Filter interviews by
I applied via LinkedIn and was interviewed in May 2024. There were 3 interview rounds.
BGP attributes are used to make routing decisions in Border Gateway Protocol.
AS_PATH: Lists the autonomous systems a route has passed through.
NEXT_HOP: Specifies the next hop IP address for a route.
LOCAL_PREF: Used to influence outbound traffic from an AS.
ORIGIN: Indicates how a route was learned (IGP, EGP, or Incomplete).
To configure a firewall from scratch, you need to define rules, set up access control lists, configure NAT, and monitor traffic.
Define the purpose of the firewall and the network topology
Create rules to allow or block specific traffic based on IP addresses, ports, protocols, etc.
Set up access control lists to control traffic flow within the network
Configure Network Address Translation (NAT) to map internal IP addresses...
Implemented new security protocols to improve team efficiency
Introduced regular security training sessions for team members
Implemented automated security testing tools to streamline processes
Collaborated with IT team to create a more secure network infrastructure
Led incident response drills to improve team readiness
Provided ongoing support and guidance to team members on security best practices
Top trending discussions
CIBIL stands for Credit Information Bureau (India) Limited.
CIBIL is a credit information company in India that collects and maintains records of individuals' and companies' credit information.
It provides credit scores and reports to lenders to help them evaluate the creditworthiness of potential borrowers.
CIBIL plays a crucial role in the loan approval process by providing insights into an individual's credit history a
posted on 26 Mar 2020
I applied via Naukri.com and was interviewed before Mar 2019. There were 5 interview rounds.
posted on 24 Mar 2021
I applied via Walk-in and was interviewed in Feb 2021. There were 3 interview rounds.
KYC is the process of verifying the identity of a customer while AML is the process of preventing money laundering.
KYC is focused on identifying and verifying the identity of a customer
AML is focused on preventing money laundering and terrorist financing
KYC is a prerequisite for AML
KYC involves collecting and verifying customer information such as name, address, and identification documents
AML involves monitoring custo...
KYC is used to verify the identity of customers while AML is used to detect and prevent money laundering.
KYC is used to ensure that financial institutions are not used for illegal activities.
AML is not used in some areas because those areas may not have a high risk of money laundering.
KYC is mandatory in many countries for financial institutions to comply with regulations.
AML is used in areas where there is a high risk...
AML is used in financial institutions to prevent money laundering, while it is not commonly used in other industries.
AML is used in financial institutions to detect and prevent money laundering and terrorist financing.
It involves the identification and verification of customers, monitoring of transactions, and reporting of suspicious activities.
AML is not commonly used in other industries, although some may have simila...
posted on 9 Jan 2021
I applied via Referral
I applied via Naukri.com and was interviewed in Sep 2020. There were 3 interview rounds.
Log files are used to record events and actions in a system or application.
Log files can be used for debugging and troubleshooting.
They can also be used for auditing and compliance purposes.
Log files can help identify security breaches or unauthorized access.
They can be used to monitor system performance and identify bottlenecks.
Log files can be analyzed to gain insights into user behavior and usage patterns.
Debugging is the process of identifying and fixing errors in a program or project.
Debugging involves analyzing code and identifying errors
Tools like debuggers and logging can aid in the process
Common errors include syntax errors, logic errors, and runtime errors
Debugging should be done systematically and thoroughly
Testing and retesting is important to ensure all errors are fixed
Accessibility of variable or function
Variables and functions should be accessible to the parts of the code that need them
Accessibility can be controlled using access modifiers like public, private, and protected
Accessibility can also be affected by the scope of the variable or function
posted on 7 Jan 2021
I applied via Company Website and was interviewed in Dec 2020. There was 1 interview round.
posted on 15 Nov 2020
I applied via Referral and was interviewed in Oct 2020. There were 5 interview rounds.
based on 1 interview
Interview experience
based on 18 reviews
Rating in categories
PRE Sales Engineer
10
salaries
| ₹4.8 L/yr - ₹11.2 L/yr |
Sales Manager
7
salaries
| ₹6 L/yr - ₹14 L/yr |
Regional Sales Manager
5
salaries
| ₹10 L/yr - ₹12 L/yr |
Technical Consultant
5
salaries
| ₹4 L/yr - ₹12.4 L/yr |
Product Manager
4
salaries
| ₹10 L/yr - ₹13.9 L/yr |
Inflow Technologies
Redington
eSecForte Technologies
Progressive Infotech