i
Filter interviews by
I applied via Naukri.com and was interviewed in Aug 2023. There were 2 interview rounds.
Nessus security tool provides vulnerability scanning and assessment capabilities for network security.
Nessus can scan networks for vulnerabilities and provide detailed reports on security issues.
It can identify misconfigurations, missing patches, and potential security threats.
Nessus can prioritize vulnerabilities based on severity to help organizations focus on critical issues first.
Privilege in Windows and Linux refers to the level of access and control a user or process has over system resources.
Privilege levels in Windows are typically categorized as Administrator, Standard User, and Guest.
In Linux, privilege levels are determined by user accounts and groups, with root being the highest level of privilege.
Windows uses User Account Control (UAC) to manage privileges and prevent unauthorized chan...
Port 443 is used for secure HTTP (HTTPS) communication over the internet.
Port 443 is the default port for HTTPS traffic, which encrypts data using SSL/TLS protocols.
It is commonly used for secure communication between web browsers and servers.
HTTPS ensures that data transmitted over the internet is encrypted and secure.
Many websites, such as online banking and e-commerce sites, use port 443 to protect sensitive informa
A firewall is a network security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules.
Acts as a barrier between a trusted internal network and untrusted external network
Can be hardware-based or software-based
Filters traffic based on IP addresses, ports, protocols, and other criteria
Examples include Cisco ASA, Palo Alto Networks, and pfSense
Top trending discussions
I applied via Naukri.com and was interviewed before Aug 2022. There were 3 interview rounds.
I applied via Naukri.com and was interviewed in Jan 2024. There was 1 interview round.
Packet flow in Palo Alto Firewall involves multiple stages including ingress, policy lookup, security policy enforcement, NAT, and egress.
Packet enters the firewall through an ingress interface
Firewall performs policy lookup to determine if the packet should be allowed or denied
If allowed, the packet goes through security policy enforcement which includes threat prevention, URL filtering, etc.
NAT (Network Address Trans...
OSPF (Open Shortest Path First) is a routing protocol used to determine the best path for data packets in a network.
OSPF is a link-state routing protocol
It uses Dijkstra's algorithm to calculate the shortest path
OSPF routers exchange link-state advertisements (LSAs)
It supports VLSM (Variable Length Subnet Masking)
OSPF areas are used to divide large networks into smaller segments
DR and BDR in OSPF are elected based on priority values, with the highest priority becoming the DR and the second highest becoming the BDR.
DR and BDR are elected within the OSPF network to ensure efficient communication and redundancy.
The election process is based on priority values assigned to each router, with the highest priority becoming the DR and the second highest becoming the BDR.
If two routers have the same pr...
posted on 4 Mar 2024
I was interviewed before Mar 2023.
posted on 8 Feb 2022
I applied via LinkedIn and was interviewed in Jan 2022. There were 5 interview rounds.
I expect in salary up to 2 lakhas
My family background is 3 mamber me, mather and sister, father is death
wingsnet global experience in router configurations, swintch configurations, d link swintch and cisco swintch experience in commands in good experience in this company
I do not have good network experience and I will do proper work in your company and complete the work in time.
In that company I have future in long time and I will have sort time future in your company and I will get more education in your company.
I would like to see in the post of Good Network Engineer and Sr. in five years.
I complete good work and time work in my strength and I have no weakness
Computer engeenering
Router configurations involve setting up and managing network devices to ensure efficient and secure communication.
Router configurations involve configuring IP addresses, subnet masks, and default gateways.
Setting up access control lists (ACLs) to control network traffic.
Enabling routing protocols such as OSPF or BGP for dynamic routing.
Configuring NAT (Network Address Translation) to allow private IP addresses to acce...
posted on 16 Feb 2024
I applied via Recruitment Consulltant and was interviewed in Jan 2024. There was 1 interview round.
I applied via Approached by Company and was interviewed in Jun 2022. There was 1 interview round.
I applied via Naukri.com and was interviewed before Aug 2022. There were 3 interview rounds.
posted on 26 Jan 2024
I applied via Recruitment Consulltant and was interviewed before Jan 2023. There was 1 interview round.
Interview experience
Consultant
329
salaries
| ₹4.3 L/yr - ₹15 L/yr |
Senior Consultant
236
salaries
| ₹9 L/yr - ₹28 L/yr |
Associate Consultant
218
salaries
| ₹2.2 L/yr - ₹10.1 L/yr |
Security Consultant
102
salaries
| ₹5 L/yr - ₹13.3 L/yr |
Lead Consultant
79
salaries
| ₹14.4 L/yr - ₹36 L/yr |
Paladion Networks
Kratikal Tech Private Limited
InstaSafe
Safe Security