Filter interviews by
Clear (1)
I applied via Referral and was interviewed in Jan 2021. There were 3 interview rounds.
Top trending discussions
posted on 13 Oct 2022
I applied via Company Website and was interviewed before Oct 2021. There were 3 interview rounds.
Cyber attacks can be classified into various types based on their nature and impact.
Malware attacks (e.g. viruses, worms, trojans)
Phishing attacks (e.g. social engineering, spear phishing)
Denial of Service (DoS) attacks
Man-in-the-middle (MitM) attacks
SQL injection attacks
Cross-site scripting (XSS) attacks
Advanced Persistent Threats (APTs)
Ransomware attacks
Cryptojacking attacks
IoT-based attacks
Password attacks (e.g. bru
DDoS stands for Distributed Denial of Service. It is a type of cyber attack that aims to make a website or network unavailable to its users.
DDoS attacks involve overwhelming a website or network with traffic from multiple sources, making it impossible for legitimate users to access it.
Attackers use botnets, which are networks of compromised devices, to launch DDoS attacks.
There are various types of DDoS attacks, includ...
I applied via Recruitment Consultant and was interviewed in Nov 2019. There were 3 interview rounds.
I applied via Naukri.com and was interviewed in Oct 2022. There were 5 interview rounds.
posted on 2 Aug 2024
I applied via LinkedIn and was interviewed before Aug 2023. There was 1 interview round.
A Security Engineer is responsible for protecting an organization's computer systems and networks from cyber threats.
Designing and implementing security measures to protect computer systems and networks
Monitoring for security breaches and investigating violations
Installing security software and regularly updating systems
Conducting security assessments and audits
Responding to security incidents and providing incident re
I applied via Approached by Company and was interviewed in Jun 2022. There was 1 interview round.
Router and switch configuration
Router configuration involves setting up IP addresses, routing protocols, and security features
Switch configuration involves VLANs, port settings, and link aggregation
Both require knowledge of command line interfaces and network topologies
Examples include configuring OSPF on a router and setting up a trunk port on a switch
A protocol is a set of rules that governs the communication between devices in a network. There are several types of protocols.
A protocol defines the format, timing, sequencing, and error control of data transmission.
Protocols can be categorized into network protocols, transport protocols, and application protocols.
Examples of network protocols include IP (Internet Protocol), ICMP (Internet Control Message Protocol), a...
AD stands for Active Directory, which is a directory service used in Windows environments. Range refers to a specific set of values or a span of numbers.
AD is a centralized database that stores information about network resources, such as users, computers, and groups.
It provides authentication and authorization services, allowing users to access resources based on their permissions.
AD uses a hierarchical structure with...
The OSI Model is a conceptual framework that standardizes the functions of a communication system into seven layers.
The OSI Model stands for Open Systems Interconnection Model.
It was developed by the International Organization for Standardization (ISO) in 1984.
The model helps in understanding how different network protocols and technologies interact.
It divides the network communication process into seven layers, each w...
The layers that call to the heart of OSI are the Transport layer and the Application layer.
The Transport layer is responsible for the end-to-end delivery of data and ensures reliable communication between hosts.
The Application layer provides services directly to the end-user and includes protocols like HTTP, FTP, SMTP, etc.
These layers interact with the heart of the OSI model, which is the core of the network architect...
The protocol with the lowest AD value is OSPF (Open Shortest Path First).
AD (Administrative Distance) is a value used by routers to determine the best path for forwarding packets.
Lower AD value indicates a more preferred route.
OSPF has an AD value of 110, which is lower than other routing protocols like RIP (120) and EIGRP (90).
Protocols that work with Application layers include HTTP, FTP, SMTP, DNS, and SNMP.
HTTP (Hypertext Transfer Protocol) is used for web browsing and communication between web servers and clients.
FTP (File Transfer Protocol) is used for transferring files between a client and a server.
SMTP (Simple Mail Transfer Protocol) is used for sending and receiving email messages.
DNS (Domain Name System) is used for translating doma...
I applied via Referral and was interviewed before Nov 2021. There were 2 interview rounds.
based on 7 reviews
Rating in categories
Associate Engineer
77
salaries
| ₹0 L/yr - ₹0 L/yr |
Shift Manager
65
salaries
| ₹0 L/yr - ₹0 L/yr |
Assistant Manager
60
salaries
| ₹0 L/yr - ₹0 L/yr |
Program Manager
51
salaries
| ₹0 L/yr - ₹0 L/yr |
Network Security Engineer
50
salaries
| ₹0 L/yr - ₹0 L/yr |
Web Werks
Sify Technologies
Nxtgen Datacenter Cloud Technologies
STT Global Data Centres India