Add office photos
Employer?
Claim Account for FREE

BT Group

4.0
based on 1.8k Reviews
Filter interviews by

10+ Interview Questions and Answers

Updated 4 Aug 2024
Popular Designations

Q1. How to configure firewall from scratch and what will the first step thta we have to follow ?

Ans.

To configure a firewall from scratch, the first step is to define the security policy.

  • Define the security policy based on the organization's requirements and compliance standards

  • Identify the network topology and determine the zones that need to be protected

  • Select the appropriate firewall hardware or software based on the requirements

  • Configure the firewall rules to allow or deny traffic based on the security policy

  • Test the firewall configuration to ensure it is working as inte...read more

Add your answer

Q2. In Paloalto firewall if cluster failure occur then which log would tou have to check ?

Ans.

Check the system logs for cluster failure in Paloalto firewall.

  • Check the system logs for any error messages related to cluster failure

  • Look for logs indicating cluster synchronization issues

  • Review logs for any hardware or software failures in the cluster

Add your answer

Q3. How many logs type we have in monitor tab in panorama?

Ans.

There are four types of logs in the monitor tab in Panorama.

  • Traffic logs

  • Threat logs

  • URL logs

  • Data logs

Add your answer

Q4. What is the difference between a firewall and a next generation firewall

Ans.

A firewall filters traffic based on predetermined rules, while a next generation firewall includes additional features like intrusion prevention and application awareness.

  • Firewall filters traffic based on IP addresses and ports

  • Next generation firewall includes intrusion prevention, application awareness, and deep packet inspection

  • NGFW can identify and block advanced threats like malware and ransomware

  • NGFW can provide more granular control over applications and users

Add your answer
Discover null interview dos and don'ts from real experiences

Q5. What is inside the session table ?

Ans.

The session table typically stores information about active network connections and their associated details.

  • Contains information such as source and destination IP addresses

  • Stores port numbers being used in the connection

  • Tracks the protocol being used (e.g. TCP, UDP)

  • May include timestamps for when the connection was established and last active

Add your answer

Q6. What is HA3 belongs to and work?

Ans.

HA3 belongs to HMAC (Hash-based Message Authentication Code) and is used for secure authentication and integrity verification.

  • HA3 stands for Hash-based Message Authentication Code 3

  • It is used in cryptographic hash functions for secure authentication and integrity verification

  • HA3 is commonly used in network security protocols such as TLS (Transport Layer Security) and IPsec (Internet Protocol Security)

Add your answer
Are these interview questions helpful?

Q7. What is Heart Beat link ?

Ans.

Heart Beat link is a feature in network security that ensures continuous communication between devices.

  • Heart Beat link is a mechanism used to maintain a connection between two devices by sending periodic signals.

  • It helps in detecting if a device is still active and reachable on the network.

  • If the Heart Beat link fails, it can trigger alerts or actions to address the issue.

  • Example: In a VPN connection, Heart Beat link can be used to ensure the tunnel remains open and active.

Add your answer

Q8. What is Application override ?

Ans.

Application override is a feature in network security that allows certain applications to bypass security policies.

  • Application override allows specific applications to bypass firewall rules or other security measures.

  • It is typically used for critical applications that may be blocked by default security settings.

  • Administrators can configure application override rules to allow certain traffic to pass through the network without inspection.

  • This feature can be useful for ensuring...read more

Add your answer
Share interview questions and help millions of jobseekers 🌟

Q9. What is statefull means ?

Ans.

Stateful means the system or device keeps track of the state of active connections and can differentiate between different connections.

  • Stateful devices maintain information about the state of active connections

  • They can differentiate between different connections based on various parameters

  • Stateful firewalls keep track of the state of network connections to make decisions on allowing or blocking traffic

Add your answer

Q10. What are the phase of a vpn

Ans.

The phases of a VPN include initiation, negotiation, data transfer, and termination.

  • Initiation phase involves establishing a connection between the client and server.

  • Negotiation phase involves agreeing on encryption algorithms and keys.

  • Data transfer phase is when actual data is transmitted securely.

  • Termination phase involves closing the connection.

  • Examples: IKEv2 VPN protocol follows these phases.

Add your answer

Q11. What is asp packet capture

Ans.

ASP packet capture is a method of capturing and analyzing network traffic to identify potential security threats.

  • ASP stands for Application Service Provider.

  • Packet capture involves capturing data packets as they travel across a network.

  • ASP packet capture helps in monitoring network traffic for security purposes.

  • Tools like Wireshark can be used for ASP packet capture.

Add your answer

Q12. packet flow of ASA/FTD

Ans.

Packet flow of ASA/FTD involves ingress, inspection, and egress stages.

  • Ingress stage: Packet enters the ASA/FTD device through an interface.

  • Inspection stage: Packet is inspected by access control policies, NAT rules, and VPN configurations.

  • Egress stage: Packet exits the ASA/FTD device through an interface towards its destination.

  • Example: Ingress - packet enters ASA/FTD through outside interface, Inspection - packet is checked against access control list, Egress - packet exits...read more

Add your answer

Q13. SSl handshake explaination

Ans.

SSL handshake is a process where a client and server establish a secure connection by exchanging encryption keys and verifying identities.

  • Client sends a request to the server to initiate the handshake

  • Server responds with its digital certificate

  • Client verifies the certificate and generates a pre-master secret

  • Both parties exchange encrypted messages using the pre-master secret to establish a secure connection

Add your answer

Q14. Explain Vlan and its types

Ans.

VLAN stands for Virtual Local Area Network. It is a network technology that allows for segmentation of a single physical network into multiple virtual networks.

  • VLANs help in improving network security by isolating traffic between different departments or groups.

  • There are two main types of VLANs: Port-based VLANs and Tag-based VLANs.

  • Port-based VLANs assign ports on a switch to different VLANs, while Tag-based VLANs use VLAN tags to identify different VLANs.

  • Example: In a compan...read more

Add your answer

More about working at BT Group

#14 Best Large Company - 2022
HQ - London, United Kingdom (UK)
Contribute & help others!
Write a review
Share interview
Contribute salary
Add office photos

Interview Process at null

based on 3 interviews in the last 1 year
Interview experience
5.0
Excellent
View more
Interview Tips & Stories
Ace your next interview with expert advice and inspiring stories

Top Network Security Engineer Interview Questions from Similar Companies

3.3
 • 12 Interview Questions
View all
Share an Interview
Stay ahead in your career. Get AmbitionBox app
qr-code
Helping over 1 Crore job seekers every month in choosing their right fit company
70 Lakh+

Reviews

5 Lakh+

Interviews

4 Crore+

Salaries

1 Cr+

Users/Month

Contribute to help millions
Get AmbitionBox app

Made with ❤️ in India. Trademarks belong to their respective owners. All rights reserved © 2024 Info Edge (India) Ltd.

Follow us
  • Youtube
  • Instagram
  • LinkedIn
  • Facebook
  • Twitter