Orange Business
Proud winner of ABECA 2024 - AmbitionBox Employee Choice Awards
Filter interviews by
I applied via Company Website and was interviewed before Nov 2020. There was 1 interview round.
A network is a group of interconnected devices that communicate with each other to share resources and information.
Networks can be wired or wireless
They can be local (LAN) or wide area (WAN)
They use protocols such as TCP/IP to facilitate communication
Examples include the internet, corporate networks, and home networks
The basic steps of network troubleshooting involve identifying the problem, gathering information, isolating the issue, testing solutions, and implementing fixes.
Identify the problem by gathering information from the user or monitoring tools
Isolate the issue by checking connectivity, configurations, and logs
Test potential solutions by implementing changes or using diagnostic tools
Implement fixes by applying changes to ...
VLAN stands for Virtual Local Area Network. It is a logical grouping of devices on a network based on function, project, or application.
VLANs allow network administrators to segment a network into smaller, more manageable groups.
Each VLAN is a separate broadcast domain, which means that broadcasts sent by a device in one VLAN are not seen by devices in other VLANs.
There are two types of VLANs: port-based VLANs and tag-...
STP stands for Spanning Tree Protocol. Port Fast is a feature in STP that allows a port to bypass the listening and learning states.
STP is a protocol used to prevent loops in a network by blocking redundant paths
It works by electing a root bridge and calculating the shortest path to it
Port Fast is a feature that allows a port to immediately transition to forwarding state, bypassing the listening and learning states
It i...
OSPF is a routing protocol used in IP networks to distribute IP routing information.
OSPF stands for Open Shortest Path First
It is a link-state routing protocol
OSPF packets include Hello, Database Description, Link State Request, Link State Update, and Link State Acknowledgement
Hello packets are used to establish and maintain neighbor relationships
Database Description packets are used to exchange information about the c...
A router is a networking device that forwards data packets between computer networks.
Routers operate at the network layer of the OSI model.
They use routing tables to determine the best path for data to travel.
Routers can connect different types of networks, such as LANs and WANs.
Examples of routers include Cisco, Juniper, and TP-Link.
Routers can provide security features such as firewalls and VPNs.
L2 switches operate at the data link layer and L3 switches operate at the network layer.
L2 switches forward traffic based on MAC addresses while L3 switches forward traffic based on IP addresses.
L2 switches are simpler and less expensive than L3 switches.
L3 switches can perform routing functions and support multiple VLANs while L2 switches cannot.
L3 switches are used in larger networks where routing and VLANs are neces...
A firewall is a network security device that monitors and controls incoming and outgoing network traffic based on predetermined security rules.
Firewall acts as a barrier between a trusted internal network and an untrusted external network.
It filters network traffic based on IP addresses, ports, protocols, and other criteria.
Firewalls can be hardware-based or software-based.
They can be configured to allow or block speci...
Policy is a set of rules or guidelines that dictate how a network should be managed and used.
Identify the purpose of the policy
Define the scope of the policy
Determine the target audience
Create the policy document
Communicate the policy to all stakeholders
Enforce the policy and regularly review and update it
posted on 4 Mar 2024
I appeared for an interview before Mar 2024, where I was asked the following questions.
I applied via Naukri.com and was interviewed in Mar 2022. There were 4 interview rounds.
Use pre-staged image and fast transfer methods to achieve IOS upgrade within 10 minutes.
Pre-stage the image on the device before the upgrade window
Use fast transfer methods like TFTP or FTP to transfer the image quickly
Ensure all necessary configurations are saved and backed up before the upgrade
Have a rollback plan in case of any issues during the upgrade
I applied via Approached by Company and was interviewed in Nov 2023. There was 1 interview round.
Routing is the process of selecting the best path for network traffic to reach its destination.
Routing helps in directing network traffic efficiently
It determines the best path for data packets to travel from source to destination
Routing protocols like OSPF, BGP, and EIGRP are used to exchange routing information
Routing tables are used to store information about network paths
Dynamic routing adjusts to network changes a
IPS stands for Intrusion Prevention System. It is a network security technology that monitors network traffic to detect and prevent malicious activities.
IPS is a network security technology that monitors network traffic in real-time.
It can detect and prevent malicious activities such as hacking attempts, malware infections, and denial-of-service attacks.
IPS works by analyzing network packets, comparing them to a databa...
Firewall works at the network layer.
Firewall operates at the network layer of the OSI model.
It filters and controls incoming and outgoing network traffic based on predetermined security rules.
Examples of firewalls include hardware firewalls, software firewalls, and cloud-based firewalls.
Firewall generations refer to the evolution of firewall technology and their roles in network security.
First generation firewalls - packet filtering based on IP addresses and ports
Second generation firewalls - stateful inspection and improved security features
Third generation firewalls - application layer filtering and deep packet inspection
Fourth generation firewalls - next-generation firewalls with advanced threat pr...
IP Spoofing is a technique where an attacker impersonates another device by falsifying IP address in order to gain unauthorized access.
IP Spoofing involves manipulating the source IP address in a packet to deceive the recipient.
It is commonly used in DDoS attacks to hide the true source of the attack traffic.
Prevention methods include implementing ingress and egress filtering on network devices.
Examples of tools used f
I applied via Naukri.com and was interviewed before Sep 2019. There were 3 interview rounds.
I applied via Naukri.com and was interviewed in Sep 2020. There was 1 interview round.
posted on 6 Jan 2021
I applied via Naukri.com and was interviewed in Jul 2020. There were 4 interview rounds.
posted on 15 Sep 2021
I appeared for an interview before Sep 2020.
Round duration - 90 minutes
Round difficulty - Easy
It happens in very friendly manner.
Given an 'M x N' matrix, print all the possible paths from the top-left corner to the bottom-right corner. You can only move either right (from (i,j) to (i,j+1)) or dow...
Print all possible paths from top-left to bottom-right in a matrix by moving only right or down.
Use backtracking to explore all possible paths from top-left to bottom-right in the matrix.
At each cell, recursively explore moving right and down until reaching the bottom-right corner.
Keep track of the current path and add it to the result when reaching the destination.
Yes, I can create 2 tables in SQL and perform operations like INSERT, SELECT, UPDATE, and DELETE.
Create Table 1: CREATE TABLE employees (id INT, name VARCHAR(50), salary DECIMAL(10,2));
Create Table 2: CREATE TABLE departments (dept_id INT, dept_name VARCHAR(50));
Insert Data: INSERT INTO employees VALUES (1, 'John Doe', 50000);
Select Data: SELECT * FROM employees WHERE salary > 40000;
Update Data: UPDATE employees SET...
Round duration - 90 minutes
Round difficulty - Medium
No problem occur very friendly environment.
Round duration - 90 minutes
Round difficulty - Hard
You need to determine all possible paths for a rat starting at position (0, 0) in a square maze to reach its destination at (N-1, N-1). The maze is represented as an N*N ma...
Find all possible paths for a rat in a maze from source to destination.
Use backtracking to explore all possible paths in the maze.
Keep track of visited cells to avoid revisiting them.
Explore all possible directions (up, down, left, right) from each cell.
Add the current direction to the path and recursively explore further.
If the destination is reached, add the path to the list of valid paths.
Tip 1 : Competitive programming plays a major role when you are appearing for coding rounds as a fresher. In the coding rounds, you won't get direct problems copied from Geeksforgeeks or Leetcode. You would be required to use your logical thinking to go ahead in the process. This is where competitive programming helps.
Tip 2 : Coding rounds are all about Coding + Timing. Most people fail to excel due to the pressure of a timer ticking on your head. So, instead of just solving problems, try to participate in timed contests. This will help you be used to the pressure of the timer.
Tip 3 : Many big companies like Microsoft, Amazon, and even Google expect you to be good at standard problems. So, once you are done with coding round by your logical skills and competitive programming, you must be well versed with some standard problems in order to excel.
Application resume tips for other job seekersTip 1 : Make it short, crisp, and simple. It is always good to have a 1 pager resume.
Tip 2 : Resume must comprise of the following: Educational Qualifications, Technical skills, Projects, Work experience (if any), Achievements. Other than this, you may include some extra co-curricular achievements.
based on 6 reviews
Rating in categories
Network Engineer
363
salaries
| ₹2 L/yr - ₹9.5 L/yr |
Technical Consultant
334
salaries
| ₹2.2 L/yr - ₹10.5 L/yr |
Senior Technical Consultant
277
salaries
| ₹5.7 L/yr - ₹21.5 L/yr |
Software Engineer
232
salaries
| ₹4 L/yr - ₹16.4 L/yr |
Senior Software Engineer
205
salaries
| ₹10.1 L/yr - ₹31 L/yr |
Virtusa Consulting Services
Nagarro
Sopra Steria
Sutherland Global Services