Filter interviews by
Phase 1 establishes secure communication channel, Phase 2 sets up secure data transfer within the channel.
Phase 1 negotiates security parameters and establishes a secure channel between two IPsec peers.
Phase 2 sets up secure data transfer within the established secure channel.
Phase 1 uses ISAKMP (Internet Security Association and Key Management Protocol) for key exchange.
Phase 2 uses IPsec protocols like ESP (Encapsula...
SSL authentication involves multiple steps to verify the identity of the server and establish a secure connection.
Client sends a request to the server over HTTPS
Server responds with its SSL certificate
Client verifies the certificate's authenticity using a trusted CA
Client generates a session key and encrypts it with the server's public key
Server decrypts the session key using its private key
Client and server can now co
Load balancer distributes incoming network traffic across multiple servers to ensure no single server is overwhelmed.
Distributes traffic evenly across servers
Improves reliability and scalability
Can be hardware-based or software-based
Examples: F5 BIG-IP, NGINX, HAProxy
Application gateway is a load balancer that manages traffic to web applications.
Acts as a reverse proxy to distribute incoming traffic across multiple servers
Provides SSL termination, URL-based routing, and session persistence
Can perform application layer (HTTP) load balancing
Supports WAF (Web Application Firewall) for enhanced security
Reducing latency involves optimizing network infrastructure, minimizing data transfer distances, and utilizing caching techniques.
Optimize network infrastructure by using faster hardware and reducing network congestion
Minimize data transfer distances by using content delivery networks (CDNs) and edge computing
Utilize caching techniques to store frequently accessed data closer to the end user
Implementing load balancing
ER circuit is a dedicated point-to-point connection while IPsec tunnel is a secure virtual private network connection over the internet.
ER circuit is a physical connection between two locations, typically provided by a telecom provider.
IPsec tunnel is a secure encrypted connection over the internet, often used for connecting remote offices or users.
ER circuit offers dedicated bandwidth and low latency, suitable for hig...
Top trending discussions
I applied via Company Website and was interviewed in Oct 2020. There were 3 interview rounds.
Recursion is a process in which a function calls itself. Inheritance is a mechanism in OOP where a class inherits properties of another class. Heap is a region of memory used for dynamic memory allocation.
Recursion can be used to solve problems that can be broken down into smaller sub-problems.
Inheritance allows for code reuse and helps in creating a hierarchy of classes.
Heap is used for dynamic memory allocation in la...
I applied via Campus Placement and was interviewed before Sep 2019. There were 4 interview rounds.
I applied via Campus Placement and was interviewed before Apr 2021. There were 2 interview rounds.
The test consist verbal, logical and quantitative sections and you need to score 50% more in all three.
I applied via Naukri.com and was interviewed in Jul 2020. There were 3 interview rounds.
I applied via Recruitment Consultant and was interviewed in Dec 2018. There were 3 interview rounds.
Firewall is a network security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules.
Firewall acts as a barrier between a trusted, secure internal network and another network, such as the Internet.
It examines each packet of data that passes through it and determines whether to allow or block the traffic based on the set of rules.
Firewalls can be hardware or softwa...
BGP attributes are used to determine the best path for routing traffic between networks.
BGP attributes include: AS Path, Next Hop, Local Preference, MED, Origin, and Community
AS Path is a list of autonomous systems that the route has passed through
Next Hop is the IP address of the next router on the path
Local Preference is used to indicate the preferred path for outbound traffic
MED (Multi-Exit Discriminator) is used to...
VPN stands for Virtual Private Network. It allows secure remote access to a private network over the internet.
VPN creates a secure and encrypted connection between the user's device and the private network.
It masks the user's IP address and location, providing anonymity and privacy.
VPN uses different protocols such as PPTP, L2TP, IPSec, and OpenVPN.
It can be used to access geographically restricted content, bypass cens...
Routing protocols are used to determine the best path for data to travel in a network.
Distance Vector protocols: RIP, IGRP, EIGRP
Link State protocols: OSPF, IS-IS
Hybrid protocols: BGP
Path Vector protocols: BGP
IGP vs EGP
VTP stands for VLAN Trunking Protocol, used to manage VLANs in a switched network.
VTP is a Cisco proprietary protocol.
It allows for easy VLAN management by propagating VLAN information across the network.
VTP operates in three modes: server, client, and transparent.
Server mode allows for VLAN creation, deletion, and modification.
Client mode receives and stores VLAN information.
Transparent mode forwards VTP messages but ...
Routers connect networks while firewalls protect networks from unauthorized access.
Routers direct traffic between networks while firewalls filter traffic based on predefined rules.
Routers operate at layer 3 of the OSI model while firewalls operate at layer 4 or higher.
Examples of routers include Cisco routers, while examples of firewalls include Fortinet firewalls.
Routers can be used to segment networks while firewalls...
I applied via Campus Placement and was interviewed before May 2020. There were 4 interview rounds.
Trees and Graphs are data structures used to represent relationships between objects. Trees are hierarchical while Graphs are non-hierarchical.
Trees have a single root node while Graphs can have multiple starting points
Trees have parent-child relationships while Graphs have edges connecting nodes
Trees are used for hierarchical data like file systems while Graphs are used for non-hierarchical data like social networks
Tr...
I applied via Walk-in and was interviewed before Apr 2020. There were 4 interview rounds.
I applied via Campus Placement and was interviewed before Nov 2020. There were 4 interview rounds.
Infosys is a leading global technology services and consulting company with a strong reputation for innovation and client satisfaction.
Infosys has a strong track record of delivering successful projects and solutions to clients
The company has a culture of continuous learning and development, providing opportunities for growth
Infosys is known for its focus on innovation and cutting-edge technologies
The company has a glo...
based on 1 interview
Interview experience
Devops Engineer
55
salaries
| ₹4 L/yr - ₹11.4 L/yr |
Software Engineer
22
salaries
| ₹4 L/yr - ₹7.2 L/yr |
Project Manager
11
salaries
| ₹7 L/yr - ₹17 L/yr |
Cloud Security Engineer
7
salaries
| ₹4.5 L/yr - ₹6 L/yr |
Cloud Operations Manager
6
salaries
| ₹18.7 L/yr - ₹24 L/yr |
TCS
Accenture
Cognizant
Infosys