i
Kyndryl
Work with us
Proud winner of ABECA 2025 - AmbitionBox Employee Choice Awards
Filter interviews by
A VLAN (Virtual Local Area Network) segments a physical network into multiple logical networks for improved management and security.
VLANs allow devices on different physical networks to communicate as if they are on the same network.
They enhance security by isolating sensitive data traffic from the rest of the network.
Example: A company can create separate VLANs for HR, Finance, and IT departments to control acces...
BGP (Border Gateway Protocol) is a standardized exterior gateway protocol used to exchange routing information between different networks on the internet.
BGP is used to make routing decisions based on network policies, rules, and paths.
It is commonly used by Internet Service Providers (ISPs) to connect their networks.
BGP operates on TCP port 179.
BGP uses path vector routing algorithm to make routing decisions.
BGP ...
VLAN stands for Virtual Local Area Network, a method of segmenting a physical network into multiple virtual networks.
VLANs allow for better network security by isolating traffic between different groups of devices.
They can improve network performance by reducing broadcast traffic.
VLANs can be configured based on port, protocol, or MAC address.
Example: VLAN 10 for finance department, VLAN 20 for marketing departmen...
BGP is a routing protocol used to exchange routing information between different autonomous systems on the internet.
BGP uses TCP port 179 for communication.
BGP routers exchange routing information through BGP update messages.
BGP routers establish neighbor relationships to exchange routing information.
BGP uses path attributes to determine the best route to a destination.
BGP can be configured to influence routing de...
DHCP uses the DORA process to dynamically assign IP addresses to devices on a network.
DORA stands for Discover, Offer, Request, and Acknowledge.
1. Discover: Client broadcasts a DHCP Discover message to find available DHCP servers.
2. Offer: DHCP servers respond with a DHCP Offer message containing an IP address and configuration details.
3. Request: The client selects an offer and sends a DHCP Request message to the...
NATting of firewall involves translating private IP addresses to public IP addresses for outgoing traffic.
NAT (Network Address Translation) is used to hide private IP addresses behind a public IP address.
It allows multiple devices on a local network to share a single public IP address.
Types of NAT include Static NAT, Dynamic NAT, and PAT (Port Address Translation).
Subnetting is the process of dividing a network into smaller subnetworks for better organization and management.
Subnetting helps in optimizing network performance by reducing congestion and improving security.
It involves dividing an IP network into multiple smaller subnetworks called subnets.
Subnet masks are used to determine which part of an IP address belongs to the network and which part belongs to the host.
CID...
I appeared for an interview in Jun 2025, where I was asked the following questions.
A VLAN (Virtual Local Area Network) segments a physical network into multiple logical networks for improved management and security.
VLANs allow devices on different physical networks to communicate as if they are on the same network.
They enhance security by isolating sensitive data traffic from the rest of the network.
Example: A company can create separate VLANs for HR, Finance, and IT departments to control access.
VLA...
NATting of firewall involves translating private IP addresses to public IP addresses for outgoing traffic.
NAT (Network Address Translation) is used to hide private IP addresses behind a public IP address.
It allows multiple devices on a local network to share a single public IP address.
Types of NAT include Static NAT, Dynamic NAT, and PAT (Port Address Translation).
Subnetting is the process of dividing a network into smaller subnetworks for better organization and management.
Subnetting helps in optimizing network performance by reducing congestion and improving security.
It involves dividing an IP network into multiple smaller subnetworks called subnets.
Subnet masks are used to determine which part of an IP address belongs to the network and which part belongs to the host.
CIDR not...
I applied via Naukri.com and was interviewed in May 2024. There was 1 interview round.
VLAN stands for Virtual Local Area Network, a method of segmenting a physical network into multiple virtual networks.
VLANs allow for better network security by isolating traffic between different groups of devices.
They can improve network performance by reducing broadcast traffic.
VLANs can be configured based on port, protocol, or MAC address.
Example: VLAN 10 for finance department, VLAN 20 for marketing department.
What people are saying about Kyndryl
I applied via Approached by Company and was interviewed before Mar 2021. There were 2 interview rounds.
LSA Types are used in OSPF to describe the type of information contained in the LSA.
Type 1: Router LSA - contains information about the router and its directly connected networks
Type 2: Network LSA - describes the networks connected to a multi-access network
Type 3: Summary LSA - contains information about networks outside of the area
Type 4: ASBR Summary LSA - describes the ASBR router to the rest of the OSPF domain
Type...
BGP attributes are used to determine the best path for routing traffic between autonomous systems.
BGP attributes include: AS Path, Next Hop, Local Preference, Weight, Multi-Exit Discriminator (MED), Origin, and Community
AS Path is a list of autonomous systems that the route has passed through
Next Hop is the IP address of the next router in the path
Local Preference is used to indicate the preferred path for outbound tra...
I applied via Referral and was interviewed before May 2021. There were 3 interview rounds.
SDWAN is a software-defined approach to managing and optimizing WAN connections.
SDWAN uses software to control and manage network traffic across multiple WAN connections.
It can dynamically route traffic based on network conditions and application requirements.
SDWAN can improve network performance, reduce costs, and simplify network management.
Examples of SDWAN vendors include Cisco, VMware, and Silver Peak.
The cost of default route varies depending on the network infrastructure and service provider.
The cost of default route is usually included in the overall cost of the internet service provided by the ISP.
The cost may also depend on the type of connection, such as fiber optic or cable.
In some cases, the cost may be higher for businesses that require more bandwidth and faster speeds.
The cost may also vary depending on th...
OSPF neighbourship occurs when two OSPF routers establish a relationship to exchange routing information.
OSPF routers send hello packets to discover neighbours
If the hello packets are compatible, the routers become neighbours
The routers exchange database descriptors to synchronize their link-state databases
If the databases are the same, the routers become fully adjacent
Neighbourship can be affected by network topology ...
AS path prepend is a technique used in BGP to influence the path selection of traffic.
AS path prepend involves adding the same AS number multiple times to the AS path attribute of a BGP route advertisement.
This makes the path appear longer and less desirable, causing traffic to prefer other paths.
AS path prepend can be used to influence inbound or outbound traffic.
Inbound traffic can be influenced by adding the local A...
Overlay is a network virtualization technique that adds a layer of abstraction over the physical network, while underlay refers to the physical network infrastructure.
Overlay is used to create virtual networks on top of the physical network infrastructure.
Underlay refers to the physical network infrastructure that provides connectivity between devices.
Overlay networks are used to provide network virtualization, multi-t...
VRF stands for Virtual Routing and Forwarding. It is a technology that allows multiple instances of a routing table to coexist on the same router.
VRF provides logical separation of routing tables, allowing multiple routing domains to exist on a single physical router.
Each VRF has its own routing table and forwarding table, which allows for overlapping IP addresses to be used without conflict.
VRFs are commonly used in M...
BGP damping is a technique used to reduce the impact of unstable routes on the internet.
BGP damping helps to prevent the propagation of unstable routes by temporarily suppressing them.
It is used to reduce the impact of route flapping, which occurs when a route repeatedly alternates between available and unavailable states.
BGP damping assigns a penalty value to unstable routes, and if the penalty exceeds a certain thres...
I applied via Naukri.com and was interviewed before Jan 2022. There were 5 interview rounds.
Aptitude questions. Not much considered for final selection.
I appeared for an interview in Oct 2023.
Configuring FAILOVER via static Route involves setting up multiple routes with different priorities.
Create multiple static routes with different next-hop IP addresses
Assign different administrative distances to each static route
Configure IP SLA to track the primary route and switch to the secondary route if the primary route fails
I appeared for an interview before Feb 2023.
based on 5 interview experiences
Difficulty level
Duration
based on 20 reviews
Rating in categories
System Administrator
1.3k
salaries
| ₹4.9 L/yr - ₹11 L/yr |
Infrastructure Specialist
747
salaries
| ₹5.8 L/yr - ₹23 L/yr |
Project Manager
696
salaries
| ₹13.5 L/yr - ₹23.9 L/yr |
Associate Technical Engineer
668
salaries
| ₹3.5 L/yr - ₹6.8 L/yr |
SME
420
salaries
| ₹14.4 L/yr - ₹26 L/yr |
Genpact
DXC Technology
Optum Global Solutions
Virtusa Consulting Services