Filter interviews by
Phase 1 establishes secure communication channel, Phase 2 sets up secure data transfer within the channel.
Phase 1 negotiates security parameters and establishes a secure channel between two IPsec peers.
Phase 2 sets up secure data transfer within the established secure channel.
Phase 1 uses ISAKMP (Internet Security Association and Key Management Protocol) for key exchange.
Phase 2 uses IPsec protocols like ESP (Encapsula...
SSL authentication involves multiple steps to verify the identity of the server and establish a secure connection.
Client sends a request to the server over HTTPS
Server responds with its SSL certificate
Client verifies the certificate's authenticity using a trusted CA
Client generates a session key and encrypts it with the server's public key
Server decrypts the session key using its private key
Client and server can now co
Load balancer distributes incoming network traffic across multiple servers to ensure no single server is overwhelmed.
Distributes traffic evenly across servers
Improves reliability and scalability
Can be hardware-based or software-based
Examples: F5 BIG-IP, NGINX, HAProxy
Application gateway is a load balancer that manages traffic to web applications.
Acts as a reverse proxy to distribute incoming traffic across multiple servers
Provides SSL termination, URL-based routing, and session persistence
Can perform application layer (HTTP) load balancing
Supports WAF (Web Application Firewall) for enhanced security
Reducing latency involves optimizing network infrastructure, minimizing data transfer distances, and utilizing caching techniques.
Optimize network infrastructure by using faster hardware and reducing network congestion
Minimize data transfer distances by using content delivery networks (CDNs) and edge computing
Utilize caching techniques to store frequently accessed data closer to the end user
Implementing load balancing
ER circuit is a dedicated point-to-point connection while IPsec tunnel is a secure virtual private network connection over the internet.
ER circuit is a physical connection between two locations, typically provided by a telecom provider.
IPsec tunnel is a secure encrypted connection over the internet, often used for connecting remote offices or users.
ER circuit offers dedicated bandwidth and low latency, suitable for hig...
Top trending discussions
I applied via Naukri.com and was interviewed in May 2022. There were 2 interview rounds.
Transit Gateway is a service that enables customers to connect their Amazon Virtual Private Clouds (VPCs) and on-premises networks to a single gateway.
Transit Gateway simplifies network architecture by allowing customers to connect VPCs and VPNs to a single gateway.
It provides centralized routing and inspection of traffic between VPCs and VPNs.
Route 53 is a DNS service that can be used to route traffic to Transit Gatew...
I was interviewed in Jan 2025.
It was easy, bacis aptitude questions asked in this round
posted on 20 Dec 2024
I applied via Referral and was interviewed in Nov 2024. There were 3 interview rounds.
User profile data is securely stored in a centralized database with access control and encryption.
Store user profile data in a centralized database
Implement access control to restrict unauthorized access
Encrypt sensitive user information for added security
I find the Kubernetes package to be complex due to its extensive features and configurations.
Kubernetes has a steep learning curve with various concepts like pods, deployments, services, etc.
Managing Kubernetes clusters requires understanding of networking, storage, security, and scalability.
Configuring Kubernetes involves YAML files, API resources, and command-line tools like kubectl.
Troubleshooting issues in Kubernet...
Application model in SCCM is used to deploy applications based on user-centric requirements, while package model is used for traditional software deployment.
Application model allows for user-centric deployments and dependencies, while package model is more rigid and requires manual intervention for dependencies.
Application model supports user device affinity, allowing for targeted deployments to specific users or devic...
I applied via Referral and was interviewed in Oct 2024. There were 2 interview rounds.
VM integration with self-hosted agent allows for seamless deployment and management of resources.
Self-hosted agents can be used to run tasks on virtual machines (VMs) in a cloud environment.
Integration involves configuring the self-hosted agent to communicate with the VMs for deployment and management.
This setup enables flexibility and control over the resources being utilized.
DevOps practices involve collaboration between development and operations teams to automate processes and improve efficiency.
Continuous integration and continuous deployment (CI/CD)
Infrastructure as code (IaC)
Automated testing
Monitoring and logging
Collaboration and communication between teams
I applied via Company Website and was interviewed in Oct 2024. There was 1 interview round.
I have worked on AWS, Azure, and Google Cloud Platform.
Worked extensively on AWS services such as EC2, S3, RDS, and Lambda
Experience with Azure services like Virtual Machines, Blob Storage, and Azure Functions
Familiar with Google Cloud Platform services including Compute Engine, Cloud Storage, and Cloud Functions
I have worked with automation tools such as Ansible, Terraform, and Jenkins.
Ansible
Terraform
Jenkins
AWS and Azure are two major cloud computing platforms with differences in services, pricing, and market share.
AWS has a larger market share compared to Azure
Azure is known for its strong integration with Microsoft products
AWS offers a wider range of services compared to Azure
Azure provides hybrid cloud solutions with Azure Stack
Pricing models differ between AWS and Azure
Cloud concepts refer to the fundamental ideas and principles behind cloud computing technology.
Cloud computing models (IaaS, PaaS, SaaS)
Virtualization
Scalability
Elasticity
On-demand self-service
Resource pooling
Metered service
Examples: AWS, Azure, Google Cloud
I applied via Company Website and was interviewed in Sep 2024. There was 1 interview round.
Cloud services are categorized into three main types: Infrastructure as a Service (IaaS), Platform as a Service (PaaS), and Software as a Service (SaaS).
Infrastructure as a Service (IaaS) provides virtualized computing resources over the internet, such as virtual servers and storage.
Platform as a Service (PaaS) offers a platform allowing customers to develop, run, and manage applications without the complexity of build...
Fastconnect and IPsec tunnels are networking solutions in OCI for secure and reliable connectivity.
Fastconnect provides a private connection between on-premises network and OCI without going through the public internet.
IPsec tunnels create secure communication channels over the public internet between on-premises network and OCI.
Both Fastconnect and IPsec tunnels ensure data privacy, integrity, and availability for net...
Enable audit logs in OCI for monitoring and compliance purposes.
Navigate to the OCI Console and select the compartment you want to enable audit logs for.
Go to 'Audit' under 'Identity' and click on 'Create Configuration'.
Choose the services you want to audit, set the log retention period, and specify the log object storage bucket.
Review and create the configuration to start logging audit events.
Monitor the audit logs in...
File storage is a method of storing and organizing digital files in a structured manner.
File storage involves saving data in a structured format for easy retrieval and management
It can be done locally on a computer or on a network server
Examples include saving documents, images, videos, and other digital files on a computer's hard drive or in cloud storage services like Google Drive or Dropbox
Alarm definition and event rules in OCI are used to monitor and manage resources based on predefined conditions.
Alarm definitions specify the conditions under which an alarm is triggered in OCI Monitoring service
Event rules define actions to be taken when specific events occur in OCI Events service
Both are essential for proactive monitoring and management of resources in OCI
I was interviewed in Jul 2024.
2 questions are there 1 is a moderate dsa question & 2nd is a SQL question
based on 1 interview
Interview experience
Devops Engineer
50
salaries
| ₹4 L/yr - ₹11 L/yr |
Software Engineer
22
salaries
| ₹4 L/yr - ₹8.9 L/yr |
Project Manager
11
salaries
| ₹7 L/yr - ₹17 L/yr |
Cloud Security Engineer
7
salaries
| ₹4.5 L/yr - ₹6 L/yr |
Sccm Administrator
7
salaries
| ₹7.8 L/yr - ₹11 L/yr |
Amazon Web Services
Microsoft Azure
Google Cloud
IBM