Add office photos
Engaged Employer

Wipro

3.7
based on 51.4k Reviews
Filter interviews by

30+ Factentry Data Solutions Interview Questions and Answers

Updated 16 Jan 2025
Popular Designations

Q1. What is Stp and how it is work? What is root bridge

Ans.

STP (Spanning Tree Protocol) is a network protocol that prevents loops in Ethernet networks. It elects a root bridge to manage the network.

  • STP is a network protocol used to prevent loops in Ethernet networks.

  • It works by creating a loop-free logical topology by blocking redundant paths.

  • STP elects a root bridge, which becomes the central point of the network.

  • The root bridge is the bridge with the lowest bridge ID.

  • STP uses Bridge Protocol Data Units (BPDUs) to exchange informati...read more

View 4 more answers

Q2. What is the ranges of the private ip addresses

Ans.

Private IP addresses ranges are reserved for internal networks and not routable on the internet.

  • Private IP addresses are used within a local network and are not accessible from the internet

  • There are three ranges of private IP addresses: 10.0.0.0 - 10.255.255.255, 172.16.0.0 - 172.31.255.255, and 192.168.0.0 - 192.168.255.255

  • Private IP addresses are commonly used in home and office networks to allow devices to communicate with each other

View 3 more answers

Q3. What is BGP and its attributes

Ans.

BGP is a routing protocol used to exchange routing information between different networks.

  • BGP stands for Border Gateway Protocol.

  • It is used to connect different autonomous systems (AS) on the internet.

  • BGP uses path vector routing to determine the best path for data to travel.

  • BGP attributes include AS path, next hop, local preference, and origin.

  • AS path is a list of AS numbers that the route has passed through.

  • Next hop is the IP address of the next router in the path.

  • Local pre...read more

View 2 more answers

Q4. What will be the subnet mask for CIDR /29

Ans.

The subnet mask for CIDR /29 is 255.255.255.248.

  • CIDR /29 means 29 bits are used for the network portion and 3 bits for the host portion.

  • To calculate the subnet mask, convert the 29 network bits to 1s and add 3 0s for the host bits.

  • The result is 255.255.255.248 in dotted decimal notation.

View 2 more answers
Discover Factentry Data Solutions interview dos and don'ts from real experiences

Q5. What is ospf and its LSA types

Ans.

OSPF is a routing protocol used to exchange routing information between routers in a network.

  • OSPF stands for Open Shortest Path First

  • It is a link-state routing protocol

  • OSPF uses LSAs (Link State Advertisements) to exchange routing information

  • There are 5 types of LSAs: Router LSA, Network LSA, Summary LSA, ASBR Summary LSA, and External LSA

  • Each LSA type serves a different purpose in the OSPF network

  • OSPF is commonly used in large enterprise networks

View 3 more answers

Q6. Difference between static and default route

Ans.

Static routes are manually configured while default routes are used when no other route is available.

  • Static routes are manually configured by the network administrator

  • Default routes are used when no other route is available

  • Static routes have a higher priority than default routes

  • Static routes are more specific than default routes

  • Example: ip route 192.168.1.0 255.255.255.0 10.0.0.1

  • Example: ip route 0.0.0.0 0.0.0.0 10.0.0.1

View 1 answer
Are these interview questions helpful?

Q7. How can you avoid loop in IBGP and EBGP

Ans.

To avoid loop in IBGP and EBGP, use route reflectors or confederations.

  • Use route reflectors to avoid full mesh IBGP and confederations to avoid full mesh EBGP.

  • Configure the router to not advertise the same prefix received from one neighbor to another neighbor.

  • Use AS path prepending to influence the path selection in EBGP.

  • Configure loopback interfaces on routers to avoid the use of physical interfaces in BGP updates.

  • Use BGP TTL security feature to prevent BGP packets from loop...read more

Add your answer

Q8. What is STP and how DP and RP elected

Ans.

STP is a protocol used to prevent network loops. DP and RP are elected based on their bridge priority and MAC address.

  • STP stands for Spanning Tree Protocol

  • It prevents network loops by blocking redundant paths

  • Designated Port (DP) is the port that forwards traffic on a segment

  • Root Port (RP) is the port that has the shortest path to the root bridge

  • DP and RP are elected based on their bridge priority and MAC address

  • The bridge with the lowest bridge ID becomes the root bridge

  • STP r...read more

Add your answer
Share interview questions and help millions of jobseekers šŸŒŸ

Q9. What is VLAN

Ans.

VLAN stands for Virtual Local Area Network. It is a logical grouping of devices on a network based on function, department or application.

  • VLANs allow network administrators to segment a network into smaller, more manageable groups.

  • Devices in a VLAN can communicate with each other as if they were on the same physical network, even if they are physically located on different switches.

  • VLANs can improve network security by isolating sensitive data and restricting access to certai...read more

View 2 more answers

Q10. How to resolve DNS issue?

Ans.

DNS issue can be resolved by checking DNS server settings, clearing cache, flushing DNS, and checking network connectivity.

  • Check DNS server settings and ensure they are correct

  • Clear DNS cache on the client machine

  • Flush DNS resolver cache on the DNS server

  • Check network connectivity and ensure there are no firewall or routing issues

  • Use tools like nslookup or dig to troubleshoot DNS issues

View 1 answer

Q11. What is RT and RD

Ans.

RT stands for Route Target and RD stands for Route Distinguisher.

  • RT is used in MPLS VPN to identify which VPN a particular packet belongs to.

  • RD is used to distinguish between identical routes learned from different VRFs.

  • RT is a 64-bit value and RD is a 64-bit value or a combination of 32-bit AS number and 32-bit identifier.

  • Example: RT can be used to route traffic from a specific VPN to a specific service provider.

  • Example: RD can be used to differentiate between routes learned...read more

Add your answer

Q12. What is Fireball used in hardware

Ans.

Fireball is not used in hardware.

  • Fireball is not a term commonly used in the context of hardware.

  • There is no specific hardware component or technology called Fireball.

  • It is possible that the interviewer may have made a mistake or referred to a different term.

Add your answer

Q13. What are the ranges of private ip address

Ans.

Private IP addresses ranges are reserved for use within private networks and are not routable on the internet.

  • Private IP address ranges include: 10.0.0.0 to 10.255.255.255, 172.16.0.0 to 172.31.255.255, and 192.168.0.0 to 192.168.255.255

  • These ranges are defined in RFC 1918 and are commonly used in home, office, and enterprise networks

  • Private IP addresses allow multiple devices to share a single public IP address for internet access

Add your answer

Q14. what is loop and what is the IP

Ans.

A loop is a sequence of instructions that is continually repeated until a certain condition is met. An IP (Internet Protocol) address is a unique numerical label assigned to each device connected to a computer network.

  • A loop is used in programming to execute a block of code repeatedly until a specific condition is met.

  • There are different types of loops such as for loop, while loop, and do-while loop.

  • An IP address is used to identify and locate devices on a network, allowing t...read more

Add your answer

Q15. What is ABR router.

Ans.

ABR router stands for Area Border Router, which connects multiple areas in a OSPF network.

  • ABR router is used in OSPF (Open Shortest Path First) protocol.

  • It connects multiple areas in a network and acts as a gateway between them.

  • ABR router maintains separate link-state databases for each area it connects.

  • It summarizes the routing information between areas to reduce the size of the routing table.

  • Example: In a company network, ABR router connects the main office area with the br...read more

View 1 answer

Q16. What is bgp and its type

Ans.

BGP (Border Gateway Protocol) is an exterior gateway protocol used in internet routing. It is used to exchange routing information between different autonomous systems.

  • BGP is used to connect different autonomous systems (AS) on the internet.

  • It is a path-vector protocol that determines the best path for data packets to travel between AS.

  • BGP has two main types: eBGP (External BGP) and iBGP (Internal BGP).

  • eBGP is used to exchange routing information between different AS, while i...read more

Add your answer

Q17. What is subnet and its type

Ans.

A subnet is a logical subdivision of an IP network. It allows for efficient use of IP addresses and helps in network management.

  • Subnets divide a larger network into smaller, more manageable networks.

  • They are created by borrowing bits from the host portion of an IP address.

  • Subnetting helps in reducing network congestion and improving security.

  • Types of subnets include Classful Subnetting, Classless Inter-Domain Routing (CIDR), and Variable Length Subnet Masking (VLSM).

Add your answer

Q18. What is Ospf ?

Ans.

OSPF (Open Shortest Path First) is a routing protocol used to determine the best path for data to travel in a network.

  • OSPF is a link-state protocol that uses Dijkstra's algorithm to calculate the shortest path between two points.

  • It is used in large enterprise networks and is designed to scale well.

  • OSPF routers exchange information about their connected networks and use this information to build a topology map of the network.

  • This topology map is used to determine the best path...read more

Add your answer

Q19. Why is Osi what Is BtP

Ans.

OSI is a reference model for network communication. BtP stands for Business-to-Peer, a type of e-commerce model.

  • OSI (Open Systems Interconnection) is a conceptual model that describes how data is transmitted over a network.

  • It has seven layers, each with a specific function.

  • BtP is a type of e-commerce model where businesses sell products or services directly to individuals.

  • It is also known as B2P (Business-to-Peer).

Add your answer

Q20. What is BGP ?

Ans.

BGP stands for Border Gateway Protocol. It is a routing protocol used to exchange routing information between different networks.

  • BGP is used in large-scale networks such as the internet.

  • It is a path-vector protocol that selects the best path for data to travel between networks.

  • BGP uses TCP port 179 for communication.

  • It is used to connect different autonomous systems (AS) together.

  • BGP is used to prevent routing loops and ensure efficient routing.

  • An example of BGP in action is ...read more

Add your answer

Q21. What is mpls, description in brief

Ans.

MPLS stands for Multiprotocol Label Switching, a technique used in telecommunications networks to direct data packets along predefined paths.

  • MPLS is used to improve network performance and efficiency by quickly routing data packets based on labels instead of IP addresses.

  • It allows for traffic engineering, quality of service (QoS) prioritization, and virtual private network (VPN) services.

  • MPLS is commonly used by service providers to offer services like MPLS VPN, MPLS TE, and ...read more

Add your answer

Q22. Switch is which layer used

Ans.

Switch is used at the data link layer of the OSI model.

  • Switches operate at Layer 2 of the OSI model.

  • They use MAC addresses to forward data within a local area network (LAN).

  • Switches improve network performance by reducing collisions and providing dedicated bandwidth.

  • Examples of switches include Ethernet switches and VLAN switches.

Add your answer

Q23. What is osi model

Ans.

The OSI model is a conceptual framework that standardizes the functions of a communication system into seven layers.

  • The OSI model stands for Open Systems Interconnection model.

  • It was developed by the International Organization for Standardization (ISO) in 1984.

  • The model divides the communication process into seven layers, each with its own specific functions.

  • The layers are: Physical, Data Link, Network, Transport, Session, Presentation, and Application.

  • Each layer interacts wi...read more

Add your answer

Q24. Difference between L2 &L3 switch?

Ans.

L2 switch operates at the data link layer and forwards packets based on MAC addresses, while L3 switch operates at the network layer and forwards packets based on IP addresses.

  • L2 switch operates at the data link layer of the OSI model.

  • L2 switch forwards packets based on MAC addresses.

  • L2 switch is typically used for creating LANs.

  • L3 switch operates at the network layer of the OSI model.

  • L3 switch forwards packets based on IP addresses.

  • L3 switch is capable of routing packets bet...read more

Add your answer

Q25. What is ip address

Ans.

An IP address is a unique numerical label assigned to each device connected to a computer network.

  • IP address stands for Internet Protocol address.

  • It is used to identify and locate devices on a network.

  • IP addresses can be either IPv4 (32-bit) or IPv6 (128-bit) format.

  • IPv4 addresses are written in the form of four sets of numbers separated by periods (e.g., 192.168.0.1).

  • IPv6 addresses are written in the form of eight groups of four hexadecimal digits separated by colons (e.g., ...read more

Add your answer

Q26. Which layer is 2nd

Ans.

The 2nd layer in the network model is the Data Link Layer.

  • The Data Link Layer is responsible for the physical addressing of devices on the network.

  • It ensures reliable transmission of data over the physical layer.

  • Examples of protocols at this layer include Ethernet, Wi-Fi, and PPP.

Add your answer

Q27. What is Virtual LAN?

Ans.

Virtual LAN (VLAN) is a network technology that allows for the segmentation of a single physical network into multiple virtual networks.

  • VLANs help improve network security by isolating traffic within specific groups or departments.

  • They can also improve network performance by reducing broadcast traffic.

  • VLANs are configured at the switch level and can span multiple switches.

  • Each VLAN operates as a separate network, even though they share the same physical infrastructure.

  • VLANs a...read more

Add your answer

Q28. Explain OSI model and also

Ans.

The OSI model is a conceptual framework for understanding network communication.

  • OSI stands for Open Systems Interconnection.

  • It has 7 layers, each with a specific function.

  • The layers are: Physical, Data Link, Network, Transport, Session, Presentation, and Application.

  • Each layer communicates with the layer above and below it.

  • Example: When you visit a website, the Application layer sends a request to the Transport layer, which breaks it into smaller packets and sends it to the N...read more

Add your answer

Q29. Different between tcp and udp

Ans.

TCP is a reliable, connection-oriented protocol while UDP is a fast, unreliable, connectionless protocol.

  • TCP provides guaranteed delivery of data packets while UDP does not.

  • TCP ensures data integrity through error checking and retransmission of lost packets.

  • UDP is faster and more efficient for real-time applications like video streaming or online gaming.

  • TCP is used for applications that require reliable and ordered delivery of data, such as web browsing or file transfer.

  • UDP i...read more

Add your answer

Q30. Blah concept Wht is Stp

Ans.

STP stands for Spanning Tree Protocol, a network protocol used to prevent loops in a network topology.

  • STP is used to prevent broadcast storms and network congestion caused by loops in a network.

  • It works by creating a logical tree structure of the network, with one root bridge and multiple non-root bridges.

  • STP blocks redundant links to prevent loops, but can quickly activate them if the active link fails.

  • There are different versions of STP, such as Rapid Spanning Tree Protocol...read more

Add your answer

Q31. What is a submitting

Ans.

A subnetting is the process of dividing a network into smaller subnetworks.

  • Subnetting helps in optimizing network performance and security.

  • It allows for efficient use of IP addresses.

  • Subnetting involves creating subnets with their own unique network addresses.

Add your answer

Q32. What is a router

Ans.

A router is a networking device that forwards data packets between computer networks.

  • Routes data packets between different networks

  • Uses IP addresses to determine where to send data

  • Acts as a gateway for devices to connect to the internet

  • Can prioritize certain types of traffic for better performance

Add your answer

Q33. What is ospf explain

Ans.

OSPF (Open Shortest Path First) is a routing protocol used to find the best path for data packets in a network.

  • OSPF is a link-state routing protocol

  • It uses Dijkstra's algorithm to calculate the shortest path

  • OSPF routers exchange link-state advertisements (LSAs) to build a topology map

  • It supports VLSM (Variable Length Subnet Masking) and CIDR (Classless Inter-Domain Routing)

  • OSPF divides the network into areas to reduce routing table size and improve scalability

Add your answer

Q34. Any shifts are comfortable

Ans.

I am comfortable with any shifts, including nights, weekends, and holidays.

  • I am flexible and adaptable to different work schedules

  • I have experience working night shifts and weekends in previous roles

  • I understand the importance of maintaining network operations 24/7, which may require working non-traditional hours

Add your answer
Contribute & help others!
Write a review
Share interview
Contribute salary
Add office photos

Interview Process at Factentry Data Solutions

based on 28 interviews
3 Interview rounds
Technical Round - 1
Technical Round - 2
Personal Interview1 Round
View more
Interview Tips & Stories
Ace your next interview with expert advice and inspiring stories

Top Network Engineer Interview Questions from Similar Companies

3.3
Ā ā€¢Ā 27 Interview Questions
4.0
Ā ā€¢Ā 24 Interview Questions
3.8
Ā ā€¢Ā 18 Interview Questions
3.8
Ā ā€¢Ā 17 Interview Questions
3.5
Ā ā€¢Ā 11 Interview Questions
3.7
Ā ā€¢Ā 10 Interview Questions
View all
Share an Interview
Stay ahead in your career. Get AmbitionBox app
qr-code
Helping over 1 Crore job seekers every month in choosing their right fit company
70 Lakh+

Reviews

5 Lakh+

Interviews

4 Crore+

Salaries

1 Cr+

Users/Month

Contribute to help millions

Made with ā¤ļø in India. Trademarks belong to their respective owners. All rights reserved Ā© 2024 Info Edge (India) Ltd.

Follow us
  • Youtube
  • Instagram
  • LinkedIn
  • Facebook
  • Twitter