Filter interviews by
I applied via Job Fair and was interviewed in Dec 2024. There were 3 interview rounds.
Questions regarding the fundamentals of cybersecurity, including arithmetic operations and logical reasoning.
Top trending discussions
posted on 20 Dec 2024
posted on 21 Aug 2024
STP loop prevention is achieved by blocking redundant paths in a network to prevent loops.
STP (Spanning Tree Protocol) identifies redundant paths in a network
STP selects a root bridge to be the central point of the network
STP blocks certain ports to prevent loops while still allowing for redundancy
If a link fails, STP will unblock a previously blocked port to maintain connectivity
I applied via Naukri.com and was interviewed in Jul 2024. There was 1 interview round.
TCP IP Header contains information such as source and destination IP addresses, port numbers, sequence numbers, and more.
Source IP address
Destination IP address
Source port number
Destination port number
Sequence number
Acknowledgment number
Header length
Checksum
App ID in Palo Alto Firewalls is a feature that identifies applications on the network based on various parameters.
App ID uses multiple methods to identify applications, including port-based, protocol-based, and application signature-based identification.
It allows administrators to create policies based on specific applications rather than just ports or protocols.
App ID helps in enhancing security by allowing granular ...
SP3 Architecture of Palo Alto Firewalls refers to Security Processing Plane, Control Plane, and Data Plane.
SP3 Architecture consists of Security Processing Plane (SP), Control Plane (C), and Data Plane (D)
Security Processing Plane (SP) handles security functions like threat prevention and decryption
Control Plane (C) manages routing and firewall policies
Data Plane (D) processes and forwards traffic based on firewall pol...
I applied via Naukri.com and was interviewed in Feb 2024. There was 1 interview round.
I am currently working as a Security Analyst, responsible for monitoring and analyzing security threats, implementing security measures, and conducting security assessments.
Monitoring and analyzing security threats to identify potential risks
Implementing security measures to protect systems and data
Conducting security assessments to identify vulnerabilities and recommend solutions
Collaborating with IT teams to ensure s...
Cyber security is the practice of protecting systems, networks, and data from digital attacks.
Involves protecting computers, servers, mobile devices, networks, and data from unauthorized access or damage
Includes implementing security measures such as firewalls, antivirus software, encryption, and multi-factor authentication
Cyber security professionals work to prevent, detect, and respond to cyber threats
Examples of cyb...
I applied via Walk-in and was interviewed in Feb 2024. There were 2 interview rounds.
Basic question like as time ditance
Basic of dsa sql dbms
I applied via Approached by Company and was interviewed in Oct 2023. There were 2 interview rounds.
posted on 23 Jun 2022
I applied via LinkedIn and was interviewed in May 2022. There were 2 interview rounds.
based on 1 interview
Interview experience
based on 1 review
Rating in categories
Design Specialist
2.1k
salaries
| ₹1 L/yr - ₹6.5 L/yr |
Design Engineer
1.7k
salaries
| ₹2 L/yr - ₹10.6 L/yr |
Software Engineer
1.2k
salaries
| ₹3.7 L/yr - ₹15.1 L/yr |
GIS Engineer
1.1k
salaries
| ₹1 L/yr - ₹6 L/yr |
Senior Design Engineer
894
salaries
| ₹4.2 L/yr - ₹14.9 L/yr |
TCS
Infosys
Wipro
HCLTech