Filter interviews by
I applied via Job Fair and was interviewed in Dec 2024. There were 3 interview rounds.
Questions regarding the fundamentals of cybersecurity, including arithmetic operations and logical reasoning.
Top trending discussions
posted on 21 Aug 2024
STP loop prevention is achieved by blocking redundant paths in a network to prevent loops.
STP (Spanning Tree Protocol) identifies redundant paths in a network
STP selects a root bridge to be the central point of the network
STP blocks certain ports to prevent loops while still allowing for redundancy
If a link fails, STP will unblock a previously blocked port to maintain connectivity
I applied via Referral and was interviewed in Jun 2024. There was 1 interview round.
Routing is the process of selecting the best path for network traffic to reach its destination.
Routing involves determining the optimal path for data packets to travel from the source to the destination.
Routers use routing tables to make decisions on how to forward packets based on destination IP addresses.
There are different types of routing protocols such as RIP, OSPF, EIGRP, and BGP.
Static routing involves manually ...
Switching is a networking technique used to forward data packets between devices on a computer network.
Switching involves the process of receiving, analyzing, and forwarding data packets within a network.
Switches operate at Layer 2 (Data Link Layer) of the OSI model.
Switches use MAC addresses to determine the destination of data packets.
Switches create separate collision domains and broadcast domains, improving network...
I applied via Naukri.com and was interviewed in Feb 2024. There was 1 interview round.
I am currently working as a Security Analyst, responsible for monitoring and analyzing security threats, implementing security measures, and conducting security assessments.
Monitoring and analyzing security threats to identify potential risks
Implementing security measures to protect systems and data
Conducting security assessments to identify vulnerabilities and recommend solutions
Collaborating with IT teams to ensure s...
Cyber security is the practice of protecting systems, networks, and data from digital attacks.
Involves protecting computers, servers, mobile devices, networks, and data from unauthorized access or damage
Includes implementing security measures such as firewalls, antivirus software, encryption, and multi-factor authentication
Cyber security professionals work to prevent, detect, and respond to cyber threats
Examples of cyb...
I applied via Walk-in and was interviewed in Feb 2024. There were 2 interview rounds.
Basic question like as time ditance
Basic of dsa sql dbms
The OSI model is a conceptual framework that standardizes the functions of a telecommunication or computing system into seven layers.
The OSI model stands for Open Systems Interconnection model.
It helps in understanding how different networking protocols work together.
Each layer in the OSI model has specific functions and communicates with adjacent layers.
Examples of OSI model layers include physical layer, data link la
I applied via Approached by Company and was interviewed in Oct 2023. There were 2 interview rounds.
posted on 23 Jun 2022
I applied via LinkedIn and was interviewed in May 2022. There were 2 interview rounds.
based on 1 interview
Interview experience
based on 1 review
Rating in categories
Design Specialist
2.1k
salaries
| ₹1 L/yr - ₹6.5 L/yr |
Design Engineer
1.7k
salaries
| ₹2 L/yr - ₹10.6 L/yr |
Software Engineer
1.2k
salaries
| ₹3.7 L/yr - ₹15.1 L/yr |
GIS Engineer
1.1k
salaries
| ₹1 L/yr - ₹6 L/yr |
Senior Design Engineer
894
salaries
| ₹4.2 L/yr - ₹14.9 L/yr |
TCS
Infosys
Wipro
HCLTech