Upload Button Icon Add office photos
Premium Employer

i

This company page is being actively managed by BT Group Team. If you also belong to the team, you can get access from here

BT Group

Compare button icon Compare button icon Compare

Filter interviews by

Clear (1)

BT Group Network Security Engineer Interview Questions, Process, and Tips

Updated 4 Aug 2024

Top BT Group Network Security Engineer Interview Questions and Answers

  • Q1. How to configure firewall from scratch and what will the first step thta we have to follow ?
  • Q2. In Paloalto firewall if cluster failure occur then which log would tou have to check ?
  • Q3. How many logs type we have in monitor tab in panorama?
View all 14 questions

BT Group Network Security Engineer Interview Experiences

4 interviews found

Interview experience
5
Excellent
Difficulty level
-
Process Duration
-
Result
-
Round 1 - One-on-one 

(2 Questions)

  • Q1. What is asp packet capture
  • Ans. 

    ASP packet capture is a method of capturing and analyzing network traffic to identify potential security threats.

    • ASP stands for Application Service Provider.

    • Packet capture involves capturing data packets as they travel across a network.

    • ASP packet capture helps in monitoring network traffic for security purposes.

    • Tools like Wireshark can be used for ASP packet capture.

  • Answered by AI
  • Q2. Explain Vlan and its types
  • Ans. 

    VLAN stands for Virtual Local Area Network. It is a network technology that allows for segmentation of a single physical network into multiple virtual networks.

    • VLANs help in improving network security by isolating traffic between different departments or groups.

    • There are two main types of VLANs: Port-based VLANs and Tag-based VLANs.

    • Port-based VLANs assign ports on a switch to different VLANs, while Tag-based VLANs use ...

  • Answered by AI

Skills evaluated in this interview

Interview experience
5
Excellent
Difficulty level
-
Process Duration
-
Result
-
Round 1 - Technical 

(2 Questions)

  • Q1. Packet flow of ASA/FTD
  • Ans. 

    Packet flow of ASA/FTD involves ingress, inspection, and egress stages.

    • Ingress stage: Packet enters the ASA/FTD device through an interface.

    • Inspection stage: Packet is inspected by access control policies, NAT rules, and VPN configurations.

    • Egress stage: Packet exits the ASA/FTD device through an interface towards its destination.

    • Example: Ingress - packet enters ASA/FTD through outside interface, Inspection - packet is ...

  • Answered by AI
  • Q2. SSl handshake explaination
  • Ans. 

    SSL handshake is a process where a client and server establish a secure connection by exchanging encryption keys and verifying identities.

    • Client sends a request to the server to initiate the handshake

    • Server responds with its digital certificate

    • Client verifies the certificate and generates a pre-master secret

    • Both parties exchange encrypted messages using the pre-master secret to establish a secure connection

  • Answered by AI

Skills evaluated in this interview

Network Security Engineer Interview Questions Asked at Other Companies

Q1. which protocols are used in transport layer of the OSI model?
asked in AT&T
Q2. What is difference between phase of site to site vpn?
Q3. What is Network Protocols Like FTP, SSH, SSL, RDP, HTTPS....
Q4. Tell me about something your last troubleshooting in a network se ... read more
asked in BT Group
Q5. How to configure firewall from scratch and what will the first st ... read more
Interview experience
3
Average
Difficulty level
-
Process Duration
Less than 2 weeks
Result
No response

I applied via Recruitment Consulltant and was interviewed in Sep 2023. There were 2 interview rounds.

Round 1 - Resume Shortlist 
Pro Tip by AmbitionBox:
Keep your resume crisp and to the point. A recruiter looks at your resume for an average of 6 seconds, make sure to leave the best impression.
View all Resume tips
Round 2 - Technical 

(8 Questions)

  • Q1. What is Application override ?
  • Ans. 

    Application override is a feature in network security that allows certain applications to bypass security policies.

    • Application override allows specific applications to bypass firewall rules or other security measures.

    • It is typically used for critical applications that may be blocked by default security settings.

    • Administrators can configure application override rules to allow certain traffic to pass through the network ...

  • Answered by AI
  • Q2. What is inside the session table ?
  • Ans. 

    The session table typically stores information about active network connections and their associated details.

    • Contains information such as source and destination IP addresses

    • Stores port numbers being used in the connection

    • Tracks the protocol being used (e.g. TCP, UDP)

    • May include timestamps for when the connection was established and last active

  • Answered by AI
  • Q3. What is HA3 belongs to and work?
  • Ans. 

    HA3 belongs to HMAC (Hash-based Message Authentication Code) and is used for secure authentication and integrity verification.

    • HA3 stands for Hash-based Message Authentication Code 3

    • It is used in cryptographic hash functions for secure authentication and integrity verification

    • HA3 is commonly used in network security protocols such as TLS (Transport Layer Security) and IPsec (Internet Protocol Security)

  • Answered by AI
  • Q4. In Paloalto firewall if cluster failure occur then which log would tou have to check ?
  • Ans. 

    Check the system logs for cluster failure in Paloalto firewall.

    • Check the system logs for any error messages related to cluster failure

    • Look for logs indicating cluster synchronization issues

    • Review logs for any hardware or software failures in the cluster

  • Answered by AI
  • Q5. What is Heart Beat link ?
  • Ans. 

    Heart Beat link is a feature in network security that ensures continuous communication between devices.

    • Heart Beat link is a mechanism used to maintain a connection between two devices by sending periodic signals.

    • It helps in detecting if a device is still active and reachable on the network.

    • If the Heart Beat link fails, it can trigger alerts or actions to address the issue.

    • Example: In a VPN connection, Heart Beat link c...

  • Answered by AI
  • Q6. How many logs type we have in monitor tab in panorama?
  • Ans. 

    There are four types of logs in the monitor tab in Panorama.

    • Traffic logs

    • Threat logs

    • URL logs

    • Data logs

  • Answered by AI
  • Q7. How to configure firewall from scratch and what will the first step thta we have to follow ?
  • Ans. 

    To configure a firewall from scratch, the first step is to define the security policy.

    • Define the security policy based on the organization's requirements and compliance standards

    • Identify the network topology and determine the zones that need to be protected

    • Select the appropriate firewall hardware or software based on the requirements

    • Configure the firewall rules to allow or deny traffic based on the security policy

    • Test ...

  • Answered by AI
  • Q8. What is statefull means ?
  • Ans. 

    Stateful means the system or device keeps track of the state of active connections and can differentiate between different connections.

    • Stateful devices maintain information about the state of active connections

    • They can differentiate between different connections based on various parameters

    • Stateful firewalls keep track of the state of network connections to make decisions on allowing or blocking traffic

  • Answered by AI

Skills evaluated in this interview

Interview experience
5
Excellent
Difficulty level
Hard
Process Duration
-
Result
Selected Selected

I applied via LinkedIn and was interviewed before Jul 2023. There was 1 interview round.

Round 1 - Technical 

(2 Questions)

  • Q1. What are the phase of a vpn
  • Ans. 

    The phases of a VPN include initiation, negotiation, data transfer, and termination.

    • Initiation phase involves establishing a connection between the client and server.

    • Negotiation phase involves agreeing on encryption algorithms and keys.

    • Data transfer phase is when actual data is transmitted securely.

    • Termination phase involves closing the connection.

    • Examples: IKEv2 VPN protocol follows these phases.

  • Answered by AI
  • Q2. What is the difference between a firewall and a next generation firewall
  • Ans. 

    A firewall filters traffic based on predetermined rules, while a next generation firewall includes additional features like intrusion prevention and application awareness.

    • Firewall filters traffic based on IP addresses and ports

    • Next generation firewall includes intrusion prevention, application awareness, and deep packet inspection

    • NGFW can identify and block advanced threats like malware and ransomware

    • NGFW can provide m

  • Answered by AI

Interview Preparation Tips

Interview preparation tips for other job seekers - Study the JD

Skills evaluated in this interview

BT Group interview questions for designations

 Network Security Lead

 (1)

 Network Engineer

 (9)

 Security Engineer

 (1)

 Senior Network Engineer

 (2)

 Associate Network Engineer

 (1)

 Security Analyst

 (1)

 Network Design Professional

 (2)

 Associate Network Consultant

 (1)

Network Security Engineer Jobs at BT Group

View all

Interview questions from similar companies

I applied via Naukri.com and was interviewed in Mar 2022. There were 2 interview rounds.

Round 1 - Technical 

(1 Question)

  • Q1. Question related to networking
Round 2 - HR 

(1 Question)

  • Q1. What are your salary expectations?

Interview Preparation Tips

Interview preparation tips for other job seekers - Great place to work. Interview is good.
Interview experience
5
Excellent
Difficulty level
-
Process Duration
-
Result
-
Round 1 - Technical 

(1 Question)

  • Q1. Not Available, can't disclose
Round 2 - One-on-one 

(1 Question)

  • Q1. Not Available, can't disclose.
Interview experience
4
Good
Difficulty level
-
Process Duration
-
Result
-
Round 1 - Technical 

(2 Questions)

  • Q1. How to establish a VLAN
  • Ans. 

    VLANs are established by configuring network switches to group devices into separate virtual networks.

    • Access the switch's configuration interface

    • Create VLANs and assign ports to each VLAN

    • Configure VLAN trunks for inter-VLAN communication

    • Implement VLAN tagging if necessary

    • Test connectivity and ensure proper segregation

  • Answered by AI
  • Q2. How many OSI Layers
  • Ans. 

    There are 7 OSI layers in the OSI model.

    • There are 7 layers in the OSI (Open Systems Interconnection) model: Physical, Data Link, Network, Transport, Session, Presentation, and Application.

    • Each layer has specific functions and protocols that help in the communication process.

    • For example, the Physical layer deals with the physical connection between devices, while the Application layer is responsible for user interfaces

  • Answered by AI

Skills evaluated in this interview

Interview experience
4
Good
Difficulty level
Moderate
Process Duration
Less than 2 weeks
Result
Selected Selected

I applied via Naukri.com and was interviewed in May 2024. There were 2 interview rounds.

Round 1 - Technical 

(1 Question)

  • Q1. Only tech round, technical question based on network and security?
Round 2 - One-on-one 

(1 Question)

  • Q1. HR round only to check communication skills

Interview Preparation Tips

Interview preparation tips for other job seekers - prepare well and should have hands on experience.
Interview experience
5
Excellent
Difficulty level
Moderate
Process Duration
2-4 weeks
Result
Selected Selected

I applied via Naukri.com and was interviewed before Jun 2023. There were 2 interview rounds.

Round 1 - Technical 

(2 Questions)

  • Q1. Tell us about you?
  • Q2. Palo alto discussion
Round 2 - HR 

(2 Questions)

  • Q1. What is ctc in previous company
  • Q2. How much you want ctc
  • Ans. 

    I am looking for a competitive salary based on my experience and skills.

    • I am seeking a salary that is in line with industry standards for a Network Security Engineer position.

    • I am open to negotiation based on the overall compensation package offered by the company.

    • I value fair compensation for the level of responsibility and expertise required for this role.

  • Answered by AI

Interview Preparation Tips

Interview preparation tips for other job seekers - Good interview in both roimds

I applied via Naukri.com and was interviewed in Jul 2021. There was 1 interview round.

Interview Questionnaire 

1 Question

  • Q1. Palo alto packet flow , Virtual sys, how to upgrade paloalto firewall? Sp3 Architecture, source nat and destination nat , security policy , panorama , vpn tunnel , sequence no , three way handshake , glob...

Interview Preparation Tips

Interview preparation tips for other job seekers - I applied online and got shortlisted for the online interview. Interviewer was very good and he started from the basics and later he asked some difficult questions . All the question were specifically from paloalto firewall It was little difficult interview for me as I was not prepared.
Contribute & help others!
anonymous
You can choose to be anonymous

BT Group Interview FAQs

How many rounds are there in BT Group Network Security Engineer interview?
BT Group interview process usually has 1-2 rounds. The most common rounds in the BT Group interview process are Technical, Resume Shortlist and One-on-one Round.
How to prepare for BT Group Network Security Engineer interview?
Go through your CV in detail and study all the technologies mentioned in your CV. Prepare at least two technologies or languages in depth if you are appearing for a technical interview at BT Group. The most common topics and skills that interviewers at BT Group expect are Network Security, F5, cisco, Checkpoint Firewall and Cisco ASA.
What are the top questions asked in BT Group Network Security Engineer interview?

Some of the top questions asked at the BT Group Network Security Engineer interview -

  1. How to configure firewall from scratch and what will the first step thta we hav...read more
  2. In Paloalto firewall if cluster failure occur then which log would tou have to ...read more
  3. How many logs type we have in monitor tab in panora...read more

Recently Viewed

JOBS

Browse jobs

Discover jobs you love

COMPANY BENEFITS

KNR Constructions

20 benefits

COMPANY BENEFITS

IRB Infrastructure

60 benefits

COMPANY BENEFITS

Dilip Buildcon

304 benefits

COMPANY BENEFITS

Dilip Buildcon

304 benefits

SALARIES

AU Small Finance Bank

INTERVIEWS

Cisco

No Interviews

INTERVIEWS

BT Group

No Interviews

SALARIES

AU Small Finance Bank

INTERVIEWS

Cisco

No Interviews

Tell us how to improve this page.

BT Group Network Security Engineer Interview Process

based on 4 interviews

Interview experience

4.5
  
Good
View more
BT Group Network Security Engineer Salary
based on 42 salaries
₹4.5 L/yr - ₹17.5 L/yr
34% more than the average Network Security Engineer Salary in India
View more details

BT Group Network Security Engineer Reviews and Ratings

based on 6 reviews

3.4/5

Rating in categories

3.2

Skill development

3.2

Work-life balance

2.8

Salary

3.2

Job security

3.2

Company culture

3.2

Promotions

3.2

Work satisfaction

Explore 6 Reviews and Ratings
Network Security Engineer

Gurgaon / Gurugram

2-4 Yrs

₹ 4.84-6.4 LPA

Explore more jobs
Associate
324 salaries
unlock blur

₹0 L/yr - ₹0 L/yr

Associate Engineer
276 salaries
unlock blur

₹0 L/yr - ₹0 L/yr

Financial Analyst
254 salaries
unlock blur

₹0 L/yr - ₹0 L/yr

Project Manager
233 salaries
unlock blur

₹0 L/yr - ₹0 L/yr

Network Engineer
205 salaries
unlock blur

₹0 L/yr - ₹0 L/yr

Explore more salaries
Compare BT Group with

Vodafone Idea

4.1
Compare

Bharti Airtel

4.0
Compare

Jio

3.9
Compare

Tata Communications

4.0
Compare
Did you find this page helpful?
Yes No
write
Share an Interview