Orange Business
60+ Zahran Assinged Royal Commission Hospital Ksa Interview Questions and Answers
Q1. Spring ? SPRING BOOT? WHY SPRING BOOT? Use of Kafka? How Kafka can be used differently, give some use cases example? Spark ? And why we use spark, how it is different from Hadoop? Why we use spark if we can do...
read moreSpring Boot is a framework for building Java applications. Kafka is a distributed streaming platform. Spark is a fast and general-purpose cluster computing system. Java Stream API is used for processing collections of data.
Spring Boot is preferred for its simplicity and convention-over-configuration approach.
Kafka is used for building real-time streaming data pipelines and applications.
Kafka can be used for various use cases like log aggregation, event sourcing, and messaging...read more
Q2. what is policy ? what is basic step to create policy ?
Policy is a set of rules or guidelines that dictate how a network should be managed and used.
Identify the purpose of the policy
Define the scope of the policy
Determine the target audience
Create the policy document
Communicate the policy to all stakeholders
Enforce the policy and regularly review and update it
Q3. what is ospf ? explain types of packet in ospf ?
OSPF is a routing protocol used in IP networks to distribute IP routing information.
OSPF stands for Open Shortest Path First
It is a link-state routing protocol
OSPF packets include Hello, Database Description, Link State Request, Link State Update, and Link State Acknowledgement
Hello packets are used to establish and maintain neighbor relationships
Database Description packets are used to exchange information about the contents of the link-state database
Link State Request packe...read more
Q4. what is difference between L2 and L3 Switch ?
L2 switches operate at the data link layer and L3 switches operate at the network layer.
L2 switches forward traffic based on MAC addresses while L3 switches forward traffic based on IP addresses.
L2 switches are simpler and less expensive than L3 switches.
L3 switches can perform routing functions and support multiple VLANs while L2 switches cannot.
L3 switches are used in larger networks where routing and VLANs are necessary.
Examples of L2 switches include Cisco Catalyst 2960 a...read more
Q5. what is basic steps of network troubleshooting ?
The basic steps of network troubleshooting involve identifying the problem, gathering information, isolating the issue, testing solutions, and implementing fixes.
Identify the problem by gathering information from the user or monitoring tools
Isolate the issue by checking connectivity, configurations, and logs
Test potential solutions by implementing changes or using diagnostic tools
Implement fixes by applying changes to the network devices or configurations
Verify the resolution...read more
Q6. what is stp ? what is port fast in stp ?
STP stands for Spanning Tree Protocol. Port Fast is a feature in STP that allows a port to bypass the listening and learning states.
STP is a protocol used to prevent loops in a network by blocking redundant paths
It works by electing a root bridge and calculating the shortest path to it
Port Fast is a feature that allows a port to immediately transition to forwarding state, bypassing the listening and learning states
It is used on ports that are not connected to other switches t...read more
Q7. How can we get the number of active users with E3 license using script.
To get the number of active users with E3 license, you can use PowerShell script.
Use the Get-MsolUser cmdlet to retrieve all users with E3 license
Filter the results to get only the active users
Count the number of users in the filtered results
Q8. what is vlan ? how many types of vlan ?
VLAN stands for Virtual Local Area Network. It is a logical grouping of devices on a network based on function, project, or application.
VLANs allow network administrators to segment a network into smaller, more manageable groups.
Each VLAN is a separate broadcast domain, which means that broadcasts sent by a device in one VLAN are not seen by devices in other VLANs.
There are two types of VLANs: port-based VLANs and tag-based VLANs.
Port-based VLANs assign ports on a switch to a...read more
Q9. What are SIP Methods / Requests and Responses?
SIP Methods/Requests and Responses are protocols used in Session Initiation Protocol for communication between devices.
SIP Methods/Requests are used to initiate and control communication sessions.
SIP Responses are used to provide feedback and status information during the session.
Examples of SIP Methods/Requests include INVITE, ACK, BYE, and CANCEL.
Examples of SIP Responses include 200 OK, 404 Not Found, and 503 Service Unavailable.
Q10. What's is the function of switch and router how to use in networking
Switches connect devices within a network, while routers connect different networks and enable communication between them.
Switches operate at the data link layer of the OSI model and use MAC addresses to forward data within a network.
Routers operate at the network layer of the OSI model and use IP addresses to route data between different networks.
Switches create multiple collision domains, while routers create multiple broadcast domains.
Switches are used in LANs to connect d...read more
Q11. What is Early offer and Late offer in SIP?
Early offer and Late offer are two negotiation methods used in Session Initiation Protocol (SIP) for establishing a media session.
Early offer is when the caller includes the media capabilities in the initial INVITE message.
Late offer is when the caller waits until the 200 OK response to include the media capabilities.
Early offer allows the callee to make an informed decision about the media session upfront.
Late offer allows the callee to negotiate the media session parameters...read more
Q12. 1. How router install routes in routing table 2. IPsec VPN types 3. application slowness troubleshooting 4 Some questions from F5 LTM.
Questions on router routing table, IPsec VPN types, application slowness troubleshooting, and F5 LTM.
Router installs routes in routing table using routing protocols such as OSPF, BGP, etc.
IPsec VPN types include site-to-site, remote access, and extranet VPNs.
Application slowness troubleshooting involves checking network latency, server performance, and application code.
F5 LTM questions may include load balancing algorithms, SSL offloading, and iRules scripting.
Q13. Architecture of Openshift, What services you have used
OpenShift is a container application platform that provides a secure and scalable environment for deploying and managing applications.
OpenShift architecture is based on Kubernetes and Docker
It provides a platform for building, deploying, and managing containerized applications
Services used in OpenShift include Kubernetes, Docker, etcd, and others
Q14. what is IP address, internet of thing, structure of internet on thing
IP address is a unique identifier assigned to devices connected to a network. Internet of Things refers to the interconnectivity of devices.
IP address is a numerical label assigned to each device connected to a network
It is used to identify and communicate with devices on the network
Internet of Things refers to the network of physical devices, vehicles, home appliances, and other items embedded with electronics, software, sensors, and connectivity
These devices can communicate...read more
Q15. How to troubleshoot application issue from the Network proactive
To troubleshoot application issue from the Network proactive, follow these steps:
Check network connectivity
Verify DNS settings
Check firewall settings
Check for any recent changes made to the network or application
Use network monitoring tools to identify any issues
Check application logs for any errors or warnings
Try restarting the application or server
Contact the application vendor for support
Q16. What is the role of as eng. To improve network
The role of a network engineer is to improve network performance, security, and reliability through design, implementation, and maintenance.
Designing and implementing network upgrades to increase performance
Implementing security measures to protect against cyber threats
Monitoring network traffic and troubleshooting issues to ensure reliability
Optimizing network configurations for efficiency
Collaborating with other IT professionals to ensure seamless network operations
Q17. Previous projects deep explanation and architecture explain
I have worked on multiple projects, including a healthcare management system and an e-commerce platform.
Developed a healthcare management system using Java and Spring framework
Designed the architecture for an e-commerce platform using microservices
Implemented RESTful APIs for data retrieval and manipulation
Utilized cloud services like AWS for scalability and reliability
Integrated third-party payment gateways for secure transactions
Q18. what is network ?
A network is a group of interconnected devices that communicate with each other to share resources and information.
Networks can be wired or wireless
They can be local (LAN) or wide area (WAN)
They use protocols such as TCP/IP to facilitate communication
Examples include the internet, corporate networks, and home networks
Q19. How IPsec or GRE tunnel are used to do migration from existing network to SASE architecture
IPsec and GRE tunnels can be used to securely migrate from existing network to SASE architecture.
IPsec tunnels can provide secure communication between on-premises network and SASE architecture by encrypting traffic.
GRE tunnels can be used to encapsulate and transport traffic between different network environments during migration.
Both IPsec and GRE tunnels can help ensure data confidentiality and integrity during the migration process.
For example, an organization can establi...read more
Q20. what is SDWAN and how it is better than legacy technology
SDWAN stands for Software-Defined Wide Area Network, a modern networking technology that offers improved performance, security, and flexibility compared to legacy systems.
SDWAN allows for centralized control and management of network traffic, making it easier to optimize performance and prioritize critical applications.
It offers better security features such as encryption and segmentation, reducing the risk of cyber attacks and data breaches.
SDWAN is more cost-effective than ...read more
Q21. what is firewall ?
A firewall is a network security device that monitors and controls incoming and outgoing network traffic based on predetermined security rules.
Firewall acts as a barrier between a trusted internal network and an untrusted external network.
It filters network traffic based on IP addresses, ports, protocols, and other criteria.
Firewalls can be hardware-based or software-based.
They can be configured to allow or block specific types of traffic.
Examples of firewalls include Cisco A...read more
Q22. What is the difference between tcp / udp protocall
TCP is a connection-oriented protocol while UDP is a connectionless protocol.
TCP provides reliable, ordered, and error-checked delivery of data while UDP does not guarantee any of these.
TCP is slower but more reliable while UDP is faster but less reliable.
TCP is used for applications that require high reliability and accuracy while UDP is used for applications that require speed and efficiency.
Examples of TCP-based applications include email, file transfer, and web browsing w...read more
Q23. What is SBC?
SBC stands for Single Board Computer. It is a complete computer built on a single circuit board.
SBC is a self-contained computer system with all the necessary components on a single board.
It includes a processor, memory, storage, input/output interfaces, and other essential components.
SBCs are commonly used in embedded systems, IoT devices, and industrial applications.
Examples of SBCs include Raspberry Pi, Arduino, and BeagleBone.
Q24. How to design HA in active passive environment
Designing HA in active passive environment involves ensuring redundancy and failover mechanisms.
Identify critical components and services that require high availability
Implement redundancy by setting up a secondary system that can take over in case of failure
Ensure automatic failover mechanisms are in place to minimize downtime
Regularly test the failover mechanisms to ensure they work as expected
Consider load balancing to distribute traffic between active and passive systems
I...read more
Q25. what is router ?
A router is a networking device that forwards data packets between computer networks.
Routers operate at the network layer of the OSI model.
They use routing tables to determine the best path for data to travel.
Routers can connect different types of networks, such as LANs and WANs.
Examples of routers include Cisco, Juniper, and TP-Link.
Routers can provide security features such as firewalls and VPNs.
Q26. Network layers description and how it works
Network layers are a hierarchical approach to network communication, with each layer responsible for specific functions.
There are seven layers in the OSI model: Physical, Data Link, Network, Transport, Session, Presentation, and Application.
Each layer performs specific tasks and communicates with adjacent layers to facilitate data transfer.
For example, the Physical layer deals with the physical connection between devices, while the Application layer handles user interfaces an...read more
Q27. What do you mean by Risk and impact assessment?
Risk and impact assessment involves identifying potential risks and evaluating their potential impact on a project or organization.
Identifying potential risks that could affect the project or organization
Assessing the likelihood of each risk occurring
Evaluating the potential impact of each risk on the project or organization
Developing strategies to mitigate or manage the identified risks
Regularly reviewing and updating the risk and impact assessment throughout the project or ...read more
Q28. Commands that you will use to check BGP peer status
To check BGP peer status, use commands like 'show ip bgp summary', 'show bgp neighbor', and 'show ip bgp neighbors'.
Use 'show ip bgp summary' command to display a summary of BGP peer status
Use 'show bgp neighbor' command to view detailed information about BGP neighbors
Use 'show ip bgp neighbors' command to check the status of specific BGP neighbors
These commands provide information about the state, uptime, and prefixes exchanged with BGP peers
Q29. 1. different dax function in power bi 2. no. of modules in python
DAX functions are used in Power BI to perform calculations and create custom formulas. Python has numerous modules for various purposes.
DAX functions in Power BI are used for data manipulation, aggregation, and calculations.
Some commonly used DAX functions include SUM, AVERAGE, COUNT, MAX, MIN, and CALCULATE.
Python has a vast number of modules available for different purposes such as math, datetime, random, os, etc.
Examples of Python modules are math module for mathematical o...read more
Q30. How to handle P1 case
Handling a P1 case involves immediate response and resolution to minimize impact on users.
Acknowledge the P1 case promptly and inform the user about the priority level.
Gather all necessary information from the user to understand the issue.
Escalate the case to the appropriate team or individual with the required expertise.
Provide regular updates to the user regarding the progress and estimated resolution time.
Ensure proper documentation of the case for future reference and ana...read more
Q31. What is data packet traffic movement?
Data packet traffic movement refers to the flow of data packets between devices on a network.
Data packets are units of data that are transmitted over a network.
Traffic movement refers to the movement of these data packets between devices on the network.
This movement is controlled by network protocols and routing algorithms.
Examples of data packet traffic movement include sending an email, streaming a video, or downloading a file.
Q32. 1. Explain the vcenter migration process 2. Difference between vsphere versions
vCenter migration process involves planning, preparation, execution, and validation. vSphere versions differ in features and capabilities.
vCenter migration process involves assessing current environment, planning the migration, preparing the new environment, executing the migration, and validating the migration.
Differences between vSphere versions include feature sets, scalability limits, and compatibility with hardware and software.
For example, vSphere 6.5 introduced feature...read more
Q33. What is OSI model and different with TCP/IP
OSI model is a conceptual framework that standardizes the functions of a telecommunication or computing system into seven layers.
OSI model has 7 layers: Physical, Data Link, Network, Transport, Session, Presentation, Application.
TCP/IP model has 4 layers: Network Interface, Internet, Transport, Application.
OSI model is a theoretical model, while TCP/IP model is a practical implementation.
OSI model is more detailed and divides the communication process into smaller tasks, whil...read more
Q34. different layers of osi models.
The OSI model has 7 layers that define how data is transmitted over a network.
Layer 1: Physical layer - deals with the physical aspects of transmitting data
Layer 2: Data link layer - responsible for error-free transfer of data between nodes
Layer 3: Network layer - handles routing of data between different networks
Layer 4: Transport layer - ensures reliable delivery of data between applications
Layer 5: Session layer - establishes and manages connections between applications
Lay...read more
Q35. What is ssl persistence in F5.
SSL persistence is a feature in F5 that allows a client to maintain a secure connection with the same server during a session.
SSL persistence ensures that a client's SSL session is maintained with the same server throughout the session.
This feature is useful in scenarios where multiple servers are used to handle client requests.
SSL persistence can be configured based on SSL session ID, SSL session ticket, or SSL session match across multiple requests.
For example, if a client ...read more
Q36. How does fortigate stop dos attack
Fortigate uses various techniques to stop DOS attacks.
Fortigate can detect and block traffic from known malicious sources
It can also limit the number of connections from a single IP address
Fortigate can use rate limiting to prevent excessive traffic from a single source
It can also use packet filtering to drop packets from known DOS attack patterns
Fortigate can also use behavior-based detection to identify and block abnormal traffic patterns
Q37. How to upgrade the vcenter server?
To upgrade the vCenter server, you can use the vSphere Update Manager or the vCenter Server Appliance Management Interface.
Use vSphere Update Manager to upgrade the vCenter server
Download the latest version of vCenter server from VMware website
Follow the upgrade wizard in vSphere Update Manager to complete the upgrade process
Alternatively, use the vCenter Server Appliance Management Interface for upgrading the vCenter Server Appliance
Q38. How many types of baseline in VMware?
There are two types of baselines in VMware: Host Baseline and VM Baseline.
Host Baseline: Used to compare the current version of ESXi hosts with a desired version.
VM Baseline: Used to compare the current version of virtual machines with a desired version.
Q39. How a packet travels in a network
A packet travels in a network by being encapsulated at each layer of the OSI model and then routed through switches and routers.
Packet is created at the application layer and then encapsulated with headers at each subsequent layer (transport, network, data link).
Packet is then transmitted over physical medium (copper wire, fiber optic cable, wireless) to the destination.
Routers and switches use IP addresses and MAC addresses to forward the packet to the correct destination.
Pa...read more
Q40. What are WAN and routing protocols?
WAN stands for Wide Area Network and routing protocols are used to determine the path for data to travel in a network.
WAN is a network that spans over a large geographical area
Routing protocols are used to determine the best path for data to travel in a network
Examples of routing protocols include OSPF, BGP, and EIGRP
Q41. What is GDP option in four choose in one
GDP stands for Gross Domestic Product and is a measure of a country's economic output.
GDP is the total value of goods and services produced in a country in a given period of time
It is used to measure a country's economic growth and development
There are four options for calculating GDP: expenditure approach, income approach, production approach, and value-added approach
Q42. How to troubleshoot IPsec vpns
To troubleshoot IPsec vpns, check configuration, logs, and network connectivity.
Check if the configuration is correct and matches on both ends
Check the logs for any error messages or warnings
Verify network connectivity between the two endpoints
Check for any firewall or NAT issues
Ensure that the correct encryption and authentication algorithms are being used
Check for any MTU issues
Verify that the VPN tunnel is up and running
Use packet capture tools to analyze traffic
Q43. what is differenece docker vs virtualization
Q44. What is PSX
PSX stands for PlayStation X, a gaming console developed by Sony.
PSX is a gaming console released by Sony in 2003.
It was a redesigned version of the original PlayStation console.
The PSX featured a built-in DVD recorder and hard drive for recording television programs.
It was only released in Japan and had limited success in the market.
Q45. IT infrastructure for Data Center
IT infrastructure for Data Center
The IT infrastructure for a data center should be designed to support the needs of the organization.
It should include servers, storage, networking equipment, and power and cooling systems.
The infrastructure should be scalable and flexible to accommodate future growth and changes in technology.
Security measures should be in place to protect the data center from unauthorized access and cyber attacks.
Regular maintenance and monitoring of the infr...read more
Q46. Designing of Datacenter
Designing a datacenter involves careful planning and consideration of various factors.
Determine the purpose and requirements of the datacenter
Select appropriate hardware and software
Consider power and cooling requirements
Ensure redundancy and backup systems are in place
Plan for scalability and future growth
Ensure security measures are implemented
Test and validate the design before implementation
Q47. Difference between SIAM and ITIL?
SIAM focuses on managing multiple service providers, while ITIL focuses on best practices for IT service management.
SIAM stands for Service Integration and Management, while ITIL stands for Information Technology Infrastructure Library.
SIAM focuses on managing multiple service providers and ensuring seamless service delivery across them.
ITIL provides a framework of best practices for IT service management, focusing on processes and procedures to improve efficiency and effecti...read more
Q48. expalin IP Header process in detail
IP Header process involves adding necessary information to data packets for routing and delivery.
IP Header contains source and destination IP addresses.
It also includes information about packet length, protocol, and checksum.
IP Header is added to the data packet before it is sent over the network.
Routers use the information in the IP Header to determine the best path for the packet.
Example: Source IP address: 192.168.1.1, Destination IP address: 10.0.0.1
Q49. What is ip address
An IP address is a unique numerical identifier assigned to every device connected to the internet.
IP stands for Internet Protocol
It consists of a series of numbers separated by dots
There are two types of IP addresses: IPv4 and IPv6
IPv4 addresses are 32-bit numbers and IPv6 addresses are 128-bit numbers
Example of IPv4 address: 192.168.0.1
Example of IPv6 address: 2001:0db8:85a3:0000:0000:8a2e:0370:7334
Q50. Do you know kubernetes?
Yes, I am familiar with Kubernetes and have experience working with it in various projects.
I have experience deploying and managing containerized applications using Kubernetes
I am proficient in creating and managing Kubernetes clusters
I have worked with Kubernetes resources such as Pods, Deployments, Services, and ConfigMaps
Q51. Explain the working of traceroute
Traceroute is a network diagnostic tool used to track the path packets take from one networked device to another.
Traceroute sends out packets with increasing TTL values to map the path to the destination.
Each router along the path decrements the TTL and sends back an ICMP Time Exceeded message.
The sender records the IP address of each router to trace the route taken by the packets.
Traceroute helps identify network issues like high latency or packet loss.
Example: 'traceroute w...read more
Q52. Prerequisites for Data Center
Prerequisites for a data center include power supply, cooling system, network connectivity, and security measures.
Sufficient power supply to support all equipment
Effective cooling system to prevent overheating
Reliable network connectivity for data transfer
Robust security measures to protect against cyber threats
Backup power source to ensure uninterrupted operation
Proper fire suppression system to prevent damage
Monitoring and management tools to ensure optimal performance
Q53. Describe ITIL process
ITIL is a framework for IT service management that aims to align IT services with the needs of the business.
ITIL stands for Information Technology Infrastructure Library
It consists of five core publications: Service Strategy, Service Design, Service Transition, Service Operation, and Continual Service Improvement
ITIL processes include Incident Management, Problem Management, Change Management, Release Management, and Service Level Management
ITIL helps organizations to improve...read more
Q54. Difference between IPsec and GRE
IPsec provides secure communication over the internet, while GRE is a tunneling protocol for encapsulating various network layer protocols.
IPsec is a suite of protocols used to secure internet protocol (IP) communications by authenticating and encrypting each IP packet.
GRE is a tunneling protocol that encapsulates a wide variety of network layer protocols inside virtual point-to-point links.
IPsec can be used to create VPNs for secure remote access or site-to-site connections....read more
Q55. Technical Implementation on SASE Zscaler
SASE Zscaler is a cloud-native security platform that combines networking and security services.
SASE Zscaler provides secure access to applications and data from any device and location.
It offers zero trust network access, secure web gateway, firewall as a service, and more.
Implementation involves setting up policies, configuring connectors, and monitoring traffic.
Example: Configuring user authentication methods, defining access control policies, and analyzing traffic logs.
Q56. Explain HSRP in detail
HSRP (Hot Standby Router Protocol) is a Cisco proprietary protocol that provides redundancy for IP networks by allowing two or more routers to work together in a virtual router group.
HSRP is used to provide high availability and failover in a network.
It uses a virtual IP address and a virtual MAC address to represent the group of routers.
One router is elected as the active router, while the others are in standby mode.
The active router forwards traffic for the virtual IP addre...read more
Q57. Current job tasks CCNA
My current job tasks include utilizing my CCNA certification to troubleshoot network issues and provide technical support to end-users.
Troubleshoot network issues
Provide technical support to end-users
Utilize CCNA certification
Maintain accurate records of service requests and resolutions
Q58. Explain Classless Addressing
Classless addressing is a method of assigning IP addresses without using predefined classes.
IP address is divided into two parts: network prefix and host identifier
CIDR notation is used to represent classless addressing
Allows for more efficient use of IP addresses
Example: 192.168.1.0/24
Subnet masks are not used in classless addressing
Q59. What is cloud conputing
Cloud computing is the delivery of computing services over the internet, including storage, servers, databases, networking, software, and more.
Allows users to access and store data and applications on remote servers instead of on local devices
Provides scalability, flexibility, and cost-efficiency for businesses
Examples include Amazon Web Services (AWS), Microsoft Azure, and Google Cloud Platform
Q60. what is eks and cloudwatch
Q61. Explain variable subnetting
Variable subnetting is a technique used to divide a network into smaller subnets with varying sizes.
Allows for more efficient use of IP addresses
Can accommodate different network sizes
Requires careful planning and management
Example: A network with 192.168.0.0/16 can be divided into subnets with different sizes such as /24, /25, /26, etc.
Q62. How to create LVM
LVM (Logical Volume Management) allows for flexible disk space allocation by creating logical volumes from physical volumes.
Create physical volumes using pvcreate command
Create volume group using vgcreate command
Create logical volume using lvcreate command
Format the logical volume with a filesystem using mkfs command
Mount the logical volume to a directory using mount command
Q63. How sql execute
SQL executes by parsing the query, creating an execution plan, and retrieving data from the database.
SQL query is sent to the database server for processing
Database server parses the query to understand the operations to be performed
An execution plan is created to optimize the query performance
Data is retrieved from the database based on the query criteria
Results are returned to the user
Q64. When can we join
Q65. Technologies used
I have experience with a variety of technologies including networking, virtualization, cloud computing, and automation tools.
Networking technologies such as TCP/IP, DNS, DHCP
Virtualization platforms like VMware, Hyper-V
Cloud computing services like AWS, Azure
Automation tools such as Ansible, Puppet
More about working at Orange Business
Top HR Questions asked in Zahran Assinged Royal Commission Hospital Ksa
Interview Process at Zahran Assinged Royal Commission Hospital Ksa
Top Interview Questions from Similar Companies
Reviews
Interviews
Salaries
Users/Month