Filter interviews by
I applied via Approached by Company and was interviewed in Sep 2023. There was 1 interview round.
ISO-OSI layers are a conceptual framework used to understand network communication. ADSL is a type of broadband internet connection.
ISO-OSI layers refer to a model that divides network communication into seven layers, each with specific functions.
ADSL (Asymmetric Digital Subscriber Line) is a type of broadband internet connection that allows faster download speeds compared to upload speeds.
ISO-OSI layers include physic...
DHCP is a network protocol that assigns IP addresses to devices, a router is a networking device that forwards data packets between computer networks, hub broadcasts data to all devices while switch forwards data to specific devices.
DHCP stands for Dynamic Host Configuration Protocol
DHCP assigns IP addresses to devices on a network
Router is a networking device that forwards data packets between computer networks
Hub bro...
Top trending discussions
A honeypot is a decoy system designed to lure cyber attackers and gather information about their tactics, techniques, and procedures.
Honeypots are used to detect and analyze cyber threats in a controlled environment.
They can be deployed within an organization's network to attract and monitor malicious activities.
Honeypots can help organizations improve their security posture by identifying vulnerabilities and understan...
I handle security incidents by following established incident response procedures and utilizing various security tools.
Immediately isolate affected systems to prevent further damage
Collect and analyze relevant data to determine the scope and impact of the incident
Contain the incident by blocking malicious activity and removing threats
Communicate with stakeholders to keep them informed of the situation
Document the incid...
I applied via LinkedIn and was interviewed in Jun 2023. There were 3 interview rounds.
How you can slove issue when there is malware alert triggered where No ioc or ioa is deducted its new and you are only one at the shift how you will come up .
To rectify a new attack, I would first analyze the attack vector, contain the attack, investigate the root cause, implement necessary security measures, and update incident response procedures.
Analyze the attack vector to understand how the attack occurred
Contain the attack by isolating affected systems and limiting further damage
Investigate the root cause of the attack to prevent future incidents
Implement necessary se...
To solve or scan vulnerabilities, utilize vulnerability scanning tools, conduct penetration testing, implement security patches, and regularly update software.
Utilize vulnerability scanning tools such as Nessus, Qualys, or OpenVAS to identify vulnerabilities in systems and networks
Conduct penetration testing to simulate real-world attacks and identify potential vulnerabilities
Implement security patches provided by soft...
CIA triad is a model designed to guide policies for information security within an organization.
CIA stands for Confidentiality, Integrity, and Availability
Confidentiality ensures that information is only accessible to those who are authorized to view it
Integrity ensures that information is accurate and trustworthy
Availability ensures that information is accessible when needed
Example: Encrypting sensitive data to mainta
The port number for RDP (Remote Desktop Protocol) is 3389.
Port number for RDP is 3389
RDP uses TCP protocol
Commonly used for remote desktop connections
I applied via Referral and was interviewed before Mar 2022. There were 2 interview rounds.
Basic information about experience
I applied via campus placement at Dr. B.R. Ambedkar National Institute of Technology (NIT), Jalandhar and was interviewed in Dec 2023. There was 1 interview round.
I applied via campus placement at Muthayammal Engineering College, Rasipuram and was interviewed in Feb 2024. There were 3 interview rounds.
It has 40 Questions and time duration of more than 45 minutes
It has 2 coding questions in java, 1 SQL question and 1 HTML, CSS question.
GET method is used to request data from a specified resource, while POST method is used to submit data to be processed to a specified resource.
GET requests data from a specified resource
POST submits data to be processed to a specified resource
GET requests can be cached and bookmarked, while POST requests are not cached and do not remain in the browser history
GET requests have length restrictions, while POST requests do
I applied via Approached by Company and was interviewed in May 2022. There were 2 interview rounds.
A router is a networking device that forwards data packets between computer networks.
Routers operate at the network layer of the OSI model.
They use routing tables to determine the best path for data packets to travel.
Routers can connect different types of networks, such as LANs and WANs.
Examples of routers include Cisco, Juniper, and TP-Link.
Routers can provide security features such as firewalls and VPNs.
I applied via Naukri.com and was interviewed in Aug 2021. There were 3 interview rounds.
There are several types of networks, including LAN, WAN, MAN, WLAN, and PAN.
Local Area Network (LAN) is a network that covers a small area, such as an office or a building.
Wide Area Network (WAN) is a network that covers a large geographical area, such as multiple cities or countries.
Metropolitan Area Network (MAN) is a network that covers a larger area than a LAN but smaller than a WAN, typically within a city.
Wireles...
The range of private IP addresses is defined by three blocks: 10.0.0.0 to 10.255.255.255, 172.16.0.0 to 172.31.255.255, and 192.168.0.0 to 192.168.255.255.
Private IP addresses are used within private networks and are not routable on the internet.
The three blocks of private IP addresses are reserved for use in local area networks (LANs) and are not unique globally.
Private IP addresses allow organizations to have multipl...
A /29 subnet has 6 usable host addresses.
A /29 subnet has a subnet mask of 255.255.255.248.
The subnet mask leaves 3 bits for host addresses.
2^3 = 8, but 2 addresses are reserved for network and broadcast.
Therefore, a /29 subnet has 6 usable host addresses.
MPLS (Multiprotocol Label Switching) is a protocol used in telecommunications networks to efficiently route data packets.
MPLS is a layer 2.5 protocol that operates between traditional layer 2 (Data Link Layer) and layer 3 (Network Layer) protocols.
It uses labels to identify and forward data packets, improving network performance and scalability.
MPLS can be used to create virtual private networks (VPNs) and prioritize t...
BGP (Border Gateway Protocol) is a routing protocol used in internet networks. It provides scalability, redundancy, and policy control.
BGP is used to exchange routing information between different autonomous systems (AS)
It allows for efficient routing decisions based on policies and network conditions
BGP states represent the different stages of establishing and maintaining BGP peering sessions
Examples of BGP states inc...
OSPF LSA types include Router LSA, Network LSA, Summary LSA, ASBR Summary LSA, AS External LSA, and NSSA External LSA.
Router LSA describes the state of the router and its interfaces within an area.
Network LSA describes the state of the network segment and its attached routers.
Summary LSA summarizes routes from one area to another.
ASBR Summary LSA summarizes routes to an Autonomous System Boundary Router (ASBR).
AS Exter...
VTP stands for VLAN Trunking Protocol. It is a Cisco proprietary protocol used to manage VLAN configurations across a network.
VTP allows for centralized management of VLANs in a network.
It enables the creation, deletion, and renaming of VLANs on a switch and automatically propagates these changes to other switches in the network.
VTP operates in three modes: server, client, and transparent.
Server mode allows VLAN config...
HSRP stands for Hot Standby Router Protocol. It is a Cisco proprietary protocol used to provide redundancy for IP networks.
HSRP is used to create a virtual IP address that can be shared by multiple routers in a network.
It allows for automatic failover in case the primary router fails.
HSRP routers elect an active router and standby routers, with the active router handling traffic while the standby routers are ready to t...
Interview experience
Operations Executive
36
salaries
| ₹1 L/yr - ₹4 L/yr |
Assistant Manager
6
salaries
| ₹2.7 L/yr - ₹5 L/yr |
Assistant Sales Manager
3
salaries
| ₹4 L/yr - ₹5 L/yr |
Senior Executive
3
salaries
| ₹3 L/yr - ₹4.5 L/yr |
Assistant Manager- HR
3
salaries
| ₹3.5 L/yr - ₹3.9 L/yr |
TCS
Infosys
Wipro
HCLTech