i
BT Group
Filter interviews by
Clear (1)
ASP packet capture is a method of capturing and analyzing network traffic to identify potential security threats.
ASP stands for Application Service Provider.
Packet capture involves capturing data packets as they travel across a network.
ASP packet capture helps in monitoring network traffic for security purposes.
Tools like Wireshark can be used for ASP packet capture.
VLAN stands for Virtual Local Area Network. It is a network technology that allows for segmentation of a single physical network into multiple virtual networks.
VLANs help in improving network security by isolating traffic between different departments or groups.
There are two main types of VLANs: Port-based VLANs and Tag-based VLANs.
Port-based VLANs assign ports on a switch to different VLANs, while Tag-based VLANs use ...
Packet flow of ASA/FTD involves ingress, inspection, and egress stages.
Ingress stage: Packet enters the ASA/FTD device through an interface.
Inspection stage: Packet is inspected by access control policies, NAT rules, and VPN configurations.
Egress stage: Packet exits the ASA/FTD device through an interface towards its destination.
Example: Ingress - packet enters ASA/FTD through outside interface, Inspection - packet is ...
SSL handshake is a process where a client and server establish a secure connection by exchanging encryption keys and verifying identities.
Client sends a request to the server to initiate the handshake
Server responds with its digital certificate
Client verifies the certificate and generates a pre-master secret
Both parties exchange encrypted messages using the pre-master secret to establish a secure connection
I applied via Recruitment Consulltant and was interviewed in Sep 2023. There were 2 interview rounds.
Application override is a feature in network security that allows certain applications to bypass security policies.
Application override allows specific applications to bypass firewall rules or other security measures.
It is typically used for critical applications that may be blocked by default security settings.
Administrators can configure application override rules to allow certain traffic to pass through the network ...
The session table typically stores information about active network connections and their associated details.
Contains information such as source and destination IP addresses
Stores port numbers being used in the connection
Tracks the protocol being used (e.g. TCP, UDP)
May include timestamps for when the connection was established and last active
HA3 belongs to HMAC (Hash-based Message Authentication Code) and is used for secure authentication and integrity verification.
HA3 stands for Hash-based Message Authentication Code 3
It is used in cryptographic hash functions for secure authentication and integrity verification
HA3 is commonly used in network security protocols such as TLS (Transport Layer Security) and IPsec (Internet Protocol Security)
Check the system logs for cluster failure in Paloalto firewall.
Check the system logs for any error messages related to cluster failure
Look for logs indicating cluster synchronization issues
Review logs for any hardware or software failures in the cluster
Heart Beat link is a feature in network security that ensures continuous communication between devices.
Heart Beat link is a mechanism used to maintain a connection between two devices by sending periodic signals.
It helps in detecting if a device is still active and reachable on the network.
If the Heart Beat link fails, it can trigger alerts or actions to address the issue.
Example: In a VPN connection, Heart Beat link c...
There are four types of logs in the monitor tab in Panorama.
Traffic logs
Threat logs
URL logs
Data logs
To configure a firewall from scratch, the first step is to define the security policy.
Define the security policy based on the organization's requirements and compliance standards
Identify the network topology and determine the zones that need to be protected
Select the appropriate firewall hardware or software based on the requirements
Configure the firewall rules to allow or deny traffic based on the security policy
Test ...
Stateful means the system or device keeps track of the state of active connections and can differentiate between different connections.
Stateful devices maintain information about the state of active connections
They can differentiate between different connections based on various parameters
Stateful firewalls keep track of the state of network connections to make decisions on allowing or blocking traffic
What people are saying about BT Group
I applied via LinkedIn and was interviewed before Jul 2023. There was 1 interview round.
The phases of a VPN include initiation, negotiation, data transfer, and termination.
Initiation phase involves establishing a connection between the client and server.
Negotiation phase involves agreeing on encryption algorithms and keys.
Data transfer phase is when actual data is transmitted securely.
Termination phase involves closing the connection.
Examples: IKEv2 VPN protocol follows these phases.
A firewall filters traffic based on predetermined rules, while a next generation firewall includes additional features like intrusion prevention and application awareness.
Firewall filters traffic based on IP addresses and ports
Next generation firewall includes intrusion prevention, application awareness, and deep packet inspection
NGFW can identify and block advanced threats like malware and ransomware
NGFW can provide m
BT Group interview questions for designations
I applied via Naukri.com and was interviewed in Mar 2022. There were 2 interview rounds.
VLANs are established by configuring network switches to group devices into separate virtual networks.
Access the switch's configuration interface
Create VLANs and assign ports to each VLAN
Configure VLAN trunks for inter-VLAN communication
Implement VLAN tagging if necessary
Test connectivity and ensure proper segregation
There are 7 OSI layers in the OSI model.
There are 7 layers in the OSI (Open Systems Interconnection) model: Physical, Data Link, Network, Transport, Session, Presentation, and Application.
Each layer has specific functions and protocols that help in the communication process.
For example, the Physical layer deals with the physical connection between devices, while the Application layer is responsible for user interfaces
posted on 3 Jun 2024
I applied via Naukri.com and was interviewed in May 2024. There were 2 interview rounds.
posted on 15 Jun 2024
I applied via Naukri.com and was interviewed before Jun 2023. There were 2 interview rounds.
I am looking for a competitive salary based on my experience and skills.
I am seeking a salary that is in line with industry standards for a Network Security Engineer position.
I am open to negotiation based on the overall compensation package offered by the company.
I value fair compensation for the level of responsibility and expertise required for this role.
I applied via Naukri.com and was interviewed in Jul 2021. There was 1 interview round.
Some of the top questions asked at the BT Group Network Security Engineer interview -
based on 4 interviews
Interview experience
based on 6 reviews
Rating in categories
Associate
324
salaries
| ₹0 L/yr - ₹0 L/yr |
Associate Engineer
276
salaries
| ₹0 L/yr - ₹0 L/yr |
Financial Analyst
254
salaries
| ₹0 L/yr - ₹0 L/yr |
Project Manager
233
salaries
| ₹0 L/yr - ₹0 L/yr |
Network Engineer
205
salaries
| ₹0 L/yr - ₹0 L/yr |
Vodafone Idea
Bharti Airtel
Jio
Tata Communications