Filter interviews by
I applied via Walk-in and was interviewed in Jun 2021. There was 1 interview round.
I applied via Indeed and was interviewed in Sep 2020. There were 4 interview rounds.
Top trending discussions
posted on 18 Dec 2024
I applied via Naukri.com and was interviewed in Dec 2024. There were 2 interview rounds.
Split horizon is a technique used in computer networking to prevent routing loops by not advertising routes back to the same interface they were learned from.
Split horizon is used in distance-vector routing protocols like RIP to prevent routing loops.
It works by not advertising routes back to the same interface they were learned from.
Split horizon with poison reverse takes this a step further by advertising the route w...
BGP stands for Border Gateway Protocol, used to exchange routing information between different networks.
BGP is an exterior gateway protocol used to make routing decisions on the internet.
It operates by exchanging routing information between different autonomous systems (AS).
BGP uses TCP port 179 for communication.
BGP routers maintain a table of IP prefixes and their paths to reach them.
BGP can be configured to influenc...
There are two types of BGP: eBGP and iBGP. eBGP has an AD value of 20, while iBGP has an AD value of 200.
eBGP (External BGP) - AD value: 20
iBGP (Internal BGP) - AD value: 200
Routing protocol is a set of rules used by routers to determine the best path for data packets to travel.
Routing protocols help routers communicate with each other to dynamically update routing tables.
Types of routing protocols include distance-vector (e.g. RIP), link-state (e.g. OSPF), and hybrid (e.g. EIGRP).
Distance-vector protocols determine the best path based on hop count.
Link-state protocols use a more complex a...
OSPF (Open Shortest Path First) is a routing protocol used to determine the best path for data packets in a network.
OSPF is a link-state routing protocol
It uses Dijkstra's algorithm to calculate the shortest path
OSPF routers exchange link-state advertisements (LSAs) to build a topology map
It supports VLSM (Variable Length Subnet Masking) and CIDR (Classless Inter-Domain Routing)
OSPF divides the network into areas to re
Preventing loop avoidance in BGP involves using loop prevention mechanisms like AS Path and Route Reflectors.
Use AS Path attribute to prevent loops by tracking the path a route has taken through AS numbers.
Implement Route Reflectors to avoid loops in BGP by controlling the route propagation within a cluster.
Utilize BGP Confederations to divide the network into smaller autonomous systems to prevent loops.
Regularly monit...
The OSI model is a conceptual framework that standardizes the functions of a telecommunication or computing system into seven layers.
The OSI model stands for Open Systems Interconnection model.
It helps in understanding how data is transferred from one computer to another over a network.
The seven layers of OSI model are: Physical, Data Link, Network, Transport, Session, Presentation, and Application.
Each layer has speci...
Traceroute is a network diagnostic tool used to track the path packets take from one networked device to another.
Traceroute sends packets with increasing TTL values to determine the path to a destination.
Each router along the path sends back an ICMP Time Exceeded message, allowing traceroute to map the route.
The final destination sends an ICMP Port Unreachable message, indicating the end of the route.
Traceroute helps i...
The presence of '*****' in a traceroute indicates that the router is blocking the ICMP packets used by traceroute.
The '*****' indicates that the router is not responding to the ICMP packets sent by the traceroute tool.
This could be due to the router being configured to block ICMP traffic for security reasons.
It can also be caused by a firewall or network filtering rules blocking the ICMP packets.
In some cases, the '***...
BGP states include Idle, Connect, Active, OpenSent, OpenConfirm, Established.
Idle - Initial state when BGP is not yet established
Connect - Attempting to establish a TCP connection
Active - Waiting for a TCP connection to be completed
OpenSent - Sent an Open message to peer
OpenConfirm - Received an Open message and waiting for confirmation
Established - BGP peers are fully established and can exchange routing information
The new router can be configured remotely using a laptop or mobile device with access to the network.
Access the router's web interface by entering its IP address in a web browser
Login using default credentials or credentials provided by the company
Configure basic settings such as SSID, password, and security settings
Update firmware if necessary
Test the connection to ensure it is working properly
CE and PE routers are types of routers used in MPLS networks. CE routers connect to customer networks while PE routers connect to provider networks.
CE routers (Customer Edge) connect to customer networks and are responsible for exchanging routes with customer devices.
PE routers (Provider Edge) connect to provider networks and are responsible for exchanging routes with other PE routers in the MPLS network.
CE routers are...
The command to assign an IP address on a Juniper router interface is 'set interface <interface_name> unit <unit_number> family inet address <ip_address/mask>'
Use the 'set' command to configure the interface
Specify the interface name and unit number
Use the 'family inet' statement to configure an IPv4 address
Specify the IP address and subnet mask
Parameters for BGP neighbourship include AS number, IP address, subnet mask, and BGP version.
AS number must match on both neighbors
IP address must be reachable between neighbors
Subnet mask should be the same on both neighbors
BGP version should be compatible between neighbors
tftp stands for Trivial File Transfer Protocol, a simple protocol used for transferring files over a network.
tftp is a lightweight protocol used for transferring files between devices on a network.
It operates on UDP port 69.
tftp does not require user authentication, making it less secure compared to FTP.
It is commonly used for booting devices over a network, such as in diskless workstations or routers.
An example of tft...
Loop avoidance mechanism in BGP prevents routing loops by using loop prevention mechanisms like AS path attribute and route reflectors.
BGP uses AS path attribute to prevent routing loops by not accepting routes with its own AS number in the path.
Route reflectors are used in BGP to avoid loops in route propagation within a cluster of routers.
BGP Confederations can also be used to prevent loops by dividing the AS into sm
Traceroute is a network diagnostic tool used to track the path packets take from source to destination IP.
Traceroute sends packets with increasing TTL values to elicit ICMP Time Exceeded responses from routers along the path.
The source IP is the IP address of the device initiating the traceroute, while the destination IP is the IP address of the target device.
Traceroute displays the IP addresses of the routers in the p...
Public IP is the address assigned to a device that is directly accessible over the internet, while private IP is used within a private network.
Public IP is unique and can be accessed from anywhere on the internet
Private IP is used within a local network and is not directly accessible from the internet
Public IP is assigned by the Internet Service Provider (ISP)
Private IP addresses are typically in the ranges of 192.168.
To configure a router with support of a non tech guy onsite, provide step-by-step instructions and visual aids.
Create a simple, easy-to-follow guide with step-by-step instructions.
Use visual aids such as diagrams or videos to demonstrate the process.
Provide clear explanations of each step and troubleshoot common issues.
Offer remote support or a helpline for additional assistance if needed.
A firewall is a network security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules.
Acts as a barrier between a trusted internal network and untrusted external network
Filters network traffic based on rules set by the administrator
Can be hardware-based or software-based
Examples include Cisco ASA, Palo Alto Networks, and Windows Firewall
Routers connect multiple networks together while switches connect devices within a single network.
Routers operate at the network layer (Layer 3) of the OSI model, while switches operate at the data link layer (Layer 2).
Routers use IP addresses to forward data between networks, while switches use MAC addresses to forward data within a network.
Routers can determine the best path for data to travel between networks, while...
MPLS stands for Multiprotocol Label Switching, a technique used in telecommunications networks to direct data packets along predefined paths.
MPLS is used to improve network performance and efficiency by quickly routing data packets based on labels instead of IP addresses.
It allows for traffic engineering, quality of service (QoS) prioritization, and virtual private network (VPN) services.
MPLS operates at layer 2.5 of t...
FTP and TFTP are protocols used for transferring files over a network.
FTP (File Transfer Protocol) is a standard network protocol used to transfer files from one host to another over a TCP-based network, such as the internet.
TFTP (Trivial File Transfer Protocol) is a simpler version of FTP that uses UDP instead of TCP for file transfer.
FTP requires authentication (username and password) for access, while TFTP does not ...
posted on 19 Jun 2024
An aptitude test is a type of psychometric test used to assess cognitive skills and other specific abilities and behavioural traits. Job aptitude tests are very common; almost any employer uses them to screen candidates; among them are the Royal Air Force, EY, Goldman Sachs, and Nursing & midwifery administrators. The most popular ones
Questions on software and system designs. For this, candidates require analytical and logical thinking to solve problems and scenarios for the onsite or virtual interview.
Similar to new markets, companies need to develop new products in order to grow. This problem is intimidating for most clients due to potential high costs and a fear of the unknown. Your case study interview framework should dive deep into the new product before anything else.
What is a group interview?
A group interview is when an employee or team of employees interviews multiple candidates simultaneously, or when a team of employees forms a panel to interview one candidate. Employers typically perform both types of group interviews in conference rooms to simulate a meeting or team project.
What are Interview Assignments? A task or project that a recruiter asks candidates to do as part of an interview. It tests candidates' skills and ensures they can do the job. It's a great way to understand a candidate's abilities and potential better.
I am most familiar with Python, Java, and JavaScript.
Python
Java
JavaScript
I would start by checking for any recent updates or changes, then look for error messages, try restarting the program, and if necessary, seek help from IT support.
Check for any recent updates or changes that may have caused the program to crash
Look for any error messages or pop-up notifications that could provide clues to the issue
Try restarting the program to see if that resolves the problem
If the program continues to...
I applied via Walk-in and was interviewed in Nov 2024. There was 1 interview round.
Experienced sales executive with a proven track record of exceeding targets and building strong client relationships.
Over 5 years of sales experience in the technology industry
Consistently met or exceeded sales targets by 20% each quarter
Built and maintained relationships with key clients such as ABC Company and XYZ Corporation
I would highlight the phone's sleek design, advanced features, and competitive pricing to appeal to the customer's needs and preferences.
Emphasize the phone's sleek and modern design to attract the customer visually.
Highlight the advanced features such as high-quality camera, long battery life, and fast processor to showcase its capabilities.
Mention the competitive pricing compared to other similar phones in the market...
Delhi is the capital city of India, known for its rich history, diverse culture, and bustling markets.
Delhi is divided into two parts - Old Delhi and New Delhi
It is home to several historical monuments like the Red Fort, Qutub Minar, and India Gate
Delhi is a major hub for shopping, with markets like Chandni Chowk and Connaught Place attracting tourists and locals alike
The city has a vibrant food scene, offering a varie...
Women's safety in Delhi is a complex issue with varying opinions and experiences.
Women in Delhi face safety concerns due to high rates of crimes like sexual harassment, assault, and rape.
There have been incidents of high-profile cases that have brought attention to the issue of women's safety in the city.
However, there are also initiatives and efforts being made to improve safety for women in Delhi, such as increased p...
posted on 19 Jun 2024
I applied via Approached by Company and was interviewed in May 2024. There were 3 interview rounds.
The golden rules of accounting are basic principles that guide the process of recording financial transactions.
The three golden rules of accounting are: Debit the receiver, Credit the giver; Debit what comes in, Credit what goes out; Debit all expenses and losses, Credit all incomes and gains.
These rules help ensure that financial transactions are accurately recorded and classified in the accounting system.
For example,...
Depreciation is the allocation of the cost of a tangible asset over its useful life.
Depreciation is a non-cash expense that reduces the value of an asset over time.
It reflects the wear and tear, obsolescence, or decrease in value of the asset.
Common methods of calculating depreciation include straight-line, double declining balance, and units of production.
Example: A company buys a delivery truck for $50,000 with a use...
GST stands for Goods and Services Tax, a value-added tax levied on most goods and services sold for domestic consumption.
GST is a single tax on the supply of goods and services, right from the manufacturer to the consumer.
It has replaced multiple indirect taxes like VAT, service tax, etc.
GST has 4 tax slabs - 5%, 12%, 18%, and 28%.
Input tax credit can be claimed on taxes paid on input goods and services.
GST registratio...
Types of GST include CGST, SGST, IGST, and UTGST.
CGST - Central Goods and Services Tax
SGST - State Goods and Services Tax
IGST - Integrated Goods and Services Tax
UTGST - Union Territory Goods and Services Tax
Yes, I am familiar with Tally for accounting, GST for taxation, and TDS for tax deduction.
I have experience using Tally software for maintaining accounting records.
I understand the concepts of GST (Goods and Services Tax) and its implications on business transactions.
I am aware of TDS (Tax Deducted at Source) and its requirements for tax deduction.
I have practical knowledge of how to handle GST and TDS compliance in ac
ABC Corporation
ABC Corporation was my last employer
Worked at ABC Corporation for 5 years
ABC Corporation is a multinational company
Yes, I am comfortable with night shifts as I have previous experience working during those hours.
I have previous experience working night shifts in my current role.
I am able to adjust my schedule to accommodate night shifts.
I understand the importance of being alert and focused during night shifts.
I am willing to work night shifts if required for the position.
posted on 22 Nov 2024
Encapsulation, Inheritance, Polymorphism, Abstraction are the four pillars of OOPS in Java.
Encapsulation: Bundling data and methods that operate on the data into a single unit.
Inheritance: Allows a class to inherit properties and behavior from another class.
Polymorphism: Ability to present the same interface for different data types.
Abstraction: Hiding the implementation details and showing only the necessary features.
A constructor in Java is a special type of method that is used to initialize objects.
Constructors have the same name as the class they are in.
They do not have a return type, not even void.
Constructors are called when an object of a class is created.
Example: public class Car { public Car() { // constructor code } }
I applied via Referral and was interviewed in Dec 2024. There was 1 interview round.
based on 9 reviews
Rating in categories
Senior Accounts Manager
4
salaries
| ₹4 L/yr - ₹4 L/yr |
Sales Advisor
4
salaries
| ₹1.6 L/yr - ₹2.1 L/yr |
Advisor
4
salaries
| ₹1.2 L/yr - ₹2.1 L/yr |
Quality Analyst
3
salaries
| ₹3 L/yr - ₹3 L/yr |
Customer Care Executive
3
salaries
| ₹1 L/yr - ₹2.2 L/yr |
HRH Next Services
Pace Setters Business Solutions
Magus Customer Dialog
Greet Technologies