Filter interviews by
I applied via LinkedIn and was interviewed in May 2024. There were 3 interview rounds.
BGP attributes are used to make routing decisions in Border Gateway Protocol.
AS_PATH: Lists the autonomous systems a route has passed through.
NEXT_HOP: Specifies the next hop IP address for a route.
LOCAL_PREF: Used to influence outbound traffic from an AS.
ORIGIN: Indicates how a route was learned (IGP, EGP, or Incomplete).
To configure a firewall from scratch, you need to define rules, set up access control lists, configure NAT, and monitor traffic.
Define the purpose of the firewall and the network topology
Create rules to allow or block specific traffic based on IP addresses, ports, protocols, etc.
Set up access control lists to control traffic flow within the network
Configure Network Address Translation (NAT) to map internal IP addresses...
Implemented new security protocols to improve team efficiency
Introduced regular security training sessions for team members
Implemented automated security testing tools to streamline processes
Collaborated with IT team to create a more secure network infrastructure
Led incident response drills to improve team readiness
Provided ongoing support and guidance to team members on security best practices
Top trending discussions
posted on 20 Dec 2024
I applied via Company Website and was interviewed in Aug 2023. There was 1 interview round.
I follow the Zero Trust security model, which assumes all networks are untrusted and verifies every user and device attempting to connect.
Implementing strict access controls based on user identity and device health
Utilizing multi-factor authentication for added security
Regularly monitoring and analyzing network traffic for anomalies
Segmenting networks to limit the impact of a potential breach
I follow APT groups such as APT28, APT29, and APT33 for threat intelligence and analysis.
APT28, also known as Fancy Bear, is associated with Russian military intelligence.
APT29, also known as Cozy Bear, is another Russian cyber espionage group.
APT33 is linked to Iranian cyber espionage activities.
Tracking APT groups helps in understanding their tactics, techniques, and procedures (TTPs).
posted on 20 Mar 2024
I applied via Company Website and was interviewed before Mar 2023. There were 2 interview rounds.
posted on 20 Dec 2024
posted on 25 Sep 2024
I applied via Company Website and was interviewed before Sep 2023. There were 2 interview rounds.
RBAC stands for Role-Based Access Control, a method of restricting network access based on roles assigned to users.
RBAC assigns permissions to roles, and roles to users
It simplifies access management by grouping users with similar access needs
RBAC helps enforce the principle of least privilege, granting only necessary permissions
Example: Admin role has full access, while User role has limited access
Cybersecurity is crucial in application security to protect sensitive data and prevent cyber attacks.
Cybersecurity helps in identifying and mitigating vulnerabilities in applications.
It ensures the confidentiality, integrity, and availability of data within applications.
Implementing secure coding practices and regular security assessments are essential in application security.
Examples include using encryption to protec...
I applied via Recruitment Consulltant and was interviewed before Oct 2023. There were 3 interview rounds.
Group discuaaions for real time scenarioa
UBS is a global financial services company that operates in wealth management, investment banking, asset management, and more.
UBS is a Swiss multinational investment bank and financial services company.
It offers services in wealth management, investment banking, asset management, and more.
UBS operates globally with offices in major financial centers around the world.
The company provides a range of financial products an...
posted on 4 Oct 2024
I applied via Approached by Company and was interviewed before Oct 2023. There were 2 interview rounds.
I applied via Walk-in and was interviewed before Apr 2022. There were 2 interview rounds.
Corporate actions refer to events initiated by a publicly-traded company that can affect the value of its securities.
Corporate actions can include stock splits, dividends, mergers and acquisitions, spin-offs, and rights issues.
These actions can have a significant impact on the price of a company's stock and can affect the value of an investor's portfolio.
Investors need to stay informed about corporate actions to make i...
The life cycle of a corporate action involves several stages from announcement to completion.
Corporate actions can include events such as mergers, acquisitions, stock splits, and dividend payments.
The first stage is the announcement, where the company publicly declares the event and its details.
Next, there is a record date where shareholders are identified and eligible to receive the benefits of the event.
The third sta...
Answering questions related to DRIP, Right/EXRI Event, CHOS and VOLU Event type, MT564, MT568, EX and Record Date.
DRIP stands for Dividend Reinvestment Plan, where dividends are reinvested to purchase additional shares of the same stock.
Right/EXRI Event refers to the event where a company issues new shares of stock to existing shareholders.
CHOS and VOLU Event type are both related to corporate actions, where CHOS refer...
based on 1 interview
Interview experience
PRE Sales Engineer
10
salaries
| ₹4.8 L/yr - ₹11.2 L/yr |
Sales Manager
7
salaries
| ₹6 L/yr - ₹14 L/yr |
Regional Sales Manager
5
salaries
| ₹10 L/yr - ₹12 L/yr |
Technical Consultant
5
salaries
| ₹4 L/yr - ₹12.4 L/yr |
Product Manager
4
salaries
| ₹10 L/yr - ₹13.9 L/yr |
Inflow Technologies
Redington
RAH Infotech
eSecForte Technologies