Filter interviews by
I applied via Campus Placement and was interviewed in Jul 2024. There were 2 interview rounds.
Basic questions related to speed, time, efficiency
5GHz offers faster speeds, less interference, and more channels compared to 2.4GHz.
5GHz provides faster data transfer speeds compared to 2.4GHz, making it ideal for high-bandwidth activities like streaming HD video or online gaming.
5GHz has less interference from other devices like microwaves and cordless phones that operate on the 2.4GHz frequency.
5GHz offers more available channels, reducing the likelihood of congest...
Yes, a switch can be converted into a router by enabling routing features and configuring routing protocols.
Enable routing features on the switch
Configure routing protocols such as OSPF or EIGRP
Assign IP addresses to interfaces
Implement access control lists for security
Install a routing software image if necessary
I applied via Referral and was interviewed before Feb 2023. There was 1 interview round.
3 way hand shaking is a process in TCP/IP communication where three packets are exchanged to establish a connection.
Three packets are involved: SYN, SYN-ACK, ACK
SYN packet is sent by the client to the server to initiate the connection
SYN-ACK packet is sent by the server to the client as a response
ACK packet is sent by the client to the server to confirm the connection
The OSI Model is a conceptual framework that standardizes the functions of a telecommunication or computing system into seven layers.
The OSI Model stands for Open Systems Interconnection Model.
It helps in understanding how data is transferred between devices in a network.
Each layer has specific functions and communicates with the adjacent layers.
Examples of layers include Physical, Data Link, Network, Transport, Sessio
TCP is connection-oriented, reliable, and slower, while UDP is connectionless, unreliable, and faster.
TCP is connection-oriented, meaning it establishes a connection before sending data, while UDP is connectionless.
TCP is reliable as it ensures all data is received in order and without errors, while UDP does not guarantee delivery.
TCP is slower due to the overhead of establishing and maintaining connections, while UDP ...
A firewall is a network security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules.
Acts as a barrier between a trusted internal network and untrusted external network
Filters traffic based on rules set by the network administrator
Can be hardware-based or software-based
Examples include Cisco ASA, Palo Alto Networks, and pfSense
I applied via Job Fair and was interviewed before Nov 2023. There were 2 interview rounds.
I am a dedicated Security Analyst with a strong background in cybersecurity and risk management.
Experienced in conducting security assessments and identifying vulnerabilities
Skilled in implementing security measures to protect against cyber threats
Proficient in analyzing security incidents and responding effectively
Certified in relevant security certifications such as CISSP or CISM
Malware refers to malicious software designed to disrupt, damage, or gain unauthorized access to a computer system.
Viruses: self-replicating programs that infect other files on a computer
Worms: standalone malware that spreads across networks
Trojans: disguised as legitimate software to trick users into installing them
Ransomware: encrypts files and demands payment for decryption
Spyware: secretly gathers information about...
The first step would be to isolate the infected machine from the network to prevent further spread of the infection.
Isolate the infected machine from the network to prevent further spread of the infection
Identify the type of malware or virus that has infected the machine
Run a full system scan using antivirus software to detect and remove the malware
Update the operating system and all software to patch any vulnerabiliti...
I applied via Company Website and was interviewed before Aug 2022. There were 3 interview rounds.
Azure Security Policies are a set of rules and configurations that help enforce security controls within Azure environments.
Azure Security Policies help ensure compliance with security standards and best practices
They can be used to enforce specific security configurations, such as requiring encryption for storage accounts
Policies can be assigned at the subscription, resource group, or resource level
Conditional Access in Azure is used to control access to resources based on specific conditions.
Conditional Access policies can be set up to require multi-factor authentication for certain users or devices
It can restrict access based on location, device compliance, or other factors
Conditional Access can be used to enforce policies such as requiring a compliant device to access sensitive data
Active Directory Federation Service (AD FS) is a feature in Windows Server that allows for single sign-on authentication across multiple systems.
AD FS allows users to access multiple applications with a single set of credentials
It enables secure sharing of identity information between trusted partners
AD FS uses claims-based authentication to verify user identity
It supports integration with cloud-based services like Off
posted on 30 Jul 2024
I applied via Company Website and was interviewed in Aug 2023. There was 1 interview round.
I follow the Zero Trust security model, which assumes all networks are untrusted and verifies every user and device attempting to connect.
Implementing strict access controls based on user identity and device health
Utilizing multi-factor authentication for added security
Regularly monitoring and analyzing network traffic for anomalies
Segmenting networks to limit the impact of a potential breach
I follow APT groups such as APT28, APT29, and APT33 for threat intelligence and analysis.
APT28, also known as Fancy Bear, is associated with Russian military intelligence.
APT29, also known as Cozy Bear, is another Russian cyber espionage group.
APT33 is linked to Iranian cyber espionage activities.
Tracking APT groups helps in understanding their tactics, techniques, and procedures (TTPs).
OWASP stands for Open Web Application Security Project, a non-profit organization focused on improving software security.
OWASP provides resources such as tools, documentation, and guidelines for web application security.
It publishes a list of the top 10 most critical web application security risks.
OWASP also offers training and conferences to educate professionals on security best practices.
I applied via Approached by Company and was interviewed before Oct 2023. There were 3 interview rounds.
I am a dedicated Information Security Engineer with a strong background in cybersecurity and a passion for protecting data.
Experienced in implementing and managing security measures to protect networks and systems
Skilled in conducting security assessments and identifying vulnerabilities
Proficient in developing and implementing security policies and procedures
Strong knowledge of security tools and technologies such as f...
I have conducted penetration testing on critical infrastructure systems.
Identified vulnerabilities in network infrastructure
Performed penetration testing on industrial control systems
Tested security measures in place for critical infrastructure
Collaborated with IT and engineering teams to address security gaps
I want to join Intel because of their reputation for innovation and cutting-edge technology in the field of information security.
Intel is a leader in the technology industry, known for their advanced hardware and software solutions.
I am impressed by Intel's commitment to research and development, especially in the area of information security.
I believe that working at Intel will provide me with the opportunity to work ...
posted on 20 Mar 2024
I applied via Company Website and was interviewed before Mar 2023. There were 2 interview rounds.
Interview experience
based on 2 reviews
Rating in categories
Associate
335
salaries
| ₹1.5 L/yr - ₹6.3 L/yr |
Associate Engineer
275
salaries
| ₹2.8 L/yr - ₹8 L/yr |
Financial Analyst
252
salaries
| ₹6.8 L/yr - ₹23 L/yr |
Project Manager
238
salaries
| ₹7 L/yr - ₹23.3 L/yr |
Network Engineer
203
salaries
| ₹2.7 L/yr - ₹9 L/yr |
Vodafone Idea
Bharti Airtel
Jio
Tata Communications