Filter interviews by
I applied via Walk-in and was interviewed in Sep 2019. There were 3 interview rounds.
Top trending discussions
posted on 13 Jan 2017
I was interviewed before Jan 2016.
Yes, I am flexible to relocate for the Network Planning Engineer position.
I am open to considering relocation for the right opportunity.
I understand that network planning roles may require relocation to different locations.
I have previously relocated for my career and am willing to do so again if necessary.
I am excited about the prospect of working in different environments and adapting to new challenges.
I am committed...
The OSI (Open Systems Interconnection) model is a conceptual framework that standardizes the functions of a communication system into seven layers.
The OSI model is used to understand and describe how different network protocols and technologies interact with each other.
Each layer in the OSI model has a specific function and communicates with the layers above and below it.
The seven layers of the OSI model are: Physical,...
STP stands for Spanning Tree Protocol. It is a network protocol used to prevent loops in Ethernet networks.
STP is used to create a loop-free logical topology in a network.
It works by selecting a root bridge and calculating the shortest path to reach each network segment.
STP uses Bridge Protocol Data Units (BPDU) to exchange information between switches.
It identifies and blocks redundant paths to avoid broadcast storms ...
VRRP (Virtual Router Redundancy Protocol) is a network protocol that provides automatic failover for routers in a network.
VRRP allows multiple routers to work together as a virtual router, providing redundancy and high availability.
It uses a virtual IP address that can be shared among the routers, with one router acting as the master and others as backups.
If the master router fails, one of the backup routers takes over...
posted on 17 Jan 2025
posted on 24 Jan 2024
I applied via LinkedIn and was interviewed in Dec 2023. There was 1 interview round.
There are five types of VLAN in computer networking: Default VLAN, Data VLAN, Voice VLAN, Management VLAN, and Native VLAN.
Default VLAN is the VLAN that all switch ports are assigned to by default.
Data VLAN is used to carry regular network traffic.
Voice VLAN is used to carry voice traffic for VoIP systems.
Management VLAN is used for managing network devices.
Native VLAN is used for untagged traffic on a trunk port.
VLAN stands for Virtual Local Area Network. It is a network technology that allows for the creation of multiple virtual networks within a single physical network.
VLANs divide a single broadcast domain into multiple broadcast domains.
They provide a way to group devices within a VLAN, allowing for better network management and security.
VLANs can be used to separate different departments or functions within an organizatio...
posted on 21 Jun 2023
I applied via Referral and was interviewed before Jun 2022. There were 4 interview rounds.
posted on 10 Jan 2025
posted on 14 Oct 2021
I applied via Naukri.com and was interviewed in Sep 2021. There was 1 interview round.
IMAP and POP3 are email protocols used for retrieving emails from a mail server.
IMAP stands for Internet Message Access Protocol and allows users to access and manage their emails on a remote server.
POP3 stands for Post Office Protocol version 3 and downloads emails from a mail server to a local device.
IMAP allows for multiple devices to access and sync emails, while POP3 only allows for one device to download emails.
I...
Outlook is a personal information manager developed by Microsoft.
It is used for email communication, managing contacts, scheduling appointments, and organizing tasks.
It integrates with other Microsoft Office applications such as Word, Excel, and PowerPoint.
It allows users to create and manage multiple email accounts and folders.
It has features such as email filtering, automatic replies, and calendar sharing.
It can be a...
Safe mode is a diagnostic mode in which a computer's operating system starts with only basic functions.
Safe mode is used to troubleshoot and fix issues with the operating system or software.
In safe mode, only essential drivers and services are loaded, which can help identify and resolve problems.
Safe mode can be accessed by pressing a key during startup, such as F8 for Windows.
In safe mode, the screen resolution may be...
PST files are created to store Outlook data locally on a computer.
PST files allow users to access their Outlook data even when not connected to the internet.
They can be used to backup important emails, contacts, and calendar events.
PST files can also be used to transfer Outlook data from one computer to another.
They have a maximum size limit of 50GB in Outlook 2010 and later versions.
PST files can be password protected
TCP and UDP are protocols used for communication between devices on a network.
TCP stands for Transmission Control Protocol and is a connection-oriented protocol used for reliable data transfer.
UDP stands for User Datagram Protocol and is a connectionless protocol used for fast data transfer.
TCP is used for applications that require reliable data transfer, such as email and file transfer.
UDP is used for applications tha...
To install an operating system, you need to create a bootable media and follow the installation wizard.
Create a bootable media (USB, DVD, etc.) with the operating system image
Insert the bootable media into the computer and restart it
Follow the installation wizard and select the desired options (language, partition, etc.)
Wait for the installation to complete and restart the computer
posted on 13 Jan 2017
I was interviewed before Jan 2016.
Yes, I am flexible to relocate for the Network Planning Engineer position.
I am open to considering relocation for the right opportunity.
I understand that network planning roles may require relocation to different locations.
I have previously relocated for my career and am willing to do so again if necessary.
I am excited about the prospect of working in different environments and adapting to new challenges.
I am committed...
The OSI (Open Systems Interconnection) model is a conceptual framework that standardizes the functions of a communication system into seven layers.
The OSI model is used to understand and describe how different network protocols and technologies interact with each other.
Each layer in the OSI model has a specific function and communicates with the layers above and below it.
The seven layers of the OSI model are: Physical,...
STP stands for Spanning Tree Protocol. It is a network protocol used to prevent loops in Ethernet networks.
STP is used to create a loop-free logical topology in a network.
It works by selecting a root bridge and calculating the shortest path to reach each network segment.
STP uses Bridge Protocol Data Units (BPDU) to exchange information between switches.
It identifies and blocks redundant paths to avoid broadcast storms ...
VRRP (Virtual Router Redundancy Protocol) is a network protocol that provides automatic failover for routers in a network.
VRRP allows multiple routers to work together as a virtual router, providing redundancy and high availability.
It uses a virtual IP address that can be shared among the routers, with one router acting as the master and others as backups.
If the master router fails, one of the backup routers takes over...
posted on 6 Jan 2025
posted on 27 Aug 2021
I applied via Referral
Softwaretest Engineer
109
salaries
| ₹3.4 L/yr - ₹5.6 L/yr |
Software Engineer
24
salaries
| ₹3 L/yr - ₹9 L/yr |
Senior Software Engineer
7
salaries
| ₹6.3 L/yr - ₹15 L/yr |
QA Engineer
7
salaries
| ₹3.6 L/yr - ₹4.5 L/yr |
Test Engineer
7
salaries
| ₹4 L/yr - ₹5.7 L/yr |
Infosys
TCS
Wipro
HCLTech