i
Filter interviews by
I applied via Recruitment Consulltant and was interviewed in Nov 2023. There were 5 interview rounds.
I applied via LinkedIn and was interviewed in Mar 2023. There were 2 interview rounds.
Blind SQL Injection is a type of SQL Injection attack where the attacker does not receive any output from the application.
The attacker sends SQL queries to the application and observes the behavior of the application to determine if the query was successful or not.
Blind SQL Injection can be time-based or boolean-based.
Time-based Blind SQL Injection involves sending a query that will cause a delay in the application's r...
PE and IDOR are both vulnerabilities in web applications, but they differ in their nature and impact.
PE (Parameter Tampering) is a vulnerability where an attacker can modify parameters in a request to bypass security controls or gain unauthorized access.
IDOR (Insecure Direct Object Reference) is a vulnerability where an attacker can access or manipulate data by directly referencing an object without proper authorizatio...
Top trending discussions
posted on 4 Mar 2024
I was interviewed before Mar 2023.
I applied via Naukri.com and was interviewed in Jan 2024. There was 1 interview round.
Packet flow in Palo Alto Firewall involves multiple stages including ingress, policy lookup, security policy enforcement, NAT, and egress.
Packet enters the firewall through an ingress interface
Firewall performs policy lookup to determine if the packet should be allowed or denied
If allowed, the packet goes through security policy enforcement which includes threat prevention, URL filtering, etc.
NAT (Network Address Trans...
OSPF (Open Shortest Path First) is a routing protocol used to determine the best path for data packets in a network.
OSPF is a link-state routing protocol
It uses Dijkstra's algorithm to calculate the shortest path
OSPF routers exchange link-state advertisements (LSAs)
It supports VLSM (Variable Length Subnet Masking)
OSPF areas are used to divide large networks into smaller segments
DR and BDR in OSPF are elected based on priority values, with the highest priority becoming the DR and the second highest becoming the BDR.
DR and BDR are elected within the OSPF network to ensure efficient communication and redundancy.
The election process is based on priority values assigned to each router, with the highest priority becoming the DR and the second highest becoming the BDR.
If two routers have the same pr...
I applied via Naukri.com and was interviewed before Aug 2022. There were 3 interview rounds.
I applied via Naukri.com and was interviewed in Sep 2021. There were 3 interview rounds.
MPLS is a protocol used for efficient data transfer. DNS is a system that translates domain names to IP addresses. Subnetting is dividing a network into smaller subnetworks.
MPLS stands for Multiprotocol Label Switching and is used to route network traffic efficiently.
DNS stands for Domain Name System and is used to translate domain names to IP addresses.
Subnetting is the process of dividing a network into smaller subne...
IPv6 is the successor to IPv4, with larger address space, improved security, and better support for mobile devices.
IPv4 uses 32-bit addresses, while IPv6 uses 128-bit addresses
IPv6 has a hierarchical addressing structure, allowing for more efficient routing
IPv6 includes built-in security features, such as IPsec
IPv6 has better support for mobile devices, with features like mobile IP and flow labeling
Discuss Banking Network
I expect a competitive salary based on my experience, skills, and the responsibilities of the role.
Research the average salary range for Network Engineers in your area
Consider your level of experience and expertise
Factor in the job responsibilities and requirements
Be prepared to negotiate and discuss benefits
Example: I expect a salary in the range of $70,000 to $90,000 per year based on industry standards and my qualif
I am a highly skilled and experienced Network Engineer with a strong background in designing, implementing, and managing complex network infrastructures.
I have a Bachelor's degree in Computer Science and multiple certifications in networking technologies such as CCNA and CCNP.
I have worked for 5 years at XYZ Company, where I was responsible for maintaining and troubleshooting network systems for a large enterprise.
I ha...
I applied via Naukri.com and was interviewed in Aug 2022. There was 1 interview round.
Ethical hacking is a process of identifying vulnerabilities in a system to improve its security.
Ethical hacking involves using the same techniques as malicious hackers to identify vulnerabilities in a system.
The goal of ethical hacking is to improve the security of the system by fixing the identified vulnerabilities.
Ethical hackers must follow a strict code of ethics and obtain permission before conducting any hacking ...
based on 2 interviews
Interview experience
based on 6 reviews
Rating in categories
Consultant
317
salaries
| ₹4.3 L/yr - ₹18.1 L/yr |
Senior Consultant
241
salaries
| ₹9 L/yr - ₹28 L/yr |
Associate Consultant
208
salaries
| ₹2.2 L/yr - ₹10 L/yr |
Security Consultant
110
salaries
| ₹5.5 L/yr - ₹15.5 L/yr |
Lead Consultant
81
salaries
| ₹14.4 L/yr - ₹36 L/yr |
Paladion Networks
Kratikal Tech Private Limited
InstaSafe
Safe Security