i
LA Technologies
Filter interviews by
I am currently earning a competitive salary and have a clear understanding of my expected salary and notice period.
My current CTC is competitive and reflects my experience and skills.
I have a clear expectation of my desired CTC based on market research and industry standards.
My notice period is in accordance with company policies and can be discussed further during the interview process.
The OSI model is a conceptual framework that standardizes the functions of a telecommunication or computing system into seven layers.
The OSI model stands for Open Systems Interconnection model.
It helps in understanding how different networking protocols work together.
Each layer has specific functions and communicates with the adjacent layers.
Examples of layers include physical layer, data link layer, network layer, tra
Router works at the network layer (Layer 3) in the OSI model.
Routers operate at the network layer (Layer 3) of the OSI model.
They use IP addresses to forward packets between different networks.
Routers make decisions based on routing tables to determine the best path for data transmission.
Examples of routers include Cisco routers, Juniper routers, and home Wi-Fi routers.
OSI layer refers to the Open Systems Interconnection model, a conceptual framework that standardizes the functions of a telecommunication or computing system into seven distinct layers.
The OSI model helps in understanding how different networking protocols and technologies interact with each other.
Each layer in the OSI model has specific functions and communicates with the adjacent layers.
Examples of OSI layers include...
LA Technologies interview questions for popular designations
I applied via Naukri.com and was interviewed before Jun 2021. There were 5 interview rounds.
The MITRE ATT&CK framework is a knowledge base of adversary tactics and techniques based on real-world observations.
Developed by MITRE Corporation
Provides a comprehensive list of tactics and techniques used by adversaries during cyber attacks
Used by cybersecurity professionals to improve threat detection and response
Helps organizations understand and defend against common attack patterns
Example: Credential Dumping is a
Company X experienced a data breach due to a phishing attack on employee email accounts.
Phishing attack targeted employee email accounts
Sensitive data such as customer information or financial records may have been compromised
Company X is working on improving cybersecurity measures to prevent future breaches
I applied via Campus Placement and was interviewed before Dec 2023. There were 3 interview rounds.
Aptitude, reasoning and english
Yes, I am flexible to relocate for the right opportunity.
I am open to relocating for the right job opportunity
I have relocated in the past for career advancement
I am willing to consider relocation based on the specifics of the job offer
Yes, I am flexible to shifts and can adapt to different schedules as needed.
I am willing to work different shifts, including nights and weekends
I understand the importance of being flexible in a fast-paced work environment
I have previous experience working rotating shifts in a similar role
I am a dedicated and detail-oriented individual with a passion for analyzing social trends and behaviors.
I have a degree in Sociology with a focus on research methods
I have experience conducting surveys and interviews to gather data
I am proficient in data analysis software such as SPSS and Excel
DDoS attack is a malicious attempt to disrupt normal traffic of a targeted server, service, or network by overwhelming it with a flood of internet traffic.
DDoS stands for Distributed Denial of Service
Attackers use multiple compromised systems to flood the target with traffic
Goal is to make the target inaccessible to its intended users
Common types include UDP flood, ICMP flood, and SYN flood
Examples: Mirai botnet attack
I appeared for an interview in Feb 2025.
AAA in cybersecurity stands for Authentication, Authorization, and Accounting, crucial for securing systems.
Authentication verifies user identity (e.g., passwords, biometrics).
Authorization determines user permissions (e.g., access to files).
Accounting tracks user activities (e.g., logging access times).
Example: A user logs in (Authentication), accesses a file (Authorization), and their actions are logged (Accounting).
IDS detects intrusions, while IPS actively prevents them, enhancing network security.
IDS (Intrusion Detection System) monitors network traffic for suspicious activity.
IPS (Intrusion Prevention System) not only detects but also blocks potential threats.
Example of IDS: Snort, which analyzes traffic and alerts administrators.
Example of IPS: Cisco Firepower, which can block malicious traffic in real-time.
IDS is typically p...
I enjoy hiking, reading, and photography, which help me relax and explore my creativity.
Hiking: I love exploring nature trails and discovering new landscapes, often going on weekend hikes with friends.
Reading: I read a variety of genres, from fiction to non-fiction, and recently finished a book on cybersecurity.
Photography: I enjoy capturing moments during my hikes, focusing on landscapes and wildlife, and I often shar
based on 7 interviews
Interview experience
based on 54 reviews
Rating in categories
Network Engineer
33
salaries
| ₹1.6 L/yr - ₹6.5 L/yr |
Network Security Engineer
14
salaries
| ₹2.3 L/yr - ₹7.6 L/yr |
Executive Accountant
14
salaries
| ₹1.8 L/yr - ₹3.6 L/yr |
NOC Engineer 1
6
salaries
| ₹2.5 L/yr - ₹4 L/yr |
SAP Basis Consultant
6
salaries
| ₹3.2 L/yr - ₹4.8 L/yr |
TCS
Infosys
Wipro
HCLTech