Add office photos
Employer?
Claim Account for FREE

Velocis Systems

3.9
based on 687 Reviews
Filter interviews by

40+ Salesforce Interview Questions and Answers

Updated 11 Dec 2024

Q1. What are STP, EIGRP dual algorithm, Static Routing, Administrative Value of different protocols, OSPF, TCP header, OSI layers, Different commands for ios upgradation and password recovery etc.

Ans.

The question covers various networking concepts and protocols such as STP, EIGRP, OSPF, TCP header, and IOS commands.

  • STP (Spanning Tree Protocol) is used to prevent loops in a network.

  • EIGRP (Enhanced Interior Gateway Routing Protocol) dual algorithm is a routing protocol used in Cisco networks.

  • Static Routing is a type of routing where the network administrator manually configures the routes.

  • Administrative Value is a numerical value assigned to different routing protocols to d...read more

Add your answer

Q2. What is port security & how to manage.?

Ans.

Port security is a feature that restricts access to a network switch port based on the MAC address of the device connected to it.

  • Port security limits the number of MAC addresses allowed on a port.

  • It can be configured to shut down the port if unauthorized devices are detected.

  • Port security can be managed through configuration on the network switch.

  • Examples of port security management include setting maximum number of allowed MAC addresses and configuring violation actions.

Add your answer

Q3. How to check network strength…?

Ans.

Network strength can be checked using various tools and techniques.

  • Use network monitoring tools like Ping, Traceroute, and SNMP to check network performance.

  • Check signal strength and quality for wireless networks using tools like NetSpot or inSSIDer.

  • Analyze network traffic and bandwidth usage to identify any bottlenecks or issues.

  • Perform speed tests using websites like Speedtest.net to measure download and upload speeds.

  • Check for any network errors or packet loss using tools ...read more

Add your answer

Q4. What do you about Ether Channel

Ans.

Ether Channel is a technology used in networking to combine multiple physical links into a single logical link for increased bandwidth and redundancy.

  • Ether Channel is also known as Link Aggregation or Port Channel.

  • It allows multiple physical links to be bundled together to form a single logical link.

  • Ether Channel provides increased bandwidth and fault tolerance.

  • It is commonly used in switch-to-switch or switch-to-server connections.

  • Ether Channel can be configured using protoc...read more

Add your answer
Discover Salesforce interview dos and don'ts from real experiences

Q5. How to manage Network issue…?

Ans.

Network issues can be managed by identifying the problem, troubleshooting, implementing solutions, and monitoring for future issues.

  • Identify the root cause of the network issue

  • Troubleshoot the problem using network diagnostic tools

  • Implement solutions such as reconfiguring network settings or replacing faulty hardware

  • Monitor the network for any recurring issues

Add your answer

Q6. How to communication to ISP…?

Ans.

Communication with ISP involves establishing a connection and troubleshooting network issues.

  • Contact ISP's technical support for assistance

  • Provide relevant information such as account details and network configurations

  • Use tools like ping and traceroute to diagnose connectivity problems

  • Escalate issues if necessary to ensure timely resolution

Add your answer
Are these interview questions helpful?

Q7. Prepare Apache virtualization,Tomcat installation and configuration with Linux,centos,AWS EC2,S3 bucket, VMware management,zone replication.Database migration (MySQL&PostgreSQL),LVM configuration and management...

read more
Ans.

The question is about Linux System Administration and covers various topics such as Apache virtualization, Tomcat installation and configuration, AWS EC2 and S3 bucket, VMware management, database migration, LVM configuration and management, SSL configuration, ISCSI server and client configuration, haproxy configuration and management, and database replication.

  • Apache virtualization

  • Tomcat installation and configuration

  • AWS EC2 and S3 bucket

  • VMware management

  • Database migration (M...read more

Add your answer

Q8. What is HSRP. How HSRP work.

Ans.

HSRP stands for Hot Standby Router Protocol. It is a Cisco proprietary redundancy protocol used to provide high availability for routing.

  • HSRP allows for two or more routers to work together in a group, sharing a virtual IP address and providing redundancy in case one router fails.

  • One router is elected as the active router, handling traffic for the virtual IP address, while the other routers in the group remain in standby mode.

  • If the active router fails, one of the standby rou...read more

Add your answer
Share interview questions and help millions of jobseekers 🌟

Q9. What do you know about STP.

Ans.

STP stands for Spanning Tree Protocol, used in network environments to prevent loops and ensure redundancy.

  • STP is a network protocol used to prevent loops in Ethernet networks.

  • It selects a single path for traffic within a network, blocking redundant paths to prevent loops.

  • STP operates by exchanging messages between switches to detect loops and elect a root bridge.

  • Common variants of STP include RSTP (Rapid Spanning Tree Protocol) and MSTP (Multiple Spanning Tree Protocol).

Add your answer

Q10. What do you know about RSTP

Ans.

RSTP stands for Rapid Spanning Tree Protocol, a network protocol used to prevent loops in Ethernet networks.

  • RSTP is an improvement over the original Spanning Tree Protocol (STP) and provides faster convergence in the network.

  • It uses a variety of port roles such as root port, designated port, and alternate port to ensure loop-free topology.

  • RSTP introduces new features like port roles, port states, and BPDU (Bridge Protocol Data Unit) formats.

  • Example: In RSTP, the root bridge i...read more

Add your answer

Q11. Different bitbeen BGP & MPLS..?

Ans.

BGP is a routing protocol used to exchange routing information between different autonomous systems, while MPLS is a technology used to direct data packets through a network using labels.

  • BGP (Border Gateway Protocol) is a path vector protocol used to exchange routing information between different autonomous systems.

  • MPLS (Multiprotocol Label Switching) is a technology used to direct data packets through a network using labels instead of IP addresses.

  • BGP is used for inter-domai...read more

Add your answer

Q12. What is LAN & WAN…?

Ans.

LAN stands for Local Area Network, used for connecting devices within a limited area. WAN stands for Wide Area Network, used for connecting devices over a large geographical area.

  • LAN is typically used in homes, schools, and small businesses.

  • WAN is used to connect multiple LANs over a larger area, such as connecting offices in different cities.

  • LAN has higher data transfer speeds compared to WAN.

  • LAN is usually owned, controlled, and managed by a single organization, while WAN i...read more

Add your answer

Q13. Difference between http and https

Ans.

HTTP is unsecured protocol while HTTPS is secured protocol using SSL/TLS encryption.

  • HTTP stands for Hypertext Transfer Protocol, while HTTPS stands for Hypertext Transfer Protocol Secure.

  • HTTP operates on port 80, while HTTPS operates on port 443.

  • HTTP does not encrypt data, making it vulnerable to attacks like man-in-the-middle, while HTTPS encrypts data using SSL/TLS.

  • HTTPS is indicated by a padlock icon in the browser's address bar, ensuring secure communication between the c...read more

View 1 answer

Q14. How to create delete modify vlan, vtp, stp, nat, state of ospd, eigrp etc

Ans.

To create, delete, and modify VLAN, VTP, STP, NAT, OSPF, EIGRP, etc., use network management tools and configure appropriate settings.

  • Use VLAN management software or switch CLI to create, delete, and modify VLANs.

  • Configure VTP (VLAN Trunking Protocol) settings on switches to manage VLAN database.

  • Modify STP (Spanning Tree Protocol) settings to control network loop prevention.

  • Configure NAT (Network Address Translation) on routers to translate private IP addresses to public IP a...read more

View 1 answer

Q15. Have you work on google maps.apis and notifications?

Ans.

Yes, I have worked on Google Maps APIs and notifications.

  • I have experience integrating Google Maps APIs into web and mobile applications.

  • I have used the Google Maps JavaScript API to display maps, markers, and directions.

  • I have also worked with the Google Maps Geocoding API to convert addresses into geographic coordinates.

  • Regarding notifications, I have implemented push notifications using Firebase Cloud Messaging (FCM) for real-time updates in mobile apps.

  • I have used FCM to ...read more

Add your answer

Q16. Define each layers in OSI

Ans.

OSI model has 7 layers. Each layer has a specific function to perform.

  • Layer 1 - Physical layer: Deals with physical connections and transmission of raw data

  • Layer 2 - Data link layer: Provides error-free transfer of data between nodes on the same network

  • Layer 3 - Network layer: Handles routing of data between different networks

  • Layer 4 - Transport layer: Ensures reliable delivery of data between end systems

  • Layer 5 - Session layer: Establishes, manages and terminates sessions be...read more

Add your answer

Q17. 3) How you know about Velocis ?

Ans.

Velocis is a network management software company.

  • Velocis is a well-known network management software company.

  • They provide solutions for network monitoring, troubleshooting, and optimization.

  • Their software helps network engineers in managing and maintaining network infrastructure.

  • Velocis offers features like real-time monitoring, performance analysis, and reporting.

  • Their products are widely used in the IT industry by network engineers and administrators.

View 2 more answers

Q18. What is the method to sum the values of a dictionary?

Ans.

Use a loop to iterate through the dictionary and add up the values.

  • Iterate through the dictionary using a loop

  • Access each value and add it to a running total

  • Return the total sum

Add your answer

Q19. Define VPN and types

Ans.

VPN stands for Virtual Private Network. It is a secure and encrypted connection between two networks or devices over the internet.

  • VPN allows remote access to a private network over the internet

  • Types of VPN include Site-to-Site VPN, Remote Access VPN, and Mobile VPN

  • Site-to-Site VPN connects two or more networks together

  • Remote Access VPN allows individual users to connect to a private network from a remote location

  • Mobile VPN provides secure access to mobile devices while they a...read more

Add your answer

Q20. Steps for upgrading firewall

Ans.

Steps for upgrading firewall include planning, testing, implementing, and monitoring.

  • 1. Plan the upgrade by identifying the current firewall model and version.

  • 2. Backup the firewall configuration to ensure data safety.

  • 3. Test the upgrade in a lab environment to identify any potential issues.

  • 4. Implement the upgrade during a maintenance window to minimize downtime.

  • 5. Monitor the firewall post-upgrade for any performance or security issues.

  • 6. Communicate with stakeholders about...read more

Add your answer

Q21. OSI layer and explanation

Ans.

The OSI (Open Systems Interconnection) model is a conceptual framework that standardizes the functions of a telecommunication or computing system into seven abstraction layers.

  • The OSI model consists of seven layers: Physical, Data Link, Network, Transport, Session, Presentation, and Application.

  • Each layer has specific functions and communicates with the corresponding layer on another device.

  • For example, the Physical layer deals with the physical connection between devices, wh...read more

Add your answer

Q22. TCP and UDP explanation

Ans.

TCP and UDP are both protocols used for transmitting data over the internet, but they have different characteristics.

  • TCP (Transmission Control Protocol) is connection-oriented and ensures reliable delivery of data by using acknowledgments and retransmissions.

  • UDP (User Datagram Protocol) is connectionless and does not guarantee delivery of data, making it faster but less reliable than TCP.

  • TCP is commonly used for applications that require reliable data transmission, such as we...read more

Add your answer

Q23. How is your sales cycle and how do you manage to achieve your sales target?

Ans.

I have a structured sales cycle with clear goals and milestones. I consistently meet and exceed my sales targets through effective time management and strategic planning.

  • I start by identifying potential leads and qualifying them to ensure they are a good fit for our products/services.

  • I then create personalized sales pitches and presentations to showcase the value of our offerings to the prospects.

  • I follow up with leads regularly and address any concerns or objections they may...read more

Add your answer

Q24. What will motivate you the most to join Velocis System for Cloud Sales?

Ans.

I am motivated to join Velocis System for Cloud Sales by the opportunity to work with cutting-edge technology, a dynamic team, and the potential for career growth.

  • Opportunity to work with cutting-edge technology in the cloud sales industry

  • Dynamic team environment that fosters collaboration and innovation

  • Potential for career growth and advancement within Velocis System

Add your answer

Q25. What is your strategy to generate leads from the market?

Ans.

My strategy to generate leads from the market involves a combination of targeted outreach, networking, and leveraging digital marketing tools.

  • Identify target market segments and create personalized outreach campaigns

  • Attend industry events and conferences to network with potential leads

  • Utilize social media platforms and email marketing to reach a wider audience

  • Collaborate with marketing team to create compelling content and offers to attract leads

Add your answer

Q26. What do you know about incident management?

Ans.

Incident management is the process of identifying, analyzing, and resolving IT issues to minimize business impact.

  • It involves logging incidents, categorizing them by severity, and prioritizing them based on impact

  • It also includes communication with stakeholders and tracking progress until resolution

  • Examples of incidents include system crashes, network outages, and software errors

Add your answer

Q27. What is star schema and snowflake and their uses cases

Ans.

Star schema and snowflake are data modeling techniques used in data warehousing.

  • Star schema is a denormalized schema where a central fact table is connected to multiple dimension tables in a star-like structure.

  • Snowflake schema is a normalized form of star schema where dimension tables are further normalized into sub-dimension tables.

  • Star schema is more suitable for simpler queries and faster performance, while snowflake schema allows for more flexibility and scalability.

  • Star...read more

Add your answer

Q28. What is ITIL? Definition and it's lifecycle.

Ans.

ITIL is a framework for IT service management that focuses on aligning IT services with the needs of the business.

  • ITIL stands for Information Technology Infrastructure Library

  • It consists of five stages in its lifecycle: Service Strategy, Service Design, Service Transition, Service Operation, and Continual Service Improvement

  • Each stage has its own set of processes and activities that help organizations to deliver high-quality IT services

  • ITIL is widely adopted by organizations ...read more

Add your answer

Q29. What is SDLC Difference between waterfall and Agile Difference between BRD, FRS and SRS

Ans.

SDLC stands for Software Development Life Cycle. Waterfall is a sequential approach while Agile is iterative. BRD, FRS, and SRS are different types of requirement documents.

  • SDLC is a process used by software development teams to design, develop, and test high-quality software.

  • Waterfall is a linear and sequential approach to software development where each phase must be completed before the next one begins.

  • Agile is an iterative and flexible approach to software development tha...read more

Add your answer

Q30. Why string is immutable? Difference between arrays and Arraylist? Opps concepts? SQL queries

Ans.

Answers to questions related to application development

  • String is immutable because it cannot be changed once created. Any modification creates a new object.

  • Arrays are fixed in size while ArrayLists can dynamically grow and shrink.

  • OOP concepts include encapsulation, inheritance, and polymorphism.

  • SQL queries are used to retrieve, insert, update, and delete data from a database.

Add your answer

Q31. Why do you want to Join Velocis Systems?

Ans.

I want to join Velocis Systems because of its reputation for innovation and growth in the industry.

  • Impressed by the company's track record of success

  • Excited about the opportunity to contribute to a dynamic team

  • Believe in the company's vision and values

Add your answer

Q32. What is eoffice and how are beneficial to the

Ans.

eOffice is a digital platform for managing official work and communication within an organization.

  • eOffice helps in reducing paperwork and streamlining communication.

  • It enables easy tracking of documents and tasks.

  • It improves efficiency and productivity of the organization.

  • eOffice can be customized to meet the specific needs of an organization.

  • It provides a secure and centralized platform for storing and sharing information.

  • Examples of eOffice platforms include NIC eOffice, eO...read more

Add your answer

Q33. What is Normalisation and basic nf forms

Ans.

Normalization is the process of organizing data in a database to reduce redundancy and improve data integrity.

  • Normalization involves breaking down a table into smaller tables and defining relationships between them.

  • The goal of normalization is to eliminate redundant data and ensure data dependencies make sense.

  • There are different normal forms (NF) such as 1NF, 2NF, 3NF, BCNF, and 4NF, each with specific rules to follow.

  • For example, 1NF requires that each column in a table mus...read more

Add your answer

Q34. What you to for optimising queries

Ans.

I optimize queries by using indexes, avoiding unnecessary joins, and optimizing where clauses.

  • Use indexes on columns frequently used in where clauses

  • Avoid unnecessary joins by using subqueries or common table expressions

  • Optimize where clauses by using appropriate operators and functions

Add your answer

Q35. What is problem Management?

Ans.

Problem management is the process of identifying, analyzing, and resolving recurring incidents to prevent future occurrences.

  • It involves identifying the root cause of a problem

  • Creating a plan to resolve the problem

  • Implementing the plan to prevent future occurrences

  • Monitoring the effectiveness of the solution

  • Examples include identifying and resolving recurring network outages or software bugs

Add your answer

Q36. What is service request?

Ans.

A service request is a formal request from a user for help with a specific issue or task.

  • Service requests are typically submitted through a service desk or help desk system.

  • They can include requests for technical support, equipment repairs, software installations, and more.

  • Service requests are usually prioritized based on their urgency and impact on the business.

  • Examples of service requests include password resets, printer issues, and network connectivity problems.

Add your answer

Q37. oops concept difference between mysql and postgres

Ans.

MySQL and PostgreSQL are both popular relational database management systems, but they have differences in features, performance, and licensing.

  • MySQL is known for its speed and ease of use, while PostgreSQL is known for its advanced features and extensibility.

  • MySQL has a more permissive license compared to PostgreSQL's more restrictive license.

  • PostgreSQL supports more advanced data types and features like JSON and XML support, while MySQL has limited support for these.

  • MySQL h...read more

Add your answer

Q38. What is Incident?

Ans.

An incident is an unplanned interruption or reduction in quality of an IT service.

  • Incidents can be caused by hardware or software failures, human error, or external factors.

  • They can range from minor issues like a password reset to major incidents like a system outage.

  • Incidents are usually reported through a service desk or ITSM tool and are tracked until resolution.

  • The goal of incident management is to restore normal service operation as quickly as possible.

  • Incidents can also...read more

Add your answer

Q39. Difference between incident and SR?

Ans.

An incident is an unplanned interruption while an SR is a request for a service or change.

  • An incident is an unexpected event that disrupts normal operations and requires immediate attention to restore services.

  • An SR is a formal request for a service or change that is not urgent and can be planned and scheduled.

  • Incidents are usually resolved through incident management while SRs are handled through service request management.

  • Examples of incidents include system crashes, networ...read more

Add your answer

Q40. What you know about technical

Ans.

Technical knowledge refers to understanding and expertise in a specific field of technology or engineering.

  • Technical knowledge includes understanding of principles, concepts, and practices in a particular area.

  • It involves proficiency in using tools, software, and equipment relevant to the field.

  • Continuous learning and staying updated with advancements is crucial for maintaining technical knowledge.

  • Examples of technical knowledge can include programming languages, circuit desi...read more

Add your answer

Q41. what is your Java script

Ans.

JavaScript is a programming language commonly used for web development.

  • JavaScript is a high-level, interpreted programming language.

  • It is used to make web pages interactive and dynamic.

  • JavaScript can be used for client-side and server-side development.

  • Commonly used frameworks/libraries include React, Angular, and Node.js.

Add your answer

Q42. Cisco products and its details

Ans.

Cisco offers a wide range of networking products and solutions for businesses of all sizes.

  • Cisco's product portfolio includes routers, switches, firewalls, wireless access points, and more.

  • Their flagship product is the Cisco Catalyst switch series, which offers high-performance and scalability.

  • Cisco also offers software-defined networking solutions, such as Cisco ACI and Cisco DNA Center.

  • Their security products include Cisco ASA firewalls and Cisco Umbrella, a cloud-based sec...read more

Add your answer

Q43. Use case for network technologies

Add your answer

Q44. what is sql cte

Ans.

SQL CTE stands for Common Table Expressions, which is a temporary result set that can be referenced within a SELECT, INSERT, UPDATE, or DELETE statement.

  • CTEs are defined using the WITH keyword in SQL.

  • They help improve readability and maintainability of complex queries.

  • CTEs can be recursive, allowing for hierarchical data querying.

  • Example: WITH cte AS (SELECT * FROM table_name) SELECT * FROM cte;

Add your answer

Q45. TESTING TYPES TECHNIQUES

Ans.

Testing types techniques include black box testing, white box testing, unit testing, integration testing, system testing, acceptance testing, and regression testing.

  • Black box testing focuses on the functionality of the software without looking at its internal code.

  • White box testing examines the internal code structure and logic of the software.

  • Unit testing involves testing individual units or components of the software in isolation.

  • Integration testing checks if different unit...read more

Add your answer

Q46. Explain use cases

Ans.

Use cases are descriptions of how a system will be used by actors to achieve specific goals or tasks.

  • Use cases describe interactions between actors and the system

  • They outline specific goals or tasks that the system must support

  • Use cases help in understanding system requirements and functionality

  • Examples: User login, Place order, Generate report

Add your answer

Q47. Scenarios seen or designed

Add your answer
Contribute & help others!
Write a review
Share interview
Contribute salary
Add office photos

Interview Process at Salesforce

based on 16 interviews in the last 1 year
Interview experience
4.0
Good
View more
Interview Tips & Stories
Ace your next interview with expert advice and inspiring stories

Top Interview Questions from Similar Companies

3.9
 • 460 Interview Questions
4.0
 • 417 Interview Questions
3.9
 • 318 Interview Questions
4.2
 • 155 Interview Questions
3.7
 • 143 Interview Questions
View all
Top Velocis Systems Interview Questions And Answers
Share an Interview
Stay ahead in your career. Get AmbitionBox app
qr-code
Helping over 1 Crore job seekers every month in choosing their right fit company
70 Lakh+

Reviews

5 Lakh+

Interviews

4 Crore+

Salaries

1 Cr+

Users/Month

Contribute to help millions
Get AmbitionBox app

Made with ❤️ in India. Trademarks belong to their respective owners. All rights reserved © 2024 Info Edge (India) Ltd.

Follow us
  • Youtube
  • Instagram
  • LinkedIn
  • Facebook
  • Twitter