Filter interviews by
I was interviewed in Dec 2024.
I have experience working at ABC Company as a Network Engineer.
Worked at ABC Company as a Network Engineer
Managed network infrastructure at ABC Company
Implemented network security measures at ABC Company
VLAN stands for Virtual Local Area Network. It is a method of segmenting a physical network into multiple virtual networks.
VLANs are created by configuring network switches to assign specific ports to a particular VLAN.
Each VLAN operates as a separate network, allowing for better network management and security.
VLANs can be created based on different criteria such as department, function, or location.
For example, a com...
DHCP is a network protocol that assigns IP addresses to devices. DHCP option 42 is the NTP server option, while DHCP option 40 is the NIS domain option.
DHCP is a protocol used to automatically assign IP addresses to devices on a network.
DHCP option 42 is used to specify the Network Time Protocol (NTP) server that the client should use.
DHCP option 40 is used to specify the Network Information Service (NIS) domain that t
Radius protocol is used for authentication, authorization, and accounting in network communication.
Radius protocol is used to authenticate users before granting access to a network.
It also authorizes users based on their credentials and permissions.
Radius protocol provides accounting functionality to track and monitor user activity on the network.
It is commonly used in enterprise networks, VPNs, and wireless networks.
E...
I have experience in configuring routers and switches, including different types of switches. In my previous project, I used devices such as Cisco routers and switches.
Configured routers and switches in previous projects
Familiar with different types of switches
Used devices like Cisco routers and switches
I was a Network Engineer responsible for designing, implementing, and maintaining network infrastructure.
Designed and implemented network infrastructure to support company operations
Maintained network security by implementing firewalls and monitoring systems
Troubleshooted network issues and provided technical support to end users
Collaborated with cross-functional teams to ensure network reliability and performance
Left
LVM (Logical Volume Manager) is a tool used to manage disk space by creating logical volumes from physical volumes.
LVM allows for dynamic resizing of logical volumes without the need to unmount the filesystem
To extend a logical volume, use the 'lvextend' command followed by the size to extend by and the logical volume name
For example, to extend a logical volume named 'lv_data' by 100MB, the command would be 'lvextend -
Patching is the process of applying updates or fixes to software to improve security, fix bugs, or add new features.
Patching involves applying updates or fixes to software to address security vulnerabilities.
It can also be used to fix bugs or improve performance.
Patching is important to keep software up to date and secure.
Examples of patching include installing security updates on a Linux server or updating software on
SIEM integration refers to the process of connecting a Security Information and Event Management system with other security tools and systems.
SIEM integration allows for centralized monitoring and analysis of security events across an organization.
It enables correlation of data from various sources to detect and respond to security incidents more effectively.
Examples of SIEM integration include connecting SIEM with fir...
rpm is a package manager for Red Hat-based systems, while yum is a high-level package manager that uses rpm as its backend.
rpm is a low-level package manager that directly interacts with the system's package database and files
yum is a high-level package manager that automates the process of dependency resolution and package installation
yum can also automatically download and install dependencies for a package, while rp
I applied via Approached by Company and was interviewed in May 2024. There was 1 interview round.
Reactjs components include class components, functional components, and higher-order components.
Class components are ES6 classes that extend React.Component and have a render method.
Functional components are simple functions that take props as input and return JSX.
Higher-order components are functions that take a component as input and return a new component with additional functionality.
Examples: Class component - cla...
SISL Infotech interview questions for popular designations
Get interview-ready with Top SISL Infotech Interview Questions
I applied via Approached by Company and was interviewed in May 2023. There were 4 interview rounds.
I have hands-on experience in AWS and prefer it over GCP and Azure due to its extensive service offerings and market dominance.
Hands-on experience in AWS services such as EC2, S3, RDS, Lambda, etc.
Preference for AWS due to its wide range of services, strong community support, and market leadership.
Familiarity with GCP and Azure, but find AWS more suitable for my current needs.
I was interviewed in Dec 2023.
I applied via Referral and was interviewed in Apr 2023. There were 3 interview rounds.
No one asking me hard question just ask for some normal and parsonal questions
I was interviewed before Aug 2022.
I applied via Referral and was interviewed before May 2023. There was 1 interview round.
Replication is the process of creating and maintaining copies of data in multiple locations for redundancy and disaster recovery purposes.
Replication involves copying data from one location to another in real-time or near real-time
It helps in ensuring data availability and integrity in case of hardware failures or disasters
There are different types of replication such as synchronous, asynchronous, and snapshot replicat...
There are different types of replication, including synchronous, asynchronous, and snapshot replication.
Synchronous replication ensures that data is replicated to multiple locations simultaneously, providing real-time data protection.
Asynchronous replication allows for a delay between data being written to the primary storage and being replicated to secondary storage.
Snapshot replication creates point-in-time copies of
Top trending discussions
Some of the top questions asked at the SISL Infotech interview -
The duration of SISL Infotech interview process can vary, but typically it takes about less than 2 weeks to complete.
based on 19 interviews
Interview experience
based on 340 reviews
Rating in categories
Software Developer
93
salaries
| â‚ą0 L/yr - â‚ą0 L/yr |
Senior Software Developer
56
salaries
| â‚ą0 L/yr - â‚ą0 L/yr |
Network Engineer
44
salaries
| â‚ą0 L/yr - â‚ą0 L/yr |
Senior Programmer
44
salaries
| â‚ą0 L/yr - â‚ą0 L/yr |
Programmer
37
salaries
| â‚ą0 L/yr - â‚ą0 L/yr |
TCS
Infosys
Wipro
HCLTech