Filter interviews by
ASP packet capture is a method of capturing and analyzing network traffic to identify potential security threats.
ASP stands for Application Service Provider.
Packet capture involves capturing data packets as they travel across a network.
ASP packet capture helps in monitoring network traffic for security purposes.
Tools like Wireshark can be used for ASP packet capture.
VLAN stands for Virtual Local Area Network. It is a network technology that allows for segmentation of a single physical network into multiple virtual networks.
VLANs help in improving network security by isolating traffic between different departments or groups.
There are two main types of VLANs: Port-based VLANs and Tag-based VLANs.
Port-based VLANs assign ports on a switch to different VLANs, while Tag-based VLANs use ...
Packet flow of ASA/FTD involves ingress, inspection, and egress stages.
Ingress stage: Packet enters the ASA/FTD device through an interface.
Inspection stage: Packet is inspected by access control policies, NAT rules, and VPN configurations.
Egress stage: Packet exits the ASA/FTD device through an interface towards its destination.
Example: Ingress - packet enters ASA/FTD through outside interface, Inspection - packet is ...
SSL handshake is a process where a client and server establish a secure connection by exchanging encryption keys and verifying identities.
Client sends a request to the server to initiate the handshake
Server responds with its digital certificate
Client verifies the certificate and generates a pre-master secret
Both parties exchange encrypted messages using the pre-master secret to establish a secure connection
I applied via Recruitment Consulltant and was interviewed in Sep 2023. There were 2 interview rounds.
Application override is a feature in network security that allows certain applications to bypass security policies.
Application override allows specific applications to bypass firewall rules or other security measures.
It is typically used for critical applications that may be blocked by default security settings.
Administrators can configure application override rules to allow certain traffic to pass through the network ...
The session table typically stores information about active network connections and their associated details.
Contains information such as source and destination IP addresses
Stores port numbers being used in the connection
Tracks the protocol being used (e.g. TCP, UDP)
May include timestamps for when the connection was established and last active
HA3 belongs to HMAC (Hash-based Message Authentication Code) and is used for secure authentication and integrity verification.
HA3 stands for Hash-based Message Authentication Code 3
It is used in cryptographic hash functions for secure authentication and integrity verification
HA3 is commonly used in network security protocols such as TLS (Transport Layer Security) and IPsec (Internet Protocol Security)
Check the system logs for cluster failure in Paloalto firewall.
Check the system logs for any error messages related to cluster failure
Look for logs indicating cluster synchronization issues
Review logs for any hardware or software failures in the cluster
Heart Beat link is a feature in network security that ensures continuous communication between devices.
Heart Beat link is a mechanism used to maintain a connection between two devices by sending periodic signals.
It helps in detecting if a device is still active and reachable on the network.
If the Heart Beat link fails, it can trigger alerts or actions to address the issue.
Example: In a VPN connection, Heart Beat link c...
There are four types of logs in the monitor tab in Panorama.
Traffic logs
Threat logs
URL logs
Data logs
To configure a firewall from scratch, the first step is to define the security policy.
Define the security policy based on the organization's requirements and compliance standards
Identify the network topology and determine the zones that need to be protected
Select the appropriate firewall hardware or software based on the requirements
Configure the firewall rules to allow or deny traffic based on the security policy
Test ...
Stateful means the system or device keeps track of the state of active connections and can differentiate between different connections.
Stateful devices maintain information about the state of active connections
They can differentiate between different connections based on various parameters
Stateful firewalls keep track of the state of network connections to make decisions on allowing or blocking traffic
I applied via LinkedIn and was interviewed before Jul 2023. There was 1 interview round.
The phases of a VPN include initiation, negotiation, data transfer, and termination.
Initiation phase involves establishing a connection between the client and server.
Negotiation phase involves agreeing on encryption algorithms and keys.
Data transfer phase is when actual data is transmitted securely.
Termination phase involves closing the connection.
Examples: IKEv2 VPN protocol follows these phases.
A firewall filters traffic based on predetermined rules, while a next generation firewall includes additional features like intrusion prevention and application awareness.
Firewall filters traffic based on IP addresses and ports
Next generation firewall includes intrusion prevention, application awareness, and deep packet inspection
NGFW can identify and block advanced threats like malware and ransomware
NGFW can provide m
BT Group interview questions for designations
Top trending discussions
I applied via Naukri.com and was interviewed in Jul 2024. There was 1 interview round.
TCP IP Header contains information such as source and destination IP addresses, port numbers, sequence numbers, and more.
Source IP address
Destination IP address
Source port number
Destination port number
Sequence number
Acknowledgment number
Header length
Checksum
App ID in Palo Alto Firewalls is a feature that identifies applications on the network based on various parameters.
App ID uses multiple methods to identify applications, including port-based, protocol-based, and application signature-based identification.
It allows administrators to create policies based on specific applications rather than just ports or protocols.
App ID helps in enhancing security by allowing granular ...
SP3 Architecture of Palo Alto Firewalls refers to Security Processing Plane, Control Plane, and Data Plane.
SP3 Architecture consists of Security Processing Plane (SP), Control Plane (C), and Data Plane (D)
Security Processing Plane (SP) handles security functions like threat prevention and decryption
Control Plane (C) manages routing and firewall policies
Data Plane (D) processes and forwards traffic based on firewall pol...
I applied via Recruitment Consulltant and was interviewed before Apr 2023. There was 1 interview round.
posted on 4 Oct 2021
I applied via Naukri.com and was interviewed in Apr 2021. There were 3 interview rounds.
posted on 18 Jul 2021
I applied via LinkedIn and was interviewed in Jan 2021. There were 3 interview rounds.
I applied via campus placement at K.C. College of Management Studies, Mumbai and was interviewed before Aug 2023. There were 2 interview rounds.
I am a dedicated Network Security Engineer with 5+ years of experience in designing and implementing secure network solutions.
Experienced in firewall configuration and management
Skilled in intrusion detection and prevention systems
Proficient in network monitoring and analysis
Certified in network security (e.g. CISSP, CCNA Security)
In 5 years, I see myself as a senior Network Security Engineer leading a team of professionals and implementing cutting-edge security solutions.
Leading a team of network security professionals
Implementing advanced security solutions
Continuing professional development and certifications
Contributing to the organization's strategic security initiatives
Developed a network intrusion detection system using machine learning algorithms.
Researched various machine learning algorithms suitable for network security
Implemented a prototype using Python and scikit-learn library
Tested the system on a simulated network environment
Achieved an accuracy rate of 90% in detecting malicious network traffic
Some of the top questions asked at the BT Group Network Security Engineer interview -
based on 4 interviews
Interview experience
based on 6 reviews
Rating in categories
Associate
282
salaries
| ₹2 L/yr - ₹6.3 L/yr |
Associate Engineer
275
salaries
| ₹2.8 L/yr - ₹8 L/yr |
Financial Analyst
254
salaries
| ₹6.8 L/yr - ₹23 L/yr |
Project Manager
232
salaries
| ₹7.1 L/yr - ₹25 L/yr |
Network Engineer
204
salaries
| ₹2.7 L/yr - ₹9 L/yr |
Vodafone Idea
Bharti Airtel
Jio
Tata Communications