Filter interviews by
I keep myself updated by attending conferences, reading blogs, and taking online courses.
Attend conferences and workshops to learn from experts
Read blogs and articles to stay updated on latest trends
Take online courses and tutorials to gain practical knowledge
Experiment with new technology by building projects
Collaborate with peers to learn from their experiences
I was interviewed in Oct 2024.
To create an IPsec tunnel, configure the necessary parameters on both ends of the connection.
Configure the IPsec parameters such as encryption algorithms, authentication methods, and key exchange protocols on both the source and destination devices.
Establish a secure communication channel by setting up the IPsec tunnel between the two endpoints.
Ensure that the IPsec tunnel is properly configured and tested for secure d...
To troubleshoot an IPsec tunnel, check configurations, verify connectivity, monitor logs, and use packet capture tools.
Check the IPsec configuration on both ends to ensure they match
Verify that the tunnel endpoints can reach each other
Monitor logs on both devices for any error messages related to the tunnel
Use packet capture tools like Wireshark to analyze traffic going through the tunnel
SSL VPN allows remote users to securely access the network from any location.
SSL VPN uses encryption to secure the connection between the remote user and the network.
It authenticates users before granting access to resources.
SSL VPN can be set up using a web browser or a client application.
It provides a secure way for remote employees to access company resources.
SSL VPN can be configured to restrict access based on use
Configuring IPsec tunnel for 3 different locations and explaining traffic flow
Configure IPsec tunnel on routers/firewalls at each location
Set up IPsec policies for encryption and authentication
Define IPsec tunnel endpoints and establish secure communication
Ensure proper routing between locations for traffic flow
Monitor and troubleshoot the IPsec tunnel for any issues
To upgrade to Palo Alto firewall and Fortigate, follow these steps: plan the upgrade, backup configurations, test the upgrade in a lab environment, schedule downtime, perform the upgrade, test functionality post-upgrade.
Plan the upgrade by determining the current firewall configurations and requirements for the new firewalls.
Backup configurations of the existing firewalls to ensure data safety in case of any issues dur...
To troubleshoot both locations IPsec tunnel being down, check configurations, network connectivity, and security policies.
Check the IPsec configurations on both ends to ensure they match
Verify network connectivity between the two locations
Check firewall and security policies to ensure they are not blocking the IPsec traffic
Review logs on both ends for any error messages or indications of the issue
Restart the IPsec serv
I applied via Naukri.com and was interviewed in Oct 2024. There were 2 interview rounds.
Ai interview backend microservices core java
I applied via Naukri.com and was interviewed in Aug 2024. There was 1 interview round.
Binary search is a fast search algorithm that finds the position of a target value within a sorted array.
Ensure the array is sorted before performing binary search.
Compare the target value with the middle element of the array.
If the target value is less than the middle element, search the left half of the array. If greater, search the right half.
Repeat the process until the target value is found or the subarray is empt
Merge sort is a divide and conquer algorithm that divides the input array into two halves, sorts them, and then merges them back together.
Divide the array into two halves recursively
Sort each half separately
Merge the sorted halves back together
I applied via Naukri.com and was interviewed in Jun 2022. There were 3 interview rounds.
2 c++ coding questions will be asked based on the STL and array operations
I applied via Approached by Company and was interviewed in Apr 2024. There was 1 interview round.
SIEM tools are security information and event management tools used to collect, analyze, and report on security data.
SIEM tools help organizations to detect and respond to security incidents in real-time.
They collect data from various sources such as network devices, servers, and applications.
SIEM tools use correlation rules to identify patterns and anomalies that may indicate a security threat.
Examples of SIEM tools i...
Yes, I have experience writing playbooks rules for automation in various engineering projects.
Yes, I have written playbooks rules using tools like Ansible for automating infrastructure tasks.
I have experience creating rule-based automation scripts to streamline engineering processes.
I can provide examples of playbooks I have written for automating deployment, configuration, and monitoring tasks.
Digital forensics working procedures involve collecting, preserving, analyzing, and presenting digital evidence in a legally admissible manner.
Collecting digital evidence from various sources such as computers, mobile devices, and cloud storage.
Preserving the integrity of the evidence by creating forensic images and maintaining a chain of custody.
Analyzing the evidence using specialized tools and techniques to uncover ...
Composite model in Power BI allows combining DirectQuery and Import data sources in a single report.
Composite model enables users to create relationships between tables from different data sources.
DirectQuery tables are connected to the data source in real-time, while Import tables are loaded into memory.
Users can create measures and calculations across both DirectQuery and Import tables in the same report.
Composite mo...
based on 7 reviews
Rating in categories
Technical Lead
326
salaries
| ₹7 L/yr - ₹21.5 L/yr |
Senior Software Engineer
231
salaries
| ₹4.2 L/yr - ₹15.5 L/yr |
Senior Analyst
226
salaries
| ₹2.5 L/yr - ₹8 L/yr |
Software Engineer
211
salaries
| ₹2 L/yr - ₹9.4 L/yr |
Lead Engineer
196
salaries
| ₹4 L/yr - ₹17 L/yr |
HCLTech
Wipro
Tech Mahindra
TCS