Add office photos
Employer?
Claim Account for FREE

Sify Technologies

3.9
based on 1.7k Reviews
Video summary
Filter interviews by

90+ Atomberg Technologies Interview Questions and Answers

Updated 18 Jan 2025
Popular Designations

Q1. what is protocol, how many type of protocol.

Ans.

A protocol is a set of rules that governs the communication between devices in a network. There are several types of protocols.

  • A protocol defines the format, timing, sequencing, and error control of data transmission.

  • Protocols can be categorized into network protocols, transport protocols, and application protocols.

  • Examples of network protocols include IP (Internet Protocol), ICMP (Internet Control Message Protocol), and ARP (Address Resolution Protocol).

  • Transport protocols i...read more

View 2 more answers

Q2. What is difference IPv4 and IPV6

Ans.

IPv6 is the successor to IPv4, with larger address space, improved security, and better support for mobile devices.

  • IPv4 uses 32-bit addresses, while IPv6 uses 128-bit addresses

  • IPv6 has a hierarchical addressing structure, allowing for more efficient routing

  • IPv6 includes built-in security features, such as IPsec

  • IPv6 has better support for mobile devices, with features like mobile IP and flow labeling

View 2 more answers

Q3. What is Vlan What is difference between Ebgp and Ibgp Ospf detail Ad value of routing protocols Port numbers How many vlan we creat total??

Ans.

VLAN is a virtual LAN that divides a physical network into multiple logical networks. EBGP and IBGP are different types of BGP routing protocols. OSPF is a link-state routing protocol.

  • VLAN stands for Virtual Local Area Network and is used to segment a network into multiple smaller networks for better traffic management.

  • EBGP (External BGP) is used between different autonomous systems, while IBGP (Internal BGP) is used within the same autonomous system.

  • OSPF (Open Shortest Path ...read more

Add your answer

Q4. What is MPLS What is DNS What is Subnetting

Ans.

MPLS is a protocol used for efficient data transfer. DNS is a system that translates domain names to IP addresses. Subnetting is dividing a network into smaller subnetworks.

  • MPLS stands for Multiprotocol Label Switching and is used to route network traffic efficiently.

  • DNS stands for Domain Name System and is used to translate domain names to IP addresses.

  • Subnetting is the process of dividing a network into smaller subnetworks to improve network performance and security.

  • MPLS is...read more

Add your answer
Discover Atomberg Technologies interview dos and don'ts from real experiences

Q5. Which protocol is having lowest AD Value ?

Ans.

The protocol with the lowest AD value is OSPF (Open Shortest Path First).

  • AD (Administrative Distance) is a value used by routers to determine the best path for forwarding packets.

  • Lower AD value indicates a more preferred route.

  • OSPF has an AD value of 110, which is lower than other routing protocols like RIP (120) and EIGRP (90).

View 3 more answers

Q6. Vlan Ebgp Ibgp difference Ad value of Bgp SSH PORT NUMBER TELNET PORT NUMBER OSPF DETAIL TOTAL VLAN??

Ans.

Answers to various networking questions related to VLANs, BGP, SSH, Telnet, and OSPF.

  • VLANs are used to segment a network into separate broadcast domains.

  • EBGP (External BGP) is used between different AS (Autonomous Systems), while IBGP (Internal BGP) is used within the same AS.

  • BGP uses the 'AD value' (Administrative Distance) to determine the best path to a destination.

  • SSH (Secure Shell) uses port number 22 for secure remote access.

  • Telnet uses port number 23 for unencrypted re...read more

Add your answer
Are these interview questions helpful?

Q7. BGP attributes and what is route reflect

Ans.

BGP attributes and route reflect

  • BGP attributes are used to determine the best path for routing traffic

  • Attributes include AS path, next hop, local preference, and more

  • Route reflect is a BGP feature that allows for efficient route distribution in large networks

  • It reduces the number of BGP peerings required by reflecting routes from one set of routers to another

Add your answer

Q8. which layers call to Heart of OSI ?

Ans.

The layers that call to the heart of OSI are the Transport layer and the Application layer.

  • The Transport layer is responsible for the end-to-end delivery of data and ensures reliable communication between hosts.

  • The Application layer provides services directly to the end-user and includes protocols like HTTP, FTP, SMTP, etc.

  • These layers interact with the heart of the OSI model, which is the core of the network architecture.

  • The heart of OSI represents the central processing and...read more

View 1 answer
Share interview questions and help millions of jobseekers 🌟

Q9. Which Protocols work with Application layers ?

Ans.

Protocols that work with Application layers include HTTP, FTP, SMTP, DNS, and SNMP.

  • HTTP (Hypertext Transfer Protocol) is used for web browsing and communication between web servers and clients.

  • FTP (File Transfer Protocol) is used for transferring files between a client and a server.

  • SMTP (Simple Mail Transfer Protocol) is used for sending and receiving email messages.

  • DNS (Domain Name System) is used for translating domain names into IP addresses.

  • SNMP (Simple Network Management...read more

View 2 more answers

Q10. basics of your domain what is a diode?

Ans.

A diode is an electronic component that allows current to flow in only one direction.

  • It has two terminals, an anode and a cathode.

  • It is commonly used in rectifiers to convert AC to DC.

  • It can also be used as a voltage regulator or a signal modulator.

  • Examples include the 1N4148 and the 1N4001 diodes.

Add your answer

Q11. What is OSI Model and How many Layers ?

Ans.

The OSI Model is a conceptual framework that standardizes the functions of a communication system into seven layers.

  • The OSI Model stands for Open Systems Interconnection Model.

  • It was developed by the International Organization for Standardization (ISO) in 1984.

  • The model helps in understanding how different network protocols and technologies interact.

  • It divides the network communication process into seven layers, each with its own specific functions.

  • The layers are: Physical, D...read more

View 1 answer

Q12. What is AD and Range ?

Ans.

AD stands for Active Directory, which is a directory service used in Windows environments. Range refers to a specific set of values or a span of numbers.

  • AD is a centralized database that stores information about network resources, such as users, computers, and groups.

  • It provides authentication and authorization services, allowing users to access resources based on their permissions.

  • AD uses a hierarchical structure with domains, trees, and forests to organize and manage networ...read more

View 2 more answers

Q13. What is DNS, and how does it work?

Ans.

DNS stands for Domain Name System, it translates domain names to IP addresses.

  • DNS is like a phone book for the internet, translating domain names (like google.com) to IP addresses (like 172.217.3.206).

  • DNS works by sending queries to a series of servers, starting with the local DNS resolver and moving up to authoritative DNS servers.

  • DNS uses a hierarchical system with multiple levels of servers, including root servers, top-level domain servers, and authoritative servers.

  • DNS ca...read more

Add your answer

Q14. What do u think is the best advantage of using cloud ?

Add your answer

Q15. Difiranse router & switch

Ans.

A router is a networking device that forwards data packets between computer networks, while a switch is a networking device that connects devices within a network.

  • Routers operate at the network layer (Layer 3) of the OSI model, while switches operate at the data link layer (Layer 2).

  • Routers use IP addresses to route traffic between different networks, while switches use MAC addresses to forward data within a network.

  • Routers can connect multiple networks together, while switch...read more

View 1 answer

Q16. What is modem .old company details Name etc

Ans.

A modem is a device that modulates and demodulates analog signals to enable digital communication over telephone lines.

  • Modem stands for modulator-demodulator

  • Old company details: Hayes Microcomputer Products, US Robotics, etc.

  • Modems were commonly used for dial-up internet connections

  • Modems have evolved to support faster data transfer speeds like DSL and cable modems

Add your answer

Q17. What is bgp and ad vlaue

Ans.

BGP (Border Gateway Protocol) is a routing protocol used to exchange routing information between different autonomous systems.

  • BGP is an exterior gateway protocol used in large-scale networks.

  • It allows routers in different autonomous systems to communicate and exchange routing information.

  • BGP uses path vector routing, which takes into account multiple factors to determine the best path for data transmission.

  • BGP assigns an administrative distance (AD) value to each route, which...read more

Add your answer

Q18. What is switch congratulations

Ans.

Switch congestion occurs when a network switch is overwhelmed with traffic, leading to delays or dropped packets.

  • Switch congestion can occur when there is a high volume of data being transmitted through the switch

  • It can lead to delays in data transmission or even dropped packets

  • Switch congestion can be alleviated by implementing Quality of Service (QoS) policies or upgrading to higher capacity switches

Add your answer

Q19. What is switch? What is router? What is bgp protocol? What is network?

Ans.

A switch is a networking device that connects devices within a local area network (LAN).

  • Switches operate at the data link layer of the OSI model.

  • They use MAC addresses to forward data packets to the correct destination.

  • Switches can improve network performance by reducing collisions and optimizing bandwidth usage.

  • Example: Cisco Catalyst 2960 Series Switch.

View 1 answer

Q20. Modem type in

Ans.

Modem type in refers to the process of configuring a modem to connect to a network.

  • Modem type in involves setting up the modem to establish a connection with a network.

  • It includes configuring the modem's settings such as IP address, subnet mask, and default gateway.

  • Examples of modem types include DSL modems, cable modems, and wireless modems.

View 1 answer

Q21. DSA Overview and concept oriented explanation

Ans.

DSA stands for Data Structures and Algorithms. It is a fundamental concept in computer science for organizing and processing data efficiently.

  • DSA involves the study of different data structures like arrays, linked lists, stacks, queues, trees, graphs, etc.

  • Algorithms are step-by-step procedures or formulas for solving problems. They can be categorized as searching, sorting, dynamic programming, etc.

  • Understanding DSA helps in designing efficient algorithms and optimizing code f...read more

Add your answer

Q22. how does whatsapp's end to end encryption work ?

Add your answer

Q23. What is ospf and area

Ans.

OSPF (Open Shortest Path First) is a routing protocol used in computer networks to determine the best path for data packets to travel.

  • OSPF is an interior gateway protocol (IGP) used within a single autonomous system (AS).

  • It uses the link-state routing algorithm to calculate the shortest path between routers.

  • OSPF divides the network into areas to improve scalability and reduce routing overhead.

  • Each area has its own link-state database and routers within an area have the same a...read more

Add your answer

Q24. What is IPV6?

Ans.

IPv6 is the latest version of the Internet Protocol that provides a larger address space and improved security features.

  • IPv6 stands for Internet Protocol version 6.

  • It was developed to replace IPv4 due to the exhaustion of IPv4 addresses.

  • IPv6 uses 128-bit addresses, allowing for a significantly larger number of unique addresses.

  • It provides improved security features, such as built-in encryption and authentication.

  • IPv6 adoption is gradually increasing worldwide.

  • Example: IPv6 ad...read more

View 1 answer

Q25. OSPF Areas and their characteristics

Ans.

OSPF areas are used to divide a network into smaller segments for better routing efficiency and scalability.

  • OSPF areas are logical groupings of routers and networks within an OSPF autonomous system.

  • Each area has its own Area ID, which is a 32-bit number used to identify the area.

  • Area 0 is known as the backbone area and must be present in every OSPF network.

  • Areas other than Area 0 are called non-backbone areas.

  • OSPF routers within the same area have full routing information abo...read more

Add your answer

Q26. What is wireless

Ans.

Wireless refers to the transmission of data without the use of physical cables or wires.

  • Wireless technology uses radio waves to transmit data over a network.

  • Examples of wireless technology include Wi-Fi, Bluetooth, and cellular networks.

  • Wireless networks are convenient for mobile devices and allow for greater flexibility in connectivity.

Add your answer

Q27. What is cloud and types

Ans.

Cloud is a virtual space where data and applications are stored and accessed over the internet.

  • Cloud computing provides on-demand access to shared computing resources

  • Types of cloud include public, private, and hybrid

  • Examples of cloud providers include AWS, Azure, and Google Cloud

Add your answer

Q28. Vlan stp bootp protocol differences between switch and hub mpls bgp

Ans.

Switches use VLANs and STP to manage network traffic, while hubs do not. MPLS and BGP are advanced networking protocols.

  • Switches use VLANs to segment network traffic, while hubs do not.

  • STP (Spanning Tree Protocol) is used by switches to prevent network loops.

  • BOOTP (Bootstrap Protocol) is used to assign IP addresses to devices during boot-up.

  • MPLS (Multiprotocol Label Switching) is a protocol used for high-performance telecommunications networks.

  • BGP (Border Gateway Protocol) is...read more

Add your answer

Q29. What is switch login and configuration

Ans.

Switch login and configuration involves accessing a switch's management interface to make changes to its settings.

  • Switch login is the process of accessing a switch's management interface using a username and password.

  • Configuration involves making changes to the switch's settings such as VLANs, port configurations, and security settings.

  • Common protocols used for switch login and configuration include SSH, Telnet, and web-based interfaces.

  • It is important to secure switch login ...read more

Add your answer

Q30. Wireless device configuration

Ans.

Wireless device configuration involves setting up and managing wireless networks for optimal performance.

  • Understand the network requirements and goals

  • Select appropriate wireless devices and access points

  • Configure SSIDs, security settings, and encryption protocols

  • Optimize placement of access points for coverage and performance

  • Monitor and troubleshoot network performance

Add your answer

Q31. What is distance between 2 smoke detectors

Ans.

The distance between two smoke detectors depends on the manufacturer's recommendations and the layout of the building.

  • The National Fire Protection Association (NFPA) recommends smoke detectors be installed in every bedroom, outside each sleeping area, and on every level of the home.

  • The distance between smoke detectors should not exceed 30 feet.

  • The layout of the building, such as the presence of walls or obstructions, may affect the placement of smoke detectors.

  • Consult the man...read more

Add your answer

Q32. Daily routine of duty

Ans.

Daily routine involves monitoring network performance, troubleshooting issues, implementing upgrades, and collaborating with team members.

  • Monitor network performance and security

  • Troubleshoot network issues

  • Implement network upgrades and configurations

  • Collaborate with team members on projects and tasks

Add your answer

Q33. What is cloud computing?

Ans.

Cloud computing is the delivery of computing services over the internet.

  • Cloud computing allows users to access data and applications from anywhere with an internet connection.

  • It eliminates the need for physical hardware and allows for scalability and flexibility.

  • Examples include Amazon Web Services, Microsoft Azure, and Google Cloud Platform.

Add your answer

Q34. Tell me a scenario where cybersecurity is used ?

Add your answer

Q35. explain about yourself write code for form with bootstrap write script for onlcick alert shows firstname from the form

Ans.

Answering interview questions for a Software Developer position.

  • Introduce yourself, highlighting your relevant experience and skills.

  • Explain your passion for software development and any notable projects you've worked on.

  • Provide a brief overview of your technical skills and programming languages you're proficient in.

  • Discuss your problem-solving abilities and ability to work in a team.

  • Mention your familiarity with Agile methodologies and version control systems.

  • End by expressi...read more

Add your answer

Q36. Router configurations

Ans.

Router configurations involve setting up and managing network devices to ensure efficient and secure communication.

  • Router configurations involve configuring IP addresses, subnet masks, and default gateways.

  • Setting up access control lists (ACLs) to control network traffic.

  • Enabling routing protocols such as OSPF or BGP for dynamic routing.

  • Configuring NAT (Network Address Translation) to allow private IP addresses to access the internet.

  • Implementing security measures like firewa...read more

View 1 answer

Q37. Which process confirm Part faulty

Ans.

Testing processes like visual inspection, functional testing, and diagnostic testing can confirm a faulty part.

  • Visual inspection for physical damage or defects

  • Functional testing to check if the part is working as intended

  • Diagnostic testing to identify specific issues or faults

  • Using specialized tools like multimeters or oscilloscopes

  • Consulting technical documentation for troubleshooting steps

Add your answer

Q38. what is osi model

Ans.

The OSI model is a conceptual framework that standardizes the functions of a telecommunication or computing system into seven layers.

  • The OSI model stands for Open Systems Interconnection model

  • It helps in understanding how different networking protocols work together

  • The seven layers are: Physical, Data Link, Network, Transport, Session, Presentation, and Application

  • Each layer has specific functions and communicates with adjacent layers

Add your answer

Q39. what conseqences effect network performance

Ans.

Network performance can be affected by various consequences such as bandwidth limitations, network congestion, hardware failures, and security breaches.

  • Bandwidth limitations can lead to slow data transfer speeds and network congestion.

  • Network congestion occurs when there is too much traffic on the network, causing delays in data transmission.

  • Hardware failures, such as a faulty router or switch, can disrupt network connectivity and performance.

  • Security breaches, such as malwar...read more

Add your answer

Q40. What do mean by resolving the ticket in SLA? What is MPLS Network?

Ans.

Resolving the ticket in SLA means resolving the issue within the agreed upon time frame. MPLS Network is a type of network technology used for efficient data transmission.

  • Resolving the ticket in SLA means meeting the Service Level Agreement commitments for issue resolution time.

  • It is important to prioritize and address tickets based on their severity and impact on the network.

  • Examples of SLA metrics include response time, resolution time, and uptime guarantees.

  • MPLS Network st...read more

Add your answer

Q41. What is indexing?

Ans.

Indexing is a technique used to optimize database performance by creating a data structure that allows for faster data retrieval.

  • Indexing involves creating a separate table that contains the indexed column and a pointer to the original table.

  • It speeds up data retrieval by allowing the database to quickly locate the desired data without having to scan the entire table.

  • Examples of indexing include primary keys, foreign keys, and unique indexes.

Add your answer

Q42. What is Router how many types of router

Ans.

A router is a networking device that forwards data packets between computer networks. There are two main types of routers: wired routers and wireless routers.

  • Routers are used to connect multiple networks together and route data between them

  • Wired routers use physical cables to connect devices to the network

  • Wireless routers use Wi-Fi to connect devices to the network

  • Examples of popular router brands include Cisco, Netgear, and TP-Link

Add your answer

Q43. What is modem how many types of modem

Ans.

A modem is a device that modulates and demodulates digital data for transmission over analog communication lines. There are two main types of modems: dial-up modems and broadband modems.

  • Modem stands for modulator-demodulator.

  • Dial-up modems use a standard telephone line to connect to the internet.

  • Broadband modems, such as DSL modems and cable modems, provide high-speed internet access.

  • Modems can be internal (inside a computer) or external (connected via USB or Ethernet).

Add your answer

Q44. what is cryptography ?

Add your answer

Q45. What is UPS? How to maintain AMC?

Ans.

UPS is a global package delivery and supply chain management company. AMC maintenance involves regular check-ups and repairs.

  • UPS provides logistics solutions for businesses and individuals worldwide

  • AMC maintenance involves regular check-ups and repairs to ensure equipment is functioning properly

  • UPS maintains AMC through scheduled maintenance and repairs as needed

  • Examples of AMC maintenance include checking and replacing worn parts, cleaning and lubricating equipment, and test...read more

Add your answer

Q46. Check link configuration modem status and router issues

Ans.

To check link configuration modem status and router issues, you can use command line tools like ipconfig, ping, tracert, and log into the router's web interface.

  • Use ipconfig to check network configuration on the computer

  • Use ping to test connectivity between the computer and the modem/router

  • Use tracert to trace the route to the modem/router

  • Log into the router's web interface to check its configuration and status

Add your answer

Q47. How many types modem What is local lead

Ans.

There are several types of modems including cable, DSL, fiber, and satellite modems. Local lead refers to a person who is in charge of managing a team or project in a specific geographic area.

  • Types of modems include cable, DSL, fiber, and satellite modems

  • Local lead is a person responsible for managing a team or project in a specific geographic area

Add your answer

Q48. How to maintain infra up all time

Ans.

Regular maintenance, monitoring, and backup are essential to keep the infrastructure up all the time.

  • Perform regular maintenance and updates on hardware and software

  • Monitor the infrastructure for any issues or potential problems

  • Implement redundancy and failover mechanisms to ensure high availability

  • Have a backup and disaster recovery plan in place

  • Train and educate staff on proper usage and maintenance of the infrastructure

Add your answer

Q49. How to process PR and PO in oracle

Ans.

PR and PO processing in Oracle involves creating purchase requisitions and purchase orders for procurement purposes.

  • Create a purchase requisition (PR) in Oracle by entering details such as item, quantity, and supplier.

  • Submit the PR for approval by the appropriate authority.

  • Once approved, convert the PR into a purchase order (PO) by selecting the approved PR and generating the PO.

  • Review and confirm the details in the PO before sending it to the supplier for fulfillment.

Add your answer

Q50. What is router installation

Ans.

Router installation involves setting up a router device to establish a network connection.

  • Physically connect the router to the modem using an Ethernet cable

  • Access the router's settings through a web browser

  • Configure the network settings such as SSID, password, and security protocols

  • Test the connection to ensure proper functionality

Add your answer

Q51. What is router troubleshooting

Ans.

Router troubleshooting involves identifying and resolving issues with network routers.

  • Identifying connectivity issues

  • Checking router configurations

  • Updating firmware or software

  • Resetting the router

  • Checking for physical damage

  • Analyzing network traffic

  • Testing network cables

  • Checking for interference from other devices

Add your answer

Q52. Basic diagram of network

Ans.

A network diagram is a visual representation of a computer or telecommunications network.

  • A network diagram shows how devices and components are connected and communicate with each other.

  • It can include routers, switches, servers, firewalls, and other network devices.

  • The diagram can be used to troubleshoot network issues, plan upgrades, and document the network.

  • Examples of network diagrams include topology diagrams, logical diagrams, and physical diagrams.

Add your answer

Q53. Who is the founder of sify

Add your answer

Q54. What is Database?

Ans.

A database is a collection of data that is organized in a way that allows for efficient retrieval and manipulation.

  • A database is used to store and manage data.

  • It can be organized in different ways, such as relational or non-relational.

  • Examples of databases include MySQL, Oracle, MongoDB, and SQLite.

  • Data can be added, updated, deleted, and queried from a database.

  • Databases are used in various applications, such as e-commerce, healthcare, and finance.

Add your answer
Ans.

OSPF is a link-state routing protocol used to determine the shortest path for data packets in a network.

  • OSPF routers exchange link-state advertisements (LSAs) to build a topology map of the network.

  • Each router calculates the shortest path tree (SPT) based on the topology map.

  • OSPF uses cost as the metric to determine the shortest path.

  • The cost is calculated based on the bandwidth of the link.

  • OSPF supports multiple areas to reduce the size of the topology map and improve scalab...read more

Add your answer

Q56. Explain WAN LAN

Ans.

WAN stands for Wide Area Network and LAN stands for Local Area Network. WAN connects multiple LANs over a large geographical area.

  • WAN covers a large geographical area, such as a city, country, or even globally

  • LAN covers a smaller area, like a single building or campus

  • WAN uses public or private networks to connect LANs

  • LAN typically uses Ethernet or Wi-Fi for connectivity

  • Examples: WAN - Internet, LAN - Home network

Add your answer

Q57. Who is the chairmen of sify

Add your answer

Q58. PDU definition and PDU types

Ans.

PDU stands for Power Distribution Unit. It is a device that distributes electric power to multiple devices.

  • PDU is used in data centers to distribute power to servers, switches, and other networking equipment.

  • There are different types of PDUs such as Basic, Metered, Monitored, and Switched PDUs.

  • Basic PDUs provide a simple power distribution without any monitoring or control features.

  • Metered PDUs measure the power usage of connected devices.

  • Monitored PDUs provide real-time moni...read more

Add your answer

Q59. What is ux design

Ans.

UX design is the process of designing user experiences for digital products or services.

  • UX design focuses on creating user-centered designs that are intuitive and easy to use.

  • It involves understanding user needs, behaviors, and preferences through research and testing.

  • UX designers use various tools and techniques such as wireframing, prototyping, and user testing to create effective designs.

  • Good UX design can improve user satisfaction, engagement, and retention.

  • Examples of go...read more

Add your answer

Q60. What happens in BG when we reduce lvm

Ans.

When reducing LVM in BG, the data blocks are moved to free space and the size of the logical volume is decreased.

  • Data blocks are moved to free space within the logical volume

  • The size of the logical volume is decreased

  • File systems may need to be resized after reducing LVM

Add your answer

Q61. What is switching and routing?

Ans.

Switching and routing are networking concepts used to direct data traffic between devices.

  • Switching involves forwarding data packets between devices on the same network.

  • Routing involves directing data packets between different networks.

  • Switches operate at the data link layer of the OSI model, while routers operate at the network layer.

  • Examples of switching protocols include Ethernet and VLANs, while examples of routing protocols include OSPF and BGP.

Add your answer

Q62. Network problem resolved process

Ans.

Network problem resolution involves identifying, troubleshooting, and fixing issues to restore network functionality.

  • Identify the problem by gathering information from users and network devices

  • Troubleshoot the issue by checking network configurations, cables, and devices

  • Fix the problem by applying solutions such as restarting devices or reconfiguring settings

  • Test the network to ensure the problem is resolved and functionality is restored

Add your answer

Q63. Write a java code for even palindromes.

Add your answer

Q64. What is dg?

Ans.

DG stands for Diesel Generator. It is a backup power source used in case of power outages or in areas where there is no access to the main power grid.

  • DG is a type of generator that runs on diesel fuel.

  • It is commonly used as a backup power source in hospitals, data centers, and other critical facilities.

  • DGs come in various sizes and capacities, ranging from small portable units to large industrial generators.

  • They are often equipped with automatic transfer switches that can det...read more

View 1 answer

Q65. Between 2 smoke detector distance 7.5 meter

Ans.

The question is unclear and lacks context.

  • Request for clarification on the purpose of the smoke detectors

  • Ask if there are any obstructions between the detectors

  • Determine the type of building and occupancy

  • Consider the manufacturer's recommendations for placement

  • Ensure compliance with local fire codes and regulations

Add your answer
Ans.

The maximum length of CAT 6 cable is 100 meters.

  • CAT 6 cable can transmit data up to 10 Gbps up to 55 meters.

  • Beyond 55 meters, the speed decreases to 1 Gbps.

  • The cable should not be bent or twisted too much as it can cause signal loss.

  • Using repeaters or switches can extend the length of the cable.

  • The length of the cable also depends on the quality of the cable and the connectors used.

Add your answer

Q67. What is DDoS and how to

Ans.

DDoS stands for Distributed Denial of Service. It is a type of cyber attack that aims to make a website or network unavailable to its users.

  • DDoS attacks involve overwhelming a website or network with traffic from multiple sources, making it impossible for legitimate users to access it.

  • Attackers use botnets, which are networks of compromised devices, to launch DDoS attacks.

  • There are various types of DDoS attacks, including volumetric attacks, protocol attacks, and application ...read more

Add your answer

Q68. what is access control

Ans.

Access control is a security measure that determines who is allowed to access or use resources in a computing environment.

  • Access control restricts unauthorized users from accessing sensitive information or resources.

  • It involves authentication, authorization, and auditing to ensure only authorized users have access.

  • Examples include password protection, biometric authentication, and role-based access control.

Add your answer

Q69. How many types modem

Ans.

There are two main types of modems: dial-up modems and broadband modems.

  • Dial-up modems use a phone line to connect to the internet at slower speeds.

  • Broadband modems use cable, DSL, fiber optic, or satellite connections for faster internet speeds.

  • Examples include DSL modems, cable modems, and fiber optic modems.

Add your answer

Q70. How many work exp in it fild

Ans.

I have 5 years of work experience in the IT field.

  • I have worked as a software developer for 3 years.

  • I have also worked as a network engineer for 2 years.

  • During my tenure, I have gained expertise in various programming languages and tools.

  • I have also worked on several projects, including web development, mobile app development, and database management.

  • I am familiar with both front-end and back-end development.

  • I have experience in troubleshooting and resolving technical issues....read more

Add your answer

Q71. What is bgp protocol

Ans.

BGP (Border Gateway Protocol) is a standardized exterior gateway protocol used to exchange routing information between different autonomous systems on the internet.

  • BGP is used to make routing decisions based on network policies, rules, and attributes.

  • It is a path vector protocol that uses TCP as its transport protocol.

  • BGP routers exchange routing information by advertising routes to their neighbors.

  • BGP is commonly used by Internet Service Providers (ISPs) to connect their net...read more

Add your answer

Q72. What is bgp types

Ans.

BGP (Border Gateway Protocol) types refer to different categories of BGP messages exchanged between routers.

  • BGP Update messages - used to advertise routing information between BGP routers

  • BGP Open messages - used to establish a BGP session between routers

  • BGP Keepalive messages - used to maintain the BGP session by confirming connectivity

  • BGP Notification messages - used to report errors or terminate the BGP session

Add your answer

Q73. What is bgp state

Ans.

BGP state refers to the current status of a BGP session between two routers.

  • BGP state can be in one of several states such as Idle, Connect, OpenSent, OpenConfirm, Established.

  • The Established state indicates that the BGP session is fully established and routing information can be exchanged.

  • The Idle state means that the BGP session is not active and no routing information is being exchanged.

  • The Connect state indicates that the router is attempting to establish a TCP connection...read more

Add your answer

Q74. Tell me type of Cyber Attacks

Ans.

Cyber attacks can be classified into various types based on their nature and impact.

  • Malware attacks (e.g. viruses, worms, trojans)

  • Phishing attacks (e.g. social engineering, spear phishing)

  • Denial of Service (DoS) attacks

  • Man-in-the-middle (MitM) attacks

  • SQL injection attacks

  • Cross-site scripting (XSS) attacks

  • Advanced Persistent Threats (APTs)

  • Ransomware attacks

  • Cryptojacking attacks

  • IoT-based attacks

  • Password attacks (e.g. brute force, dictionary attacks)

Add your answer
Ans.

Bandwidth refers to the amount of data that can be transmitted over a network connection in a given amount of time.

  • Bandwidth is measured in bits per second (bps)

  • Higher bandwidth means faster data transfer rates

  • Bandwidth can be limited by network congestion or physical limitations

  • Bandwidth is important for streaming video, online gaming, and other data-intensive applications

Add your answer

Q76. Explain your experience in Routing and Switching

Ans.

I have extensive experience in designing, implementing, and troubleshooting routing and switching networks.

  • Designed and implemented complex routing protocols such as OSPF and BGP

  • Configured and optimized network switches for efficient data flow

  • Troubleshot network connectivity issues to ensure minimal downtime

  • Implemented VLANs and trunking to segment network traffic

  • Experience with Cisco routers and switches

Add your answer

Q77. What is cloud technology

Ans.

Cloud technology refers to the use of remote servers to store, manage, and process data.

  • Cloud technology allows for easy access to data from anywhere with an internet connection

  • It can reduce the need for physical storage devices and on-premise servers

  • Examples of cloud technology include Amazon Web Services, Microsoft Azure, and Google Cloud Platform

Add your answer

Q78. Current company Notice period

Ans.

My current company notice period is 2 months.

  • I am currently serving a notice period of 2 months in my current company.

  • As per my employment contract, I am required to serve a notice period of 2 months.

  • I have informed my current employer about my intention to leave and have started serving my notice period.

View 1 answer

Q79. What level of support

Ans.

The level of support provided will be based on the agreed upon service level agreement (SLA) between the client and the AIX Administrator.

  • The level of support will vary depending on the SLA

  • SLAs typically outline response times, availability, and resolution times

  • Higher levels of support will come with higher costs

  • Examples of support levels include basic, standard, and premium

Add your answer

Q80. Construction and working of dg?

Ans.

A DG or diesel generator is a device that converts diesel fuel into electrical energy.

  • DGs consist of an engine, alternator, fuel system, cooling system, and control panel.

  • The engine burns diesel fuel to produce mechanical energy.

  • The alternator converts the mechanical energy into electrical energy.

  • The fuel system stores and supplies diesel fuel to the engine.

  • The cooling system regulates the temperature of the engine.

  • The control panel monitors and controls the operation of the ...read more

Add your answer

Q81. What is MPLS Network?

Ans.

MPLS Network is a protocol for efficient packet forwarding in telecommunications networks.

  • MPLS stands for Multiprotocol Label Switching

  • It is used to direct data packets along predefined paths through the network

  • MPLS labels are added to packets to determine the best path for forwarding

  • It improves network performance and efficiency by reducing congestion and improving traffic flow

  • Commonly used in large-scale networks like ISPs and enterprise networks

Add your answer

Q82. What is a computer device

Ans.

A computer device is any physical component that is part of a computer system.

  • Examples include keyboards, mice, monitors, printers, and scanners.

  • Computer devices can be internal or external to the computer system.

  • They are used to input, output, store, or process data.

  • Computer devices can be connected to the computer system through various ports such as USB, HDMI, or Ethernet.

  • They can be controlled by software or firmware.

Add your answer

Q83. What is bluedum error

Ans.

Bluedump error is a blue screen error that occurs in Windows operating system.

  • It is also known as Blue Screen of Death (BSOD).

  • It is caused by hardware or software issues.

  • It can be resolved by updating drivers or performing system restore.

  • Examples of bluedump error codes are 0x0000007B and 0x00000050.

Add your answer

Q84. 1. What is the cloud license

Ans.

A cloud license is a software license that allows users to access and use a software application hosted on the cloud.

  • Cloud licenses are typically subscription-based, allowing users to pay for the software on a monthly or annual basis.

  • Users can access the software from any device with an internet connection, making it convenient and flexible.

  • Cloud licenses often include updates and maintenance as part of the subscription fee.

  • Examples of cloud license providers include Microsof...read more

Add your answer

Q85. How to work dg?

Ans.

To work DG, follow the operating manual and safety guidelines. Start the DG, monitor its performance, and shut it down properly.

  • Read the operating manual and safety guidelines thoroughly

  • Check fuel and oil levels before starting the DG

  • Start the DG and monitor its performance regularly

  • Shut down the DG properly after use

  • Perform regular maintenance checks

  • Ensure proper ventilation and safety measures

  • Be prepared for emergencies and power outages

  • Examples: Caterpillar DG, Cummins DG,...read more

Add your answer

Q86. What is networking

Ans.

Networking is the practice of connecting devices together to share resources and information.

  • Networking involves the use of hardware and software to connect devices together.

  • It allows for the sharing of resources such as printers and files.

  • Networking also enables communication between devices, such as sending emails or accessing websites.

  • Examples of networking technologies include Ethernet, Wi-Fi, and Bluetooth.

Add your answer

Q87. what is lan how its work

Ans.

LAN stands for Local Area Network, a network of interconnected devices within a limited area such as a home, office, or school.

  • LAN allows devices to communicate with each other and share resources like files, printers, and internet access.

  • Devices in a LAN are typically connected using Ethernet cables or Wi-Fi.

  • LANs are commonly used in homes and businesses to facilitate communication and resource sharing.

  • Examples of LAN technologies include Ethernet, Wi-Fi, and Token Ring.

Add your answer

Q88. What is IP version

Ans.

IP version refers to the specific iteration of the Internet Protocol used for communication between devices on a network.

  • IP version 4 (IPv4) is the most commonly used version, using a 32-bit address scheme.

  • IP version 6 (IPv6) is the newer version, using a 128-bit address scheme to accommodate the growing number of devices connected to the internet.

  • Each IP version has its own set of rules and protocols for addressing and routing data packets.

Add your answer

Q89. Type of routers

Ans.

Routers are networking devices that forward data packets between computer networks.

  • Routers operate at the network layer of the OSI model

  • They use IP addresses to determine the best path for data packets

  • Examples include Cisco, Juniper, and TP-Link routers

Add your answer

Q90. What is a IP address

Ans.

An IP address is a unique numerical identifier assigned to each device connected to a network.

  • IP stands for Internet Protocol

  • It consists of four sets of numbers separated by dots

  • Example: 192.168.1.1

  • It allows devices to communicate with each other over a network

Add your answer

Q91. Database in sql

Ans.

A database in SQL is a structured collection of data that is stored and accessed using SQL queries.

  • SQL stands for Structured Query Language, used to interact with databases.

  • Tables are used to store data in a database, with rows representing individual records and columns representing attributes.

  • Queries can be used to retrieve, insert, update, and delete data from a database.

  • Primary keys uniquely identify each record in a table, while foreign keys establish relationships betwe...read more

Add your answer

Q92. what is OSI layer

Ans.

The OSI (Open Systems Interconnection) model is a conceptual framework that standardizes the functions of a communication system into seven layers.

  • The OSI model is used to understand and describe how different network protocols and technologies interact with each other.

  • Each layer in the OSI model has a specific function and communicates with the adjacent layers.

  • The seven layers of the OSI model are: Physical, Data Link, Network, Transport, Session, Presentation, and Applicati...read more

Add your answer

Q93. what is wan

Ans.

WAN stands for Wide Area Network, a network that covers a broad area such as multiple buildings, cities, or countries.

  • WAN is used to connect geographically dispersed locations.

  • It typically utilizes public or private communication links.

  • Examples of WAN technologies include MPLS, leased lines, and VPNs.

Add your answer

Q94. current technology work

Ans.

Current technology is constantly evolving and improving, with advancements in areas such as artificial intelligence, virtual reality, and 5G networks.

  • Artificial intelligence is being used in various industries, such as healthcare, finance, and transportation, to improve efficiency and accuracy.

  • Virtual reality is being used in gaming, education, and even therapy to provide immersive experiences.

  • 5G networks are being rolled out globally, providing faster internet speeds and ena...read more

Add your answer

Q95. Backup port no for SQL

Ans.

The backup port number for SQL is 1433.

  • The default backup port number for SQL is 1433.

  • This port number can be changed during installation or configuration.

  • It is important to ensure that the backup port is open and accessible for backup and restore operations.

Add your answer

Q96. Any type of isp

Ans.

ISPs (Internet Service Providers) provide internet access to customers through various technologies.

  • ISPs offer different types of internet connections such as DSL, cable, fiber optic, and satellite.

  • Some ISPs also provide additional services like email accounts, web hosting, and online storage.

  • Examples of ISPs include Comcast, AT&T, Verizon, and Spectrum.

Add your answer
Contribute & help others!
Write a review
Share interview
Contribute salary
Add office photos

Interview Process at Atomberg Technologies

based on 115 interviews
Interview experience
4.2
Good
View more
Interview Tips & Stories
Ace your next interview with expert advice and inspiring stories

Top Interview Questions from Similar Companies

3.8
 • 1.7k Interview Questions
3.6
 • 340 Interview Questions
4.1
 • 279 Interview Questions
4.1
 • 221 Interview Questions
3.5
 • 213 Interview Questions
4.3
 • 178 Interview Questions
View all
Top Sify Technologies Interview Questions And Answers
Share an Interview
Stay ahead in your career. Get AmbitionBox app
qr-code
Helping over 1 Crore job seekers every month in choosing their right fit company
70 Lakh+

Reviews

5 Lakh+

Interviews

4 Crore+

Salaries

1 Cr+

Users/Month

Contribute to help millions

Made with ❤️ in India. Trademarks belong to their respective owners. All rights reserved © 2024 Info Edge (India) Ltd.

Follow us
  • Youtube
  • Instagram
  • LinkedIn
  • Facebook
  • Twitter