Filter interviews by
A Cisco switch is a networking device that connects devices within a local area network (LAN) by using packet switching to forward data to the appropriate destination.
Cisco switches operate at Layer 2 (Data Link Layer) of the OSI model.
They use MAC addresses to forward data within a network.
Cisco switches can have multiple ports to connect various devices such as computers, printers, and servers.
They can also support a...
There are many types of networks, including LAN, WAN, MAN, WLAN, VPN, etc.
LAN (Local Area Network) - connects devices within a limited area like a home or office
WAN (Wide Area Network) - connects devices over a large geographical area
MAN (Metropolitan Area Network) - covers a larger area than LAN but smaller than WAN
WLAN (Wireless Local Area Network) - uses wireless technology to connect devices
VPN (Virtual Private Net...
A network is a collection of computers, servers, mainframes, network devices, and other devices connected to each other to share resources and information.
A network allows devices to communicate with each other, share resources, and access the internet.
Networks can be wired or wireless, with examples including LANs, WANs, and the internet.
Networks can be private (intranet) or public (internet), with security measures i...
Network topology refers to the layout of a computer network and how different devices are connected.
Network topology defines how devices are interconnected in a network
Common topologies include bus, ring, star, mesh, and hybrid
Each topology has its own advantages and disadvantages
Examples: Bus topology - all devices connected to a single cable, Star topology - all devices connected to a central hub
There are two main types of modes in router configuration: user mode and privileged mode.
User mode allows basic commands like show and ping
Privileged mode allows configuration changes and access to all commands
Examples: 'show running-config' in user mode, 'configure terminal' in privileged mode
A Cisco switch is a networking device that connects devices within a local area network (LAN) and forwards data packets between them.
Cisco switches operate at the data link layer (Layer 2) of the OSI model.
They use MAC addresses to forward data within a network.
Cisco switches can have multiple ports to connect various devices such as computers, printers, and servers.
They provide features like VLANs, QoS, and security s...
There are many types of networks, including LAN, WAN, MAN, WLAN, and VPN.
LAN (Local Area Network) - connects devices within a limited area like a home or office
WAN (Wide Area Network) - connects devices over a large geographical area
MAN (Metropolitan Area Network) - covers a larger area than a LAN but smaller than a WAN
WLAN (Wireless Local Area Network) - uses wireless technology to connect devices in a limited area
VPN...
A network is a collection of computers, servers, mainframes, network devices, and other devices connected to each other to share resources and communicate.
Networks can be wired or wireless
They can be local (LAN), wide area (WAN), or global (Internet)
Networks use protocols like TCP/IP for communication
Examples include Ethernet, Wi-Fi, and cellular networks
Network topology refers to the layout of a network and how different devices are connected.
Network topology can be physical or logical.
Common physical topologies include bus, star, ring, and mesh.
Common logical topologies include peer-to-peer and client-server.
Each topology has its own advantages and disadvantages in terms of cost, scalability, and performance.
There are two main types of modes in router configuration: user mode and privileged mode.
User mode: Limited access to view router status and basic configurations.
Privileged mode: Full access to configure, manage, and troubleshoot the router.
Examples: 'show' command in user mode, 'configure terminal' command in privileged mode.
Top trending discussions
I applied via Naukri.com and was interviewed before Mar 2020. There were 5 interview rounds.
I applied via Recruitment Consulltant and was interviewed before Mar 2022. There were 3 interview rounds.
Different ways to kill a process
Using task manager in Windows
Using kill command in Linux/Unix
Using Activity Monitor in macOS
Using Process Explorer in Windows
Using pkill command in Linux/Unix
A zombie process is a process that has completed its execution but still has an entry in the process table.
Zombie processes occur when a child process finishes execution before its parent process.
The parent process should call the wait() system call to retrieve the exit status of the child process and remove it from the process table.
If the parent process fails to do so, the child process becomes a zombie process.
Zombi...
Python question based on function
posted on 28 Nov 2024
I applied via Approached by Company and was interviewed in May 2024. There were 2 interview rounds.
Count duplicates in a string using java
Tell me about your framework
I applied via Naukri.com and was interviewed in Mar 2021. There were 3 interview rounds.
To get daily updated data to your email, you can use automated scripts or tools that fetch the data and send it to your email address.
Use a programming language like Python to write a script that fetches the data from a source and sends it to your email using SMTP.
Utilize APIs provided by the data source to retrieve the data and then use an email service's API to send it to your email address.
Use third-party tools like...
I applied via Recruitment Consulltant and was interviewed in Jun 2022. There were 4 interview rounds.
Core Java is a programming language that supports OOPs concepts such as inheritance, encapsulation, abstraction, and polymorphism.
Core Java is an object-oriented programming language.
It supports encapsulation, which means hiding the implementation details of an object from the outside world.
Inheritance allows a class to inherit properties and methods from another class.
Abstraction is the process of hiding complex imple...
Docker is a containerization platform that allows developers to package and run applications in isolated environments. Kubernetes is an open-source container orchestration system that automates deployment, scaling, and management of containerized applications.
Docker allows developers to create and run applications in containers, which are lightweight and portable environments that can run on any machine with Docker ins...
To see log of a complete request in docker, use docker logs command.
Use 'docker logs
Use '-f' flag to follow the logs in real-time
Use '--tail' flag to specify the number of lines to show from the end of the logs
Use '--since' and '--until' flags to specify a time range for the logs
Use '--timestamps' flag to show timestamps in the logs
I applied via Naukri.com and was interviewed in Sep 2023. There were 2 interview rounds.
Questions on SQL queries
I applied via Approached by Company and was interviewed before Dec 2021. There were 2 interview rounds.
based on 2 interviews
Interview experience
Desktop Support Engineer
46
salaries
| ₹1.6 L/yr - ₹4 L/yr |
Talent Acquisition Executive
28
salaries
| ₹1.2 L/yr - ₹3 L/yr |
Application Support Engineer
23
salaries
| ₹1.8 L/yr - ₹2.8 L/yr |
Talent Acquisition Specialist
15
salaries
| ₹3 L/yr - ₹6.8 L/yr |
Information Technology Recruiter
14
salaries
| ₹1.2 L/yr - ₹4 L/yr |
Randstad
Team Lease
Innovsource Services
eTeam