i
Filter interviews by
I applied via Recruitment Consulltant and was interviewed in Nov 2023. There were 5 interview rounds.
I applied via LinkedIn and was interviewed in Mar 2023. There were 2 interview rounds.
Blind SQL Injection is a type of SQL Injection attack where the attacker does not receive any output from the application.
The attacker sends SQL queries to the application and observes the behavior of the application to determine if the query was successful or not.
Blind SQL Injection can be time-based or boolean-based.
Time-based Blind SQL Injection involves sending a query that will cause a delay in the application's r...
PE and IDOR are both vulnerabilities in web applications, but they differ in their nature and impact.
PE (Parameter Tampering) is a vulnerability where an attacker can modify parameters in a request to bypass security controls or gain unauthorized access.
IDOR (Insecure Direct Object Reference) is a vulnerability where an attacker can access or manipulate data by directly referencing an object without proper authorizatio...
Top trending discussions
I applied via Approached by Company and was interviewed in Oct 2024. There was 1 interview round.
Wireless refers to the transmission of data without the use of physical cables or wires.
Wireless technology uses radio waves to transmit data over a network.
Examples of wireless technology include Wi-Fi, Bluetooth, and cellular networks.
Wireless networks are convenient for mobile devices and allow for greater flexibility in connectivity.
Switch congestion occurs when a network switch is overwhelmed with traffic, leading to delays or dropped packets.
Switch congestion can occur when there is a high volume of data being transmitted through the switch
It can lead to delays in data transmission or even dropped packets
Switch congestion can be alleviated by implementing Quality of Service (QoS) policies or upgrading to higher capacity switches
Wireless device configuration involves setting up and managing wireless networks for optimal performance.
Understand the network requirements and goals
Select appropriate wireless devices and access points
Configure SSIDs, security settings, and encryption protocols
Optimize placement of access points for coverage and performance
Monitor and troubleshoot network performance
I applied via Walk-in and was interviewed in Feb 2024. There were 2 interview rounds.
Basic question like as time ditance
Basic of dsa sql dbms
posted on 4 Mar 2024
I was interviewed before Mar 2023.
I applied via Naukri.com and was interviewed in Jan 2024. There was 1 interview round.
Packet flow in Palo Alto Firewall involves multiple stages including ingress, policy lookup, security policy enforcement, NAT, and egress.
Packet enters the firewall through an ingress interface
Firewall performs policy lookup to determine if the packet should be allowed or denied
If allowed, the packet goes through security policy enforcement which includes threat prevention, URL filtering, etc.
NAT (Network Address Trans...
OSPF (Open Shortest Path First) is a routing protocol used to determine the best path for data packets in a network.
OSPF is a link-state routing protocol
It uses Dijkstra's algorithm to calculate the shortest path
OSPF routers exchange link-state advertisements (LSAs)
It supports VLSM (Variable Length Subnet Masking)
OSPF areas are used to divide large networks into smaller segments
DR and BDR in OSPF are elected based on priority values, with the highest priority becoming the DR and the second highest becoming the BDR.
DR and BDR are elected within the OSPF network to ensure efficient communication and redundancy.
The election process is based on priority values assigned to each router, with the highest priority becoming the DR and the second highest becoming the BDR.
If two routers have the same pr...
I applied via Recruitment Consulltant and was interviewed in Jul 2023. There were 3 interview rounds.
English , GK, arithmetic
Device bias can lead to improved performance, efficiency, and user experience in network engineering.
Device bias can result in optimized network traffic routing, leading to faster data transmission.
It can enhance security measures by prioritizing certain devices for access control and monitoring.
Device bias can improve overall network stability and reliability by allocating resources more effectively.
For example, imple...
based on 2 interviews
Interview experience
based on 6 reviews
Rating in categories
Consultant
319
salaries
| ₹4.3 L/yr - ₹17.4 L/yr |
Senior Consultant
239
salaries
| ₹9 L/yr - ₹28 L/yr |
Associate Consultant
207
salaries
| ₹2.2 L/yr - ₹10.2 L/yr |
Security Consultant
110
salaries
| ₹5.5 L/yr - ₹15.5 L/yr |
Lead Consultant
84
salaries
| ₹14.4 L/yr - ₹36 L/yr |
Paladion Networks
Kratikal Tech Private Limited
InstaSafe
Safe Security