SISL Infotech
10+ Rkec Project Interview Questions and Answers
Q1. Router configuration, switch configuration, types off switch, what's the decives you use in your previous project?
I have experience in configuring routers and switches, including different types of switches. In my previous project, I used devices such as Cisco routers and switches.
Configured routers and switches in previous projects
Familiar with different types of switches
Used devices like Cisco routers and switches
Q2. What is dhcp and what is dhcp option 42? What is dhcp option 40 ?
DHCP is a network protocol that assigns IP addresses to devices. DHCP option 42 is the NTP server option, while DHCP option 40 is the NIS domain option.
DHCP is a protocol used to automatically assign IP addresses to devices on a network.
DHCP option 42 is used to specify the Network Time Protocol (NTP) server that the client should use.
DHCP option 40 is used to specify the Network Information Service (NIS) domain that the client should use.
Q3. You heard about radius protocal? Why we used radius protocal
Radius protocol is used for authentication, authorization, and accounting in network communication.
Radius protocol is used to authenticate users before granting access to a network.
It also authorizes users based on their credentials and permissions.
Radius protocol provides accounting functionality to track and monitor user activity on the network.
It is commonly used in enterprise networks, VPNs, and wireless networks.
Example: When a user tries to connect to a Wi-Fi network, t...read more
Q4. 1.What is zoning and different types of zoning.2. Different types of HDD used in Storage area network 3.what is de-duplication and degraded mode. 4.how to create lun for NFS/CIFS client in netapp 5.what is onta...
read moreInterview questions for Netapp Storage Administrator
Zoning is a process of creating logical groups of devices in a SAN
Types of zoning include WWN zoning, Port zoning, and Mixed zoning
Different types of HDD used in SAN include SAS, SATA, and SSD
De-duplication is a process of eliminating duplicate data to save storage space
Degraded mode is a state in which a storage system operates with reduced functionality due to a failed component
LUN can be created for NFS/CIFS client in Net...read more
Q5. What is vlan how you create vlan.?
VLAN stands for Virtual Local Area Network. It is a method of segmenting a physical network into multiple virtual networks.
VLANs are created by configuring network switches to assign specific ports to a particular VLAN.
Each VLAN operates as a separate network, allowing for better network management and security.
VLANs can be created based on different criteria such as department, function, or location.
For example, a company may create VLANs for finance, marketing, and IT depar...read more
Q6. Top 10 basic Linux command for using monitoring
Top 10 basic Linux commands for monitoring
top - display system processes
htop - interactive process viewer
free - display memory usage
df - display disk usage
du - display directory space usage
netstat - display network connections
ss - another tool to display network connections
ps - display process status
kill - terminate a process
tail - display the last few lines of a file
Q7. What is lvm and how we extend lv
LVM (Logical Volume Manager) is a tool used to manage disk space by creating logical volumes from physical volumes.
LVM allows for dynamic resizing of logical volumes without the need to unmount the filesystem
To extend a logical volume, use the 'lvextend' command followed by the size to extend by and the logical volume name
For example, to extend a logical volume named 'lv_data' by 100MB, the command would be 'lvextend -L +100M /dev/vg_data/lv_data'
Q8. What is difference between rpm and yum
rpm is a package manager for Red Hat-based systems, while yum is a high-level package manager that uses rpm as its backend.
rpm is a low-level package manager that directly interacts with the system's package database and files
yum is a high-level package manager that automates the process of dependency resolution and package installation
yum can also automatically download and install dependencies for a package, while rpm does not have this capability
Q9. What is siem integeration
SIEM integration refers to the process of connecting a Security Information and Event Management system with other security tools and systems.
SIEM integration allows for centralized monitoring and analysis of security events across an organization.
It enables correlation of data from various sources to detect and respond to security incidents more effectively.
Examples of SIEM integration include connecting SIEM with firewalls, intrusion detection systems, and endpoint security...read more
Q10. What is patching
Patching is the process of applying updates or fixes to software to improve security, fix bugs, or add new features.
Patching involves applying updates or fixes to software to address security vulnerabilities.
It can also be used to fix bugs or improve performance.
Patching is important to keep software up to date and secure.
Examples of patching include installing security updates on a Linux server or updating software on a computer to the latest version.
Q11. what is replication
Replication is the process of creating and maintaining copies of data in multiple locations for redundancy and disaster recovery purposes.
Replication involves copying data from one location to another in real-time or near real-time
It helps in ensuring data availability and integrity in case of hardware failures or disasters
There are different types of replication such as synchronous, asynchronous, and snapshot replication
Examples include database replication for high availabi...read more
Q12. type of replication ?
There are different types of replication, including synchronous, asynchronous, and snapshot replication.
Synchronous replication ensures that data is replicated to multiple locations simultaneously, providing real-time data protection.
Asynchronous replication allows for a delay between data being written to the primary storage and being replicated to secondary storage.
Snapshot replication creates point-in-time copies of data for backup and recovery purposes.
Q13. Types of components in Reactjs
Reactjs components include class components, functional components, and higher-order components.
Class components are ES6 classes that extend React.Component and have a render method.
Functional components are simple functions that take props as input and return JSX.
Higher-order components are functions that take a component as input and return a new component with additional functionality.
Examples: Class component - class MyComponent extends React.Component {...}, Functional c...read more
Top HR Questions asked in Rkec Project
Interview Process at Rkec Project
Top Interview Questions from Similar Companies
Reviews
Interviews
Salaries
Users/Month