[Updated] Goldman Sachs Aptitude Test Questions and Answers
Practice List of TCS Digital Coding Questions !!!
Take 50+ FREE!! Online Data Interpretation Mock test to crack any Exams.

Interview Questions for Cisco cisco interview questions and answers

Home > Experience Archives > Cisco > Interview Question Set 1
Telephonic Round First Round (F-2-F) Second Round (F-2-F) Third Round (F-2-F) Managerial Round (F-2-F) HR Round Q&A

    1 / 8

    What is VLAN, use of it, How it help in switching

    Answer:
    No Discussion on this question yet!
    Please Login First :
    Tags:

    No Tags on this question yet!

    2 / 8

    What is difference in PVRST, MSTP and RSTP.

    Answer:
    No Discussion on this question yet!
    Please Login First :
    Tags:

    No Tags on this question yet!

    3 / 8

    What is difference in structure and Union.

    Answer:
    No Discussion on this question yet!
    Please Login First :
    Tags:

    No Tags on this question yet!

    4 / 8

    When we do malloc we use to give size how much allocation we needed, but at time of freeing we done give, how it know how much it has to free.

    Answer:
    When memory allocation is done, the actual heap space allocated is one word larger than the requested memory. The extra word is used to store the size of the allocation and is later used by free( )
    Please Login First :
    Tags:

    No Tags on this question yet!

    5 / 8

    One question from pointer, like one pointer variable initialize, then some operation then he asked me what will be the output.

    Answer:
    No Discussion on this question yet!
    Please Login First :
    Tags:

    No Tags on this question yet!

    6 / 8

    What is ECFM, what are the main domain in it. What is end points

    Answer:
    No Discussion on this question yet!
    Please Login First :
    Tags:

    No Tags on this question yet!

    7 / 8

    What is ERPS,If you said for loop avoidance then next question were How it differ from STP.

    Answer:
    No Discussion on this question yet!
    Please Login First :
    Tags:

    No Tags on this question yet!

    8 / 8

    Next question form the previous, if you said it take less conversion, then his question was like how it make less time.

    Answer:
    No Discussion on this question yet!
    Please Login First :
    Tags:

    No Tags on this question yet!

Telephonic Round First Round (F-2-F) Second Round (F-2-F) Third Round (F-2-F) Managerial Round (F-2-F) HR Round Q&A

    1 / 9

    How mac-learning happen, how it maintain the mac-table, and about the vlan table.

    Answer:
    No Discussion on this question yet!
    Please Login First :
    Tags:

    No Tags on this question yet!

    2 / 9

    How packet process from L2 to L3. How it happen in HW level.

    Answer:
    No Discussion on this question yet!
    Please Login First :
    Tags:

    No Tags on this question yet!

    3 / 9

    What is per-port vlan.

    Answer:
    No Discussion on this question yet!
    Please Login First :
    Tags:

    No Tags on this question yet!

    4 / 9

    Make some change in below program so that it print "i am in if followed by I am in else"
    If ()
    {
    printf("I am in if");
    }
    else
    {
    printf("I am in Else");
    }

    Answer:
    change the code something like

    If ( ! printf("I am in if") ) <>
    {
    printf("I am in if");
    }
    else
    {
    printf("I am in Else");
    }
    Please Login First :
    Tags:

    No Tags on this question yet!

    5 / 9

    Write a program to reverse linklist normal & recursive, which way is efficient normal or recursive.

    Answer:
    Non-Recursive
    ========

    void reverse(struct node ** head)
    {
    struct node* prev = NULL;
    struct node* current = *head;
    struct node* next;
    while (current != NULL)
    {
    next = current->next;
    current->next = prev;
    prev = current;
    current = next;
    }
    *head = prev;
    }
    This trick might help you
    there are three pointer ( prev, current, next)
    next = current*
    current* = prev
    prev = current
    current = next

    if we see from above logic then before = is like top to bottom then bottom to top .
    * marked pointer will have next.

    Recursive
    =======


    struct node * recLinkedList(struct node *head, struct node *prev)
    {
    struct node *tmp = head->next;
    head->next = prev;
    if ( tmp != NULL)
    recLinkedList(tmp, head);

    return head
    }

    int main()
    {
    struct node *head = recLinkedList (head, NULL);
    }
    Please Login First :
    Tags:

    No Tags on this question yet!

    6 / 9

    In given topology he ask to explain STP & RSTP.

    topology

    Then he removed switch 4 and ask same to explain.

    topology

    Answer:
    No Discussion on this question yet!
    Please Login First :
    Tags:

    No Tags on this question yet!

    7 / 9

    What is ECFM, How link trace work.

    Answer:
    No Discussion on this question yet!
    Please Login First :
    Tags:

    No Tags on this question yet!

    8 / 9

    Again he ask in above topology explain ECFM.

    Answer:
    No Discussion on this question yet!
    Please Login First :
    Tags:

    No Tags on this question yet!

    9 / 9

    Some question from Broadcom API, have you come across any api in ANY module.

    Answer:
    No Discussion on this question yet!
    Please Login First :
    Tags:

    No Tags on this question yet!

Telephonic Round First Round (F-2-F) Second Round (F-2-F) Third Round (F-2-F) Managerial Round (F-2-F) HR Round Q&A

    1 / 6

    What is MPLS, How Label switching happen, make all the table

    Answer:
    No Discussion on this question yet!
    Please Login First :
    Tags:

    No Tags on this question yet!

    2 / 6

    Why we use MPLS, and why it is fast.

    Answer:
    No Discussion on this question yet!
    Please Login First :
    Tags:

    No Tags on this question yet!

    3 / 6

    How the HW table look, and what are component there. How L2->L3 happen.

    Answer:
    No Discussion on this question yet!
    Please Login First :
    Tags:

    No Tags on this question yet!

    4 / 6

    How mac-learning happen.

    Answer:
    No Discussion on this question yet!
    Please Login First :
    Tags:

    No Tags on this question yet!

    5 / 6

    In a single linklist there are 100 nodes, add the three node, if its value is more than 15 then delete the other two nodes. Write a program in such a way that it should compile and run.
    ex. 12->3->1->11->23->44-> ------->100
    After first iteration
    12->11->23->44-> ------->100
    after second iteration
    12->44-> ------->100

    Answer:
    No Discussion on this question yet!
    Please Login First :
    Tags:

    No Tags on this question yet!

    6 / 6

    Design a data structure to store IP Address by keeping in mind searching/storing is efficient. Can you use tree to make it.

    Answer:
    No Discussion on this question yet!
    Please Login First :
    Tags:

    No Tags on this question yet!

Telephonic Round First Round (F-2-F) Second Round (F-2-F) Third Round (F-2-F) Managerial Round (F-2-F) HR Round Q&A

    1 / 6

    How does ping work, as example between two host. He is expecting each step in, like IP table , masking, mac-address
    Host-1 ----------ping------- Host-2

    Answer:
    No Discussion on this question yet!
    Please Login First :
    Tags:

    No Tags on this question yet!

    2 / 6

    What is difference in CAM, TCAM, and HASH table, which is better all in detail

    Answer:
    No Discussion on this question yet!
    Please Login First :
    Tags:

    No Tags on this question yet!

    3 / 6

    above question was continue like which table will be where

    Answer:
    No Discussion on this question yet!
    Please Login First :
    Tags:

    No Tags on this question yet!

    4 / 6

    What is vlan in detail.

    Answer:
    No Discussion on this question yet!
    Please Login First :
    Tags:

    No Tags on this question yet!

    5 / 6

    What is bridge and its benefit

    Answer:
    A bridge is a product that connects a local area network (LAN) to another local area network that uses the same protocol (for example, Ethernet or Token Ring). You can envision a bridge as being a device that decides whether a message from you to someone else is going to the local area network in your building or to someone on the local area network in the building across the street.

    Benefit :

    It work at data link layer and it is capable of handling physical addressing, so it reduce the un-necessary traffic.
    Please Login First :
    Tags:

    No Tags on this question yet!

    6 / 6

    What is difference in memcpy, strncpy.

    Answer:
    a) When memory block requires to be copied then memcpy is useful

    when data in the form of string need to be copied then strncpy is useful because of the natural advantage of '\0' terminated string.

    b) memcpy() can copy data with embedded null characters.

    strncpy will copy the string to the maximum of either the number of characters given or the position of the first occurrence of null character, i.e '\0' , and reset will be filled with 0
    Please Login First :
    Tags:

    No Tags on this question yet!

Telephonic Round First Round (F-2-F) Second Round (F-2-F) Third Round (F-2-F) Managerial Round (F-2-F) HR Round Q&A Telephonic Round First Round (F-2-F) Second Round (F-2-F) Third Round (F-2-F) Managerial Round (F-2-F) HR Round Q&A