deadlines and exceeding expectations through my actions.

  • I believe in leading by example and showing others...read more

Add your answer

Q72. Tell about banglore. To spell name and contact number.

Ans.

Bangalore is a bustling city in southern India known for its IT industry, parks, and nightlife.

  • Bangalore is the capital city of the Indian state of Karnataka.

  • It is also known as the Silicon Valley of India due to its thriving IT industry.

  • The city is home to many beautiful parks such as Lalbagh Botanical Garden and Cubbon Park.

  • Bangalore has a vibrant nightlife with many pubs and clubs.

  • To spell the name, it's B-A-N-G-A-L-O-R-E. Contact number varies depending on the person or b...read more

Add your answer

Q73. What are the type of tickets you handled

Ans.

I have handled various types of tickets including network connectivity issues, security policy configurations, VPN troubleshooting, and software upgrades.

  • Network connectivity issues

  • Security policy configurations

  • VPN troubleshooting

  • Software upgrades

Add your answer

Q74. Flexibility about shift timings and job location

Ans.

I am flexible with shift timings and job location to ensure smooth operations and adaptability.

  • I am open to working different shifts, including nights and weekends, to ensure 24/7 coverage for network security

  • I am willing to relocate if necessary to take on new opportunities and challenges in different locations

  • I understand the importance of being adaptable in the fast-paced field of network security

Add your answer

Q75. Ip address how to find

Ans.

An IP address can be found by checking network settings on a device or using online tools.

  • Check network settings on device (e.g. Windows: Control Panel > Network and Sharing Center > Change adapter settings)

  • Use online tools like ipchicken.com or whatismyip.com

  • Command prompt: type 'ipconfig' (Windows) or 'ifconfig' (Mac/Linux)

Add your answer

Q76. Explain OSI model

Ans.

The OSI model is a conceptual framework that standardizes the functions of a telecommunication or computing system into seven layers.

  • The OSI model stands for Open Systems Interconnection model

  • It helps in understanding how data is transferred over a network

  • Each layer has specific functions and interacts with adjacent layers

  • Examples of layers include physical layer, data link layer, network layer, etc.

Add your answer

Q77. What you expect ctc

Ans.

I expect a competitive salary based on my experience and skills.

  • I am looking for a salary that reflects my technical expertise and industry standards.

  • I am open to negotiation based on the responsibilities and benefits offered.

  • I am looking for a total compensation package that includes salary, bonuses, and benefits.

  • I am interested in opportunities for career growth and advancement within the company.

Add your answer

Q78. Forwarding vs Delegation vs Stub zone

Ans.

Forwarding, delegation, and stub zones are all methods of DNS resolution.

  • Forwarding involves sending DNS queries to another DNS server for resolution.

  • Delegation involves assigning responsibility for a subdomain to another DNS server.

  • Stub zones are a copy of a zone's NS records used to reduce DNS query traffic.

  • All three methods can improve DNS performance and reliability.

  • Forwarding and delegation can be configured at the DNS server level.

  • Stub zones are configured on the DNS cl...read more

Add your answer

Q79. What is TLS Handshake?

Ans.

TLS Handshake is a process of establishing a secure connection between a client and a server.

  • TLS Handshake involves a series of steps to establish a secure connection

  • It includes negotiation of encryption algorithm, exchange of keys, and verification of digital certificates

  • TLS Handshake ensures confidentiality, integrity, and authenticity of data transmitted over the network

  • Examples of applications using TLS Handshake are HTTPS, SMTPS, FTPS, etc.

Add your answer

Q80. How to resolve network issue?

Ans.

To resolve network issues, start by identifying the problem and then troubleshoot using various tools and techniques.

  • Identify the problem by checking network connectivity, IP addresses, and DNS settings.

  • Use network diagnostic tools like ping, traceroute, and nslookup to troubleshoot.

  • Check network hardware like routers, switches, and cables for any issues.

  • Update network drivers and firmware to ensure they are up-to-date.

  • Reset network settings or restart network devices if nece...read more

Add your answer

Q81. EPC COMPONENT 5 TEC DIFFERENCE B/W 2G,3G,4G

Ans.

The TEC difference between 2G, 3G, and 4G refers to the technological advancements and capabilities of each generation.

  • 2G (Second Generation) technology primarily focused on voice communication and introduced digital encryption.

  • 3G (Third Generation) technology brought faster data transfer speeds, enabling internet access and video calling.

  • 4G (Fourth Generation) technology further improved data speeds, allowing for high-quality video streaming and online gaming.

  • Each generation...read more

Add your answer

Q82. Difference between TCP and udp

Ans.

TCP is connection-oriented, reliable, and slower, while UDP is connectionless, unreliable, and faster.

  • TCP is connection-oriented, meaning it establishes a connection before sending data, while UDP is connectionless.

  • TCP is reliable as it ensures all data packets are received in order and without errors, while UDP does not guarantee delivery.

  • TCP is slower due to the overhead of error-checking and retransmission, while UDP is faster as it has less overhead.

  • Examples: TCP is used ...read more

Add your answer

Q83. Difference Between PUSH and URG Flag

Ans.

PUSH flag is used to indicate the start of a new TCP session while URG flag is used to indicate urgent data.

  • PUSH flag is set when a sender wants to push data to the receiver without waiting for a full buffer

  • URG flag is set when a sender wants to indicate that some data is urgent and should be processed immediately

  • PUSH flag is used to initiate a new session while URG flag is used to indicate the presence of urgent data within an existing session

Add your answer

Q84. What is domain and how to works

Ans.

A domain is a group of computers and devices on a network that are administered as a unit with common rules and procedures.

  • Domains are used to manage and organize network resources.

  • They provide centralized authentication and authorization for users and computers.

  • Domains use a hierarchical naming structure called the Domain Name System (DNS) to identify and locate resources on the network.

  • Active Directory is a popular domain-based directory service used in Windows environments...read more

Add your answer

Q85. what are the languages u know .

Ans.

I am proficient in English and Spanish.

  • Proficient in English and Spanish

  • Can read, write, and speak both languages fluently

  • Have experience translating documents from English to Spanish and vice versa

Add your answer

Q86. IPsec main mode messages information? Ospf attempt state wher to use ?

Add your answer

Q87. let var const difference, this keyword

Ans.

var, let, const are used to declare variables in JavaScript. 'this' keyword refers to the current object.

  • var is function-scoped, let is block-scoped, const is block-scoped and cannot be reassigned

  • 'this' keyword refers to the current object in which it is used

  • Example: var x = 10; let y = 20; const z = 30; this.name = 'John';

Add your answer

Q88. Difference between 32bit and 64 bit

Ans.

32-bit and 64-bit refer to the size of the memory addresses used by a computer's processor.

  • 32-bit systems can address up to 4GB of RAM, while 64-bit systems can address much larger amounts of RAM.

  • 64-bit systems can handle larger files and perform more complex calculations than 32-bit systems.

  • 64-bit systems provide better performance and can run 32-bit software as well.

  • Some software may not be compatible with both 32-bit and 64-bit systems.

Add your answer

Q89. What is Time Machine ?

Ans.

Time Machine is a concept in science fiction that refers to a device or technology capable of traveling through time.

  • Time Machine is a popular concept in science fiction literature, movies, and TV shows.

  • It is often depicted as a device or technology that allows individuals to travel to the past or future.

  • The concept of Time Machine was popularized by H.G. Wells' novel 'The Time Machine' published in 1895.

  • Time travel in Time Machine can be achieved through various means such a...read more

Add your answer

Q90. What is Active Directory ?

Ans.

Active Directory is a directory service developed by Microsoft for managing network resources and user accounts.

  • Active Directory is used to centrally manage and authenticate users, computers, and other network resources in a Windows domain.

  • It provides a hierarchical structure of objects, such as users, groups, and organizational units (OUs), which can be organized and managed based on administrative needs.

  • Active Directory enables single sign-on (SSO) functionality, allowing u...read more

Add your answer

Q91. What is RDP server and how to works

Ans.

RDP server is a remote desktop protocol server that allows users to remotely access a computer or server.

  • RDP server is a software application that runs on a server and allows remote access to that server's desktop.

  • It works by transmitting the graphical user interface of the server to the client computer over the network.

  • RDP server uses the Remote Desktop Protocol (RDP) to establish a connection between the client and server.

  • It allows users to access files, applications, and o...read more

Add your answer

Q92. Differents between WAN IP and IPv4

Ans.

WAN IP is the public IP address assigned to a network by the ISP, while IPv4 is a specific type of IP address used for identifying devices on a network.

  • WAN IP is used for communication over the internet, while IPv4 is used for communication within a local network.

  • WAN IP is unique to each network and can be dynamic or static, while IPv4 addresses are unique to each device on a network.

  • Examples of WAN IP addresses include 203.0.113.1, while examples of IPv4 addresses include 19...read more

Add your answer

Q93. Different between High-level and low level language , Definition Prepositions

Add your answer

Q94. How will you handle customer

Ans.

I will handle customers by providing timely and effective communication, understanding their needs, and offering solutions to their problems.

  • Listen actively to understand customer concerns

  • Communicate clearly and effectively to address customer needs

  • Offer solutions and follow up to ensure customer satisfaction

Add your answer

Q95. Encryption and deception of packet

Ans.

Encryption and deception of packet

  • Encryption is the process of converting plain text into cipher text to protect data from unauthorized access

  • Packet deception is a technique used to mislead attackers by sending fake packets to divert their attention

  • Combining encryption and packet deception can enhance network security by making it difficult for attackers to intercept and decipher data

  • Tools like honeypots and honeynets can be used for packet deception

Add your answer

Q96. What is dynamic host control protocol?

Ans.

Dynamic Host Configuration Protocol (DHCP) is a network management protocol used to automatically assign IP addresses to devices on a network.

  • DHCP assigns IP addresses dynamically to devices on a network

  • It helps in reducing the manual configuration of IP addresses

  • DHCP servers lease IP addresses to devices for a specific period of time

  • DHCP also provides other network configuration information such as subnet mask and default gateway

Add your answer

Q97. How do you deal with escalations?

Ans.

I address escalations by actively listening, empathizing, investigating root causes, collaborating with stakeholders, and implementing solutions.

  • Listen to the concerns of the parties involved

  • Show empathy and understanding towards the situation

  • Investigate the root causes of the escalation

  • Collaborate with all stakeholders to find a resolution

  • Implement solutions to prevent future escalations

Add your answer

Q98. workflow of IPSec

Ans.

IPSec is a protocol suite used for secure communication over IP networks.

  • IPSec operates in two modes: Transport mode and Tunnel mode.

  • In Transport mode, only the payload of the IP packet is encrypted and/or authenticated.

  • In Tunnel mode, the entire IP packet is encrypted and/or authenticated.

  • IPSec uses security protocols like Authentication Header (AH) and Encapsulating Security Payload (ESP) to provide data integrity, authentication, and confidentiality.

  • IPSec can be implemente...read more

Add your answer

Q99. Explain about DHCP

Ans.

DHCP stands for Dynamic Host Configuration Protocol, which is a network management protocol used to assign IP addresses automatically to devices on a network.

  • DHCP eliminates the need for manual IP address configuration on each device

  • It dynamically assigns IP addresses to devices when they connect to the network

  • DHCP servers lease IP addresses to devices for a specific period of time

  • DHCP also provides other network configuration information such as subnet mask, default gateway,...read more

Add your answer

Q100. Explain about DNS

Ans.

DNS stands for Domain Name System, which translates domain names to IP addresses.

  • DNS is like a phone book for the internet, translating human-readable domain names (like google.com) to IP addresses (like 172.217.3.206).

  • DNS servers store DNS records, which contain information about domain names and their corresponding IP addresses.

  • DNS operates through a hierarchical system, with different levels of DNS servers responsible for different tasks such as resolving domain names and ...read more

Add your answer
1
2
Contribute & help others!
Write a review
Share interview
Contribute salary
Add office photos

Interview Process at null

based on 70 interviews in the last 1 year
Interview experience
3.8
Good
View more
Interview Tips & Stories
Ace your next interview with expert advice and inspiring stories

Top Interview Questions from Similar Companies

3.9
 • 3.8k Interview Questions
4.2
 • 206 Interview Questions
3.4
 • 159 Interview Questions
4.0
 • 156 Interview Questions
3.8
 • 151 Interview Questions
3.8
 • 140 Interview Questions
View all
Top Movate Interview Questions And Answers
Share an Interview
Stay ahead in your career. Get AmbitionBox app
qr-code
Helping over 1 Crore job seekers every month in choosing their right fit company
70 Lakh+

Reviews

5 Lakh+

Interviews

4 Crore+

Salaries

1 Cr+

Users/Month

Contribute to help millions
Get AmbitionBox app

Made with ❤️ in India. Trademarks belong to their respective owners. All rights reserved © 2024 Info Edge (India) Ltd.

Follow us
  • Youtube
  • Instagram
  • LinkedIn
  • Facebook
  • Twitter