i
Filter interviews by
Clear (1)
I applied via Naukri.com and was interviewed in Aug 2023. There were 2 interview rounds.
Nessus security tool provides vulnerability scanning and assessment capabilities for network security.
Nessus can scan networks for vulnerabilities and provide detailed reports on security issues.
It can identify misconfigurations, missing patches, and potential security threats.
Nessus can prioritize vulnerabilities based on severity to help organizations focus on critical issues first.
Privilege in Windows and Linux refers to the level of access and control a user or process has over system resources.
Privilege levels in Windows are typically categorized as Administrator, Standard User, and Guest.
In Linux, privilege levels are determined by user accounts and groups, with root being the highest level of privilege.
Windows uses User Account Control (UAC) to manage privileges and prevent unauthorized chan...
Port 443 is used for secure HTTP (HTTPS) communication over the internet.
Port 443 is the default port for HTTPS traffic, which encrypts data using SSL/TLS protocols.
It is commonly used for secure communication between web browsers and servers.
HTTPS ensures that data transmitted over the internet is encrypted and secure.
Many websites, such as online banking and e-commerce sites, use port 443 to protect sensitive informa
A firewall is a network security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules.
Acts as a barrier between a trusted internal network and untrusted external network
Can be hardware-based or software-based
Filters traffic based on IP addresses, ports, protocols, and other criteria
Examples include Cisco ASA, Palo Alto Networks, and pfSense
Top trending discussions
I applied via Naukri.com and was interviewed before Aug 2022. There were 3 interview rounds.
posted on 4 Jun 2020
I applied via LinkedIn and was interviewed in Jun 2023. There were 3 interview rounds.
Routing is the process of selecting the best path for network traffic to travel from one network to another.
Routing involves analyzing network topology and determining the most efficient path for data to travel
Routing protocols such as OSPF and BGP are used to exchange routing information between routers
Routing tables are used to store information about network destinations and the best path to reach them
Routing can be...
Subnetting is the process of dividing a network into smaller subnetworks.
Subnetting helps in efficient utilization of IP addresses
It improves network performance and security
Subnetting is done by borrowing bits from the host portion of an IP address
Example: 192.168.1.0/24 can be subnetted into 192.168.1.0/25 and 192.168.1.128/25
I applied via Company Website and was interviewed before Aug 2022. There were 2 interview rounds.
Subnetting is the process of dividing a network into smaller subnetworks to improve performance and security.
Subnetting involves creating multiple smaller networks within a larger network by dividing the IP address range.
It helps in reducing network congestion, improving security by isolating different departments or functions, and optimizing network performance.
Subnet masks are used to determine which part of an IP ad...
Routers connect multiple networks together, while switches connect devices within a single network.
Routers operate at the network layer (Layer 3) of the OSI model, while switches operate at the data link layer (Layer 2).
Routers use IP addresses to forward data between networks, while switches use MAC addresses to forward data within a network.
Routers are typically used to connect different networks, such as a home netw...
posted on 20 Sep 2020
I applied via Referral and was interviewed in Aug 2020. There were 4 interview rounds.
posted on 14 Sep 2023
I applied via Naukri.com and was interviewed before Sep 2022. There were 3 interview rounds.
I applied via Recruitment Consulltant and was interviewed in Jul 2023. There were 3 interview rounds.
English , GK, arithmetic
Device bias can lead to improved performance, efficiency, and user experience in network engineering.
Device bias can result in optimized network traffic routing, leading to faster data transmission.
It can enhance security measures by prioritizing certain devices for access control and monitoring.
Device bias can improve overall network stability and reliability by allocating resources more effectively.
For example, imple...
based on 1 interview
Interview experience
Consultant
339
salaries
| ₹0 L/yr - ₹0 L/yr |
Senior Consultant
244
salaries
| ₹0 L/yr - ₹0 L/yr |
Associate Consultant
207
salaries
| ₹0 L/yr - ₹0 L/yr |
Security Consultant
110
salaries
| ₹0 L/yr - ₹0 L/yr |
Lead Consultant
84
salaries
| ₹0 L/yr - ₹0 L/yr |
Paladion Networks
Kratikal Tech Private Limited
InstaSafe
Safe Security