Find Interview Questions for Top Companies
Ques:- How will you (as manager) not let your team member leave the company while he’s only there for hike, and your senior management has decided to follow strict budget?
Right Answer:
To retain the team member, I would have an open and honest conversation to understand their motivations and concerns. I would highlight their value to the team, discuss potential career growth opportunities, and explore non-monetary incentives such as professional development, flexible work arrangements, or additional responsibilities that align with their interests. Additionally, I would advocate for their contributions to senior management to seek possible budget adjustments or future salary reviews.
Ques:- Differentiate between LAN, WAN, MAN?
Asked In :-
Right Answer:
LAN (Local Area Network) connects devices within a small geographic area, like a home or office. MAN (Metropolitan Area Network) covers a larger area, such as a city, connecting multiple LANs. WAN (Wide Area Network) spans a vast geographic area, often connecting multiple MANs and LANs, such as across countries or continents.
Ques:- Why do you want a career change?
Right Answer:
I want a career change to pursue my passion for hardware design, where I can apply my skills and creativity to develop innovative solutions and contribute to exciting projects in technology.
Ques:- What are the good ways to trace the origin of virus in a network?
Right Answer:
1. Analyze network traffic using intrusion detection systems (IDS) or intrusion prevention systems (IPS).
2. Review firewall logs for unusual outbound connections.
3. Use antivirus and anti-malware tools to scan and identify infected devices.
4. Check system logs and event logs for suspicious activities.
5. Implement endpoint detection and response (EDR) solutions for deeper analysis.
6. Conduct a forensic analysis on affected systems to trace the infection path.
7. Monitor user behavior for anomalies that may indicate compromise.
Ques:- Do you know about server installation?
Asked In :- oliver bonas,
Right Answer:
Yes, I am familiar with server installation, including setting up the operating system, configuring network settings, and installing necessary software and services.
Ques:- Differentiate between GSM and CDMA?
Asked In :-
Right Answer:
GSM (Global System for Mobile Communications) uses time division multiple access (TDMA) to allow multiple users to share the same frequency channel by dividing the signal into time slots, while CDMA (Code Division Multiple Access) uses spread spectrum technology to allow multiple users to share the same frequency by assigning unique codes to each user. GSM is more widely used globally, while CDMA is primarily used in the U.S. and some other regions.
Ques:- What is the difference between SYNONYM and ALIAS?
Right Answer:
A SYNONYM is a database object that serves as an alternative name for another database object, allowing users to access it without needing to specify its schema. An ALIAS, on the other hand, is a temporary name given to a table or column for the duration of a query, primarily for readability or convenience in SQL statements.
Ques:- What are the situations in which Lightweight UDP Protocol would be acceptable?
Right Answer:
Lightweight UDP Protocol would be acceptable in situations where low latency is critical, such as real-time applications (e.g., VoIP, online gaming), where occasional data loss is tolerable, and where overhead needs to be minimized, such as in IoT devices or streaming media.
Ques:- What is POP?
Asked In :- Java R&D, ibex, supportyourapp,
Right Answer:
POP stands for Post Office Protocol, which is a protocol used by email clients to retrieve emails from a mail server. The most common version is POP3, which allows users to download their emails to their local device and typically deletes them from the server.
Ques:- What is the difference between router ACLs and Firewall ACLs?
Asked In :- BluePi,
Right Answer:
Router ACLs (Access Control Lists) are used to filter traffic based on IP addresses and protocols at the network layer, primarily for routing decisions. Firewall ACLs, on the other hand, provide more advanced security features, allowing for filtering based on a wider range of criteria, including application layer data, and are designed to protect networks from unauthorized access and attacks.


AmbitionBox Logo

What makes Takluu valuable for interview preparation?

1 Lakh+
Companies
6 Lakh+
Interview Questions
50K+
Job Profiles
20K+
Users