i
Inspira Enterprise India Limited
Filter interviews by
I applied via Naukri.com and was interviewed in Jan 2022. There were 3 interview rounds.
Basic aptitude test on mercer mettl platform. Limited time.
3 question on splunk.
Private IP addresses are used within a local network, while public IP addresses are used to identify a network on the internet.
Private IP addresses are not unique on the internet and are used within a local network to identify devices.
Public IP addresses are unique on the internet and are used to identify a network on the internet.
Private IP addresses are in the range of 10.0.0.0 to 10.255.255.255, 172.16.0.0 to 172.31...
There are 256 hosts in a class C IP address.
Class C IP addresses have a subnet mask of 255.255.255.0
The first three octets are used for network identification
The last octet is used for host identification
The range of IP addresses in a class C network is from 192.0.0.0 to 223.255.255.255
Each octet has 8 bits, so the last octet can have 2^8 (256) possible values
Vulnerable ports are those that are commonly targeted by attackers to gain unauthorized access to a system.
Port 21 (FTP)
Port 23 (Telnet)
Port 25 (SMTP)
Port 80 (HTTP)
Port 443 (HTTPS)
Port 3389 (Remote Desktop Protocol)
SQL injection is a type of cyber attack where malicious SQL statements are inserted into an entry field to manipulate a database.
Allows attackers to access sensitive data or execute unauthorized actions
Occurs when user input is not properly sanitized
Can be prevented by using parameterized queries and input validation
Example: Entering ' OR 1=1;--' into a login form to bypass authentication
The most recent vulnerability is the PrintNightmare vulnerability in Windows Print Spooler service.
The vulnerability allows attackers to remotely execute code with system-level privileges.
It affects all versions of Windows and has a CVSS score of 8.8.
Microsoft has released patches for the vulnerability, but some experts suggest disabling the Print Spooler service as a temporary fix.
Top trending discussions
I applied via Approached by Company and was interviewed in Oct 2024. There was 1 interview round.
Wireless refers to the transmission of data without the use of physical cables or wires.
Wireless technology uses radio waves to transmit data over a network.
Examples of wireless technology include Wi-Fi, Bluetooth, and cellular networks.
Wireless networks are convenient for mobile devices and allow for greater flexibility in connectivity.
Switch congestion occurs when a network switch is overwhelmed with traffic, leading to delays or dropped packets.
Switch congestion can occur when there is a high volume of data being transmitted through the switch
It can lead to delays in data transmission or even dropped packets
Switch congestion can be alleviated by implementing Quality of Service (QoS) policies or upgrading to higher capacity switches
Wireless device configuration involves setting up and managing wireless networks for optimal performance.
Understand the network requirements and goals
Select appropriate wireless devices and access points
Configure SSIDs, security settings, and encryption protocols
Optimize placement of access points for coverage and performance
Monitor and troubleshoot network performance
posted on 3 Dec 2024
I applied via Naukri.com and was interviewed in Nov 2024. There was 1 interview round.
I applied via Walk-in and was interviewed in Feb 2024. There were 2 interview rounds.
Basic question like as time ditance
Basic of dsa sql dbms
I applied via Naukri.com and was interviewed in Dec 2021. There were 3 interview rounds.
I applied via Naukri.com and was interviewed in Jan 2024. There was 1 interview round.
Packet flow in Palo Alto Firewall involves multiple stages including ingress, policy lookup, security policy enforcement, NAT, and egress.
Packet enters the firewall through an ingress interface
Firewall performs policy lookup to determine if the packet should be allowed or denied
If allowed, the packet goes through security policy enforcement which includes threat prevention, URL filtering, etc.
NAT (Network Address Trans...
OSPF (Open Shortest Path First) is a routing protocol used to determine the best path for data packets in a network.
OSPF is a link-state routing protocol
It uses Dijkstra's algorithm to calculate the shortest path
OSPF routers exchange link-state advertisements (LSAs)
It supports VLSM (Variable Length Subnet Masking)
OSPF areas are used to divide large networks into smaller segments
DR and BDR in OSPF are elected based on priority values, with the highest priority becoming the DR and the second highest becoming the BDR.
DR and BDR are elected within the OSPF network to ensure efficient communication and redundancy.
The election process is based on priority values assigned to each router, with the highest priority becoming the DR and the second highest becoming the BDR.
If two routers have the same pr...
based on 1 review
Rating in categories
Security Analyst
358
salaries
| ₹3 L/yr - ₹11 L/yr |
Senior Security Analyst
225
salaries
| ₹4.6 L/yr - ₹18.5 L/yr |
Network Engineer
189
salaries
| ₹1.8 L/yr - ₹8 L/yr |
Cyber Security Analyst
130
salaries
| ₹2.8 L/yr - ₹10 L/yr |
SOC Analyst
91
salaries
| ₹3 L/yr - ₹9.2 L/yr |
Wipro
HCLTech
Tech Mahindra
TCS