Filter interviews by
VLAN stands for Virtual Local Area Network. It is a logical grouping of devices on a network based on their function, project, or application.
VLANs allow network administrators to segment a network into smaller, more manageable groups.
Each VLAN has its own broadcast domain, which means that broadcasts are contained within the VLAN and do not spread to other VLANs.
VLANs can be configured to span multiple switches, ...
L2 is data link layer responsible for MAC addressing and error detection, while L3 is network layer responsible for IP addressing and routing.
L2 operates on MAC addresses while L3 operates on IP addresses
L2 is responsible for error detection and correction while L3 is responsible for routing
L2 switches packets within a network while L3 routes packets between networks
Examples of L2 devices include switches and brid...
OSI (Open Systems Interconnection) layer is a conceptual model that describes the communication functions of a telecommunication system.
Layer 1 (Physical Layer) - Transmits raw data bits over a communication channel.
Layer 2 (Data Link Layer) - Provides error-free transfer of data frames between nodes over the physical layer.
Layer 3 (Network Layer) - Provides logical addressing and routing of data packets between n...
Subnetting is the process of dividing a network into smaller subnetworks.
Subnetting helps in efficient utilization of IP addresses.
It improves network performance and security.
Subnetting is done by borrowing bits from the host portion of an IP address.
CIDR notation is used to represent subnet masks.
Example: 192.168.1.0/24 represents a network with 256 IP addresses.
Understanding key concepts in network security: vulnerabilities, threats, risks, and principles of information security.
Vulnerability: A weakness in a system (e.g., outdated software).
Threat: A potential cause of an unwanted incident (e.g., malware).
Risk: The potential for loss or damage when a threat exploits a vulnerability.
Three principles of information security: Confidentiality, Integrity, Availability.
IDs (I...
Firewalls are security devices that monitor and control incoming and outgoing network traffic based on predetermined security rules.
Types of firewalls include: Packet Filtering, Stateful Inspection, Proxy Firewalls, and Next-Generation Firewalls.
A firewall acts as a barrier between trusted and untrusted networks, preventing unauthorized access.
Stateful firewalls track the state of active connections, while statele...
BGP and OSPF are routing protocols used in networking to determine the best path for data packets to travel.
BGP (Border Gateway Protocol) is an exterior gateway protocol used to exchange routing information between different autonomous systems.
OSPF (Open Shortest Path First) is an interior gateway protocol used to find the shortest path for routing within a single autonomous system.
BGP uses TCP for communication a...
VPC, VSS, STP, RSTP, MSTP, OSPF, and EIGRP are networking concepts and protocols for managing network traffic and topology.
VPC (Virtual Private Cloud): A private cloud environment within a public cloud, allowing for isolated resources.
VSS (Virtual Switching System): Combines multiple physical switches into a single logical switch for redundancy and scalability.
STP (Spanning Tree Protocol): Prevents loops in Ethern...
I applied via Walk-in and was interviewed in Jul 2024. There was 1 interview round.
ALB (Application Load Balancer) routes HTTP/HTTPS traffic, while NLB (Network Load Balancer) handles TCP/UDP traffic at high performance.
ALB operates at Layer 7 (Application Layer) of the OSI model, allowing for advanced routing based on content.
NLB operates at Layer 4 (Transport Layer), making it suitable for handling millions of requests per second with low latency.
ALB supports features like host-based and path-based...
AZ (Availability Zone) and Regions are key components of AWS infrastructure for high availability and fault tolerance.
Regions are geographical areas that contain multiple AZs, e.g., US East (N. Virginia).
Availability Zones are isolated locations within a region, e.g., us-east-1a, us-east-1b.
Each AZ has independent power, cooling, and physical security to ensure reliability.
Deploying applications across multiple AZs enh...
I appeared for an interview in Apr 2025, where I was asked the following questions.
OWASP is an open-source project focused on improving the security of software through community-driven resources and guidelines.
OWASP stands for Open Web Application Security Project.
It provides a list of the top 10 web application security risks, such as SQL Injection and Cross-Site Scripting (XSS).
OWASP offers various tools and resources, including the OWASP ZAP (Zed Attack Proxy) for security testing.
The OWASP Found...
The presentation layer formats data for the application layer, ensuring proper data representation and encryption for communication.
Responsible for data translation and formatting.
Handles encryption and decryption for secure communication.
Examples include JPEG for images and ASCII for text.
Ensures compatibility between different data formats.
I am a software developer with 5 years of experience in Java, Python, and SQL.
5 years of experience in Java, Python, and SQL
Strong problem-solving skills
Experience working in Agile development environment
I developed a web application for managing inventory and sales for a retail store.
Used React.js for front-end development
Implemented Node.js for back-end functionality
Utilized MongoDB for database management
I appeared for an interview in Dec 2024.
My life goal is to continuously learn and grow, both personally and professionally, while making a positive impact on others.
Constantly seeking new challenges and opportunities for growth
Striving to make a difference in the lives of those around me
Setting and achieving meaningful goals
Building strong relationships and networks
Contributing to the success of the organization I work for
My greatest strength is my attention to detail and ability to analyze complex financial data.
Strong analytical skills
Attention to detail
Ability to work with complex financial data
Problem-solving skills
Experience in financial analysis and reporting
Assignment 20 Marks in 10 Min
Top trending discussions
Some of the top questions asked at the Orient Technologies interview -
The duration of Orient Technologies interview process can vary, but typically it takes about less than 2 weeks to complete.
based on 46 interview experiences
Difficulty level
Duration
based on 590 reviews
Rating in categories
5-7 Yrs
Not Disclosed
7-8 Yrs
Not Disclosed
Desktop Support Engineer
229
salaries
| ₹1.6 L/yr - ₹4.5 L/yr |
Network Engineer
150
salaries
| ₹1.7 L/yr - ₹7.9 L/yr |
Network Support Engineer
143
salaries
| ₹0.9 L/yr - ₹6 L/yr |
Technical Support Engineer
82
salaries
| ₹2 L/yr - ₹5.1 L/yr |
System Administrator
77
salaries
| ₹3.3 L/yr - ₹7.5 L/yr |
ITC Infotech
CMS IT Services
KocharTech
Xoriant