Movate
100+ JK Cement Interview Questions and Answers
Q101. How do you deal with escalations?
I address escalations by actively listening, empathizing, investigating root causes, collaborating with stakeholders, and implementing solutions.
Listen to the concerns of the parties involved
Show empathy and understanding towards the situation
Investigate the root causes of the escalation
Collaborate with all stakeholders to find a resolution
Implement solutions to prevent future escalations
Q102. workflow of IPSec
IPSec is a protocol suite used for secure communication over IP networks.
IPSec operates in two modes: Transport mode and Tunnel mode.
In Transport mode, only the payload of the IP packet is encrypted and/or authenticated.
In Tunnel mode, the entire IP packet is encrypted and/or authenticated.
IPSec uses security protocols like Authentication Header (AH) and Encapsulating Security Payload (ESP) to provide data integrity, authentication, and confidentiality.
IPSec can be implemente...read more
Q103. Explain about DHCP
DHCP stands for Dynamic Host Configuration Protocol, which is a network management protocol used to assign IP addresses automatically to devices on a network.
DHCP eliminates the need for manual IP address configuration on each device
It dynamically assigns IP addresses to devices when they connect to the network
DHCP servers lease IP addresses to devices for a specific period of time
DHCP also provides other network configuration information such as subnet mask, default gateway,...read more
Q104. Explain about DNS
DNS stands for Domain Name System, which translates domain names to IP addresses.
DNS is like a phone book for the internet, translating human-readable domain names (like google.com) to IP addresses (like 172.217.3.206).
DNS servers store DNS records, which contain information about domain names and their corresponding IP addresses.
DNS operates through a hierarchical system, with different levels of DNS servers responsible for different tasks such as resolving domain names and ...read more
Q105. Explain about OSI
OSI (Open Systems Interconnection) model is a conceptual framework that standardizes the functions of a telecommunication or computing system into seven abstraction layers.
OSI model has 7 layers: Physical, Data Link, Network, Transport, Session, Presentation, Application
Each layer has specific functions and communicates with adjacent layers
Example: HTTP operates at the Application layer, while TCP operates at the Transport layer
Q106. Explain about ARP
ARP stands for Address Resolution Protocol, used to map IP addresses to MAC addresses on a local network.
ARP is used to find the MAC address of a device based on its IP address.
It operates at the data link layer of the OSI model.
ARP requests are broadcasted to all devices on the local network.
Once the device with the corresponding IP address responds, its MAC address is stored in the ARP table.
ARP cache poisoning is a common attack where a malicious device sends false ARP mes...read more
Q107. Difference between IPV4 and IPV6
IPv4 uses 32-bit addresses while IPv6 uses 128-bit addresses.
IPv4 uses a 32-bit address format, allowing for approximately 4.3 billion unique addresses.
IPv6 uses a 128-bit address format, allowing for an enormous number of unique addresses.
IPv4 addresses are written in decimal format (e.g., 192.168.0.1), while IPv6 addresses are written in hexadecimal format (e.g., 2001:0db8:85a3:0000:0000:8a2e:0370:7334).
IPv4 has a limited address space and is running out of available addres...read more
Q108. What is TCP 3 way handshake
TCP 3 way handshake is a process used to establish a connection between a client and a server in a TCP/IP network.
Client sends a SYN packet to the server to initiate the connection
Server responds with a SYN-ACK packet to acknowledge the request
Client sends an ACK packet back to the server to confirm the connection establishment
Q109. What softwares do you use ?
I primarily use ArcGIS, QGIS, and Google Earth for GIS analysis and mapping.
ArcGIS
QGIS
Google Earth
Q110. How SSL handshake works
SSL handshake is a process where a client and server establish a secure connection by exchanging encryption keys and verifying identities.
Client sends a hello message to server with supported encryption algorithms
Server responds with its own hello message, including its certificate
Client verifies server's certificate and generates a pre-master secret
Both client and server use the pre-master secret to generate a unique session key for encryption
Encrypted communication begins u...read more
Q111. What are the networking protocols
Networking protocols are sets of rules that govern communication between devices on a network.
Common networking protocols include TCP/IP, HTTP, FTP, SMTP, and DNS
Protocols define how data is formatted, transmitted, received, and acknowledged
They ensure that devices can communicate effectively and securely over a network
Q112. Introduction biggest achievement cahhlenges faced
My biggest achievement was successfully leading a team to implement a new network infrastructure, overcoming technical challenges along the way.
Led a team to implement a new network infrastructure
Overcame technical challenges during the project
Achieved successful implementation within the set timeline and budget
Q113. Describe the osi and tcp models?
The OSI model is a conceptual framework that standardizes the functions of a telecommunication or computing system into seven different layers. The TCP/IP model is a concise version of the OSI model, with four layers.
OSI model has 7 layers: Physical, Data Link, Network, Transport, Session, Presentation, Application
TCP/IP model has 4 layers: Network Interface, Internet, Transport, Application
OSI model is a theoretical model, while TCP/IP model is a practical implementation
OSI ...read more
Q114. What is static and dynamic ip?
Static IP is a fixed IP address assigned to a device, while dynamic IP is one that changes each time a device connects to the network.
Static IP remains constant, while dynamic IP changes
Static IP is manually configured, dynamic IP is assigned by DHCP
Static IP is typically used for servers, dynamic IP for regular devices
Q115. Application support Experiences
I have extensive experience providing application support for various software systems.
Managed troubleshooting and resolving technical issues for end users
Collaborated with development teams to implement bug fixes and enhancements
Provided training and documentation for users to improve system utilization
Q116. What are the fibre types?
Fibre types refer to the different types of optical fibers used in networking.
Single-mode fiber: used for long-distance communication, has a small core size
Multi-mode fiber: used for shorter distances, has a larger core size
Plastic optical fiber (POF): made of plastic instead of glass, used in home networks
Q117. Ospf and eigrp different
OSPF and EIGRP are both routing protocols used in computer networks, but they differ in several ways.
OSPF is a link-state protocol, while EIGRP is a distance-vector protocol.
OSPF uses a hierarchical network design, while EIGRP uses a flat network design.
OSPF supports multiple paths to a destination, while EIGRP only supports a single path.
OSPF uses a metric based on bandwidth, while EIGRP uses a composite metric based on bandwidth, delay, reliability, load, and MTU.
OSPF is an...read more
Q118. Ospf routing in broadcast
OSPF routing in broadcast is a method of routing in which OSPF packets are sent to all devices on a network segment.
OSPF packets are sent to all devices on a network segment, regardless of whether they need the information or not.
This method is used in networks where there are multiple routers on a single segment.
Broadcast OSPF packets are sent using multicast addresses.
This method can be less efficient than other OSPF routing methods, such as point-to-point or non-broadcast....read more
Q119. What is the SINR
Q120. Have you ever used maps
Yes, I have used maps extensively in my work as a GIS Engineer.
I have experience working with various types of maps, including topographic, thematic, and digital maps.
I have used maps to analyze spatial data and create visual representations of data.
I have also used maps to perform geocoding and geolocation tasks.
Examples of software I have used to work with maps include ArcGIS, QGIS, and Google Maps API.
Q121. Explain DHCP and DORA process
DHCP is a network protocol that dynamically assigns IP addresses to devices on a network. DORA process involves Discover, Offer, Request, and Acknowledge stages.
DHCP Discover: Client broadcasts a request for IP address
DHCP Offer: Server responds with an available IP address
DHCP Request: Client requests the offered IP address
DHCP Acknowledge: Server confirms the IP address assignment
Q122. What is Gratuitous ARP
Gratuitous ARP is a type of Address Resolution Protocol message where a device announces its own IP address to update ARP caches.
Gratuitous ARP is used to update ARP caches in network devices.
It is sent as a broadcast message with the sender and target IP addresses being the same.
It helps prevent IP address conflicts and update ARP tables efficiently.
Example: A server sends a Gratuitous ARP message to update all devices in the network about its new IP address.
Q123. What is SSL Handshake
SSL Handshake is the process of securely exchanging keys and establishing a secure connection between a client and server.
SSL Handshake involves multiple steps such as client hello, server hello, key exchange, and authentication.
During the handshake, the client and server agree on encryption algorithms and exchange keys to establish a secure connection.
SSL Handshake ensures that the data transmitted between the client and server is encrypted and secure.
If the SSL Handshake fa...read more
Q124. Define network and types of networks
A network is a group of interconnected devices that can communicate and share resources. There are several types of networks.
Local Area Network (LAN) - a network that covers a small area such as a home or office
Wide Area Network (WAN) - a network that covers a large geographical area such as a city or country
Wireless Local Area Network (WLAN) - a LAN that uses wireless technology to connect devices
Metropolitan Area Network (MAN) - a network that covers a larger area than a LA...read more
Q125. Commands of juniper and cisco
Juniper and Cisco use different command-line interfaces for network configuration and management.
Cisco uses 'enable' to enter privileged mode; Juniper uses 'cli'.
To view interfaces, Cisco uses 'show ip interface brief'; Juniper uses 'show interfaces terse'.
For configuration, Cisco uses 'configure terminal'; Juniper uses 'edit'.
To save configuration, Cisco uses 'write memory'; Juniper uses 'commit'.
Cisco commands often start with 'show', while Juniper uses 'show' followed by t...read more
Q126. What are css elements?
CSS elements are the building blocks of Cascading Style Sheets that define the appearance of HTML elements.
CSS elements are used to style HTML elements
They include selectors, properties, and values
Selectors target specific HTML elements, while properties define their appearance
Values determine the specific style of the property
Examples of CSS elements include color, font-size, margin, padding, etc.
Q127. Switching concept in RST
RSTP is a protocol used to prevent loops in a network by dynamically disabling ports.
RSTP stands for Rapid Spanning Tree Protocol
It is an improvement over STP (Spanning Tree Protocol)
RSTP uses port roles (root, designated, alternate, backup) to determine which ports should be active
It also uses port states (discarding, learning, forwarding) to prevent loops
RSTP can detect and respond to topology changes faster than STP
Q128. Day to day work activities
Day to day work activities involve troubleshooting network issues, configuring devices, and providing technical support to customers.
Troubleshooting network issues
Configuring devices
Providing technical support to customers
Q129. API flow from controller to service
API flow involves passing data from controller to service layer for processing.
Controller receives API request and extracts data
Controller calls appropriate service method with the extracted data
Service layer processes the data and returns the result to the controller
Q130. Which tool you working
I primarily work with tools such as LabVIEW, MATLAB, and Python for data analysis and automation.
LabVIEW
MATLAB
Python
Q131. What is dependency injection
Dependency injection is a design pattern in which components are given their dependencies rather than creating them internally.
Dependency injection helps in achieving loose coupling between classes.
It allows for easier testing and maintenance of code.
There are three types of dependency injection: constructor injection, setter injection, and interface injection.
Q132. Packet tracer real life scenario
Packet tracer real life scenario involves simulating network configurations and troubleshooting issues in a virtual environment.
Create a network topology with routers, switches, and end devices
Configure IP addresses, VLANs, routing protocols, and access control lists
Simulate network traffic and troubleshoot connectivity issues
Use tools like ping, traceroute, and Wireshark to analyze network traffic
Q133. TCP/IP in detail
TCP/IP is a set of protocols that governs the way data is transmitted over the internet.
TCP/IP stands for Transmission Control Protocol/Internet Protocol.
It is a suite of communication protocols used to connect network devices on the internet.
TCP ensures that data is reliably transmitted between devices.
IP is responsible for addressing and routing data packets across networks.
Examples of TCP/IP applications include web browsing, email, and file transfer.
Q134. What is lan ,wan?
LAN stands for Local Area Network, which connects devices within a limited area. WAN stands for Wide Area Network, which connects devices over a large geographical area.
LAN is typically used in homes, offices, or small businesses.
WAN is used to connect multiple LANs together over a larger distance.
LAN has higher data transfer speeds compared to WAN.
Examples of LAN technologies include Ethernet and Wi-Fi.
Examples of WAN technologies include the Internet and leased lines.
Q135. What is bandwidth?
Bandwidth refers to the maximum amount of data that can be transmitted over a network connection in a given amount of time.
Bandwidth is typically measured in bits per second (bps), kilobits per second (kbps), or megabits per second (mbps).
It determines how fast data can be uploaded or downloaded from the internet.
Higher bandwidth allows for faster internet speeds and smoother streaming of videos and music.
Bandwidth can be limited by factors such as network congestion or the t...read more
Q136. Working domain in previous project
The working domain in my previous project was e-commerce
Developed and maintained an online marketplace for various products
Implemented payment gateway integration for secure transactions
Designed and optimized the user interface for better user experience
Q137. LVM commands to create
LVM commands for creating logical volumes
Use 'pvcreate' to initialize physical volumes
Use 'vgcreate' to create volume groups
Use 'lvcreate' to create logical volumes within volume groups
Use 'lvextend' to extend the size of logical volumes
Use 'lvresize' to resize logical volumes
Q138. What is loop and while
Q139. Types of Testing & STLC
Types of testing include functional, non-functional, regression, performance, and security testing. STLC includes planning, design, execution, and reporting.
Functional testing ensures that the software meets the specified requirements.
Non-functional testing checks the software's performance, usability, and security.
Regression testing ensures that changes to the software do not affect existing functionality.
Performance testing checks the software's speed, scalability, and stab...read more
Q140. Ospf states of ospf
OSPF has several states that define the relationship between routers in a network, facilitating efficient routing.
1. Down: Initial state where no hello packets have been received.
2. Init: A router has received a hello packet but hasn't established a neighbor relationship.
3. Two-Way: Routers have exchanged hello packets and can see each other as neighbors.
4. ExStart: Routers negotiate the master/slave relationship for database exchange.
5. Exchange: Routers exchange their link-...read more
Q141. what is DHCP process
DHCP process is a network protocol that dynamically assigns IP addresses to devices on a network.
DHCP client sends a broadcast request for an IP address to DHCP server
DHCP server receives the request and offers an IP address
DHCP client accepts the offer and requests the IP address
DHCP server assigns the IP address to the client
DHCP client acknowledges the assignment
Q142. ARP, DNS, DHCP working process in detail
ARP, DNS, and DHCP are essential networking protocols that facilitate communication between devices on a network.
ARP (Address Resolution Protocol) is used to map IP addresses to MAC addresses on a local network.
DNS (Domain Name System) translates domain names into IP addresses to enable communication over the internet.
DHCP (Dynamic Host Configuration Protocol) assigns IP addresses dynamically to devices on a network.
ARP operates at the data link layer, DNS at the application ...read more
Q143. Switches routers software
Switches and routers are networking devices used to connect devices and networks. Software is used to manage and configure them.
Switches are used to connect devices within a network and manage traffic.
Routers are used to connect different networks and route traffic between them.
Software is used to configure and manage switches and routers, such as Cisco IOS.
Switches and routers can also have specialized software, such as firewall software on a router.
Network engineers must ha...read more
Q144. Difference b/w STLC & SDLC
STLC is a subset of SDLC that focuses on testing activities.
SDLC is a software development life cycle that includes all phases of software development.
STLC is a software testing life cycle that includes all phases of software testing.
SDLC includes requirements gathering, design, development, testing, deployment, and maintenance.
STLC includes test planning, test design, test execution, and test closure.
SDLC is a broader term that encompasses STLC.
STLC is a subset of SDLC that ...read more
Q145. Difference between ajax and httpclient
Ajax is a client-side technology while HttpClient is a server-side library for making HTTP requests.
Ajax is used to update parts of a web page without reloading the entire page.
HttpClient is used to make HTTP requests from a server-side application.
Ajax uses XMLHttpRequest object to send and receive data asynchronously.
HttpClient provides a simpler API for making HTTP requests compared to the low-level Socket API.
Ajax is limited to same-origin policy while HttpClient can be u...read more
Q146. Observable promise type and state
Observable promise type and state
Observable is a type of promise that can emit multiple values over time
It can be in different states like 'next', 'error', and 'complete'
Examples of libraries that use observable promises are RxJS and Angular
Q147. Why tcp need in network
TCP is needed in networks for reliable communication and error detection.
TCP ensures reliable delivery of data by establishing a connection between sender and receiver
It provides error detection and correction through sequence numbers and acknowledgements
TCP also handles flow control to prevent overwhelming the receiver with data
Examples of TCP-based applications include web browsing, email, and file transfer
Q148. How DHCP will work?
DHCP assigns IP addresses to devices on a network automatically.
DHCP server receives a request from a device for an IP address
DHCP server checks its pool of available IP addresses
DHCP server assigns an IP address to the device and sends a response
DHCP lease time determines how long the device can use the assigned IP address
Q149. Arp and it's types
ARP (Address Resolution Protocol) is a protocol used for mapping an IP address to a MAC address.
ARP is used to resolve IP addresses to MAC addresses on a local network.
There are two main types of ARP: ARP Request and ARP Reply.
ARP Request is sent by a device to find the MAC address of another device with a known IP address.
ARP Reply is sent in response to an ARP Request, providing the MAC address of the requested IP address.
Q150. Different between structure and union
Q151. Phase 1 msgs in ipsec
Phase 1 messages in IPsec establish a secure channel for further communication.
Phase 1 negotiates the security parameters for the IPsec tunnel.
It establishes a secure channel using the Internet Key Exchange (IKE) protocol.
Phase 1 messages include SA proposal, key exchange, and authentication.
The negotiation process involves exchanging messages between the two endpoints.
Once Phase 1 is complete, Phase 2 can begin for actual data transmission.
Q152. Describe IPSEC VPN
IPSEC VPN is a secure network connection that uses encryption and authentication to protect data transmitted over the internet.
IPSEC VPN stands for Internet Protocol Security Virtual Private Network.
It provides secure communication between two or more networks over the internet.
IPSEC VPN uses encryption algorithms to ensure confidentiality of data.
It also uses authentication protocols to verify the identity of the communicating parties.
IPSEC VPN can be used to establish secur...read more
Q153. Switch vlan brief ?
Switch vlan brief command displays a summary of VLAN information on a switch.
Used to quickly view VLAN configuration on a switch
Shows VLAN ID, name, status, and ports assigned to each VLAN
Helps troubleshoot VLAN-related issues
Example: 'switch vlan brief' command on Cisco switches
Top HR Questions asked in JK Cement
Interview Process at JK Cement
Top Interview Questions from Similar Companies
Reviews
Interviews
Salaries
Users/Month