Filter interviews by
I applied via Naukri.com and was interviewed in Aug 2022. There were 4 interview rounds.
I have hands-on experience with various network security devices.
Firewalls: Cisco ASA, Palo Alto, Fortinet
Intrusion Detection/Prevention Systems: Snort, Suricata
VPN: Cisco AnyConnect, OpenVPN
Web Application Firewalls: ModSecurity, F5 ASM
SIEM: Splunk, ELK
Network Access Control: Cisco ISE, Aruba ClearPass
Daily operations activities involve monitoring, maintaining and securing network infrastructure.
Monitoring network traffic and identifying any anomalies or security threats
Maintaining network hardware and software, including updates and patches
Configuring and managing firewalls, routers, switches, and other network devices
Managing user accounts and access permissions
Performing regular backups and disaster recovery plan...
The VLANs used depend on the network architecture and requirements.
VLANs are used to logically separate network traffic.
They can be used to improve security and network performance.
Common VLANs include management, voice, and data VLANs.
The VLANs used depend on the network architecture and requirements.
VLAN tagging is used to identify VLAN traffic on a network.
VLANs can be configured on switches, routers, and firewalls.
DNS infrastructure is a system that translates domain names into IP addresses to enable communication between devices on a network.
DNS servers store records of domain names and their corresponding IP addresses.
DNS resolution can be recursive or iterative.
DNS cache is used to speed up the resolution process.
DNSSEC is used to secure DNS infrastructure.
DNS load balancing can be used to distribute traffic across multiple s...
I am currently working on Cisco ASA firewalls, Palo Alto firewalls, and F5 load balancers.
Working on configuring and maintaining Cisco ASA firewalls for network security
Configuring and managing Palo Alto firewalls for threat prevention and network security
Managing and configuring F5 load balancers for traffic distribution and application security
Routers are used to connect different networks while switches are used to connect devices within a network.
Routers operate at the network layer (Layer 3) of the OSI model while switches operate at the data link layer (Layer 2).
Routers can perform functions such as routing, filtering, and forwarding packets based on IP addresses.
Switches are used to create a network by connecting devices such as computers, printers, and...
Top trending discussions
Senior HR Executive
5
salaries
| ₹4 L/yr - ₹5 L/yr |
PHP Developer
4
salaries
| ₹2 L/yr - ₹3.3 L/yr |
IOS Application Developer
4
salaries
| ₹2 L/yr - ₹3 L/yr |
Accountant
3
salaries
| ₹3.7 L/yr - ₹8 L/yr |
HR Executive
3
salaries
| ₹3 L/yr - ₹4 L/yr |
Exl India
Primus Global Technologies
TriGeo Technologies
GrapplTech