Filter interviews by
I applied via Walk-in and was interviewed before Aug 2021. There was 1 interview round.
ARP is a protocol used to map an IP address to a MAC address. It detects different networks by comparing the IP address and subnet mask.
ARP stands for Address Resolution Protocol
It maps an IP address to a MAC address
It works by broadcasting an ARP request to all devices on the network
The device with the matching IP address responds with its MAC address
If the destination device is in a different network, ARP compares th
DHCP assigns IP addresses to devices on a network. Relay agent forwards DHCP messages between subnets.
DHCP (Dynamic Host Configuration Protocol) assigns IP addresses, subnet masks, default gateways, and DNS servers to devices on a network.
DHCP server listens for DHCP requests from clients and responds with an IP address lease.
Relay agent is used when DHCP server and client are on different subnets. It forwards DHCP mes...
Packet flow for Google involves multiple steps and routing protocols.
Packet is sent from user's device to local router
Local router forwards packet to ISP's router
ISP's router forwards packet to Google's edge router
Google's edge router forwards packet to appropriate data center
Packet is processed and response is sent back through same path
Top trending discussions
I applied via Job Portal
The OSI model is a conceptual framework that defines the functions of a network into seven distinct layers.
The OSI model stands for Open Systems Interconnection model.
It was developed by the International Organization for Standardization (ISO) in 1984.
The model is divided into seven layers: Physical, Data Link, Network, Transport, Session, Presentation, and Application.
Each layer has its own specific functions and prot...
VPN is a secure way to connect to a private network over the internet. Private IP ranges are used to assign IP addresses within a network.
VPN stands for Virtual Private Network
It allows users to securely access a private network over the internet
VPN encrypts the data transmitted over the network to ensure security
Private IP ranges are used to assign IP addresses within a network
There are three classes of private IP ran...
I applied via campus placement at Kanpur University and was interviewed in Oct 2021. There were 2 interview rounds.
A batsman scored 110 runs which included 3 boundaries and 8 sixes. What percent of his total score did he make by running between the wickets?
posted on 27 Apr 2020
I applied via LinkedIn and was interviewed in Oct 2019. There were 3 interview rounds.
VPC (Virtual Private Cloud) is a virtual network in the cloud that allows users to securely connect their resources.
VPC provides isolated networking environment in the cloud
Users can define their own IP address range, subnets, and route tables
VPC allows creation of public and private subnets
Network Access Control Lists (ACLs) and Security Groups can be used to control inbound and outbound traffic
VPC peering enables con...
IPSec is a protocol suite used to secure IP communications by authenticating and encrypting each IP packet.
IPSec operates at the network layer of the OSI model.
It provides data confidentiality, integrity, and authentication.
IPSec uses two main protocols: Authentication Header (AH) and Encapsulating Security Payload (ESP).
During tunnel formation, the following packets are exchanged: IKE Phase 1 Main Mode, IKE Phase 1 Ag
I was interviewed before Aug 2016.
DHCP stands for Dynamic Host Configuration Protocol. It is a network protocol that automatically assigns IP addresses to devices on a network.
DHCP is used to manage and distribute IP addresses in a network
It allows devices to obtain IP addresses dynamically instead of manually configuring them
DHCP also provides other network configuration information like subnet mask, default gateway, and DNS server addresses
MAC (Media...
I applied via Referral and was interviewed before Jan 2022. There were 3 interview rounds.
The question requires the candidate to read back a dictated text on the screen.
The candidate should listen carefully to the dictated text.
The candidate should then read back the text accurately.
The candidate should ensure that they have understood the text before reading it back.
Examples: 'Please read back the following sentence: The quick brown fox jumps over the lazy dog.'
Examples: 'Please read back the following par...
OSPF and BGP are routing protocols used in networking to determine the best path for data to travel.
OSPF (Open Shortest Path First) is an interior gateway protocol used to route IP packets within a single network.
BGP (Border Gateway Protocol) is an exterior gateway protocol used to route data between different networks.
Networking refers to the practice of connecting devices together to share resources and communicate w...
I applied via Walk-in and was interviewed before Feb 2022. There were 4 interview rounds.
Answering questions related to crimping, UTP fiber, VLANs, and the difference between hub and switch for a Network Engineer position.
Crimping RJ45 connectors onto UTP cables is a common task for network engineers. Advantages include ease of installation and cost-effectiveness. Disadvantages include susceptibility to interference and limited distance.
UTP fiber cables offer higher bandwidth and longer distances than UTP ...
VLANs provide segmentation, security, and flexibility in network design.
VLANs allow for logical segmentation of a network, separating traffic into different broadcast domains.
This improves network performance and reduces congestion.
VLANs also provide enhanced security by isolating sensitive data and restricting access to certain areas of the network.
They also allow for flexibility in network design, making it easier to...
Virus name and solving techniques
I applied via campus placement at Kanpur University and was interviewed in Oct 2021. There were 2 interview rounds.
A batsman scored 110 runs which included 3 boundaries and 8 sixes. What percent of his total score did he make by running between the wickets?
I applied via Job Portal
The OSI model is a conceptual framework that defines the functions of a network into seven distinct layers.
The OSI model stands for Open Systems Interconnection model.
It was developed by the International Organization for Standardization (ISO) in 1984.
The model is divided into seven layers: Physical, Data Link, Network, Transport, Session, Presentation, and Application.
Each layer has its own specific functions and prot...
based on 1 review
Rating in categories
Technical Support Engineer
104
salaries
| ₹3.5 L/yr - ₹11 L/yr |
Senior Software Engineer
87
salaries
| ₹14.8 L/yr - ₹42 L/yr |
Network Security Engineer
68
salaries
| ₹4.7 L/yr - ₹16.4 L/yr |
Software Engineer
41
salaries
| ₹6.3 L/yr - ₹22.5 L/yr |
Software Engineer III
33
salaries
| ₹11.8 L/yr - ₹30 L/yr |
QUICK HEAL TECHNOLOGIES
Trend Micro
McAfee
Gen