Upload Button Icon Add office photos

Filter interviews by

BT Group Network Security Engineer Interview Questions, Process, and Tips

Updated 4 Aug 2024

Top BT Group Network Security Engineer Interview Questions and Answers

  • Q1. How to configure firewall from scratch and what will the first step thta we have to follow ?
  • Q2. In Paloalto firewall if cluster failure occur then which log would tou have to check ?
  • Q3. How many logs type we have in monitor tab in panorama?
View all 14 questions

BT Group Network Security Engineer Interview Experiences

4 interviews found

Interview experience
5
Excellent
Difficulty level
-
Process Duration
-
Result
-
Round 1 - One-on-one 

(2 Questions)

  • Q1. What is asp packet capture
  • Ans. 

    ASP packet capture is a method of capturing and analyzing network traffic to identify potential security threats.

    • ASP stands for Application Service Provider.

    • Packet capture involves capturing data packets as they travel across a network.

    • ASP packet capture helps in monitoring network traffic for security purposes.

    • Tools like Wireshark can be used for ASP packet capture.

  • Answered by AI
  • Q2. Explain Vlan and its types
  • Ans. 

    VLAN stands for Virtual Local Area Network. It is a network technology that allows for segmentation of a single physical network into multiple virtual networks.

    • VLANs help in improving network security by isolating traffic between different departments or groups.

    • There are two main types of VLANs: Port-based VLANs and Tag-based VLANs.

    • Port-based VLANs assign ports on a switch to different VLANs, while Tag-based VLANs use ...

  • Answered by AI

Skills evaluated in this interview

Interview experience
5
Excellent
Difficulty level
-
Process Duration
-
Result
-
Round 1 - Technical 

(2 Questions)

  • Q1. Packet flow of ASA/FTD
  • Ans. 

    Packet flow of ASA/FTD involves ingress, inspection, and egress stages.

    • Ingress stage: Packet enters the ASA/FTD device through an interface.

    • Inspection stage: Packet is inspected by access control policies, NAT rules, and VPN configurations.

    • Egress stage: Packet exits the ASA/FTD device through an interface towards its destination.

    • Example: Ingress - packet enters ASA/FTD through outside interface, Inspection - packet is ...

  • Answered by AI
  • Q2. SSl handshake explaination
  • Ans. 

    SSL handshake is a process where a client and server establish a secure connection by exchanging encryption keys and verifying identities.

    • Client sends a request to the server to initiate the handshake

    • Server responds with its digital certificate

    • Client verifies the certificate and generates a pre-master secret

    • Both parties exchange encrypted messages using the pre-master secret to establish a secure connection

  • Answered by AI

Skills evaluated in this interview

Network Security Engineer Interview Questions Asked at Other Companies

Q1. which protocols are used in transport layer of the OSI model?
asked in AT&T
Q2. What is difference between phase of site to site vpn?
Q3. What is Network Protocols Like FTP, SSH, SSL, RDP, HTTPS....
Q4. Tell me about something your last troubleshooting in a network se ... read more
asked in BT Group
Q5. How to configure firewall from scratch and what will the first st ... read more
Interview experience
3
Average
Difficulty level
-
Process Duration
Less than 2 weeks
Result
No response

I applied via Recruitment Consulltant and was interviewed in Sep 2023. There were 2 interview rounds.

Round 1 - Resume Shortlist 
Pro Tip by AmbitionBox:
Keep your resume crisp and to the point. A recruiter looks at your resume for an average of 6 seconds, make sure to leave the best impression.
View all tips
Round 2 - Technical 

(8 Questions)

  • Q1. What is Application override ?
  • Ans. 

    Application override is a feature in network security that allows certain applications to bypass security policies.

    • Application override allows specific applications to bypass firewall rules or other security measures.

    • It is typically used for critical applications that may be blocked by default security settings.

    • Administrators can configure application override rules to allow certain traffic to pass through the network ...

  • Answered by AI
  • Q2. What is inside the session table ?
  • Ans. 

    The session table typically stores information about active network connections and their associated details.

    • Contains information such as source and destination IP addresses

    • Stores port numbers being used in the connection

    • Tracks the protocol being used (e.g. TCP, UDP)

    • May include timestamps for when the connection was established and last active

  • Answered by AI
  • Q3. What is HA3 belongs to and work?
  • Ans. 

    HA3 belongs to HMAC (Hash-based Message Authentication Code) and is used for secure authentication and integrity verification.

    • HA3 stands for Hash-based Message Authentication Code 3

    • It is used in cryptographic hash functions for secure authentication and integrity verification

    • HA3 is commonly used in network security protocols such as TLS (Transport Layer Security) and IPsec (Internet Protocol Security)

  • Answered by AI
  • Q4. In Paloalto firewall if cluster failure occur then which log would tou have to check ?
  • Ans. 

    Check the system logs for cluster failure in Paloalto firewall.

    • Check the system logs for any error messages related to cluster failure

    • Look for logs indicating cluster synchronization issues

    • Review logs for any hardware or software failures in the cluster

  • Answered by AI
  • Q5. What is Heart Beat link ?
  • Ans. 

    Heart Beat link is a feature in network security that ensures continuous communication between devices.

    • Heart Beat link is a mechanism used to maintain a connection between two devices by sending periodic signals.

    • It helps in detecting if a device is still active and reachable on the network.

    • If the Heart Beat link fails, it can trigger alerts or actions to address the issue.

    • Example: In a VPN connection, Heart Beat link c...

  • Answered by AI
  • Q6. How many logs type we have in monitor tab in panorama?
  • Ans. 

    There are four types of logs in the monitor tab in Panorama.

    • Traffic logs

    • Threat logs

    • URL logs

    • Data logs

  • Answered by AI
  • Q7. How to configure firewall from scratch and what will the first step thta we have to follow ?
  • Ans. 

    To configure a firewall from scratch, the first step is to define the security policy.

    • Define the security policy based on the organization's requirements and compliance standards

    • Identify the network topology and determine the zones that need to be protected

    • Select the appropriate firewall hardware or software based on the requirements

    • Configure the firewall rules to allow or deny traffic based on the security policy

    • Test ...

  • Answered by AI
  • Q8. What is statefull means ?
  • Ans. 

    Stateful means the system or device keeps track of the state of active connections and can differentiate between different connections.

    • Stateful devices maintain information about the state of active connections

    • They can differentiate between different connections based on various parameters

    • Stateful firewalls keep track of the state of network connections to make decisions on allowing or blocking traffic

  • Answered by AI

Skills evaluated in this interview

Interview experience
5
Excellent
Difficulty level
Hard
Process Duration
-
Result
Selected Selected

I applied via LinkedIn and was interviewed before Jul 2023. There was 1 interview round.

Round 1 - Technical 

(2 Questions)

  • Q1. What are the phase of a vpn
  • Ans. 

    The phases of a VPN include initiation, negotiation, data transfer, and termination.

    • Initiation phase involves establishing a connection between the client and server.

    • Negotiation phase involves agreeing on encryption algorithms and keys.

    • Data transfer phase is when actual data is transmitted securely.

    • Termination phase involves closing the connection.

    • Examples: IKEv2 VPN protocol follows these phases.

  • Answered by AI
  • Q2. What is the difference between a firewall and a next generation firewall
  • Ans. 

    A firewall filters traffic based on predetermined rules, while a next generation firewall includes additional features like intrusion prevention and application awareness.

    • Firewall filters traffic based on IP addresses and ports

    • Next generation firewall includes intrusion prevention, application awareness, and deep packet inspection

    • NGFW can identify and block advanced threats like malware and ransomware

    • NGFW can provide m

  • Answered by AI

Interview Preparation Tips

Interview preparation tips for other job seekers - Study the JD

Skills evaluated in this interview

BT Group interview questions for designations

 Network Security Lead

 (1)

 Network Engineer

 (9)

 Senior Network Engineer

 (2)

 Associate Network Engineer

 (1)

 Security Analyst

 (1)

 Network Design Professional

 (2)

 Associate Network Consultant

 (1)

 Software Engineer

 (4)

Interview questions from similar companies

Interview experience
5
Excellent
Difficulty level
Hard
Process Duration
Less than 2 weeks
Result
Not Selected

I applied via Naukri.com and was interviewed in Jul 2024. There was 1 interview round.

Round 1 - Technical 

(3 Questions)

  • Q1. What are the information in TCP IP Header?
  • Ans. 

    TCP IP Header contains information such as source and destination IP addresses, port numbers, sequence numbers, and more.

    • Source IP address

    • Destination IP address

    • Source port number

    • Destination port number

    • Sequence number

    • Acknowledgment number

    • Header length

    • Checksum

  • Answered by AI
  • Q2. What is App ID in Palo Alto Firewalls?
  • Ans. 

    App ID in Palo Alto Firewalls is a feature that identifies applications on the network based on various parameters.

    • App ID uses multiple methods to identify applications, including port-based, protocol-based, and application signature-based identification.

    • It allows administrators to create policies based on specific applications rather than just ports or protocols.

    • App ID helps in enhancing security by allowing granular ...

  • Answered by AI
  • Q3. What is the SP3 Architecture of Palo Alto Firewalls?
  • Ans. 

    SP3 Architecture of Palo Alto Firewalls refers to Security Processing Plane, Control Plane, and Data Plane.

    • SP3 Architecture consists of Security Processing Plane (SP), Control Plane (C), and Data Plane (D)

    • Security Processing Plane (SP) handles security functions like threat prevention and decryption

    • Control Plane (C) manages routing and firewall policies

    • Data Plane (D) processes and forwards traffic based on firewall pol...

  • Answered by AI

Interview Preparation Tips

Interview preparation tips for other job seekers - Very Technical questions, starting from packet parsing and analysis.

Skills evaluated in this interview

Interview experience
3
Average
Difficulty level
Moderate
Process Duration
Less than 2 weeks
Result
Selected Selected

I applied via Recruitment Consulltant and was interviewed before Apr 2023. There was 1 interview round.

Round 1 - Technical 

(2 Questions)

  • Q1. Basics of networking
  • Q2. 3 tier architecture

I applied via Naukri.com and was interviewed in Apr 2021. There were 3 interview rounds.

Interview Questionnaire 

1 Question

  • Q1. I was hired for Palo Alto and Cisco ASA firewall. but later i got the project in DXC related to Palo alto, checkpoint and Fortinet firewalls. questions were related to Palo alto only related to code upgrad...

Interview Preparation Tips

Interview preparation tips for other job seekers - basic palo alto FW questions
Interview experience
4
Good
Difficulty level
-
Process Duration
-
Result
-
Round 1 - Technical 

(1 Question)

  • Q1. Palo Alto, Fortigate, Checkpoint, Cisco ASA, FTD, ISE
Round 2 - One-on-one 

(1 Question)

  • Q1. Management round
Round 3 - HR 

(1 Question)

  • Q1. Salary discussion

I applied via LinkedIn and was interviewed in Jan 2021. There were 3 interview rounds.

Interview Questionnaire 

1 Question

  • Q1. 1. Intro 2. Past experience (mine is 5 years) 3. what the technologies you worked on 4.they generally ask you the same questions in which your resume is updated

Interview Preparation Tips

Interview preparation tips for other job seekers - Be confident and prepare for all the topics you listed in ur resume.
Interview experience
4
Good
Difficulty level
Moderate
Process Duration
6-8 weeks
Result
Selected Selected

I applied via campus placement at K.C. College of Management Studies, Mumbai and was interviewed before Aug 2023. There were 2 interview rounds.

Round 1 - HR 

(2 Questions)

  • Q1. Tell me about yourself
  • Ans. 

    I am a dedicated Network Security Engineer with 5+ years of experience in designing and implementing secure network solutions.

    • Experienced in firewall configuration and management

    • Skilled in intrusion detection and prevention systems

    • Proficient in network monitoring and analysis

    • Certified in network security (e.g. CISSP, CCNA Security)

  • Answered by AI
  • Q2. Where do you see yourself in 5 years
  • Ans. 

    In 5 years, I see myself as a senior Network Security Engineer leading a team of professionals and implementing cutting-edge security solutions.

    • Leading a team of network security professionals

    • Implementing advanced security solutions

    • Continuing professional development and certifications

    • Contributing to the organization's strategic security initiatives

  • Answered by AI
Round 2 - Technical 

(2 Questions)

  • Q1. Tell me about your final year or any project you have made.l?
  • Ans. 

    Developed a network intrusion detection system using machine learning algorithms.

    • Researched various machine learning algorithms suitable for network security

    • Implemented a prototype using Python and scikit-learn library

    • Tested the system on a simulated network environment

    • Achieved an accuracy rate of 90% in detecting malicious network traffic

  • Answered by AI
  • Q2. Scenarios given, need to give observation

BT Group Interview FAQs

How many rounds are there in BT Group Network Security Engineer interview?
BT Group interview process usually has 1-2 rounds. The most common rounds in the BT Group interview process are Technical, Resume Shortlist and One-on-one Round.
How to prepare for BT Group Network Security Engineer interview?
Go through your CV in detail and study all the technologies mentioned in your CV. Prepare at least two technologies or languages in depth if you are appearing for a technical interview at BT Group. The most common topics and skills that interviewers at BT Group expect are Network Security, F5, cisco, Checkpoint Firewall and Cisco ASA.
What are the top questions asked in BT Group Network Security Engineer interview?

Some of the top questions asked at the BT Group Network Security Engineer interview -

  1. How to configure firewall from scratch and what will the first step thta we hav...read more
  2. In Paloalto firewall if cluster failure occur then which log would tou have to ...read more
  3. How many logs type we have in monitor tab in panora...read more

Tell us how to improve this page.

BT Group Network Security Engineer Interview Process

based on 4 interviews

Interview experience

4.5
  
Good
View more
BT Group Network Security Engineer Salary
based on 41 salaries
₹4.5 L/yr - ₹17.5 L/yr
35% more than the average Network Security Engineer Salary in India
View more details

BT Group Network Security Engineer Reviews and Ratings

based on 6 reviews

3.4/5

Rating in categories

3.2

Skill development

3.2

Work-life balance

2.8

Salary

3.2

Job security

3.2

Company culture

3.2

Promotions

3.2

Work satisfaction

Explore 6 Reviews and Ratings
Associate
282 salaries
unlock blur

₹2 L/yr - ₹6.3 L/yr

Associate Engineer
275 salaries
unlock blur

₹2.8 L/yr - ₹8 L/yr

Financial Analyst
254 salaries
unlock blur

₹6.8 L/yr - ₹23 L/yr

Project Manager
232 salaries
unlock blur

₹7.1 L/yr - ₹25 L/yr

Network Engineer
204 salaries
unlock blur

₹2.7 L/yr - ₹9 L/yr

Explore more salaries
Compare BT Group with

Vodafone Idea

4.1
Compare

Bharti Airtel

4.0
Compare

Jio

3.9
Compare

Tata Communications

4.0
Compare
Did you find this page helpful?
Yes No
write
Share an Interview