Filter interviews by
I applied via Naukri.com and was interviewed before Oct 2021. There were 3 interview rounds.
Firewall is a network security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules.
Firewalls can be hardware, software or cloud-based
Types of firewalls include packet-filtering, stateful inspection, proxy, and next-generation firewalls
Packet-filtering firewalls examine packets and filter them based on source/destination IP address, port number, and protocol
State...
Network protocols like FTP, SSH, SSL, RDP, HTTPS are used for secure data transfer over a network.
FTP (File Transfer Protocol) is used for transferring files between computers on a network.
SSH (Secure Shell) is used for secure remote access to a computer or server.
SSL (Secure Sockets Layer) is used for secure communication between web browsers and servers.
RDP (Remote Desktop Protocol) is used for remote access to a com...
The OSI model is a conceptual framework used to describe network communication. It has 7 layers.
Layer 1: Physical layer - deals with the physical aspects of transmitting data
Layer 2: Data link layer - responsible for error-free transfer of data between nodes
Layer 3: Network layer - handles routing and forwarding of data packets
Layer 4: Transport layer - ensures reliable delivery of data between applications
Layer 5: Ses...
TCP and UDP are transport layer protocols used for communication between devices on a network.
TCP (Transmission Control Protocol) is a connection-oriented protocol that ensures reliable data transmission by establishing a connection between two devices and providing error checking and flow control.
UDP (User Datagram Protocol) is a connectionless protocol that does not establish a connection before transmitting data. It...
I applied via Recruitment Consultant and was interviewed in Jun 2021. There were 5 interview rounds.
I applied via Campus Placement and was interviewed before Oct 2022. There were 3 interview rounds.
UVM is a methodology for verifying complex designs using SystemVerilog. Blocking assignments execute sequentially, while non-blocking assignments execute concurrently.
UVM (Universal Verification Methodology) is a standardized methodology for verifying complex designs in SystemVerilog.
Blocking assignments in SystemVerilog execute sequentially, meaning the next statement waits for the current statement to finish.
Non-bloc...
I was interviewed in Nov 2022.
Strong appitude knowledge is required.
SQL statements are used to interact with databases by performing operations like querying, updating, and deleting data.
SQL statements are made up of keywords like SELECT, INSERT, UPDATE, DELETE, etc.
They are structured in a specific order, with clauses like WHERE, ORDER BY, GROUP BY, etc.
Tables are referenced using their names, and conditions are specified to filter data.
Joins can be used to combine data from multiple
I applied via Job Portal and was interviewed in Jan 2023. There were 3 interview rounds.
posted on 14 Jun 2024
posted on 15 Jul 2024
Normalization is the process of organizing data in a database to reduce redundancy and improve data integrity.
Normalization helps in reducing data redundancy by breaking down large tables into smaller ones.
It ensures data integrity by minimizing data anomalies such as update, insert, and delete anomalies.
Normalization follows a set of rules (normal forms) like 1NF, 2NF, 3NF, etc., to organize data efficiently.
Example: ...
Network Security Engineer
4
salaries
| ₹0 L/yr - ₹0 L/yr |
Primus Global Technologies
Practo
Magneti Marelli Motherson Auto System
TriGeo Technologies