Filter interviews by
I applied via Naukri.com and was interviewed in Aug 2022. There were 4 interview rounds.
I have hands-on experience with various network security devices.
Firewalls: Cisco ASA, Palo Alto, Fortinet
Intrusion Detection/Prevention Systems: Snort, Suricata
VPN: Cisco AnyConnect, OpenVPN
Web Application Firewalls: ModSecurity, F5 ASM
SIEM: Splunk, ELK
Network Access Control: Cisco ISE, Aruba ClearPass
Daily operations activities involve monitoring, maintaining and securing network infrastructure.
Monitoring network traffic and identifying any anomalies or security threats
Maintaining network hardware and software, including updates and patches
Configuring and managing firewalls, routers, switches, and other network devices
Managing user accounts and access permissions
Performing regular backups and disaster recovery plan...
The VLANs used depend on the network architecture and requirements.
VLANs are used to logically separate network traffic.
They can be used to improve security and network performance.
Common VLANs include management, voice, and data VLANs.
The VLANs used depend on the network architecture and requirements.
VLAN tagging is used to identify VLAN traffic on a network.
VLANs can be configured on switches, routers, and firewalls.
DNS infrastructure is a system that translates domain names into IP addresses to enable communication between devices on a network.
DNS servers store records of domain names and their corresponding IP addresses.
DNS resolution can be recursive or iterative.
DNS cache is used to speed up the resolution process.
DNSSEC is used to secure DNS infrastructure.
DNS load balancing can be used to distribute traffic across multiple s...
I am currently working on Cisco ASA firewalls, Palo Alto firewalls, and F5 load balancers.
Working on configuring and maintaining Cisco ASA firewalls for network security
Configuring and managing Palo Alto firewalls for threat prevention and network security
Managing and configuring F5 load balancers for traffic distribution and application security
Routers are used to connect different networks while switches are used to connect devices within a network.
Routers operate at the network layer (Layer 3) of the OSI model while switches operate at the data link layer (Layer 2).
Routers can perform functions such as routing, filtering, and forwarding packets based on IP addresses.
Switches are used to create a network by connecting devices such as computers, printers, and...
Top trending discussions
Assign tasks based on past performance by analyzing employee's strengths and weaknesses.
Analyze employee's past performance data
Identify their strengths and weaknesses
Assign tasks that align with their strengths
Provide training or support for areas of weakness
Regularly review and adjust task assignments based on performance
Consider employee preferences and career goals
Assuming the blog covers popular sports, the number of viewers can range from a few thousand to millions depending on the quality of content and marketing strategies.
Consider the popularity of the sports covered in the blog
Evaluate the quality of content and frequency of updates
Assess the marketing strategies used to promote the blog
Look at the engagement level of the blog's social media accounts
Take into account the c
A thief operating in shopping can earn anywhere from a few thousand to millions of dollars per year depending on their tactics and location.
The thief's location and the type of stores they target will greatly impact their earnings
Factors such as the thief's level of experience, skill, and risk-taking behavior will also play a role in their earnings
Some thieves may work alone while others may operate in organized groups...
To open the number lock on the bag, you need to try combinations of three numbers, ensuring that at least two of them are correct.
Start by trying the combinations of the first two numbers with each of the remaining six numbers.
If none of these combinations work, move on to the next pair of numbers and repeat the process.
Continue this pattern until you find a combination that opens the lock.
posted on 14 May 2022
I applied via Walk-in and was interviewed before May 2021. There were 3 interview rounds.
posted on 20 Jul 2021
posted on 28 Oct 2022
I applied via Recruitment Consulltant and was interviewed before Oct 2021. There were 3 interview rounds.
Not applicable , this was final round
based on 1 interview
Interview experience
Senior HR Executive
5
salaries
| ₹0 L/yr - ₹0 L/yr |
PHP Developer
4
salaries
| ₹0 L/yr - ₹0 L/yr |
IOS Application Developer
4
salaries
| ₹0 L/yr - ₹0 L/yr |
Accountant
3
salaries
| ₹0 L/yr - ₹0 L/yr |
HR Executive
3
salaries
| ₹0 L/yr - ₹0 L/yr |
Primus Global Technologies
TriGeo Technologies
GrapplTech
Plada Infotech Services