Filter interviews by
I applied via Walk-in and was interviewed in Mar 2022. There were 3 interview rounds.
Which is an elastomeric fiber
LAN security refers to the measures taken to protect a local area network from unauthorized access and attacks.
LAN security involves implementing firewalls, antivirus software, and intrusion detection systems.
Access control measures such as passwords, biometric authentication, and encryption are also important.
Regular updates and patches to software and hardware can help prevent vulnerabilities.
Examples of LAN security...
Routers and switches are networking devices used to connect devices in a network.
Routers are used to connect multiple networks together and route traffic between them.
Switches are used to connect devices within a network and direct traffic between them.
Routers operate at the network layer (layer 3) of the OSI model, while switches operate at the data link layer (layer 2).
Examples of routers include Cisco routers, Junip...
I applied via Naukri.com and was interviewed in Mar 2022. There were 3 interview rounds.
To resolve a switch problem, identify the issue, troubleshoot, and apply appropriate solutions.
Identify the specific problem with the switch
Check for physical connectivity issues
Verify switch configuration and settings
Restart or reset the switch if necessary
Update firmware or software if outdated
Replace faulty hardware components if needed
I applied via Approached by Company and was interviewed in Nov 2021. There were 2 interview rounds.
Top trending discussions
posted on 9 Jan 2025
I applied via Campus Placement and was interviewed in Dec 2024. There were 4 interview rounds.
Mcq questions on python aws database and networks ans os
8 members in a panel and they gave a topic generally a social issue or a general topic you can a lot about
posted on 4 Jan 2025
I applied via Naukri.com and was interviewed in Dec 2024. There were 2 interview rounds.
Singleton pattern ensures a class has only one instance and provides a global point of access to it.
Singleton pattern can be implemented by making the constructor private and providing a static method to access the instance.
The pattern can be broken by using reflection to access the private constructor and create multiple instances.
Another way to break the Singleton pattern is by using multiple class loaders in Java.
Th...
HashMap internally uses an array of linked lists to store key-value pairs. To store duplicate keys, we can use a custom implementation of HashMap.
HashMap internally uses an array of linked lists to handle collisions.
To store duplicate keys, we can create a custom HashMap implementation that allows multiple values for the same key.
One approach is to use a HashMap with values as lists, where each key can have multiple va
Use compensating transactions and distributed tracing for managing transaction and logging in case of service B failure.
Implement compensating transactions to rollback changes made by service B in case of failure.
Use distributed tracing to track the flow of requests and identify where the failure occurred.
Implement retry mechanisms to handle transient failures in service B.
Use circuit breakers to prevent cascading fail...
I applied via Naukri.com and was interviewed in Nov 2024. There were 2 interview rounds.
The Aptitude Test session accesses mathematical and logical reasoning abilities
Vlookup is a function in Excel used to search for a value in a table and return a corresponding value from another column.
Vlookup stands for 'Vertical Lookup'
It is commonly used in Excel to search for a value in the leftmost column of a table and return a value in the same row from a specified column
Syntax: =VLOOKUP(lookup_value, table_array, col_index_num, [range_lookup])
Example: =VLOOKUP(A2, B2:D10, 3, FALSE) - searc...
My day in my previous organization involved analyzing large datasets, creating reports, and presenting findings to stakeholders.
Reviewing and cleaning large datasets to ensure accuracy
Creating visualizations and reports to communicate insights
Collaborating with team members to identify trends and patterns
Presenting findings to stakeholders in meetings or presentations
I possess strong technical skills in data analysis, including proficiency in programming languages, statistical analysis, and data visualization tools.
Proficient in programming languages such as Python, R, SQL
Skilled in statistical analysis and data modeling techniques
Experience with data visualization tools like Tableau, Power BI
Knowledge of machine learning algorithms and techniques
A Pivot Table is a data summarization tool used in spreadsheet programs to analyze, summarize, and present data in a tabular format.
Pivot tables allow users to reorganize and summarize selected columns and rows of data to obtain desired insights.
Users can easily group and filter data, perform calculations, and create visualizations using pivot tables.
Pivot tables are commonly used in Excel and other spreadsheet program...
To find the highest-paid employee in each department, we need to group employees by department and then select the employee with the highest salary in each group.
Group employees by department
Find the employee with the highest salary in each group
Retrieve the employee's name, salary, and department name
The aptitude test lasts 30 minutes and focuses on topics relevant to data engineering, including Spark, SQL, Azure, and PySpark.
The coding test is a one-hour examination on PySpark.
posted on 7 Jan 2025
I applied via Job Portal and was interviewed in Dec 2024. There was 1 interview round.
posted on 13 Jan 2025
I applied via Naukri.com and was interviewed in Dec 2024. There was 1 interview round.
I applied via Walk-in and was interviewed in Nov 2024. There was 1 interview round.
based on 49 reviews
Rating in categories
Network Engineer
19
salaries
| ₹1.2 L/yr - ₹4.5 L/yr |
Senior Network Engineer
11
salaries
| ₹3.8 L/yr - ₹6 L/yr |
Senior Engineer
7
salaries
| ₹2.3 L/yr - ₹6 L/yr |
Network Administrator
7
salaries
| ₹2.2 L/yr - ₹6 L/yr |
Softwaretest Engineer
6
salaries
| ₹3.6 L/yr - ₹4.5 L/yr |
DXC Technology
NTT Data Information Processing Services
Sutherland Global Services
Virtusa Consulting Services