Filter interviews by
I applied via LinkedIn and was interviewed in Nov 2021. There were 3 interview rounds.
I applied via LinkedIn and was interviewed in Oct 2022. There were 3 interview rounds.
Some questions based on information security.
Fortigate uses various techniques to stop DOS attacks.
Fortigate can detect and block traffic from known malicious sources
It can also limit the number of connections from a single IP address
Fortigate can use rate limiting to prevent excessive traffic from a single source
It can also use packet filtering to drop packets from known DOS attack patterns
Fortigate can also use behavior-based detection to identify and block abn
posted on 27 Feb 2024
DNS port number is 53
DNS port number is 53 for both TCP and UDP protocols
It is used for DNS queries and responses
Firewalls and network devices need to allow traffic on port 53 for DNS to function properly
I applied via Company Website and was interviewed before May 2023. There was 1 interview round.
SIEM works by collecting and analyzing security data to detect and respond to cyber threats. Mitre attack framework and Cyber kill chain are used to categorize and analyze attacks.
SIEM collects security data from various sources like logs, network traffic, and endpoints for analysis.
Mitre attack framework provides a structured way to categorize and analyze cyber threats based on tactics and techniques used by attackers...
I applied via Company Website and was interviewed before Oct 2022. There were 4 interview rounds.
posted on 2 Aug 2021
I applied via Recruitment Consultant and was interviewed in Jul 2021. There was 1 interview round.
To troubleshoot internet issue, check network connectivity, DNS settings, firewall, and router configuration.
Check if other devices are able to connect to the internet
Verify DNS settings and try using a different DNS server
Check firewall settings and ensure that the required ports are open
Check router configuration and restart if necessary
I applied via Referral and was interviewed in Oct 2022. There were 3 interview rounds.
Designing HA in active passive environment involves ensuring redundancy and failover mechanisms.
Identify critical components and services that require high availability
Implement redundancy by setting up a secondary system that can take over in case of failure
Ensure automatic failover mechanisms are in place to minimize downtime
Regularly test the failover mechanisms to ensure they work as expected
Consider load balancing...
posted on 9 Nov 2022
I applied via LinkedIn and was interviewed in Oct 2022. There were 2 interview rounds.
Questions on router routing table, IPsec VPN types, application slowness troubleshooting, and F5 LTM.
Router installs routes in routing table using routing protocols such as OSPF, BGP, etc.
IPsec VPN types include site-to-site, remote access, and extranet VPNs.
Application slowness troubleshooting involves checking network latency, server performance, and application code.
F5 LTM questions may include load balancing algori
To troubleshoot IPsec vpns, check configuration, logs, and network connectivity.
Check if the configuration is correct and matches on both ends
Check the logs for any error messages or warnings
Verify network connectivity between the two endpoints
Check for any firewall or NAT issues
Ensure that the correct encryption and authentication algorithms are being used
Check for any MTU issues
Verify that the VPN tunnel is up and ru
SSL persistence is a feature in F5 that allows a client to maintain a secure connection with the same server during a session.
SSL persistence ensures that a client's SSL session is maintained with the same server throughout the session.
This feature is useful in scenarios where multiple servers are used to handle client requests.
SSL persistence can be configured based on SSL session ID, SSL session ticket, or SSL sessio...
I applied via LinkedIn and was interviewed in Oct 2022. There were 3 interview rounds.
Some questions based on information security.
Fortigate uses various techniques to stop DOS attacks.
Fortigate can detect and block traffic from known malicious sources
It can also limit the number of connections from a single IP address
Fortigate can use rate limiting to prevent excessive traffic from a single source
It can also use packet filtering to drop packets from known DOS attack patterns
Fortigate can also use behavior-based detection to identify and block abn
posted on 27 Jun 2024
I applied via Campus Placement and was interviewed before Jun 2023. There were 2 interview rounds.
Technical networking MCQ
Network layers are a hierarchical approach to network communication, with each layer responsible for specific functions.
There are seven layers in the OSI model: Physical, Data Link, Network, Transport, Session, Presentation, and Application.
Each layer performs specific tasks and communicates with adjacent layers to facilitate data transfer.
For example, the Physical layer deals with the physical connection between devic...
Analyst
97
salaries
| ₹1.9 L/yr - ₹4.1 L/yr |
Senior Analyst
55
salaries
| ₹2.7 L/yr - ₹5.2 L/yr |
Operations Analyst
34
salaries
| ₹2.1 L/yr - ₹4.5 L/yr |
Specialist
21
salaries
| ₹3.6 L/yr - ₹6.5 L/yr |
Technical Lead
16
salaries
| ₹19.1 L/yr - ₹31 L/yr |
TCS
Infosys
Wipro
HCLTech