Add office photos
Employer?
Claim Account for FREE

Orange Business

4.3
based on 1.3k Reviews
Video summary
Proud winner of ABECA 2024 - AmbitionBox Employee Choice Awards
Filter interviews by

60+ Zahran Assinged Royal Commission Hospital Ksa Interview Questions and Answers

Updated 15 Jan 2025

Q1. Spring ? SPRING BOOT? WHY SPRING BOOT? Use of Kafka? How Kafka can be used differently, give some use cases example? Spark ? And why we use spark, how it is different from Hadoop? Why we use spark if we can do...

read more
Ans.

Spring Boot is a framework for building Java applications. Kafka is a distributed streaming platform. Spark is a fast and general-purpose cluster computing system. Java Stream API is used for processing collections of data.

  • Spring Boot is preferred for its simplicity and convention-over-configuration approach.

  • Kafka is used for building real-time streaming data pipelines and applications.

  • Kafka can be used for various use cases like log aggregation, event sourcing, and messaging...read more

View 1 answer

Q2. what is policy ? what is basic step to create policy ?

Ans.

Policy is a set of rules or guidelines that dictate how a network should be managed and used.

  • Identify the purpose of the policy

  • Define the scope of the policy

  • Determine the target audience

  • Create the policy document

  • Communicate the policy to all stakeholders

  • Enforce the policy and regularly review and update it

Add your answer

Q3. what is ospf ? explain types of packet in ospf ?

Ans.

OSPF is a routing protocol used in IP networks to distribute IP routing information.

  • OSPF stands for Open Shortest Path First

  • It is a link-state routing protocol

  • OSPF packets include Hello, Database Description, Link State Request, Link State Update, and Link State Acknowledgement

  • Hello packets are used to establish and maintain neighbor relationships

  • Database Description packets are used to exchange information about the contents of the link-state database

  • Link State Request packe...read more

Add your answer

Q4. what is difference between L2 and L3 Switch ?

Ans.

L2 switches operate at the data link layer and L3 switches operate at the network layer.

  • L2 switches forward traffic based on MAC addresses while L3 switches forward traffic based on IP addresses.

  • L2 switches are simpler and less expensive than L3 switches.

  • L3 switches can perform routing functions and support multiple VLANs while L2 switches cannot.

  • L3 switches are used in larger networks where routing and VLANs are necessary.

  • Examples of L2 switches include Cisco Catalyst 2960 a...read more

View 1 answer
Discover Zahran Assinged Royal Commission Hospital Ksa interview dos and don'ts from real experiences

Q5. what is basic steps of network troubleshooting ?

Ans.

The basic steps of network troubleshooting involve identifying the problem, gathering information, isolating the issue, testing solutions, and implementing fixes.

  • Identify the problem by gathering information from the user or monitoring tools

  • Isolate the issue by checking connectivity, configurations, and logs

  • Test potential solutions by implementing changes or using diagnostic tools

  • Implement fixes by applying changes to the network devices or configurations

  • Verify the resolution...read more

View 1 answer

Q6. what is stp ? what is port fast in stp ?

Ans.

STP stands for Spanning Tree Protocol. Port Fast is a feature in STP that allows a port to bypass the listening and learning states.

  • STP is a protocol used to prevent loops in a network by blocking redundant paths

  • It works by electing a root bridge and calculating the shortest path to it

  • Port Fast is a feature that allows a port to immediately transition to forwarding state, bypassing the listening and learning states

  • It is used on ports that are not connected to other switches t...read more

Add your answer
Are these interview questions helpful?

Q7. How can we get the number of active users with E3 license using script.

Ans.

To get the number of active users with E3 license, you can use PowerShell script.

  • Use the Get-MsolUser cmdlet to retrieve all users with E3 license

  • Filter the results to get only the active users

  • Count the number of users in the filtered results

Add your answer

Q8. what is vlan ? how many types of vlan ?

Ans.

VLAN stands for Virtual Local Area Network. It is a logical grouping of devices on a network based on function, project, or application.

  • VLANs allow network administrators to segment a network into smaller, more manageable groups.

  • Each VLAN is a separate broadcast domain, which means that broadcasts sent by a device in one VLAN are not seen by devices in other VLANs.

  • There are two types of VLANs: port-based VLANs and tag-based VLANs.

  • Port-based VLANs assign ports on a switch to a...read more

Add your answer
Share interview questions and help millions of jobseekers 🌟

Q9. What are SIP Methods / Requests and Responses?

Ans.

SIP Methods/Requests and Responses are protocols used in Session Initiation Protocol for communication between devices.

  • SIP Methods/Requests are used to initiate and control communication sessions.

  • SIP Responses are used to provide feedback and status information during the session.

  • Examples of SIP Methods/Requests include INVITE, ACK, BYE, and CANCEL.

  • Examples of SIP Responses include 200 OK, 404 Not Found, and 503 Service Unavailable.

View 1 answer

Q10. What's is the function of switch and router how to use in networking

Ans.

Switches connect devices within a network, while routers connect different networks and enable communication between them.

  • Switches operate at the data link layer of the OSI model and use MAC addresses to forward data within a network.

  • Routers operate at the network layer of the OSI model and use IP addresses to route data between different networks.

  • Switches create multiple collision domains, while routers create multiple broadcast domains.

  • Switches are used in LANs to connect d...read more

Add your answer

Q11. What is Early offer and Late offer in SIP?

Ans.

Early offer and Late offer are two negotiation methods used in Session Initiation Protocol (SIP) for establishing a media session.

  • Early offer is when the caller includes the media capabilities in the initial INVITE message.

  • Late offer is when the caller waits until the 200 OK response to include the media capabilities.

  • Early offer allows the callee to make an informed decision about the media session upfront.

  • Late offer allows the callee to negotiate the media session parameters...read more

View 1 answer

Q12. 1. How router install routes in routing table 2. IPsec VPN types 3. application slowness troubleshooting 4 Some questions from F5 LTM.

Ans.

Questions on router routing table, IPsec VPN types, application slowness troubleshooting, and F5 LTM.

  • Router installs routes in routing table using routing protocols such as OSPF, BGP, etc.

  • IPsec VPN types include site-to-site, remote access, and extranet VPNs.

  • Application slowness troubleshooting involves checking network latency, server performance, and application code.

  • F5 LTM questions may include load balancing algorithms, SSL offloading, and iRules scripting.

Add your answer

Q13. Architecture of Openshift, What services you have used

Ans.

OpenShift is a container application platform that provides a secure and scalable environment for deploying and managing applications.

  • OpenShift architecture is based on Kubernetes and Docker

  • It provides a platform for building, deploying, and managing containerized applications

  • Services used in OpenShift include Kubernetes, Docker, etcd, and others

Add your answer

Q14. what is IP address, internet of thing, structure of internet on thing

Ans.

IP address is a unique identifier assigned to devices connected to a network. Internet of Things refers to the interconnectivity of devices.

  • IP address is a numerical label assigned to each device connected to a network

  • It is used to identify and communicate with devices on the network

  • Internet of Things refers to the network of physical devices, vehicles, home appliances, and other items embedded with electronics, software, sensors, and connectivity

  • These devices can communicate...read more

Add your answer

Q15. How to troubleshoot application issue from the Network proactive

Ans.

To troubleshoot application issue from the Network proactive, follow these steps:

  • Check network connectivity

  • Verify DNS settings

  • Check firewall settings

  • Check for any recent changes made to the network or application

  • Use network monitoring tools to identify any issues

  • Check application logs for any errors or warnings

  • Try restarting the application or server

  • Contact the application vendor for support

Add your answer

Q16. What is the role of as eng. To improve network

Ans.

The role of a network engineer is to improve network performance, security, and reliability through design, implementation, and maintenance.

  • Designing and implementing network upgrades to increase performance

  • Implementing security measures to protect against cyber threats

  • Monitoring network traffic and troubleshooting issues to ensure reliability

  • Optimizing network configurations for efficiency

  • Collaborating with other IT professionals to ensure seamless network operations

Add your answer

Q17. Previous projects deep explanation and architecture explain

Ans.

I have worked on multiple projects, including a healthcare management system and an e-commerce platform.

  • Developed a healthcare management system using Java and Spring framework

  • Designed the architecture for an e-commerce platform using microservices

  • Implemented RESTful APIs for data retrieval and manipulation

  • Utilized cloud services like AWS for scalability and reliability

  • Integrated third-party payment gateways for secure transactions

Add your answer

Q18. what is network ?

Ans.

A network is a group of interconnected devices that communicate with each other to share resources and information.

  • Networks can be wired or wireless

  • They can be local (LAN) or wide area (WAN)

  • They use protocols such as TCP/IP to facilitate communication

  • Examples include the internet, corporate networks, and home networks

Add your answer

Q19. How IPsec or GRE tunnel are used to do migration from existing network to SASE architecture

Ans.

IPsec and GRE tunnels can be used to securely migrate from existing network to SASE architecture.

  • IPsec tunnels can provide secure communication between on-premises network and SASE architecture by encrypting traffic.

  • GRE tunnels can be used to encapsulate and transport traffic between different network environments during migration.

  • Both IPsec and GRE tunnels can help ensure data confidentiality and integrity during the migration process.

  • For example, an organization can establi...read more

Add your answer
Asked in
SME Interview

Q20. what is SDWAN and how it is better than legacy technology

Ans.

SDWAN stands for Software-Defined Wide Area Network, a modern networking technology that offers improved performance, security, and flexibility compared to legacy systems.

  • SDWAN allows for centralized control and management of network traffic, making it easier to optimize performance and prioritize critical applications.

  • It offers better security features such as encryption and segmentation, reducing the risk of cyber attacks and data breaches.

  • SDWAN is more cost-effective than ...read more

Add your answer

Q21. what is firewall ?

Ans.

A firewall is a network security device that monitors and controls incoming and outgoing network traffic based on predetermined security rules.

  • Firewall acts as a barrier between a trusted internal network and an untrusted external network.

  • It filters network traffic based on IP addresses, ports, protocols, and other criteria.

  • Firewalls can be hardware-based or software-based.

  • They can be configured to allow or block specific types of traffic.

  • Examples of firewalls include Cisco A...read more

View 1 answer

Q22. What is the difference between tcp / udp protocall

Ans.

TCP is a connection-oriented protocol while UDP is a connectionless protocol.

  • TCP provides reliable, ordered, and error-checked delivery of data while UDP does not guarantee any of these.

  • TCP is slower but more reliable while UDP is faster but less reliable.

  • TCP is used for applications that require high reliability and accuracy while UDP is used for applications that require speed and efficiency.

  • Examples of TCP-based applications include email, file transfer, and web browsing w...read more

Add your answer

Q23. What is SBC?

Ans.

SBC stands for Single Board Computer. It is a complete computer built on a single circuit board.

  • SBC is a self-contained computer system with all the necessary components on a single board.

  • It includes a processor, memory, storage, input/output interfaces, and other essential components.

  • SBCs are commonly used in embedded systems, IoT devices, and industrial applications.

  • Examples of SBCs include Raspberry Pi, Arduino, and BeagleBone.

View 1 answer

Q24. How to design HA in active passive environment

Ans.

Designing HA in active passive environment involves ensuring redundancy and failover mechanisms.

  • Identify critical components and services that require high availability

  • Implement redundancy by setting up a secondary system that can take over in case of failure

  • Ensure automatic failover mechanisms are in place to minimize downtime

  • Regularly test the failover mechanisms to ensure they work as expected

  • Consider load balancing to distribute traffic between active and passive systems

  • I...read more

Add your answer

Q25. what is router ?

Ans.

A router is a networking device that forwards data packets between computer networks.

  • Routers operate at the network layer of the OSI model.

  • They use routing tables to determine the best path for data to travel.

  • Routers can connect different types of networks, such as LANs and WANs.

  • Examples of routers include Cisco, Juniper, and TP-Link.

  • Routers can provide security features such as firewalls and VPNs.

Add your answer

Q26. Network layers description and how it works

Ans.

Network layers are a hierarchical approach to network communication, with each layer responsible for specific functions.

  • There are seven layers in the OSI model: Physical, Data Link, Network, Transport, Session, Presentation, and Application.

  • Each layer performs specific tasks and communicates with adjacent layers to facilitate data transfer.

  • For example, the Physical layer deals with the physical connection between devices, while the Application layer handles user interfaces an...read more

Add your answer

Q27. What do you mean by Risk and impact assessment?

Ans.

Risk and impact assessment involves identifying potential risks and evaluating their potential impact on a project or organization.

  • Identifying potential risks that could affect the project or organization

  • Assessing the likelihood of each risk occurring

  • Evaluating the potential impact of each risk on the project or organization

  • Developing strategies to mitigate or manage the identified risks

  • Regularly reviewing and updating the risk and impact assessment throughout the project or ...read more

Add your answer

Q28. Commands that you will use to check BGP peer status

Ans.

To check BGP peer status, use commands like 'show ip bgp summary', 'show bgp neighbor', and 'show ip bgp neighbors'.

  • Use 'show ip bgp summary' command to display a summary of BGP peer status

  • Use 'show bgp neighbor' command to view detailed information about BGP neighbors

  • Use 'show ip bgp neighbors' command to check the status of specific BGP neighbors

  • These commands provide information about the state, uptime, and prefixes exchanged with BGP peers

Add your answer

Q29. 1. different dax function in power bi 2. no. of modules in python

Ans.

DAX functions are used in Power BI to perform calculations and create custom formulas. Python has numerous modules for various purposes.

  • DAX functions in Power BI are used for data manipulation, aggregation, and calculations.

  • Some commonly used DAX functions include SUM, AVERAGE, COUNT, MAX, MIN, and CALCULATE.

  • Python has a vast number of modules available for different purposes such as math, datetime, random, os, etc.

  • Examples of Python modules are math module for mathematical o...read more

Add your answer

Q30. How to handle P1 case

Ans.

Handling a P1 case involves immediate response and resolution to minimize impact on users.

  • Acknowledge the P1 case promptly and inform the user about the priority level.

  • Gather all necessary information from the user to understand the issue.

  • Escalate the case to the appropriate team or individual with the required expertise.

  • Provide regular updates to the user regarding the progress and estimated resolution time.

  • Ensure proper documentation of the case for future reference and ana...read more

View 1 answer

Q31. What is data packet traffic movement?

Ans.

Data packet traffic movement refers to the flow of data packets between devices on a network.

  • Data packets are units of data that are transmitted over a network.

  • Traffic movement refers to the movement of these data packets between devices on the network.

  • This movement is controlled by network protocols and routing algorithms.

  • Examples of data packet traffic movement include sending an email, streaming a video, or downloading a file.

Add your answer

Q32. 1. Explain the vcenter migration process 2. Difference between vsphere versions

Ans.

vCenter migration process involves planning, preparation, execution, and validation. vSphere versions differ in features and capabilities.

  • vCenter migration process involves assessing current environment, planning the migration, preparing the new environment, executing the migration, and validating the migration.

  • Differences between vSphere versions include feature sets, scalability limits, and compatibility with hardware and software.

  • For example, vSphere 6.5 introduced feature...read more

Add your answer
Asked in
SME Interview

Q33. What is OSI model and different with TCP/IP

Ans.

OSI model is a conceptual framework that standardizes the functions of a telecommunication or computing system into seven layers.

  • OSI model has 7 layers: Physical, Data Link, Network, Transport, Session, Presentation, Application.

  • TCP/IP model has 4 layers: Network Interface, Internet, Transport, Application.

  • OSI model is a theoretical model, while TCP/IP model is a practical implementation.

  • OSI model is more detailed and divides the communication process into smaller tasks, whil...read more

Add your answer

Q34. different layers of osi models.

Ans.

The OSI model has 7 layers that define how data is transmitted over a network.

  • Layer 1: Physical layer - deals with the physical aspects of transmitting data

  • Layer 2: Data link layer - responsible for error-free transfer of data between nodes

  • Layer 3: Network layer - handles routing of data between different networks

  • Layer 4: Transport layer - ensures reliable delivery of data between applications

  • Layer 5: Session layer - establishes and manages connections between applications

  • Lay...read more

Add your answer

Q35. What is ssl persistence in F5.

Ans.

SSL persistence is a feature in F5 that allows a client to maintain a secure connection with the same server during a session.

  • SSL persistence ensures that a client's SSL session is maintained with the same server throughout the session.

  • This feature is useful in scenarios where multiple servers are used to handle client requests.

  • SSL persistence can be configured based on SSL session ID, SSL session ticket, or SSL session match across multiple requests.

  • For example, if a client ...read more

Add your answer

Q36. How does fortigate stop dos attack

Ans.

Fortigate uses various techniques to stop DOS attacks.

  • Fortigate can detect and block traffic from known malicious sources

  • It can also limit the number of connections from a single IP address

  • Fortigate can use rate limiting to prevent excessive traffic from a single source

  • It can also use packet filtering to drop packets from known DOS attack patterns

  • Fortigate can also use behavior-based detection to identify and block abnormal traffic patterns

Add your answer

Q37. How to upgrade the vcenter server?

Ans.

To upgrade the vCenter server, you can use the vSphere Update Manager or the vCenter Server Appliance Management Interface.

  • Use vSphere Update Manager to upgrade the vCenter server

  • Download the latest version of vCenter server from VMware website

  • Follow the upgrade wizard in vSphere Update Manager to complete the upgrade process

  • Alternatively, use the vCenter Server Appliance Management Interface for upgrading the vCenter Server Appliance

Add your answer

Q38. How many types of baseline in VMware?

Ans.

There are two types of baselines in VMware: Host Baseline and VM Baseline.

  • Host Baseline: Used to compare the current version of ESXi hosts with a desired version.

  • VM Baseline: Used to compare the current version of virtual machines with a desired version.

Add your answer

Q39. How a packet travels in a network

Ans.

A packet travels in a network by being encapsulated at each layer of the OSI model and then routed through switches and routers.

  • Packet is created at the application layer and then encapsulated with headers at each subsequent layer (transport, network, data link).

  • Packet is then transmitted over physical medium (copper wire, fiber optic cable, wireless) to the destination.

  • Routers and switches use IP addresses and MAC addresses to forward the packet to the correct destination.

  • Pa...read more

Add your answer

Q40. What are WAN and routing protocols?

Ans.

WAN stands for Wide Area Network and routing protocols are used to determine the path for data to travel in a network.

  • WAN is a network that spans over a large geographical area

  • Routing protocols are used to determine the best path for data to travel in a network

  • Examples of routing protocols include OSPF, BGP, and EIGRP

Add your answer

Q41. What is GDP option in four choose in one

Ans.

GDP stands for Gross Domestic Product and is a measure of a country's economic output.

  • GDP is the total value of goods and services produced in a country in a given period of time

  • It is used to measure a country's economic growth and development

  • There are four options for calculating GDP: expenditure approach, income approach, production approach, and value-added approach

Add your answer

Q42. How to troubleshoot IPsec vpns

Ans.

To troubleshoot IPsec vpns, check configuration, logs, and network connectivity.

  • Check if the configuration is correct and matches on both ends

  • Check the logs for any error messages or warnings

  • Verify network connectivity between the two endpoints

  • Check for any firewall or NAT issues

  • Ensure that the correct encryption and authentication algorithms are being used

  • Check for any MTU issues

  • Verify that the VPN tunnel is up and running

  • Use packet capture tools to analyze traffic

Add your answer

Q43. what is differenece docker vs virtualization

Add your answer

Q44. What is PSX

Ans.

PSX stands for PlayStation X, a gaming console developed by Sony.

  • PSX is a gaming console released by Sony in 2003.

  • It was a redesigned version of the original PlayStation console.

  • The PSX featured a built-in DVD recorder and hard drive for recording television programs.

  • It was only released in Japan and had limited success in the market.

View 1 answer

Q45. IT infrastructure for Data Center

Ans.

IT infrastructure for Data Center

  • The IT infrastructure for a data center should be designed to support the needs of the organization.

  • It should include servers, storage, networking equipment, and power and cooling systems.

  • The infrastructure should be scalable and flexible to accommodate future growth and changes in technology.

  • Security measures should be in place to protect the data center from unauthorized access and cyber attacks.

  • Regular maintenance and monitoring of the infr...read more

Add your answer

Q46. Designing of Datacenter

Ans.

Designing a datacenter involves careful planning and consideration of various factors.

  • Determine the purpose and requirements of the datacenter

  • Select appropriate hardware and software

  • Consider power and cooling requirements

  • Ensure redundancy and backup systems are in place

  • Plan for scalability and future growth

  • Ensure security measures are implemented

  • Test and validate the design before implementation

Add your answer

Q47. Difference between SIAM and ITIL?

Ans.

SIAM focuses on managing multiple service providers, while ITIL focuses on best practices for IT service management.

  • SIAM stands for Service Integration and Management, while ITIL stands for Information Technology Infrastructure Library.

  • SIAM focuses on managing multiple service providers and ensuring seamless service delivery across them.

  • ITIL provides a framework of best practices for IT service management, focusing on processes and procedures to improve efficiency and effecti...read more

Add your answer
Asked in
SME Interview

Q48. expalin IP Header process in detail

Ans.

IP Header process involves adding necessary information to data packets for routing and delivery.

  • IP Header contains source and destination IP addresses.

  • It also includes information about packet length, protocol, and checksum.

  • IP Header is added to the data packet before it is sent over the network.

  • Routers use the information in the IP Header to determine the best path for the packet.

  • Example: Source IP address: 192.168.1.1, Destination IP address: 10.0.0.1

Add your answer

Q49. What is ip address

Ans.

An IP address is a unique numerical identifier assigned to every device connected to the internet.

  • IP stands for Internet Protocol

  • It consists of a series of numbers separated by dots

  • There are two types of IP addresses: IPv4 and IPv6

  • IPv4 addresses are 32-bit numbers and IPv6 addresses are 128-bit numbers

  • Example of IPv4 address: 192.168.0.1

  • Example of IPv6 address: 2001:0db8:85a3:0000:0000:8a2e:0370:7334

Add your answer

Q50. Do you know kubernetes?

Ans.

Yes, I am familiar with Kubernetes and have experience working with it in various projects.

  • I have experience deploying and managing containerized applications using Kubernetes

  • I am proficient in creating and managing Kubernetes clusters

  • I have worked with Kubernetes resources such as Pods, Deployments, Services, and ConfigMaps

Add your answer

Q51. Explain the working of traceroute

Ans.

Traceroute is a network diagnostic tool used to track the path packets take from one networked device to another.

  • Traceroute sends out packets with increasing TTL values to map the path to the destination.

  • Each router along the path decrements the TTL and sends back an ICMP Time Exceeded message.

  • The sender records the IP address of each router to trace the route taken by the packets.

  • Traceroute helps identify network issues like high latency or packet loss.

  • Example: 'traceroute w...read more

Add your answer

Q52. Prerequisites for Data Center

Ans.

Prerequisites for a data center include power supply, cooling system, network connectivity, and security measures.

  • Sufficient power supply to support all equipment

  • Effective cooling system to prevent overheating

  • Reliable network connectivity for data transfer

  • Robust security measures to protect against cyber threats

  • Backup power source to ensure uninterrupted operation

  • Proper fire suppression system to prevent damage

  • Monitoring and management tools to ensure optimal performance

Add your answer

Q53. Describe ITIL process

Ans.

ITIL is a framework for IT service management that aims to align IT services with the needs of the business.

  • ITIL stands for Information Technology Infrastructure Library

  • It consists of five core publications: Service Strategy, Service Design, Service Transition, Service Operation, and Continual Service Improvement

  • ITIL processes include Incident Management, Problem Management, Change Management, Release Management, and Service Level Management

  • ITIL helps organizations to improve...read more

Add your answer

Q54. Difference between IPsec and GRE

Ans.

IPsec provides secure communication over the internet, while GRE is a tunneling protocol for encapsulating various network layer protocols.

  • IPsec is a suite of protocols used to secure internet protocol (IP) communications by authenticating and encrypting each IP packet.

  • GRE is a tunneling protocol that encapsulates a wide variety of network layer protocols inside virtual point-to-point links.

  • IPsec can be used to create VPNs for secure remote access or site-to-site connections....read more

Add your answer

Q55. Technical Implementation on SASE Zscaler

Ans.

SASE Zscaler is a cloud-native security platform that combines networking and security services.

  • SASE Zscaler provides secure access to applications and data from any device and location.

  • It offers zero trust network access, secure web gateway, firewall as a service, and more.

  • Implementation involves setting up policies, configuring connectors, and monitoring traffic.

  • Example: Configuring user authentication methods, defining access control policies, and analyzing traffic logs.

Add your answer

Q56. Explain HSRP in detail

Ans.

HSRP (Hot Standby Router Protocol) is a Cisco proprietary protocol that provides redundancy for IP networks by allowing two or more routers to work together in a virtual router group.

  • HSRP is used to provide high availability and failover in a network.

  • It uses a virtual IP address and a virtual MAC address to represent the group of routers.

  • One router is elected as the active router, while the others are in standby mode.

  • The active router forwards traffic for the virtual IP addre...read more

Add your answer

Q57. Current job tasks CCNA

Ans.

My current job tasks include utilizing my CCNA certification to troubleshoot network issues and provide technical support to end-users.

  • Troubleshoot network issues

  • Provide technical support to end-users

  • Utilize CCNA certification

  • Maintain accurate records of service requests and resolutions

Add your answer

Q58. Explain Classless Addressing

Ans.

Classless addressing is a method of assigning IP addresses without using predefined classes.

  • IP address is divided into two parts: network prefix and host identifier

  • CIDR notation is used to represent classless addressing

  • Allows for more efficient use of IP addresses

  • Example: 192.168.1.0/24

  • Subnet masks are not used in classless addressing

Add your answer

Q59. What is cloud conputing

Ans.

Cloud computing is the delivery of computing services over the internet, including storage, servers, databases, networking, software, and more.

  • Allows users to access and store data and applications on remote servers instead of on local devices

  • Provides scalability, flexibility, and cost-efficiency for businesses

  • Examples include Amazon Web Services (AWS), Microsoft Azure, and Google Cloud Platform

Add your answer

Q60. what is eks and cloudwatch

Add your answer

Q61. Explain variable subnetting

Ans.

Variable subnetting is a technique used to divide a network into smaller subnets with varying sizes.

  • Allows for more efficient use of IP addresses

  • Can accommodate different network sizes

  • Requires careful planning and management

  • Example: A network with 192.168.0.0/16 can be divided into subnets with different sizes such as /24, /25, /26, etc.

Add your answer

Q62. How to create LVM

Ans.

LVM (Logical Volume Management) allows for flexible disk space allocation by creating logical volumes from physical volumes.

  • Create physical volumes using pvcreate command

  • Create volume group using vgcreate command

  • Create logical volume using lvcreate command

  • Format the logical volume with a filesystem using mkfs command

  • Mount the logical volume to a directory using mount command

Add your answer

Q63. How sql execute

Ans.

SQL executes by parsing the query, creating an execution plan, and retrieving data from the database.

  • SQL query is sent to the database server for processing

  • Database server parses the query to understand the operations to be performed

  • An execution plan is created to optimize the query performance

  • Data is retrieved from the database based on the query criteria

  • Results are returned to the user

Add your answer

Q64. When can we join

Add your answer

Q65. Technologies used

Ans.

I have experience with a variety of technologies including networking, virtualization, cloud computing, and automation tools.

  • Networking technologies such as TCP/IP, DNS, DHCP

  • Virtualization platforms like VMware, Hyper-V

  • Cloud computing services like AWS, Azure

  • Automation tools such as Ansible, Puppet

Add your answer

More about working at Orange Business

Top Rated Mid-Sized Company - 2024
Top Rated IT/ITES Company - 2024
Contribute & help others!
Write a review
Share interview
Contribute salary
Add office photos

Interview Process at Zahran Assinged Royal Commission Hospital Ksa

based on 60 interviews
Interview experience
4.1
Good
View more
Interview Tips & Stories
Ace your next interview with expert advice and inspiring stories

Top Interview Questions from Similar Companies

3.7
 • 6.3k Interview Questions
3.7
 • 262 Interview Questions
3.8
 • 181 Interview Questions
4.2
 • 173 Interview Questions
3.7
 • 140 Interview Questions
3.9
 • 138 Interview Questions
View all
Top Orange Business Interview Questions And Answers
Share an Interview
Stay ahead in your career. Get AmbitionBox app
qr-code
Helping over 1 Crore job seekers every month in choosing their right fit company
70 Lakh+

Reviews

5 Lakh+

Interviews

4 Crore+

Salaries

1 Cr+

Users/Month

Contribute to help millions

Made with ❤️ in India. Trademarks belong to their respective owners. All rights reserved © 2024 Info Edge (India) Ltd.

Follow us
  • Youtube
  • Instagram
  • LinkedIn
  • Facebook
  • Twitter