Filter interviews by
I applied via Naukri.com and was interviewed in May 2024. There was 1 interview round.
Port security is a feature that restricts access to a network switch port based on the MAC address of the device connected to it.
Port security limits the number of MAC addresses allowed on a port.
It can be configured to shut down the port if unauthorized devices are detected.
Port security can be managed through configuration on the network switch.
Examples of port security management include setting maximum number of al...
LAN stands for Local Area Network, used for connecting devices within a limited area. WAN stands for Wide Area Network, used for connecting devices over a large geographical area.
LAN is typically used in homes, schools, and small businesses.
WAN is used to connect multiple LANs over a larger area, such as connecting offices in different cities.
LAN has higher data transfer speeds compared to WAN.
LAN is usually owned, con...
BGP is a routing protocol used to exchange routing information between different autonomous systems, while MPLS is a technology used to direct data packets through a network using labels.
BGP (Border Gateway Protocol) is a path vector protocol used to exchange routing information between different autonomous systems.
MPLS (Multiprotocol Label Switching) is a technology used to direct data packets through a network using ...
Network issues can be managed by identifying the problem, troubleshooting, implementing solutions, and monitoring for future issues.
Identify the root cause of the network issue
Troubleshoot the problem using network diagnostic tools
Implement solutions such as reconfiguring network settings or replacing faulty hardware
Monitor the network for any recurring issues
Communication with ISP involves establishing a connection and troubleshooting network issues.
Contact ISP's technical support for assistance
Provide relevant information such as account details and network configurations
Use tools like ping and traceroute to diagnose connectivity problems
Escalate issues if necessary to ensure timely resolution
Network strength can be checked using various tools and techniques.
Use network monitoring tools like Ping, Traceroute, and SNMP to check network performance.
Check signal strength and quality for wireless networks using tools like NetSpot or inSSIDer.
Analyze network traffic and bandwidth usage to identify any bottlenecks or issues.
Perform speed tests using websites like Speedtest.net to measure download and upload speed...
The OSI (Open Systems Interconnection) model is a conceptual framework that standardizes the functions of a telecommunication or computing system into seven abstraction layers.
The OSI model consists of seven layers: Physical, Data Link, Network, Transport, Session, Presentation, and Application.
Each layer has specific functions and communicates with the corresponding layer on another device.
For example, the Physical la...
TCP and UDP are both protocols used for transmitting data over the internet, but they have different characteristics.
TCP (Transmission Control Protocol) is connection-oriented and ensures reliable delivery of data by using acknowledgments and retransmissions.
UDP (User Datagram Protocol) is connectionless and does not guarantee delivery of data, making it faster but less reliable than TCP.
TCP is commonly used for applic...
Basics maths and english
I applied via Referral and was interviewed before Apr 2023. There was 1 interview round.
HSRP stands for Hot Standby Router Protocol. It is a Cisco proprietary redundancy protocol used to provide high availability for routing.
HSRP allows for two or more routers to work together in a group, sharing a virtual IP address and providing redundancy in case one router fails.
One router is elected as the active router, handling traffic for the virtual IP address, while the other routers in the group remain in stand...
STP stands for Spanning Tree Protocol, used in network environments to prevent loops and ensure redundancy.
STP is a network protocol used to prevent loops in Ethernet networks.
It selects a single path for traffic within a network, blocking redundant paths to prevent loops.
STP operates by exchanging messages between switches to detect loops and elect a root bridge.
Common variants of STP include RSTP (Rapid Spanning Tree...
Ether Channel is a technology used in networking to combine multiple physical links into a single logical link for increased bandwidth and redundancy.
Ether Channel is also known as Link Aggregation or Port Channel.
It allows multiple physical links to be bundled together to form a single logical link.
Ether Channel provides increased bandwidth and fault tolerance.
It is commonly used in switch-to-switch or switch-to-serve...
RSTP stands for Rapid Spanning Tree Protocol, a network protocol used to prevent loops in Ethernet networks.
RSTP is an improvement over the original Spanning Tree Protocol (STP) and provides faster convergence in the network.
It uses a variety of port roles such as root port, designated port, and alternate port to ensure loop-free topology.
RSTP introduces new features like port roles, port states, and BPDU (Bridge Proto...
What people are saying about Velocis Systems
I applied via Naukri.com and was interviewed in Aug 2023. There were 2 interview rounds.
Steps for upgrading firewall include planning, testing, implementing, and monitoring.
1. Plan the upgrade by identifying the current firewall model and version.
2. Backup the firewall configuration to ensure data safety.
3. Test the upgrade in a lab environment to identify any potential issues.
4. Implement the upgrade during a maintenance window to minimize downtime.
5. Monitor the firewall post-upgrade for any performance...
HTTP is unsecured protocol while HTTPS is secured protocol using SSL/TLS encryption.
HTTP stands for Hypertext Transfer Protocol, while HTTPS stands for Hypertext Transfer Protocol Secure.
HTTP operates on port 80, while HTTPS operates on port 443.
HTTP does not encrypt data, making it vulnerable to attacks like man-in-the-middle, while HTTPS encrypts data using SSL/TLS.
HTTPS is indicated by a padlock icon in the browser'...
Velocis Systems interview questions for designations
I applied via Approached by Company and was interviewed in Jul 2022. There were 3 interview rounds.
Get interview-ready with Top Velocis Systems Interview Questions
I applied via Walk-in and was interviewed in Jul 2022. There were 2 interview rounds.
OSI model has 7 layers. Each layer has a specific function to perform.
Layer 1 - Physical layer: Deals with physical connections and transmission of raw data
Layer 2 - Data link layer: Provides error-free transfer of data between nodes on the same network
Layer 3 - Network layer: Handles routing of data between different networks
Layer 4 - Transport layer: Ensures reliable delivery of data between end systems
Layer 5 - Sess...
VPN stands for Virtual Private Network. It is a secure and encrypted connection between two networks or devices over the internet.
VPN allows remote access to a private network over the internet
Types of VPN include Site-to-Site VPN, Remote Access VPN, and Mobile VPN
Site-to-Site VPN connects two or more networks together
Remote Access VPN allows individual users to connect to a private network from a remote location
Mobile...
I applied via Job basket and was interviewed before Feb 2022. There were 5 interview rounds.
They give you one sheet by link to solve.
I applied via Naukri.com and was interviewed before Nov 2022. There were 3 interview rounds.
I applied via Naukri.com and was interviewed in Jul 2021. There was 1 interview round.
based on 10 interviews
3 Interview rounds
based on 70 reviews
Rating in categories
Network Engineer
374
salaries
| ₹0 L/yr - ₹0 L/yr |
Software Developer
250
salaries
| ₹0 L/yr - ₹0 L/yr |
Senior Software Developer
224
salaries
| ₹0 L/yr - ₹0 L/yr |
Senior Software Engineer
151
salaries
| ₹0 L/yr - ₹0 L/yr |
Software Engineer
138
salaries
| ₹0 L/yr - ₹0 L/yr |
TCS
Wipro
Infosys
HCLTech