Filter interviews by
The OSI (Open Systems Interconnection) model consists of 7 layers that define the functions of a network.
Physical layer - deals with physical connections and signals (e.g. Ethernet cables)
Data link layer - responsible for node-to-node communication (e.g. MAC addresses)
Network layer - handles routing and forwarding of data packets (e.g. IP addresses)
Transport layer - ensures end-to-end communication (e.g. TCP/UDP)
Sessio...
Private IP address ranges are reserved for use within private networks and are not routable on the public internet.
Private IP address ranges include 10.0.0.0 to 10.255.255.255, 172.16.0.0 to 172.31.255.255, and 192.168.0.0 to 192.168.255.255
These addresses are commonly used in home, office, and corporate networks to allow devices to communicate with each other within the same network
Private IP addresses are not unique ...
RFC 1918 refers to a set of IP address ranges reserved for private networks.
RFC 1918 defines three blocks of IP addresses that are reserved for private networks: 10.0.0.0 - 10.255.255.255, 172.16.0.0 - 172.31.255.255, and 192.168.0.0 - 192.168.255.255
These private IP addresses are not routable on the public internet and are commonly used within organizations for internal networks
Using RFC 1918 addresses helps prevent c...
OSPF is a link-state routing protocol while EIGRP is a distance-vector routing protocol.
OSPF uses Dijkstra algorithm to calculate the shortest path while EIGRP uses Diffusing Update Algorithm (DUAL)
OSPF supports VLSM and CIDR while EIGRP does not
OSPF is an open standard protocol while EIGRP is Cisco proprietary
OSPF has a lower administrative distance (110) compared to EIGRP (90)
The types of BGP protocol include eBGP and iBGP.
eBGP (External BGP) is used between different AS (Autonomous Systems)
iBGP (Internal BGP) is used within the same AS
eBGP is typically used for connecting to external networks, while iBGP is used for internal routing within the same network
IPsec is a protocol suite for securing Internet Protocol (IP) communications. IKE is a key management protocol used with IPsec.
IPsec stands for Internet Protocol Security and is used to secure IP communications.
It provides authentication, encryption, and key management for network traffic.
IKE (Internet Key Exchange) is a key management protocol used with IPsec to establish security associations and negotiate cryptograp...
Main mode and aggressive mode are two different negotiation strategies used in business and consulting.
Main mode is a collaborative negotiation approach where parties work together to find mutually beneficial solutions.
Aggressive mode is a competitive negotiation approach where one party seeks to maximize their own gains at the expense of the other party.
Main mode focuses on building relationships and trust, while aggr...
IPSec Parameters are settings used to configure and control the IPSec protocol for secure communication over a network.
IPSec parameters include encryption algorithms such as AES, DES, and 3DES.
Authentication methods like HMAC-SHA1, HMAC-MD5, and digital certificates are also part of IPSec parameters.
Key exchange protocols such as IKEv1 and IKEv2 are used to establish secure communication channels.
IPSec parameters also ...
Next Generation Firewall (NGFW) is a network security system that integrates intrusion prevention, application awareness, and other advanced features.
NGFW combines traditional firewall capabilities with advanced security features like application control, intrusion prevention, and SSL inspection.
It provides deeper visibility into network traffic and more granular control over applications and users.
NGFWs can identify a...
NAT stands for Network Address Translation, a process used to modify network address information in packet headers while in transit.
NAT allows multiple devices on a local network to share a single public IP address.
There are different types of NAT such as Static NAT, Dynamic NAT, and PAT (Port Address Translation).
NAT helps improve security by hiding internal IP addresses from external networks.
Example: A home router u...
I applied via LinkedIn and was interviewed in Mar 2023. There were 3 interview rounds.
Xxyy tt yy tt ttttt 55yyr
What people are saying about Xyz Company
I applied via Recruitment Consulltant and was interviewed in Dec 2023. There were 2 interview rounds.
I applied via Job Portal and was interviewed in Feb 2022. There were 2 interview rounds.
I am a highly experienced consultant with a strong background in problem-solving and strategic planning.
Over 10 years of experience in consulting roles
Expertise in developing and implementing effective strategies
Proven track record of delivering successful projects
Strong analytical and problem-solving skills
Excellent communication and interpersonal skills
Ability to work well in cross-functional teams
Experience in vario...
I applied via Recruitment Consulltant and was interviewed before Jun 2023. There were 2 interview rounds.
I applied via Campus Placement
Three sections (minimum two to be completed)-Aptitude, Case Solving and Machine Learning.
What do you know about Amex?
First case - you have data about the users of IRCTC app - login time, usage time, clicks, services, demographics etc.
IRCTC wants to launch air tickets booking service on the app and for this they will first show a pop up advertisement to inform their existing users about this service. Tell the parameters or criteria's to clean the data to come up with the target group to whom they will show this ad and are guaranteed to use this new service.
You have mentioned photography as your hobby. I know there is already a photography club in the campus but suppose you want to come up with a new but niche club only for select users who have high experience.
Suppose you have a genie, who can get you any database from any source which could be of help to you. With those data points overlapping over one another, you will eventually come up with a new data of users who are most likely to join your club. Tell me from what sort and type of data you will ask him to fetch and why? What information are you exactly searching for through those?
To determine if supply of autorickshaws matches demand, we need to conduct market research and analyze data. Approach for a different product would depend on the nature of the product.
Conduct market research to determine the demand for autorickshaws
Analyze data to compare demand with supply
If demand is higher than supply, increase production or import more autorickshaws
If demand is lower than supply, decrease productio...
I applied via Company Website and was interviewed in May 2024. There was 1 interview round.
Phycometric test in round 1
I applied via Company Website and was interviewed before Oct 2023. There were 2 interview rounds.
based on 3 interviews
Interview experience
based on 7 reviews
Rating in categories
Software Engineer
1.1k
salaries
| ₹0 L/yr - ₹0 L/yr |
Software Developer
827
salaries
| ₹0 L/yr - ₹0 L/yr |
Manager
811
salaries
| ₹0 L/yr - ₹0 L/yr |
Senior Software Engineer
451
salaries
| ₹0 L/yr - ₹0 L/yr |
Team Lead
410
salaries
| ₹0 L/yr - ₹0 L/yr |
Bajaj Finserv
Wells Fargo
JPMorgan Chase & Co.
HSBC Group