Add office photos
Employer?
Claim Account for FREE

Techolution

3.1
based on 139 Reviews
Filter interviews by

40+ National Australia Bank Interview Questions and Answers

Updated 29 Nov 2024

Q1. Which AI field you are interested?

Ans.

I am interested in the field of computer vision in AI.

  • Computer vision

  • Image recognition

  • Object detection

  • Video analysis

View 3 more answers

Q2. API design for a book store (what would be the endpoints and what methods would you use)

Ans.

Endpoints and methods for a book store API

  • Endpoints: /books (GET, POST), /books/{id} (GET, PUT, DELETE), /authors (GET, POST), /authors/{id} (GET, PUT, DELETE)

  • Methods: GET (retrieve data), POST (create new data), PUT (update existing data), DELETE (delete data)

  • Example: GET /books - retrieve all books, POST /books - add a new book to the store

Add your answer

Q3. Which AI field you are interested in

Ans.

I am interested in Natural Language Processing (NLP) and Computer Vision.

  • I am fascinated by the ability of machines to understand and interpret human language.

  • I am also intrigued by the potential of machines to analyze and interpret visual data.

  • I have experience working with NLP tools such as NLTK and spaCy.

  • I have also worked with computer vision libraries such as OpenCV and TensorFlow.

  • I am excited to explore the intersection of these two fields and their applications in vari...read more

Add your answer

Q4. Some Employees are unable to access some websites ? Some are able to access ? what might be the issue ?

Add your answer
Discover National Australia Bank interview dos and don'ts from real experiences

Q5. Multi threading and Multiprocessing in python

Ans.

Multi threading and Multiprocessing are techniques used in Python to achieve parallelism and improve performance.

  • Multi threading allows multiple threads to run concurrently within the same process, sharing the same memory space.

  • Multiprocessing involves creating multiple processes to run tasks in parallel, each with its own memory space.

  • Multi threading is more suitable for I/O-bound tasks, while multiprocessing is better for CPU-bound tasks.

  • Example: Using threading module for ...read more

Add your answer

Q6. Where we can change default port of apache web server to 80 ?

Ans.

The default port of Apache web server can be changed in the configuration file httpd.conf.

  • Locate the httpd.conf file in the Apache installation directory.

  • Search for the 'Listen' directive in the httpd.conf file.

  • Change the port number specified after 'Listen' to the desired port number.

  • Save the changes and restart the Apache web server for the new port to take effect.

Add your answer
Are these interview questions helpful?

Q7. Where is actual web content stored in apache web server ?

Ans.

Web content in Apache web server is stored in the DocumentRoot directory specified in the configuration file.

  • Web content is stored in the DocumentRoot directory specified in the Apache configuration file.

  • The default location for DocumentRoot in Apache is /var/www/html.

  • Additional directories can be specified for storing web content using VirtualHost configurations.

Add your answer

Q8. By default how many S3 buckets can we create in AWS ?

Ans.

By default, you can create up to 100 S3 buckets in AWS.

  • By default, AWS allows you to create up to 100 S3 buckets per AWS account.

  • This limit can be increased by submitting a service limit increase request to AWS support.

  • The limit applies to the total number of buckets in an AWS account, including those in all AWS Regions.

  • If you reach the limit, you will need to delete existing buckets or request a limit increase to create more.

Add your answer
Share interview questions and help millions of jobseekers 🌟

Q9. Devices in the same VLAN can communicate with each other ? what are those ports called as ?

Ans.

Yes, devices in the same VLAN can communicate with each other. The ports used for this communication are called as access ports.

  • Devices in the same VLAN can communicate with each other using access ports

  • Access ports are used to connect end devices like computers, printers, etc. to the VLAN

  • Access ports are typically configured on switches to assign a specific VLAN to a specific port

Add your answer

Q10. If we have to assign multiple ports to same VLAN, what command we should use ?

Add your answer

Q11. How to take backup of firmware in firewall without affecting production ?

Add your answer

Q12. What is the process followed by DHCP ? Explain in depth ?

Add your answer

Q13. Decorators and lambda function in python

Ans.

Decorators are functions that modify the behavior of other functions. Lambda functions are anonymous functions defined using the lambda keyword.

  • Decorators are used to add functionality to existing functions without modifying their code.

  • Lambda functions are used for creating small, anonymous functions.

  • Example of decorator: @staticmethod decorator in Python.

  • Example of lambda function: lambda x: x*2

Add your answer

Q14. Deep copy and shallow copy in python

Ans.

Deep copy creates a new object and recursively copies the objects found in the original. Shallow copy creates a new object and references the objects found in the original.

  • Deep copy creates a new object and recursively copies all nested objects, while shallow copy creates a new object and references the nested objects.

  • Deep copy is used when you want to create a completely independent copy of an object, while shallow copy is used when you want to create a new object with refer...read more

Add your answer

Q15. 192.168.1.0/24 how many usable IP addresses are there ?

Ans.

There are 254 usable IP addresses in the 192.168.1.0/24 subnet.

  • A /24 subnet mask means there are 256 total IP addresses available.

  • Subtracting the network address (192.168.1.0) and broadcast address (192.168.1.255), leaves 254 usable IP addresses.

  • Example: 192.168.1.1 to 192.168.1.254 are the usable IP addresses in the 192.168.1.0/24 subnet.

Add your answer

Q16. What are different scrum ceremonies? Can AI replace everything? Professional experience

Ans.

Scrum ceremonies include Sprint Planning, Daily Standup, Sprint Review, and Sprint Retrospective.

  • Sprint Planning involves setting goals for the sprint and selecting tasks to work on.

  • Daily Standup is a short meeting where team members discuss what they did yesterday, what they plan to do today, and any obstacles they are facing.

  • Sprint Review is a meeting at the end of the sprint to demonstrate the completed work to stakeholders.

  • Sprint Retrospective is a meeting to reflect on t...read more

Add your answer

Q17. How do you troubleshoot VPN issues in the network ?

Add your answer

Q18. What are ports called as which carries multiple VLANs ?

Add your answer

Q19. Write down the steps to backup the running-config of a switch ?

Ans.

Steps to backup the running-config of a switch

  • Access the switch's command line interface

  • Enter privileged EXEC mode by typing 'enable'

  • Copy the running-config to a TFTP server using the 'copy running-config tftp' command

  • Follow the prompts to specify the TFTP server IP address and the destination filename

  • Verify the backup by checking the TFTP server for the saved configuration file

Add your answer

Q20. How do you automate firmware update and backup ?

Ans.

Automate firmware update and backup by using scripting languages and configuration management tools.

  • Use scripting languages like Python, PowerShell, or Bash to automate the process of downloading and applying firmware updates.

  • Utilize configuration management tools such as Ansible, Puppet, or Chef to automate the deployment of firmware updates across multiple devices.

  • Schedule regular backups of firmware configurations and settings using tools like Cron jobs or Task Scheduler.

  • S...read more

Add your answer

Q21. What service you used to monitor aws services ?

Add your answer

Q22. In which layer Firewall works ?

Ans.

Firewall works at the network layer.

  • Firewall operates at the network layer of the OSI model.

  • It filters incoming and outgoing network traffic based on a set of security rules.

  • Firewalls can be hardware-based or software-based.

  • Examples of firewalls include Cisco ASA, Palo Alto Networks, and pfSense.

Add your answer

Q23. What is port number of apache ?

Ans.

The port number of Apache is 80 by default.

  • The default port number for Apache is 80.

  • Port 80 is used for HTTP traffic.

  • Apache can be configured to listen on different port numbers if needed.

Add your answer

Q24. How to add interfaces to a VLAN ?

Add your answer

Q25. Explain the steps to create policies in firewall ?

Ans.

Creating policies in a firewall involves defining rules to control traffic flow and access permissions.

  • Access the firewall management interface

  • Navigate to the firewall policies section

  • Create a new policy

  • Define the source and destination addresses

  • Specify the allowed or denied services/ports

  • Set the action to allow or block traffic

  • Apply the policy to the appropriate interfaces

  • Save and activate the policy

Add your answer

Q26. Difference between SSL & Site-to-Site VPN ?

Ans.

SSL is used to secure individual connections, while Site-to-Site VPN is used to securely connect entire networks.

  • SSL is used to encrypt data transmitted between a client and a server over the internet.

  • Site-to-Site VPN is used to securely connect two or more networks over the internet or other public networks.

  • SSL is commonly used for securing online transactions, email, and web browsing.

  • Site-to-Site VPN is commonly used for connecting branch offices to a central office network...read more

Add your answer

Q27. How does networking work in Azure?

Ans.

Networking in Azure involves virtual networks, subnets, security groups, and routing.

  • Azure Virtual Network (VNet) allows you to create isolated networks within Azure.

  • Subnets within a VNet can be used to segment resources and control traffic flow.

  • Network Security Groups (NSGs) are used to control inbound and outbound traffic to network interfaces.

  • Azure Route Tables define how traffic is routed within a VNet or to external networks.

Add your answer

Q28. What is NAT ? what is it's purpose ?

Add your answer

Q29. How is Docker different from Kubernetes

Ans.

Docker is a containerization platform for packaging applications, while Kubernetes is a container orchestration tool for managing containerized applications.

  • Docker is used for creating, deploying, and running applications in containers.

  • Kubernetes is used for automating the deployment, scaling, and management of containerized applications.

  • Docker focuses on packaging applications and their dependencies into containers, while Kubernetes focuses on orchestrating multiple containe...read more

Add your answer

Q30. How does the Internet work ?

Add your answer

Q31. What is L2TP & PPTP ?

Add your answer

Q32. What is the use of STP ?

Add your answer

Q33. What is port number of SSH ?

Add your answer

Q34. Have you worked with MPLS ?

Add your answer

Q35. Types of VPNs and differences ?

Ans.

Types of VPNs include site-to-site, remote access, and client-to-site. They differ in their use cases and configurations.

  • Site-to-site VPN connects two or more networks together over the internet, commonly used for connecting branch offices.

  • Remote access VPN allows individual users to connect to a private network from a remote location, often used for telecommuting.

  • Client-to-site VPN is similar to remote access VPN but specifically refers to connecting a single client device t...read more

Add your answer

Q36. How to story tell a solution

Ans.

To story tell a solution, use data visualization, create a narrative, and focus on the impact.

  • Use data visualization to make the solution more engaging and understandable

  • Create a narrative that explains the problem, the solution, and the impact

  • Focus on the impact of the solution on the business or organization

  • Use real-life examples to make the story more relatable

  • Use simple language and avoid technical jargon

Add your answer

Q37. Difference between STP,, RPST, RPVST ?

Add your answer

Q38. What is IP sec VPN ?

Ans.

IPsec VPN is a secure network connection that uses encryption and authentication to protect data transmitted over the internet.

  • IPsec VPN stands for Internet Protocol Security Virtual Private Network.

  • It provides secure communication by encrypting data packets and authenticating the parties involved.

  • IPsec VPN can be used to connect remote offices securely over the internet.

  • It is commonly used for secure remote access to corporate networks.

  • IPsec VPN can be implemented in tunnel ...read more

Add your answer

Q39. Types of Network switches ? L1 , L2 ?

Add your answer

Q40. How to detect data anamolies

Ans.

Data anomalies can be detected by statistical methods and visualization techniques.

  • Use statistical methods like mean, median, standard deviation, and regression analysis to identify outliers.

  • Visualize data using scatter plots, box plots, and histograms to identify patterns and anomalies.

  • Use machine learning algorithms like clustering and anomaly detection to identify unusual data points.

  • Compare data with industry standards and benchmarks to identify anomalies.

  • Perform data pro...read more

Add your answer

Q41. What is MSTP ?

Ans.

MSTP stands for Multiple Spanning Tree Protocol, a network protocol that creates a loop-free topology for Ethernet networks.

  • MSTP allows for multiple VLANs to share a single spanning tree instance, reducing the number of spanning tree instances needed in a network.

  • It uses a single spanning tree for all VLANs, which helps in optimizing network resources and reducing complexity.

  • MSTP is an enhancement of the original Spanning Tree Protocol (STP) and provides faster convergence in...read more

Add your answer

Q42. Explain OSI model in depth ?

Add your answer

Q43. What is APIPA ?

Add your answer

Q44. Explain DHCP in depth ?

Ans.

DHCP is a network protocol that automatically assigns IP addresses to devices on a network.

  • DHCP stands for Dynamic Host Configuration Protocol.

  • It allows devices to obtain IP addresses, subnet masks, default gateways, and DNS server addresses automatically.

  • DHCP servers lease IP addresses to devices for a specific period of time.

  • DHCP uses a four-step process: Discover, Offer, Request, and Acknowledge (DORA).

  • DHCP reduces the administrative burden of manually assigning IP address...read more

Add your answer

Q45. What is Docker?

Ans.

Docker is a platform for developing, shipping, and running applications in containers.

  • Docker allows developers to package their applications and dependencies into a container that can run on any system.

  • Containers are lightweight, portable, and isolated environments that ensure consistency in development and deployment.

  • Docker uses a client-server architecture with a daemon process managing containers and a CLI for interacting with Docker.

  • Docker Hub is a repository for Docker i...read more

Add your answer

Q46. How does flip flop work?

Ans.

Flip flop is a digital circuit that can store one bit of information and can change its state based on the input signal.

  • Flip flops are used in digital electronics to store data and create memory.

  • They can be classified into four types: SR, D, JK, and T flip flops.

  • The output of a flip flop depends on its current state and the input signal.

  • Flip flops are used in applications such as counters, shift registers, and memory units.

Add your answer

Q47. Day to Day activities ?

Add your answer

Q48. Google Analytics experience

Ans.

I have extensive experience using Google Analytics for data analysis and reporting.

  • Proficient in setting up and configuring Google Analytics accounts

  • Skilled in creating custom reports and dashboards to track website performance

  • Experience in analyzing website traffic and user behavior to identify trends and opportunities

  • Familiarity with advanced features such as event tracking and conversion tracking

  • Ability to use Google Analytics data to inform business decisions and improve ...read more

Add your answer

Q49. Compare Azure and GCP services

Ans.

Azure and GCP offer similar cloud services but differ in pricing, global reach, and specific offerings.

  • Azure has a larger global presence with more data centers compared to GCP.

  • GCP is known for its competitive pricing and discounts, especially for long-term commitments.

  • Azure offers services like Azure Functions, Azure DevOps, and Azure Machine Learning, while GCP has offerings like BigQuery, Cloud Functions, and AI Platform.

  • Both platforms provide services for compute, storage...read more

Add your answer
Contribute & help others!
Write a review
Share interview
Contribute salary
Add office photos

Interview Process at National Australia Bank

based on 15 interviews in the last 1 year
Interview experience
3.1
Average
View more
Interview Tips & Stories
Ace your next interview with expert advice and inspiring stories

Top Interview Questions from Similar Companies

3.4
 • 256 Interview Questions
4.0
 • 202 Interview Questions
3.9
 • 152 Interview Questions
4.2
 • 133 Interview Questions
View all
Top Techolution Interview Questions And Answers
Share an Interview
Stay ahead in your career. Get AmbitionBox app
qr-code
Helping over 1 Crore job seekers every month in choosing their right fit company
70 Lakh+

Reviews

5 Lakh+

Interviews

4 Crore+

Salaries

1 Cr+

Users/Month

Contribute to help millions
Get AmbitionBox app

Made with ❤️ in India. Trademarks belong to their respective owners. All rights reserved © 2024 Info Edge (India) Ltd.

Follow us
  • Youtube
  • Instagram
  • LinkedIn
  • Facebook
  • Twitter