Upload Button Icon Add office photos
Engaged Employer

i

This company page is being actively managed by Inspira Enterprise India Limited Team. If you also belong to the team, you can get access from here

Inspira Enterprise India Limited Verified Tick

Compare button icon Compare button icon Compare
3.7

based on 455 Reviews

Filter interviews by

Inspira Enterprise India Limited Cyber Security Engineer Interview Questions, Process, and Tips

Updated 10 Jul 2022

Inspira Enterprise India Limited Cyber Security Engineer Interview Experiences

1 interview found

I applied via Naukri.com and was interviewed in Jan 2022. There were 3 interview rounds.

Round 1 - Aptitude Test 

Basic aptitude test on mercer mettl platform. Limited time.

Round 2 - Assignment 

3 question on splunk.

Round 3 - One-on-one 

(5 Questions)

  • Q1. What is private and public IP address
  • Ans. 

    Private IP addresses are used within a local network, while public IP addresses are used to identify a network on the internet.

    • Private IP addresses are not unique on the internet and are used within a local network to identify devices.

    • Public IP addresses are unique on the internet and are used to identify a network on the internet.

    • Private IP addresses are in the range of 10.0.0.0 to 10.255.255.255, 172.16.0.0 to 172.31...

  • Answered by AI
  • Q2. How many hosts in class C IP address
  • Ans. 

    There are 256 hosts in a class C IP address.

    • Class C IP addresses have a subnet mask of 255.255.255.0

    • The first three octets are used for network identification

    • The last octet is used for host identification

    • The range of IP addresses in a class C network is from 192.0.0.0 to 223.255.255.255

    • Each octet has 8 bits, so the last octet can have 2^8 (256) possible values

  • Answered by AI
  • Q3. Give some example of vulnerable ports
  • Ans. 

    Vulnerable ports are those that are commonly targeted by attackers to gain unauthorized access to a system.

    • Port 21 (FTP)

    • Port 23 (Telnet)

    • Port 25 (SMTP)

    • Port 80 (HTTP)

    • Port 443 (HTTPS)

    • Port 3389 (Remote Desktop Protocol)

  • Answered by AI
  • Q4. What is sql injection
  • Ans. 

    SQL injection is a type of cyber attack where malicious SQL statements are inserted into an entry field to manipulate a database.

    • Allows attackers to access sensitive data or execute unauthorized actions

    • Occurs when user input is not properly sanitized

    • Can be prevented by using parameterized queries and input validation

    • Example: Entering ' OR 1=1;--' into a login form to bypass authentication

  • Answered by AI
  • Q5. What is the most recent vulnerability
  • Ans. 

    The most recent vulnerability is the PrintNightmare vulnerability in Windows Print Spooler service.

    • The vulnerability allows attackers to remotely execute code with system-level privileges.

    • It affects all versions of Windows and has a CVSS score of 8.8.

    • Microsoft has released patches for the vulnerability, but some experts suggest disabling the Print Spooler service as a temporary fix.

  • Answered by AI

Interview Preparation Tips

Interview preparation tips for other job seekers - Clear you basic knowledge on netwoking, OSI layers, security devices.

Skills evaluated in this interview

Interview questions from similar companies

Interview experience
5
Excellent
Difficulty level
Easy
Process Duration
Less than 2 weeks
Result
Selected Selected

I applied via Approached by Company and was interviewed in Oct 2024. There was 1 interview round.

Round 1 - Technical 

(5 Questions)

  • Q1. What is wireless
  • Ans. 

    Wireless refers to the transmission of data without the use of physical cables or wires.

    • Wireless technology uses radio waves to transmit data over a network.

    • Examples of wireless technology include Wi-Fi, Bluetooth, and cellular networks.

    • Wireless networks are convenient for mobile devices and allow for greater flexibility in connectivity.

  • Answered by AI
  • Q2. What is switch congratulations
  • Ans. 

    Switch congestion occurs when a network switch is overwhelmed with traffic, leading to delays or dropped packets.

    • Switch congestion can occur when there is a high volume of data being transmitted through the switch

    • It can lead to delays in data transmission or even dropped packets

    • Switch congestion can be alleviated by implementing Quality of Service (QoS) policies or upgrading to higher capacity switches

  • Answered by AI
  • Q3. Aruna wifi configuration
  • Q4. Wireless device configuration
  • Ans. 

    Wireless device configuration involves setting up and managing wireless networks for optimal performance.

    • Understand the network requirements and goals

    • Select appropriate wireless devices and access points

    • Configure SSIDs, security settings, and encryption protocols

    • Optimize placement of access points for coverage and performance

    • Monitor and troubleshoot network performance

  • Answered by AI
  • Q5. Customer support

Interview Preparation Tips

Interview preparation tips for other job seekers - Ok

Skills evaluated in this interview

Interview experience
4
Good
Difficulty level
-
Process Duration
-
Result
Not Selected
Round 1 - Technical 

(2 Questions)

  • Q1. What is VTP (VLAN Trunking Protocol)?
  • Ans. 

    VTP is a Cisco proprietary protocol used to manage VLAN configurations across a network.

    • VTP allows for centralized management of VLANs by automatically propagating VLAN information to all switches in the network.

    • It reduces the need to manually configure VLANs on each switch, making network administration more efficient.

    • VTP operates in client, server, and transparent modes, with the server being the switch that can crea...

  • Answered by AI
  • Q2. What actions would you take if the switch enters ROMMON mode after a reboot?
  • Ans. 

    To troubleshoot a switch in ROMMON mode after a reboot, follow these steps.

    • Check the configuration register value to ensure it is correct

    • Verify the boot image and configuration file are present and accessible

    • Attempt to boot the switch manually using the boot command

    • If necessary, reload the switch with a valid IOS image from a TFTP server

  • Answered by AI

Interview Preparation Tips

Interview preparation tips for other job seekers - They are having a fixed amount and asking us to accept the same to process offer letter.
Interview experience
3
Average
Difficulty level
-
Process Duration
-
Result
-
Round 1 - Technical 

(2 Questions)

  • Q1. Briefly explain the your network architecture.
  • Q2. Choose your best routing protocols
Interview experience
3
Average
Difficulty level
Moderate
Process Duration
Less than 2 weeks
Result
No response

I applied via Naukri.com and was interviewed in Nov 2024. There was 1 interview round.

Round 1 - Technical 

(3 Questions)

  • Q1. What is the SMTP?
  • Q2. What is the RSMTP?
  • Q3. Tell about TCP Rest
Interview experience
4
Good
Difficulty level
-
Process Duration
-
Result
-
Round 1 - Resume Shortlist 
Pro Tip by AmbitionBox:
Keep your resume crisp and to the point. A recruiter looks at your resume for an average of 6 seconds, make sure to leave the best impression.
View all tips
Round 2 - HR 

(2 Questions)

  • Q1. Salary related questions
  • Q2. Location and position

Interview Preparation Tips

Interview preparation tips for other job seekers - 3i infotech is the best company but salary is so poor

I applied via Naukri.com and was interviewed in Dec 2021. There were 3 interview rounds.

Interview Questionnaire 

2 Questions

  • Q1. CCNA networks, OSI model, IP address, DNS, DHCP, scenario based questions, security, different protocols
  • Q2. Mainly on CCNA basics and security

Interview Preparation Tips

Interview preparation tips for other job seekers - 4 rounds of interview it is not too tough to crack the interview if you know the basics of the concepts only if you are certified engineers they go deeper otherwise it is easy to get in here.depend on the project questions will be there
Interview experience
5
Excellent
Difficulty level
-
Process Duration
-
Result
-
Round 1 - HR 

(2 Questions)

  • Q1. Route switch firewall
  • Q2. Firewall Fortigate

Interview Preparation Tips

Interview preparation tips for other job seekers - Good company
Interview experience
4
Good
Difficulty level
Moderate
Process Duration
Less than 2 weeks
Result
Not Selected

I applied via Naukri.com and was interviewed in Jan 2024. There was 1 interview round.

Round 1 - Technical 

(3 Questions)

  • Q1. Packet flow in PALO ALTO FIREWALL?
  • Ans. 

    Packet flow in Palo Alto Firewall involves multiple stages including ingress, policy lookup, security policy enforcement, NAT, and egress.

    • Packet enters the firewall through an ingress interface

    • Firewall performs policy lookup to determine if the packet should be allowed or denied

    • If allowed, the packet goes through security policy enforcement which includes threat prevention, URL filtering, etc.

    • NAT (Network Address Trans...

  • Answered by AI
  • Q2. Ospf states and explain?
  • Ans. 

    OSPF (Open Shortest Path First) is a routing protocol used to determine the best path for data packets in a network.

    • OSPF is a link-state routing protocol

    • It uses Dijkstra's algorithm to calculate the shortest path

    • OSPF routers exchange link-state advertisements (LSAs)

    • It supports VLSM (Variable Length Subnet Masking)

    • OSPF areas are used to divide large networks into smaller segments

  • Answered by AI
  • Q3. Election of DR AND BDR IN OSPF?
  • Ans. 

    DR and BDR in OSPF are elected based on priority values, with the highest priority becoming the DR and the second highest becoming the BDR.

    • DR and BDR are elected within the OSPF network to ensure efficient communication and redundancy.

    • The election process is based on priority values assigned to each router, with the highest priority becoming the DR and the second highest becoming the BDR.

    • If two routers have the same pr...

  • Answered by AI

Skills evaluated in this interview

Round 1 - Resume Shortlist 
Pro Tip by AmbitionBox:
Don’t add your photo or details such as gender, age, and address in your resume. These details do not add any value.
View all tips
Round 2 - Aptitude Test 

It is all about basic common questions like Mathematics,Reasoning,English etc

Round 3 - Technical 

(6 Questions)

  • Q1. Y is network is moreuseful to users?
  • Ans. 

    A network is more useful to users because it allows for easy communication, access to resources, and sharing of information.

    • Networks enable users to communicate with each other easily and quickly.

    • Users can access resources such as files, printers, and applications that are shared on the network.

    • Information can be easily shared and disseminated among users on the network.

    • Networks provide a platform for collaboration and...

  • Answered by AI
  • Q2. Is there any breach in the network?
  • Ans. 

    Yes, there is a breach in the network.

    • Unusual network traffic patterns

    • Unauthorized access to sensitive data

    • Unexpected system behavior or performance issues

    • Logs indicating suspicious activities

    • Security alerts or notifications

  • Answered by AI
  • Q3. How to use VPNs and why?
  • Ans. 

    VPNs are used to create secure and private connections over public networks.

    • VPNs encrypt data to ensure confidentiality and protect against unauthorized access.

    • VPNs allow remote access to private networks, enabling users to securely connect to their work network from anywhere.

    • VPNs can bypass geographical restrictions and censorship, providing access to restricted content.

    • VPNs can be used to enhance online privacy by ma...

  • Answered by AI
  • Q4. What does DNS mean?
  • Ans. 

    DNS stands for Domain Name System. It is a decentralized system that translates domain names into IP addresses.

    • DNS is responsible for resolving domain names to their corresponding IP addresses.

    • It allows users to access websites and other resources using easy-to-remember domain names instead of numerical IP addresses.

    • DNS operates through a hierarchical structure of servers, including authoritative DNS servers, recursive...

  • Answered by AI
  • Q5. Explain about OSI model?
  • Ans. 

    The OSI model is a conceptual framework that standardizes the functions of a communication system into seven layers.

    • The OSI model stands for Open Systems Interconnection model.

    • It was developed by the International Organization for Standardization (ISO) in 1984.

    • The model is divided into seven layers: Physical, Data Link, Network, Transport, Session, Presentation, and Application.

    • Each layer has specific functions and int...

  • Answered by AI
  • Q6. Ips and IDS mean?
  • Ans. 

    IPS stands for Intrusion Prevention System and IDS stands for Intrusion Detection System.

    • IPS is a security device that actively monitors network traffic to prevent malicious activities.

    • IDS is a security device that passively monitors network traffic to detect potential security breaches.

    • IPS can block or prevent malicious traffic from entering the network.

    • IDS can only detect and alert about potential security threats.

    • Bo...

  • Answered by AI
Round 4 - HR 

(3 Questions)

  • Q1. Y did u choose networking as carrer
  • Ans. 

    I chose networking as a career because of my passion for technology and problem-solving.

    • Passion for technology and problem-solving

    • Interest in understanding how computer networks function

    • Opportunity to work with cutting-edge technologies

    • Ability to troubleshoot and resolve network issues

    • Desire to contribute to the development of secure and efficient networks

  • Answered by AI
  • Q2. What is ur expected CTC
  • Ans. 

    I would expect a competitive salary based on my experience, skills, and the market standards.

    • I would like to discuss the salary range for this position based on the responsibilities and expectations.

    • Considering my qualifications and the industry standards, I anticipate a fair compensation package.

    • I am open to negotiation and would appreciate a salary that reflects my expertise and contributions.

    • I believe a mutually ben...

  • Answered by AI
  • Q3. Thankyou for joining tgis company

Skills evaluated in this interview

Inspira Enterprise India Limited Interview FAQs

How many rounds are there in Inspira Enterprise India Limited Cyber Security Engineer interview?
Inspira Enterprise India Limited interview process usually has 3 rounds. The most common rounds in the Inspira Enterprise India Limited interview process are Aptitude Test, Assignment and One-on-one Round.
What are the top questions asked in Inspira Enterprise India Limited Cyber Security Engineer interview?

Some of the top questions asked at the Inspira Enterprise India Limited Cyber Security Engineer interview -

  1. What is private and public IP addr...read more
  2. How many hosts in class C IP addr...read more
  3. What is the most recent vulnerabil...read more

Tell us how to improve this page.

Interview Questions from Similar Companies

TCS Interview Questions
3.7
 • 10.3k Interviews
Accenture Interview Questions
3.9
 • 8.1k Interviews
Infosys Interview Questions
3.7
 • 7.5k Interviews
Wipro Interview Questions
3.7
 • 5.6k Interviews
Cognizant Interview Questions
3.8
 • 5.5k Interviews
Capgemini Interview Questions
3.8
 • 4.8k Interviews
Tech Mahindra Interview Questions
3.6
 • 3.8k Interviews
HCLTech Interview Questions
3.5
 • 3.7k Interviews
LTIMindtree Interview Questions
3.8
 • 2.9k Interviews
IBM Interview Questions
4.1
 • 2.4k Interviews
View all
Inspira Enterprise India Limited Cyber Security Engineer Salary
based on 7 salaries
₹4 L/yr - ₹8.5 L/yr
38% less than the average Cyber Security Engineer Salary in India
View more details

Inspira Enterprise India Limited Cyber Security Engineer Reviews and Ratings

based on 1 review

2.0/5

Rating in categories

1.0

Skill development

1.0

Work-life balance

3.0

Salary

3.0

Job security

1.0

Company culture

1.0

Promotions

1.0

Work satisfaction

Explore 1 Review and Rating
Security Analyst
354 salaries
unlock blur

₹3 L/yr - ₹10.6 L/yr

Senior Security Analyst
222 salaries
unlock blur

₹4.6 L/yr - ₹18.5 L/yr

Network Engineer
189 salaries
unlock blur

₹1.8 L/yr - ₹8.8 L/yr

Cyber Security Analyst
132 salaries
unlock blur

₹2.8 L/yr - ₹9.5 L/yr

SOC Analyst
87 salaries
unlock blur

₹3 L/yr - ₹9 L/yr

Explore more salaries
Compare Inspira Enterprise India Limited with

Wipro

3.7
Compare

HCLTech

3.5
Compare

Tech Mahindra

3.5
Compare

TCS

3.7
Compare
Did you find this page helpful?
Yes No
write
Share an Interview