Filter interviews by
posted on 10 Mar 2022
I applied via Referral and was interviewed in Sep 2021. There was 1 interview round.
Top trending discussions
posted on 23 Feb 2024
I applied via Naukri.com and was interviewed before Feb 2023. There were 2 interview rounds.
I applied via Naukri.com and was interviewed before Sep 2022. There were 3 interview rounds.
IPsec VPN works by encrypting and authenticating all traffic between two endpoints over the internet.
IPsec VPN uses protocols like AH (Authentication Header) and ESP (Encapsulating Security Payload) to provide security.
It creates a secure tunnel between the two endpoints, ensuring confidentiality, integrity, and authenticity of the data.
IPsec VPN can be configured in different modes like transport mode and tunnel mode.
...
VPC stands for Virtual Private Cloud, a virtual network dedicated to a single account within a cloud provider's infrastructure.
VPC allows users to define their own virtual network in the cloud
It provides control over network settings such as IP address range, subnets, route tables, and network gateways
VPC helps in isolating resources and providing a secure environment within the cloud
Examples of cloud providers offerin...
Sandbox inspection is a security mechanism that isolates and analyzes suspicious files in a controlled environment.
Sandbox creates a virtual environment to execute and observe potentially malicious files.
It monitors the behavior of the file to determine if it is safe or malicious.
Sandbox can detect malware by analyzing its actions without risking the actual system.
Common sandbox tools include Cuckoo, FireEye, and Palo
DNS sinkhole is a technique used to redirect malicious traffic to a controlled server for analysis or blocking.
DNS sinkhole involves redirecting DNS queries for malicious domains to a sinkhole server.
It can be used to prevent malware from communicating with its command and control server.
Sinkholing can also be used to gather intelligence on malicious activities by analyzing the traffic.
Popular tools like BIND and Pi-ho
Persistence type in load balancer refers to the method used to maintain session affinity for client requests.
Persistence type ensures that subsequent requests from the same client are directed to the same server.
Common persistence types include source IP, cookie-based, SSL session ID, and URI-based.
For example, source IP persistence uses the client's IP address to route subsequent requests to the same server.
Packet capture process involves capturing network traffic for analysis and troubleshooting.
Use tools like Wireshark or tcpdump to capture packets
Specify the network interface to capture traffic from
Apply filters to capture specific packets of interest
Analyze captured packets for troubleshooting network issues
I applied via Referral
I am open to any location that offers growth opportunities and a challenging work environment.
Open to relocation for the right opportunity
Prefer locations with strong networking infrastructure
Interested in locations with tech hubs or opportunities for professional development
My current CCTC is $80,000 per year.
Current CCTC is $80,000 per year
CCTC may include salary, bonuses, benefits, etc.
Negotiable based on experience and qualifications
Border Gateway Protocol
BGP stands for Border Gateway Protocol
It is a standardized exterior gateway protocol used to exchange routing information between different autonomous systems on the internet
BGP helps in determining the best path for data to travel between networks
It is commonly used by Internet Service Providers (ISPs) and large organizations to connect to multiple networks
BGP operates on TCP port 179
Routers are networking devices that forward data packets between computer networks.
Routers operate at the network layer of the OSI model
They use routing tables to determine the best path for data packets
Routers can connect different types of networks, such as LANs and WANs
Expected CTC (Cost to Company) for the position
ECTC stands for Expected Cost to Company
It includes salary, bonuses, benefits, and any other compensation offered by the employer
Candidates should provide their expected salary range based on their experience and skills
I applied via Job Portal and was interviewed in Nov 2024. There were 2 interview rounds.
I would like simple test
Normal communication check
A loop is a sequence of instructions that is continually repeated until a certain condition is met. An IP (Internet Protocol) address is a unique numerical label assigned to each device connected to a computer network.
A loop is used in programming to execute a block of code repeatedly until a specific condition is met.
There are different types of loops such as for loop, while loop, and do-while loop.
An IP address is us...
BGP, OSPF, and VPN are all protocols used in networking to facilitate communication and secure data transmission.
BGP (Border Gateway Protocol) is used to exchange routing information between different autonomous systems on the internet.
OSPF (Open Shortest Path First) is an interior gateway protocol used to find the best path for routing within a single autonomous system.
VPN (Virtual Private Network) is a technology tha...
I interned at a telecommunications company where I gained hands-on experience in configuring network devices and troubleshooting network issues.
Configured routers and switches to optimize network performance
Assisted in setting up VLANs and implementing security protocols
Troubleshooted network connectivity issues for end users
Participated in network infrastructure upgrades and maintenance
Desktop Engineer
4
salaries
| ₹2.5 L/yr - ₹3 L/yr |
Android Developer
4
salaries
| ₹2.5 L/yr - ₹2.5 L/yr |
Front end Developer
4
salaries
| ₹1 L/yr - ₹3.5 L/yr |
Software Tester
3
salaries
| ₹1.8 L/yr - ₹3.2 L/yr |
IOS Developer
3
salaries
| ₹2 L/yr - ₹3.8 L/yr |
TCS
Infosys
Wipro
HCLTech