i
UST
Filter interviews by
I applied via Referral and was interviewed before May 2021. There were 3 interview rounds.
SDWAN is a software-defined approach to managing and optimizing WAN connections.
SDWAN uses software to control and manage network traffic across multiple WAN connections.
It can dynamically route traffic based on network conditions and application requirements.
SDWAN can improve network performance, reduce costs, and simplify network management.
Examples of SDWAN vendors include Cisco, VMware, and Silver Peak.
OSPF is a link-state protocol while EIGRP is a hybrid protocol.
OSPF uses Dijkstra's algorithm to calculate the shortest path while EIGRP uses a metric based on bandwidth, delay, reliability, load, and MTU.
OSPF supports VLSM and route summarization while EIGRP supports only route summarization.
OSPF is an open standard protocol while EIGRP is a Cisco proprietary protocol.
OSPF has a higher convergence time than EIGRP.
OSPF...
The cost of default route varies depending on the network infrastructure and service provider.
The cost of default route is usually included in the overall cost of the internet service provided by the ISP.
The cost may also depend on the type of connection, such as fiber optic or cable.
In some cases, the cost may be higher for businesses that require more bandwidth and faster speeds.
The cost may also vary depending on th...
OSPF neighbourship occurs when two OSPF routers establish a relationship to exchange routing information.
OSPF routers send hello packets to discover neighbours
If the hello packets are compatible, the routers become neighbours
The routers exchange database descriptors to synchronize their link-state databases
If the databases are the same, the routers become fully adjacent
Neighbourship can be affected by network topology
AS path prepend is a technique used in BGP to influence the path selection of traffic.
AS path prepend involves adding the same AS number multiple times to the AS path attribute of a BGP route advertisement.
This makes the path appear longer and less desirable, causing traffic to prefer other paths.
AS path prepend can be used to influence inbound or outbound traffic.
Inbound traffic can be influenced by adding the local A...
Overlay is a network virtualization technique that adds a layer of abstraction over the physical network, while underlay refers to the physical network infrastructure.
Overlay is used to create virtual networks on top of the physical network infrastructure.
Underlay refers to the physical network infrastructure that provides connectivity between devices.
Overlay networks are used to provide network virtualization, multi-t...
VRF stands for Virtual Routing and Forwarding. It is a technology that allows multiple instances of a routing table to coexist on the same router.
VRF provides logical separation of routing tables, allowing multiple routing domains to exist on a single physical router.
Each VRF has its own routing table and forwarding table, which allows for overlapping IP addresses to be used without conflict.
VRFs are commonly used in M...
BGP damping is a technique used to reduce the impact of unstable routes on the internet.
BGP damping helps to prevent the propagation of unstable routes by temporarily suppressing them.
It is used to reduce the impact of route flapping, which occurs when a route repeatedly alternates between available and unavailable states.
BGP damping assigns a penalty value to unstable routes, and if the penalty exceeds a certain thres...
I was interviewed in Jan 2025.
Method overloading is having multiple methods in the same class with the same name but different parameters. Method overriding is having a method in a subclass with the same name and parameters as a method in its superclass.
Method overloading is achieved by having multiple methods in the same class with the same name but different parameters.
Method overriding is achieved by having a method in a subclass with the same n...
What people are saying about UST
I applied via LinkedIn and was interviewed in Oct 2024. There were 2 interview rounds.
Create a k8s deployment ymal with rolling update for a given docker image
Define a Deployment object in the YAML file
Specify the container image in the spec section
Set the update strategy to RollingUpdate
Define the number of replicas for the deployment
UST interview questions for popular designations
Get interview-ready with Top UST Interview Questions
Java program to perform validations on input data.
Use regular expressions to validate input data.
Implement custom validation logic for specific requirements.
Utilize Java libraries like Apache Commons Validator for common validation tasks.
The cred operations refer to the actions related to credentials in a software system.
Cred operations typically involve tasks such as creating, updating, deleting, and verifying user credentials.
Examples of cred operations include user registration, password reset, and authentication processes.
These operations are crucial for ensuring secure access to the software system and protecting user data.
I applied via Approached by Company and was interviewed in Sep 2024. There were 2 interview rounds.
Using stream and lambda to find numbers starting with 1 from list of Integers.
Use stream to filter the list of Integers based on the condition that the number starts with 1.
Use lambda expression to define the condition for filtering.
Convert the filtered numbers to strings and store them in an array.
Merge two lists of integers and remove duplicates in the result list.
Create a new list to store the merged result.
Iterate through each element in both lists and add them to the result list if they are not already present.
Use a set to keep track of duplicates and avoid adding them to the result list.
I applied via Job Fair and was interviewed in Nov 2024. There were 2 interview rounds.
I applied via Company Website and was interviewed in Nov 2024. There were 3 interview rounds.
A standard online test conducted through one of the testing platforms.
I applied via Naukri.com and was interviewed in Sep 2024. There was 1 interview round.
I applied via Job Portal and was interviewed in Dec 2024. There were 2 interview rounds.
REST framework is a set of rules and conventions for building and interacting with web services.
REST stands for Representational State Transfer
It uses standard HTTP methods like GET, POST, PUT, DELETE for communication
It is stateless and allows for scalability and flexibility
Example: Django REST framework for building APIs in Python
SQL queries are used to retrieve, manipulate, and manage data stored in a database.
SQL SELECT query is used to retrieve data from a database table.
SQL INSERT query is used to insert new records into a database table.
SQL UPDATE query is used to modify existing records in a database table.
SQL DELETE query is used to remove records from a database table.
This is related to SQL
Some of the top questions asked at the UST interview -
The duration of UST interview process can vary, but typically it takes about less than 2 weeks to complete.
based on 409 interviews
Interview experience
Software Developer
2.1k
salaries
| ₹0 L/yr - ₹0 L/yr |
Senior Software Engineer
1.7k
salaries
| ₹0 L/yr - ₹0 L/yr |
Software Engineer
1.3k
salaries
| ₹0 L/yr - ₹0 L/yr |
System Analyst
1.1k
salaries
| ₹0 L/yr - ₹0 L/yr |
Validation Engineer
938
salaries
| ₹0 L/yr - ₹0 L/yr |
TCS
Infosys
Wipro
HCLTech