Add office photos
Engaged Employer

Tech Mahindra

3.6
based on 33.6k Reviews
Filter interviews by

30+ Brimma Tech Interview Questions and Answers

Updated 11 Jan 2025
Popular Designations

Q1. If there is a non tech guys on site to replace faulty router with new router, how do you configure the new router?

Ans.

The new router can be configured remotely using a laptop or mobile device with access to the network.

  • Access the router's web interface by entering its IP address in a web browser

  • Login using default credentials or credentials provided by the company

  • Configure basic settings such as SSID, password, and security settings

  • Update firmware if necessary

  • Test the connection to ensure it is working properly

Add your answer

Q2. Difference between Public IP and Private IP....router and modem

Ans.

Public IP is visible to the internet while private IP is used within a local network. Router connects multiple devices to the internet while modem connects to the ISP.

  • Public IP is assigned by the ISP and is unique to each device connected to the internet

  • Private IP is assigned by the router and is used within a local network

  • Router connects multiple devices to the internet and manages traffic between them

  • Modem connects to the ISP and provides internet access to the router

  • Exampl...read more

View 2 more answers

Q3. How would you connect internet on your own laptop. Tell the complete process

Ans.

To connect internet on a laptop, follow these steps.

  • Ensure that the laptop has a wireless network adapter or an Ethernet port

  • Turn on the laptop and connect to a Wi-Fi network or plug in an Ethernet cable

  • If connecting to a Wi-Fi network, enter the password if prompted

  • If the laptop does not automatically connect, go to the network settings and select the desired network

  • Once connected, open a web browser to test the internet connection

View 1 answer

Q4. What is the command to assign an IP address on Juniper router interface?

Ans.

The command to assign an IP address on a Juniper router interface is 'set interface <interface_name> unit <unit_number> family inet address <ip_address/mask>'

  • Use the 'set' command to configure the interface

  • Specify the interface name and unit number

  • Use the 'family inet' statement to configure an IPv4 address

  • Specify the IP address and subnet mask

Add your answer
Discover Brimma Tech interview dos and don'ts from real experiences

Q5. How can we configure and a router with support of non tech guy onsite?

Ans.

To configure a router with support of a non tech guy onsite, provide step-by-step instructions and visual aids.

  • Create a simple, easy-to-follow guide with step-by-step instructions.

  • Use visual aids such as diagrams or videos to demonstrate the process.

  • Provide clear explanations of each step and troubleshoot common issues.

  • Offer remote support or a helpline for additional assistance if needed.

Add your answer

Q6. What is upselling and cross selling

Ans.

Upselling is the practice of encouraging customers to purchase a higher-end product or service, while cross-selling is offering complementary products or services.

  • Upselling involves persuading customers to upgrade to a more expensive version of a product or service.

  • Cross-selling involves offering additional products or services that complement the original purchase.

  • Both techniques aim to increase revenue and customer satisfaction.

  • Examples of upselling include offering a large...read more

View 3 more answers
Are these interview questions helpful?

Q7. What is routing protocol? What are the types of routing protocol?

Ans.

Routing protocol is a set of rules used by routers to determine the best path for data packets to travel.

  • Routing protocols help routers communicate with each other to dynamically update routing tables.

  • Types of routing protocols include distance-vector (e.g. RIP), link-state (e.g. OSPF), and hybrid (e.g. EIGRP).

  • Distance-vector protocols determine the best path based on hop count.

  • Link-state protocols use a more complex algorithm to determine the best path based on network topol...read more

Add your answer

Q8. What is OSI model? What are the layers of OSI model?

Ans.

The OSI model is a conceptual framework that standardizes the functions of a telecommunication or computing system into seven layers.

  • The OSI model stands for Open Systems Interconnection model.

  • It helps in understanding how data is transferred from one computer to another over a network.

  • The seven layers of OSI model are: Physical, Data Link, Network, Transport, Session, Presentation, and Application.

  • Each layer has specific functions and interacts with adjacent layers to facili...read more

Add your answer
Share interview questions and help millions of jobseekers 🌟

Q9. What are the parameters should match in BGP neighbourship?

Ans.

Parameters for BGP neighbourship include AS number, IP address, subnet mask, and BGP version.

  • AS number must match on both neighbors

  • IP address must be reachable between neighbors

  • Subnet mask should be the same on both neighbors

  • BGP version should be compatible between neighbors

Add your answer

Q10. How tracerout works? What is source and destination IP?

Ans.

Traceroute is a network diagnostic tool used to track the path packets take from source to destination IP.

  • Traceroute sends packets with increasing TTL values to elicit ICMP Time Exceeded responses from routers along the path.

  • The source IP is the IP address of the device initiating the traceroute, while the destination IP is the IP address of the target device.

  • Traceroute displays the IP addresses of the routers in the path and the round-trip time for each hop.

  • It helps in ident...read more

Add your answer

Q11. What are the type of BGP and their AD value?

Ans.

There are two types of BGP: eBGP and iBGP. eBGP has an AD value of 20, while iBGP has an AD value of 200.

  • eBGP (External BGP) - AD value: 20

  • iBGP (Internal BGP) - AD value: 200

Add your answer

Q12. If we see "*****" in tracerout, what it means?

Ans.

The presence of '*****' in a traceroute indicates that the router is blocking the ICMP packets used by traceroute.

  • The '*****' indicates that the router is not responding to the ICMP packets sent by the traceroute tool.

  • This could be due to the router being configured to block ICMP traffic for security reasons.

  • It can also be caused by a firewall or network filtering rules blocking the ICMP packets.

  • In some cases, the '*****' may also indicate a network congestion or a faulty rou...read more

Add your answer

Q13. What are the difference between router and switch?

Ans.

Routers connect multiple networks together while switches connect devices within a single network.

  • Routers operate at the network layer (Layer 3) of the OSI model, while switches operate at the data link layer (Layer 2).

  • Routers use IP addresses to forward data between networks, while switches use MAC addresses to forward data within a network.

  • Routers can determine the best path for data to travel between networks, while switches simply forward data to the appropriate device wi...read more

Add your answer

Q14. What is split horison? How can we resolve it?

Ans.

Split horizon is a technique used in computer networking to prevent routing loops by not advertising routes back to the same interface they were learned from.

  • Split horizon is used in distance-vector routing protocols like RIP to prevent routing loops.

  • It works by not advertising routes back to the same interface they were learned from.

  • Split horizon with poison reverse takes this a step further by advertising the route with an infinite metric to indicate it is unreachable.

  • To re...read more

Add your answer

Q15. How do we prevent loop avoidance in BGP?

Ans.

Preventing loop avoidance in BGP involves using loop prevention mechanisms like AS Path and Route Reflectors.

  • Use AS Path attribute to prevent loops by tracking the path a route has taken through AS numbers.

  • Implement Route Reflectors to avoid loops in BGP by controlling the route propagation within a cluster.

  • Utilize BGP Confederations to divide the network into smaller autonomous systems to prevent loops.

  • Regularly monitor BGP routing tables and configurations to detect and res...read more

Add your answer

Q16. What is loop avoidance mechanism in BGP?

Ans.

Loop avoidance mechanism in BGP prevents routing loops by using loop prevention mechanisms like AS path attribute and route reflectors.

  • BGP uses AS path attribute to prevent routing loops by not accepting routes with its own AS number in the path.

  • Route reflectors are used in BGP to avoid loops in route propagation within a cluster of routers.

  • BGP Confederations can also be used to prevent loops by dividing the AS into smaller sub-ASes.

Add your answer

Q17. What is public IP and private IP?

Ans.

Public IP is the address assigned to a device that is directly accessible over the internet, while private IP is used within a private network.

  • Public IP is unique and can be accessed from anywhere on the internet

  • Private IP is used within a local network and is not directly accessible from the internet

  • Public IP is assigned by the Internet Service Provider (ISP)

  • Private IP addresses are typically in the ranges of 192.168.x.x, 10.x.x.x, or 172.16.x.x

Add your answer

Q18. How to set up a router

Ans.

To set up a router, connect it to a modem and a power source, access the router's settings, and configure the network.

  • Connect the router to a modem using an Ethernet cable

  • Connect the router to a power source

  • Access the router's settings by typing its IP address into a web browser

  • Configure the network by setting up a username and password, choosing a network name and password, and selecting security settings

  • Save the settings and restart the router

Add your answer

Q19. What is Ping Command???

Ans.

Ping command is a network utility tool used to test the reachability of a host on an Internet Protocol (IP) network.

  • Ping sends an ICMP (Internet Control Message Protocol) echo request to the target host and waits for a response.

  • It measures the round-trip time for packets to travel from the source to the destination and back.

  • Ping can also be used to determine the number of hops between the source and destination.

  • Ping is commonly used to troubleshoot network connectivity issues...read more

Add your answer

Q20. What are the states in BGP?

Ans.

BGP states include Idle, Connect, Active, OpenSent, OpenConfirm, Established.

  • Idle - Initial state when BGP is not yet established

  • Connect - Attempting to establish a TCP connection

  • Active - Waiting for a TCP connection to be completed

  • OpenSent - Sent an Open message to peer

  • OpenConfirm - Received an Open message and waiting for confirmation

  • Established - BGP peers are fully established and can exchange routing information

Add your answer

Q21. What are CE and PE routers?

Ans.

CE and PE routers are types of routers used in MPLS networks. CE routers connect to customer networks while PE routers connect to provider networks.

  • CE routers (Customer Edge) connect to customer networks and are responsible for exchanging routes with customer devices.

  • PE routers (Provider Edge) connect to provider networks and are responsible for exchanging routes with other PE routers in the MPLS network.

  • CE routers are located at the edge of the customer network, while PE rou...read more

Add your answer

Q22. What is BGP? How BGP works?

Ans.

BGP stands for Border Gateway Protocol, used to exchange routing information between different networks.

  • BGP is an exterior gateway protocol used to make routing decisions on the internet.

  • It operates by exchanging routing information between different autonomous systems (AS).

  • BGP uses TCP port 179 for communication.

  • BGP routers maintain a table of IP prefixes and their paths to reach them.

  • BGP can be configured to influence routing decisions based on various attributes like AS pa...read more

Add your answer

Q23. How does tracerout works?

Ans.

Traceroute is a network diagnostic tool used to track the path packets take from one networked device to another.

  • Traceroute sends packets with increasing TTL values to determine the path to a destination.

  • Each router along the path sends back an ICMP Time Exceeded message, allowing traceroute to map the route.

  • The final destination sends an ICMP Port Unreachable message, indicating the end of the route.

  • Traceroute helps identify network issues like packet loss, latency, and rout...read more

Add your answer

Q24. How ftp and tftp works?

Ans.

FTP and TFTP are protocols used for transferring files over a network.

  • FTP (File Transfer Protocol) is a standard network protocol used to transfer files from one host to another over a TCP-based network, such as the internet.

  • TFTP (Trivial File Transfer Protocol) is a simpler version of FTP that uses UDP instead of TCP for file transfer.

  • FTP requires authentication (username and password) for access, while TFTP does not have built-in security features.

  • FTP supports more features...read more

Add your answer

Q25. What is modem?and it's functions

Ans.

A modem is a device that modulates and demodulates analog signals to enable digital communication over telephone lines.

  • Modem stands for modulator-demodulator.

  • Functions include converting digital data into analog signals for transmission and converting analog signals back into digital data upon reception.

  • Modems are used to connect devices to the internet via telephone lines or cable connections.

  • Examples of modems include dial-up modems, DSL modems, and cable modems.

Add your answer

Q26. What is troubleshooting?

Ans.

Troubleshooting is the process of identifying, diagnosing, and resolving technical issues or problems.

  • Identifying the issue or problem

  • Diagnosing the root cause

  • Resolving the issue through systematic steps

  • Testing the solution to ensure it works

  • Documenting the troubleshooting process for future reference

Add your answer
Ans.

OSPF (Open Shortest Path First) is a routing protocol used to determine the best path for data packets in a network.

  • OSPF is a link-state routing protocol

  • It uses Dijkstra's algorithm to calculate the shortest path

  • OSPF routers exchange link-state advertisements (LSAs) to build a topology map

  • It supports VLSM (Variable Length Subnet Masking) and CIDR (Classless Inter-Domain Routing)

  • OSPF divides the network into areas to reduce routing table size and improve scalability

Add your answer
Ans.

tftp stands for Trivial File Transfer Protocol, a simple protocol used for transferring files over a network.

  • tftp is a lightweight protocol used for transferring files between devices on a network.

  • It operates on UDP port 69.

  • tftp does not require user authentication, making it less secure compared to FTP.

  • It is commonly used for booting devices over a network, such as in diskless workstations or routers.

  • An example of tftp command usage: tftp -i 192.168.1.1 GET file.txt

Add your answer

Q29. What is firewall?

Ans.

A firewall is a network security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules.

  • Acts as a barrier between a trusted internal network and untrusted external network

  • Filters network traffic based on rules set by the administrator

  • Can be hardware-based or software-based

  • Examples include Cisco ASA, Palo Alto Networks, and Windows Firewall

Add your answer
Ans.

MPLS stands for Multiprotocol Label Switching, a technique used in telecommunications networks to direct data packets along predefined paths.

  • MPLS is used to improve network performance and efficiency by quickly routing data packets based on labels instead of IP addresses.

  • It allows for traffic engineering, quality of service (QoS) prioritization, and virtual private network (VPN) services.

  • MPLS operates at layer 2.5 of the OSI model, between traditional layer 2 (Data Link) and ...read more

Add your answer

Q31. What is blue screen error..

Ans.

Blue screen error is a system error that causes the computer to crash and display a blue screen with error message.

  • Also known as Blue Screen of Death (BSOD)

  • Caused by hardware or software issues

  • May require troubleshooting or repair

  • Examples: DRIVER_IRQL_NOT_LESS_OR_EQUAL, SYSTEM_SERVICE_EXCEPTION

Add your answer
Contribute & help others!
Write a review
Share interview
Contribute salary
Add office photos

Interview Process at Brimma Tech

based on 3 interviews in the last 1 year
Interview experience
3.0
Average
View more
Interview Tips & Stories
Ace your next interview with expert advice and inspiring stories
Share an Interview
Stay ahead in your career. Get AmbitionBox app
qr-code
Helping over 1 Crore job seekers every month in choosing their right fit company
70 Lakh+

Reviews

5 Lakh+

Interviews

4 Crore+

Salaries

1 Cr+

Users/Month

Contribute to help millions
Get AmbitionBox app

Made with ❤️ in India. Trademarks belong to their respective owners. All rights reserved © 2024 Info Edge (India) Ltd.

Follow us
  • Youtube
  • Instagram
  • LinkedIn
  • Facebook
  • Twitter