Add office photos
Engaged Employer

Tata Communications

4.1
based on 3.2k Reviews
Filter interviews by

100+ Interview Questions and Answers

Updated 6 Dec 2024
Popular Designations

Q1. What is BGP? What is spilit horizon rule? How you configure BGP route reflector? Tell BGP path selection algorithm? ebgp multihop concept? OSPF LSA types and descriptions? How to redistribute OSPF into BGP? Wha...

read more
Ans.

BGP is a routing protocol used to exchange routing information between different autonomous systems. It uses path vector algorithm.

  • Split horizon rule prevents a router from advertising a route back to the same interface from which it was learned.

  • BGP route reflector is configured by defining a cluster ID and selecting reflector clients.

  • BGP path selection algorithm selects the best path based on attributes like AS path length, origin code, MED, etc.

  • EBGP multihop concept is used...read more

Add your answer

Q2. What is floating routing and how we can configure it

Ans.

Floating routing is a technique used to route traffic between two networks without a direct physical connection.

  • It involves creating a virtual interface on each network and configuring them to communicate with each other.

  • This can be done using protocols such as GRE or IPsec.

  • Floating routing can be useful in scenarios where a direct physical connection is not possible or desirable, such as connecting two data centers.

  • Configuration can vary depending on the specific network equ...read more

View 1 answer

Q3. To maintain SIEM solution which are the daily activities that you will perform?

Ans.

Daily activities for maintaining SIEM solution

  • Monitor SIEM alerts and investigate any potential security incidents

  • Review and update SIEM rules and policies

  • Ensure SIEM data sources are properly configured and updated

  • Perform regular backups and test disaster recovery procedures

  • Stay up-to-date with the latest security threats and trends

  • Collaborate with other teams to ensure proper integration with other security tools

  • Provide regular reports on SIEM performance and security incid...read more

View 3 more answers

Q4. Ospf are types,ospf network types,ospf lsas and what they do,bgp sequential attributes,static route config,bgp config,subnetting questions to solve,AD values of various routing protocols

Ans.

The interview question covers topics related to OSPF, BGP, static routing, subnetting, and AD values of routing protocols.

  • OSPF types include OSPFv2 and OSPFv3

  • OSPF network types include broadcast, non-broadcast, point-to-point, and point-to-multipoint

  • OSPF LSAs include router, network, summary, and AS-external

  • BGP sequential attributes include weight, local preference, AS path, origin, MED, and community

  • Static route config involves manually configuring routes in a routing table

  • B...read more

Add your answer
Discover null interview dos and don'ts from real experiences

Q5. Which Routing Protocols you have learnt and explain any one?

Ans.

I have learnt OSPF, Open Shortest Path First.

  • OSPF is a link-state routing protocol.

  • It uses Dijkstra's algorithm to calculate the shortest path.

  • It supports variable-length subnet masks.

  • It uses multicast to communicate with other routers.

  • It is commonly used in large enterprise networks.

  • Example: OSPF is used in a company with multiple locations to ensure efficient routing of traffic between them.

Add your answer

Q6. What is capitalization of asset What is lease accounting under ind as Explain depreciation and amortization Golden rules of accounting

Ans.

Capitalization of asset, lease accounting under IND AS, depreciation and amortization, and golden rules of accounting.

  • Capitalization of asset refers to the process of recording an expenditure as an asset rather than an expense.

  • Lease accounting under IND AS requires lessees to recognize lease assets and liabilities on their balance sheets.

  • Depreciation is the systematic allocation of the cost of a tangible asset over its useful life.

  • Amortization is the systematic allocation of ...read more

Add your answer
Are these interview questions helpful?

Q7. Which use cases will you create to prevent web attacks and on which device?

Ans.

Use cases to prevent web attacks on various devices

  • Implementing firewalls and intrusion detection systems on servers

  • Using anti-virus and anti-malware software on client devices

  • Regularly updating software and security patches

  • Enforcing strong password policies and multi-factor authentication

  • Conducting regular security audits and penetration testing

  • Implementing HTTPS and SSL certificates on websites

  • Using content security policies to prevent cross-site scripting and injection att...read more

Add your answer

Q8. Which use case will you create based on OWASP top 10?

Ans.

A use case to prevent SQL injection attacks

  • Implement input validation and sanitization

  • Use parameterized queries

  • Limit database user privileges

  • Regularly update and patch database software

Add your answer
Share interview questions and help millions of jobseekers 🌟

Q9. How do you perform docker migration from one machine to another machine?

Ans.

Docker migration from one machine to another involves exporting the container as an image, transferring the image to the new machine, and then importing it.

  • Export the Docker container as an image using 'docker save' command

  • Transfer the image to the new machine using a secure method like SCP or Docker Hub

  • Import the image on the new machine using 'docker load' command

  • Run the container on the new machine using 'docker run' command

Add your answer

Q10. What is difference between cyber kill chain and Mitre framework?

Ans.

Cyber kill chain and Mitre framework are both used for cyber threat intelligence, but the former focuses on attack stages while the latter provides a comprehensive framework for threat intelligence.

  • Cyber kill chain is a model that describes the stages of a cyber attack, from reconnaissance to exfiltration.

  • Mitre framework is a comprehensive framework for organizing and analyzing threat intelligence, including attack patterns, tactics, and techniques.

  • Cyber kill chain is more fo...read more

Add your answer

Q11. How to tshoot when you are not going to ping?

Ans.

Use alternative network troubleshooting methods like traceroute, netstat, nslookup, and checking firewall rules.

  • Use traceroute to identify the path taken by packets and locate any network issues.

  • Use netstat to check for open ports and connections.

  • Use nslookup to verify DNS resolution.

  • Check firewall rules to ensure they are not blocking traffic.

  • Use packet capture tools like Wireshark to analyze network traffic.

  • Check system logs for any errors or warnings related to network con...read more

Add your answer

Q12. What is OTN?

Ans.

OTN stands for Optical Transport Network, a high-speed network technology used for transmitting large amounts of data over optical fibers.

  • OTN is a standardized protocol for optical networking

  • It uses wavelength division multiplexing (WDM) to increase bandwidth

  • OTN supports different types of traffic, including voice, video, and data

  • It provides features like error correction, fault management, and network resilience

  • OTN is used in long-haul and metro networks, data centers, and c...read more

Add your answer

Q13. Which are basic building blocks of communication>

Ans.

The basic building blocks of communication are sender, message, channel, receiver, feedback, and context.

  • Sender: the person or entity who initiates the communication

  • Message: the information being conveyed

  • Channel: the medium through which the message is transmitted

  • Receiver: the person or entity who receives the message

  • Feedback: the response or reaction of the receiver to the message

  • Context: the situation or environment in which the communication takes place

Add your answer

Q14. Switching STP HSRP VLAN RSTP BPDU guard vs BPDU filter

Ans.

Explanation of STP, HSRP, VLAN, RSTP, BPDU guard and BPDU filter in network switching.

  • STP (Spanning Tree Protocol) is used to prevent loops in a network by blocking redundant paths.

  • HSRP (Hot Standby Router Protocol) provides redundancy for IP networks by allowing multiple routers to share a virtual IP address.

  • VLAN (Virtual Local Area Network) is a logical grouping of devices on a network, allowing for better network management and security.

  • RSTP (Rapid Spanning Tree Protocol) ...read more

Add your answer

Q15. What is SDH?

Ans.

SDH stands for Synchronous Digital Hierarchy, a standard for transmitting digital signals over optical fiber networks.

  • SDH is used for high-speed communication in telecommunications networks.

  • It is a standardized protocol for transmitting digital signals at different rates.

  • SDH is used to multiplex different signals onto a single fiber optic cable.

  • It provides a reliable and efficient way to transmit data over long distances.

  • Examples of SDH rates include STM-1 (155 Mbps) and STM-...read more

View 2 more answers

Q16. How you can improve our industry reputation & growth by urself...?

Ans.

By implementing industry best practices, fostering collaboration, and promoting innovation.

  • Identify and implement industry best practices to improve efficiency and quality.

  • Collaborate with stakeholders to identify and address industry challenges.

  • Promote innovation by encouraging experimentation and risk-taking.

  • Establish a culture of continuous improvement through training and development.

  • Engage with industry associations and thought leaders to stay up-to-date on trends and em...read more

Add your answer

Q17. 1 What is PSTN? 2 what is OSI model? Explain in brief.

Ans.

PSTN is a traditional telephone network that uses copper wires to transmit analog voice data.

  • PSTN stands for Public Switched Telephone Network

  • It is a circuit-switched network that uses analog signals

  • It is being replaced by digital networks like VoIP

  • Examples of PSTN services include landline phones and fax machines

Add your answer

Q18. How will you stabilize a new hosting customer who is not satisfied with the service so far

Ans.

To stabilize a new hosting customer who is not satisfied with the service, I would take the following steps:

  • Listen to the customer's concerns and empathize with their frustrations

  • Investigate the root cause of the dissatisfaction and identify any service gaps

  • Communicate transparently with the customer, keeping them informed about the steps being taken to address their concerns

  • Offer immediate solutions or workarounds to alleviate the customer's dissatisfaction

  • Implement necessar...read more

Add your answer

Q19. Which types of use case you will create for WAF?

Ans.

WAF use cases include protection against OWASP Top 10 vulnerabilities, DDoS attacks, and web application attacks.

  • Protection against SQL injection attacks

  • Prevention of cross-site scripting (XSS) attacks

  • Blocking of malicious bots and crawlers

  • Mitigation of distributed denial-of-service (DDoS) attacks

  • Enforcement of security policies and compliance regulations

  • Monitoring and logging of web traffic for threat detection and incident response

Add your answer

Q20. Shearing Characteristics of a Natural Cemented Gravel Soil Trough Large in situ Direct Shear Test Flexural Strength of Concrete

Ans.

The question is not relevant to the CRM/Customer Service Manager position.

  • The question seems to be related to geotechnical engineering or construction materials testing.

  • It may be useful for someone working in those fields, but not for a CRM/Customer Service Manager.

  • It's important to stay focused on the job requirements and responsibilities when interviewing for a position.

Add your answer

Q21. Have you created use cases with multiple devices?

Ans.

Yes, I have created use cases with multiple devices.

  • I have experience creating use cases for mobile and desktop devices.

  • I have also created use cases for wearable devices and IoT devices.

  • One example is when I created use cases for a mobile app that could be used in conjunction with a smartwatch.

  • Another example is when I created use cases for a web application that could be accessed from both desktop and mobile devices.

Add your answer

Q22. Characteristics of a Natural Cemented Gravel Soil Trough Large in situ Direct Shear Test Flexural Strength of Concrete

Ans.

The question is not relevant to the job position of CRM/Customer Service Manager.

  • The question seems to be related to civil engineering or geology.

  • It may require knowledge of natural cemented gravel soil and its properties.

  • The in situ direct shear test and flexural strength of concrete are specific testing methods.

  • Answering this question may require expertise in the field of civil engineering or geology.

Add your answer

Q23. How will you handle production deployment issues?

Ans.

I will troubleshoot the issue, identify the root cause, and work with the team to implement a solution while minimizing downtime.

  • Quickly assess the situation and gather relevant information

  • Identify the root cause of the deployment issue

  • Collaborate with team members to come up with a solution

  • Implement the solution while minimizing impact on production environment

  • Communicate with stakeholders about the issue and resolution

Add your answer

Q24. Difference between password spraying and brute-force attack?

Ans.

Password spraying is trying a few commonly used passwords on multiple accounts, while brute-force attack is trying all possible combinations of characters to crack a password.

  • Password spraying is a type of attack where a few commonly used passwords are tried on multiple accounts to gain unauthorized access.

  • Brute-force attack is a type of attack where all possible combinations of characters are tried to crack a password.

  • Password spraying is a less time-consuming attack as comp...read more

Add your answer

Q25. what is networking and osi model

Ans.

Networking is the practice of connecting devices to share resources. OSI model is a conceptual framework for network communication.

  • Networking involves connecting devices to share resources such as data, printers, and internet access.

  • OSI model is a conceptual framework that defines how data is transmitted over a network.

  • It consists of seven layers, each with a specific function, from physical transmission to application-level communication.

  • The layers are: Physical, Data Link, ...read more

Add your answer

Q26. What is meant by bandwidth?

Ans.

Bandwidth refers to the amount of data that can be transmitted over a network or internet connection in a given amount of time.

  • Bandwidth is measured in bits per second (bps)

  • Higher bandwidth means faster data transfer rates

  • Bandwidth can be limited by factors such as network congestion or hardware limitations

  • Examples of high bandwidth applications include video streaming and online gaming

Add your answer

Q27. Which is the best use case that you have created?

Ans.

Developed a use case for streamlining team communication and task management

  • Created a centralized platform for team members to communicate and collaborate on tasks

  • Implemented task tracking and progress monitoring features

  • Reduced miscommunication and increased productivity

  • Received positive feedback from team members and management

Add your answer

Q28. what do you know about ipv4 vs ipv6,ip masking and more computer network related stuff

Ans.

IPv4 and IPv6 are internet protocol versions. IP masking is a technique to hide IP addresses.

  • IPv4 is the fourth version of the Internet Protocol, while IPv6 is the sixth version.

  • IPv4 uses 32-bit addresses, allowing for approximately 4.3 billion unique addresses.

  • IPv6 uses 128-bit addresses, providing a significantly larger address space.

  • IP masking, also known as IP anonymization, is the process of hiding the IP address of a device or user.

  • It is commonly used for privacy protec...read more

Add your answer

Q29. What is the use of networking in a company?

Ans.

Networking in a company allows for communication, data sharing, resource sharing, and collaboration among employees and departments.

  • Facilitates communication between employees, departments, and branches

  • Enables sharing of resources such as printers, servers, and internet connection

  • Allows for centralized data storage and access

  • Facilitates collaboration on projects and tasks

  • Enhances security through network monitoring and access control

Add your answer

Q30. Describe how proper documentation applies in clinical research

Ans.

Proper documentation in clinical research ensures accuracy, traceability, and compliance with regulations.

  • Proper documentation helps in maintaining accurate records of all research activities and findings.

  • It ensures traceability of data, allowing for verification and replication of results.

  • Documentation is essential for compliance with regulatory requirements and ethical standards.

  • Examples include keeping detailed records of study protocols, informed consent forms, data colle...read more

Add your answer

Q31. Q1. Describe how proper documentation applies in clinical research

Ans.

Proper documentation in clinical research ensures accuracy, transparency, and compliance with regulations.

  • Proper documentation helps in maintaining accurate records of study procedures, data collection, and analysis.

  • It ensures transparency by allowing other researchers to verify the results and replicate the study if needed.

  • Documentation is essential for compliance with regulatory requirements and ethical standards.

  • Examples of documentation in clinical research include study ...read more

Add your answer

Q32. Natural Cemented Gravel Soil Trough Large in situ Direct Shear Test Flexural Strength of Concrete

Ans.

The question is not related to CRM/Customer Service Manager role.

  • The question seems to be related to civil engineering or construction field.

  • It may require knowledge of soil mechanics and concrete testing.

  • As a CRM/Customer Service Manager, this question may not be relevant to the job responsibilities.

  • It is important to clarify the relevance of the question to the job role before answering.

Add your answer

Q33. What is DWDM, SDH Equipments knowledge

Ans.

DWDM stands for Dense Wavelength Division Multiplexing and SDH stands for Synchronous Digital Hierarchy. Knowledge of these equipments is essential for managing network infrastructure.

  • DWDM is a technology that multiplexes multiple optical carrier signals on a single optical fiber by using different wavelengths of laser light.

  • SDH is a standardized multiplexing protocol used to transfer data over optical fibers.

  • Understanding the functionalities, configurations, and troubleshoot...read more

Add your answer

Q34. Tell us about computer

Ans.

A computer is an electronic device that can perform various tasks by executing instructions given to it.

  • Computers can be used for communication, entertainment, education, and work.

  • They consist of hardware components such as a central processing unit (CPU), memory, and storage devices.

  • Software programs are used to control and operate the computer.

  • Examples of computers include desktops, laptops, tablets, and smartphones.

View 1 answer

Q35. How you deal with critical situation in Data Center

Add your answer

Q36. How much transfer customer

Ans.

The question is unclear and lacks context.

  • Request clarification on what is meant by 'transfer customer'

  • Ask for more information about the specific role and responsibilities of an Assistant Manager

  • Seek clarification on the purpose or objective behind the question

Add your answer

Q37. How to swap two variables without using third variable

Ans.

To swap two variables without using a third variable, use arithmetic operations.

  • Use addition and subtraction to swap values

  • Example: a = 5, b = 10. a = a + b (a = 15), b = a - b (b = 5), a = a - b (a = 10)

View 1 answer

Q38. What is ospf,and how to work.

Ans.

OSPF is a routing protocol used in computer networks to determine the best path for data to travel.

  • OSPF stands for Open Shortest Path First.

  • It is a link-state routing protocol.

  • It uses Dijkstra's algorithm to calculate the shortest path.

  • OSPF routers exchange information about their connected links to build a topology map of the network.

  • This allows the routers to determine the best path for data to travel.

  • OSPF is commonly used in large enterprise networks.

  • It is also used in int...read more

Add your answer

Q39. What is MAC? Explain in brief.

Ans.

MAC stands for Media Access Control. It is a unique identifier assigned to network interfaces for communication.

  • MAC address is a 48-bit address assigned to network devices.

  • It is used to identify devices on a network.

  • MAC addresses are assigned by the manufacturer and cannot be changed.

  • MAC filtering is a security feature that allows or denies access to a network based on MAC addresses.

  • Example: 00:1A:2B:3C:4D:5E is a MAC address.

Add your answer

Q40. Can you write a program to demonstrate soccket programming

Ans.

Yes

  • Socket programming is a way to establish communication between two computers over a network using sockets.

  • It involves creating a socket, binding it to an IP address and port, listening for incoming connections, and sending/receiving data.

  • Examples of socket programming include creating a chat application, a file transfer program, or a web server.

Add your answer

Q41. Tell about your technical Expertise in master data management.

Ans.

I have extensive experience in designing and implementing master data management solutions to ensure data accuracy and consistency.

  • Designed and implemented data governance policies and procedures

  • Developed data quality rules and processes

  • Integrated data from multiple sources to create a single, unified view of data

  • Utilized tools such as Informatica MDM or IBM InfoSphere MDM

  • Worked closely with business stakeholders to understand data requirements and ensure alignment with busin...read more

Add your answer

Q42. What is OSI model .explain layers of OSI model

Ans.

The OSI model is a conceptual model that characterizes and standardizes the communication functions of a telecommunication or computing system.

  • OSI stands for Open Systems Interconnection.

  • It has 7 layers: Physical, Data Link, Network, Transport, Session, Presentation, and Application.

  • Each layer has a specific function and communicates with the adjacent layers.

  • The Physical layer deals with the physical transmission of data.

  • The Data Link layer provides error-free transfer of dat...read more

Add your answer

Q43. How would you define ports of a Router?

Ans.

Ports of a router are physical connection points that allow devices to connect to the network.

  • Ports on a router can include Ethernet ports, USB ports, and WAN ports.

  • Each port serves a specific function, such as connecting a computer or printer to the network.

  • Routers may have different types and numbers of ports, depending on the model and manufacturer.

  • Ports can be used for wired or wireless connections, depending on the device being connected.

Add your answer

Q44. What do you know about Data Science?

Ans.

Data Science is an interdisciplinary field that involves the use of statistical and computational methods to extract insights from data.

  • Data Science involves the use of various techniques such as machine learning, data mining, and predictive analytics.

  • It is used to solve complex problems and make data-driven decisions.

  • Data Science is used in various industries such as healthcare, finance, and e-commerce.

  • Examples of Data Science applications include fraud detection, recommenda...read more

Add your answer

Q45. What all is required during Annual Operating Plan creation

Ans.

Annual Operating Plan creation requires detailed financial analysis, goal setting, resource allocation, and cross-functional collaboration.

  • Detailed financial analysis of past performance and future projections

  • Setting specific goals and targets for revenue, expenses, and other key metrics

  • Allocating resources effectively to achieve the set goals

  • Collaborating with different departments to align strategies and ensure feasibility

  • Regular monitoring and adjustments throughout the ye...read more

Add your answer

Q46. What is Cyber kill chain?

Ans.

Cyber kill chain is a framework that describes the stages of a cyber attack.

  • It consists of seven stages: reconnaissance, weaponization, delivery, exploitation, installation, command and control, and actions on objectives.

  • The framework helps organizations understand and defend against cyber attacks.

  • For example, if an attacker is in the reconnaissance stage, they are gathering information about the target.

  • By understanding the stages of a cyber attack, organizations can implemen...read more

Add your answer

Q47. What is practical Knowlage in IT?

Ans.

Practical knowledge in IT refers to the ability to apply theoretical knowledge to real-world situations.

  • Understanding of networking protocols and technologies

  • Experience with troubleshooting and problem-solving

  • Knowledge of security best practices

  • Familiarity with different operating systems and software

  • Ability to adapt to new technologies and learn quickly

Add your answer

Q48. Any thing about telecommunication you might wanna share

Ans.

Telecommunication is the transmission of information over long distances using technology.

  • Telecommunication involves the use of various devices and networks to transmit data, voice, and video.

  • Examples of telecommunication technologies include telephone networks, internet services, and satellite communication.

  • Telecommunication plays a crucial role in connecting people globally and enabling communication across different locations.

  • Advancements in telecommunication have led to f...read more

Add your answer

Q49. Do you have experience in Excel and PowerPoint?

Ans.

Yes, I have extensive experience in Excel and PowerPoint.

  • Proficient in creating complex formulas and macros in Excel

  • Skilled in creating professional presentations in PowerPoint

  • Experience in data analysis and visualization using Excel and PowerPoint

  • Used Excel for budgeting and financial analysis

  • Created interactive dashboards in Excel for tracking key metrics

Add your answer

Q50. What do you know about ML algorithm?

Ans.

ML algorithms are mathematical models used to analyze data and make predictions or decisions.

  • ML algorithms can be supervised, unsupervised, or semi-supervised

  • Examples of ML algorithms include linear regression, decision trees, and neural networks

  • ML algorithms require training data to learn from and improve their accuracy

  • The choice of algorithm depends on the problem being solved and the type of data available

Add your answer

Q51. Do you have knowledge of Pandas?

Ans.

Yes, Pandas is a popular Python library used for data manipulation and analysis.

  • Pandas provides data structures for efficiently storing and manipulating large datasets.

  • It offers tools for data cleaning, merging, reshaping, and visualization.

  • Pandas can handle various data formats such as CSV, Excel, SQL databases, and JSON.

  • Example: df = pd.read_csv('data.csv') creates a Pandas DataFrame from a CSV file.

  • Example: df.groupby('category')['sales'].sum() groups sales data by categor...read more

Add your answer

Q52. What is reverse lookup

Ans.

Reverse lookup is the process of finding the hostname associated with a given IP address.

  • It is commonly used in network troubleshooting.

  • It can be performed using the 'nslookup' command in the command prompt.

  • Reverse lookup is the opposite of forward lookup, which finds the IP address associated with a given hostname.

Add your answer

Q53. Why do you detect zero day threats using SIEM

Ans.

SIEM is used to detect zero day threats as it provides real-time monitoring and analysis of security events.

  • SIEM collects and analyzes data from various sources to identify potential threats

  • Zero day threats are unknown vulnerabilities that can be exploited by attackers

  • SIEM can detect zero day threats by analyzing patterns and anomalies in network traffic

  • SIEM can also use threat intelligence feeds to identify known zero day threats

  • Detecting zero day threats using SIEM can help...read more

Add your answer

Q54. How you will design Battery bank capacity

Add your answer

Q55. In which equipment do you have competency

Add your answer

Q56. What is position property in CSS3

Ans.

Position property in CSS3 is used to set the position of an element relative to its parent or the viewport.

  • The position property can take values like static, relative, absolute, fixed, and sticky.

  • Static is the default value and elements are positioned according to the normal flow of the document.

  • Relative positions the element relative to its normal position.

  • Absolute positions the element relative to its nearest positioned ancestor.

  • Fixed positions the element relative to the v...read more

Add your answer

Q57. Which device receives maximum EPS?

Ans.

The device that receives maximum EPS varies depending on the context and industry.

  • In the telecommunications industry, the device that receives maximum EPS is the base station.

  • In the automotive industry, the device that receives maximum EPS is the electronic control unit (ECU).

  • In the medical industry, the device that receives maximum EPS varies depending on the specific medical device.

  • EPS stands for events per second and refers to the rate at which events are processed by a de...read more

Add your answer

Q58. which is no.1 telecommunications industry

Ans.

The no.1 telecommunications industry is AT&T.

  • AT&T is a multinational conglomerate that provides telecommunications, media, and technology services.

  • It is one of the largest telecommunications companies in the world, offering a wide range of services such as wireless communication, internet, and TV services.

  • AT&T has a long history in the telecommunications industry and continues to innovate and expand its offerings.

Add your answer

Q59. Do you have knowledge of SAP.

Ans.

Yes, I have knowledge of SAP.

  • I have experience working with SAP in my previous role as a Project Coordinator.

  • I am familiar with SAP modules such as MM, SD, and FI.

  • I have used SAP for project tracking, budgeting, and reporting.

  • I am comfortable navigating SAP's user interface and can troubleshoot basic issues.

Add your answer

Q60. Design & phase of network management??

Ans.

Network management involves designing and implementing a system to monitor and control a network's performance.

  • Designing a network management system involves identifying the network's components and their interconnections.

  • The system must be able to monitor network traffic, identify problems, and alert administrators.

  • Network management systems can be centralized or distributed, depending on the size and complexity of the network.

  • Phases of network management include planning, i...read more

Add your answer

Q61. Defrence between BGP and ISIS protocol

Ans.

BGP and ISIS are routing protocols used in computer networks.

  • BGP is used for routing between different autonomous systems while ISIS is used for routing within a single autonomous system.

  • BGP uses path vector protocol while ISIS uses link-state protocol.

  • BGP is more scalable and complex than ISIS.

  • BGP is used in the internet while ISIS is used in enterprise networks.

  • BGP supports both IPv4 and IPv6 while ISIS only supports IPv4.

Add your answer

Q62. What is BGP?

Ans.

BGP stands for Border Gateway Protocol. It is a routing protocol used to exchange routing information between different networks on the internet.

  • BGP is used to connect different autonomous systems (AS) on the internet.

  • It is a path-vector protocol that selects the best path for data to travel between networks.

  • BGP is used by internet service providers (ISPs) to connect to each other and exchange routing information.

  • It is a complex protocol that requires careful configuration to...read more

Add your answer

Q63. What is rxjs observables in nagular

Ans.

Observables are a way to handle asynchronous data streams in Angular using RxJS library.

  • Observables are similar to promises but can handle multiple values over time.

  • They can be used for handling events, HTTP requests, and other asynchronous operations.

  • Operators can be used to transform, filter, and combine observables.

  • Subscriptions are used to listen to observables and receive data.

  • Example: fetching data from an API using observables and subscribing to the response.

Add your answer

Q64. Route Reflector how does it work.

Ans.

Route reflector is a networking concept that allows for efficient distribution of routing information.

  • Route reflectors are used in BGP (Border Gateway Protocol) networks to reduce the number of required peer connections.

  • They work by reflecting routes received from one peer to other peers, reducing the need for each peer to maintain a full mesh of connections.

  • Route reflectors can be configured in a hierarchy, with multiple levels of reflectors to handle larger networks.

  • They ca...read more

Add your answer

Q65. What is program management?

Ans.

Program management is the process of overseeing multiple related projects to achieve specific organizational goals.

  • Program management involves coordinating and aligning multiple projects towards a common objective.

  • It focuses on strategic planning, resource allocation, and risk management.

  • Program managers ensure that projects are executed efficiently and effectively, meeting deadlines and delivering desired outcomes.

  • They provide leadership, guidance, and support to project tea...read more

View 1 answer

Q66. Have you worked on Excel and PPT?

Ans.

Yes, I have extensive experience working with Excel and PowerPoint.

  • Proficient in creating complex formulas, pivot tables, and charts in Excel

  • Skilled in designing professional presentations with animations and transitions in PowerPoint

  • Experience in data analysis and reporting using Excel and creating visually appealing slides in PowerPoint

Add your answer

Q67. What is Retail Management in store

Ans.

Retail Management in store involves overseeing the day-to-day operations of a retail establishment.

  • Managing inventory and stock levels

  • Ensuring customer satisfaction and resolving complaints

  • Hiring, training, and scheduling staff

  • Analyzing sales data and implementing strategies to increase revenue

  • Maintaining store appearance and cleanliness

Add your answer

Q68. Which uses cases have created?

Ans.

We have created use cases for customer onboarding, order management, and inventory tracking.

  • Customer onboarding: designed a process for new customers to sign up and create an account

  • Order management: created a system for tracking orders from placement to delivery

  • Inventory tracking: developed a method for monitoring stock levels and reordering when necessary

Add your answer

Q69. tell about Computer languages?

Ans.

Computer languages are used to communicate instructions to computers, allowing programmers to create software and applications.

  • Computer languages are used to write code that tells computers what to do.

  • There are different types of computer languages, such as high-level languages like Python and Java, and low-level languages like Assembly.

  • Each language has its own syntax and rules for writing code.

  • Some languages are more suited for specific tasks, such as web development (HTML,...read more

Add your answer

Q70. How would you compromise a client

Ans.

Compromising a client is not ethical. We focus on finding win-win solutions.

  • We prioritize understanding the client's needs and goals

  • We explore various options and alternatives

  • We communicate effectively and transparently

  • We aim to find a solution that benefits both parties

Add your answer

Q71. How you deal with product failure

Ans.

I analyze the reasons for failure, gather feedback, and pivot the product strategy accordingly.

  • Analyze the root cause of the failure

  • Gather feedback from customers, stakeholders, and team members

  • Iterate on the product strategy based on the learnings

  • Communicate transparently with all stakeholders

  • Implement improvements and monitor the impact

Add your answer

Q72. Did you know about BMS architecture

Add your answer

Q73. What IP Address?

Ans.

An IP address is a unique numerical identifier assigned to every device connected to the internet.

  • IP stands for Internet Protocol

  • IP addresses are used to identify devices on a network

  • There are two types of IP addresses: IPv4 and IPv6

  • IPv4 addresses are 32-bit numbers and IPv6 addresses are 128-bit numbers

  • Example of IPv4 address: 192.168.0.1

  • Example of IPv6 address: 2001:0db8:85a3:0000:0000:8a2e:0370:7334

Add your answer

Q74. What is DNS exfiltration?

Ans.

DNS exfiltration is a technique used to steal data by sending it out of a network via DNS queries.

  • It involves using DNS queries to send sensitive data outside of a network.

  • Attackers can use this technique to bypass firewalls and other security measures.

  • DNS exfiltration can be difficult to detect because DNS traffic is often allowed through firewalls.

  • Examples of data that can be exfiltrated via DNS include usernames, passwords, and other sensitive information.

Add your answer

Q75. Explain the entire Journey of Salesforce Order to Cash

Ans.

Salesforce Order to Cash journey involves creating an order, processing it, invoicing, and receiving payment.

  • 1. Order Creation: Sales team creates an order in Salesforce with customer details and products/services.

  • 2. Order Processing: Order is processed by various departments like fulfillment, shipping, and billing.

  • 3. Invoicing: An invoice is generated based on the order details and sent to the customer.

  • 4. Payment Collection: Customer makes payment for the invoice through var...read more

Add your answer

Q76. What kind of device are you working on?

Ans.

I am currently working on designing and testing a 5G small cell device.

  • Designing and testing a 5G small cell device

  • Working on optimizing the device's performance

  • Collaborating with cross-functional teams to ensure successful deployment

  • Conducting field tests to evaluate the device's capabilities

Add your answer

Q77. Routing protocaols and their merits demerits

Ans.

Routing protocols are used to determine the best path for data to travel between networks.

  • There are two types of routing protocols: distance-vector and link-state.

  • Distance-vector protocols are simpler but less efficient than link-state protocols.

  • Examples of distance-vector protocols include RIP and IGRP.

  • Examples of link-state protocols include OSPF and IS-IS.

  • Routing protocols have different metrics to determine the best path, such as hop count or bandwidth.

  • Merits of routing p...read more

Add your answer

Q78. Why are capacitor are there in fans?

Ans.

Capacitors in fans help to start the motor and regulate the speed of the fan.

  • Capacitors help to provide the initial torque needed to start the motor of the fan.

  • Capacitors also help to regulate the speed of the fan by controlling the flow of current.

  • In ceiling fans, capacitors are used to change the speed settings.

  • Capacitors in fans are essential for smooth operation and energy efficiency.

Add your answer

Q79. Job responsibilities of records managemen

Ans.

Records management involves organizing, storing, and maintaining an organization's documents and information.

  • Creating and implementing records management policies and procedures

  • Organizing and categorizing physical and digital records

  • Ensuring compliance with record retention regulations

  • Managing document destruction and archiving processes

  • Training staff on proper records management practices

Add your answer

Q80. What is project management?

Ans.

Project management is the process of planning, organizing, and overseeing the execution of a project from start to finish.

  • It involves defining project goals and objectives

  • Creating a project plan and timeline

  • Assigning tasks and responsibilities to team members

  • Monitoring progress and making adjustments as needed

  • Ensuring the project is completed on time, within budget, and meets quality standards

Add your answer

Q81. Design of Loadbalancer for Kubernetes

Ans.

Designing a Loadbalancer for Kubernetes involves using an Ingress Controller to route traffic to different services.

  • Use an Ingress Controller to manage external access to services within a Kubernetes cluster

  • Define Ingress resources to specify how incoming requests should be routed

  • Consider using a cloud provider's load balancer service for external traffic

  • Implement SSL termination and routing rules in the Ingress Controller configuration

Add your answer

Q82. what is Requirement, what is payroll,

Ans.

Requirement is the need or condition that must be met, while payroll is the process of calculating and distributing wages to employees.

  • Requirement is a specific need or condition that must be met in order to achieve a goal or fulfill a job role.

  • Payroll is the process of calculating and distributing wages to employees based on factors such as hours worked, salary, and deductions.

  • Examples of requirements include educational qualifications, work experience, and specific skills n...read more

Add your answer

Q83. Tell us in detail about TCO

Ans.

Total Cost of Ownership (TCO) is a financial estimate that helps determine the direct and indirect costs associated with a product or service over its entire lifecycle.

  • TCO includes not only the initial purchase price but also costs related to maintenance, support, training, and disposal.

  • Calculating TCO helps organizations make informed decisions about sourcing and procurement.

  • For example, when comparing two suppliers, TCO analysis can reveal the supplier with the lower initia...read more

Add your answer

Q84. Explain glideajax, glide record, transform maps

Ans.

GlideAjax, GlideRecord, Transform Maps are important concepts in ServiceNow development.

  • GlideAjax is used for asynchronous server-side calls in ServiceNow.

  • GlideRecord is used to query, insert, update, and delete records in ServiceNow tables.

  • Transform Maps are used to map data from external sources into ServiceNow tables.

  • GlideAjax example: Making a server-side call to retrieve data without refreshing the page.

  • GlideRecord example: Querying the 'incident' table to retrieve all o...read more

Add your answer

Q85. What is Closure in JS

Ans.

Closure is a function that has access to its parent scope even after the parent function has returned.

  • Closure allows for private variables and functions in JavaScript.

  • It is created when a function returns another function.

  • The inner function has access to the outer function's variables and parameters.

  • Example: function outer() { let x = 10; return function inner() { console.log(x); } }

  • Example: const innerFunc = outer(); innerFunc(); // Output: 10

Add your answer

Q86. What is Prototype in JS

Ans.

Prototype is a property of an object that allows adding new properties and methods to an object.

  • Prototype is a blueprint for creating objects

  • It allows inheritance by sharing properties and methods between objects

  • Modifying the prototype affects all objects created from it

  • Prototype chain allows accessing properties and methods of parent objects

  • Example: Array.prototype includes() method

Add your answer

Q87. What is Pipe in Angular

Ans.

Pipe is a feature in Angular that allows transforming data before displaying it in the view.

  • Pipes are used to format and manipulate data in Angular templates.

  • They can be used to filter, sort, and transform data.

  • Pipes can be chained together to perform multiple transformations.

  • Angular provides built-in pipes like DatePipe, CurrencyPipe, and LowerCasePipe.

  • Custom pipes can also be created to meet specific requirements.

Add your answer

Q88. What is event loop lifecycle

Ans.

Event loop is a continuous process that runs in the background and handles all the events in the application.

  • Event loop continuously checks for new events in the event queue.

  • It processes each event one by one in a synchronous manner.

  • If an event takes too long to process, it can block the event loop and cause the application to freeze.

  • Event loop can be controlled using setTimeout(), setInterval(), and setImmediate() methods.

  • Node.js uses a single thread to handle all the events...read more

Add your answer

Q89. What is BGP, MPLS?

Ans.

BGP (Border Gateway Protocol) is a routing protocol used to exchange routing information across the Internet. MPLS (Multiprotocol Label Switching) is a technique for speeding up network traffic flow.

  • BGP is used to make core routing decisions on the Internet.

  • MPLS is used to speed up network traffic flow by allowing routers to make forwarding decisions based on labels instead of IP addresses.

  • BGP operates between different autonomous systems (AS), while MPLS operates within a si...read more

Add your answer

Q90. What is data entry skills

Ans.

Data entry skills involve accurately and efficiently entering data into a computer system.

  • Accurate and fast typing skills

  • Attention to detail

  • Knowledge of data entry software and tools

  • Ability to organize and manage large amounts of information

  • Understanding of data confidentiality and security

  • Proficiency in using spreadsheets and databases

  • Familiarity with data entry procedures and techniques

View 1 answer

Q91. What is directive in angular

Ans.

A directive is a component that adds behavior to an existing element or component in Angular.

  • Directives are used to manipulate the DOM, add event listeners, and create reusable components.

  • There are three types of directives in Angular: component, attribute, and structural.

  • Examples of built-in directives in Angular include ngIf, ngFor, and ngStyle.

  • Custom directives can be created using the @Directive decorator.

Add your answer

Q92. What is component in angular

Ans.

A component in Angular is a reusable piece of UI that consists of HTML, CSS, and TypeScript code.

  • Components are the building blocks of Angular applications.

  • Each component has its own logic and view.

  • Components can be nested within other components.

  • Components can communicate with each other using @Input and @Output decorators.

  • Examples of components include a login form, a navigation menu, and a product list.

Add your answer

Q93. Most important T-Code

Ans.

The most important T-Code depends on the specific project and its requirements.

  • For project management, T-Code CJ20N is important for creating and managing project structures.

  • For financial management, T-Code FBL3N is important for viewing account balances and transactions.

  • For material management, T-Code MM01 is important for creating and maintaining material master records.

  • For human resources management, T-Code PA30 is important for maintaining employee master data.

  • For sales a...read more

Add your answer

Q94. How Deliverables are done

Ans.

Deliverables are done through a collaborative effort of the team, following the Scrum framework.

  • The team works together to plan and prioritize the deliverables for each sprint.

  • The Scrum Master facilitates the process and ensures that the team is following the Scrum framework.

  • The team uses Agile methodologies to break down the work into smaller tasks and track progress.

  • The team delivers a potentially shippable product increment at the end of each sprint.

  • The Product Owner revie...read more

Add your answer

Q95. When DOD is confirmed

Ans.

DOD is confirmed when the team agrees that all the acceptance criteria for the user stories have been met.

  • DOD is a shared understanding between the development team and the product owner.

  • It ensures that the increment is potentially releasable and meets the quality standards.

  • Examples of DOD include code review, automated testing, and documentation.

  • DOD should be reviewed and updated regularly to reflect the team's evolving practices and standards.

Add your answer

Q96. What is capacity management

Ans.

Capacity management is the process of ensuring that an organization has the necessary resources to meet its current and future demands.

  • Capacity management involves analyzing and forecasting resource requirements.

  • It includes monitoring and optimizing resource utilization.

  • Capacity management helps in identifying and addressing potential bottlenecks or constraints.

  • Examples of resources managed in capacity management include IT infrastructure, workforce, and physical space.

  • Capaci...read more

Add your answer

Q97. what is regression testing?

Ans.

Regression testing is the process of retesting modified software to ensure that the existing functionalities are not affected.

  • Regression testing is performed after making changes to the software to ensure that the modifications have not introduced new bugs or issues.

  • It involves re-executing previously executed test cases to verify that the existing functionalities still work as expected.

  • Regression testing helps in identifying any unintended side effects of code changes and en...read more

View 1 answer

Q98. Tell me about Microwave?

Add your answer

Q99. What is costumer service ?

Ans.

Customer service is the support and assistance provided to customers before, during, and after a purchase.

  • Customer service involves addressing customer inquiries, resolving issues, and providing guidance.

  • It includes ensuring customer satisfaction and building positive relationships with customers.

  • Examples of customer service include answering phone calls, responding to emails, and assisting customers in-store.

Add your answer

Q100. 2. Are you possible our location?

Ans.

Yes, I am open to relocating for the position.

  • I am willing to relocate for the right opportunity

  • I am flexible and adaptable to new locations

  • I have relocated for previous positions and have had positive experiences

  • I am excited about the possibility of working with your team and contributing to the success of the company

Add your answer
1
2
Contribute & help others!
Write a review
Share interview
Contribute salary
Add office photos
Top Tata Communications Interview Questions And Answers
Share an Interview
Stay ahead in your career. Get AmbitionBox app
qr-code
Helping over 1 Crore job seekers every month in choosing their right fit company
70 Lakh+

Reviews

5 Lakh+

Interviews

4 Crore+

Salaries

1 Cr+

Users/Month

Contribute to help millions
Get AmbitionBox app

Made with ❤️ in India. Trademarks belong to their respective owners. All rights reserved © 2024 Info Edge (India) Ltd.

Follow us
  • Youtube
  • Instagram
  • LinkedIn
  • Facebook
  • Twitter