Premium Employer

i

This company page is being actively managed by BT Group Team. If you also belong to the team, you can get access from here

BT Group Verified Tick Work with us arrow

Compare button icon Compare button icon Compare

Filter interviews by

BT Group Network Security Engineer Interview Questions and Answers

Updated 4 Aug 2024

13 Interview questions

A Network Security Engineer was asked 10mo ago
Q. Explain the packet flow of ASA/FTD.
Ans. 

Packet flow of ASA/FTD involves ingress, inspection, and egress stages.

  • Ingress stage: Packet enters the ASA/FTD device through an interface.

  • Inspection stage: Packet is inspected by access control policies, NAT rules, and VPN configurations.

  • Egress stage: Packet exits the ASA/FTD device through an interface towards its destination.

  • Example: Ingress - packet enters ASA/FTD through outside interface, Inspection - packe...

A Network Security Engineer was asked 11mo ago
Q. What is an ASP packet capture?
Ans. 

ASP packet capture is a method of capturing and analyzing network traffic to identify potential security threats.

  • ASP stands for Application Service Provider.

  • Packet capture involves capturing data packets as they travel across a network.

  • ASP packet capture helps in monitoring network traffic for security purposes.

  • Tools like Wireshark can be used for ASP packet capture.

Network Security Engineer Interview Questions Asked at Other Companies

Q1. Which protocols are used in the transport layer of the OSI model?
Q2. what are the types of firewalls ? what is a firewall and why is i ... read more
Q3. What is the diff between a vulnerability, a threat and a risk ? w ... read more
asked in AT&T
Q4. What is the difference between the phases of a site-to-site VPN?
Q5. What is Network Protocols Like FTP, SSH, SSL, RDP, HTTPS....
A Network Security Engineer was asked 11mo ago
Q. Explain VLAN and its types.
Ans. 

VLAN stands for Virtual Local Area Network. It is a network technology that allows for segmentation of a single physical network into multiple virtual networks.

  • VLANs help in improving network security by isolating traffic between different departments or groups.

  • There are two main types of VLANs: Port-based VLANs and Tag-based VLANs.

  • Port-based VLANs assign ports on a switch to different VLANs, while Tag-based VLANs...

A Network Security Engineer was asked 11mo ago
Q. What are the phases of a VPN?
Ans. 

The phases of a VPN include initiation, negotiation, data transfer, and termination.

  • Initiation phase involves establishing a connection between the client and server.

  • Negotiation phase involves agreeing on encryption algorithms and keys.

  • Data transfer phase is when actual data is transmitted securely.

  • Termination phase involves closing the connection.

  • Examples: IKEv2 VPN protocol follows these phases.

A Network Security Engineer was asked 11mo ago
Q. What is the difference between a firewall and a next-generation firewall?
Ans. 

A firewall filters traffic based on predetermined rules, while a next generation firewall includes additional features like intrusion prevention and application awareness.

  • Firewall filters traffic based on IP addresses and ports

  • Next generation firewall includes intrusion prevention, application awareness, and deep packet inspection

  • NGFW can identify and block advanced threats like malware and ransomware

  • NGFW can prov...

A Network Security Engineer was asked
Q. What does stateful mean?
Ans. 

Stateful means the system or device keeps track of the state of active connections and can differentiate between different connections.

  • Stateful devices maintain information about the state of active connections

  • They can differentiate between different connections based on various parameters

  • Stateful firewalls keep track of the state of network connections to make decisions on allowing or blocking traffic

A Network Security Engineer was asked
Q. What information is stored in a session table?
Ans. 

The session table typically stores information about active network connections and their associated details.

  • Contains information such as source and destination IP addresses

  • Stores port numbers being used in the connection

  • Tracks the protocol being used (e.g. TCP, UDP)

  • May include timestamps for when the connection was established and last active

Are these interview questions helpful?
A Network Security Engineer was asked
Q. What is Heartbeat link?
Ans. 

Heart Beat link is a feature in network security that ensures continuous communication between devices.

  • Heart Beat link is a mechanism used to maintain a connection between two devices by sending periodic signals.

  • It helps in detecting if a device is still active and reachable on the network.

  • If the Heart Beat link fails, it can trigger alerts or actions to address the issue.

  • Example: In a VPN connection, Heart Beat l...

A Network Security Engineer was asked
Q. In a Palo Alto firewall, if a cluster failure occurs, which logs would you check?
Ans. 

Check the system logs for cluster failure in Paloalto firewall.

  • Check the system logs for any error messages related to cluster failure

  • Look for logs indicating cluster synchronization issues

  • Review logs for any hardware or software failures in the cluster

A Network Security Engineer was asked
Q. What is HA3 and how does it work?
Ans. 

HA3 belongs to HMAC (Hash-based Message Authentication Code) and is used for secure authentication and integrity verification.

  • HA3 stands for Hash-based Message Authentication Code 3

  • It is used in cryptographic hash functions for secure authentication and integrity verification

  • HA3 is commonly used in network security protocols such as TLS (Transport Layer Security) and IPsec (Internet Protocol Security)

BT Group Network Security Engineer Interview Experiences

4 interviews found

Interview experience
5
Excellent
Difficulty level
-
Process Duration
-
Result
-
Round 1 - One-on-one 

(2 Questions)

  • Q1. What is asp packet capture
  • Ans. 

    ASP packet capture is a method of capturing and analyzing network traffic to identify potential security threats.

    • ASP stands for Application Service Provider.

    • Packet capture involves capturing data packets as they travel across a network.

    • ASP packet capture helps in monitoring network traffic for security purposes.

    • Tools like Wireshark can be used for ASP packet capture.

  • Answered by AI
  • Q2. Explain Vlan and its types
  • Ans. 

    VLAN stands for Virtual Local Area Network. It is a network technology that allows for segmentation of a single physical network into multiple virtual networks.

    • VLANs help in improving network security by isolating traffic between different departments or groups.

    • There are two main types of VLANs: Port-based VLANs and Tag-based VLANs.

    • Port-based VLANs assign ports on a switch to different VLANs, while Tag-based VLANs use ...

  • Answered by AI

Skills evaluated in this interview

Interview experience
5
Excellent
Difficulty level
-
Process Duration
-
Result
-
Round 1 - Technical 

(2 Questions)

  • Q1. Packet flow of ASA/FTD
  • Ans. 

    Packet flow of ASA/FTD involves ingress, inspection, and egress stages.

    • Ingress stage: Packet enters the ASA/FTD device through an interface.

    • Inspection stage: Packet is inspected by access control policies, NAT rules, and VPN configurations.

    • Egress stage: Packet exits the ASA/FTD device through an interface towards its destination.

    • Example: Ingress - packet enters ASA/FTD through outside interface, Inspection - packet is ...

  • Answered by AI
  • Q2. SSl handshake explaination
  • Ans. 

    SSL handshake is a process where a client and server establish a secure connection by exchanging encryption keys and verifying identities.

    • Client sends a request to the server to initiate the handshake

    • Server responds with its digital certificate

    • Client verifies the certificate and generates a pre-master secret

    • Both parties exchange encrypted messages using the pre-master secret to establish a secure connection

  • Answered by AI

Skills evaluated in this interview

Interview experience
3
Average
Difficulty level
-
Process Duration
Less than 2 weeks
Result
No response

I applied via Recruitment Consulltant and was interviewed in Sep 2023. There were 2 interview rounds.

Round 1 - Resume Shortlist 
Pro Tip by AmbitionBox:
Keep your resume crisp and to the point. A recruiter looks at your resume for an average of 6 seconds, make sure to leave the best impression.
View all tips
Round 2 - Technical 

(8 Questions)

  • Q1. What is Application override ?
  • Ans. 

    Application override is a feature in network security that allows certain applications to bypass security policies.

    • Application override allows specific applications to bypass firewall rules or other security measures.

    • It is typically used for critical applications that may be blocked by default security settings.

    • Administrators can configure application override rules to allow certain traffic to pass through the network ...

  • Answered by AI
  • Q2. What is inside the session table ?
  • Ans. 

    The session table typically stores information about active network connections and their associated details.

    • Contains information such as source and destination IP addresses

    • Stores port numbers being used in the connection

    • Tracks the protocol being used (e.g. TCP, UDP)

    • May include timestamps for when the connection was established and last active

  • Answered by AI
  • Q3. What is HA3 belongs to and work?
  • Ans. 

    HA3 belongs to HMAC (Hash-based Message Authentication Code) and is used for secure authentication and integrity verification.

    • HA3 stands for Hash-based Message Authentication Code 3

    • It is used in cryptographic hash functions for secure authentication and integrity verification

    • HA3 is commonly used in network security protocols such as TLS (Transport Layer Security) and IPsec (Internet Protocol Security)

  • Answered by AI
  • Q4. In Paloalto firewall if cluster failure occur then which log would tou have to check ?
  • Ans. 

    Check the system logs for cluster failure in Paloalto firewall.

    • Check the system logs for any error messages related to cluster failure

    • Look for logs indicating cluster synchronization issues

    • Review logs for any hardware or software failures in the cluster

  • Answered by AI
  • Q5. What is Heart Beat link ?
  • Ans. 

    Heart Beat link is a feature in network security that ensures continuous communication between devices.

    • Heart Beat link is a mechanism used to maintain a connection between two devices by sending periodic signals.

    • It helps in detecting if a device is still active and reachable on the network.

    • If the Heart Beat link fails, it can trigger alerts or actions to address the issue.

    • Example: In a VPN connection, Heart Beat link c...

  • Answered by AI
  • Q6. How many logs type we have in monitor tab in panorama?
  • Ans. 

    There are four types of logs in the monitor tab in Panorama.

    • Traffic logs

    • Threat logs

    • URL logs

    • Data logs

  • Answered by AI
  • Q7. How to configure firewall from scratch and what will the first step thta we have to follow ?
  • Ans. 

    To configure a firewall from scratch, the first step is to define the security policy.

    • Define the security policy based on the organization's requirements and compliance standards

    • Identify the network topology and determine the zones that need to be protected

    • Select the appropriate firewall hardware or software based on the requirements

    • Configure the firewall rules to allow or deny traffic based on the security policy

    • Test ...

  • Answered by AI
  • Q8. What is statefull means ?
  • Ans. 

    Stateful means the system or device keeps track of the state of active connections and can differentiate between different connections.

    • Stateful devices maintain information about the state of active connections

    • They can differentiate between different connections based on various parameters

    • Stateful firewalls keep track of the state of network connections to make decisions on allowing or blocking traffic

  • Answered by AI

Skills evaluated in this interview

Interview experience
5
Excellent
Difficulty level
Hard
Process Duration
-
Result
Selected Selected

I applied via LinkedIn and was interviewed before Jul 2023. There was 1 interview round.

Round 1 - Technical 

(2 Questions)

  • Q1. What are the phase of a vpn
  • Ans. 

    The phases of a VPN include initiation, negotiation, data transfer, and termination.

    • Initiation phase involves establishing a connection between the client and server.

    • Negotiation phase involves agreeing on encryption algorithms and keys.

    • Data transfer phase is when actual data is transmitted securely.

    • Termination phase involves closing the connection.

    • Examples: IKEv2 VPN protocol follows these phases.

  • Answered by AI
  • Q2. What is the difference between a firewall and a next generation firewall
  • Ans. 

    A firewall filters traffic based on predetermined rules, while a next generation firewall includes additional features like intrusion prevention and application awareness.

    • Firewall filters traffic based on IP addresses and ports

    • Next generation firewall includes intrusion prevention, application awareness, and deep packet inspection

    • NGFW can identify and block advanced threats like malware and ransomware

    • NGFW can provide m...

  • Answered by AI

Interview Preparation Tips

Interview preparation tips for other job seekers - Study the JD

Skills evaluated in this interview

Top trending discussions

View All
Interview Tips & Stories
1w
toobluntforu
·
works at
Cvent
Can speak English, can’t deliver in interviews
I feel like I can't speak fluently during interviews. I do know english well and use it daily to communicate, but the moment I'm in an interview, I just get stuck. since it's not my first language, I struggle to express what I actually feel. I know the answer in my head, but I just can’t deliver it properly at that moment. Please guide me
Got a question about BT Group?
Ask anonymously on communities.

Interview questions from similar companies

Interview experience
5
Excellent
Difficulty level
Moderate
Process Duration
2-4 weeks
Result
Selected Selected

I applied via Naukri.com and was interviewed before Jun 2023. There were 2 interview rounds.

Round 1 - Technical 

(2 Questions)

  • Q1. Tell us about you?
  • Q2. Palo alto discussion
Round 2 - HR 

(2 Questions)

  • Q1. What is ctc in previous company
  • Ans. 

    My previous CTC was competitive, reflecting my skills and experience in network security engineering.

    • My CTC included base salary, bonuses, and benefits.

    • For example, my base salary was aligned with industry standards for my role.

    • I also received performance bonuses based on project success.

    • Additionally, I had health benefits and retirement contributions.

  • Answered by AI
  • Q2. How much you want ctc
  • Ans. 

    I am looking for a competitive salary based on my experience and skills.

    • I am seeking a salary that is in line with industry standards for a Network Security Engineer position.

    • I am open to negotiation based on the overall compensation package offered by the company.

    • I value fair compensation for the level of responsibility and expertise required for this role.

  • Answered by AI

Interview Preparation Tips

Interview preparation tips for other job seekers - Good interview in both roimds
Interview experience
4
Good
Difficulty level
Moderate
Process Duration
Less than 2 weeks
Result
Selected Selected

I applied via Naukri.com and was interviewed in May 2024. There were 2 interview rounds.

Round 1 - Technical 

(1 Question)

  • Q1. Only tech round, technical question based on network and security?
Round 2 - One-on-one 

(1 Question)

  • Q1. HR round only to check communication skills

Interview Preparation Tips

Interview preparation tips for other job seekers - prepare well and should have hands on experience.
Interview experience
5
Excellent
Difficulty level
-
Process Duration
-
Result
-
Round 1 - Technical 

(1 Question)

  • Q1. Not Available, can't disclose
Round 2 - One-on-one 

(1 Question)

  • Q1. Not Available, can't disclose.
Are these interview questions helpful?

I appeared for an interview in Jan 2017.

Interview Preparation Tips

Round: Test
Duration: 30 minutes
Total Questions: 20

College Name: Jaypee University Of Information Technology, Solan

Interview Questionnaire 

5 Questions

  • Q1. Tell me about yourself?
  • Ans. 

    I am a dedicated network engineer with 5 years of experience in designing, implementing, and troubleshooting complex network infrastructures.

    • Experienced in configuring routers, switches, firewalls, and load balancers

    • Skilled in network security protocols such as VPNs, ACLs, and IDS/IPS

    • Proficient in network monitoring tools like Wireshark and Nagios

    • Certified in Cisco CCNA and CCNP

  • Answered by AI
  • Q2. What is OFC?
  • Q3. What is multiplexer and de multiplexer?
  • Q4. What is OTDR?
  • Ans. 

    OTDR stands for Optical Time Domain Reflectometer. It is a device used to test and troubleshoot fiber optic networks.

    • OTDR sends a pulse of light into the fiber and measures the time and strength of the reflected signal.

    • It can detect faults such as breaks, bends, and splices in the fiber.

    • OTDR can also measure the length of the fiber and the attenuation of the signal.

    • It is an essential tool for maintaining and repairing ...

  • Answered by AI
  • Q5. Why Should we hire you?
  • Ans. 

    I have a strong technical background, excellent problem-solving skills, and a proven track record of successfully implementing network solutions.

    • Extensive experience in designing, implementing, and managing complex network infrastructures

    • Strong knowledge of network protocols and technologies such as TCP/IP, VLANs, and routing protocols

    • Proven ability to troubleshoot network issues and implement effective solutions

    • Excell...

  • Answered by AI

Interview Preparation Tips

Round: Resume Shortlist
Experience: B.Tech in Ece

Skills evaluated in this interview

I appeared for an interview in Nov 2016.

Interview Preparation Tips

Round: Resume Shortlist
Experience: I was asked to submit my r

BT Group Interview FAQs

How many rounds are there in BT Group Network Security Engineer interview?
BT Group interview process usually has 1-2 rounds. The most common rounds in the BT Group interview process are Technical, Resume Shortlist and One-on-one Round.
How to prepare for BT Group Network Security Engineer interview?
Go through your CV in detail and study all the technologies mentioned in your CV. Prepare at least two technologies or languages in depth if you are appearing for a technical interview at BT Group. The most common topics and skills that interviewers at BT Group expect are Network Security, F5, cisco, CCNA Security and Checkpoint Firewall.
What are the top questions asked in BT Group Network Security Engineer interview?

Some of the top questions asked at the BT Group Network Security Engineer interview -

  1. How many logs type we have in monitor tab in panora...read more
  2. How to configure firewall from scratch and what will the first step thta we hav...read more
  3. In Paloalto firewall if cluster failure occur then which log would tou have to ...read more

Tell us how to improve this page.

Overall Interview Experience Rating

4.5/5

based on 4 interview experiences

Difficulty level

Hard 100%

Duration

Less than 2 weeks 100%
View more
Join BT Group World’s leading communications services companies

Interview Questions from Similar Companies

Jio Interview Questions
4.0
 • 2.2k Interviews
Bharti Airtel Interview Questions
3.9
 • 951 Interviews
Vodafone Idea Interview Questions
4.0
 • 593 Interviews
Ericsson Interview Questions
4.1
 • 431 Interviews
Nokia Interview Questions
4.1
 • 288 Interviews
ACT Fibernet Interview Questions
4.0
 • 142 Interviews
Verizon Interview Questions
4.0
 • 118 Interviews
View all
BT Group Network Security Engineer Salary
based on 47 salaries
₹4.8 L/yr - ₹14.5 L/yr
39% more than the average Network Security Engineer Salary in India
View more details

BT Group Network Security Engineer Reviews and Ratings

based on 8 reviews

4.0/5

Rating in categories

4.0

Skill development

4.0

Work-life balance

3.8

Salary

4.0

Job security

4.0

Company culture

4.0

Promotions

4.0

Work satisfaction

Explore 8 Reviews and Ratings
Associate Engineer
324 salaries
unlock blur

₹2.8 L/yr - ₹8 L/yr

Associate
295 salaries
unlock blur

₹2.1 L/yr - ₹9.1 L/yr

Financial Analyst
267 salaries
unlock blur

₹6.8 L/yr - ₹23 L/yr

Project Manager
226 salaries
unlock blur

₹6 L/yr - ₹25 L/yr

Network Engineer
196 salaries
unlock blur

₹2.7 L/yr - ₹7.8 L/yr

Explore more salaries
Compare BT Group with

Jio

4.1
Compare

Vodafone Idea

4.0
Compare

Bharti Airtel

3.9
Compare

Ericsson

4.1
Compare
write
Share an Interview