Techolution
40+ National Australia Bank Interview Questions and Answers
Q1. Which AI field you are interested?
I am interested in the field of computer vision in AI.
Computer vision
Image recognition
Object detection
Video analysis
Q2. API design for a book store (what would be the endpoints and what methods would you use)
Endpoints and methods for a book store API
Endpoints: /books (GET, POST), /books/{id} (GET, PUT, DELETE), /authors (GET, POST), /authors/{id} (GET, PUT, DELETE)
Methods: GET (retrieve data), POST (create new data), PUT (update existing data), DELETE (delete data)
Example: GET /books - retrieve all books, POST /books - add a new book to the store
Q3. Which AI field you are interested in
I am interested in Natural Language Processing (NLP) and Computer Vision.
I am fascinated by the ability of machines to understand and interpret human language.
I am also intrigued by the potential of machines to analyze and interpret visual data.
I have experience working with NLP tools such as NLTK and spaCy.
I have also worked with computer vision libraries such as OpenCV and TensorFlow.
I am excited to explore the intersection of these two fields and their applications in vari...read more
Q4. Some Employees are unable to access some websites ? Some are able to access ? what might be the issue ?
Q5. Multi threading and Multiprocessing in python
Multi threading and Multiprocessing are techniques used in Python to achieve parallelism and improve performance.
Multi threading allows multiple threads to run concurrently within the same process, sharing the same memory space.
Multiprocessing involves creating multiple processes to run tasks in parallel, each with its own memory space.
Multi threading is more suitable for I/O-bound tasks, while multiprocessing is better for CPU-bound tasks.
Example: Using threading module for ...read more
Q6. Where we can change default port of apache web server to 80 ?
The default port of Apache web server can be changed in the configuration file httpd.conf.
Locate the httpd.conf file in the Apache installation directory.
Search for the 'Listen' directive in the httpd.conf file.
Change the port number specified after 'Listen' to the desired port number.
Save the changes and restart the Apache web server for the new port to take effect.
Q7. Where is actual web content stored in apache web server ?
Web content in Apache web server is stored in the DocumentRoot directory specified in the configuration file.
Web content is stored in the DocumentRoot directory specified in the Apache configuration file.
The default location for DocumentRoot in Apache is /var/www/html.
Additional directories can be specified for storing web content using VirtualHost configurations.
Q8. By default how many S3 buckets can we create in AWS ?
By default, you can create up to 100 S3 buckets in AWS.
By default, AWS allows you to create up to 100 S3 buckets per AWS account.
This limit can be increased by submitting a service limit increase request to AWS support.
The limit applies to the total number of buckets in an AWS account, including those in all AWS Regions.
If you reach the limit, you will need to delete existing buckets or request a limit increase to create more.
Q9. Devices in the same VLAN can communicate with each other ? what are those ports called as ?
Yes, devices in the same VLAN can communicate with each other. The ports used for this communication are called as access ports.
Devices in the same VLAN can communicate with each other using access ports
Access ports are used to connect end devices like computers, printers, etc. to the VLAN
Access ports are typically configured on switches to assign a specific VLAN to a specific port
Q10. If we have to assign multiple ports to same VLAN, what command we should use ?
Q11. How to take backup of firmware in firewall without affecting production ?
Q12. What is the process followed by DHCP ? Explain in depth ?
Q13. Decorators and lambda function in python
Decorators are functions that modify the behavior of other functions. Lambda functions are anonymous functions defined using the lambda keyword.
Decorators are used to add functionality to existing functions without modifying their code.
Lambda functions are used for creating small, anonymous functions.
Example of decorator: @staticmethod decorator in Python.
Example of lambda function: lambda x: x*2
Q14. Deep copy and shallow copy in python
Deep copy creates a new object and recursively copies the objects found in the original. Shallow copy creates a new object and references the objects found in the original.
Deep copy creates a new object and recursively copies all nested objects, while shallow copy creates a new object and references the nested objects.
Deep copy is used when you want to create a completely independent copy of an object, while shallow copy is used when you want to create a new object with refer...read more
Q15. 192.168.1.0/24 how many usable IP addresses are there ?
There are 254 usable IP addresses in the 192.168.1.0/24 subnet.
A /24 subnet mask means there are 256 total IP addresses available.
Subtracting the network address (192.168.1.0) and broadcast address (192.168.1.255), leaves 254 usable IP addresses.
Example: 192.168.1.1 to 192.168.1.254 are the usable IP addresses in the 192.168.1.0/24 subnet.
Q16. What are different scrum ceremonies? Can AI replace everything? Professional experience
Scrum ceremonies include Sprint Planning, Daily Standup, Sprint Review, and Sprint Retrospective.
Sprint Planning involves setting goals for the sprint and selecting tasks to work on.
Daily Standup is a short meeting where team members discuss what they did yesterday, what they plan to do today, and any obstacles they are facing.
Sprint Review is a meeting at the end of the sprint to demonstrate the completed work to stakeholders.
Sprint Retrospective is a meeting to reflect on t...read more
Q17. How do you troubleshoot VPN issues in the network ?
Q18. What are ports called as which carries multiple VLANs ?
Q19. Write down the steps to backup the running-config of a switch ?
Steps to backup the running-config of a switch
Access the switch's command line interface
Enter privileged EXEC mode by typing 'enable'
Copy the running-config to a TFTP server using the 'copy running-config tftp' command
Follow the prompts to specify the TFTP server IP address and the destination filename
Verify the backup by checking the TFTP server for the saved configuration file
Q20. How do you automate firmware update and backup ?
Automate firmware update and backup by using scripting languages and configuration management tools.
Use scripting languages like Python, PowerShell, or Bash to automate the process of downloading and applying firmware updates.
Utilize configuration management tools such as Ansible, Puppet, or Chef to automate the deployment of firmware updates across multiple devices.
Schedule regular backups of firmware configurations and settings using tools like Cron jobs or Task Scheduler.
S...read more
Q21. What service you used to monitor aws services ?
Q22. In which layer Firewall works ?
Firewall works at the network layer.
Firewall operates at the network layer of the OSI model.
It filters incoming and outgoing network traffic based on a set of security rules.
Firewalls can be hardware-based or software-based.
Examples of firewalls include Cisco ASA, Palo Alto Networks, and pfSense.
Q23. What is port number of apache ?
The port number of Apache is 80 by default.
The default port number for Apache is 80.
Port 80 is used for HTTP traffic.
Apache can be configured to listen on different port numbers if needed.
Q24. How to add interfaces to a VLAN ?
Q25. Explain the steps to create policies in firewall ?
Creating policies in a firewall involves defining rules to control traffic flow and access permissions.
Access the firewall management interface
Navigate to the firewall policies section
Create a new policy
Define the source and destination addresses
Specify the allowed or denied services/ports
Set the action to allow or block traffic
Apply the policy to the appropriate interfaces
Save and activate the policy
Q26. Difference between SSL & Site-to-Site VPN ?
SSL is used to secure individual connections, while Site-to-Site VPN is used to securely connect entire networks.
SSL is used to encrypt data transmitted between a client and a server over the internet.
Site-to-Site VPN is used to securely connect two or more networks over the internet or other public networks.
SSL is commonly used for securing online transactions, email, and web browsing.
Site-to-Site VPN is commonly used for connecting branch offices to a central office network...read more
Q27. How does networking work in Azure?
Networking in Azure involves virtual networks, subnets, security groups, and routing.
Azure Virtual Network (VNet) allows you to create isolated networks within Azure.
Subnets within a VNet can be used to segment resources and control traffic flow.
Network Security Groups (NSGs) are used to control inbound and outbound traffic to network interfaces.
Azure Route Tables define how traffic is routed within a VNet or to external networks.
Q28. What is NAT ? what is it's purpose ?
Q29. How is Docker different from Kubernetes
Docker is a containerization platform for packaging applications, while Kubernetes is a container orchestration tool for managing containerized applications.
Docker is used for creating, deploying, and running applications in containers.
Kubernetes is used for automating the deployment, scaling, and management of containerized applications.
Docker focuses on packaging applications and their dependencies into containers, while Kubernetes focuses on orchestrating multiple containe...read more
Q30. How does the Internet work ?
Q31. What is L2TP & PPTP ?
Q32. What is the use of STP ?
Q33. What is port number of SSH ?
Q34. Have you worked with MPLS ?
Q35. Types of VPNs and differences ?
Types of VPNs include site-to-site, remote access, and client-to-site. They differ in their use cases and configurations.
Site-to-site VPN connects two or more networks together over the internet, commonly used for connecting branch offices.
Remote access VPN allows individual users to connect to a private network from a remote location, often used for telecommuting.
Client-to-site VPN is similar to remote access VPN but specifically refers to connecting a single client device t...read more
Q36. How to story tell a solution
To story tell a solution, use data visualization, create a narrative, and focus on the impact.
Use data visualization to make the solution more engaging and understandable
Create a narrative that explains the problem, the solution, and the impact
Focus on the impact of the solution on the business or organization
Use real-life examples to make the story more relatable
Use simple language and avoid technical jargon
Q37. Difference between STP,, RPST, RPVST ?
Q38. What is IP sec VPN ?
IPsec VPN is a secure network connection that uses encryption and authentication to protect data transmitted over the internet.
IPsec VPN stands for Internet Protocol Security Virtual Private Network.
It provides secure communication by encrypting data packets and authenticating the parties involved.
IPsec VPN can be used to connect remote offices securely over the internet.
It is commonly used for secure remote access to corporate networks.
IPsec VPN can be implemented in tunnel ...read more
Q39. Types of Network switches ? L1 , L2 ?
Q40. How to detect data anamolies
Data anomalies can be detected by statistical methods and visualization techniques.
Use statistical methods like mean, median, standard deviation, and regression analysis to identify outliers.
Visualize data using scatter plots, box plots, and histograms to identify patterns and anomalies.
Use machine learning algorithms like clustering and anomaly detection to identify unusual data points.
Compare data with industry standards and benchmarks to identify anomalies.
Perform data pro...read more
Q41. What is MSTP ?
MSTP stands for Multiple Spanning Tree Protocol, a network protocol that creates a loop-free topology for Ethernet networks.
MSTP allows for multiple VLANs to share a single spanning tree instance, reducing the number of spanning tree instances needed in a network.
It uses a single spanning tree for all VLANs, which helps in optimizing network resources and reducing complexity.
MSTP is an enhancement of the original Spanning Tree Protocol (STP) and provides faster convergence in...read more
Q42. Explain OSI model in depth ?
Q43. What is APIPA ?
Q44. Explain DHCP in depth ?
DHCP is a network protocol that automatically assigns IP addresses to devices on a network.
DHCP stands for Dynamic Host Configuration Protocol.
It allows devices to obtain IP addresses, subnet masks, default gateways, and DNS server addresses automatically.
DHCP servers lease IP addresses to devices for a specific period of time.
DHCP uses a four-step process: Discover, Offer, Request, and Acknowledge (DORA).
DHCP reduces the administrative burden of manually assigning IP address...read more
Q45. What is Docker?
Docker is a platform for developing, shipping, and running applications in containers.
Docker allows developers to package their applications and dependencies into a container that can run on any system.
Containers are lightweight, portable, and isolated environments that ensure consistency in development and deployment.
Docker uses a client-server architecture with a daemon process managing containers and a CLI for interacting with Docker.
Docker Hub is a repository for Docker i...read more
Q46. How does flip flop work?
Flip flop is a digital circuit that can store one bit of information and can change its state based on the input signal.
Flip flops are used in digital electronics to store data and create memory.
They can be classified into four types: SR, D, JK, and T flip flops.
The output of a flip flop depends on its current state and the input signal.
Flip flops are used in applications such as counters, shift registers, and memory units.
Q47. Day to Day activities ?
Q48. Google Analytics experience
I have extensive experience using Google Analytics for data analysis and reporting.
Proficient in setting up and configuring Google Analytics accounts
Skilled in creating custom reports and dashboards to track website performance
Experience in analyzing website traffic and user behavior to identify trends and opportunities
Familiarity with advanced features such as event tracking and conversion tracking
Ability to use Google Analytics data to inform business decisions and improve ...read more
Q49. Compare Azure and GCP services
Azure and GCP offer similar cloud services but differ in pricing, global reach, and specific offerings.
Azure has a larger global presence with more data centers compared to GCP.
GCP is known for its competitive pricing and discounts, especially for long-term commitments.
Azure offers services like Azure Functions, Azure DevOps, and Azure Machine Learning, while GCP has offerings like BigQuery, Cloud Functions, and AI Platform.
Both platforms provide services for compute, storage...read more
Top HR Questions asked in National Australia Bank
Interview Process at National Australia Bank
Top Interview Questions from Similar Companies
Reviews
Interviews
Salaries
Users/Month