i
BT Group
Filter interviews by
ASP packet capture is a method of capturing and analyzing network traffic to identify potential security threats.
ASP stands for Application Service Provider.
Packet capture involves capturing data packets as they travel across a network.
ASP packet capture helps in monitoring network traffic for security purposes.
Tools like Wireshark can be used for ASP packet capture.
VLAN stands for Virtual Local Area Network. It is a network technology that allows for segmentation of a single physical network into multiple virtual networks.
VLANs help in improving network security by isolating traffic between different departments or groups.
There are two main types of VLANs: Port-based VLANs and Tag-based VLANs.
Port-based VLANs assign ports on a switch to different VLANs, while Tag-based VLANs use ...
Packet flow of ASA/FTD involves ingress, inspection, and egress stages.
Ingress stage: Packet enters the ASA/FTD device through an interface.
Inspection stage: Packet is inspected by access control policies, NAT rules, and VPN configurations.
Egress stage: Packet exits the ASA/FTD device through an interface towards its destination.
Example: Ingress - packet enters ASA/FTD through outside interface, Inspection - packet is ...
SSL handshake is a process where a client and server establish a secure connection by exchanging encryption keys and verifying identities.
Client sends a request to the server to initiate the handshake
Server responds with its digital certificate
Client verifies the certificate and generates a pre-master secret
Both parties exchange encrypted messages using the pre-master secret to establish a secure connection
I applied via Recruitment Consulltant and was interviewed in Sep 2023. There were 2 interview rounds.
Application override is a feature in network security that allows certain applications to bypass security policies.
Application override allows specific applications to bypass firewall rules or other security measures.
It is typically used for critical applications that may be blocked by default security settings.
Administrators can configure application override rules to allow certain traffic to pass through the network ...
The session table typically stores information about active network connections and their associated details.
Contains information such as source and destination IP addresses
Stores port numbers being used in the connection
Tracks the protocol being used (e.g. TCP, UDP)
May include timestamps for when the connection was established and last active
HA3 belongs to HMAC (Hash-based Message Authentication Code) and is used for secure authentication and integrity verification.
HA3 stands for Hash-based Message Authentication Code 3
It is used in cryptographic hash functions for secure authentication and integrity verification
HA3 is commonly used in network security protocols such as TLS (Transport Layer Security) and IPsec (Internet Protocol Security)
Check the system logs for cluster failure in Paloalto firewall.
Check the system logs for any error messages related to cluster failure
Look for logs indicating cluster synchronization issues
Review logs for any hardware or software failures in the cluster
Heart Beat link is a feature in network security that ensures continuous communication between devices.
Heart Beat link is a mechanism used to maintain a connection between two devices by sending periodic signals.
It helps in detecting if a device is still active and reachable on the network.
If the Heart Beat link fails, it can trigger alerts or actions to address the issue.
Example: In a VPN connection, Heart Beat link c...
There are four types of logs in the monitor tab in Panorama.
Traffic logs
Threat logs
URL logs
Data logs
To configure a firewall from scratch, the first step is to define the security policy.
Define the security policy based on the organization's requirements and compliance standards
Identify the network topology and determine the zones that need to be protected
Select the appropriate firewall hardware or software based on the requirements
Configure the firewall rules to allow or deny traffic based on the security policy
Test ...
Stateful means the system or device keeps track of the state of active connections and can differentiate between different connections.
Stateful devices maintain information about the state of active connections
They can differentiate between different connections based on various parameters
Stateful firewalls keep track of the state of network connections to make decisions on allowing or blocking traffic
What people are saying about BT Group
3 point estimation is a technique used in project management to estimate the most likely duration or cost of a project task.
Involves estimating the best case scenario, worst case scenario, and most likely scenario for a project task
Calculates the average of the three estimates to determine the final estimate
Helps in providing a more accurate and realistic estimate for project planning and scheduling
Resource levelling is the process of adjusting project schedules to prevent resource overallocation.
Resource levelling involves shifting tasks within a project timeline to ensure that resources are not overallocated.
It helps in optimizing resource utilization and preventing burnout among team members.
Resource levelling may involve delaying certain tasks or hiring additional resources to balance workloads.
It is a common...
BT Group interview questions for popular designations
Cost estimation is the process of predicting the expense of a project or operation.
Cost estimation involves analyzing various factors such as resources, labor, materials, and overhead costs.
Different methods can be used for cost estimation, such as bottom-up estimation, parametric estimation, and analogous estimation.
Accuracy of cost estimation is crucial for project budgeting and decision-making.
Examples of cost estim...
Resource levelling is the process of adjusting project schedules to prevent resource overallocation.
Resource levelling involves shifting tasks within a project timeline to ensure that resources are not overallocated.
It helps in optimizing resource utilization and preventing burnout.
Resource levelling may result in a longer project duration but helps in maintaining a balanced workload for team members.
Example: If a proj...
Get interview-ready with Top BT Group Interview Questions
SVA stands for Service Level Agreement and it defines the level of service a customer can expect from a company.
SVA outlines the specific services provided by a company and the standards to which they will be delivered
It includes details such as response times, resolution times, and availability of support
For example, a company may have an SVA that guarantees a response to customer inquiries within 24 hours
The ozone layer is a protective layer in the Earth's stratosphere that absorbs most of the sun's harmful ultraviolet radiation.
Protects living organisms on Earth from harmful ultraviolet radiation
Prevents skin cancer, cataracts, and other health issues in humans
Helps maintain the Earth's temperature balance by absorbing and reflecting solar radiation
Damages to the ozone layer can lead to increased UV radiation reaching
Reasoning in Aptitude
Computer Networks are systems of interconnected computers that communicate with each other to share resources and information.
Computer networks allow for sharing of resources such as files, printers, and internet connections.
They enable communication between devices through protocols like TCP/IP.
Examples include LANs (Local Area Networks), WANs (Wide Area Networks), and the Internet.
VPN stands for Virtual Private Network, it allows users to securely access a private network over a public network.
VPN encrypts data to ensure secure transmission over the internet
It masks the user's IP address to maintain anonymity
VPN creates a secure tunnel between the user's device and the private network
Common uses include remote access to company networks and bypassing geo-restrictions
Examples of VPN services incl
I applied via Naukri.com and was interviewed in Jul 2023. There were 5 interview rounds.
This round was hackerath test which included 1 coding questions and 20 MCQ's related to java,spring,spring boot,Microservices etc
The interview questions cover topics like Microservice Architecture, project explanation, array manipulation, Nth highest salary, and Java fundamentals.
Microservice Architecture involves breaking down a large application into smaller, independent services that communicate with each other.
Explain a project you worked on, highlighting the technologies used, challenges faced, and the outcome.
Target Sum in array involves f...
I have worked on modules such as user authentication, data processing, API integration, and UI development.
User authentication module - Implemented login, registration, and password reset functionalities.
Data processing module - Developed algorithms for data manipulation and analysis.
API integration module - Integrated third-party APIs for various functionalities.
UI development module - Designed and implemented user in
I applied via Company Website and was interviewed in Aug 2023. There were 4 interview rounds.
Sql and coding test
Tables store data in a structured format, while views are virtual tables that display data from one or more tables.
Tables store actual data, while views display data dynamically based on the underlying tables.
Tables can be modified directly, while views are read-only.
Views can combine data from multiple tables, while tables store data in a single structure.
The duration of BT Group interview process can vary, but typically it takes about less than 2 weeks to complete.
based on 166 interviews
Interview experience
based on 1.9k reviews
Rating in categories
Associate
324
salaries
| ₹0 L/yr - ₹0 L/yr |
Associate Engineer
276
salaries
| ₹0 L/yr - ₹0 L/yr |
Financial Analyst
254
salaries
| ₹0 L/yr - ₹0 L/yr |
Project Manager
233
salaries
| ₹0 L/yr - ₹0 L/yr |
Network Engineer
205
salaries
| ₹0 L/yr - ₹0 L/yr |
Vodafone Idea
Bharti Airtel
Jio
Tata Communications