i
BT
Group
Work with us
Filter interviews by
Packet flow of ASA/FTD involves ingress, inspection, and egress stages.
Ingress stage: Packet enters the ASA/FTD device through an interface.
Inspection stage: Packet is inspected by access control policies, NAT rules, and VPN configurations.
Egress stage: Packet exits the ASA/FTD device through an interface towards its destination.
Example: Ingress - packet enters ASA/FTD through outside interface, Inspection - packe...
ASP packet capture is a method of capturing and analyzing network traffic to identify potential security threats.
ASP stands for Application Service Provider.
Packet capture involves capturing data packets as they travel across a network.
ASP packet capture helps in monitoring network traffic for security purposes.
Tools like Wireshark can be used for ASP packet capture.
VLAN stands for Virtual Local Area Network. It is a network technology that allows for segmentation of a single physical network into multiple virtual networks.
VLANs help in improving network security by isolating traffic between different departments or groups.
There are two main types of VLANs: Port-based VLANs and Tag-based VLANs.
Port-based VLANs assign ports on a switch to different VLANs, while Tag-based VLANs...
The phases of a VPN include initiation, negotiation, data transfer, and termination.
Initiation phase involves establishing a connection between the client and server.
Negotiation phase involves agreeing on encryption algorithms and keys.
Data transfer phase is when actual data is transmitted securely.
Termination phase involves closing the connection.
Examples: IKEv2 VPN protocol follows these phases.
A firewall filters traffic based on predetermined rules, while a next generation firewall includes additional features like intrusion prevention and application awareness.
Firewall filters traffic based on IP addresses and ports
Next generation firewall includes intrusion prevention, application awareness, and deep packet inspection
NGFW can identify and block advanced threats like malware and ransomware
NGFW can prov...
Stateful means the system or device keeps track of the state of active connections and can differentiate between different connections.
Stateful devices maintain information about the state of active connections
They can differentiate between different connections based on various parameters
Stateful firewalls keep track of the state of network connections to make decisions on allowing or blocking traffic
The session table typically stores information about active network connections and their associated details.
Contains information such as source and destination IP addresses
Stores port numbers being used in the connection
Tracks the protocol being used (e.g. TCP, UDP)
May include timestamps for when the connection was established and last active
Heart Beat link is a feature in network security that ensures continuous communication between devices.
Heart Beat link is a mechanism used to maintain a connection between two devices by sending periodic signals.
It helps in detecting if a device is still active and reachable on the network.
If the Heart Beat link fails, it can trigger alerts or actions to address the issue.
Example: In a VPN connection, Heart Beat l...
Check the system logs for cluster failure in Paloalto firewall.
Check the system logs for any error messages related to cluster failure
Look for logs indicating cluster synchronization issues
Review logs for any hardware or software failures in the cluster
HA3 belongs to HMAC (Hash-based Message Authentication Code) and is used for secure authentication and integrity verification.
HA3 stands for Hash-based Message Authentication Code 3
It is used in cryptographic hash functions for secure authentication and integrity verification
HA3 is commonly used in network security protocols such as TLS (Transport Layer Security) and IPsec (Internet Protocol Security)
ASP packet capture is a method of capturing and analyzing network traffic to identify potential security threats.
ASP stands for Application Service Provider.
Packet capture involves capturing data packets as they travel across a network.
ASP packet capture helps in monitoring network traffic for security purposes.
Tools like Wireshark can be used for ASP packet capture.
VLAN stands for Virtual Local Area Network. It is a network technology that allows for segmentation of a single physical network into multiple virtual networks.
VLANs help in improving network security by isolating traffic between different departments or groups.
There are two main types of VLANs: Port-based VLANs and Tag-based VLANs.
Port-based VLANs assign ports on a switch to different VLANs, while Tag-based VLANs use ...
Packet flow of ASA/FTD involves ingress, inspection, and egress stages.
Ingress stage: Packet enters the ASA/FTD device through an interface.
Inspection stage: Packet is inspected by access control policies, NAT rules, and VPN configurations.
Egress stage: Packet exits the ASA/FTD device through an interface towards its destination.
Example: Ingress - packet enters ASA/FTD through outside interface, Inspection - packet is ...
SSL handshake is a process where a client and server establish a secure connection by exchanging encryption keys and verifying identities.
Client sends a request to the server to initiate the handshake
Server responds with its digital certificate
Client verifies the certificate and generates a pre-master secret
Both parties exchange encrypted messages using the pre-master secret to establish a secure connection
I applied via Recruitment Consulltant and was interviewed in Sep 2023. There were 2 interview rounds.
Application override is a feature in network security that allows certain applications to bypass security policies.
Application override allows specific applications to bypass firewall rules or other security measures.
It is typically used for critical applications that may be blocked by default security settings.
Administrators can configure application override rules to allow certain traffic to pass through the network ...
The session table typically stores information about active network connections and their associated details.
Contains information such as source and destination IP addresses
Stores port numbers being used in the connection
Tracks the protocol being used (e.g. TCP, UDP)
May include timestamps for when the connection was established and last active
HA3 belongs to HMAC (Hash-based Message Authentication Code) and is used for secure authentication and integrity verification.
HA3 stands for Hash-based Message Authentication Code 3
It is used in cryptographic hash functions for secure authentication and integrity verification
HA3 is commonly used in network security protocols such as TLS (Transport Layer Security) and IPsec (Internet Protocol Security)
Check the system logs for cluster failure in Paloalto firewall.
Check the system logs for any error messages related to cluster failure
Look for logs indicating cluster synchronization issues
Review logs for any hardware or software failures in the cluster
Heart Beat link is a feature in network security that ensures continuous communication between devices.
Heart Beat link is a mechanism used to maintain a connection between two devices by sending periodic signals.
It helps in detecting if a device is still active and reachable on the network.
If the Heart Beat link fails, it can trigger alerts or actions to address the issue.
Example: In a VPN connection, Heart Beat link c...
There are four types of logs in the monitor tab in Panorama.
Traffic logs
Threat logs
URL logs
Data logs
To configure a firewall from scratch, the first step is to define the security policy.
Define the security policy based on the organization's requirements and compliance standards
Identify the network topology and determine the zones that need to be protected
Select the appropriate firewall hardware or software based on the requirements
Configure the firewall rules to allow or deny traffic based on the security policy
Test ...
Stateful means the system or device keeps track of the state of active connections and can differentiate between different connections.
Stateful devices maintain information about the state of active connections
They can differentiate between different connections based on various parameters
Stateful firewalls keep track of the state of network connections to make decisions on allowing or blocking traffic
I applied via LinkedIn and was interviewed before Jul 2023. There was 1 interview round.
The phases of a VPN include initiation, negotiation, data transfer, and termination.
Initiation phase involves establishing a connection between the client and server.
Negotiation phase involves agreeing on encryption algorithms and keys.
Data transfer phase is when actual data is transmitted securely.
Termination phase involves closing the connection.
Examples: IKEv2 VPN protocol follows these phases.
A firewall filters traffic based on predetermined rules, while a next generation firewall includes additional features like intrusion prevention and application awareness.
Firewall filters traffic based on IP addresses and ports
Next generation firewall includes intrusion prevention, application awareness, and deep packet inspection
NGFW can identify and block advanced threats like malware and ransomware
NGFW can provide m...
Top trending discussions
posted on 15 Jun 2024
I applied via Naukri.com and was interviewed before Jun 2023. There were 2 interview rounds.
My previous CTC was competitive, reflecting my skills and experience in network security engineering.
My CTC included base salary, bonuses, and benefits.
For example, my base salary was aligned with industry standards for my role.
I also received performance bonuses based on project success.
Additionally, I had health benefits and retirement contributions.
I am looking for a competitive salary based on my experience and skills.
I am seeking a salary that is in line with industry standards for a Network Security Engineer position.
I am open to negotiation based on the overall compensation package offered by the company.
I value fair compensation for the level of responsibility and expertise required for this role.
posted on 3 Jun 2024
I applied via Naukri.com and was interviewed in May 2024. There were 2 interview rounds.
I appeared for an interview in Jan 2017.
I am a dedicated network engineer with 5 years of experience in designing, implementing, and troubleshooting complex network infrastructures.
Experienced in configuring routers, switches, firewalls, and load balancers
Skilled in network security protocols such as VPNs, ACLs, and IDS/IPS
Proficient in network monitoring tools like Wireshark and Nagios
Certified in Cisco CCNA and CCNP
OTDR stands for Optical Time Domain Reflectometer. It is a device used to test and troubleshoot fiber optic networks.
OTDR sends a pulse of light into the fiber and measures the time and strength of the reflected signal.
It can detect faults such as breaks, bends, and splices in the fiber.
OTDR can also measure the length of the fiber and the attenuation of the signal.
It is an essential tool for maintaining and repairing ...
I have a strong technical background, excellent problem-solving skills, and a proven track record of successfully implementing network solutions.
Extensive experience in designing, implementing, and managing complex network infrastructures
Strong knowledge of network protocols and technologies such as TCP/IP, VLANs, and routing protocols
Proven ability to troubleshoot network issues and implement effective solutions
Excell...
I appeared for an interview in Nov 2016.
Some of the top questions asked at the BT Group Network Security Engineer interview -
based on 4 interview experiences
Difficulty level
Duration
based on 8 reviews
Rating in categories
Associate Engineer
324
salaries
| ₹2.8 L/yr - ₹8 L/yr |
Associate
295
salaries
| ₹2.1 L/yr - ₹9.1 L/yr |
Financial Analyst
267
salaries
| ₹6.8 L/yr - ₹23 L/yr |
Project Manager
226
salaries
| ₹6 L/yr - ₹25 L/yr |
Network Engineer
196
salaries
| ₹2.7 L/yr - ₹7.8 L/yr |
Jio
Vodafone Idea
Bharti Airtel
Ericsson