Filter interviews by
I applied via Indeed and was interviewed in Oct 2019. There was 1 interview round.
BGP is used for routing and exchanging information between different autonomous systems.
BGP is used to connect different autonomous systems (AS) to exchange routing information.
It is used to determine the best path for data to travel between different AS.
BGP is used by internet service providers (ISPs) to connect their networks to other networks.
It helps in load balancing and traffic engineering.
BGP is a scalable proto...
NATting is the process of modifying IP addresses in packet headers while they are in transit across a traffic routing device.
NAT stands for Network Address Translation.
It is used to conserve IP addresses by allowing multiple devices to share a single public IP address.
NAT can be used to translate private IP addresses to public IP addresses and vice versa.
There are three types of NAT: static NAT, dynamic NAT, and port a...
OSPF is an interior gateway protocol while BGP is an exterior gateway protocol.
OSPF is used within an autonomous system while BGP is used between autonomous systems.
OSPF uses a link-state routing protocol while BGP uses a path-vector routing protocol.
OSPF is faster in convergence time while BGP is slower.
OSPF is less scalable than BGP.
OSPF is more suited for small to medium-sized networks while BGP is more suited for l...
To troubleshoot LAN, WAN & SECURITY issues, follow these pointers:
Check network connectivity and configuration
Verify firewall and security settings
Analyze network traffic and logs
Use diagnostic tools like ping, traceroute, and packet capture
Check for hardware or software failures
Update firmware and software
Implement security best practices
Train users on security awareness
Top trending discussions
posted on 18 Oct 2024
I applied via Naukri.com and was interviewed in Sep 2024. There was 1 interview round.
The MITRE ATT&CK framework is a knowledge base of adversary tactics and techniques based on real-world observations.
MITRE ATT&CK provides a comprehensive list of techniques used by attackers to compromise systems.
Techniques are categorized into tactics such as Initial Access, Execution, Persistence, etc.
Examples of techniques include Spearphishing Attachment, Command and Scripting Interpreter, and Registry Run Keys / S
The topics covered includes reasoning, arithmetic, and English.
I applied via Approached by Company and was interviewed in Jan 2024. There were 2 interview rounds.
posted on 18 Oct 2023
I applied via Approached by Company and was interviewed in Sep 2023. There were 4 interview rounds.
Fortigate IPsec tunnel is a secure connection established between two Fortigate devices for secure communication.
IPsec tunnel is used to encrypt data traffic between two Fortigate devices
Fortigate devices authenticate each other using pre-shared keys or certificates
IPsec tunnel can be configured using the Fortigate web interface or CLI commands
Fortigate HA cluster is a high availability setup where two or more Fortigate devices work together to ensure continuous network security.
Fortigate HA cluster involves setting up two or more Fortigate devices in an active-passive or active-active configuration.
In active-passive setup, one device is active while the other is on standby, ready to take over in case of failure.
In active-active setup, both devices actively ...
Packet flow in Fortigate involves ingress, inspection, routing, and egress stages.
Ingress stage: Packet enters the Fortigate device through a physical or virtual interface.
Inspection stage: Packet is inspected by security policies, firewall rules, and security services like antivirus and IPS.
Routing stage: Packet is routed based on destination IP address and routing table.
Egress stage: Packet exits the Fortigate device...
posted on 26 Mar 2024
I applied via Naukri.com and was interviewed in Feb 2024. There was 1 interview round.
STP (Spanning Tree Protocol) is used to prevent loops in a network by blocking redundant paths between switches.
STP elects a root bridge to serve as the central point in the network
Each switch determines the best path to the root bridge based on the lowest path cost
Ports on switches are designated as root ports, designated ports, or blocking ports to create a loop-free topology
based on 1 review
Rating in categories
Network Support Engineer
3
salaries
| ₹6.4 L/yr - ₹7.3 L/yr |
TCS
Accenture
Wipro
Cognizant