i
Capgemini
Proud winner of ABECA 2024 - AmbitionBox Employee Choice Awards
Filter interviews by
I applied via AmbitionBox and was interviewed in Feb 2022. There was 1 interview round.
I applied via Recruitment Consulltant and was interviewed before Sep 2021. There were 2 interview rounds.
IKEv2 is more secure and efficient than IKEv1 for IPsec VPN.
IKEv2 supports more secure encryption algorithms and has better resistance to attacks.
IKEv2 has faster negotiation and rekeying times, improving performance.
IKEv2 allows for more flexibility in terms of authentication methods.
IKEv1 is still widely used and supported, but IKEv2 is recommended for new deployments.
Both IKEv1 and IKEv2 are used to establish a secu...
Upgrading OS in distributed mode requires careful planning and execution.
Ensure compatibility of new OS with existing hardware and software
Create a backup of all important data before starting the upgrade process
Test the upgrade process in a non-production environment first
Schedule the upgrade during a maintenance window to minimize disruption
Monitor the upgrade process closely and have a rollback plan in case of issue
I applied via Referral and was interviewed before Jan 2022. There were 2 interview rounds.
posted on 18 Jul 2021
I applied via LinkedIn and was interviewed in Jan 2021. There were 3 interview rounds.
I applied via Naukri.com and was interviewed in Mar 2022. There were 2 interview rounds.
Data link layer is responsible for transferring data between adjacent network nodes.
Data link layer ensures error-free transmission of data over the physical layer.
It divides data into frames for transmission.
It also handles flow control and error detection/correction.
Examples include Ethernet, Wi-Fi, and PPP protocols.
DHCP stands for Dynamic Host Configuration Protocol, which is a network management protocol used to assign IP addresses automatically to devices on a network.
DHCP eliminates the need for manual IP address configuration on each device
It allows devices to obtain IP addresses, subnet masks, default gateways, and DNS server addresses automatically
DHCP servers lease IP addresses to devices for a specific period of time
DHCP ...
The preferred location for a Network Security Engineer is typically in a secure office environment with access to necessary equipment and resources.
Secure office environment with restricted access to unauthorized personnel
Access to necessary equipment and resources such as servers, firewalls, and monitoring tools
Proximity to the IT team for collaboration and communication
Possibly located near the data center for quick
VLAN stands for Virtual Local Area Network. It is a logical grouping of network devices that share the same broadcast domain.
VLANs are used to improve network performance, security, and management.
They allow network administrators to segment a large network into smaller, more manageable subnetworks.
Each VLAN has its own broadcast domain, which reduces network congestion and improves performance.
VLANs can also be used t...
STP stands for Spanning Tree Protocol. It is used to prevent loops in a network and ensure redundancy.
STP is a protocol used in network switches to prevent loops in a network.
It ensures that there is only one active path between any two network devices.
STP blocks redundant paths to prevent loops and ensures network redundancy.
STP is important for network stability and preventing broadcast storms.
Examples of STP variant...
I applied via Naukri.com and was interviewed in Feb 2024. There were 2 interview rounds.
based on 1 interview
Interview experience
based on 28 reviews
Rating in categories
6-9 Yrs
₹ 4.7-16 LPA
Consultant
56k
salaries
| ₹5.2 L/yr - ₹18 L/yr |
Associate Consultant
50.7k
salaries
| ₹2.9 L/yr - ₹12 L/yr |
Senior Consultant
47.3k
salaries
| ₹7.5 L/yr - ₹25 L/yr |
Senior Analyst
21.1k
salaries
| ₹2.2 L/yr - ₹9 L/yr |
Senior Software Engineer
20.6k
salaries
| ₹3.5 L/yr - ₹12.9 L/yr |
Wipro
Accenture
Cognizant
TCS