Upload Button Icon Add office photos

Filter interviews by

Adaptiv Networks Network Security Analyst Interview Questions, Process, and Tips

Updated 24 Nov 2019

Adaptiv Networks Network Security Analyst Interview Experiences

1 interview found

I applied via Indeed and was interviewed in Oct 2019. There was 1 interview round.

Interview Questionnaire 

4 Questions

  • Q1. Why bgp is used?
  • Ans. 

    BGP is used for routing and exchanging information between different autonomous systems.

    • BGP is used to connect different autonomous systems (AS) to exchange routing information.

    • It is used to determine the best path for data to travel between different AS.

    • BGP is used by internet service providers (ISPs) to connect their networks to other networks.

    • It helps in load balancing and traffic engineering.

    • BGP is a scalable proto...

  • Answered by AI
  • Q2. What is the concept of natting?
  • Ans. 

    NATting is the process of modifying IP addresses in packet headers while they are in transit across a traffic routing device.

    • NAT stands for Network Address Translation.

    • It is used to conserve IP addresses by allowing multiple devices to share a single public IP address.

    • NAT can be used to translate private IP addresses to public IP addresses and vice versa.

    • There are three types of NAT: static NAT, dynamic NAT, and port a...

  • Answered by AI
  • Q3. Difference between Ospf and BGP routing table?
  • Ans. 

    OSPF is an interior gateway protocol while BGP is an exterior gateway protocol.

    • OSPF is used within an autonomous system while BGP is used between autonomous systems.

    • OSPF uses a link-state routing protocol while BGP uses a path-vector routing protocol.

    • OSPF is faster in convergence time while BGP is slower.

    • OSPF is less scalable than BGP.

    • OSPF is more suited for small to medium-sized networks while BGP is more suited for l...

  • Answered by AI
  • Q4. How to troubleshoot issue from LAN, WAN & SECURITY perspective?
  • Ans. 

    To troubleshoot LAN, WAN & SECURITY issues, follow these pointers:

    • Check network connectivity and configuration

    • Verify firewall and security settings

    • Analyze network traffic and logs

    • Use diagnostic tools like ping, traceroute, and packet capture

    • Check for hardware or software failures

    • Update firmware and software

    • Implement security best practices

    • Train users on security awareness

  • Answered by AI

Interview Preparation Tips

Interview preparation tips for other job seekers - Always be honest in your interview.
Keep your answers short, precise and to the point.
Dont exaggerate things.

Skills evaluated in this interview

Interview questions from similar companies

Interview Questionnaire 

1 Question

  • Q1. 802.1x , posturing , compliance, licences use
Interview experience
2
Poor
Difficulty level
Hard
Process Duration
Less than 2 weeks
Result
No response

I applied via Naukri.com and was interviewed in Sep 2024. There was 1 interview round.

Round 1 - One-on-one 

(2 Questions)

  • Q1. Risk user analysis,table used for it
  • Q2. Mitre attack framework,different techniques
  • Ans. 

    The MITRE ATT&CK framework is a knowledge base of adversary tactics and techniques based on real-world observations.

    • MITRE ATT&CK provides a comprehensive list of techniques used by attackers to compromise systems.

    • Techniques are categorized into tactics such as Initial Access, Execution, Persistence, etc.

    • Examples of techniques include Spearphishing Attachment, Command and Scripting Interpreter, and Registry Run Keys / S

  • Answered by AI

Interview Preparation Tips

Interview preparation tips for other job seekers - learn process based questions,ask interviewer o ask question clearly
Interview experience
5
Excellent
Difficulty level
-
Process Duration
-
Result
-
Round 1 - Technical 

(2 Questions)

  • Q1. Hashing vs encryption
  • Q2. Threat vs vulnerability vs risk
Interview experience
4
Good
Difficulty level
-
Process Duration
-
Result
-
Round 1 - Aptitude Test 

The topics covered includes reasoning, arithmetic, and English.

Round 2 - Communication Round 

(2 Questions)

  • Q1. Repeat the sentences
  • Q2. Correct the jumbled sentences
Round 3 - Technical 

(1 Question)

  • Q1. OOPS concept, SQL
Interview experience
5
Excellent
Difficulty level
-
Process Duration
-
Result
-
Round 1 - Technical 

(1 Question)

  • Q1. Not Available, can't disclose
Round 2 - One-on-one 

(1 Question)

  • Q1. Not Available, can't disclose.
Interview experience
3
Average
Difficulty level
Moderate
Process Duration
Less than 2 weeks
Result
Selected Selected

I applied via Approached by Company and was interviewed in Jan 2024. There were 2 interview rounds.

Round 1 - Technical 

(1 Question)

  • Q1. Mostly from tcp/ip , dns, dhcp and firewall
Round 2 - Technical 

(1 Question)

  • Q1. Tcp/ip , dns , dhcp , paloalto firewall all features
Interview experience
5
Excellent
Difficulty level
Moderate
Process Duration
Less than 2 weeks
Result
Not Selected

I applied via Approached by Company and was interviewed in Sep 2023. There were 4 interview rounds.

Round 1 - Resume Shortlist 
Pro Tip by AmbitionBox:
Keep your resume crisp and to the point. A recruiter looks at your resume for an average of 6 seconds, make sure to leave the best impression.
View all tips
Round 2 - Technical 

(2 Questions)

  • Q1. Fortigate IPsec tunnel
  • Ans. 

    Fortigate IPsec tunnel is a secure connection established between two Fortigate devices for secure communication.

    • IPsec tunnel is used to encrypt data traffic between two Fortigate devices

    • Fortigate devices authenticate each other using pre-shared keys or certificates

    • IPsec tunnel can be configured using the Fortigate web interface or CLI commands

  • Answered by AI
  • Q2. Fortigate HA cluster and how it work
  • Ans. 

    Fortigate HA cluster is a high availability setup where two or more Fortigate devices work together to ensure continuous network security.

    • Fortigate HA cluster involves setting up two or more Fortigate devices in an active-passive or active-active configuration.

    • In active-passive setup, one device is active while the other is on standby, ready to take over in case of failure.

    • In active-active setup, both devices actively ...

  • Answered by AI
Round 3 - Technical 

(2 Questions)

  • Q1. Packet FLow of fortigate
  • Ans. 

    Packet flow in Fortigate involves ingress, inspection, routing, and egress stages.

    • Ingress stage: Packet enters the Fortigate device through a physical or virtual interface.

    • Inspection stage: Packet is inspected by security policies, firewall rules, and security services like antivirus and IPS.

    • Routing stage: Packet is routed based on destination IP address and routing table.

    • Egress stage: Packet exits the Fortigate device...

  • Answered by AI
  • Q2. Ipsec tunnel and troubleshooting
Round 4 - HR 

(1 Question)

  • Q1. About yourself and company details

Skills evaluated in this interview

Interview experience
4
Good
Difficulty level
Moderate
Process Duration
Less than 2 weeks
Result
No response

I applied via Naukri.com and was interviewed in Feb 2024. There was 1 interview round.

Round 1 - Technical 

(2 Questions)

  • Q1. Ospf, bgp states
  • Q2. How stp work in 3 switches
  • Ans. 

    STP (Spanning Tree Protocol) is used to prevent loops in a network by blocking redundant paths between switches.

    • STP elects a root bridge to serve as the central point in the network

    • Each switch determines the best path to the root bridge based on the lowest path cost

    • Ports on switches are designated as root ports, designated ports, or blocking ports to create a loop-free topology

  • Answered by AI

Skills evaluated in this interview

Interview experience
3
Average
Difficulty level
-
Process Duration
-
Result
-
Round 1 - Technical 

(2 Questions)

  • Q1. Incident response life cycle
  • Q2. Cyber kill chain

Adaptiv Networks Interview FAQs

What are the top questions asked in Adaptiv Networks Network Security Analyst interview?

Some of the top questions asked at the Adaptiv Networks Network Security Analyst interview -

  1. How to troubleshoot issue from LAN, WAN & SECURITY perspecti...read more
  2. What is the concept of natti...read more
  3. Difference between Ospf and BGP routing tab...read more

Tell us how to improve this page.

Interview Questions from Similar Companies

TCS Interview Questions
3.7
 • 10.4k Interviews
Accenture Interview Questions
3.9
 • 8.2k Interviews
Infosys Interview Questions
3.6
 • 7.6k Interviews
Wipro Interview Questions
3.7
 • 5.6k Interviews
Cognizant Interview Questions
3.8
 • 5.6k Interviews
Amazon Interview Questions
4.1
 • 5k Interviews
Capgemini Interview Questions
3.7
 • 4.8k Interviews
Tech Mahindra Interview Questions
3.5
 • 3.8k Interviews
HCLTech Interview Questions
3.5
 • 3.8k Interviews
Genpact Interview Questions
3.8
 • 3.1k Interviews
View all

Adaptiv Networks Network Security Analyst Reviews and Ratings

based on 1 review

5.0/5

Rating in categories

5.0

Skill development

5.0

Work-life balance

5.0

Salary

5.0

Job security

5.0

Company culture

5.0

Promotions

5.0

Work satisfaction

Explore 1 Review and Rating
Network Support Engineer
3 salaries
unlock blur

₹6.4 L/yr - ₹7.3 L/yr

Explore more salaries
Compare Adaptiv Networks with

TCS

3.7
Compare

Accenture

3.8
Compare

Wipro

3.7
Compare

Cognizant

3.8
Compare
Did you find this page helpful?
Yes No
write
Share an Interview